Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
c2A6GRyAwn.dll

Overview

General Information

Sample name:c2A6GRyAwn.dll
renamed because original name is a hash value
Original sample name:c25a973f8b0a24249c6e6894cef4d6b7.dll
Analysis ID:1578032
MD5:c25a973f8b0a24249c6e6894cef4d6b7
SHA1:ca709195fdae41296ce26a31f710f3d9a7495a8f
SHA256:e5024fae6c595676b50f0a9b8ab6a3ccd0a9b36a069c5a3746ad07d73ef6cfb8
Tags:dlluser-abuse_ch
Infos:

Detection

Nitol
Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
System process connects to network (likely due to code injection or exploit)
Yara detected Nitol
AI detected suspicious sample
Contains functionality to capture and log keystrokes
Contains functionality to compare user and computer (likely to detect sandboxes)
Contains functionality to detect virtual machines (IN, VMware)
Creates an autostart registry key pointing to binary in C:\Windows
Found evasive API chain checking for user administrative privileges
PE file has a writeable .text section
Tries to delay execution (extensive OutputDebugStringW loop)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to detect virtual machines (SGDT)
Contains functionality to detect virtual machines (SIDT)
Contains functionality to dynamically determine API calls
Contains functionality to launch a process as a different user
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Found evasive API chain (date check)
Found evasive API chain (may stop execution after checking a module file name)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: CurrentVersion Autorun Keys Modification
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • loaddll32.exe (PID: 180 cmdline: loaddll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 6284 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 612 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 2472 cmdline: rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
        • WMIC.exe (PID: 2300 cmdline: wmic cpu get processorid MD5: E2DE6500DE1148C7F6027AD50AC8B891)
          • conhost.exe (PID: 1520 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • rundll32.exe (PID: 1224 cmdline: rundll32.exe C:\Users\user\Desktop\c2A6GRyAwn.dll,cef_add_cross_origin_whitelist_entry MD5: 889B99C52A60DD49227C5E485A016679)
      • WMIC.exe (PID: 1020 cmdline: wmic cpu get processorid MD5: E2DE6500DE1148C7F6027AD50AC8B891)
        • conhost.exe (PID: 1248 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • rundll32.exe (PID: 7060 cmdline: rundll32.exe C:\Users\user\Desktop\c2A6GRyAwn.dll,cef_add_web_plugin_directory MD5: 889B99C52A60DD49227C5E485A016679)
      • WMIC.exe (PID: 4912 cmdline: wmic cpu get processorid MD5: E2DE6500DE1148C7F6027AD50AC8B891)
        • conhost.exe (PID: 6104 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • rundll32.exe (PID: 1784 cmdline: rundll32.exe C:\Users\user\Desktop\c2A6GRyAwn.dll,cef_add_web_plugin_path MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 5688 cmdline: rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_add_cross_origin_whitelist_entry MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 6672 cmdline: rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_add_web_plugin_directory MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 344 cmdline: rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_add_web_plugin_path MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 1732 cmdline: rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",create_context_shared MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 3620 cmdline: rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_zip_reader_create MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 6008 cmdline: rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_zip_directory MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 3924 cmdline: rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_write_json MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 6448 cmdline: rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_window_create_top_level MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 4720 cmdline: rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_visit_web_plugin_info MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 4676 cmdline: rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_value_create MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 2000 cmdline: rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_v8value_create_undefined MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7124 cmdline: rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_v8value_create_uint MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 4308 cmdline: rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_v8value_create_string MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7156 cmdline: rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_v8value_create_object MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 1272 cmdline: rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_v8value_create_null MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 5948 cmdline: rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_v8value_create_int MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 3780 cmdline: rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_v8value_create_function MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 6020 cmdline: rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_v8value_create_double MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 5336 cmdline: rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_v8value_create_date MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 5808 cmdline: rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_v8value_create_bool MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7176 cmdline: rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_v8value_create_array_buffer MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7196 cmdline: rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_v8value_create_array MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7208 cmdline: rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_v8stack_trace_get_current MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7228 cmdline: rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_v8context_in_context MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7236 cmdline: rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_v8context_get_entered_context MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7244 cmdline: rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_v8context_get_current_context MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7252 cmdline: rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_urlrequest_create MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7264 cmdline: rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_uriencode MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7272 cmdline: rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_uridecode MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7280 cmdline: rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_unregister_internal_web_plugin MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7292 cmdline: rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_time_to_timet MD5: 889B99C52A60DD49227C5E485A016679)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000023.00000002.3043543087.0000000010037000.00000002.00001000.00020000.00000000.sdmpJoeSecurity_NitolYara detected NitolJoe Security
    00000012.00000002.2994205386.0000000010037000.00000002.00001000.00020000.00000000.sdmpJoeSecurity_NitolYara detected NitolJoe Security
      00000013.00000002.3010385963.000000006C9C3000.00000040.00000001.01000000.00000003.sdmpJoeSecurity_NitolYara detected NitolJoe Security
        00000025.00000002.3036735360.000000006C9C3000.00000040.00000001.01000000.00000003.sdmpJoeSecurity_NitolYara detected NitolJoe Security
          0000002C.00000002.3045359153.0000000010037000.00000002.00001000.00020000.00000000.sdmpJoeSecurity_NitolYara detected NitolJoe Security
            Click to see the 63 entries
            SourceRuleDescriptionAuthorStrings
            18.2.rundll32.exe.10000000.0.unpackJoeSecurity_NitolYara detected NitolJoe Security
              37.2.rundll32.exe.6c9c33e0.2.raw.unpackJoeSecurity_NitolYara detected NitolJoe Security
                37.2.rundll32.exe.10000000.0.unpackJoeSecurity_NitolYara detected NitolJoe Security
                  4.2.rundll32.exe.6c9c33e0.2.raw.unpackJoeSecurity_NitolYara detected NitolJoe Security
                    25.2.rundll32.exe.6c9c33e0.2.raw.unpackJoeSecurity_NitolYara detected NitolJoe Security
                      Click to see the 97 entries

                      System Summary

                      barindex
                      Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Windows\SysWOW64\rundll32.exe, EventID: 13, EventType: SetValue, Image: C:\Windows\SysWOW64\rundll32.exe, ProcessId: 1784, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Update
                      No Suricata rule has matched

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: c2A6GRyAwn.dllVirustotal: Detection: 12%Perma Link
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 97.9% probability
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1000D890 CryptAcquireContextA,GetLastError,CryptCreateHash,GetLastError,CryptReleaseContext,CryptHashData,GetLastError,CryptDestroyHash,CryptReleaseContext,CryptGetHashParam,CryptGetHashParam,lstrcpyA,wsprintfA,lstrcatA,CryptDestroyHash,CryptReleaseContext,3_2_1000D890
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_1000D890 CryptAcquireContextA,GetLastError,CryptCreateHash,GetLastError,CryptReleaseContext,CryptHashData,GetLastError,CryptDestroyHash,CryptReleaseContext,CryptGetHashParam,CryptGetHashParam,lstrcpyA,wsprintfA,lstrcatA,CryptDestroyHash,CryptReleaseContext,4_2_1000D890
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1000D890 CryptAcquireContextA,GetLastError,CryptCreateHash,GetLastError,CryptReleaseContext,CryptHashData,GetLastError,CryptDestroyHash,CryptReleaseContext,CryptGetHashParam,CryptGetHashParam,lstrcpyA,wsprintfA,lstrcatA,CryptDestroyHash,CryptReleaseContext,6_2_1000D890
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 14_2_1000D890 CryptAcquireContextA,GetLastError,CryptCreateHash,GetLastError,CryptReleaseContext,CryptHashData,GetLastError,CryptDestroyHash,CryptReleaseContext,CryptGetHashParam,CryptGetHashParam,lstrcpyA,wsprintfA,lstrcatA,CryptDestroyHash,CryptReleaseContext,14_2_1000D890
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_1000D890 CryptAcquireContextA,GetLastError,CryptCreateHash,GetLastError,CryptReleaseContext,CryptHashData,GetLastError,CryptDestroyHash,CryptReleaseContext,CryptGetHashParam,CryptGetHashParam,lstrcpyA,wsprintfA,lstrcatA,CryptDestroyHash,CryptReleaseContext,15_2_1000D890
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 16_2_1000D890 CryptAcquireContextA,GetLastError,CryptCreateHash,GetLastError,CryptReleaseContext,CryptHashData,GetLastError,CryptDestroyHash,CryptReleaseContext,CryptGetHashParam,CryptGetHashParam,lstrcpyA,wsprintfA,lstrcatA,CryptDestroyHash,CryptReleaseContext,16_2_1000D890
                      Source: c2A6GRyAwn.dllStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
                      Source: c2A6GRyAwn.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT

                      Networking

                      barindex
                      Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 122.226.191.212 80Jump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 104.21.42.47 80Jump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 206.238.77.142 2222Jump to behavior
                      Source: global trafficTCP traffic: 192.168.2.5:49757 -> 206.238.77.142:1111
                      Source: Joe Sandbox ViewASN Name: CHINATELECOM-ZHEJIANG-JINHUA-IDCJINHUAZHEJIANGProvince CHINATELECOM-ZHEJIANG-JINHUA-IDCJINHUAZHEJIANGProvince
                      Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                      Source: Joe Sandbox ViewASN Name: COGENT-174US COGENT-174US
                      Source: unknownTCP traffic detected without corresponding DNS query: 206.238.77.142
                      Source: unknownTCP traffic detected without corresponding DNS query: 206.238.77.142
                      Source: unknownTCP traffic detected without corresponding DNS query: 206.238.77.142
                      Source: unknownTCP traffic detected without corresponding DNS query: 206.238.77.142
                      Source: unknownTCP traffic detected without corresponding DNS query: 206.238.77.142
                      Source: unknownTCP traffic detected without corresponding DNS query: 206.238.77.142
                      Source: unknownTCP traffic detected without corresponding DNS query: 206.238.77.142
                      Source: unknownTCP traffic detected without corresponding DNS query: 206.238.77.142
                      Source: unknownTCP traffic detected without corresponding DNS query: 206.238.77.142
                      Source: unknownTCP traffic detected without corresponding DNS query: 206.238.77.142
                      Source: unknownTCP traffic detected without corresponding DNS query: 206.238.77.142
                      Source: unknownTCP traffic detected without corresponding DNS query: 206.238.77.142
                      Source: unknownTCP traffic detected without corresponding DNS query: 206.238.77.142
                      Source: unknownTCP traffic detected without corresponding DNS query: 206.238.77.142
                      Source: unknownTCP traffic detected without corresponding DNS query: 206.238.77.142
                      Source: unknownTCP traffic detected without corresponding DNS query: 206.238.77.142
                      Source: unknownTCP traffic detected without corresponding DNS query: 206.238.77.142
                      Source: unknownTCP traffic detected without corresponding DNS query: 206.238.77.142
                      Source: unknownTCP traffic detected without corresponding DNS query: 206.238.77.142
                      Source: unknownTCP traffic detected without corresponding DNS query: 206.238.77.142
                      Source: unknownTCP traffic detected without corresponding DNS query: 206.238.77.142
                      Source: unknownTCP traffic detected without corresponding DNS query: 206.238.77.142
                      Source: unknownTCP traffic detected without corresponding DNS query: 206.238.77.142
                      Source: unknownTCP traffic detected without corresponding DNS query: 206.238.77.142
                      Source: unknownTCP traffic detected without corresponding DNS query: 206.238.77.142
                      Source: unknownTCP traffic detected without corresponding DNS query: 206.238.77.142
                      Source: unknownTCP traffic detected without corresponding DNS query: 206.238.77.142
                      Source: unknownTCP traffic detected without corresponding DNS query: 206.238.77.142
                      Source: unknownTCP traffic detected without corresponding DNS query: 206.238.77.142
                      Source: unknownTCP traffic detected without corresponding DNS query: 206.238.77.142
                      Source: unknownTCP traffic detected without corresponding DNS query: 206.238.77.142
                      Source: unknownTCP traffic detected without corresponding DNS query: 206.238.77.142
                      Source: unknownTCP traffic detected without corresponding DNS query: 206.238.77.142
                      Source: unknownTCP traffic detected without corresponding DNS query: 206.238.77.142
                      Source: unknownTCP traffic detected without corresponding DNS query: 206.238.77.142
                      Source: unknownTCP traffic detected without corresponding DNS query: 206.238.77.142
                      Source: unknownTCP traffic detected without corresponding DNS query: 206.238.77.142
                      Source: unknownTCP traffic detected without corresponding DNS query: 206.238.77.142
                      Source: unknownTCP traffic detected without corresponding DNS query: 206.238.77.142
                      Source: unknownTCP traffic detected without corresponding DNS query: 206.238.77.142
                      Source: unknownTCP traffic detected without corresponding DNS query: 206.238.77.142
                      Source: unknownTCP traffic detected without corresponding DNS query: 206.238.77.142
                      Source: unknownTCP traffic detected without corresponding DNS query: 206.238.77.142
                      Source: unknownTCP traffic detected without corresponding DNS query: 206.238.77.142
                      Source: unknownTCP traffic detected without corresponding DNS query: 206.238.77.142
                      Source: unknownTCP traffic detected without corresponding DNS query: 206.238.77.142
                      Source: unknownTCP traffic detected without corresponding DNS query: 206.238.77.142
                      Source: unknownTCP traffic detected without corresponding DNS query: 206.238.77.142
                      Source: unknownTCP traffic detected without corresponding DNS query: 206.238.77.142
                      Source: unknownTCP traffic detected without corresponding DNS query: 206.238.77.142
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1001A470 WSARecv,WSAGetLastError,3_2_1001A470
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Connection: Keep-AliveUser-Agent: curl/7.83.1Host: 4.ipw.cn
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Connection: Keep-AliveUser-Agent: curl/7.83.1Host: 4.ipw.cn
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Connection: Keep-AliveUser-Agent: curl/7.83.1Host: 4.ipw.cn
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Connection: Keep-AliveUser-Agent: curl/7.83.1Host: 4.ipw.cn
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Connection: Keep-AliveUser-Agent: curl/7.83.1Host: 4.ipw.cn
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Connection: Keep-AliveUser-Agent: curl/7.83.1Host: 4.ipw.cn
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Connection: Keep-AliveUser-Agent: curl/7.83.1Host: 4.ipw.cn
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Connection: Keep-AliveUser-Agent: curl/7.83.1Host: 4.ipw.cn
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Connection: Keep-AliveUser-Agent: curl/7.83.1Host: 4.ipw.cn
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Connection: Keep-AliveUser-Agent: curl/7.83.1Host: 4.ipw.cn
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Connection: Keep-AliveUser-Agent: curl/7.83.1Host: 4.ipw.cn
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Connection: Keep-AliveUser-Agent: curl/7.83.1Host: 4.ipw.cn
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Connection: Keep-AliveUser-Agent: curl/7.83.1Host: 4.ipw.cn
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Connection: Keep-AliveUser-Agent: curl/7.83.1Host: 4.ipw.cn
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Connection: Keep-AliveUser-Agent: curl/7.83.1Host: 4.ipw.cn
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Connection: Keep-AliveUser-Agent: curl/7.83.1Host: 4.ipw.cn
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Connection: Keep-AliveUser-Agent: curl/7.83.1Host: 4.ipw.cn
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Connection: Keep-AliveUser-Agent: curl/7.83.1Host: 4.ipw.cn
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Connection: Keep-AliveUser-Agent: curl/7.83.1Host: 4.ipw.cn
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Connection: Keep-AliveUser-Agent: curl/7.83.1Host: ifconfig.cc
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Connection: Keep-AliveUser-Agent: curl/7.83.1Host: 4.ipw.cn
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Connection: Keep-AliveUser-Agent: curl/7.83.1Host: ifconfig.cc
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Connection: Keep-AliveUser-Agent: curl/7.83.1Host: 4.ipw.cn
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Connection: Keep-AliveUser-Agent: curl/7.83.1Host: ifconfig.cc
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Connection: Keep-AliveUser-Agent: curl/7.83.1Host: 4.ipw.cn
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Connection: Keep-AliveUser-Agent: curl/7.83.1Host: ifconfig.cc
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Connection: Keep-AliveUser-Agent: curl/7.83.1Host: 4.ipw.cn
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Connection: Keep-AliveUser-Agent: curl/7.83.1Host: 4.ipw.cn
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Connection: Keep-AliveUser-Agent: curl/7.83.1Host: 4.ipw.cn
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Connection: Keep-AliveUser-Agent: curl/7.83.1Host: 4.ipw.cn
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Connection: Keep-AliveUser-Agent: curl/7.83.1Host: 4.ipw.cn
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Connection: Keep-AliveUser-Agent: curl/7.83.1Host: 4.ipw.cn
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Connection: Keep-AliveUser-Agent: curl/7.83.1Host: ifconfig.cc
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Connection: Keep-AliveUser-Agent: curl/7.83.1Host: 4.ipw.cn
                      Source: global trafficDNS traffic detected: DNS query: 4.ipw.cn
                      Source: global trafficDNS traffic detected: DNS query: ifconfig.cc
                      Source: rundll32.exe, 00000007.00000003.3130524926.00000000007F4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.3165789414.00000000007F4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.3165789414.00000000007EF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://4.ipw.cn/
                      Source: rundll32.exe, 00000007.00000003.3130524926.00000000007EE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://4.ipw.cn/X

                      Key, Mouse, Clipboard, Microphone and Screen Capturing

                      barindex
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: <BackSpace>3_2_1000EF10
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: <Enter>3_2_1000EF10
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: <BackSpace>4_2_1000EF10
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: <Enter>4_2_1000EF10
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: <BackSpace>6_2_1000EF10
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: <Enter>6_2_1000EF10
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: <BackSpace>14_2_1000EF10
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: <Enter>14_2_1000EF10
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: <BackSpace>15_2_1000EF10
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: <Enter>15_2_1000EF10
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: <BackSpace>16_2_1000EF10
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: <Enter>16_2_1000EF10
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1000F017 GetKeyState,GetAsyncKeyState,GetKeyState,3_2_1000F017

                      System Summary

                      barindex
                      Source: c2A6GRyAwn.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_3_00F90A95 NtSetInformationProcess,VirtualAlloc,wsprintfA,MessageBoxA,ExitProcess,VirtualFree,0_3_00F90A95
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_3_00F90A09 NtQueryInformationProcess,NtQueryInformationProcess,NtSetInformationProcess,VirtualAlloc,wsprintfA,MessageBoxA,ExitProcess,VirtualFree,0_3_00F90A09
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_3_02BF0A95 NtSetInformationProcess,VirtualAlloc,wsprintfA,MessageBoxA,ExitProcess,VirtualFree,3_3_02BF0A95
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_3_02BF0A09 NtQueryInformationProcess,NtQueryInformationProcess,NtSetInformationProcess,VirtualAlloc,wsprintfA,MessageBoxA,ExitProcess,VirtualFree,3_3_02BF0A09
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_3_00BA0A95 NtSetInformationProcess,VirtualAlloc,wsprintfA,MessageBoxA,ExitProcess,VirtualFree,4_3_00BA0A95
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_3_00BA0A09 NtQueryInformationProcess,NtQueryInformationProcess,NtSetInformationProcess,VirtualAlloc,wsprintfA,MessageBoxA,ExitProcess,VirtualFree,4_3_00BA0A09
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_3_033A0A95 NtSetInformationProcess,VirtualAlloc,wsprintfA,MessageBoxA,ExitProcess,VirtualFree,6_3_033A0A95
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_3_033A0A09 NtQueryInformationProcess,NtQueryInformationProcess,NtSetInformationProcess,VirtualAlloc,wsprintfA,MessageBoxA,ExitProcess,VirtualFree,6_3_033A0A09
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_3_00530A95 NtSetInformationProcess,VirtualAlloc,wsprintfA,MessageBoxA,ExitProcess,VirtualFree,7_3_00530A95
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_3_00530A09 NtQueryInformationProcess,NtQueryInformationProcess,NtSetInformationProcess,VirtualAlloc,wsprintfA,MessageBoxA,ExitProcess,VirtualFree,7_3_00530A09
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 14_3_00B10A95 NtSetInformationProcess,VirtualAlloc,wsprintfA,MessageBoxA,ExitProcess,VirtualFree,14_3_00B10A95
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 14_3_00B10A09 NtQueryInformationProcess,NtQueryInformationProcess,NtSetInformationProcess,VirtualAlloc,wsprintfA,MessageBoxA,ExitProcess,VirtualFree,14_3_00B10A09
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_3_030E0A09 NtQueryInformationProcess,NtQueryInformationProcess,NtSetInformationProcess,VirtualAlloc,wsprintfA,MessageBoxA,ExitProcess,VirtualFree,15_3_030E0A09
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_3_030E0A95 NtSetInformationProcess,VirtualAlloc,wsprintfA,MessageBoxA,ExitProcess,VirtualFree,15_3_030E0A95
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 16_3_03200A09 NtQueryInformationProcess,NtQueryInformationProcess,NtSetInformationProcess,VirtualAlloc,wsprintfA,MessageBoxA,ExitProcess,VirtualFree,16_3_03200A09
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 16_3_03200A95 NtSetInformationProcess,VirtualAlloc,wsprintfA,MessageBoxA,ExitProcess,VirtualFree,16_3_03200A95
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_100123C0 LoadLibraryA,GetProcAddress,_memset,_memset,GetCurrentProcess,OpenProcessToken,DuplicateTokenEx,LoadLibraryA,GetProcAddress,SetTokenInformation,CreateProcessAsUserA,CloseHandle,CloseHandle,FreeLibrary,3_2_100123C0
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10010560 ExitWindowsEx,3_2_10010560
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_10010560 ExitWindowsEx,4_2_10010560
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_10010560 ExitWindowsEx,6_2_10010560
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 14_2_10010560 ExitWindowsEx,14_2_10010560
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_10010560 ExitWindowsEx,15_2_10010560
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 16_2_10010560 ExitWindowsEx,16_2_10010560
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_3_00F9000D0_3_00F9000D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_3_02BF000D3_3_02BF000D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_100302963_2_10030296
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1000B3003_2_1000B300
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1000B30B3_2_1000B30B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1002136E3_2_1002136E
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1002A4163_2_1002A416
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_100205803_2_10020580
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1002062D3_2_1002062D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_100036A03_2_100036A0
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_100217A33_2_100217A3
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1002F7B63_2_1002F7B6
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10030A123_2_10030A12
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10020B213_2_10020B21
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10034B303_2_10034B30
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10032BA93_2_10032BA9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1002FD263_2_1002FD26
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1002DE4D3_2_1002DE4D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10020F393_2_10020F39
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_3_00BA000D4_3_00BA000D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_100302964_2_10030296
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_1000B3004_2_1000B300
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_1000B30B4_2_1000B30B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_1002136E4_2_1002136E
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_1002A4164_2_1002A416
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_100205804_2_10020580
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_1002062D4_2_1002062D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_100036A04_2_100036A0
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_100217A34_2_100217A3
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_1002F7B64_2_1002F7B6
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_10030A124_2_10030A12
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_10020B214_2_10020B21
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_10034B304_2_10034B30
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_10032BA94_2_10032BA9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_1002FD264_2_1002FD26
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_1002DE4D4_2_1002DE4D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_10020F394_2_10020F39
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_3_033A000D6_3_033A000D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_100302966_2_10030296
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1000B3006_2_1000B300
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1000B30B6_2_1000B30B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1002136E6_2_1002136E
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1002A4166_2_1002A416
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_100205806_2_10020580
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1002062D6_2_1002062D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_100036A06_2_100036A0
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_100217A36_2_100217A3
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1002F7B66_2_1002F7B6
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_10030A126_2_10030A12
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_10020B216_2_10020B21
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_10034B306_2_10034B30
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_10032BA96_2_10032BA9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1002FD266_2_1002FD26
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1002DE4D6_2_1002DE4D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_10020F396_2_10020F39
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_3_0053000D7_3_0053000D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 14_3_00B1000D14_3_00B1000D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 14_2_1003029614_2_10030296
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 14_2_1000B30014_2_1000B300
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 14_2_1000B30B14_2_1000B30B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 14_2_1002136E14_2_1002136E
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 14_2_1002A41614_2_1002A416
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 14_2_1002058014_2_10020580
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 14_2_1002062D14_2_1002062D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 14_2_100036A014_2_100036A0
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 14_2_100217A314_2_100217A3
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 14_2_1002F7B614_2_1002F7B6
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 14_2_10030A1214_2_10030A12
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 14_2_10020B2114_2_10020B21
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 14_2_10034B3014_2_10034B30
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 14_2_10032BA914_2_10032BA9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 14_2_1002FD2614_2_1002FD26
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 14_2_1002DE4D14_2_1002DE4D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 14_2_10020F3914_2_10020F39
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_3_030E000D15_3_030E000D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_1003029615_2_10030296
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_1000B30015_2_1000B300
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_1000B30B15_2_1000B30B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_1002136E15_2_1002136E
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_1002A41615_2_1002A416
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_1002058015_2_10020580
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_1002062D15_2_1002062D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_100036A015_2_100036A0
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_100217A315_2_100217A3
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_1002F7B615_2_1002F7B6
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_10030A1215_2_10030A12
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_10020B2115_2_10020B21
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_10034B3015_2_10034B30
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_10032BA915_2_10032BA9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_1002FD2615_2_1002FD26
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_1002DE4D15_2_1002DE4D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_10020F3915_2_10020F39
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 16_3_0320000D16_3_0320000D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 16_2_1003029616_2_10030296
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 16_2_1000B30016_2_1000B300
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 16_2_1000B30B16_2_1000B30B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 16_2_1002136E16_2_1002136E
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 16_2_1002A41616_2_1002A416
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 16_2_1002058016_2_10020580
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 16_2_1002062D16_2_1002062D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 16_2_100036A016_2_100036A0
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 16_2_100217A316_2_100217A3
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 16_2_1002F7B616_2_1002F7B6
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 16_2_10030A1216_2_10030A12
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 16_2_10020B2116_2_10020B21
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 16_2_10034B3016_2_10034B30
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 16_2_10032BA916_2_10032BA9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 16_2_1002FD2616_2_1002FD26
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 16_2_1002DE4D16_2_1002DE4D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 16_2_10020F3916_2_10020F39
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 10024850 appears 222 times
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 6C917890 appears 72 times
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 1000E140 appears 54 times
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 10025CA4 appears 72 times
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 10024223 appears 36 times
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 10028155 appears 120 times
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 1002EE60 appears 36 times
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 10025EF4 appears 36 times
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 1001ED99 appears 36 times
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 1000F3B0 appears 36 times
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 1001F13F appears 42 times
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 6C924F40 appears 66 times
                      Source: c2A6GRyAwn.dllStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
                      Source: c2A6GRyAwn.dllStatic PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      Source: classification engineClassification label: mal96.troj.spyw.evad.winDLL@177/0@3/3
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetModuleFileNameA,ExpandEnvironmentStringsA,_strlen,_strncmp,wsprintfA,_strlen,_strlen,CopyFileA,_memset,_strcat,OpenSCManagerA,CreateServiceA,LockServiceDatabase,ChangeServiceConfig2A,ChangeServiceConfig2A,UnlockServiceDatabase,GetLastError,OpenServiceA,StartServiceA,StartServiceA,_strcat,RegOpenKeyA,lstrlenA,RegSetValueExA,3_2_10012550
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetModuleFileNameA,ExpandEnvironmentStringsA,_strlen,_strncmp,wsprintfA,_strlen,_strlen,CopyFileA,_memset,_strcat,OpenSCManagerA,CreateServiceA,LockServiceDatabase,ChangeServiceConfig2A,ChangeServiceConfig2A,UnlockServiceDatabase,GetLastError,OpenServiceA,StartServiceA,StartServiceA,_strcat,RegOpenKeyA,lstrlenA,RegSetValueExA,4_2_10012550
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetModuleFileNameA,ExpandEnvironmentStringsA,_strlen,_strncmp,wsprintfA,_strlen,_strlen,CopyFileA,_memset,_strcat,OpenSCManagerA,CreateServiceA,LockServiceDatabase,ChangeServiceConfig2A,ChangeServiceConfig2A,UnlockServiceDatabase,GetLastError,OpenServiceA,StartServiceA,StartServiceA,_strcat,RegOpenKeyA,lstrlenA,RegSetValueExA,6_2_10012550
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetModuleFileNameA,ExpandEnvironmentStringsA,_strlen,_strncmp,wsprintfA,_strlen,_strlen,CopyFileA,_memset,_strcat,OpenSCManagerA,CreateServiceA,LockServiceDatabase,ChangeServiceConfig2A,ChangeServiceConfig2A,UnlockServiceDatabase,GetLastError,OpenServiceA,StartServiceA,StartServiceA,_strcat,RegOpenKeyA,lstrlenA,RegSetValueExA,14_2_10012550
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetModuleFileNameA,ExpandEnvironmentStringsA,_strlen,_strncmp,wsprintfA,_strlen,_strlen,CopyFileA,_memset,_strcat,OpenSCManagerA,CreateServiceA,LockServiceDatabase,ChangeServiceConfig2A,ChangeServiceConfig2A,UnlockServiceDatabase,GetLastError,OpenServiceA,StartServiceA,StartServiceA,_strcat,RegOpenKeyA,lstrlenA,RegSetValueExA,15_2_10012550
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetModuleFileNameA,ExpandEnvironmentStringsA,_strlen,_strncmp,wsprintfA,_strlen,_strlen,CopyFileA,_memset,_strcat,OpenSCManagerA,CreateServiceA,LockServiceDatabase,ChangeServiceConfig2A,ChangeServiceConfig2A,UnlockServiceDatabase,GetLastError,OpenServiceA,StartServiceA,StartServiceA,_strcat,RegOpenKeyA,lstrlenA,RegSetValueExA,16_2_10012550
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_100152A0 CreateToolhelp32Snapshot,Process32First,Process32Next,lstrcmpiA,3_2_100152A0
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10013A20 run,_memset,swprintf,CreateMutexA,GetLastError,IsUserAnAdmin,ReleaseMutex,_memset,GetModuleFileNameA,_sprintf,DeleteFileA,MoveFileA,_wprintf,StartServiceCtrlDispatcherA,_wprintf,WSAStartup,_wprintf,_strlen,3_2_10013A20
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10013A20 run,_memset,swprintf,CreateMutexA,GetLastError,IsUserAnAdmin,ReleaseMutex,_memset,GetModuleFileNameA,_sprintf,DeleteFileA,MoveFileA,_wprintf,StartServiceCtrlDispatcherA,_wprintf,WSAStartup,_wprintf,_strlen,3_2_10013A20
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_10013A20 run,_memset,swprintf,CreateMutexA,GetLastError,IsUserAnAdmin,ReleaseMutex,_memset,GetModuleFileNameA,_sprintf,DeleteFileA,MoveFileA,_wprintf,StartServiceCtrlDispatcherA,_wprintf,WSAStartup,_wprintf,_strlen,4_2_10013A20
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_10013A20 run,_memset,swprintf,CreateMutexA,GetLastError,IsUserAnAdmin,ReleaseMutex,_memset,GetModuleFileNameA,_sprintf,DeleteFileA,MoveFileA,_wprintf,StartServiceCtrlDispatcherA,_wprintf,WSAStartup,_wprintf,_strlen,6_2_10013A20
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 14_2_10013A20 run,_memset,swprintf,CreateMutexA,GetLastError,IsUserAnAdmin,ReleaseMutex,_memset,GetModuleFileNameA,_sprintf,DeleteFileA,MoveFileA,_wprintf,StartServiceCtrlDispatcherA,_wprintf,WSAStartup,_wprintf,_strlen,14_2_10013A20
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_10013A20 run,_memset,swprintf,CreateMutexA,GetLastError,IsUserAnAdmin,ReleaseMutex,_memset,GetModuleFileNameA,_sprintf,DeleteFileA,MoveFileA,_wprintf,StartServiceCtrlDispatcherA,_wprintf,WSAStartup,_wprintf,_strlen,15_2_10013A20
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 16_2_10013A20 run,_memset,swprintf,CreateMutexA,GetLastError,IsUserAnAdmin,ReleaseMutex,_memset,GetModuleFileNameA,_sprintf,DeleteFileA,MoveFileA,_wprintf,StartServiceCtrlDispatcherA,_wprintf,WSAStartup,_wprintf,_strlen,16_2_10013A20
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6104:120:WilError_03
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1520:120:WilError_03
                      Source: C:\Windows\SysWOW64\rundll32.exeMutant created: \Sessions\1\BaseNamedObjects\206.238.77.142:1111
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1248:120:WilError_03
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6284:120:WilError_03
                      Source: C:\Windows\SysWOW64\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT ProcessorId FROM WIN32_PROCESSOR
                      Source: C:\Windows\SysWOW64\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT ProcessorId FROM WIN32_PROCESSOR
                      Source: C:\Windows\SysWOW64\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT ProcessorId FROM WIN32_PROCESSOR
                      Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\c2A6GRyAwn.dll,cef_add_cross_origin_whitelist_entry
                      Source: c2A6GRyAwn.dllVirustotal: Detection: 12%
                      Source: loaddll32.exeString found in binary or memory: If you use save/load state for MDI tabs, you should override this method in a derived class!
                      Source: loaddll32.exeString found in binary or memory: lIf you use save/load state for MDI tabs, you must override this method in a derived class!
                      Source: rundll32.exeString found in binary or memory: If you use save/load state for MDI tabs, you should override this method in a derived class!
                      Source: rundll32.exeString found in binary or memory: lIf you use save/load state for MDI tabs, you must override this method in a derived class!
                      Source: rundll32.exeString found in binary or memory: If you use save/load state for MDI tabs, you should override this method in a derived class!
                      Source: rundll32.exeString found in binary or memory: lIf you use save/load state for MDI tabs, you must override this method in a derived class!
                      Source: rundll32.exeString found in binary or memory: If you use save/load state for MDI tabs, you should override this method in a derived class!
                      Source: rundll32.exeString found in binary or memory: lIf you use save/load state for MDI tabs, you must override this method in a derived class!
                      Source: rundll32.exeString found in binary or memory: If you use save/load state for MDI tabs, you should override this method in a derived class!
                      Source: rundll32.exeString found in binary or memory: lIf you use save/load state for MDI tabs, you must override this method in a derived class!
                      Source: rundll32.exeString found in binary or memory: If you use save/load state for MDI tabs, you should override this method in a derived class!
                      Source: rundll32.exeString found in binary or memory: lIf you use save/load state for MDI tabs, you must override this method in a derived class!
                      Source: rundll32.exeString found in binary or memory: If you use save/load state for MDI tabs, you should override this method in a derived class!
                      Source: rundll32.exeString found in binary or memory: lIf you use save/load state for MDI tabs, you must override this method in a derived class!
                      Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll"
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",#1
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\c2A6GRyAwn.dll,cef_add_cross_origin_whitelist_entry
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",#1
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\c2A6GRyAwn.dll,cef_add_web_plugin_directory
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\c2A6GRyAwn.dll,cef_add_web_plugin_path
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe wmic cpu get processorid
                      Source: C:\Windows\SysWOW64\wbem\WMIC.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe wmic cpu get processorid
                      Source: C:\Windows\SysWOW64\wbem\WMIC.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe wmic cpu get processorid
                      Source: C:\Windows\SysWOW64\wbem\WMIC.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_add_cross_origin_whitelist_entry
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_add_web_plugin_directory
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_add_web_plugin_path
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",create_context_shared
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_zip_reader_create
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_zip_directory
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_write_json
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_window_create_top_level
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_visit_web_plugin_info
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_value_create
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_v8value_create_undefined
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_v8value_create_uint
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_v8value_create_string
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_v8value_create_object
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_v8value_create_null
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_v8value_create_int
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_v8value_create_function
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_v8value_create_double
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_v8value_create_date
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_v8value_create_bool
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_v8value_create_array_buffer
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_v8value_create_array
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_v8stack_trace_get_current
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_v8context_in_context
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_v8context_get_entered_context
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_v8context_get_current_context
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_urlrequest_create
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_uriencode
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_uridecode
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_unregister_internal_web_plugin
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_time_to_timet
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",#1Jump to behavior
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\c2A6GRyAwn.dll,cef_add_cross_origin_whitelist_entryJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\c2A6GRyAwn.dll,cef_add_web_plugin_directoryJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\c2A6GRyAwn.dll,cef_add_web_plugin_pathJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_add_cross_origin_whitelist_entryJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_add_web_plugin_directoryJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_add_web_plugin_pathJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",create_context_sharedJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_zip_reader_createJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_zip_directoryJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_write_jsonJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_window_create_top_levelJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_visit_web_plugin_infoJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_value_createJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_v8value_create_undefinedJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_v8value_create_uintJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_v8value_create_stringJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_v8value_create_objectJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_v8value_create_nullJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_v8value_create_intJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_v8value_create_functionJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_v8value_create_doubleJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_v8value_create_dateJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_v8value_create_boolJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_v8value_create_array_bufferJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_v8value_create_arrayJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_v8stack_trace_get_currentJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_v8context_in_contextJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_v8context_get_entered_contextJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_v8context_get_current_contextJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_urlrequest_createJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_uriencodeJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_uridecodeJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_unregister_internal_web_pluginJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_time_to_timetJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",#1Jump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe wmic cpu get processoridJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe wmic cpu get processoridJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe wmic cpu get processoridJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeSection loaded: msimg32.dllJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeSection loaded: dwmapi.dllJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeSection loaded: oleacc.dllJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeSection loaded: winmm.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: framedynos.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: msxml6.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: vcruntime140.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: vbscript.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: sxs.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: framedynos.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: msxml6.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: vcruntime140.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: vbscript.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: sxs.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: framedynos.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: msxml6.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: vcruntime140.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: vbscript.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: sxs.dllJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{62BE5D10-60EB-11d0-BD3B-00A0C911CE86}\InprocServer32Jump to behavior
                      Source: Window RecorderWindow detected: More than 3 window changes detected
                      Source: c2A6GRyAwn.dllStatic PE information: More than 159 > 100 exports found
                      Source: c2A6GRyAwn.dllStatic PE information: Virtual size of .text is bigger than: 0x100000
                      Source: c2A6GRyAwn.dllStatic file information: File size 2739712 > 1048576
                      Source: c2A6GRyAwn.dllStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x298400
                      Source: c2A6GRyAwn.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_3_00F90C05 LoadLibraryA,GetProcAddress,0_3_00F90C05
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_100241DC push ecx; ret 3_2_100241EF
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10024895 push ecx; ret 3_2_100248A8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_100241DC push ecx; ret 4_2_100241EF
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_10024895 push ecx; ret 4_2_100248A8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_100241DC push ecx; ret 6_2_100241EF
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_10024895 push ecx; ret 6_2_100248A8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 14_2_100241DC push ecx; ret 14_2_100241EF
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 14_2_10024895 push ecx; ret 14_2_100248A8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_100241DC push ecx; ret 15_2_100241EF
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_10024895 push ecx; ret 15_2_100248A8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 16_2_100241DC push ecx; ret 16_2_100241EF
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 16_2_10024895 push ecx; ret 16_2_100248A8

                      Boot Survival

                      barindex
                      Source: C:\Windows\SysWOW64\rundll32.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Windows UpdateJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10013A20 run,_memset,swprintf,CreateMutexA,GetLastError,IsUserAnAdmin,ReleaseMutex,_memset,GetModuleFileNameA,_sprintf,DeleteFileA,MoveFileA,_wprintf,StartServiceCtrlDispatcherA,_wprintf,WSAStartup,_wprintf,_strlen,3_2_10013A20
                      Source: C:\Windows\SysWOW64\rundll32.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Windows UpdateJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Windows UpdateJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX

                      Malware Analysis System Evasion

                      barindex
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: _memset,_memset,GetModuleFileNameW,StrCpyW,PathRemoveFileSpecW,lstrlenW,_memset,GetEnvironmentVariableW,GetCurrentProcess,EnumProcessModules,_memset,GetModuleFileNameExW,StrStrW,_memset,GetCurrentProcess,SetPriorityClass,GetCurrentThread,SetThreadPriority,CreateProcessW,SetPriorityClass,SetThreadPriority,ResumeThread,GetCurrentProcess,SetPriorityClass,GetCurrentThread,SetThreadPriority,3_2_1000E970
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: _memset,_memset,GetModuleFileNameW,StrCpyW,PathRemoveFileSpecW,lstrlenW,_memset,GetEnvironmentVariableW,GetCurrentProcess,EnumProcessModules,_memset,GetModuleFileNameExW,StrStrW,_memset,GetCurrentProcess,SetPriorityClass,GetCurrentThread,SetThreadPriority,CreateProcessW,SetPriorityClass,SetThreadPriority,ResumeThread,GetCurrentProcess,SetPriorityClass,GetCurrentThread,SetThreadPriority,4_2_1000E970
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: _memset,_memset,GetModuleFileNameW,StrCpyW,PathRemoveFileSpecW,lstrlenW,_memset,GetEnvironmentVariableW,GetCurrentProcess,EnumProcessModules,_memset,GetModuleFileNameExW,StrStrW,_memset,GetCurrentProcess,SetPriorityClass,GetCurrentThread,SetThreadPriority,CreateProcessW,SetPriorityClass,SetThreadPriority,ResumeThread,GetCurrentProcess,SetPriorityClass,GetCurrentThread,SetThreadPriority,6_2_1000E970
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: _memset,_memset,GetModuleFileNameW,StrCpyW,PathRemoveFileSpecW,lstrlenW,_memset,GetEnvironmentVariableW,GetCurrentProcess,EnumProcessModules,_memset,GetModuleFileNameExW,StrStrW,_memset,GetCurrentProcess,SetPriorityClass,GetCurrentThread,SetThreadPriority,CreateProcessW,SetPriorityClass,SetThreadPriority,ResumeThread,GetCurrentProcess,SetPriorityClass,GetCurrentThread,SetThreadPriority,14_2_1000E970
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: _memset,_memset,GetModuleFileNameW,StrCpyW,PathRemoveFileSpecW,lstrlenW,_memset,GetEnvironmentVariableW,GetCurrentProcess,EnumProcessModules,_memset,GetModuleFileNameExW,StrStrW,_memset,GetCurrentProcess,SetPriorityClass,GetCurrentThread,SetThreadPriority,CreateProcessW,SetPriorityClass,SetThreadPriority,ResumeThread,GetCurrentProcess,SetPriorityClass,GetCurrentThread,SetThreadPriority,15_2_1000E970
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: _memset,_memset,GetModuleFileNameW,StrCpyW,PathRemoveFileSpecW,lstrlenW,_memset,GetEnvironmentVariableW,GetCurrentProcess,EnumProcessModules,_memset,GetModuleFileNameExW,StrStrW,_memset,GetCurrentProcess,SetPriorityClass,GetCurrentThread,SetThreadPriority,CreateProcessW,SetPriorityClass,SetThreadPriority,ResumeThread,GetCurrentProcess,SetPriorityClass,GetCurrentThread,SetThreadPriority,16_2_1000E970
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10013080 in eax, dx3_2_10013080
                      Source: C:\Windows\SysWOW64\rundll32.exeCheck user administrative privileges: IsUserAndAdmin, DecisionNodegraph_3-24155
                      Source: C:\Windows\SysWOW64\rundll32.exeSection loaded: OutputDebugStringW count: 204
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1000F2B0 GetCurrentProcessId,CreateToolhelp32Snapshot,Process32First,OpenProcess,TerminateProcess,CloseHandle,Process32Next,CloseHandle,3_2_1000F2B0
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10013000 sgdt fword ptr [esp-02h]3_2_10013000
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10013000 sidt fword ptr [esp-02h]3_2_10013000
                      Source: C:\Windows\SysWOW64\rundll32.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_3-24355
                      Source: C:\Windows\SysWOW64\rundll32.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_3-24540
                      Source: C:\Windows\System32\loaddll32.exeAPI coverage: 0.0 %
                      Source: C:\Windows\SysWOW64\rundll32.exeAPI coverage: 4.3 %
                      Source: C:\Windows\SysWOW64\rundll32.exeAPI coverage: 4.8 %
                      Source: C:\Windows\SysWOW64\rundll32.exeAPI coverage: 4.3 %
                      Source: C:\Windows\SysWOW64\rundll32.exeAPI coverage: 4.3 %
                      Source: C:\Windows\SysWOW64\rundll32.exeAPI coverage: 4.3 %
                      Source: C:\Windows\SysWOW64\rundll32.exeAPI coverage: 4.4 %
                      Source: C:\Windows\SysWOW64\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT ProcessorId FROM WIN32_PROCESSOR
                      Source: C:\Windows\SysWOW64\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT ProcessorId FROM WIN32_PROCESSOR
                      Source: C:\Windows\SysWOW64\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT ProcessorId FROM WIN32_PROCESSOR
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10005CA0 GetModuleHandleA,GetProcAddress,GetLastError,GetLastError,_free,_malloc,_free,GetSystemInfo,_perror,3_2_10005CA0
                      Source: rundll32.exe, 00000003.00000003.3044035048.000000000300C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllt4@
                      Source: rundll32.exe, 00000006.00000003.3052110964.00000000033EF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll.7
                      Source: rundll32.exe, 00000016.00000003.3039967374.0000000000A6D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll)7
                      Source: rundll32.exe, 0000000F.00000002.3007386998.0000000003221000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.3005946313.000000000321E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll~7I%I
                      Source: rundll32.exe, 00000010.00000003.2995072880.000000000324D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000019.00000003.3034069524.00000000032BD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001A.00000003.3026712557.000000000315D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001B.00000003.3004956795.000000000077D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001C.00000003.3034864840.000000000323D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001F.00000003.2998052313.0000000000ACD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000020.00000003.3038893460.000000000051D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000003.3040012987.0000000000ADD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll'7
                      Source: rundll32.exe, 00000004.00000003.3006496639.00000000008DD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.3009331648.000000000069C000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.3034066510.0000000002D9D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000012.00000003.2992474707.00000000007AD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000003.3007675326.0000000000A2C000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000014.00000003.2994978530.000000000338C000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000015.00000003.3040523364.0000000002EEF000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000003.3040728622.000000000093C000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000018.00000003.3034292265.00000000009CF000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001D.00000003.3040619974.00000000031DD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000003.3011842238.00000000007AF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: C:\Windows\SysWOW64\wbem\WMIC.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6C917EA0 IsDebuggerPresent,0_2_6C917EA0
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6C9297C0 RtlEncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryW,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,IsDebuggerPresent,OutputDebugStringW,RtlDecodePointer,CreateThread,WaitForSingleObjectEx,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,3_2_6C9297C0
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1000F2B0 GetCurrentProcessId,CreateToolhelp32Snapshot,Process32First,OpenProcess,TerminateProcess,CloseHandle,Process32Next,CloseHandle,3_2_1000F2B0
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_3_00F90C05 LoadLibraryA,GetProcAddress,0_3_00F90C05
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_100143E0 FreeLibrary,_free,VirtualFree,GetProcessHeap,HeapFree,3_2_100143E0
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6C925420 SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_6C925420
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6C925420 SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_6C925420
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10028206 SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_10028206
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_6C925420 SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_6C925420
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_10028206 SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_10028206
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_6C925420 SetUnhandledExceptionFilter,UnhandledExceptionFilter,6_2_6C925420
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_10028206 SetUnhandledExceptionFilter,UnhandledExceptionFilter,6_2_10028206
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 14_2_6C925420 SetUnhandledExceptionFilter,UnhandledExceptionFilter,14_2_6C925420
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 14_2_10028206 SetUnhandledExceptionFilter,UnhandledExceptionFilter,14_2_10028206
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_6C925420 SetUnhandledExceptionFilter,UnhandledExceptionFilter,15_2_6C925420
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_10028206 SetUnhandledExceptionFilter,UnhandledExceptionFilter,15_2_10028206
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 16_2_6C925420 SetUnhandledExceptionFilter,UnhandledExceptionFilter,16_2_6C925420
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 16_2_10028206 SetUnhandledExceptionFilter,UnhandledExceptionFilter,16_2_10028206

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 122.226.191.212 80Jump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 104.21.42.47 80Jump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 206.238.77.142 2222Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",#1Jump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe wmic cpu get processoridJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe wmic cpu get processoridJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe wmic cpu get processoridJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
                      Source: rundll32.exeBinary or memory string: Shell_TrayWnd
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10025930 cpuid 3_2_10025930
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1002A1A0 GetSystemTimeAsFileTime,GetCurrentThreadId,GetTickCount64,QueryPerformanceCounter,3_2_1002A1A0
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1002D09F __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,3_2_1002D09F
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10012A90 _memset,GetVersionExA,_memmove,InternetGetConnectedState,_strlen,_Func_class,3_2_10012A90
                      Source: C:\Windows\SysWOW64\rundll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 18.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 37.2.rundll32.exe.6c9c33e0.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 37.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.6c9c33e0.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 25.2.rundll32.exe.6c9c33e0.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 41.2.rundll32.exe.6c9c33e0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 19.2.rundll32.exe.6c9c33e0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 22.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 29.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 44.2.rundll32.exe.6c9c33e0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 15.2.rundll32.exe.6c9c33e0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.rundll32.exe.6c9c33e0.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 28.2.rundll32.exe.6c9c33e0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 35.2.rundll32.exe.6c9c33e0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 34.2.rundll32.exe.6c9c33e0.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 34.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 27.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 33.2.rundll32.exe.6c9c33e0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 33.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 29.2.rundll32.exe.6c9c33e0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 20.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 17.2.rundll32.exe.6c9c33e0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 24.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 34.2.rundll32.exe.6c9c33e0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 31.2.rundll32.exe.6c9c33e0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 41.2.rundll32.exe.6c9c33e0.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 38.2.rundll32.exe.6c9c33e0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 29.2.rundll32.exe.6c9c33e0.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.6c9c33e0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 35.2.rundll32.exe.6c9c33e0.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 40.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 32.2.rundll32.exe.6c9c33e0.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 43.2.rundll32.exe.6c9c33e0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 23.2.rundll32.exe.6c9c33e0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 25.2.rundll32.exe.6c9c33e0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 37.2.rundll32.exe.6c9c33e0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 39.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 23.2.rundll32.exe.6c9c33e0.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 21.2.rundll32.exe.6c9c33e0.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 36.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 22.2.rundll32.exe.6c9c33e0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 22.2.rundll32.exe.6c9c33e0.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 33.2.rundll32.exe.6c9c33e0.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 24.2.rundll32.exe.6c9c33e0.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 43.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 15.2.rundll32.exe.6c9c33e0.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 16.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 32.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 17.2.rundll32.exe.6c9c33e0.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 18.2.rundll32.exe.6c9c33e0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 40.2.rundll32.exe.6c9c33e0.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 31.2.rundll32.exe.6c9c33e0.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 44.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 27.2.rundll32.exe.6c9c33e0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 30.2.rundll32.exe.6c9c33e0.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 38.2.rundll32.exe.6c9c33e0.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 44.2.rundll32.exe.6c9c33e0.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 23.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 42.2.rundll32.exe.6c9c33e0.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.6c9c33e0.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 30.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 17.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 19.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 18.2.rundll32.exe.6c9c33e0.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 26.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 38.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 26.2.rundll32.exe.6c9c33e0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 43.2.rundll32.exe.6c9c33e0.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 20.2.rundll32.exe.6c9c33e0.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 21.2.rundll32.exe.6c9c33e0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 16.2.rundll32.exe.6c9c33e0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.6c9c33e0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 20.2.rundll32.exe.6c9c33e0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 42.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 19.2.rundll32.exe.6c9c33e0.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 28.2.rundll32.exe.6c9c33e0.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 35.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 30.2.rundll32.exe.6c9c33e0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.6c9c33e0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 39.2.rundll32.exe.6c9c33e0.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 36.2.rundll32.exe.6c9c33e0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 21.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 32.2.rundll32.exe.6c9c33e0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 41.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 27.2.rundll32.exe.6c9c33e0.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 31.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 28.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 25.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 26.2.rundll32.exe.6c9c33e0.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.6c9c33e0.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.rundll32.exe.6c9c33e0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 24.2.rundll32.exe.6c9c33e0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 39.2.rundll32.exe.6c9c33e0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 16.2.rundll32.exe.6c9c33e0.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 36.2.rundll32.exe.6c9c33e0.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 15.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 42.2.rundll32.exe.6c9c33e0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 40.2.rundll32.exe.6c9c33e0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000023.00000002.3043543087.0000000010037000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000012.00000002.2994205386.0000000010037000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000013.00000002.3010385963.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000025.00000002.3036735360.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000002C.00000002.3045359153.0000000010037000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000015.00000002.3048776239.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000018.00000002.3041645495.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000001A.00000002.3028669862.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000028.00000002.3039825345.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000001B.00000002.3018050041.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000001E.00000002.3014122900.0000000010037000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000001D.00000002.3046146995.0000000010037000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000014.00000002.2997697072.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000021.00000002.3049295552.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000014.00000002.2996930195.0000000010037000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000002B.00000002.3037447093.0000000010037000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000026.00000002.3043646710.0000000010037000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000022.00000002.3014901718.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000015.00000002.3045928626.0000000010037000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000002B.00000002.3037998868.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000002.3008220827.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000011.00000002.3038214334.0000000010037000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000026.00000002.3045848548.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000002.3007932543.0000000010037000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000016.00000002.3049878489.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000001B.00000002.3016390156.0000000010037000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000010.00000002.3016124444.0000000010037000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000025.00000002.3034740174.0000000010037000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000002C.00000002.3047979874.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000001C.00000002.3036458003.0000000010037000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.3052963500.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000020.00000002.3045577027.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000001F.00000002.3017796393.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000017.00000002.3047870662.0000000010037000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000001C.00000002.3036956799.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000001A.00000002.3028319982.0000000010037000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000023.00000002.3045748192.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000001F.00000002.3016249210.0000000010037000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000027.00000002.3043643127.0000000010037000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000021.00000002.3046734441.0000000010037000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000002A.00000002.3051527334.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000001D.00000002.3048956174.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000020.00000002.3043417699.0000000010037000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000002.3013317433.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000012.00000002.2994516394.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000024.00000002.3045374022.0000000010037000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000029.00000002.3028907198.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000010.00000002.3017577594.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.3008266392.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000002.3012409035.0000000010037000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.3054985603.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000029.00000002.3028489885.0000000010037000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000024.00000002.3047877855.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000016.00000002.3047426962.0000000010037000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000002A.00000002.3048737599.0000000010037000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000022.00000002.3014058075.0000000010037000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000028.00000002.3036392206.0000000010037000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000018.00000002.3039178109.0000000010037000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000001E.00000002.3015022254.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000027.00000002.3045790077.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000017.00000002.3050280645.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000019.00000002.3036054251.0000000010037000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000013.00000002.3010015146.0000000010037000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000011.00000002.3040921469.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000019.00000002.3036809299.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: 18.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 37.2.rundll32.exe.6c9c33e0.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 37.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.6c9c33e0.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 25.2.rundll32.exe.6c9c33e0.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 41.2.rundll32.exe.6c9c33e0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 19.2.rundll32.exe.6c9c33e0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 22.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 29.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 44.2.rundll32.exe.6c9c33e0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 15.2.rundll32.exe.6c9c33e0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.rundll32.exe.6c9c33e0.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 28.2.rundll32.exe.6c9c33e0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 35.2.rundll32.exe.6c9c33e0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 34.2.rundll32.exe.6c9c33e0.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 34.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 27.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 33.2.rundll32.exe.6c9c33e0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 33.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 29.2.rundll32.exe.6c9c33e0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 20.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 17.2.rundll32.exe.6c9c33e0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 24.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 34.2.rundll32.exe.6c9c33e0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 31.2.rundll32.exe.6c9c33e0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 41.2.rundll32.exe.6c9c33e0.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 38.2.rundll32.exe.6c9c33e0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 29.2.rundll32.exe.6c9c33e0.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.6c9c33e0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 35.2.rundll32.exe.6c9c33e0.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 40.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 32.2.rundll32.exe.6c9c33e0.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 43.2.rundll32.exe.6c9c33e0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 23.2.rundll32.exe.6c9c33e0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 25.2.rundll32.exe.6c9c33e0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 37.2.rundll32.exe.6c9c33e0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 39.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 23.2.rundll32.exe.6c9c33e0.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 21.2.rundll32.exe.6c9c33e0.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 36.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 22.2.rundll32.exe.6c9c33e0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 22.2.rundll32.exe.6c9c33e0.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 33.2.rundll32.exe.6c9c33e0.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 24.2.rundll32.exe.6c9c33e0.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 43.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 15.2.rundll32.exe.6c9c33e0.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 16.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 32.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 17.2.rundll32.exe.6c9c33e0.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 18.2.rundll32.exe.6c9c33e0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 40.2.rundll32.exe.6c9c33e0.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 31.2.rundll32.exe.6c9c33e0.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 44.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 27.2.rundll32.exe.6c9c33e0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 30.2.rundll32.exe.6c9c33e0.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 38.2.rundll32.exe.6c9c33e0.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 44.2.rundll32.exe.6c9c33e0.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 23.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 42.2.rundll32.exe.6c9c33e0.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.6c9c33e0.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 30.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 17.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 19.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 18.2.rundll32.exe.6c9c33e0.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 26.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 38.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 26.2.rundll32.exe.6c9c33e0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 43.2.rundll32.exe.6c9c33e0.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 20.2.rundll32.exe.6c9c33e0.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 21.2.rundll32.exe.6c9c33e0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 16.2.rundll32.exe.6c9c33e0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.6c9c33e0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 20.2.rundll32.exe.6c9c33e0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 42.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 19.2.rundll32.exe.6c9c33e0.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 28.2.rundll32.exe.6c9c33e0.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 35.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 30.2.rundll32.exe.6c9c33e0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.6c9c33e0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 39.2.rundll32.exe.6c9c33e0.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 36.2.rundll32.exe.6c9c33e0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 21.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 32.2.rundll32.exe.6c9c33e0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 41.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 27.2.rundll32.exe.6c9c33e0.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 31.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 28.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 25.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 26.2.rundll32.exe.6c9c33e0.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.6c9c33e0.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.rundll32.exe.6c9c33e0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 24.2.rundll32.exe.6c9c33e0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 39.2.rundll32.exe.6c9c33e0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 16.2.rundll32.exe.6c9c33e0.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 36.2.rundll32.exe.6c9c33e0.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 15.2.rundll32.exe.10000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 42.2.rundll32.exe.6c9c33e0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 40.2.rundll32.exe.6c9c33e0.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000023.00000002.3043543087.0000000010037000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000012.00000002.2994205386.0000000010037000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000013.00000002.3010385963.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000025.00000002.3036735360.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000002C.00000002.3045359153.0000000010037000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000015.00000002.3048776239.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000018.00000002.3041645495.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000001A.00000002.3028669862.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000028.00000002.3039825345.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000001B.00000002.3018050041.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000001E.00000002.3014122900.0000000010037000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000001D.00000002.3046146995.0000000010037000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000014.00000002.2997697072.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000021.00000002.3049295552.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000014.00000002.2996930195.0000000010037000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000002B.00000002.3037447093.0000000010037000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000026.00000002.3043646710.0000000010037000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000022.00000002.3014901718.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000015.00000002.3045928626.0000000010037000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000002B.00000002.3037998868.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000002.3008220827.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000011.00000002.3038214334.0000000010037000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000026.00000002.3045848548.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000002.3007932543.0000000010037000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000016.00000002.3049878489.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000001B.00000002.3016390156.0000000010037000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000010.00000002.3016124444.0000000010037000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000025.00000002.3034740174.0000000010037000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000002C.00000002.3047979874.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000001C.00000002.3036458003.0000000010037000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.3052963500.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000020.00000002.3045577027.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000001F.00000002.3017796393.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000017.00000002.3047870662.0000000010037000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000001C.00000002.3036956799.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000001A.00000002.3028319982.0000000010037000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000023.00000002.3045748192.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000001F.00000002.3016249210.0000000010037000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000027.00000002.3043643127.0000000010037000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000021.00000002.3046734441.0000000010037000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000002A.00000002.3051527334.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000001D.00000002.3048956174.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000020.00000002.3043417699.0000000010037000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000002.3013317433.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000012.00000002.2994516394.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000024.00000002.3045374022.0000000010037000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000029.00000002.3028907198.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000010.00000002.3017577594.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.3008266392.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000002.3012409035.0000000010037000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.3054985603.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000029.00000002.3028489885.0000000010037000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000024.00000002.3047877855.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000016.00000002.3047426962.0000000010037000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000002A.00000002.3048737599.0000000010037000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000022.00000002.3014058075.0000000010037000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000028.00000002.3036392206.0000000010037000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000018.00000002.3039178109.0000000010037000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000001E.00000002.3015022254.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000027.00000002.3045790077.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000017.00000002.3050280645.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000019.00000002.3036054251.0000000010037000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000013.00000002.3010015146.0000000010037000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000011.00000002.3040921469.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000019.00000002.3036809299.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1001C580 WSAGetLastError,socket,htons,bind,WSAGetLastError,3_2_1001C580
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1001DBF0 socket,bind,WSAGetLastError,SetLastError,WSAGetLastError,SetLastError,WSAGetLastError,SetLastError,3_2_1001DBF0
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_1001C580 WSAGetLastError,socket,htons,bind,WSAGetLastError,4_2_1001C580
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_1001DBF0 socket,bind,WSAGetLastError,SetLastError,WSAGetLastError,SetLastError,WSAGetLastError,SetLastError,4_2_1001DBF0
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1001C580 WSAGetLastError,socket,htons,bind,WSAGetLastError,6_2_1001C580
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1001DBF0 socket,bind,WSAGetLastError,SetLastError,WSAGetLastError,SetLastError,WSAGetLastError,SetLastError,6_2_1001DBF0
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 14_2_1001C580 WSAGetLastError,socket,htons,bind,WSAGetLastError,14_2_1001C580
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 14_2_1001DBF0 socket,bind,WSAGetLastError,SetLastError,WSAGetLastError,SetLastError,WSAGetLastError,SetLastError,14_2_1001DBF0
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_1001C580 WSAGetLastError,socket,htons,bind,WSAGetLastError,15_2_1001C580
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_1001DBF0 socket,bind,WSAGetLastError,SetLastError,WSAGetLastError,SetLastError,WSAGetLastError,SetLastError,15_2_1001DBF0
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 16_2_1001C580 WSAGetLastError,socket,htons,bind,WSAGetLastError,16_2_1001C580
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 16_2_1001DBF0 socket,bind,WSAGetLastError,SetLastError,WSAGetLastError,SetLastError,WSAGetLastError,SetLastError,16_2_1001DBF0
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire Infrastructure1
                      Valid Accounts
                      11
                      Windows Management Instrumentation
                      1
                      DLL Side-Loading
                      1
                      DLL Side-Loading
                      1
                      Deobfuscate/Decode Files or Information
                      111
                      Input Capture
                      2
                      System Time Discovery
                      Remote Services1
                      Archive Collected Data
                      2
                      Ingress Tool Transfer
                      Exfiltration Over Other Network Medium1
                      System Shutdown/Reboot
                      CredentialsDomainsDefault Accounts13
                      Native API
                      1
                      Valid Accounts
                      1
                      Valid Accounts
                      2
                      Obfuscated Files or Information
                      LSASS Memory1
                      Account Discovery
                      Remote Desktop Protocol111
                      Input Capture
                      2
                      Encrypted Channel
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain Accounts2
                      Command and Scripting Interpreter
                      4
                      Windows Service
                      1
                      Access Token Manipulation
                      1
                      DLL Side-Loading
                      Security Account Manager16
                      System Information Discovery
                      SMB/Windows Admin SharesData from Network Shared Drive1
                      Non-Standard Port
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal Accounts2
                      Service Execution
                      11
                      Registry Run Keys / Startup Folder
                      4
                      Windows Service
                      1
                      Valid Accounts
                      NTDS151
                      Security Software Discovery
                      Distributed Component Object ModelInput Capture2
                      Non-Application Layer Protocol
                      Traffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script112
                      Process Injection
                      1
                      Access Token Manipulation
                      LSA Secrets23
                      Virtualization/Sandbox Evasion
                      SSHKeylogging2
                      Application Layer Protocol
                      Scheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts11
                      Registry Run Keys / Startup Folder
                      23
                      Virtualization/Sandbox Evasion
                      Cached Domain Credentials3
                      Process Discovery
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items112
                      Process Injection
                      DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                      Rundll32
                      Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1578032 Sample: c2A6GRyAwn.dll Startdate: 19/12/2024 Architecture: WINDOWS Score: 96 36 4.tcpdump.cn 2->36 38 286f37a9.ifconfig.cc.cname.hcnamedns.com 2->38 40 2 other IPs or domains 2->40 48 Multi AV Scanner detection for submitted file 2->48 50 Yara detected Nitol 2->50 52 PE file has a writeable .text section 2->52 54 AI detected suspicious sample 2->54 10 loaddll32.exe 1 2->10         started        signatures3 process4 process5 12 rundll32.exe 10->12         started        15 rundll32.exe 2 10->15         started        18 cmd.exe 1 10->18         started        20 33 other processes 10->20 dnsIp6 56 Contains functionality to detect virtual machines (IN, VMware) 12->56 58 Contains functionality to capture and log keystrokes 12->58 60 Tries to delay execution (extensive OutputDebugStringW loop) 12->60 66 2 other signatures 12->66 22 WMIC.exe 1 12->22         started        42 206.238.77.142, 1111, 2222, 49757 COGENT-174US United States 15->42 44 4.tcpdump.cn 104.21.42.47, 49771, 49772, 49947 CLOUDFLARENETUS United States 15->44 46 286f37a9.ifconfig.cc.cname.hcnamedns.com 122.226.191.212, 49931, 80 CHINATELECOM-ZHEJIANG-JINHUA-IDCJINHUAZHEJIANGProvince China 15->46 62 System process connects to network (likely due to code injection or exploit) 15->62 64 Creates an autostart registry key pointing to binary in C:\Windows 15->64 24 rundll32.exe 18->24         started        26 WMIC.exe 1 20->26         started        signatures7 process8 process9 28 conhost.exe 22->28         started        30 WMIC.exe 1 24->30         started        32 conhost.exe 26->32         started        process10 34 conhost.exe 30->34         started       

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      c2A6GRyAwn.dll12%VirustotalBrowse
                      c2A6GRyAwn.dll11%ReversingLabsWin32.Backdoor.GhostRAT
                      No Antivirus matches
                      No Antivirus matches
                      No Antivirus matches
                      No Antivirus matches
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      286f37a9.ifconfig.cc.cname.hcnamedns.com
                      122.226.191.212
                      truetrue
                        unknown
                        4.tcpdump.cn
                        104.21.42.47
                        truetrue
                          unknown
                          ifconfig.cc
                          unknown
                          unknownfalse
                            unknown
                            4.ipw.cn
                            unknown
                            unknownfalse
                              high
                              NameSourceMaliciousAntivirus DetectionReputation
                              http://4.ipw.cn/Xrundll32.exe, 00000007.00000003.3130524926.00000000007EE000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                http://4.ipw.cn/rundll32.exe, 00000007.00000003.3130524926.00000000007F4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.3165789414.00000000007F4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.3165789414.00000000007EF000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  • No. of IPs < 25%
                                  • 25% < No. of IPs < 50%
                                  • 50% < No. of IPs < 75%
                                  • 75% < No. of IPs
                                  IPDomainCountryFlagASNASN NameMalicious
                                  122.226.191.212
                                  286f37a9.ifconfig.cc.cname.hcnamedns.comChina
                                  136190CHINATELECOM-ZHEJIANG-JINHUA-IDCJINHUAZHEJIANGProvincetrue
                                  104.21.42.47
                                  4.tcpdump.cnUnited States
                                  13335CLOUDFLARENETUStrue
                                  206.238.77.142
                                  unknownUnited States
                                  174COGENT-174UStrue
                                  Joe Sandbox version:41.0.0 Charoite
                                  Analysis ID:1578032
                                  Start date and time:2024-12-19 08:07:30 +01:00
                                  Joe Sandbox product:CloudBasic
                                  Overall analysis duration:0h 11m 24s
                                  Hypervisor based Inspection enabled:false
                                  Report type:full
                                  Cookbook file name:default.jbs
                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                  Run name:Run with higher sleep bypass
                                  Number of analysed new started processes analysed:45
                                  Number of new started drivers analysed:0
                                  Number of existing processes analysed:0
                                  Number of existing drivers analysed:0
                                  Number of injected processes analysed:0
                                  Technologies:
                                  • HCA enabled
                                  • EGA enabled
                                  • AMSI enabled
                                  Analysis Mode:default
                                  Analysis stop reason:Timeout
                                  Sample name:c2A6GRyAwn.dll
                                  renamed because original name is a hash value
                                  Original Sample Name:c25a973f8b0a24249c6e6894cef4d6b7.dll
                                  Detection:MAL
                                  Classification:mal96.troj.spyw.evad.winDLL@177/0@3/3
                                  EGA Information:
                                  • Successful, ratio: 87.5%
                                  HCA Information:Failed
                                  Cookbook Comments:
                                  • Found application associated with file extension: .dll
                                  • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                                  • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
                                  • Exclude process from analysis (whitelisted): dllhost.exe
                                  • Excluded IPs from analysis (whitelisted): 13.107.246.63, 52.149.20.212
                                  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                  • Execution Graph export aborted for target rundll32.exe, PID 1784 because there are no executed function
                                  • Not all processes where analyzed, report is missing behavior information
                                  • Report creation exceeded maximum time and may have missing disassembly code information.
                                  • Report size exceeded maximum capacity and may have missing behavior information.
                                  • Report size exceeded maximum capacity and may have missing disassembly code.
                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                  TimeTypeDescription
                                  08:09:55AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Windows Update C:\Windows\SysWOW64\rundll32.exe
                                  08:10:03AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Windows Update C:\Windows\SysWOW64\rundll32.exe
                                  No context
                                  No context
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  COGENT-174UScbr.x86.elfGet hashmaliciousMiraiBrowse
                                  • 38.216.164.43
                                  1.elfGet hashmaliciousUnknownBrowse
                                  • 38.34.236.55
                                  x86_32.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                  • 45.91.72.30
                                  sh4.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                  • 205.164.69.77
                                  la.bot.mips.elfGet hashmaliciousMiraiBrowse
                                  • 204.240.144.106
                                  la.bot.arm7.elfGet hashmaliciousMiraiBrowse
                                  • 128.145.188.164
                                  la.bot.sparc.elfGet hashmaliciousMiraiBrowse
                                  • 38.142.152.76
                                  la.bot.arm.elfGet hashmaliciousMiraiBrowse
                                  • 38.149.253.245
                                  la.bot.sh4.elfGet hashmaliciousMiraiBrowse
                                  • 38.27.48.136
                                  CLOUDFLARENETUSscript.htaGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                  • 104.26.12.205
                                  AWrVzd6XpC.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, Stealc, VidarBrowse
                                  • 172.67.209.202
                                  Brooming.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                  • 104.21.86.72
                                  469oyXQbRY.exeGet hashmaliciousLummaCBrowse
                                  • 172.67.179.109
                                  file.exeGet hashmaliciousAmadey, LummaC Stealer, PureLog Stealer, RHADAMANTHYSBrowse
                                  • 104.21.64.80
                                  file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, RHADAMANTHYS, XmrigBrowse
                                  • 104.21.67.146
                                  1.elfGet hashmaliciousUnknownBrowse
                                  • 141.101.96.239
                                  file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, Cryptbot, LummaC Stealer, PureLog Stealer, StealcBrowse
                                  • 104.21.12.88
                                  https://d2kjcgrb1q4xt7.cloudfront.net/mULiCoBDj2Ug.exeGet hashmaliciousUnknownBrowse
                                  • 172.67.26.92
                                  CHINATELECOM-ZHEJIANG-JINHUA-IDCJINHUAZHEJIANGProvincela.bot.arm6.elfGet hashmaliciousMiraiBrowse
                                  • 183.134.25.181
                                  armv5l.elfGet hashmaliciousMiraiBrowse
                                  • 60.163.150.174
                                  loligang.mpsl.elfGet hashmaliciousMiraiBrowse
                                  • 183.131.125.190
                                  sora.m68k.elfGet hashmaliciousMiraiBrowse
                                  • 61.174.250.26
                                  jew.mpsl.elfGet hashmaliciousUnknownBrowse
                                  • 122.226.226.205
                                  x86_64.elfGet hashmaliciousMiraiBrowse
                                  • 115.238.214.3
                                  mpsl.elfGet hashmaliciousMiraiBrowse
                                  • 183.146.28.4
                                  file.exeGet hashmaliciousUnknownBrowse
                                  • 60.191.236.246
                                  file.exeGet hashmaliciousUnknownBrowse
                                  • 60.191.236.246
                                  nklarm.elfGet hashmaliciousUnknownBrowse
                                  • 115.231.144.11
                                  No context
                                  No context
                                  No created / dropped files found
                                  File type:PE32 executable (DLL) (console) Intel 80386, for MS Windows, PECompact2 compressed
                                  Entropy (8bit):7.999295905537857
                                  TrID:
                                  • Win32 Dynamic Link Library (generic) (1002004/3) 90.54%
                                  • Win32 EXE PECompact compressed (v2.x) (59071/9) 5.34%
                                  • Win32 EXE PECompact compressed (generic) (41571/9) 3.76%
                                  • Generic Win/DOS Executable (2004/3) 0.18%
                                  • DOS Executable Generic (2002/1) 0.18%
                                  File name:c2A6GRyAwn.dll
                                  File size:2'739'712 bytes
                                  MD5:c25a973f8b0a24249c6e6894cef4d6b7
                                  SHA1:ca709195fdae41296ce26a31f710f3d9a7495a8f
                                  SHA256:e5024fae6c595676b50f0a9b8ab6a3ccd0a9b36a069c5a3746ad07d73ef6cfb8
                                  SHA512:60fa67697707027555a96e1ae0e0a3b54284b7f9f989db5222ff2caf6f5d9798d43021af236abce848c507525f92fe861adbf8ae4adffe8aa0c60679a68165ea
                                  SSDEEP:49152:zp1hs0Y3clbb+0Mv8nFmTfazEVT84+gVSJ5QzKXVmOnVuSQ55QXvZB5OC:j+9slFBJgl8Ng8JKzKcOnV/Q0fZB3
                                  TLSH:45C53375587006CCFEBDBA3391E2DAEB7648623436F033610D9E207D91AD09B6AD9137
                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........"..]C.X]C.X]C.X.4=X\C.X..MXpC.X..NX.C.X..OX.B.X.4<XUC.X.4>XYC.X]C.X.@.X.49XxC.Xz.OX^C.Xz.JX\C.Xz.IX\C.X]C.X\C.Xz.LX\C.XRich]C.
                                  Icon Hash:7ae282899bbab082
                                  Entrypoint:0x10294020
                                  Entrypoint Section:.text
                                  Digitally signed:false
                                  Imagebase:0x10000000
                                  Subsystem:windows cui
                                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
                                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT
                                  Time Stamp:0x669E40E9 [Mon Jul 22 11:22:17 2024 UTC]
                                  TLS Callbacks:
                                  CLR (.Net) Version:
                                  OS Version Major:6
                                  OS Version Minor:0
                                  File Version Major:6
                                  File Version Minor:0
                                  Subsystem Version Major:6
                                  Subsystem Version Minor:0
                                  Import Hash:6d967b24540c0dcbca853710eddbda14
                                  Instruction
                                  mov eax, 105D7E64h
                                  push eax
                                  push dword ptr fs:[00000000h]
                                  mov dword ptr fs:[00000000h], esp
                                  xor eax, eax
                                  mov dword ptr [eax], ecx
                                  push eax
                                  inc ebp
                                  inc ebx
                                  outsd
                                  insd
                                  jo 00007FF2C4CF5BE3h
                                  arpl word ptr [edx+esi+00h], si
                                  cmp byte ptr [ecx-06h], bh
                                  cdq
                                  movsd
                                  adc eax, 4F1F2EC4h
                                  outsb
                                  stosd
                                  sbb dl, byte ptr [eax-7Ah]
                                  dec esi
                                  xor cl, byte ptr [edx+1559A0ACh]
                                  pop ebp
                                  fbstp [eax+ebp+2122F65Fh]
                                  int3
                                  dec edi
                                  or ebp, dword ptr [esi+35h]
                                  cmp byte ptr [ebx-2D075677h], 00000065h
                                  out dx, eax
                                  fbstp [esi-69h]
                                  cli
                                  idiv ah
                                  movsb
                                  add dword ptr [ebx], edi
                                  out dx, eax
                                  out DDh, al
                                  inc ebx
                                  test dword ptr [ebx], 9D6BD962h
                                  daa
                                  pop eax
                                  scasb
                                  and ecx, dword ptr [edx-0Dh]
                                  aaa
                                  xlatb
                                  or eax, 1A6ABD03h
                                  sbb ch, byte ptr fs:[edi+31h]
                                  aad 22h
                                  ret
                                  fdiv dword ptr [ebp-1AA3D25Bh]
                                  pop ebx
                                  cld
                                  cmp al, FDh
                                  pop ebx
                                  push 9D8C9189h
                                  salc
                                  xor esi, esi
                                  cmp edi, ecx
                                  mov edi, 1AF185CAh
                                  mov dh, 48h
                                  sbb ch, byte ptr [0D1D4AC3h]
                                  jne 00007FF2C4CF5B77h
                                  dec ecx
                                  add dword ptr [edi+11BE5BBDh], edx
                                  insb
                                  fidiv dword ptr [edi]
                                  salc
                                  Programming Language:
                                  • [C++] VS2012 build 50727
                                  • [EXP] VS2012 build 50727
                                  • [RES] VS2012 build 50727
                                  • [LNK] VS2012 build 50727
                                  NameVirtual AddressVirtual Size Is in Section
                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x5d52e00x15e8.rsrc
                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x5d6e0c0x3fd.rsrc
                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x5d50000x2d8.rsrc
                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x5da0000x1c.reloc
                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x5d7f400x48.rsrc
                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                  .text0x10000x5d40000x298400033e1e609069d5aac750cc1aa80706f0unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  .rsrc0x5d50000x50000x4400d27e0c21185a9df30d3e51625b8551c9False0.58984375data6.4035865241497865IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  .reloc0x5da0000x2000x20022e3743c4cd7d5f6adb4c28c88c50b84False0.07421875data0.31780982431271465IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                  RT_RIBBON_XML0x5390000x381emptyChineseChina0
                                  RT_CURSOR0x5393880x134emptyChineseChina0
                                  RT_GROUP_CURSOR0x5394c00x14emptyChineseChina0
                                  RT_MANIFEST0x5d51500x188XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5892857142857143
                                  DLLImport
                                  kernel32.dllLoadLibraryA, GetProcAddress, VirtualAlloc, VirtualFree
                                  MSIMG32.dllAlphaBlend
                                  SHLWAPI.dllPathStripToRootA
                                  UxTheme.dllOpenThemeData
                                  dwmapi.dllDwmDefWindowProc
                                  OLEACC.dllCreateStdAccessibleObject
                                  gdiplus.dllGdipDeleteGraphics
                                  IMM32.dllImmGetContext
                                  WINMM.dllPlaySoundA
                                  USER32.dllMessageBeep
                                  GDI32.dllBitBlt
                                  WINSPOOL.DRVClosePrinter
                                  ADVAPI32.dllRegCloseKey
                                  SHELL32.dllDragQueryFileA
                                  ole32.dllOleLockRunning
                                  OLEAUT32.dllVariantClear
                                  NameOrdinalAddress
                                  cef_add_cross_origin_whitelist_entry10x10006760
                                  cef_add_web_plugin_directory20x10006890
                                  cef_add_web_plugin_path30x10006ac0
                                  cef_api_hash40x10006c40
                                  cef_base64decode50x10006de0
                                  cef_base64encode60x10006f40
                                  cef_begin_tracing70x100070b0
                                  cef_binary_value_create80x100071d0
                                  cef_browser_create90x10007310
                                  cef_browser_host_create_browser100x10007470
                                  cef_browser_host_create_browser_sync110x100075d0
                                  cef_browser_view_create120x10007820
                                  cef_browser_view_get_for_browser130x10007a10
                                  cef_build_revision140x10007b80
                                  cef_clear_cross_origin_whitelist150x10007d40
                                  cef_clear_scheme_handler_factories160x10007ec0
                                  cef_command_line_create170x10008010
                                  cef_command_line_get_global180x10008150
                                  cef_cookie_manager_create_manager190x10008280
                                  cef_cookie_manager_get_blocking_manager200x10008420
                                  cef_cookie_manager_get_global_manager210x10008540
                                  cef_crash_reporting_enabled220x100086c0
                                  cef_create_context_shared230x10008820
                                  cef_create_directory240x10008970
                                  cef_create_new_temp_directory250x10008b50
                                  cef_create_temp_directory_in_directory260x10008cd0
                                  cef_create_url270x10008d70
                                  cef_currently_on280x10008fb0
                                  cef_delete_file290x100090e0
                                  cef_dictionary_value_create300x10009220
                                  cef_directory_exists310x10009360
                                  cef_display_get_alls320x100095a0
                                  cef_display_get_count330x10009730
                                  cef_display_get_matching_bounds340x10009900
                                  cef_display_get_nearest_point350x10009a50
                                  cef_display_get_primary360x10009c00
                                  cef_do_message_loop_work370x10009d70
                                  cef_drag_data_create380x10009f90
                                  cef_enable_highdpi_support390x1000a180
                                  cef_end_tracing400x1000a330
                                  cef_execute_java_script_with_user_gesture_for_tests410x1000a4d0
                                  cef_execute_process420x1000a670
                                  cef_force_web_plugin_shutdown430x1000a800
                                  cef_format_url_for_security_display440x1000a980
                                  cef_get_current_platform_thread_id450x1000ab80
                                  cef_get_extensions_for_mime_type460x1000ace0
                                  cef_get_geolocation470x1000aec0
                                  cef_get_mime_type480x1000b000
                                  cef_get_min_log_level490x1000b220
                                  cef_get_path500x1000b360
                                  cef_get_temp_directory510x1000b580
                                  cef_image_create520x1000b710
                                  cef_initialize530x1000b880
                                  cef_is_cert_status_error540x1000ba00
                                  cef_is_cert_status_minor_error550x1000bc10
                                  cef_is_web_plugin_unstable560x1000bdc0
                                  cef_label_button_create570x1000bf70
                                  cef_launch_process580x1000c0b0
                                  cef_list_value_create590x1000c180
                                  cef_load_crlsets_file600x1000c2c0
                                  cef_log610x1000c4f0
                                  cef_menu_button_create620x1000c670
                                  cef_menu_model_create630x1000c7d0
                                  cef_now_from_system_trace_time640x1000c9d0
                                  cef_panel_create650x1000ca90
                                  cef_parse_csscolor660x1000cc60
                                  cef_parse_json670x1000cf00
                                  cef_parse_jsonand_return_error680x1000d050
                                  cef_parse_url690x1000d1e0
                                  cef_post_data_create700x1000d3b0
                                  cef_post_data_element_create710x1000d5a0
                                  cef_post_delayed_task720x1000d740
                                  cef_post_task730x1000d830
                                  cef_print_settings_create740x1000d910
                                  cef_process_message_create750x1000dab0
                                  cef_quit_message_loop760x1000dc40
                                  cef_refresh_web_plugins770x1000dde0
                                  cef_register_extension780x1000def0
                                  cef_register_scheme_handler_factory790x1000e000
                                  cef_register_web_plugin_crash800x1000e130
                                  cef_register_widevine_cdm810x1000e2d0
                                  cef_remove_cross_origin_whitelist_entry820x1000e4b0
                                  cef_remove_web_plugin_path830x1000e650
                                  cef_request_context_create_context840x1000e860
                                  cef_request_context_get_global_context850x1000e9b0
                                  cef_request_create860x1000eb90
                                  cef_response_create870x1000ed10
                                  cef_run_message_loop880x1000eed0
                                  cef_scroll_view_create890x1000efe0
                                  cef_server_create900x1000f140
                                  cef_set_crash_key_value910x1000f2d0
                                  cef_set_osmodal_loop920x1000f440
                                  cef_shutdown930x1000f570
                                  cef_stream_reader_create_for_data940x1000f6b0
                                  cef_stream_reader_create_for_file950x1000f860
                                  cef_stream_reader_create_for_handler960x1000f9c0
                                  cef_stream_writer_create_for_file970x1000fb10
                                  cef_stream_writer_create_for_handler980x1000fd40
                                  cef_string_ascii_to_utf16990x1000fe10
                                  cef_string_list_alloc1000x1000ff80
                                  cef_string_list_append1010x100100c0
                                  cef_string_list_copy1020x10010210
                                  cef_string_list_free1030x10010300
                                  cef_string_list_size1040x100104c0
                                  cef_string_list_value1050x10010610
                                  cef_string_map_alloc1060x10010780
                                  cef_string_map_append1070x10010870
                                  cef_string_map_free1080x10010a40
                                  cef_string_map_key1090x10010b20
                                  cef_string_map_size1100x10010c90
                                  cef_string_map_value1110x10010e30
                                  cef_string_multimap_alloc1120x10010f10
                                  cef_string_multimap_append1130x10011100
                                  cef_string_multimap_free1140x100112a0
                                  cef_string_multimap_key1150x10011460
                                  cef_string_multimap_size1160x10011690
                                  cef_string_multimap_value1170x10011840
                                  cef_string_userfree_utf16_free1180x100119b0
                                  cef_string_utf16_clear1190x10011af0
                                  cef_string_utf16_cmp1200x10011be0
                                  cef_string_utf16_set1210x10011d40
                                  cef_string_utf16_to_lower1220x10011f10
                                  cef_string_utf16_to_utf81230x10012070
                                  cef_string_utf8_clear1240x10012230
                                  cef_string_utf8_to_utf161250x100123a0
                                  cef_string_wide_set1260x10012560
                                  cef_string_wide_to_utf81270x100126c0
                                  cef_task_runner_get_for_current_thread1280x10012920
                                  cef_task_runner_get_for_thread1290x10012ad0
                                  cef_textfield_create1300x10012c90
                                  cef_time_delta1310x10012db0
                                  cef_time_now1320x10012f10
                                  cef_time_to_timet1330x10013040
                                  cef_unregister_internal_web_plugin1340x100131f0
                                  cef_uridecode1350x10013380
                                  cef_uriencode1360x10013470
                                  cef_urlrequest_create1370x10013610
                                  cef_v8context_get_current_context1380x100137b0
                                  cef_v8context_get_entered_context1390x100138f0
                                  cef_v8context_in_context1400x10013ad0
                                  cef_v8stack_trace_get_current1410x10013c50
                                  cef_v8value_create_array1420x10013d50
                                  cef_v8value_create_array_buffer1430x10013f50
                                  cef_v8value_create_bool1440x100140a0
                                  cef_v8value_create_date1450x10014230
                                  cef_v8value_create_double1460x100143d0
                                  cef_v8value_create_function1470x10014530
                                  cef_v8value_create_int1480x100146b0
                                  cef_v8value_create_null1490x100147d0
                                  cef_v8value_create_object1500x10014950
                                  cef_v8value_create_string1510x10014b60
                                  cef_v8value_create_uint1520x10014cc0
                                  cef_v8value_create_undefined1530x10014e20
                                  cef_value_create1540x10014fb0
                                  cef_visit_web_plugin_info1550x10015120
                                  cef_window_create_top_level1560x100152e0
                                  cef_write_json1570x10015430
                                  cef_zip_directory1580x10015600
                                  cef_zip_reader_create1590x100157b0
                                  create_context_shared1600x10015970
                                  Language of compilation systemCountry where language is spokenMap
                                  ChineseChina
                                  EnglishUnited States
                                  TimestampSource PortDest PortSource IPDest IP
                                  Dec 19, 2024 08:09:53.040038109 CET497571111192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:09:53.041610956 CET497592222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:09:53.159595966 CET111149757206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:09:53.159729004 CET497571111192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:09:53.159990072 CET497571111192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:09:53.161051035 CET222249759206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:09:53.161134005 CET497592222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:09:53.161248922 CET497592222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:09:53.279448032 CET111149757206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:09:53.279514074 CET497571111192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:09:53.280646086 CET222249759206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:09:53.280699015 CET497592222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:09:53.399012089 CET111149757206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:09:53.400193930 CET222249759206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:09:56.574246883 CET222249759206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:09:56.574301958 CET497592222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:09:56.576122046 CET497592222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:09:56.696073055 CET222249759206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:09:58.730422974 CET4977180192.168.2.5104.21.42.47
                                  Dec 19, 2024 08:09:58.764851093 CET4977280192.168.2.5104.21.42.47
                                  Dec 19, 2024 08:09:58.849984884 CET8049771104.21.42.47192.168.2.5
                                  Dec 19, 2024 08:09:58.850102901 CET4977180192.168.2.5104.21.42.47
                                  Dec 19, 2024 08:09:58.884362936 CET8049772104.21.42.47192.168.2.5
                                  Dec 19, 2024 08:09:58.884438038 CET4977280192.168.2.5104.21.42.47
                                  Dec 19, 2024 08:09:58.925787926 CET4977180192.168.2.5104.21.42.47
                                  Dec 19, 2024 08:09:58.950890064 CET4977280192.168.2.5104.21.42.47
                                  Dec 19, 2024 08:09:59.045326948 CET8049771104.21.42.47192.168.2.5
                                  Dec 19, 2024 08:09:59.070390940 CET8049772104.21.42.47192.168.2.5
                                  Dec 19, 2024 08:10:00.119376898 CET8049771104.21.42.47192.168.2.5
                                  Dec 19, 2024 08:10:00.120404959 CET497782222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:00.162676096 CET8049772104.21.42.47192.168.2.5
                                  Dec 19, 2024 08:10:00.163703918 CET497571111192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:00.224189043 CET4977180192.168.2.5104.21.42.47
                                  Dec 19, 2024 08:10:00.224328995 CET4977280192.168.2.5104.21.42.47
                                  Dec 19, 2024 08:10:00.240145922 CET222249778206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:00.240415096 CET497782222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:00.240415096 CET497782222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:00.283246040 CET111149757206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:00.284081936 CET497571111192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:00.359981060 CET222249778206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:00.360236883 CET497782222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:00.403527021 CET111149757206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:00.482999086 CET222249778206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:01.048355103 CET111149757206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:01.184334993 CET497571111192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:02.359489918 CET4977180192.168.2.5104.21.42.47
                                  Dec 19, 2024 08:10:02.479001999 CET8049771104.21.42.47192.168.2.5
                                  Dec 19, 2024 08:10:02.856461048 CET8049771104.21.42.47192.168.2.5
                                  Dec 19, 2024 08:10:02.860909939 CET497782222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:02.916848898 CET4977180192.168.2.5104.21.42.47
                                  Dec 19, 2024 08:10:02.980382919 CET222249778206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:02.980463028 CET497782222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:03.100188971 CET222249778206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:03.653760910 CET222249778206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:03.655613899 CET497782222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:03.662765026 CET497782222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:03.662772894 CET497852222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:03.782335997 CET222249778206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:03.782368898 CET222249785206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:03.785448074 CET497852222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:03.785448074 CET497852222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:03.904963017 CET222249785206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:03.905101061 CET497852222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:04.027036905 CET222249785206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:04.722996950 CET4977280192.168.2.5104.21.42.47
                                  Dec 19, 2024 08:10:04.842470884 CET8049772104.21.42.47192.168.2.5
                                  Dec 19, 2024 08:10:05.227884054 CET8049772104.21.42.47192.168.2.5
                                  Dec 19, 2024 08:10:05.228843927 CET497852222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:05.293550968 CET4977280192.168.2.5104.21.42.47
                                  Dec 19, 2024 08:10:05.348354101 CET222249785206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:05.348426104 CET497852222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:05.467915058 CET222249785206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:07.199196100 CET222249785206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:07.199259043 CET497852222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:07.199357033 CET497852222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:07.199640989 CET497952222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:07.319051981 CET222249785206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:07.319320917 CET222249795206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:07.319396973 CET497952222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:07.319638014 CET497952222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:07.439033031 CET222249795206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:07.439138889 CET497952222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:07.558716059 CET222249795206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:07.728404999 CET4977180192.168.2.5104.21.42.47
                                  Dec 19, 2024 08:10:07.847937107 CET8049771104.21.42.47192.168.2.5
                                  Dec 19, 2024 08:10:08.214782953 CET8049771104.21.42.47192.168.2.5
                                  Dec 19, 2024 08:10:08.215475082 CET497952222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:08.262315989 CET4977180192.168.2.5104.21.42.47
                                  Dec 19, 2024 08:10:08.335062981 CET222249795206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:08.336256027 CET497952222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:08.455812931 CET222249795206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:10.733333111 CET222249795206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:10.735023022 CET497952222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:10.736581087 CET497952222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:10.741904020 CET498062222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:10.856229067 CET222249795206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:10.861440897 CET222249806206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:10.861835957 CET498062222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:10.861836910 CET498062222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:11.005563021 CET222249806206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:11.005686045 CET498062222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:11.245191097 CET222249806206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:11.522144079 CET4977280192.168.2.5104.21.42.47
                                  Dec 19, 2024 08:10:11.641583920 CET8049772104.21.42.47192.168.2.5
                                  Dec 19, 2024 08:10:12.013550997 CET8049772104.21.42.47192.168.2.5
                                  Dec 19, 2024 08:10:12.014154911 CET498062222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:12.059186935 CET4977280192.168.2.5104.21.42.47
                                  Dec 19, 2024 08:10:12.133620977 CET222249806206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:12.133672953 CET498062222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:12.254740953 CET222249806206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:14.267973900 CET222249806206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:14.268074989 CET498062222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:14.268183947 CET498062222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:14.268457890 CET498142222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:14.387609959 CET222249806206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:14.387932062 CET222249814206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:14.388184071 CET498142222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:14.388489008 CET498142222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:14.507901907 CET222249814206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:14.508024931 CET498142222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:14.627448082 CET222249814206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:14.861768961 CET4977180192.168.2.5104.21.42.47
                                  Dec 19, 2024 08:10:14.981295109 CET8049771104.21.42.47192.168.2.5
                                  Dec 19, 2024 08:10:15.368319988 CET8049771104.21.42.47192.168.2.5
                                  Dec 19, 2024 08:10:15.368899107 CET498142222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:15.418582916 CET4977180192.168.2.5104.21.42.47
                                  Dec 19, 2024 08:10:15.488439083 CET222249814206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:15.488529921 CET498142222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:15.608000994 CET222249814206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:17.816397905 CET222249814206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:17.816468954 CET498142222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:17.816561937 CET498142222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:17.817006111 CET498242222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:17.936094046 CET222249814206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:17.936595917 CET222249824206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:17.936686039 CET498242222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:17.942085028 CET498242222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:18.061566114 CET222249824206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:18.061630964 CET498242222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:18.182688951 CET222249824206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:18.480043888 CET4977280192.168.2.5104.21.42.47
                                  Dec 19, 2024 08:10:18.599584103 CET8049772104.21.42.47192.168.2.5
                                  Dec 19, 2024 08:10:18.985959053 CET8049772104.21.42.47192.168.2.5
                                  Dec 19, 2024 08:10:18.995462894 CET498242222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:19.043581963 CET4977280192.168.2.5104.21.42.47
                                  Dec 19, 2024 08:10:19.115008116 CET222249824206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:19.115077019 CET498242222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:19.236129999 CET222249824206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:21.367664099 CET222249824206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:21.367741108 CET498242222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:21.367839098 CET498242222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:21.371335983 CET498352222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:21.487407923 CET222249824206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:21.490823984 CET222249835206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:21.490897894 CET498352222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:21.491101027 CET498352222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:21.610589981 CET222249835206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:21.610860109 CET498352222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:21.730371952 CET222249835206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:21.853686094 CET4977180192.168.2.5104.21.42.47
                                  Dec 19, 2024 08:10:21.973156929 CET8049771104.21.42.47192.168.2.5
                                  Dec 19, 2024 08:10:22.348196983 CET8049771104.21.42.47192.168.2.5
                                  Dec 19, 2024 08:10:22.349162102 CET498352222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:22.403003931 CET4977180192.168.2.5104.21.42.47
                                  Dec 19, 2024 08:10:22.468801022 CET222249835206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:22.468862057 CET498352222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:22.589023113 CET222249835206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:24.929610014 CET222249835206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:24.929809093 CET498352222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:24.929809093 CET498352222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:24.930171013 CET498412222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:25.049420118 CET222249835206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:25.049631119 CET222249841206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:25.049849987 CET498412222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:25.050076008 CET498412222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:25.170496941 CET222249841206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:25.170577049 CET498412222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:25.289983988 CET222249841206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:25.493524075 CET4977280192.168.2.5104.21.42.47
                                  Dec 19, 2024 08:10:25.612925053 CET8049772104.21.42.47192.168.2.5
                                  Dec 19, 2024 08:10:26.000999928 CET8049772104.21.42.47192.168.2.5
                                  Dec 19, 2024 08:10:26.001773119 CET498412222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:26.043643951 CET4977280192.168.2.5104.21.42.47
                                  Dec 19, 2024 08:10:26.121608019 CET222249841206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:26.121929884 CET498412222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:26.241584063 CET222249841206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:28.456003904 CET222249841206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:28.456123114 CET498412222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:28.456252098 CET498412222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:28.456501961 CET498522222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:28.575999022 CET222249841206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:28.576114893 CET222249852206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:28.576201916 CET498522222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:28.576436996 CET498522222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:28.696393967 CET222249852206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:28.696479082 CET498522222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:28.816381931 CET222249852206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:28.999010086 CET4977180192.168.2.5104.21.42.47
                                  Dec 19, 2024 08:10:29.118685961 CET8049771104.21.42.47192.168.2.5
                                  Dec 19, 2024 08:10:29.502334118 CET8049771104.21.42.47192.168.2.5
                                  Dec 19, 2024 08:10:29.502907038 CET498522222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:29.543657064 CET4977180192.168.2.5104.21.42.47
                                  Dec 19, 2024 08:10:29.622358084 CET222249852206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:29.622450113 CET498522222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:29.741955042 CET222249852206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:31.985094070 CET222249852206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:31.985186100 CET498522222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:31.985268116 CET498522222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:31.985630035 CET498592222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:32.104919910 CET222249852206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:32.105290890 CET222249859206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:32.105386019 CET498592222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:32.105658054 CET498592222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:32.225074053 CET222249859206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:32.227087975 CET498592222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:32.346621037 CET222249859206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:32.524966955 CET4977280192.168.2.5104.21.42.47
                                  Dec 19, 2024 08:10:32.644449949 CET8049772104.21.42.47192.168.2.5
                                  Dec 19, 2024 08:10:33.032080889 CET8049772104.21.42.47192.168.2.5
                                  Dec 19, 2024 08:10:33.032629013 CET498592222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:33.074892044 CET4977280192.168.2.5104.21.42.47
                                  Dec 19, 2024 08:10:33.152245045 CET222249859206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:33.152401924 CET498592222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:33.271876097 CET222249859206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:35.521199942 CET222249859206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:35.525130987 CET498592222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:35.525232077 CET498592222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:35.525501966 CET498692222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:35.644629002 CET222249859206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:35.644953012 CET222249869206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:35.645176888 CET498692222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:35.645282030 CET498692222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:35.764802933 CET222249869206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:35.764955997 CET498692222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:35.884427071 CET222249869206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:36.087780952 CET4977180192.168.2.5104.21.42.47
                                  Dec 19, 2024 08:10:36.207199097 CET8049771104.21.42.47192.168.2.5
                                  Dec 19, 2024 08:10:36.583295107 CET8049771104.21.42.47192.168.2.5
                                  Dec 19, 2024 08:10:36.583870888 CET498692222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:36.637502909 CET4977180192.168.2.5104.21.42.47
                                  Dec 19, 2024 08:10:36.703324080 CET222249869206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:36.703427076 CET498692222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:36.823483944 CET222249869206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:39.072808027 CET222249869206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:39.073004961 CET498692222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:39.073065996 CET498692222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:39.073363066 CET498802222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:39.192550898 CET222249869206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:39.192841053 CET222249880206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:39.192950010 CET498802222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:39.193444014 CET498802222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:39.312865019 CET222249880206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:39.312933922 CET498802222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:39.432524920 CET222249880206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:39.533737898 CET4977280192.168.2.5104.21.42.47
                                  Dec 19, 2024 08:10:39.653289080 CET8049772104.21.42.47192.168.2.5
                                  Dec 19, 2024 08:10:40.027842999 CET8049772104.21.42.47192.168.2.5
                                  Dec 19, 2024 08:10:40.028697014 CET498802222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:40.074940920 CET4977280192.168.2.5104.21.42.47
                                  Dec 19, 2024 08:10:40.148118019 CET222249880206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:40.148194075 CET498802222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:40.267687082 CET222249880206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:42.597363949 CET222249880206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:42.597449064 CET498802222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:42.602727890 CET498802222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:42.606806993 CET498862222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:42.722265959 CET222249880206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:42.726296902 CET222249886206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:42.726389885 CET498862222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:42.728312016 CET498862222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:42.847817898 CET222249886206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:42.847882986 CET498862222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:42.967434883 CET222249886206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:43.119726896 CET4977180192.168.2.5104.21.42.47
                                  Dec 19, 2024 08:10:43.239274979 CET8049771104.21.42.47192.168.2.5
                                  Dec 19, 2024 08:10:43.613964081 CET8049771104.21.42.47192.168.2.5
                                  Dec 19, 2024 08:10:43.614563942 CET498862222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:43.668770075 CET4977180192.168.2.5104.21.42.47
                                  Dec 19, 2024 08:10:43.734020948 CET222249886206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:43.734169960 CET498862222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:43.853755951 CET222249886206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:46.149447918 CET222249886206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:46.149553061 CET498862222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:46.149610996 CET498862222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:46.149857998 CET498972222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:46.269213915 CET222249886206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:46.269409895 CET222249897206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:46.269479036 CET498972222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:46.269743919 CET498972222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:46.389189005 CET222249897206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:46.389277935 CET498972222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:46.508826971 CET222249897206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:46.762511969 CET4977280192.168.2.5104.21.42.47
                                  Dec 19, 2024 08:10:46.882054090 CET8049772104.21.42.47192.168.2.5
                                  Dec 19, 2024 08:10:47.254827023 CET8049772104.21.42.47192.168.2.5
                                  Dec 19, 2024 08:10:47.257569075 CET498972222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:47.309412003 CET4977280192.168.2.5104.21.42.47
                                  Dec 19, 2024 08:10:47.377104044 CET222249897206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:47.381242990 CET498972222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:47.500883102 CET222249897206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:49.675523043 CET222249897206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:49.675700903 CET498972222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:49.675815105 CET498972222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:49.676256895 CET499082222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:49.795537949 CET222249897206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:49.795876980 CET222249908206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:49.795990944 CET499082222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:49.796238899 CET499082222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:49.916779995 CET222249908206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:49.916840076 CET499082222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:50.036823034 CET222249908206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:50.198714972 CET4977180192.168.2.5104.21.42.47
                                  Dec 19, 2024 08:10:50.318803072 CET8049771104.21.42.47192.168.2.5
                                  Dec 19, 2024 08:10:50.702821016 CET8049771104.21.42.47192.168.2.5
                                  Dec 19, 2024 08:10:50.703408003 CET499082222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:50.746840954 CET4977180192.168.2.5104.21.42.47
                                  Dec 19, 2024 08:10:50.822779894 CET222249908206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:50.822870970 CET499082222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:50.942673922 CET222249908206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:53.199153900 CET222249908206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:53.199285984 CET499082222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:53.199373960 CET499082222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:53.199661970 CET499142222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:53.319237947 CET222249908206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:53.319427967 CET222249914206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:53.319504976 CET499142222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:53.319703102 CET499142222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:53.440119982 CET222249914206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:53.440201998 CET499142222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:53.559932947 CET222249914206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:53.686009884 CET4977280192.168.2.5104.21.42.47
                                  Dec 19, 2024 08:10:53.805591106 CET8049772104.21.42.47192.168.2.5
                                  Dec 19, 2024 08:10:54.194869995 CET8049772104.21.42.47192.168.2.5
                                  Dec 19, 2024 08:10:54.195355892 CET499142222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:54.246901989 CET4977280192.168.2.5104.21.42.47
                                  Dec 19, 2024 08:10:54.314940929 CET222249914206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:54.315020084 CET499142222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:54.434499025 CET222249914206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:56.738209963 CET222249914206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:56.738298893 CET499142222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:56.738389015 CET499142222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:56.738801956 CET499252222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:56.857914925 CET222249914206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:56.858308077 CET222249925206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:56.858534098 CET499252222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:56.858819962 CET499252222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:56.978411913 CET222249925206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:56.978487968 CET499252222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:10:57.098202944 CET222249925206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:10:57.243702888 CET4977180192.168.2.5104.21.42.47
                                  Dec 19, 2024 08:10:57.294521093 CET4977180192.168.2.5104.21.42.47
                                  Dec 19, 2024 08:10:57.363208055 CET8049771104.21.42.47192.168.2.5
                                  Dec 19, 2024 08:10:57.363322020 CET4977180192.168.2.5104.21.42.47
                                  Dec 19, 2024 08:10:58.870009899 CET4993180192.168.2.5122.226.191.212
                                  Dec 19, 2024 08:10:58.991516113 CET8049931122.226.191.212192.168.2.5
                                  Dec 19, 2024 08:10:58.991645098 CET4993180192.168.2.5122.226.191.212
                                  Dec 19, 2024 08:10:58.993473053 CET4993180192.168.2.5122.226.191.212
                                  Dec 19, 2024 08:10:59.113164902 CET8049931122.226.191.212192.168.2.5
                                  Dec 19, 2024 08:11:00.271002054 CET222249925206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:11:00.271151066 CET499252222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:00.271238089 CET499252222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:00.390948057 CET222249925206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:11:00.529135942 CET8049931122.226.191.212192.168.2.5
                                  Dec 19, 2024 08:11:00.529932022 CET499372222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:00.575031042 CET4993180192.168.2.5122.226.191.212
                                  Dec 19, 2024 08:11:00.649509907 CET222249937206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:11:00.649672985 CET499372222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:00.649981976 CET499372222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:00.769561052 CET222249937206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:11:00.769701004 CET499372222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:00.889385939 CET222249937206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:11:01.049078941 CET4977280192.168.2.5104.21.42.47
                                  Dec 19, 2024 08:11:01.059457064 CET497571111192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:01.170470953 CET8049772104.21.42.47192.168.2.5
                                  Dec 19, 2024 08:11:01.180047035 CET111149757206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:11:01.293854952 CET4977280192.168.2.5104.21.42.47
                                  Dec 19, 2024 08:11:01.294843912 CET4993180192.168.2.5122.226.191.212
                                  Dec 19, 2024 08:11:01.414267063 CET8049931122.226.191.212192.168.2.5
                                  Dec 19, 2024 08:11:01.637809038 CET497571111192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:01.757635117 CET111149757206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:11:01.757777929 CET497571111192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:01.848136902 CET8049931122.226.191.212192.168.2.5
                                  Dec 19, 2024 08:11:01.848700047 CET499372222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:01.877767086 CET111149757206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:11:01.903160095 CET4993180192.168.2.5122.226.191.212
                                  Dec 19, 2024 08:11:01.968770027 CET222249937206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:11:01.968838930 CET499372222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:02.088602066 CET222249937206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:11:04.073216915 CET222249937206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:11:04.073364019 CET499372222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:04.073462009 CET499372222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:04.073981047 CET499432222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:04.192871094 CET222249937206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:11:04.193522930 CET222249943206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:11:04.193609953 CET499432222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:04.193972111 CET499432222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:04.313523054 CET222249943206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:11:04.313596010 CET499432222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:04.433152914 CET222249943206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:11:04.640177965 CET4994780192.168.2.5104.21.42.47
                                  Dec 19, 2024 08:11:04.759821892 CET8049947104.21.42.47192.168.2.5
                                  Dec 19, 2024 08:11:04.760093927 CET4994780192.168.2.5104.21.42.47
                                  Dec 19, 2024 08:11:04.760202885 CET4994780192.168.2.5104.21.42.47
                                  Dec 19, 2024 08:11:04.879646063 CET8049947104.21.42.47192.168.2.5
                                  Dec 19, 2024 08:11:05.294507027 CET4994780192.168.2.5104.21.42.47
                                  Dec 19, 2024 08:11:05.299588919 CET4993180192.168.2.5122.226.191.212
                                  Dec 19, 2024 08:11:05.420042992 CET8049931122.226.191.212192.168.2.5
                                  Dec 19, 2024 08:11:05.852078915 CET8049931122.226.191.212192.168.2.5
                                  Dec 19, 2024 08:11:05.852514982 CET499432222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:05.903162003 CET4993180192.168.2.5122.226.191.212
                                  Dec 19, 2024 08:11:05.972079992 CET222249943206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:11:05.972134113 CET499432222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:06.091629028 CET222249943206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:11:07.590677977 CET222249943206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:11:07.590800047 CET499432222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:07.590881109 CET499432222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:07.591187954 CET499552222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:07.710472107 CET222249943206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:11:07.710695982 CET222249955206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:11:07.710767984 CET499552222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:07.711002111 CET499552222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:07.830418110 CET222249955206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:11:07.830472946 CET499552222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:07.949959040 CET222249955206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:11:08.075663090 CET4995680192.168.2.5104.21.42.47
                                  Dec 19, 2024 08:11:08.373857975 CET8049956104.21.42.47192.168.2.5
                                  Dec 19, 2024 08:11:08.373954058 CET4995680192.168.2.5104.21.42.47
                                  Dec 19, 2024 08:11:08.374138117 CET4995680192.168.2.5104.21.42.47
                                  Dec 19, 2024 08:11:08.493588924 CET8049956104.21.42.47192.168.2.5
                                  Dec 19, 2024 08:11:09.293996096 CET4995680192.168.2.5104.21.42.47
                                  Dec 19, 2024 08:11:09.295010090 CET4993180192.168.2.5122.226.191.212
                                  Dec 19, 2024 08:11:09.414994955 CET8049931122.226.191.212192.168.2.5
                                  Dec 19, 2024 08:11:09.848345041 CET8049931122.226.191.212192.168.2.5
                                  Dec 19, 2024 08:11:09.848997116 CET499552222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:09.903275013 CET4993180192.168.2.5122.226.191.212
                                  Dec 19, 2024 08:11:09.968702078 CET222249955206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:11:09.968791008 CET499552222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:10.088670015 CET222249955206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:11:11.130742073 CET222249955206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:11:11.130855083 CET499552222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:11.130958080 CET499552222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:11.131242037 CET499632222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:11.250478983 CET222249955206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:11:11.250690937 CET222249963206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:11:11.250762939 CET499632222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:11.250961065 CET499632222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:11.370820999 CET222249963206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:11:11.370922089 CET499632222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:11.490437031 CET222249963206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:11:11.611821890 CET4996680192.168.2.5104.21.42.47
                                  Dec 19, 2024 08:11:11.731334925 CET8049966104.21.42.47192.168.2.5
                                  Dec 19, 2024 08:11:11.731456995 CET4996680192.168.2.5104.21.42.47
                                  Dec 19, 2024 08:11:11.731646061 CET4996680192.168.2.5104.21.42.47
                                  Dec 19, 2024 08:11:11.851891994 CET8049966104.21.42.47192.168.2.5
                                  Dec 19, 2024 08:11:12.989423037 CET8049966104.21.42.47192.168.2.5
                                  Dec 19, 2024 08:11:12.989839077 CET499632222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:13.043768883 CET4996680192.168.2.5104.21.42.47
                                  Dec 19, 2024 08:11:13.109941006 CET222249963206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:11:13.110073090 CET499632222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:13.229685068 CET222249963206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:11:14.651066065 CET222249963206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:11:14.651191950 CET499632222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:14.651279926 CET499632222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:14.651607037 CET499722222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:14.770862103 CET222249963206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:11:14.771179914 CET222249972206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:11:14.771245956 CET499722222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:14.771437883 CET499722222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:14.890904903 CET222249972206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:11:14.890966892 CET499722222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:14.948231936 CET4996680192.168.2.5104.21.42.47
                                  Dec 19, 2024 08:11:15.010432005 CET222249972206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:11:15.067723989 CET8049966104.21.42.47192.168.2.5
                                  Dec 19, 2024 08:11:15.454953909 CET8049966104.21.42.47192.168.2.5
                                  Dec 19, 2024 08:11:15.455472946 CET499722222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:15.496920109 CET4996680192.168.2.5104.21.42.47
                                  Dec 19, 2024 08:11:15.575043917 CET222249972206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:11:15.575130939 CET499722222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:15.694719076 CET222249972206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:11:18.174243927 CET222249972206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:11:18.174367905 CET499722222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:18.174446106 CET499722222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:18.174770117 CET499832222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:18.293926954 CET222249972206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:11:18.294204950 CET222249983206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:11:18.294306993 CET499832222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:18.294523954 CET499832222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:18.413944960 CET222249983206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:11:18.414083004 CET499832222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:18.533649921 CET222249983206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:11:18.569248915 CET4996680192.168.2.5104.21.42.47
                                  Dec 19, 2024 08:11:18.688747883 CET8049966104.21.42.47192.168.2.5
                                  Dec 19, 2024 08:11:19.078119993 CET8049966104.21.42.47192.168.2.5
                                  Dec 19, 2024 08:11:19.078660965 CET499832222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:19.121973038 CET4996680192.168.2.5104.21.42.47
                                  Dec 19, 2024 08:11:19.198196888 CET222249983206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:11:19.198307037 CET499832222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:19.317814112 CET222249983206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:11:21.700474024 CET222249983206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:11:21.700573921 CET499832222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:21.700674057 CET499832222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:21.700942039 CET499912222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:21.821882010 CET222249983206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:11:21.821898937 CET222249991206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:11:21.822017908 CET499912222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:21.822205067 CET499912222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:21.941601992 CET222249991206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:11:21.941725969 CET499912222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:22.017446995 CET4996680192.168.2.5104.21.42.47
                                  Dec 19, 2024 08:11:22.061172009 CET222249991206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:11:22.136977911 CET8049966104.21.42.47192.168.2.5
                                  Dec 19, 2024 08:11:22.511931896 CET8049966104.21.42.47192.168.2.5
                                  Dec 19, 2024 08:11:22.512408018 CET499912222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:22.559484005 CET4996680192.168.2.5104.21.42.47
                                  Dec 19, 2024 08:11:22.631995916 CET222249991206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:11:22.632110119 CET499912222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:22.752451897 CET222249991206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:11:25.240164042 CET222249991206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:11:25.240281105 CET499912222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:25.240360975 CET499912222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:25.240659952 CET500002222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:25.359816074 CET222249991206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:11:25.360124111 CET222250000206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:11:25.360203028 CET500002222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:25.360382080 CET500002222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:25.479911089 CET222250000206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:11:25.480010033 CET500002222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:25.599742889 CET222250000206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:11:25.619628906 CET4996680192.168.2.5104.21.42.47
                                  Dec 19, 2024 08:11:25.739156008 CET8049966104.21.42.47192.168.2.5
                                  Dec 19, 2024 08:11:26.113868952 CET8049966104.21.42.47192.168.2.5
                                  Dec 19, 2024 08:11:26.114455938 CET500002222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:26.168853045 CET4996680192.168.2.5104.21.42.47
                                  Dec 19, 2024 08:11:26.245129108 CET222250000206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:11:26.245249033 CET500002222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:26.364716053 CET222250000206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:11:28.799896002 CET222250000206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:11:28.799952984 CET500002222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:28.800031900 CET500002222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:28.800450087 CET500092222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:28.919536114 CET222250000206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:11:28.919900894 CET222250009206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:11:28.920069933 CET500092222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:28.920294046 CET500092222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:29.039829969 CET222250009206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:11:29.040138006 CET500092222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:29.094314098 CET4996680192.168.2.5104.21.42.47
                                  Dec 19, 2024 08:11:29.159760952 CET222250009206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:11:29.213824987 CET8049966104.21.42.47192.168.2.5
                                  Dec 19, 2024 08:11:29.293955088 CET4996680192.168.2.5104.21.42.47
                                  Dec 19, 2024 08:11:29.294819117 CET4993180192.168.2.5122.226.191.212
                                  Dec 19, 2024 08:11:29.414347887 CET8049931122.226.191.212192.168.2.5
                                  Dec 19, 2024 08:11:29.889605999 CET8049931122.226.191.212192.168.2.5
                                  Dec 19, 2024 08:11:29.890206099 CET500092222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:29.934578896 CET4993180192.168.2.5122.226.191.212
                                  Dec 19, 2024 08:11:30.009738922 CET222250009206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:11:30.009819031 CET500092222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:30.129323006 CET222250009206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:11:32.351871967 CET222250009206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:11:32.351977110 CET500092222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:32.352024078 CET500092222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:32.352281094 CET500102222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:32.471520901 CET222250009206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:11:32.471772909 CET222250010206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:11:32.471868992 CET500102222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:32.472019911 CET500102222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:32.591393948 CET222250010206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:11:32.591495037 CET500102222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:32.643043041 CET5001180192.168.2.5104.21.42.47
                                  Dec 19, 2024 08:11:32.710980892 CET222250010206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:11:32.762587070 CET8050011104.21.42.47192.168.2.5
                                  Dec 19, 2024 08:11:32.762676001 CET5001180192.168.2.5104.21.42.47
                                  Dec 19, 2024 08:11:32.762868881 CET5001180192.168.2.5104.21.42.47
                                  Dec 19, 2024 08:11:32.882307053 CET8050011104.21.42.47192.168.2.5
                                  Dec 19, 2024 08:11:34.062380075 CET8050011104.21.42.47192.168.2.5
                                  Dec 19, 2024 08:11:34.106364012 CET5001180192.168.2.5104.21.42.47
                                  Dec 19, 2024 08:11:35.510400057 CET500102222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:35.630042076 CET222250010206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:11:35.630166054 CET500102222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:35.749665976 CET222250010206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:11:35.885374069 CET222250010206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:11:35.885526896 CET500102222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:36.041171074 CET500102222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:36.041469097 CET500122222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:36.161607027 CET222250010206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:11:36.161922932 CET222250012206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:11:36.162028074 CET500122222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:36.162158012 CET500122222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:36.281620026 CET222250012206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:11:36.281733036 CET500122222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:36.401328087 CET222250012206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:11:39.583111048 CET222250012206.238.77.142192.168.2.5
                                  Dec 19, 2024 08:11:39.583251953 CET500122222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:39.583303928 CET500122222192.168.2.5206.238.77.142
                                  Dec 19, 2024 08:11:39.702749968 CET222250012206.238.77.142192.168.2.5
                                  TimestampSource PortDest PortSource IPDest IP
                                  Dec 19, 2024 08:09:58.196500063 CET5457653192.168.2.51.1.1.1
                                  Dec 19, 2024 08:09:58.674978018 CET53545761.1.1.1192.168.2.5
                                  Dec 19, 2024 08:10:57.296947956 CET5955753192.168.2.51.1.1.1
                                  Dec 19, 2024 08:10:58.310949087 CET5955753192.168.2.51.1.1.1
                                  Dec 19, 2024 08:10:58.869010925 CET53595571.1.1.1192.168.2.5
                                  Dec 19, 2024 08:10:58.869055033 CET53595571.1.1.1192.168.2.5
                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                  Dec 19, 2024 08:09:58.196500063 CET192.168.2.51.1.1.10xfa93Standard query (0)4.ipw.cnA (IP address)IN (0x0001)false
                                  Dec 19, 2024 08:10:57.296947956 CET192.168.2.51.1.1.10x8fc5Standard query (0)ifconfig.ccA (IP address)IN (0x0001)false
                                  Dec 19, 2024 08:10:58.310949087 CET192.168.2.51.1.1.10x8fc5Standard query (0)ifconfig.ccA (IP address)IN (0x0001)false
                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                  Dec 19, 2024 08:09:58.674978018 CET1.1.1.1192.168.2.50xfa93No error (0)4.ipw.cn4.tcpdump.cnCNAME (Canonical name)IN (0x0001)false
                                  Dec 19, 2024 08:09:58.674978018 CET1.1.1.1192.168.2.50xfa93No error (0)4.tcpdump.cn104.21.42.47A (IP address)IN (0x0001)false
                                  Dec 19, 2024 08:09:58.674978018 CET1.1.1.1192.168.2.50xfa93No error (0)4.tcpdump.cn172.67.156.54A (IP address)IN (0x0001)false
                                  Dec 19, 2024 08:10:58.869010925 CET1.1.1.1192.168.2.50x8fc5No error (0)ifconfig.cc286f37a9.ifconfig.cc.cname.hcnamedns.comCNAME (Canonical name)IN (0x0001)false
                                  Dec 19, 2024 08:10:58.869010925 CET1.1.1.1192.168.2.50x8fc5No error (0)286f37a9.ifconfig.cc.cname.hcnamedns.com122.226.191.212A (IP address)IN (0x0001)false
                                  Dec 19, 2024 08:10:58.869010925 CET1.1.1.1192.168.2.50x8fc5No error (0)286f37a9.ifconfig.cc.cname.hcnamedns.com183.134.17.124A (IP address)IN (0x0001)false
                                  Dec 19, 2024 08:10:58.869010925 CET1.1.1.1192.168.2.50x8fc5No error (0)286f37a9.ifconfig.cc.cname.hcnamedns.com183.134.17.27A (IP address)IN (0x0001)false
                                  Dec 19, 2024 08:10:58.869055033 CET1.1.1.1192.168.2.50x8fc5No error (0)ifconfig.cc286f37a9.ifconfig.cc.cname.hcnamedns.comCNAME (Canonical name)IN (0x0001)false
                                  Dec 19, 2024 08:10:58.869055033 CET1.1.1.1192.168.2.50x8fc5No error (0)286f37a9.ifconfig.cc.cname.hcnamedns.com122.226.191.212A (IP address)IN (0x0001)false
                                  Dec 19, 2024 08:10:58.869055033 CET1.1.1.1192.168.2.50x8fc5No error (0)286f37a9.ifconfig.cc.cname.hcnamedns.com183.134.17.124A (IP address)IN (0x0001)false
                                  Dec 19, 2024 08:10:58.869055033 CET1.1.1.1192.168.2.50x8fc5No error (0)286f37a9.ifconfig.cc.cname.hcnamedns.com183.134.17.27A (IP address)IN (0x0001)false
                                  • 4.ipw.cn
                                  • ifconfig.cc
                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  0192.168.2.549771104.21.42.47801784C:\Windows\SysWOW64\rundll32.exe
                                  TimestampBytes transferredDirectionData
                                  Dec 19, 2024 08:09:58.925787926 CET83OUTGET / HTTP/1.1
                                  Connection: Keep-Alive
                                  User-Agent: curl/7.83.1
                                  Host: 4.ipw.cn
                                  Dec 19, 2024 08:10:00.119376898 CET867INHTTP/1.1 200 OK
                                  Date: Thu, 19 Dec 2024 07:09:59 GMT
                                  Content-Type: text/plain
                                  Content-Length: 12
                                  Connection: keep-alive
                                  Access-Control-Allow-Origin: https://ipw.cn
                                  strict-transport-security: max-age=16070400;preload
                                  cf-cache-status: DYNAMIC
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=UYkY4nhzDDzOmry2Oi6zTNYvTA5H%2BDz0wXAucHLJ5VKi9DnPEdQG7Ha8QSSvY3GlgnMBFfzIDecP%2Fb%2FuJW6oYP4xG99uvBZ9CipEz9vUoTv1s%2BLe26OavxW%2B4w%3D%3D"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 8f459200abca41d9-EWR
                                  alt-svc: h3=":443"; ma=86400
                                  server-timing: cfL4;desc="?proto=TCP&rtt=2026&min_rtt=2026&rtt_var=1013&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=83&delivery_rate=0&cwnd=236&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                  Data Raw: 38 2e 34 36 2e 31 32 33 2e 31 38 39
                                  Data Ascii: 8.46.123.189
                                  Dec 19, 2024 08:10:02.359489918 CET83OUTGET / HTTP/1.1
                                  Connection: Keep-Alive
                                  User-Agent: curl/7.83.1
                                  Host: 4.ipw.cn
                                  Dec 19, 2024 08:10:02.856461048 CET870INHTTP/1.1 200 OK
                                  Date: Thu, 19 Dec 2024 07:10:02 GMT
                                  Content-Type: text/plain
                                  Content-Length: 12
                                  Connection: keep-alive
                                  Access-Control-Allow-Origin: https://ipw.cn
                                  strict-transport-security: max-age=16070400;preload
                                  cf-cache-status: DYNAMIC
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=37VmvXPbEgV3GOq6UWc%2BtBc6PRESlM6Ih5ktsDYrKfH5mYRDo341oiKAHB9MEZJZ%2BazfoGnNEFYK%2FxnhZMcLi6iTfadYW0Q42e6whfzpQIZ0KnQAqmUrIij3cg%3D%3D"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 8f459211c91b41d9-EWR
                                  alt-svc: h3=":443"; ma=86400
                                  server-timing: cfL4;desc="?proto=TCP&rtt=3729&min_rtt=2026&rtt_var=4167&sent=3&recv=5&lost=0&retrans=0&sent_bytes=867&recv_bytes=166&delivery_rate=93249&cwnd=237&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                  Data Raw: 38 2e 34 36 2e 31 32 33 2e 31 38 39
                                  Data Ascii: 8.46.123.189
                                  Dec 19, 2024 08:10:07.728404999 CET83OUTGET / HTTP/1.1
                                  Connection: Keep-Alive
                                  User-Agent: curl/7.83.1
                                  Host: 4.ipw.cn
                                  Dec 19, 2024 08:10:08.214782953 CET876INHTTP/1.1 200 OK
                                  Date: Thu, 19 Dec 2024 07:10:08 GMT
                                  Content-Type: text/plain
                                  Content-Length: 12
                                  Connection: keep-alive
                                  Access-Control-Allow-Origin: https://ipw.cn
                                  strict-transport-security: max-age=16070400;preload
                                  cf-cache-status: DYNAMIC
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=XK2Utzq%2FP3MYBf%2BLZKU73NNqF8nYZ2li0UaBOFshqjEDRMPMeYOYsDSXsFEDSRknHnIXBGMqoKG5dJlXNCfspKDdaSrrJe%2BRD5CwZm8VcT5wZiK0zZr%2FjH%2B6xQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 8f4592335ead41d9-EWR
                                  alt-svc: h3=":443"; ma=86400
                                  server-timing: cfL4;desc="?proto=TCP&rtt=4914&min_rtt=2026&rtt_var=5495&sent=5&recv=7&lost=0&retrans=0&sent_bytes=1737&recv_bytes=249&delivery_rate=110530&cwnd=238&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                  Data Raw: 38 2e 34 36 2e 31 32 33 2e 31 38 39
                                  Data Ascii: 8.46.123.189
                                  Dec 19, 2024 08:10:14.861768961 CET83OUTGET / HTTP/1.1
                                  Connection: Keep-Alive
                                  User-Agent: curl/7.83.1
                                  Host: 4.ipw.cn
                                  Dec 19, 2024 08:10:15.368319988 CET878INHTTP/1.1 200 OK
                                  Date: Thu, 19 Dec 2024 07:10:15 GMT
                                  Content-Type: text/plain
                                  Content-Length: 12
                                  Connection: keep-alive
                                  Access-Control-Allow-Origin: https://ipw.cn
                                  strict-transport-security: max-age=16070400;preload
                                  cf-cache-status: DYNAMIC
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=iua%2Fr2vrWTxE4Lq9M3qnMI6U3dj%2Ftvn%2BuAzWMdex51nQeF1Qynda1DKEoDhYy3Qm9wtyRuY9sQ4Xj%2FfuTe9ZfcgjwBqj17j54QtGjvxe%2BdOq1OGCfQthMI2T%2Bg%3D%3D"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 8f45925fed4141d9-EWR
                                  alt-svc: h3=":443"; ma=86400
                                  server-timing: cfL4;desc="?proto=TCP&rtt=6082&min_rtt=2026&rtt_var=6457&sent=7&recv=9&lost=0&retrans=0&sent_bytes=2613&recv_bytes=332&delivery_rate=110530&cwnd=239&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                  Data Raw: 38 2e 34 36 2e 31 32 33 2e 31 38 39
                                  Data Ascii: 8.46.123.189
                                  Dec 19, 2024 08:10:21.853686094 CET83OUTGET / HTTP/1.1
                                  Connection: Keep-Alive
                                  User-Agent: curl/7.83.1
                                  Host: 4.ipw.cn
                                  Dec 19, 2024 08:10:22.348196983 CET875INHTTP/1.1 200 OK
                                  Date: Thu, 19 Dec 2024 07:10:22 GMT
                                  Content-Type: text/plain
                                  Content-Length: 12
                                  Connection: keep-alive
                                  Access-Control-Allow-Origin: https://ipw.cn
                                  strict-transport-security: max-age=16070400;preload
                                  cf-cache-status: DYNAMIC
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=8x%2BFefBSucJjovwEld4kyllr5x%2FYL5sLyTWElrtyB%2Fy0P16FFI2cCU5aqbowK756vS6BULcYFRzxmt4RfQMZTQNHwm0sKlMMJPhSMubQHYSs0vewP1PoKOFu%2BQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 8f45928b9edb41d9-EWR
                                  alt-svc: h3=":443"; ma=86400
                                  server-timing: cfL4;desc="?proto=TCP&rtt=7442&min_rtt=2026&rtt_var=7562&sent=9&recv=11&lost=0&retrans=0&sent_bytes=3491&recv_bytes=415&delivery_rate=110530&cwnd=240&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                  Data Raw: 38 2e 34 36 2e 31 32 33 2e 31 38 39
                                  Data Ascii: 8.46.123.189
                                  Dec 19, 2024 08:10:28.999010086 CET83OUTGET / HTTP/1.1
                                  Connection: Keep-Alive
                                  User-Agent: curl/7.83.1
                                  Host: 4.ipw.cn
                                  Dec 19, 2024 08:10:29.502334118 CET878INHTTP/1.1 200 OK
                                  Date: Thu, 19 Dec 2024 07:10:29 GMT
                                  Content-Type: text/plain
                                  Content-Length: 12
                                  Connection: keep-alive
                                  Access-Control-Allow-Origin: https://ipw.cn
                                  strict-transport-security: max-age=16070400;preload
                                  cf-cache-status: DYNAMIC
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=O1TQOSUzt7LWhJ%2BruMH557zg%2FsB7IXKaCZB4ydjJyH6%2Fap9wiFIqLLPooanodbznEQrUD1lhBcDFL39oDycrHlCBEm6uV1gtrJ4N%2BaqOL%2FXIuFEIgo8BoeaWWg%3D%3D"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 8f4592b8485f41d9-EWR
                                  alt-svc: h3=":443"; ma=86400
                                  server-timing: cfL4;desc="?proto=TCP&rtt=9222&min_rtt=2026&rtt_var=9233&sent=11&recv=13&lost=0&retrans=0&sent_bytes=4366&recv_bytes=498&delivery_rate=110530&cwnd=241&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                  Data Raw: 38 2e 34 36 2e 31 32 33 2e 31 38 39
                                  Data Ascii: 8.46.123.189
                                  Dec 19, 2024 08:10:36.087780952 CET83OUTGET / HTTP/1.1
                                  Connection: Keep-Alive
                                  User-Agent: curl/7.83.1
                                  Host: 4.ipw.cn
                                  Dec 19, 2024 08:10:36.583295107 CET870INHTTP/1.1 200 OK
                                  Date: Thu, 19 Dec 2024 07:10:36 GMT
                                  Content-Type: text/plain
                                  Content-Length: 12
                                  Connection: keep-alive
                                  Access-Control-Allow-Origin: https://ipw.cn
                                  strict-transport-security: max-age=16070400;preload
                                  cf-cache-status: DYNAMIC
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=nOPIyYkJhtfTtAWR3UjQEBVm8vLW6sr4EMUUO9jOy2PLDwEOKGveIzX9GOWHI71NGv8IQjn5UPASer9LOnLRRKFjYOVYmD55buuNk1V1ZopmjhC0wtYGfHb31A%3D%3D"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 8f4592e4884a41d9-EWR
                                  alt-svc: h3=":443"; ma=86400
                                  server-timing: cfL4;desc="?proto=TCP&rtt=11321&min_rtt=2026&rtt_var=11121&sent=13&recv=15&lost=0&retrans=0&sent_bytes=5244&recv_bytes=581&delivery_rate=110530&cwnd=242&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                  Data Raw: 38 2e 34 36 2e 31 32 33 2e 31 38 39
                                  Data Ascii: 8.46.123.189
                                  Dec 19, 2024 08:10:43.119726896 CET83OUTGET / HTTP/1.1
                                  Connection: Keep-Alive
                                  User-Agent: curl/7.83.1
                                  Host: 4.ipw.cn
                                  Dec 19, 2024 08:10:43.613964081 CET876INHTTP/1.1 200 OK
                                  Date: Thu, 19 Dec 2024 07:10:43 GMT
                                  Content-Type: text/plain
                                  Content-Length: 12
                                  Connection: keep-alive
                                  Access-Control-Allow-Origin: https://ipw.cn
                                  strict-transport-security: max-age=16070400;preload
                                  cf-cache-status: DYNAMIC
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=cpy6JgvVyCr6GQFU4I1jPmcM6UFpz%2FiyPEKxUZqTE3GHCctWl7WBdYmZOYxr0zwAZ26MZYZCM14CtAKTw5EnCLtzDBozYdaS1Ko%2F9vkiPSBpRP34fOE60%2FmkeQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 8f4593108e5041d9-EWR
                                  alt-svc: h3=":443"; ma=86400
                                  server-timing: cfL4;desc="?proto=TCP&rtt=12700&min_rtt=2026&rtt_var=11100&sent=15&recv=17&lost=0&retrans=0&sent_bytes=6114&recv_bytes=664&delivery_rate=110530&cwnd=243&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                  Data Raw: 38 2e 34 36 2e 31 32 33 2e 31 38 39
                                  Data Ascii: 8.46.123.189
                                  Dec 19, 2024 08:10:50.198714972 CET83OUTGET / HTTP/1.1
                                  Connection: Keep-Alive
                                  User-Agent: curl/7.83.1
                                  Host: 4.ipw.cn
                                  Dec 19, 2024 08:10:50.702821016 CET880INHTTP/1.1 200 OK
                                  Date: Thu, 19 Dec 2024 07:10:50 GMT
                                  Content-Type: text/plain
                                  Content-Length: 12
                                  Connection: keep-alive
                                  Access-Control-Allow-Origin: https://ipw.cn
                                  strict-transport-security: max-age=16070400;preload
                                  cf-cache-status: DYNAMIC
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ZthPQ0V69j445g%2BPaI6lfpm%2B0CQnyfRxy%2B%2BYP3hCFwnBj120vkmwjJVFrcx7IUic4YCu8rErFUOswR3d1IRQnzfKdRwHmLpHpm%2FvmDRZYMOp8WOPZbaekAtdxg%3D%3D"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 8f45933ccba341d9-EWR
                                  alt-svc: h3=":443"; ma=86400
                                  server-timing: cfL4;desc="?proto=TCP&rtt=13874&min_rtt=2026&rtt_var=10673&sent=17&recv=19&lost=0&retrans=0&sent_bytes=6990&recv_bytes=747&delivery_rate=110530&cwnd=244&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                  Data Raw: 38 2e 34 36 2e 31 32 33 2e 31 38 39
                                  Data Ascii: 8.46.123.189
                                  Dec 19, 2024 08:10:57.243702888 CET83OUTGET / HTTP/1.1
                                  Connection: Keep-Alive
                                  User-Agent: curl/7.83.1
                                  Host: 4.ipw.cn


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  1192.168.2.549772104.21.42.47801784C:\Windows\SysWOW64\rundll32.exe
                                  TimestampBytes transferredDirectionData
                                  Dec 19, 2024 08:09:58.950890064 CET83OUTGET / HTTP/1.1
                                  Connection: Keep-Alive
                                  User-Agent: curl/7.83.1
                                  Host: 4.ipw.cn
                                  Dec 19, 2024 08:10:00.162676096 CET870INHTTP/1.1 200 OK
                                  Date: Thu, 19 Dec 2024 07:10:00 GMT
                                  Content-Type: text/plain
                                  Content-Length: 12
                                  Connection: keep-alive
                                  Access-Control-Allow-Origin: https://ipw.cn
                                  strict-transport-security: max-age=16070400;preload
                                  cf-cache-status: DYNAMIC
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=e4Vl%2FwLZGrkBI%2BeUKWn%2BlWvowyduwLjBWoco%2Bra56MUqQ1YxLYi0JMM2J%2B23tNFD1fUVCGfrb87B%2FGVnaQNu77bIsH2wWQ8Cqe3Cy0TBnSOv15GJulsX%2FJ0OAg%3D%3D"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 8f459200db6b42cc-EWR
                                  alt-svc: h3=":443"; ma=86400
                                  server-timing: cfL4;desc="?proto=TCP&rtt=1573&min_rtt=1573&rtt_var=786&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=83&delivery_rate=0&cwnd=167&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                  Data Raw: 38 2e 34 36 2e 31 32 33 2e 31 38 39
                                  Data Ascii: 8.46.123.189
                                  Dec 19, 2024 08:10:04.722996950 CET83OUTGET / HTTP/1.1
                                  Connection: Keep-Alive
                                  User-Agent: curl/7.83.1
                                  Host: 4.ipw.cn
                                  Dec 19, 2024 08:10:05.227884054 CET871INHTTP/1.1 200 OK
                                  Date: Thu, 19 Dec 2024 07:10:05 GMT
                                  Content-Type: text/plain
                                  Content-Length: 12
                                  Connection: keep-alive
                                  Access-Control-Allow-Origin: https://ipw.cn
                                  strict-transport-security: max-age=16070400;preload
                                  cf-cache-status: DYNAMIC
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=fmOyQ%2FHQwPZ26CDbVAesYRuPSk2KctZ6lQDvxXcCLJWU%2F5QQZKFwJVGdZkMfAMTxSILAVJKS76P2ozsKMeKN9BrEoPjr5GsoFSr%2BFHqyKSDxjTodHVkIxHbj1w%3D%3D"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 8f4592208d0a42cc-EWR
                                  alt-svc: h3=":443"; ma=86400
                                  server-timing: cfL4;desc="?proto=TCP&rtt=7624&min_rtt=1573&rtt_var=12692&sent=3&recv=5&lost=0&retrans=0&sent_bytes=870&recv_bytes=166&delivery_rate=29209&cwnd=168&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                  Data Raw: 38 2e 34 36 2e 31 32 33 2e 31 38 39
                                  Data Ascii: 8.46.123.189
                                  Dec 19, 2024 08:10:11.522144079 CET83OUTGET / HTTP/1.1
                                  Connection: Keep-Alive
                                  User-Agent: curl/7.83.1
                                  Host: 4.ipw.cn
                                  Dec 19, 2024 08:10:12.013550997 CET869INHTTP/1.1 200 OK
                                  Date: Thu, 19 Dec 2024 07:10:11 GMT
                                  Content-Type: text/plain
                                  Content-Length: 12
                                  Connection: keep-alive
                                  Access-Control-Allow-Origin: https://ipw.cn
                                  strict-transport-security: max-age=16070400;preload
                                  cf-cache-status: DYNAMIC
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=oca6zypTmxKrIyIA9l9bAMf0Lj137UHB4P8YWp94DLY365roK%2FaDNxmSF2KUS45u3PsGk8CQtndtTFbm7szsGPgTeKdp6mlAjiaxUJEFqza9XFpGiEJpQCAFvg%3D%3D"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 8f45924b0afd42cc-EWR
                                  alt-svc: h3=":443"; ma=86400
                                  server-timing: cfL4;desc="?proto=TCP&rtt=12570&min_rtt=1573&rtt_var=19411&sent=5&recv=7&lost=0&retrans=0&sent_bytes=1741&recv_bytes=249&delivery_rate=30939&cwnd=169&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                  Data Raw: 38 2e 34 36 2e 31 32 33 2e 31 38 39
                                  Data Ascii: 8.46.123.189
                                  Dec 19, 2024 08:10:18.480043888 CET83OUTGET / HTTP/1.1
                                  Connection: Keep-Alive
                                  User-Agent: curl/7.83.1
                                  Host: 4.ipw.cn
                                  Dec 19, 2024 08:10:18.985959053 CET877INHTTP/1.1 200 OK
                                  Date: Thu, 19 Dec 2024 07:10:18 GMT
                                  Content-Type: text/plain
                                  Content-Length: 12
                                  Connection: keep-alive
                                  Access-Control-Allow-Origin: https://ipw.cn
                                  strict-transport-security: max-age=16070400;preload
                                  cf-cache-status: DYNAMIC
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=3hz5AGLbDHIVKZXVraH27zr4H6sCD8WvuwHLsKI%2BK8IEECXefWcoljHKC5V4kL0v8MfI6Ffs6jMfOJOz68C5%2FoK0KZjESPIbKeFw%2FjFOg%2F2ieG1SlPB3QDCU5Q%3D%3D"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 8f45927688d842cc-EWR
                                  alt-svc: h3=":443"; ma=86400
                                  server-timing: cfL4;desc="?proto=TCP&rtt=11196&min_rtt=1551&rtt_var=17305&sent=8&recv=9&lost=0&retrans=0&sent_bytes=2610&recv_bytes=332&delivery_rate=1846932&cwnd=171&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                  Data Raw: 38 2e 34 36 2e 31 32 33 2e 31 38 39
                                  Data Ascii: 8.46.123.189
                                  Dec 19, 2024 08:10:25.493524075 CET83OUTGET / HTTP/1.1
                                  Connection: Keep-Alive
                                  User-Agent: curl/7.83.1
                                  Host: 4.ipw.cn
                                  Dec 19, 2024 08:10:26.000999928 CET877INHTTP/1.1 200 OK
                                  Date: Thu, 19 Dec 2024 07:10:25 GMT
                                  Content-Type: text/plain
                                  Content-Length: 12
                                  Connection: keep-alive
                                  Access-Control-Allow-Origin: https://ipw.cn
                                  strict-transport-security: max-age=16070400;preload
                                  cf-cache-status: DYNAMIC
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Yuhe9X59cRpddksYpyiUPH8Sm4kwwV8BMIF29Mcwc2ya76LiCizrx%2BroyHkyHUun4ddE9HcGhxB85%2BSwXOq%2FwInRjJO8yjvjAPFWhdNc6y5uKpTBxl77ZDvljw%3D%3D"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 8f4592a25c1642cc-EWR
                                  alt-svc: h3=":443"; ma=86400
                                  server-timing: cfL4;desc="?proto=TCP&rtt=16714&min_rtt=1551&rtt_var=24015&sent=10&recv=11&lost=0&retrans=0&sent_bytes=3487&recv_bytes=415&delivery_rate=1846932&cwnd=172&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                  Data Raw: 38 2e 34 36 2e 31 32 33 2e 31 38 39
                                  Data Ascii: 8.46.123.189
                                  Dec 19, 2024 08:10:32.524966955 CET83OUTGET / HTTP/1.1
                                  Connection: Keep-Alive
                                  User-Agent: curl/7.83.1
                                  Host: 4.ipw.cn
                                  Dec 19, 2024 08:10:33.032080889 CET883INHTTP/1.1 200 OK
                                  Date: Thu, 19 Dec 2024 07:10:32 GMT
                                  Content-Type: text/plain
                                  Content-Length: 12
                                  Connection: keep-alive
                                  Access-Control-Allow-Origin: https://ipw.cn
                                  strict-transport-security: max-age=16070400;preload
                                  cf-cache-status: DYNAMIC
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=pMPOujHtViLEBS2lzf4dN%2B16SReI5jE3efhiXTT6DRQNxFY36UOo%2BPsWzGrt75g%2FKimQ%2BRjPjeQ84%2FJoNCfFeo8ieXshZiR8D4gITSdiJqMDrAubh%2FYdwtbkWw%3D%3D"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 8f4592ce4d7742cc-EWR
                                  alt-svc: h3=":443"; ma=86400
                                  server-timing: cfL4;desc="?proto=TCP&rtt=21605&min_rtt=1551&rtt_var=27794&sent=12&recv=13&lost=0&retrans=0&sent_bytes=4364&recv_bytes=498&delivery_rate=1846932&cwnd=173&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                  Data Raw: 38 2e 34 36 2e 31 32 33 2e 31 38 39
                                  Data Ascii: 8.46.123.189
                                  Dec 19, 2024 08:10:39.533737898 CET83OUTGET / HTTP/1.1
                                  Connection: Keep-Alive
                                  User-Agent: curl/7.83.1
                                  Host: 4.ipw.cn
                                  Dec 19, 2024 08:10:40.027842999 CET879INHTTP/1.1 200 OK
                                  Date: Thu, 19 Dec 2024 07:10:39 GMT
                                  Content-Type: text/plain
                                  Content-Length: 12
                                  Connection: keep-alive
                                  Access-Control-Allow-Origin: https://ipw.cn
                                  strict-transport-security: max-age=16070400;preload
                                  cf-cache-status: DYNAMIC
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=4IDOPF9Nmf2LZRaKRMCTY%2Bc6NJ8Z%2FCD6TON5DXUdijilmW9%2BubGyAvhSb%2BHpEfbJu0Eq6SwlHX3ltQqAXkVEjdrJEwrJkUw0KT69jI6ee4BVGugX6MYt5vdDYA%3D%3D"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 8f4592fa1f5b42cc-EWR
                                  alt-svc: h3=":443"; ma=86400
                                  server-timing: cfL4;desc="?proto=TCP&rtt=25931&min_rtt=1551&rtt_var=29496&sent=14&recv=15&lost=0&retrans=0&sent_bytes=5247&recv_bytes=581&delivery_rate=1846932&cwnd=174&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                  Data Raw: 38 2e 34 36 2e 31 32 33 2e 31 38 39
                                  Data Ascii: 8.46.123.189
                                  Dec 19, 2024 08:10:46.762511969 CET83OUTGET / HTTP/1.1
                                  Connection: Keep-Alive
                                  User-Agent: curl/7.83.1
                                  Host: 4.ipw.cn
                                  Dec 19, 2024 08:10:47.254827023 CET875INHTTP/1.1 200 OK
                                  Date: Thu, 19 Dec 2024 07:10:47 GMT
                                  Content-Type: text/plain
                                  Content-Length: 12
                                  Connection: keep-alive
                                  Access-Control-Allow-Origin: https://ipw.cn
                                  strict-transport-security: max-age=16070400;preload
                                  cf-cache-status: DYNAMIC
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ADE7O88h36YblLOZ4go21QT3qqpCSbb92cPxC41byZFb7I2NecUnR4%2FEd1%2Fif5MCGUfAxishcDuL6Vtdbvws9eMq05ySrNoxBN7OxmgRNHc3gg8tOLzv3bHeew%3D%3D"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 8f4593274a0c42cc-EWR
                                  alt-svc: h3=":443"; ma=86400
                                  server-timing: cfL4;desc="?proto=TCP&rtt=28316&min_rtt=1551&rtt_var=26892&sent=16&recv=17&lost=0&retrans=0&sent_bytes=6126&recv_bytes=664&delivery_rate=1846932&cwnd=175&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                  Data Raw: 38 2e 34 36 2e 31 32 33 2e 31 38 39
                                  Data Ascii: 8.46.123.189
                                  Dec 19, 2024 08:10:53.686009884 CET83OUTGET / HTTP/1.1
                                  Connection: Keep-Alive
                                  User-Agent: curl/7.83.1
                                  Host: 4.ipw.cn
                                  Dec 19, 2024 08:10:54.194869995 CET875INHTTP/1.1 200 OK
                                  Date: Thu, 19 Dec 2024 07:10:54 GMT
                                  Content-Type: text/plain
                                  Content-Length: 12
                                  Connection: keep-alive
                                  Access-Control-Allow-Origin: https://ipw.cn
                                  strict-transport-security: max-age=16070400;preload
                                  cf-cache-status: DYNAMIC
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=8PRWHKv1Xlb9G7oKs9EZa7yMXfuNiul%2FG%2BBkJqrpDa386w2IpLM0gN3JZ7LEU0MKBHIYkwMSy79v1WebUnsqER2Ja6e50c6qdD2ErRyYyVJWjDHbroZrvuvvrg%3D%3D"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 8f4593528ba942cc-EWR
                                  alt-svc: h3=":443"; ma=86400
                                  server-timing: cfL4;desc="?proto=TCP&rtt=31346&min_rtt=1551&rtt_var=26229&sent=18&recv=19&lost=0&retrans=0&sent_bytes=7001&recv_bytes=747&delivery_rate=1846932&cwnd=175&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                  Data Raw: 38 2e 34 36 2e 31 32 33 2e 31 38 39
                                  Data Ascii: 8.46.123.189
                                  Dec 19, 2024 08:11:01.049078941 CET83OUTGET / HTTP/1.1
                                  Connection: Keep-Alive
                                  User-Agent: curl/7.83.1
                                  Host: 4.ipw.cn


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  2192.168.2.549931122.226.191.212801784C:\Windows\SysWOW64\rundll32.exe
                                  TimestampBytes transferredDirectionData
                                  Dec 19, 2024 08:10:58.993473053 CET86OUTGET / HTTP/1.1
                                  Connection: Keep-Alive
                                  User-Agent: curl/7.83.1
                                  Host: ifconfig.cc
                                  Dec 19, 2024 08:11:00.529135942 CET866INHTTP/1.1 200 OK
                                  Date: Thu, 19 Dec 2024 07:10:55 GMT
                                  Content-Type: text/html; charset=UTF-8
                                  Transfer-Encoding: chunked
                                  Connection: keep-alive
                                  Set-Cookie: http_waf_cookie=695dd774-b5c5-43027384467a05de4744e7dda4a7581704d4; Expires=1734599455; Path=/; HttpOnly
                                  Vary: Accept-Encoding
                                  X-Frame-Options: SAMEORIGIN
                                  Strict-Transport-Security: max-age=31536000;includeSubdomains;preload
                                  Web-Server: QC-BJ-QL03
                                  Server: WAF
                                  Set-Cookie: sl-session=yMifWIQYZWeql1bTCWzIBA==; Path=/; Max-Age=86400; HttpOnly
                                  Set-Cookie: bc_bot_session=1734592255f30c26aaaf2e157f; Max-Age=3600; Domain=ifconfig.cc; Path=/; SameSite=Lax
                                  Set-Cookie: bc_bot_token=; Max-Age=0; Domain=ifconfig.cc; Path=/; SameSite=Lax
                                  Set-Cookie: bc_bot_rules=; Max-Age=0; Domain=ifconfig.cc; Path=/; SameSite=Lax
                                  X-Request-Id: 1d426d3718117c46e1b6fa16abac869d
                                  X-Cache: BYPASS
                                  Data Raw: 63 0d 0a 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a 30 0d 0a 0d 0a
                                  Data Ascii: c8.46.123.1890
                                  Dec 19, 2024 08:11:01.294843912 CET86OUTGET / HTTP/1.1
                                  Connection: Keep-Alive
                                  User-Agent: curl/7.83.1
                                  Host: ifconfig.cc
                                  Dec 19, 2024 08:11:01.848136902 CET866INHTTP/1.1 200 OK
                                  Date: Thu, 19 Dec 2024 07:10:57 GMT
                                  Content-Type: text/html; charset=UTF-8
                                  Transfer-Encoding: chunked
                                  Connection: keep-alive
                                  Set-Cookie: http_waf_cookie=ee506912-b49f-437811b53bb9bf6698f04a6f5dc9230f37e9; Expires=1734599457; Path=/; HttpOnly
                                  Vary: Accept-Encoding
                                  X-Frame-Options: SAMEORIGIN
                                  Strict-Transport-Security: max-age=31536000;includeSubdomains;preload
                                  Web-Server: QC-BJ-QL03
                                  Server: WAF
                                  Set-Cookie: sl-session=ANj3MIUYZWeEHHcjJ6yyvQ==; Path=/; Max-Age=86400; HttpOnly
                                  Set-Cookie: bc_bot_session=1734592257ea203cbee8f654f1; Max-Age=3600; Domain=ifconfig.cc; Path=/; SameSite=Lax
                                  Set-Cookie: bc_bot_token=; Max-Age=0; Domain=ifconfig.cc; Path=/; SameSite=Lax
                                  Set-Cookie: bc_bot_rules=; Max-Age=0; Domain=ifconfig.cc; Path=/; SameSite=Lax
                                  X-Request-Id: 4ed0956190a4ca510a2b3320ff97e765
                                  X-Cache: BYPASS
                                  Data Raw: 63 0d 0a 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a 30 0d 0a 0d 0a
                                  Data Ascii: c8.46.123.1890
                                  Dec 19, 2024 08:11:05.299588919 CET86OUTGET / HTTP/1.1
                                  Connection: Keep-Alive
                                  User-Agent: curl/7.83.1
                                  Host: ifconfig.cc
                                  Dec 19, 2024 08:11:05.852078915 CET866INHTTP/1.1 200 OK
                                  Date: Thu, 19 Dec 2024 07:11:01 GMT
                                  Content-Type: text/html; charset=UTF-8
                                  Transfer-Encoding: chunked
                                  Connection: keep-alive
                                  Set-Cookie: http_waf_cookie=863ed349-123d-4504343d64d05ab929b51a41cc234c53370b; Expires=1734599461; Path=/; HttpOnly
                                  Vary: Accept-Encoding
                                  X-Frame-Options: SAMEORIGIN
                                  Strict-Transport-Security: max-age=31536000;includeSubdomains;preload
                                  Web-Server: QC-BJ-QL03
                                  Server: WAF
                                  Set-Cookie: sl-session=V2m+CokYZWed1f1vAZ07Fg==; Path=/; Max-Age=86400; HttpOnly
                                  Set-Cookie: bc_bot_session=173459226106e742ded5df2fb3; Max-Age=3600; Domain=ifconfig.cc; Path=/; SameSite=Lax
                                  Set-Cookie: bc_bot_token=; Max-Age=0; Domain=ifconfig.cc; Path=/; SameSite=Lax
                                  Set-Cookie: bc_bot_rules=; Max-Age=0; Domain=ifconfig.cc; Path=/; SameSite=Lax
                                  X-Request-Id: 886ae38966b7b013fee00b8a78d47650
                                  X-Cache: BYPASS
                                  Data Raw: 63 0d 0a 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a 30 0d 0a 0d 0a
                                  Data Ascii: c8.46.123.1890
                                  Dec 19, 2024 08:11:09.295010090 CET86OUTGET / HTTP/1.1
                                  Connection: Keep-Alive
                                  User-Agent: curl/7.83.1
                                  Host: ifconfig.cc
                                  Dec 19, 2024 08:11:09.848345041 CET866INHTTP/1.1 200 OK
                                  Date: Thu, 19 Dec 2024 07:11:05 GMT
                                  Content-Type: text/html; charset=UTF-8
                                  Transfer-Encoding: chunked
                                  Connection: keep-alive
                                  Set-Cookie: http_waf_cookie=6622b4f8-a7a9-49bf5c72fac2925f4ef558527ad2e508ddb0; Expires=1734599465; Path=/; HttpOnly
                                  Vary: Accept-Encoding
                                  X-Frame-Options: SAMEORIGIN
                                  Strict-Transport-Security: max-age=31536000;includeSubdomains;preload
                                  Web-Server: QC-BJ-QL03
                                  Server: WAF
                                  Set-Cookie: sl-session=e0r1CI0YZWd5W3faapojww==; Path=/; Max-Age=86400; HttpOnly
                                  Set-Cookie: bc_bot_session=173459226591348cf4e88a8b87; Max-Age=3600; Domain=ifconfig.cc; Path=/; SameSite=Lax
                                  Set-Cookie: bc_bot_token=; Max-Age=0; Domain=ifconfig.cc; Path=/; SameSite=Lax
                                  Set-Cookie: bc_bot_rules=; Max-Age=0; Domain=ifconfig.cc; Path=/; SameSite=Lax
                                  X-Request-Id: 8aadebaf5d1d4813ef9e20e230ceab90
                                  X-Cache: BYPASS
                                  Data Raw: 63 0d 0a 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a 30 0d 0a 0d 0a
                                  Data Ascii: c8.46.123.1890
                                  Dec 19, 2024 08:11:29.294819117 CET86OUTGET / HTTP/1.1
                                  Connection: Keep-Alive
                                  User-Agent: curl/7.83.1
                                  Host: ifconfig.cc
                                  Dec 19, 2024 08:11:29.889605999 CET866INHTTP/1.1 200 OK
                                  Date: Thu, 19 Dec 2024 07:11:25 GMT
                                  Content-Type: text/html; charset=UTF-8
                                  Transfer-Encoding: chunked
                                  Connection: keep-alive
                                  Set-Cookie: http_waf_cookie=128affdd-22bf-43a2a4d7e19a71961288db2611ca7bc59f20; Expires=1734599485; Path=/; HttpOnly
                                  Vary: Accept-Encoding
                                  X-Frame-Options: SAMEORIGIN
                                  Strict-Transport-Security: max-age=31536000;includeSubdomains;preload
                                  Web-Server: QC-BJ-QL03
                                  Server: WAF
                                  Set-Cookie: sl-session=odY5SaEYZWfT92HB9ldVBQ==; Path=/; Max-Age=86400; HttpOnly
                                  Set-Cookie: bc_bot_session=1734592285cad3338d4253610a; Max-Age=3600; Domain=ifconfig.cc; Path=/; SameSite=Lax
                                  Set-Cookie: bc_bot_token=; Max-Age=0; Domain=ifconfig.cc; Path=/; SameSite=Lax
                                  Set-Cookie: bc_bot_rules=; Max-Age=0; Domain=ifconfig.cc; Path=/; SameSite=Lax
                                  X-Request-Id: cd3df165ca78a2f0b32161ae1c381453
                                  X-Cache: BYPASS
                                  Data Raw: 63 0d 0a 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a 30 0d 0a 0d 0a
                                  Data Ascii: c8.46.123.1890


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  3192.168.2.549947104.21.42.47801784C:\Windows\SysWOW64\rundll32.exe
                                  TimestampBytes transferredDirectionData
                                  Dec 19, 2024 08:11:04.760202885 CET83OUTGET / HTTP/1.1
                                  Connection: Keep-Alive
                                  User-Agent: curl/7.83.1
                                  Host: 4.ipw.cn


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  4192.168.2.549956104.21.42.47801784C:\Windows\SysWOW64\rundll32.exe
                                  TimestampBytes transferredDirectionData
                                  Dec 19, 2024 08:11:08.374138117 CET83OUTGET / HTTP/1.1
                                  Connection: Keep-Alive
                                  User-Agent: curl/7.83.1
                                  Host: 4.ipw.cn


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  5192.168.2.549966104.21.42.47801784C:\Windows\SysWOW64\rundll32.exe
                                  TimestampBytes transferredDirectionData
                                  Dec 19, 2024 08:11:11.731646061 CET83OUTGET / HTTP/1.1
                                  Connection: Keep-Alive
                                  User-Agent: curl/7.83.1
                                  Host: 4.ipw.cn
                                  Dec 19, 2024 08:11:12.989423037 CET864INHTTP/1.1 200 OK
                                  Date: Thu, 19 Dec 2024 07:11:12 GMT
                                  Content-Type: text/plain
                                  Content-Length: 12
                                  Connection: keep-alive
                                  Access-Control-Allow-Origin: https://ipw.cn
                                  strict-transport-security: max-age=16070400;preload
                                  cf-cache-status: DYNAMIC
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=6H%2B2rKB6eVUb3XZMS5qBH04fFGfOiShvn0y%2B0gSji4H1Z3KVNyk3ZgYgcRRk7THeOwySuRIpUj2wAAocwWiQhRhlq%2F7u3a4bJj%2BJIjsJ7NYkAYDrX6BVJozj8Q%3D%3D"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 8f4593c82a6b4251-EWR
                                  alt-svc: h3=":443"; ma=86400
                                  server-timing: cfL4;desc="?proto=TCP&rtt=1598&min_rtt=1598&rtt_var=799&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=83&delivery_rate=0&cwnd=246&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                  Data Raw: 38 2e 34 36 2e 31 32 33 2e 31 38 39
                                  Data Ascii: 8.46.123.189
                                  Dec 19, 2024 08:11:14.948231936 CET83OUTGET / HTTP/1.1
                                  Connection: Keep-Alive
                                  User-Agent: curl/7.83.1
                                  Host: 4.ipw.cn
                                  Dec 19, 2024 08:11:15.454953909 CET880INHTTP/1.1 200 OK
                                  Date: Thu, 19 Dec 2024 07:11:15 GMT
                                  Content-Type: text/plain
                                  Content-Length: 12
                                  Connection: keep-alive
                                  Access-Control-Allow-Origin: https://ipw.cn
                                  strict-transport-security: max-age=16070400;preload
                                  cf-cache-status: DYNAMIC
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=BN5JWNVWACb%2F%2FdoTqNv012Nz%2FzeDSbkPLe%2FWdq6Sf%2Bmgi5ueDJq%2F2UL6jaxsD%2FZEACDNr5iF1mKs7i3IqRASTfmzsfmnLRzaK%2BaC1B7eoguwRLG3eiN2pA2vnw%3D%3D"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 8f4593d76f454251-EWR
                                  alt-svc: h3=":443"; ma=86400
                                  server-timing: cfL4;desc="?proto=TCP&rtt=4132&min_rtt=1598&rtt_var=5668&sent=3&recv=5&lost=0&retrans=0&sent_bytes=864&recv_bytes=166&delivery_rate=66748&cwnd=247&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                  Data Raw: 38 2e 34 36 2e 31 32 33 2e 31 38 39
                                  Data Ascii: 8.46.123.189
                                  Dec 19, 2024 08:11:18.569248915 CET83OUTGET / HTTP/1.1
                                  Connection: Keep-Alive
                                  User-Agent: curl/7.83.1
                                  Host: 4.ipw.cn
                                  Dec 19, 2024 08:11:19.078119993 CET877INHTTP/1.1 200 OK
                                  Date: Thu, 19 Dec 2024 07:11:18 GMT
                                  Content-Type: text/plain
                                  Content-Length: 12
                                  Connection: keep-alive
                                  Access-Control-Allow-Origin: https://ipw.cn
                                  strict-transport-security: max-age=16070400;preload
                                  cf-cache-status: DYNAMIC
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=rFfSQRId%2BFyNUizarg2AXEsJ%2B5a%2FtQNwFlK5P%2FPDPJCglrppwvxQ3H%2FQ19U8yE4tyPFu1KgjDo9FF9c2s7O%2BKKZnIDv58UcOLxsLB5qNlxjesCh30zeNqQqR5Q%3D%3D"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 8f4593ee1fde4251-EWR
                                  alt-svc: h3=":443"; ma=86400
                                  server-timing: cfL4;desc="?proto=TCP&rtt=6730&min_rtt=1598&rtt_var=9447&sent=5&recv=7&lost=0&retrans=0&sent_bytes=1744&recv_bytes=249&delivery_rate=66748&cwnd=248&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                  Data Raw: 38 2e 34 36 2e 31 32 33 2e 31 38 39
                                  Data Ascii: 8.46.123.189
                                  Dec 19, 2024 08:11:22.017446995 CET83OUTGET / HTTP/1.1
                                  Connection: Keep-Alive
                                  User-Agent: curl/7.83.1
                                  Host: 4.ipw.cn
                                  Dec 19, 2024 08:11:22.511931896 CET872INHTTP/1.1 200 OK
                                  Date: Thu, 19 Dec 2024 07:11:22 GMT
                                  Content-Type: text/plain
                                  Content-Length: 12
                                  Connection: keep-alive
                                  Access-Control-Allow-Origin: https://ipw.cn
                                  strict-transport-security: max-age=16070400;preload
                                  cf-cache-status: DYNAMIC
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=OP13%2FxThhzB5MEBaj2Qkq3PSzawNkaPd1CfkpJ6NoNg97vWJ8LnhIzmIdcK0AZ2H8gNNpbfxq1%2FzYyxEFX9Q02oCoZp2aXtTvVD74IxCLl%2BHMMRvGO4MNTFmzA%3D%3D"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 8f45940398114251-EWR
                                  alt-svc: h3=":443"; ma=86400
                                  server-timing: cfL4;desc="?proto=TCP&rtt=7300&min_rtt=1598&rtt_var=8225&sent=7&recv=9&lost=0&retrans=0&sent_bytes=2621&recv_bytes=332&delivery_rate=129329&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                  Data Raw: 38 2e 34 36 2e 31 32 33 2e 31 38 39
                                  Data Ascii: 8.46.123.189
                                  Dec 19, 2024 08:11:25.619628906 CET83OUTGET / HTTP/1.1
                                  Connection: Keep-Alive
                                  User-Agent: curl/7.83.1
                                  Host: 4.ipw.cn
                                  Dec 19, 2024 08:11:26.113868952 CET879INHTTP/1.1 200 OK
                                  Date: Thu, 19 Dec 2024 07:11:25 GMT
                                  Content-Type: text/plain
                                  Content-Length: 12
                                  Connection: keep-alive
                                  Access-Control-Allow-Origin: https://ipw.cn
                                  strict-transport-security: max-age=16070400;preload
                                  cf-cache-status: DYNAMIC
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=GA%2Fdp54IkPAwMZ8pnjulWVJc6SWtXKQ3fP9BfO7j4rgzg148drpAXmFtpbBIHd%2FZAtPsNiI957bQs%2Ft0F%2Fgb2D802zywG5r%2FGQiopbOSdIErNEfgk%2F23mv2oaA%3D%3D"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 8f45941a29f64251-EWR
                                  alt-svc: h3=":443"; ma=86400
                                  server-timing: cfL4;desc="?proto=TCP&rtt=8262&min_rtt=1598&rtt_var=8093&sent=9&recv=11&lost=0&retrans=0&sent_bytes=3493&recv_bytes=415&delivery_rate=129329&cwnd=250&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                  Data Raw: 38 2e 34 36 2e 31 32 33 2e 31 38 39
                                  Data Ascii: 8.46.123.189
                                  Dec 19, 2024 08:11:29.094314098 CET83OUTGET / HTTP/1.1
                                  Connection: Keep-Alive
                                  User-Agent: curl/7.83.1
                                  Host: 4.ipw.cn


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  6192.168.2.550011104.21.42.47801784C:\Windows\SysWOW64\rundll32.exe
                                  TimestampBytes transferredDirectionData
                                  Dec 19, 2024 08:11:32.762868881 CET83OUTGET / HTTP/1.1
                                  Connection: Keep-Alive
                                  User-Agent: curl/7.83.1
                                  Host: 4.ipw.cn
                                  Dec 19, 2024 08:11:34.062380075 CET861INHTTP/1.1 200 OK
                                  Date: Thu, 19 Dec 2024 07:11:33 GMT
                                  Content-Type: text/plain
                                  Content-Length: 12
                                  Connection: keep-alive
                                  Access-Control-Allow-Origin: https://ipw.cn
                                  strict-transport-security: max-age=16070400;preload
                                  cf-cache-status: DYNAMIC
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ATBh5oSmGNUiDWiw9STGt1JWLenjl4TgY990ojI8Dg5GNy1XnRfoP7NlUhV6eaRxPb%2BDNhorTozbewE10O3aYsKq3%2FovqWS8ehrqekUVdQmesLkHZ9WKrnZdXA%3D%3D"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 8f45944b98ad4313-EWR
                                  alt-svc: h3=":443"; ma=86400
                                  server-timing: cfL4;desc="?proto=TCP&rtt=2473&min_rtt=2473&rtt_var=1236&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=83&delivery_rate=0&cwnd=250&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                  Data Raw: 38 2e 34 36 2e 31 32 33 2e 31 38 39
                                  Data Ascii: 8.46.123.189


                                  Click to jump to process

                                  Click to jump to process

                                  Click to dive into process behavior distribution

                                  Click to jump to process

                                  Target ID:0
                                  Start time:02:08:26
                                  Start date:19/12/2024
                                  Path:C:\Windows\System32\loaddll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:loaddll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll"
                                  Imagebase:0x4c0000
                                  File size:126'464 bytes
                                  MD5 hash:51E6071F9CBA48E79F10C84515AAE618
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:false

                                  Target ID:1
                                  Start time:02:08:26
                                  Start date:19/12/2024
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Imagebase:0x7ff6d64d0000
                                  File size:862'208 bytes
                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:false

                                  Target ID:2
                                  Start time:02:08:26
                                  Start date:19/12/2024
                                  Path:C:\Windows\SysWOW64\cmd.exe
                                  Wow64 process (32bit):true
                                  Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",#1
                                  Imagebase:0x790000
                                  File size:236'544 bytes
                                  MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:3
                                  Start time:02:08:26
                                  Start date:19/12/2024
                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:rundll32.exe C:\Users\user\Desktop\c2A6GRyAwn.dll,cef_add_cross_origin_whitelist_entry
                                  Imagebase:0xbb0000
                                  File size:61'440 bytes
                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Nitol, Description: Yara detected Nitol, Source: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Nitol, Description: Yara detected Nitol, Source: 00000003.00000002.3052963500.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                                  Reputation:high
                                  Has exited:true

                                  Target ID:4
                                  Start time:02:08:26
                                  Start date:19/12/2024
                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",#1
                                  Imagebase:0xbb0000
                                  File size:61'440 bytes
                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Nitol, Description: Yara detected Nitol, Source: 00000004.00000002.3008266392.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Nitol, Description: Yara detected Nitol, Source: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmp, Author: Joe Security
                                  Reputation:high
                                  Has exited:true

                                  Target ID:6
                                  Start time:02:08:29
                                  Start date:19/12/2024
                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:rundll32.exe C:\Users\user\Desktop\c2A6GRyAwn.dll,cef_add_web_plugin_directory
                                  Imagebase:0xbb0000
                                  File size:61'440 bytes
                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Nitol, Description: Yara detected Nitol, Source: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Nitol, Description: Yara detected Nitol, Source: 00000006.00000002.3054985603.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                                  Reputation:high
                                  Has exited:true

                                  Target ID:7
                                  Start time:02:08:33
                                  Start date:19/12/2024
                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:rundll32.exe C:\Users\user\Desktop\c2A6GRyAwn.dll,cef_add_web_plugin_path
                                  Imagebase:0xbb0000
                                  File size:61'440 bytes
                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:false

                                  Target ID:8
                                  Start time:02:08:33
                                  Start date:19/12/2024
                                  Path:C:\Windows\SysWOW64\wbem\WMIC.exe
                                  Wow64 process (32bit):true
                                  Commandline:wmic cpu get processorid
                                  Imagebase:0x430000
                                  File size:427'008 bytes
                                  MD5 hash:E2DE6500DE1148C7F6027AD50AC8B891
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:moderate
                                  Has exited:true

                                  Target ID:9
                                  Start time:02:08:33
                                  Start date:19/12/2024
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Imagebase:0x7ff6d64d0000
                                  File size:862'208 bytes
                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:10
                                  Start time:02:08:33
                                  Start date:19/12/2024
                                  Path:C:\Windows\SysWOW64\wbem\WMIC.exe
                                  Wow64 process (32bit):true
                                  Commandline:wmic cpu get processorid
                                  Imagebase:0x430000
                                  File size:427'008 bytes
                                  MD5 hash:E2DE6500DE1148C7F6027AD50AC8B891
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:11
                                  Start time:02:08:33
                                  Start date:19/12/2024
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Imagebase:0x7ff6d64d0000
                                  File size:862'208 bytes
                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:12
                                  Start time:02:08:37
                                  Start date:19/12/2024
                                  Path:C:\Windows\SysWOW64\wbem\WMIC.exe
                                  Wow64 process (32bit):true
                                  Commandline:wmic cpu get processorid
                                  Imagebase:0x430000
                                  File size:427'008 bytes
                                  MD5 hash:E2DE6500DE1148C7F6027AD50AC8B891
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:13
                                  Start time:02:08:37
                                  Start date:19/12/2024
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Imagebase:0x7ff6d64d0000
                                  File size:862'208 bytes
                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:14
                                  Start time:02:08:37
                                  Start date:19/12/2024
                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_add_cross_origin_whitelist_entry
                                  Imagebase:0xbb0000
                                  File size:61'440 bytes
                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Nitol, Description: Yara detected Nitol, Source: 0000000E.00000002.3013317433.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Nitol, Description: Yara detected Nitol, Source: 0000000E.00000002.3012409035.0000000010037000.00000002.00001000.00020000.00000000.sdmp, Author: Joe Security
                                  Has exited:true

                                  Target ID:15
                                  Start time:02:08:37
                                  Start date:19/12/2024
                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_add_web_plugin_directory
                                  Imagebase:0xbb0000
                                  File size:61'440 bytes
                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Nitol, Description: Yara detected Nitol, Source: 0000000F.00000002.3008220827.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Nitol, Description: Yara detected Nitol, Source: 0000000F.00000002.3007932543.0000000010037000.00000002.00001000.00020000.00000000.sdmp, Author: Joe Security
                                  Has exited:true

                                  Target ID:16
                                  Start time:02:08:37
                                  Start date:19/12/2024
                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_add_web_plugin_path
                                  Imagebase:0x7ff6d64d0000
                                  File size:61'440 bytes
                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Nitol, Description: Yara detected Nitol, Source: 00000010.00000002.3016124444.0000000010037000.00000002.00001000.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Nitol, Description: Yara detected Nitol, Source: 00000010.00000002.3017577594.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                                  Has exited:true

                                  Target ID:17
                                  Start time:02:08:37
                                  Start date:19/12/2024
                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",create_context_shared
                                  Imagebase:0xbb0000
                                  File size:61'440 bytes
                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Nitol, Description: Yara detected Nitol, Source: 00000011.00000002.3038214334.0000000010037000.00000002.00001000.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Nitol, Description: Yara detected Nitol, Source: 00000011.00000002.3040921469.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                                  Has exited:true

                                  Target ID:18
                                  Start time:02:08:37
                                  Start date:19/12/2024
                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_zip_reader_create
                                  Imagebase:0xbb0000
                                  File size:61'440 bytes
                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Nitol, Description: Yara detected Nitol, Source: 00000012.00000002.2994205386.0000000010037000.00000002.00001000.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Nitol, Description: Yara detected Nitol, Source: 00000012.00000002.2994516394.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                                  Has exited:true

                                  Target ID:19
                                  Start time:02:08:37
                                  Start date:19/12/2024
                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_zip_directory
                                  Imagebase:0xbb0000
                                  File size:61'440 bytes
                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Nitol, Description: Yara detected Nitol, Source: 00000013.00000002.3010385963.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Nitol, Description: Yara detected Nitol, Source: 00000013.00000002.3010015146.0000000010037000.00000002.00001000.00020000.00000000.sdmp, Author: Joe Security
                                  Has exited:true

                                  Target ID:20
                                  Start time:02:08:37
                                  Start date:19/12/2024
                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_write_json
                                  Imagebase:0xbb0000
                                  File size:61'440 bytes
                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Nitol, Description: Yara detected Nitol, Source: 00000014.00000002.2997697072.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Nitol, Description: Yara detected Nitol, Source: 00000014.00000002.2996930195.0000000010037000.00000002.00001000.00020000.00000000.sdmp, Author: Joe Security
                                  Has exited:true

                                  Target ID:21
                                  Start time:02:08:37
                                  Start date:19/12/2024
                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_window_create_top_level
                                  Imagebase:0xbb0000
                                  File size:61'440 bytes
                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Nitol, Description: Yara detected Nitol, Source: 00000015.00000002.3048776239.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Nitol, Description: Yara detected Nitol, Source: 00000015.00000002.3045928626.0000000010037000.00000002.00001000.00020000.00000000.sdmp, Author: Joe Security
                                  Has exited:true

                                  Target ID:22
                                  Start time:02:08:37
                                  Start date:19/12/2024
                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_visit_web_plugin_info
                                  Imagebase:0xbb0000
                                  File size:61'440 bytes
                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Nitol, Description: Yara detected Nitol, Source: 00000016.00000002.3049878489.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Nitol, Description: Yara detected Nitol, Source: 00000016.00000002.3047426962.0000000010037000.00000002.00001000.00020000.00000000.sdmp, Author: Joe Security
                                  Has exited:true

                                  Target ID:23
                                  Start time:02:08:38
                                  Start date:19/12/2024
                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_value_create
                                  Imagebase:0xbb0000
                                  File size:61'440 bytes
                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Nitol, Description: Yara detected Nitol, Source: 00000017.00000002.3047870662.0000000010037000.00000002.00001000.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Nitol, Description: Yara detected Nitol, Source: 00000017.00000002.3050280645.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                                  Has exited:true

                                  Target ID:24
                                  Start time:02:08:38
                                  Start date:19/12/2024
                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_v8value_create_undefined
                                  Imagebase:0xbb0000
                                  File size:61'440 bytes
                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Nitol, Description: Yara detected Nitol, Source: 00000018.00000002.3041645495.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Nitol, Description: Yara detected Nitol, Source: 00000018.00000002.3039178109.0000000010037000.00000002.00001000.00020000.00000000.sdmp, Author: Joe Security
                                  Has exited:true

                                  Target ID:25
                                  Start time:02:08:38
                                  Start date:19/12/2024
                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_v8value_create_uint
                                  Imagebase:0xbb0000
                                  File size:61'440 bytes
                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Nitol, Description: Yara detected Nitol, Source: 00000019.00000002.3036054251.0000000010037000.00000002.00001000.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Nitol, Description: Yara detected Nitol, Source: 00000019.00000002.3036809299.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                                  Has exited:true

                                  Target ID:26
                                  Start time:02:08:38
                                  Start date:19/12/2024
                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_v8value_create_string
                                  Imagebase:0xbb0000
                                  File size:61'440 bytes
                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Nitol, Description: Yara detected Nitol, Source: 0000001A.00000002.3028669862.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Nitol, Description: Yara detected Nitol, Source: 0000001A.00000002.3028319982.0000000010037000.00000002.00001000.00020000.00000000.sdmp, Author: Joe Security
                                  Has exited:true

                                  Target ID:27
                                  Start time:02:08:38
                                  Start date:19/12/2024
                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_v8value_create_object
                                  Imagebase:0xbb0000
                                  File size:61'440 bytes
                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Nitol, Description: Yara detected Nitol, Source: 0000001B.00000002.3018050041.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Nitol, Description: Yara detected Nitol, Source: 0000001B.00000002.3016390156.0000000010037000.00000002.00001000.00020000.00000000.sdmp, Author: Joe Security
                                  Has exited:true

                                  Target ID:28
                                  Start time:02:08:38
                                  Start date:19/12/2024
                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_v8value_create_null
                                  Imagebase:0xbb0000
                                  File size:61'440 bytes
                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Nitol, Description: Yara detected Nitol, Source: 0000001C.00000002.3036458003.0000000010037000.00000002.00001000.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Nitol, Description: Yara detected Nitol, Source: 0000001C.00000002.3036956799.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                                  Has exited:true

                                  Target ID:29
                                  Start time:02:08:38
                                  Start date:19/12/2024
                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_v8value_create_int
                                  Imagebase:0xbb0000
                                  File size:61'440 bytes
                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Nitol, Description: Yara detected Nitol, Source: 0000001D.00000002.3046146995.0000000010037000.00000002.00001000.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Nitol, Description: Yara detected Nitol, Source: 0000001D.00000002.3048956174.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                                  Has exited:true

                                  Target ID:30
                                  Start time:02:08:38
                                  Start date:19/12/2024
                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_v8value_create_function
                                  Imagebase:0xbb0000
                                  File size:61'440 bytes
                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Nitol, Description: Yara detected Nitol, Source: 0000001E.00000002.3014122900.0000000010037000.00000002.00001000.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Nitol, Description: Yara detected Nitol, Source: 0000001E.00000002.3015022254.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                                  Has exited:true

                                  Target ID:31
                                  Start time:02:08:38
                                  Start date:19/12/2024
                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_v8value_create_double
                                  Imagebase:0xbb0000
                                  File size:61'440 bytes
                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Nitol, Description: Yara detected Nitol, Source: 0000001F.00000002.3017796393.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Nitol, Description: Yara detected Nitol, Source: 0000001F.00000002.3016249210.0000000010037000.00000002.00001000.00020000.00000000.sdmp, Author: Joe Security
                                  Has exited:true

                                  Target ID:32
                                  Start time:02:08:38
                                  Start date:19/12/2024
                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_v8value_create_date
                                  Imagebase:0xbb0000
                                  File size:61'440 bytes
                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Nitol, Description: Yara detected Nitol, Source: 00000020.00000002.3045577027.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Nitol, Description: Yara detected Nitol, Source: 00000020.00000002.3043417699.0000000010037000.00000002.00001000.00020000.00000000.sdmp, Author: Joe Security
                                  Has exited:true

                                  Target ID:33
                                  Start time:02:08:38
                                  Start date:19/12/2024
                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_v8value_create_bool
                                  Imagebase:0xbb0000
                                  File size:61'440 bytes
                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Nitol, Description: Yara detected Nitol, Source: 00000021.00000002.3049295552.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Nitol, Description: Yara detected Nitol, Source: 00000021.00000002.3046734441.0000000010037000.00000002.00001000.00020000.00000000.sdmp, Author: Joe Security
                                  Has exited:true

                                  Target ID:34
                                  Start time:02:08:38
                                  Start date:19/12/2024
                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_v8value_create_array_buffer
                                  Imagebase:0xbb0000
                                  File size:61'440 bytes
                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Nitol, Description: Yara detected Nitol, Source: 00000022.00000002.3014901718.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Nitol, Description: Yara detected Nitol, Source: 00000022.00000002.3014058075.0000000010037000.00000002.00001000.00020000.00000000.sdmp, Author: Joe Security
                                  Has exited:true

                                  Target ID:35
                                  Start time:02:08:38
                                  Start date:19/12/2024
                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_v8value_create_array
                                  Imagebase:0xbb0000
                                  File size:61'440 bytes
                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Nitol, Description: Yara detected Nitol, Source: 00000023.00000002.3043543087.0000000010037000.00000002.00001000.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Nitol, Description: Yara detected Nitol, Source: 00000023.00000002.3045748192.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                                  Has exited:true

                                  Target ID:36
                                  Start time:02:08:38
                                  Start date:19/12/2024
                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_v8stack_trace_get_current
                                  Imagebase:0xbb0000
                                  File size:61'440 bytes
                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Nitol, Description: Yara detected Nitol, Source: 00000024.00000002.3045374022.0000000010037000.00000002.00001000.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Nitol, Description: Yara detected Nitol, Source: 00000024.00000002.3047877855.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                                  Has exited:true

                                  Target ID:37
                                  Start time:02:08:38
                                  Start date:19/12/2024
                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_v8context_in_context
                                  Imagebase:0xbb0000
                                  File size:61'440 bytes
                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Nitol, Description: Yara detected Nitol, Source: 00000025.00000002.3036735360.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Nitol, Description: Yara detected Nitol, Source: 00000025.00000002.3034740174.0000000010037000.00000002.00001000.00020000.00000000.sdmp, Author: Joe Security
                                  Has exited:true

                                  Target ID:38
                                  Start time:02:08:38
                                  Start date:19/12/2024
                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_v8context_get_entered_context
                                  Imagebase:0xbb0000
                                  File size:61'440 bytes
                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Nitol, Description: Yara detected Nitol, Source: 00000026.00000002.3043646710.0000000010037000.00000002.00001000.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Nitol, Description: Yara detected Nitol, Source: 00000026.00000002.3045848548.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                                  Has exited:true

                                  Target ID:39
                                  Start time:02:08:38
                                  Start date:19/12/2024
                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_v8context_get_current_context
                                  Imagebase:0xbb0000
                                  File size:61'440 bytes
                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Nitol, Description: Yara detected Nitol, Source: 00000027.00000002.3043643127.0000000010037000.00000002.00001000.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Nitol, Description: Yara detected Nitol, Source: 00000027.00000002.3045790077.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                                  Has exited:true

                                  Target ID:40
                                  Start time:02:08:38
                                  Start date:19/12/2024
                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_urlrequest_create
                                  Imagebase:0xbb0000
                                  File size:61'440 bytes
                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Nitol, Description: Yara detected Nitol, Source: 00000028.00000002.3039825345.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Nitol, Description: Yara detected Nitol, Source: 00000028.00000002.3036392206.0000000010037000.00000002.00001000.00020000.00000000.sdmp, Author: Joe Security
                                  Has exited:true

                                  Target ID:41
                                  Start time:02:08:38
                                  Start date:19/12/2024
                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_uriencode
                                  Imagebase:0xbb0000
                                  File size:61'440 bytes
                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Nitol, Description: Yara detected Nitol, Source: 00000029.00000002.3028907198.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Nitol, Description: Yara detected Nitol, Source: 00000029.00000002.3028489885.0000000010037000.00000002.00001000.00020000.00000000.sdmp, Author: Joe Security
                                  Has exited:true

                                  Target ID:42
                                  Start time:02:08:38
                                  Start date:19/12/2024
                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_uridecode
                                  Imagebase:0xbb0000
                                  File size:61'440 bytes
                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Nitol, Description: Yara detected Nitol, Source: 0000002A.00000002.3051527334.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Nitol, Description: Yara detected Nitol, Source: 0000002A.00000002.3048737599.0000000010037000.00000002.00001000.00020000.00000000.sdmp, Author: Joe Security
                                  Has exited:true

                                  Target ID:43
                                  Start time:02:08:38
                                  Start date:19/12/2024
                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_unregister_internal_web_plugin
                                  Imagebase:0xbb0000
                                  File size:61'440 bytes
                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Nitol, Description: Yara detected Nitol, Source: 0000002B.00000002.3037447093.0000000010037000.00000002.00001000.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Nitol, Description: Yara detected Nitol, Source: 0000002B.00000002.3037998868.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                                  Has exited:true

                                  Target ID:44
                                  Start time:02:08:38
                                  Start date:19/12/2024
                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                  Wow64 process (32bit):true
                                  Commandline:rundll32.exe "C:\Users\user\Desktop\c2A6GRyAwn.dll",cef_time_to_timet
                                  Imagebase:0xbb0000
                                  File size:61'440 bytes
                                  MD5 hash:889B99C52A60DD49227C5E485A016679
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_Nitol, Description: Yara detected Nitol, Source: 0000002C.00000002.3045359153.0000000010037000.00000002.00001000.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Nitol, Description: Yara detected Nitol, Source: 0000002C.00000002.3047979874.000000006C9C3000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                                  Has exited:true

                                  Reset < >

                                    Execution Graph

                                    Execution Coverage:0.1%
                                    Dynamic/Decrypted Code Coverage:0%
                                    Signature Coverage:18.5%
                                    Total number of Nodes:27
                                    Total number of Limit Nodes:0
                                    APIs
                                    • NtQueryInformationProcess.NTDLL(-00000001,00000022,00F926FB,00000004,00000000), ref: 00F90A8A
                                    • NtSetInformationProcess.NTDLL(-00000001,00000022,?,00000004,00F909F7,0000005D), ref: 00F90AAA
                                    • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004,00000004,00F909F7,0000005D), ref: 00F90ACC
                                    • wsprintfA.USER32(?,?,?,?), ref: 00F90B74
                                    • MessageBoxA.USER32(00000000,?,?,00000010), ref: 00F90B8C
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000003.2205251796.0000000000F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 00F90000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_3_f90000_loaddll32.jbxd
                                    Similarity
                                    • API ID: InformationProcess$AllocMessageQueryVirtualwsprintf
                                    • String ID: Application error$SWVU$The procedure %s could not be located in the DLL %s.
                                    • API String ID: 2902211186-4283279704
                                    • Opcode ID: de0e8ee88c8a98f7b8a38ace4394a491acda8513ba92f7ded7199e416edf0d91
                                    • Instruction ID: 39dd9ca80b64c25a3632b8d1d06f8bfad3ae38926f0c3d3490264114ad43e1be
                                    • Opcode Fuzzy Hash: de0e8ee88c8a98f7b8a38ace4394a491acda8513ba92f7ded7199e416edf0d91
                                    • Instruction Fuzzy Hash: 0841BA72A01746AFEB359F24CC59FAB73A8EF44790F004528EE0697284DFB4AD10DB90
                                    APIs
                                    • NtSetInformationProcess.NTDLL(-00000001,00000022,?,00000004,00F909F7,0000005D), ref: 00F90AAA
                                    • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004,00000004,00F909F7,0000005D), ref: 00F90ACC
                                    • wsprintfA.USER32(?,?,?,?), ref: 00F90B74
                                    • MessageBoxA.USER32(00000000,?,?,00000010), ref: 00F90B8C
                                    • ExitProcess.KERNEL32(00000000), ref: 00F90B94
                                    • VirtualFree.KERNELBASE(?,00000000,00008000,?), ref: 00F90BE7
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000003.2205251796.0000000000F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 00F90000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_3_f90000_loaddll32.jbxd
                                    Similarity
                                    • API ID: ProcessVirtual$AllocExitFreeInformationMessagewsprintf
                                    • String ID: Application error$SWVU$The procedure %s could not be located in the DLL %s.
                                    • API String ID: 2788668848-4283279704
                                    • Opcode ID: f644d6bb55c65f053268db4f25cec8320b3bbf1d1d06db4825fff5ba47126e3b
                                    • Instruction ID: d41375b8f630b8f1daa07b94e8acfb437f6fd2a4b9d87f4b91e57e3a59c4f9bc
                                    • Opcode Fuzzy Hash: f644d6bb55c65f053268db4f25cec8320b3bbf1d1d06db4825fff5ba47126e3b
                                    • Instruction Fuzzy Hash: C331AA71641386AFEF399F20CC59FEB37A8EF44795F004129FE42C6285DE74A9109A60
                                    APIs
                                    • VirtualProtect.KERNELBASE(?,00001000,00000004,?,?), ref: 00F913EA
                                    • VirtualProtect.KERNEL32(?,00001000,?,?), ref: 00F91403
                                    Memory Dump Source
                                    • Source File: 00000000.00000003.2205251796.0000000000F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 00F90000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_3_f90000_loaddll32.jbxd
                                    Similarity
                                    • API ID: ProtectVirtual
                                    • String ID:
                                    • API String ID: 544645111-0
                                    • Opcode ID: 460e07aa1c6cfb092b5f976fa85d581fca477865be9a128e2591be7121e923ca
                                    • Instruction ID: b1d429a417b6c49ed05833987fabd77db929dafd5a81931b874044704500e5e3
                                    • Opcode Fuzzy Hash: 460e07aa1c6cfb092b5f976fa85d581fca477865be9a128e2591be7121e923ca
                                    • Instruction Fuzzy Hash: 74F08276200305AFDB19CF40C844FEA7779EB48391F104176EA42AB684C670F5148B10
                                    APIs
                                    • VirtualAlloc.KERNELBASE(00000000,-00000436,00001000,00000004), ref: 00F9087D
                                    • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 00F908A9
                                    Memory Dump Source
                                    • Source File: 00000000.00000003.2205251796.0000000000F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 00F90000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_3_f90000_loaddll32.jbxd
                                    Similarity
                                    • API ID: Virtual$AllocFree
                                    • String ID:
                                    • API String ID: 2087232378-0
                                    • Opcode ID: 7e515f7c385f7f07b94d9a5cb9b23266753d833ffbaa65bc10218dcc86593253
                                    • Instruction ID: b4e0170a658b6955a7bdb579520421f22f093817cd2c5495ebb7271aeb2cb413
                                    • Opcode Fuzzy Hash: 7e515f7c385f7f07b94d9a5cb9b23266753d833ffbaa65bc10218dcc86593253
                                    • Instruction Fuzzy Hash: 51018471A01114BBEB04CE99CC41FAEB7B9EBC8760F14C16AF61897385D678AD10CBA0
                                    APIs
                                    • LoadLibraryA.KERNEL32 ref: 00F90C14
                                    • GetProcAddress.KERNEL32(?,00000000), ref: 00F90C36
                                    Memory Dump Source
                                    • Source File: 00000000.00000003.2205251796.0000000000F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 00F90000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_3_f90000_loaddll32.jbxd
                                    Similarity
                                    • API ID: AddressLibraryLoadProc
                                    • String ID:
                                    • API String ID: 2574300362-0
                                    • Opcode ID: 9efb803a854c71129ffb3ca0e189a60f352970df9509727b32eae53798b321fd
                                    • Instruction ID: fadeddaa0ed0e876b0a5324d61d01f0700a181dbc6993c46e2c89b9339e278c9
                                    • Opcode Fuzzy Hash: 9efb803a854c71129ffb3ca0e189a60f352970df9509727b32eae53798b321fd
                                    • Instruction Fuzzy Hash: BDF0E273A00100DFDB10CF18CDC069AB3B5FF903A53298939D84697704DA35FE459A10
                                    APIs
                                    • SetUnhandledExceptionFilter.KERNEL32(00000000,?,6C917EC1,?,00000017), ref: 6C925425
                                    • UnhandledExceptionFilter.KERNEL32(6C917EC1,?,6C917EC1,?,00000017), ref: 6C92542F
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3972676804.000000006C681000.00000040.00000001.01000000.00000003.sdmp, Offset: 6C680000, based on PE: true
                                    • Associated: 00000000.00000002.3972641799.000000006C680000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3972676804.000000006C9C3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3972676804.000000006CBAB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3972676804.000000006CBB3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3972676804.000000006CBB9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3973179913.000000006CC55000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6c680000_loaddll32.jbxd
                                    Similarity
                                    • API ID: ExceptionFilterUnhandled
                                    • String ID:
                                    • API String ID: 3192549508-0
                                    • Opcode ID: b3d4745fcf7748c4fb09b18705affbad89d2570ed4fdf24ada0852c9a31cb530
                                    • Instruction ID: fe18701f4d58c0ab72e89341deba62188aa8000ccb9ca15fd68843fcac929d2f
                                    • Opcode Fuzzy Hash: b3d4745fcf7748c4fb09b18705affbad89d2570ed4fdf24ada0852c9a31cb530
                                    • Instruction Fuzzy Hash: A2C09B35688249A7DF005BD6D54DB553BFCE705655F111004F50E86180C671B5004699
                                    APIs
                                    • IsDebuggerPresent.KERNEL32(?,6C917FEE,6C9968D0,00000017), ref: 6C917EA3
                                      • Part of subcall function 6C925420: SetUnhandledExceptionFilter.KERNEL32(00000000,?,6C917EC1,?,00000017), ref: 6C925425
                                      • Part of subcall function 6C925420: UnhandledExceptionFilter.KERNEL32(6C917EC1,?,6C917EC1,?,00000017), ref: 6C92542F
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3972676804.000000006C681000.00000040.00000001.01000000.00000003.sdmp, Offset: 6C680000, based on PE: true
                                    • Associated: 00000000.00000002.3972641799.000000006C680000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3972676804.000000006C9C3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3972676804.000000006CBAB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3972676804.000000006CBB3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3972676804.000000006CBB9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.3973179913.000000006CC55000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6c680000_loaddll32.jbxd
                                    Similarity
                                    • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                    • String ID:
                                    • API String ID: 3906539128-0
                                    • Opcode ID: a1902c1bac7503f64f9d6d5de14bfe02bcf2d2a5204357d81e098ee7286517f1
                                    • Instruction ID: 2af90933ebe1fd811e78808ba23b5debdf773cf937d0cac2745bf2c2e13a90c3
                                    • Opcode Fuzzy Hash: a1902c1bac7503f64f9d6d5de14bfe02bcf2d2a5204357d81e098ee7286517f1
                                    • Instruction Fuzzy Hash: 37E086F6D512445BFB045750F802BB53164473030CF440031EA4E86F46FAB5F958829B
                                    Memory Dump Source
                                    • Source File: 00000000.00000003.2205251796.0000000000F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 00F90000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_3_f90000_loaddll32.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 91e99a0a01e1d4bce046b1382b355e78901f4974a24da72b781af35e7c32559e
                                    • Instruction ID: a2a5737b2e81f8abf1b5f56a0b1d622870d0f85f969613e34da87eacc98ab2b9
                                    • Opcode Fuzzy Hash: 91e99a0a01e1d4bce046b1382b355e78901f4974a24da72b781af35e7c32559e
                                    • Instruction Fuzzy Hash: FB42B873E041158FDF09CE69C8942ADBBB2FFD4350F2A826AD8599B344DA709A45CF90

                                    Execution Graph

                                    Execution Coverage:1.9%
                                    Dynamic/Decrypted Code Coverage:98.5%
                                    Signature Coverage:16.4%
                                    Total number of Nodes:457
                                    Total number of Limit Nodes:8
                                    execution_graph 24152 10013a20 24214 1000da40 24152->24214 24154 10013ab9 24155 10013ac2 IsUserAnAdmin 24154->24155 24156 10013aec 24154->24156 24155->24156 24159 10013acc 24155->24159 24157 10013b05 24156->24157 24239 10012260 6 API calls 24156->24239 24162 10013b77 24157->24162 24163 10013b0e _memset 24157->24163 24158 10013a42 _memset 24158->24154 24232 10022e79 24158->24232 24164 10013ae2 24159->24164 24165 10013ad5 ReleaseMutex 24159->24165 24241 10009ae0 InitializeCriticalSection 24162->24241 24171 10013b21 GetModuleFileNameA 24163->24171 24238 100118d0 72 API calls 2 library calls 24164->24238 24165->24164 24166 10013afa 24166->24157 24174 10022bd3 70 API calls 24166->24174 24170 10013ab2 24235 10022bd3 24170->24235 24240 10022df7 108 API calls 3 library calls 24171->24240 24172 10013b7c 24177 10013bc9 24172->24177 24242 10013240 11 API calls 24172->24242 24173 10013ae9 24173->24156 24174->24157 24181 10013be6 24177->24181 24182 10013bf9 24177->24182 24190 10013bf4 _strlen 24177->24190 24179 10013b53 DeleteFileA MoveFileA 24179->24162 24180 10013b8f 24184 10013ba1 24180->24184 24243 10013260 11 API calls 24180->24243 24185 10013c1b 24181->24185 24186 10013bef 24181->24186 24245 10006080 24182->24245 24244 10015350 96 API calls 2 library calls 24184->24244 24250 100137c0 8 API calls 3 library calls 24185->24250 24254 1001f13f 110 API calls 7 library calls 24186->24254 24195 10013ce4 24190->24195 24255 100132c0 239 API calls 2 library calls 24190->24255 24193 10013b9d 24193->24177 24193->24184 24194 10013c20 24197 10013c24 24194->24197 24198 10013c68 24194->24198 24256 100132c0 239 API calls 2 library calls 24195->24256 24196 10013c13 24196->24190 24251 1001f13f 110 API calls 7 library calls 24197->24251 24252 1001f13f 110 API calls 7 library calls 24198->24252 24202 10013bc6 24202->24177 24205 10013cfb 24257 1001ffa4 24205->24257 24206 10013c2e StartServiceCtrlDispatcherA 24209 10013c93 WSAStartup 24206->24209 24207 10013c72 24253 10012550 99 API calls 5 library calls 24207->24253 24209->24190 24211 10013d08 24212 10013c89 24213 10022bd3 70 API calls 24212->24213 24213->24209 24215 1000da70 type_info::name 24214->24215 24264 1000cfc0 24215->24264 24217 1000da85 type_info::name 24286 1000d420 24217->24286 24221 1000dab1 _Copy_impl 24222 1000dadf _Copy_impl 24221->24222 24311 1000de50 24221->24311 24317 1000d890 CryptAcquireContextA 24222->24317 24229 1000db00 codecvt 24230 1001ffa4 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 6 API calls 24229->24230 24231 1000db33 24230->24231 24231->24158 24489 100287c6 24232->24489 24234 10013a8b CreateMutexA GetLastError 24234->24154 24234->24170 24511 10022aa4 24235->24511 24237 10022be2 24237->24154 24238->24173 24239->24166 24240->24179 24241->24172 24242->24180 24243->24193 24244->24202 24246 10006091 construct codecvt type_info::name 24245->24246 24544 10006b60 24246->24544 24249 100138f0 112 API calls 5 library calls 24249->24196 24250->24194 24251->24206 24252->24207 24253->24212 24254->24190 24255->24195 24256->24205 24258 1001ffac 24257->24258 24259 1001ffae IsProcessorFeaturePresent 24257->24259 24258->24211 24261 10022c38 24259->24261 24557 10022be7 5 API calls 2 library calls 24261->24557 24263 10022d1b 24263->24211 24265 1000cfdb __write_nolock 24264->24265 24266 10006080 71 API calls 24265->24266 24267 1000d01b _memset type_info::name 24266->24267 24268 1000d0b6 CreatePipe 24267->24268 24269 1000d126 GetStartupInfoA CreateProcessA 24268->24269 24285 1000d121 CloseHandle CloseHandle CloseHandle CloseHandle 24268->24285 24271 1000d198 WaitForSingleObject ReadFile 24269->24271 24269->24285 24272 1000d1e0 24271->24272 24271->24285 24334 1000cfa0 71 API calls 24272->24334 24274 1000d3e2 codecvt 24275 1001ffa4 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 6 API calls 24274->24275 24276 1000d411 24275->24276 24276->24217 24277 1000d1fc _Copy_impl 24277->24285 24335 1000dde0 71 API calls 24277->24335 24279 1000d251 24336 10006250 71 API calls 5 library calls 24279->24336 24281 1000d269 _memset codecvt 24337 1000cf40 70 API calls __tzset_nolock 24281->24337 24283 1000d2a2 _memset _Copy_impl 24338 1000cfa0 71 API calls 24283->24338 24285->24274 24287 1000d43b __write_nolock 24286->24287 24288 10006080 71 API calls 24287->24288 24289 1000d47a _memset type_info::name 24288->24289 24290 1000d515 CreatePipe 24289->24290 24291 1000d585 GetStartupInfoA CreateProcessA 24290->24291 24293 1000d580 CloseHandle CloseHandle CloseHandle CloseHandle 24290->24293 24291->24293 24294 1000d5f7 WaitForSingleObject ReadFile 24291->24294 24297 1000d841 codecvt 24293->24297 24294->24293 24295 1000d63f 24294->24295 24339 1000cfa0 71 API calls 24295->24339 24298 1001ffa4 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 6 API calls 24297->24298 24299 1000d870 24298->24299 24308 10007bf0 24299->24308 24300 1000d65b _Copy_impl 24300->24293 24340 1000dde0 71 API calls 24300->24340 24302 1000d6b0 24341 10006250 71 API calls 5 library calls 24302->24341 24304 1000d6c8 _memset codecvt 24342 1000cf40 70 API calls __tzset_nolock 24304->24342 24307 1000d701 _memset _Copy_impl 24343 1000cfa0 71 API calls 24307->24343 24344 10007c10 24308->24344 24310 10007c07 24310->24221 24355 10021e65 GetSystemTimeAsFileTime 24311->24355 24313 1000dac7 24314 1000de30 24313->24314 24357 10021dfa 24314->24357 24318 1000d8c0 GetLastError 24317->24318 24319 1000d8d1 CryptCreateHash 24317->24319 24320 1000da31 24318->24320 24321 1000d908 CryptHashData 24319->24321 24322 1000d8eb GetLastError CryptReleaseContext 24319->24322 24323 1001ffa4 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 6 API calls 24320->24323 24324 1000d920 GetLastError CryptDestroyHash CryptReleaseContext 24321->24324 24325 1000d947 CryptGetHashParam 24321->24325 24322->24320 24326 1000da3b 24323->24326 24324->24320 24488 1001ef69 24325->24488 24326->24229 24333 1000db40 71 API calls char_traits 24333->24222 24334->24277 24335->24279 24336->24281 24337->24283 24338->24285 24339->24300 24340->24302 24341->24304 24342->24307 24343->24293 24345 10007c21 _Copy_impl 24344->24345 24346 10007c2e _Copy_impl 24345->24346 24352 100069d0 71 API calls codecvt 24345->24352 24348 10007c60 24346->24348 24353 10010b70 71 API calls std::ios_base::clear 24346->24353 24351 10007c80 std::ios_base::clear char_traits 24348->24351 24354 100067d0 71 API calls 2 library calls 24348->24354 24351->24310 24352->24346 24353->24348 24354->24351 24356 10021e93 __aulldiv 24355->24356 24356->24313 24358 10021e11 24357->24358 24359 10021e2f 24357->24359 24405 100258dc 70 API calls __getptd_noexit 24358->24405 24360 10021e49 24359->24360 24363 10021e3c 24359->24363 24372 10026fe8 24360->24372 24362 10021e16 24406 10024a04 9 API calls strtoxl 24362->24406 24407 100258dc 70 API calls __getptd_noexit 24363->24407 24367 10021e53 24368 10021e21 24367->24368 24408 10026dea 70 API calls 3 library calls 24367->24408 24370 1001ffa4 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 6 API calls 24368->24370 24371 1000dad3 24370->24371 24371->24333 24373 10027003 24372->24373 24374 10027019 _memset 24372->24374 24417 100258dc 70 API calls __getptd_noexit 24373->24417 24374->24373 24380 10027030 24374->24380 24376 10027008 24418 10024a04 9 API calls strtoxl 24376->24418 24378 1002703b 24419 100258dc 70 API calls __getptd_noexit 24378->24419 24379 10027059 24409 1002ce25 24379->24409 24380->24378 24380->24379 24383 1002705e 24420 1002cb7e 70 API calls strtoxl 24383->24420 24385 10027067 24386 10027255 24385->24386 24421 1002cba8 70 API calls strtoxl 24385->24421 24434 10024a14 8 API calls 2 library calls 24386->24434 24389 1002725f 24390 10027079 24390->24386 24422 1002cbd2 24390->24422 24392 1002708b 24392->24386 24393 10027094 24392->24393 24394 1002710b 24393->24394 24396 100270a7 24393->24396 24432 1002cbfc 70 API calls 4 library calls 24394->24432 24429 1002cbfc 70 API calls 4 library calls 24396->24429 24398 10027112 24404 10027012 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 24398->24404 24433 1002ce75 70 API calls 3 library calls 24398->24433 24399 100270bf 24399->24404 24430 1002ce75 70 API calls 3 library calls 24399->24430 24402 100270d8 24402->24404 24431 1002cbfc 70 API calls 4 library calls 24402->24431 24404->24367 24405->24362 24406->24368 24407->24368 24408->24368 24410 1002ce31 __tzset_nolock 24409->24410 24411 1002ce66 __tzset_nolock 24410->24411 24435 10027ff1 24410->24435 24411->24383 24413 1002ce54 24473 1002ce6c LeaveCriticalSection _doexit 24413->24473 24414 1002ce41 24414->24413 24442 1002d09f 24414->24442 24417->24376 24418->24404 24419->24404 24420->24385 24421->24390 24423 1002cbf1 24422->24423 24424 1002cbdc 24422->24424 24423->24392 24486 100258dc 70 API calls __getptd_noexit 24424->24486 24426 1002cbe1 24487 10024a04 9 API calls strtoxl 24426->24487 24428 1002cbec 24428->24392 24429->24399 24430->24402 24431->24404 24432->24398 24433->24404 24434->24389 24436 10028002 24435->24436 24437 10028015 EnterCriticalSection 24435->24437 24474 10028079 70 API calls 8 library calls 24436->24474 24437->24414 24439 10028008 24439->24437 24475 10022950 70 API calls 3 library calls 24439->24475 24443 1002d0ab __tzset_nolock 24442->24443 24444 10027ff1 __lock 70 API calls 24443->24444 24445 1002d0c6 __tzset_nolock 24444->24445 24446 1002cbd2 __tzset_nolock 70 API calls 24445->24446 24447 1002d0db 24446->24447 24463 1002d17a __tzset_nolock 24447->24463 24476 1002cb7e 70 API calls strtoxl 24447->24476 24450 1002d0ed 24450->24463 24477 1002cba8 70 API calls strtoxl 24450->24477 24451 1002d1c6 GetTimeZoneInformation 24451->24463 24454 1002d0ff 24454->24463 24478 1002dd2f 78 API calls 2 library calls 24454->24478 24456 1002d230 WideCharToMultiByte 24456->24463 24457 1002d10d 24479 1002f6f1 101 API calls 3 library calls 24457->24479 24458 1002d268 WideCharToMultiByte 24458->24463 24461 1002d161 _strlen 24481 1002476a 70 API calls _malloc 24461->24481 24462 1002d12e __tzset_nolock 24462->24461 24462->24463 24467 1002d15b 24462->24467 24463->24451 24463->24456 24463->24458 24464 1002d3b1 __tzset_nolock 24463->24464 24465 10023218 70 API calls __tzset_nolock 24463->24465 24472 1002f6dd 83 API calls __tzset_nolock 24463->24472 24483 10024a14 8 API calls 2 library calls 24463->24483 24484 1002043c 70 API calls 2 library calls 24463->24484 24485 1002d331 LeaveCriticalSection _doexit 24463->24485 24464->24413 24465->24463 24480 1002043c 70 API calls 2 library calls 24467->24480 24469 1002d16f _strlen 24469->24463 24482 10021da5 70 API calls strtoxl 24469->24482 24471 1002d19b 24471->24463 24472->24463 24473->24411 24474->24439 24476->24450 24477->24454 24478->24457 24479->24462 24480->24461 24481->24469 24482->24471 24483->24463 24484->24463 24485->24463 24486->24426 24487->24428 24490 100287e4 24489->24490 24491 100287cf 24489->24491 24492 10028825 24490->24492 24494 100287f2 24490->24494 24505 100258dc 70 API calls __getptd_noexit 24491->24505 24509 100258dc 70 API calls __getptd_noexit 24492->24509 24507 100286fe 103 API calls 2 library calls 24494->24507 24496 100287d4 24506 10024a04 9 API calls strtoxl 24496->24506 24499 1002881d 24510 10024a04 9 API calls strtoxl 24499->24510 24500 100287df 24500->24234 24501 10028809 24503 10028835 24501->24503 24508 100258dc 70 API calls __getptd_noexit 24501->24508 24503->24234 24505->24496 24506->24500 24507->24501 24508->24499 24509->24499 24510->24503 24512 10022ab0 __tzset_nolock 24511->24512 24513 10027ff1 __lock 63 API calls 24512->24513 24514 10022ab7 24513->24514 24515 10022b70 __initterm 24514->24515 24516 10022ae5 DecodePointer 24514->24516 24531 10022bbe 24515->24531 24516->24515 24518 10022afc DecodePointer 24516->24518 24525 10022b0c 24518->24525 24520 10022bcd __tzset_nolock 24520->24237 24522 10022b19 EncodePointer 24522->24525 24523 10022bb5 24536 10022833 24523->24536 24525->24515 24525->24522 24527 10022b29 DecodePointer EncodePointer 24525->24527 24529 10022b3b DecodePointer DecodePointer 24527->24529 24529->24525 24532 10022bc4 24531->24532 24533 10022b9e 24531->24533 24539 10028155 LeaveCriticalSection 24532->24539 24533->24520 24535 10028155 LeaveCriticalSection 24533->24535 24535->24523 24540 10022801 GetModuleHandleExW 24536->24540 24539->24533 24541 10022831 ExitProcess 24540->24541 24542 1002281a GetProcAddress 24540->24542 24542->24541 24543 1002282c 24542->24543 24543->24541 24545 10006b70 char_traits 24544->24545 24548 10006b90 24545->24548 24547 100060b2 24547->24249 24549 10006ba3 _Copy_impl 24548->24549 24550 10006bca 24549->24550 24551 10006baa std::ios_base::clear 24549->24551 24556 100067d0 71 API calls 2 library calls 24550->24556 24555 10006ab0 71 API calls 3 library calls 24551->24555 24554 10006bc8 std::ios_base::clear char_traits 24554->24547 24555->24554 24556->24554 24557->24263 24558 10023ba7 24559 10023bb0 24558->24559 24560 10023bb5 24558->24560 24572 1002a1a0 GetSystemTimeAsFileTime GetCurrentThreadId GetTickCount64 QueryPerformanceCounter 24559->24572 24564 10023bca 24560->24564 24563 10023bc3 24565 10023bd6 __tzset_nolock 24564->24565 24569 10023c24 ___DllMainCRTStartup 24565->24569 24571 10023c81 __tzset_nolock 24565->24571 24573 10023a3b 24565->24573 24567 10023c5e 24568 10023a3b __CRT_INIT@12 130 API calls 24567->24568 24567->24571 24568->24571 24569->24567 24570 10023a3b __CRT_INIT@12 130 API calls 24569->24570 24569->24571 24570->24567 24571->24563 24572->24560 24574 10023a47 __tzset_nolock 24573->24574 24575 10023ac3 24574->24575 24576 10023a4f 24574->24576 24577 10023ac7 24575->24577 24578 10023b2c 24575->24578 24621 10026dcd GetProcessHeap 24576->24621 24583 10023ae8 24577->24583 24619 10023a58 __tzset_nolock __CRT_INIT@12 24577->24619 24697 1002296c 70 API calls _doexit 24577->24697 24580 10023b31 24578->24580 24581 10023b8f 24578->24581 24702 10028186 FlsGetValue 24580->24702 24581->24619 24707 10025c6e 79 API calls 2 library calls 24581->24707 24582 10023a54 24582->24619 24622 10025dd7 24582->24622 24698 10022849 73 API calls _free 24583->24698 24587 10023b3c 24590 10023b41 24587->24590 24587->24619 24703 10024720 70 API calls __calloc_impl 24590->24703 24591 10023aed 24594 10023afe __CRT_INIT@12 24591->24594 24699 10029e40 71 API calls _free 24591->24699 24592 10023a64 __RTC_Initialize 24599 10023a74 GetCommandLineA 24592->24599 24592->24619 24701 10023b17 73 API calls __mtterm 24594->24701 24596 10023b4d 24596->24619 24704 10028194 FlsSetValue 24596->24704 24598 10023af9 24700 10025e4d 73 API calls 2 library calls 24598->24700 24643 1002a23a GetEnvironmentStringsW 24599->24643 24603 10023b65 24605 10023b83 24603->24605 24606 10023b6b 24603->24606 24604 10023a84 __ioinit0 24656 10029e92 24604->24656 24706 1002043c 70 API calls 2 library calls 24605->24706 24705 10025d2b 70 API calls 4 library calls 24606->24705 24609 10023b73 GetCurrentThreadId 24609->24619 24610 10023b89 24610->24619 24613 10023aa7 24613->24619 24695 10029e40 71 API calls _free 24613->24695 24616 10023abc 24696 10025e4d 73 API calls 2 library calls 24616->24696 24619->24569 24621->24582 24708 10022a20 EncodePointer EncodePointer __init_pointers __initp_misc_winsig 24622->24708 24624 10025ddc 24709 10028120 InitializeCriticalSectionAndSpinCount 24624->24709 24626 10025de1 24627 10025de5 24626->24627 24711 1002816a FlsAlloc 24626->24711 24710 10025e4d 73 API calls 2 library calls 24627->24710 24630 10025dea 24630->24592 24631 10025df7 24631->24627 24632 10025e02 24631->24632 24712 10024720 70 API calls __calloc_impl 24632->24712 24634 10025e0f 24635 10025e44 24634->24635 24713 10028194 FlsSetValue 24634->24713 24715 10025e4d 73 API calls 2 library calls 24635->24715 24638 10025e49 24638->24592 24639 10025e23 24639->24635 24640 10025e29 24639->24640 24714 10025d2b 70 API calls 4 library calls 24640->24714 24642 10025e31 GetCurrentThreadId 24642->24592 24645 1002a24d 24643->24645 24649 1002a2c0 24643->24649 24644 1002a265 WideCharToMultiByte 24646 1002a280 24644->24646 24647 1002a2b7 FreeEnvironmentStringsW 24644->24647 24645->24644 24645->24645 24716 1002476a 70 API calls _malloc 24646->24716 24647->24649 24649->24604 24650 1002a286 24650->24647 24651 1002a28d WideCharToMultiByte 24650->24651 24652 1002a2a3 24651->24652 24653 1002a2ac FreeEnvironmentStringsW 24651->24653 24717 1002043c 70 API calls 2 library calls 24652->24717 24653->24649 24655 1002a2a9 24655->24653 24657 10029ea0 24656->24657 24658 10029ea5 GetModuleFileNameA 24656->24658 24724 1002762f 96 API calls __setmbcp 24657->24724 24659 10029ed2 24658->24659 24718 10029f43 24659->24718 24663 10023a93 24663->24613 24669 1002a0bf 24663->24669 24664 10029f05 24725 1002476a 70 API calls _malloc 24664->24725 24666 10029f0b 24666->24663 24667 10029f43 _parse_cmdline 80 API calls 24666->24667 24668 10029f25 24667->24668 24668->24663 24670 1002a0c8 24669->24670 24675 1002a0cd _strlen 24669->24675 24728 1002762f 96 API calls __setmbcp 24670->24728 24672 10023a9c 24672->24613 24687 1002297b 24672->24687 24673 1002a0f8 24729 10024720 70 API calls __calloc_impl 24673->24729 24675->24672 24675->24673 24676 1002a155 24732 1002043c 70 API calls 2 library calls 24676->24732 24678 1002a161 24678->24672 24680 1002a17c 24733 1002043c 70 API calls 2 library calls 24680->24733 24683 1002a103 _strlen 24683->24672 24683->24676 24683->24680 24684 1002a193 24683->24684 24730 10024720 70 API calls __calloc_impl 24683->24730 24731 10021da5 70 API calls strtoxl 24683->24731 24734 10024a14 8 API calls 2 library calls 24684->24734 24686 1002a19f 24688 10022987 __IsNonwritableInCurrentImage 24687->24688 24735 10028361 24688->24735 24690 100229a5 __initterm_e 24693 100229e2 __IsNonwritableInCurrentImage 24690->24693 24738 1001f115 24690->24738 24692 100229c6 24692->24693 24741 10036500 24692->24741 24693->24613 24695->24616 24696->24619 24697->24583 24698->24591 24699->24598 24700->24594 24701->24619 24702->24587 24703->24596 24704->24603 24705->24609 24706->24610 24707->24619 24708->24624 24709->24626 24710->24630 24711->24631 24712->24634 24713->24639 24714->24642 24715->24638 24716->24650 24717->24655 24720 10029f65 24718->24720 24722 10029fc9 24720->24722 24726 1002efd3 80 API calls x_ismbbtype_l 24720->24726 24721 10029ee8 24721->24663 24721->24664 24722->24721 24727 1002efd3 80 API calls x_ismbbtype_l 24722->24727 24724->24658 24725->24666 24726->24720 24727->24722 24728->24675 24729->24683 24730->24683 24731->24683 24732->24678 24733->24678 24734->24686 24736 10028364 EncodePointer 24735->24736 24736->24736 24737 1002837e 24736->24737 24737->24690 24748 1001f01f 24738->24748 24740 1001f120 24740->24692 24782 100241b0 24741->24782 24743 10036518 WSAStartup 24744 1001f115 __cinit 80 API calls 24743->24744 24745 10036533 24744->24745 24746 1001ffa4 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 6 API calls 24745->24746 24747 10036543 24746->24747 24747->24692 24749 1001f02b __tzset_nolock 24748->24749 24756 10022a92 24749->24756 24755 1001f04e __tzset_nolock 24755->24740 24757 10027ff1 __lock 70 API calls 24756->24757 24758 1001f030 24757->24758 24759 1001f05f DecodePointer DecodePointer 24758->24759 24760 1001f08c 24759->24760 24761 1001f03c 24759->24761 24760->24761 24775 100246ef 71 API calls strtoxl 24760->24775 24772 1001f059 24761->24772 24763 1001f09e 24764 1001f0ef EncodePointer EncodePointer 24763->24764 24765 1001f0c9 24763->24765 24766 1001f0bc 24763->24766 24764->24761 24765->24761 24767 1001f0c3 24765->24767 24776 100247b3 74 API calls __recalloc 24766->24776 24767->24765 24770 1001f0dd EncodePointer 24767->24770 24777 100247b3 74 API calls __recalloc 24767->24777 24770->24764 24771 1001f0d7 24771->24761 24771->24770 24778 10022a9b 24772->24778 24775->24763 24776->24767 24777->24771 24781 10028155 LeaveCriticalSection 24778->24781 24780 1001f05e 24780->24755 24781->24780 24783 6c696740 24784 6c6968bd 24783->24784 24785 6c696af6 VirtualAlloc 24784->24785 24786 6c69698f VirtualAlloc 24784->24786 24787 6c696a76 24784->24787 24788 6c696b75 _memmove 24784->24788 24785->24788 24789 6c696a51 _memset 24786->24789 24787->24785 24789->24787

                                    Control-flow Graph

                                    APIs
                                    • _memset.LIBCMT ref: 10013A60
                                    • swprintf.LIBCMT ref: 10013A86
                                    • CreateMutexA.KERNELBASE(00000000,00000000,00000000), ref: 10013A99
                                    • GetLastError.KERNEL32 ref: 10013AA5
                                      • Part of subcall function 10022BD3: _doexit.LIBCMT ref: 10022BDD
                                      • Part of subcall function 100138F0: _memset.LIBCMT ref: 10013918
                                      • Part of subcall function 100138F0: RegOpenKeyExA.ADVAPI32(80000001,101AFE40,00000000,00020006,?), ref: 10013944
                                      • Part of subcall function 100138F0: _sprintf.LIBCMT ref: 1001397C
                                      • Part of subcall function 100138F0: _strlen.LIBCMT ref: 1001398B
                                      • Part of subcall function 100138F0: RegSetValueExA.ADVAPI32(?,00000000,00000000,00000001,00000000,?), ref: 100139D7
                                      • Part of subcall function 100138F0: RegCloseKey.ADVAPI32(?), ref: 100139EA
                                    • IsUserAnAdmin.SHELL32 ref: 10013AC2
                                    • ReleaseMutex.KERNEL32(00000000), ref: 10013ADC
                                    • _memset.LIBCMT ref: 10013B1C
                                    • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 10013B32
                                    • _sprintf.LIBCMT ref: 10013B4E
                                    • DeleteFileA.KERNEL32(?), ref: 10013B5D
                                    • MoveFileA.KERNEL32(?,?), ref: 10013B71
                                    • _wprintf.LIBCMT ref: 10013CAC
                                    • _strlen.LIBCMT ref: 10013CB9
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File_memset$Mutex_sprintf_strlen$AdminCloseCreateDeleteErrorLastModuleMoveNameOpenReleaseUserValue_doexit_wprintfswprintf
                                    • String ID: %s%s$%s:%hd$206.238.77.142$206.238.77.142$C:\Users\Public\Documents\$Eaiawk mgqwgoywasgymoeeuu$EnOperationMode Error !$RunService !$TMzsft xtnogaqk$Windows Update$Yyickg caosusmk$service_is_exist !
                                    • API String ID: 2228167989-1563067711
                                    • Opcode ID: 2fc02c7820abb1e6e7b02b1e9042d30205a633eb3f33f25fe0a671c5299acd93
                                    • Instruction ID: 8ce7a2c48d05da8e1d18419a98124d55002a878a035d7289134c72219816da3c
                                    • Opcode Fuzzy Hash: 2fc02c7820abb1e6e7b02b1e9042d30205a633eb3f33f25fe0a671c5299acd93
                                    • Instruction Fuzzy Hash: CB61ECB5944314AAE721D7A08C87BE977B8EF00741F804099F6496D5D3EB78DAC4CBA2

                                    Control-flow Graph

                                    APIs
                                    • CryptAcquireContextA.ADVAPI32(00000000,00000000,00000000,00000001,F0000000), ref: 1000D8B6
                                    • GetLastError.KERNEL32 ref: 1000D8C0
                                    • CryptCreateHash.ADVAPI32(00000000,00000000,00000000,00000000,?), ref: 1000D8E1
                                    • GetLastError.KERNEL32 ref: 1000D8EB
                                    • CryptReleaseContext.ADVAPI32(00000000,00000000), ref: 1000D8FA
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Crypt$ContextErrorLast$AcquireCreateHashRelease
                                    • String ID: %02X
                                    • API String ID: 4104741015-436463671
                                    • Opcode ID: 783f6aeacaf77bddf85f865987ab6f2245b3743a8a3a9c8136557c6450919572
                                    • Instruction ID: e6624ba5d8ed9705aec1f79a9e38e76f649a0541b50efeb1c6887bd17401cf19
                                    • Opcode Fuzzy Hash: 783f6aeacaf77bddf85f865987ab6f2245b3743a8a3a9c8136557c6450919572
                                    • Instruction Fuzzy Hash: AE51C5B5A00219EFEB14DFA4CC85BEEB7B4FB48300F108559FA15AB295D778A940CF61
                                    APIs
                                    • NtQueryInformationProcess.NTDLL(-00000001,00000022,02BF26FB,00000004,00000000), ref: 02BF0A8A
                                    • NtSetInformationProcess.NTDLL(-00000001,00000022,?,00000004,02BF09F7,0000005D), ref: 02BF0AAA
                                    • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004,00000004,02BF09F7,0000005D), ref: 02BF0ACC
                                    • wsprintfA.USER32(?,?,?,?), ref: 02BF0B74
                                    • MessageBoxA.USER32(00000000,?,?,00000010), ref: 02BF0B8C
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000003.2102313199.0000000002BF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_3_2bf0000_rundll32.jbxd
                                    Similarity
                                    • API ID: InformationProcess$AllocMessageQueryVirtualwsprintf
                                    • String ID: Application error$SWVU$The procedure %s could not be located in the DLL %s.
                                    • API String ID: 2902211186-4283279704
                                    • Opcode ID: de0e8ee88c8a98f7b8a38ace4394a491acda8513ba92f7ded7199e416edf0d91
                                    • Instruction ID: 2e6d7425ae93ecafcc842582dcc318958a638f2a6041f4fad5f628471efc4e3f
                                    • Opcode Fuzzy Hash: de0e8ee88c8a98f7b8a38ace4394a491acda8513ba92f7ded7199e416edf0d91
                                    • Instruction Fuzzy Hash: 97410372601746AFEB75EF24CC44FAB73A8EF04784F004968EF0597289EB70A918CB50
                                    APIs
                                    • NtSetInformationProcess.NTDLL(-00000001,00000022,?,00000004,02BF09F7,0000005D), ref: 02BF0AAA
                                    • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004,00000004,02BF09F7,0000005D), ref: 02BF0ACC
                                    • wsprintfA.USER32(?,?,?,?), ref: 02BF0B74
                                    • MessageBoxA.USER32(00000000,?,?,00000010), ref: 02BF0B8C
                                    • ExitProcess.KERNEL32(00000000), ref: 02BF0B94
                                    • VirtualFree.KERNELBASE(?,00000000,00008000,?), ref: 02BF0BE7
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000003.2102313199.0000000002BF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_3_2bf0000_rundll32.jbxd
                                    Similarity
                                    • API ID: ProcessVirtual$AllocExitFreeInformationMessagewsprintf
                                    • String ID: Application error$SWVU$The procedure %s could not be located in the DLL %s.
                                    • API String ID: 2788668848-4283279704
                                    • Opcode ID: f644d6bb55c65f053268db4f25cec8320b3bbf1d1d06db4825fff5ba47126e3b
                                    • Instruction ID: 45de0763909d3c2616c7c9647734b9728d69f87c3c1ff09df710c382e6a84bf4
                                    • Opcode Fuzzy Hash: f644d6bb55c65f053268db4f25cec8320b3bbf1d1d06db4825fff5ba47126e3b
                                    • Instruction Fuzzy Hash: C231C2712413469BDB79AF20CC54FEF776CEF04785F004569EF468629AEB70A9188B10

                                    Control-flow Graph

                                    APIs
                                    • _memset.LIBCMT ref: 1000D055
                                    • _memset.LIBCMT ref: 1000D08B
                                    • _memset.LIBCMT ref: 1000D09E
                                    • _memset.LIBCMT ref: 1000D0B1
                                    • CreatePipe.KERNELBASE(?,?,0000000C,00000000), ref: 1000D10C
                                    • GetStartupInfoA.KERNEL32(00000044), ref: 1000D12D
                                    • CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000001,00000000,00000000,00000000,00000044,00000000), ref: 1000D17E
                                    • CloseHandle.KERNEL32(?,?), ref: 1000D39A
                                    • CloseHandle.KERNEL32(?), ref: 1000D3A7
                                    • CloseHandle.KERNEL32(?), ref: 1000D3B4
                                    • CloseHandle.KERNEL32(?), ref: 1000D3C1
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseHandle_memset$Create$InfoPipeProcessStartup
                                    • String ID: D$ProcessorId$wmic cpu get processorid
                                    • API String ID: 1762129635-53154263
                                    • Opcode ID: 2faa9055df3024060b3a78fac8b67b6add4b8c37b23ad85aa60008f06d3c8044
                                    • Instruction ID: 29feaeb9d2e0a167578c768367cdbb99c1f13e7196a5b6bb9c176603c2bdf5a2
                                    • Opcode Fuzzy Hash: 2faa9055df3024060b3a78fac8b67b6add4b8c37b23ad85aa60008f06d3c8044
                                    • Instruction Fuzzy Hash: D1B14E75902228DFEB29DB60CC99BDEB7B4FB48340F1041DAE109A7181DB756B84CF50

                                    Control-flow Graph

                                    APIs
                                    • _memset.LIBCMT ref: 1000D4B4
                                    • _memset.LIBCMT ref: 1000D4EA
                                    • _memset.LIBCMT ref: 1000D4FD
                                    • _memset.LIBCMT ref: 1000D510
                                    • CreatePipe.KERNELBASE(?,?,0000000C,00000000), ref: 1000D56B
                                    • GetStartupInfoA.KERNEL32(00000044), ref: 1000D58C
                                    • CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000001,00000000,00000000,00000000,00000044,00000000), ref: 1000D5DD
                                    • CloseHandle.KERNEL32(?,?), ref: 1000D7F9
                                    • CloseHandle.KERNEL32(?), ref: 1000D806
                                    • CloseHandle.KERNEL32(?), ref: 1000D813
                                    • CloseHandle.KERNEL32(?), ref: 1000D820
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseHandle_memset$Create$InfoPipeProcessStartup
                                    • String ID: D$SerialNumber$wmic diskdrive get serialnumber
                                    • API String ID: 1762129635-2526680146
                                    • Opcode ID: 284479aef56905e99ef7afbd9686248a6d4ef8a24c59542d99c3aafd4a34ee3f
                                    • Instruction ID: f7e6dc397231a2a0a1082a64f52227403f3a6002e1c9f0e787add4f7ccce3aad
                                    • Opcode Fuzzy Hash: 284479aef56905e99ef7afbd9686248a6d4ef8a24c59542d99c3aafd4a34ee3f
                                    • Instruction Fuzzy Hash: 8CB12B759162289BEB28DB64CC9DBEEB7B4FB48300F0041DAE50DAA191DB756B84CF50

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 242 10026fe8-10027001 243 10027003-1002700d call 100258dc call 10024a04 242->243 244 10027019-1002702e call 1001f840 242->244 251 10027012 243->251 244->243 250 10027030-10027033 244->250 252 10027047-1002704d 250->252 253 10027035 250->253 254 10027014-10027018 251->254 257 10027059 call 1002ce25 252->257 258 1002704f 252->258 255 10027037-10027039 253->255 256 1002703b-10027045 call 100258dc 253->256 255->252 255->256 256->251 262 1002705e-1002706a call 1002cb7e 257->262 258->256 259 10027051-10027057 258->259 259->256 259->257 266 10027070-1002707c call 1002cba8 262->266 267 10027255-1002725f call 10024a14 262->267 266->267 272 10027082-1002708e call 1002cbd2 266->272 272->267 275 10027094-1002709b 272->275 276 1002710b-10027116 call 1002cbfc 275->276 277 1002709d 275->277 276->254 284 1002711c-1002711f 276->284 279 100270a7-100270c3 call 1002cbfc 277->279 280 1002709f-100270a5 277->280 279->254 285 100270c9-100270cc 279->285 280->276 280->279 286 10027121-1002712a call 1002ce75 284->286 287 1002714e-1002715b 284->287 288 100270d2-100270db call 1002ce75 285->288 289 1002720e-10027210 285->289 286->287 295 1002712c-1002714c 286->295 290 1002715d-1002716c call 1002d670 287->290 288->289 298 100270e1-100270f9 call 1002cbfc 288->298 289->254 299 10027179-100271a0 call 1002d5c0 call 1002d670 290->299 300 1002716e-10027176 290->300 295->290 298->254 305 100270ff-10027106 298->305 308 100271a2-100271ab 299->308 309 100271ae-100271d5 call 1002d5c0 call 1002d670 299->309 300->299 305->289 308->309 314 100271e3-100271f2 call 1002d5c0 309->314 315 100271d7-100271e0 309->315 318 100271f4 314->318 319 1002721f-10027238 314->319 315->314 320 100271f6-100271f8 318->320 321 100271fa-10027208 318->321 322 1002723a-10027253 319->322 323 1002720b 319->323 320->321 324 10027215-10027217 320->324 321->323 322->289 323->289 324->289 325 10027219 324->325 325->319 326 1002721b-1002721d 325->326 326->289 326->319
                                    APIs
                                    • _memset.LIBCMT ref: 10027021
                                      • Part of subcall function 100258DC: __getptd_noexit.LIBCMT ref: 100258DC
                                    • __gmtime64_s.LIBCMT ref: 100270BA
                                    • __gmtime64_s.LIBCMT ref: 100270F0
                                    • __gmtime64_s.LIBCMT ref: 1002710D
                                    • __allrem.LIBCMT ref: 10027163
                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 1002717F
                                    • __allrem.LIBCMT ref: 10027196
                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 100271B4
                                    • __allrem.LIBCMT ref: 100271CB
                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 100271E9
                                    • __invoke_watson.LIBCMT ref: 1002725A
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                                    • String ID:
                                    • API String ID: 384356119-0
                                    • Opcode ID: faf785f0e9591b3d4b811fc4296c87dcbc334db000ad1bf2518f1b08427d47ec
                                    • Instruction ID: 713491a1cde179dae1e75a0093b68b8f74a69f94e9f1ec33854f382ae24b7f6e
                                    • Opcode Fuzzy Hash: faf785f0e9591b3d4b811fc4296c87dcbc334db000ad1bf2518f1b08427d47ec
                                    • Instruction Fuzzy Hash: 6B71D476A00717EBE715DE78EC82B5AB3E8FF40364F91412AF918D6681E770ED448790

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 327 6c696740-6c6968c9 329 6c696c7b-6c696c7e 327->329 330 6c6968cf-6c6968d6 327->330 331 6c6968dc-6c696989 330->331 332 6c696af6-6c696b70 VirtualAlloc call 6c912210 330->332 334 6c69698f-6c696a71 VirtualAlloc call 6c913d80 331->334 335 6c696a76 331->335 336 6c696b75-6c696c71 332->336 334->335 335->332 336->329
                                    APIs
                                    • VirtualAlloc.KERNEL32(0000FFFF,00000000,00001000,00000004), ref: 6C6969A4
                                    • _memset.LIBCMT ref: 6C696A4C
                                    • VirtualAlloc.KERNELBASE(0000FFFF,000000B8,00001000,00000004,?,6C698C38), ref: 6C696B0E
                                    • _memmove.LIBCMT ref: 6C696B70
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3052963500.000000006C681000.00000040.00000001.01000000.00000003.sdmp, Offset: 6C680000, based on PE: true
                                    • Associated: 00000003.00000002.3052780453.000000006C680000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000003.00000002.3052963500.000000006C9C3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000003.00000002.3052963500.000000006CBAB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000003.00000002.3052963500.000000006CBB3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000003.00000002.3052963500.000000006CBB9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000003.00000002.3056442540.000000006CC55000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_6c680000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AllocVirtual$_memmove_memset
                                    • String ID:
                                    • API String ID: 725130153-0
                                    • Opcode ID: af01bac3374c618721e138754d3ca3c72d74494653e4f821ac976264aae05339
                                    • Instruction ID: 395c12fc52dce5ac1d009dabf2c6e74aa10fdb6c514c0d7e02ec50b25f49a4c4
                                    • Opcode Fuzzy Hash: af01bac3374c618721e138754d3ca3c72d74494653e4f821ac976264aae05339
                                    • Instruction Fuzzy Hash: D9D16F75B0260DCFCB48CFD9E593A2DBBB1FB8A300B14821AD8A587754DB30A941CF49
                                    APIs
                                    • VirtualProtect.KERNELBASE(?,00001000,00000004,?,?), ref: 02BF13EA
                                    • VirtualProtect.KERNEL32(?,00001000,?,?), ref: 02BF1403
                                    Memory Dump Source
                                    • Source File: 00000003.00000003.2102313199.0000000002BF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_3_2bf0000_rundll32.jbxd
                                    Similarity
                                    • API ID: ProtectVirtual
                                    • String ID:
                                    • API String ID: 544645111-0
                                    • Opcode ID: 460e07aa1c6cfb092b5f976fa85d581fca477865be9a128e2591be7121e923ca
                                    • Instruction ID: b1d429a417b6c49ed05833987fabd77db929dafd5a81931b874044704500e5e3
                                    • Opcode Fuzzy Hash: 460e07aa1c6cfb092b5f976fa85d581fca477865be9a128e2591be7121e923ca
                                    • Instruction Fuzzy Hash: 74F08276200305AFDB19CF40C844FEA7779EB48391F104176EA42AB684C670F5148B10

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 339 1002ce25-1002ce38 call 10024850 342 1002ce66-1002ce6b call 10024895 339->342 343 1002ce3a-1002ce4d call 10027ff1 339->343 348 1002ce5a-1002ce61 call 1002ce6c 343->348 349 1002ce4f call 1002d09f 343->349 348->342 352 1002ce54 349->352 352->348
                                    APIs
                                    • __lock.LIBCMT ref: 1002CE3C
                                      • Part of subcall function 10027FF1: __mtinitlocknum.LIBCMT ref: 10028003
                                      • Part of subcall function 10027FF1: __amsg_exit.LIBCMT ref: 1002800F
                                      • Part of subcall function 10027FF1: EnterCriticalSection.KERNEL32(?,?,10025D6D,0000000D), ref: 1002801C
                                    • __tzset_nolock.LIBCMT ref: 1002CE4F
                                      • Part of subcall function 1002D09F: __lock.LIBCMT ref: 1002D0C1
                                      • Part of subcall function 1002D09F: ____lc_codepage_func.LIBCMT ref: 1002D108
                                      • Part of subcall function 1002D09F: __getenv_helper_nolock.LIBCMT ref: 1002D129
                                      • Part of subcall function 1002D09F: _free.LIBCMT ref: 1002D15C
                                      • Part of subcall function 1002D09F: _strlen.LIBCMT ref: 1002D163
                                      • Part of subcall function 1002D09F: __malloc_crt.LIBCMT ref: 1002D16A
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: __lock$CriticalEnterSection____lc_codepage_func__amsg_exit__getenv_helper_nolock__malloc_crt__mtinitlocknum__tzset_nolock_free_strlen
                                    • String ID:
                                    • API String ID: 1282695788-0
                                    • Opcode ID: fc85f6cf18a6252e642b57c3e1c2b749fe30e0e1031c663e82c605452884cce2
                                    • Instruction ID: a2ad06c6b65e7629715c0b93b357caa5f945d3fedfb1b9c2ad21f9bf3716e497
                                    • Opcode Fuzzy Hash: fc85f6cf18a6252e642b57c3e1c2b749fe30e0e1031c663e82c605452884cce2
                                    • Instruction Fuzzy Hash: 0BE0C238451A48D9DF10EBF0AA4275C32F0FB04B66FE20209E004041D28F7D35888923

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 353 10022833-10022842 call 10022801 ExitProcess
                                    APIs
                                    • ___crtCorExitProcess.LIBCMT ref: 10022839
                                      • Part of subcall function 10022801: GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,?,?,?,1002283E,00000000,?,100280A4,000000FF,0000001E,101B7BE8,00000008,10028008,00000000,?), ref: 10022810
                                      • Part of subcall function 10022801: GetProcAddress.KERNEL32(?,CorExitProcess), ref: 10022822
                                    • ExitProcess.KERNEL32 ref: 10022842
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ExitProcess$AddressHandleModuleProc___crt
                                    • String ID:
                                    • API String ID: 2427264223-0
                                    • Opcode ID: 3bf28b7052921138b5cd44a98d3311a828cfa0a63c341592180aa8684d3b340a
                                    • Instruction ID: c8f4cf039e012b41d150cd44d72804b099170dd8f7fcc5d26d0c23f5f7bd029f
                                    • Opcode Fuzzy Hash: 3bf28b7052921138b5cd44a98d3311a828cfa0a63c341592180aa8684d3b340a
                                    • Instruction Fuzzy Hash: B5B09230001108BFDB022F51DC4A8593FA9FB002A0B508020F80809032DF73BA929A81
                                    APIs
                                    • VirtualAlloc.KERNELBASE(00000000,-00000436,00001000,00000004), ref: 02BF087D
                                    • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 02BF08A9
                                    Memory Dump Source
                                    • Source File: 00000003.00000003.2102313199.0000000002BF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_3_2bf0000_rundll32.jbxd
                                    Similarity
                                    • API ID: Virtual$AllocFree
                                    • String ID:
                                    • API String ID: 2087232378-0
                                    • Opcode ID: 7e515f7c385f7f07b94d9a5cb9b23266753d833ffbaa65bc10218dcc86593253
                                    • Instruction ID: 7df584ef912cda5252a14f66569b23305ad766fc0c6f7bbd9771dee905e076fa
                                    • Opcode Fuzzy Hash: 7e515f7c385f7f07b94d9a5cb9b23266753d833ffbaa65bc10218dcc86593253
                                    • Instruction Fuzzy Hash: 48018471A01118BBEB04DE99CC40FAEB7A9EBC8760F14C16AF61897785D674AD10CBA0

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 356 10021dfa-10021e0f 357 10021e11-10021e1c call 100258dc call 10024a04 356->357 358 10021e2f-10021e33 356->358 369 10021e21 357->369 359 10021e35 358->359 360 10021e49-10021e4e call 10026fe8 358->360 363 10021e37-10021e3a 359->363 364 10021e3c-10021e47 call 100258dc 359->364 368 10021e53-10021e57 360->368 363->360 363->364 364->369 368->369 371 10021e59-10021e63 call 10026dea 368->371 373 10021e23-10021e2e call 1001ffa4 369->373 371->373
                                    APIs
                                      • Part of subcall function 100258DC: __getptd_noexit.LIBCMT ref: 100258DC
                                    • _asctime.LIBCMT ref: 10021E5D
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: __getptd_noexit_asctime
                                    • String ID:
                                    • API String ID: 1865661205-0
                                    • Opcode ID: dcfe908546e3f88bc8117c10939122550607e7d39558988ca205b2cb5c272348
                                    • Instruction ID: 4125543197aa1fcd6f4b2a2d68e97bfeb0adc15cba48122be1fc6d66b0878a2d
                                    • Opcode Fuzzy Hash: dcfe908546e3f88bc8117c10939122550607e7d39558988ca205b2cb5c272348
                                    • Instruction Fuzzy Hash: 53F04939A002099EDF00DBA4EC56BCE77ECEF28255FD20469EC05EB091EB74E9848725

                                    Control-flow Graph

                                    APIs
                                    • WSAStartup.WS2_32(00000202), ref: 1003651E
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Startup
                                    • String ID:
                                    • API String ID: 724789610-0
                                    • Opcode ID: d3557ac59b8f8fefe8b80b3b61d78a442e21de74061af108e84e171f57d9cb46
                                    • Instruction ID: a027679b03284c68216ebb438d11db6f7a8099bc69e3ea9b22835e59c52e58d0
                                    • Opcode Fuzzy Hash: d3557ac59b8f8fefe8b80b3b61d78a442e21de74061af108e84e171f57d9cb46
                                    • Instruction Fuzzy Hash: ABE0DF74A04208ABCB00DBB4DD0755D77F4EF49200F80016CF9098B252EB34AA148A82

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 384 10022bd3-10022bdd call 10022aa4 386 10022be2-10022be6 384->386
                                    APIs
                                    • _doexit.LIBCMT ref: 10022BDD
                                      • Part of subcall function 10022AA4: __lock.LIBCMT ref: 10022AB2
                                      • Part of subcall function 10022AA4: DecodePointer.KERNEL32(101B78D8,0000001C,10022A1B,00000000,00000001,00000000,?,1002296B,000000FF,?,10028014,00000011,?,?,10025D6D,0000000D), ref: 10022AF1
                                      • Part of subcall function 10022AA4: DecodePointer.KERNEL32(?,1002296B,000000FF,?,10028014,00000011,?,?,10025D6D,0000000D), ref: 10022B02
                                      • Part of subcall function 10022AA4: EncodePointer.KERNEL32(00000000,?,1002296B,000000FF,?,10028014,00000011,?,?,10025D6D,0000000D), ref: 10022B1B
                                      • Part of subcall function 10022AA4: DecodePointer.KERNEL32(-00000004,?,1002296B,000000FF,?,10028014,00000011,?,?,10025D6D,0000000D), ref: 10022B2B
                                      • Part of subcall function 10022AA4: EncodePointer.KERNEL32(00000000,?,1002296B,000000FF,?,10028014,00000011,?,?,10025D6D,0000000D), ref: 10022B31
                                      • Part of subcall function 10022AA4: DecodePointer.KERNEL32(?,1002296B,000000FF,?,10028014,00000011,?,?,10025D6D,0000000D), ref: 10022B47
                                      • Part of subcall function 10022AA4: DecodePointer.KERNEL32(?,1002296B,000000FF,?,10028014,00000011,?,?,10025D6D,0000000D), ref: 10022B52
                                      • Part of subcall function 10022AA4: __initterm.LIBCMT ref: 10022B7A
                                      • Part of subcall function 10022AA4: __initterm.LIBCMT ref: 10022B8B
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Pointer$Decode$Encode__initterm$__lock_doexit
                                    • String ID:
                                    • API String ID: 3712619029-0
                                    • Opcode ID: e664eab0a2f8ce3703c552baf369986a84cdf03d3e0bf670d1975cdb5f15a4fc
                                    • Instruction ID: cfc2533f0be627bc8b7b8cac997dbfbd0b87b13c6f736a1528db1b5c4a82aaa4
                                    • Opcode Fuzzy Hash: e664eab0a2f8ce3703c552baf369986a84cdf03d3e0bf670d1975cdb5f15a4fc
                                    • Instruction Fuzzy Hash: 06B0123158030C33E9201581FC03F093B1C8F80A60F500020FF0C1C5E1A593756080CA
                                    APIs
                                    • GetModuleFileNameA.KERNEL32(00000000,?,00000104,1AA35F0A,?,?,?,00000000,10023340,101B6C90,000000FE,?,10013C89,TMzsft xtnogaqk,Yyickg caosusmk,Eaiawk mgqwgoywasgymoeeuu), ref: 10012594
                                    • ExpandEnvironmentStringsA.KERNEL32(C:\Users\Public\Documents\,?,00000104,?,?,?,00000000,10023340,101B6C90,000000FE,?,10013C89,TMzsft xtnogaqk,Yyickg caosusmk,Eaiawk mgqwgoywasgymoeeuu), ref: 100125AB
                                    • _strlen.LIBCMT ref: 100125B8
                                    • _strncmp.LIBCMT ref: 100125CF
                                    • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 1001270E
                                      • Part of subcall function 10012300: _memset.LIBCMT ref: 10012328
                                      • Part of subcall function 10012300: _strlen.LIBCMT ref: 1001234F
                                      • Part of subcall function 10012300: _strncpy.LIBCMT ref: 10012382
                                      • Part of subcall function 10012300: CreateDirectoryA.KERNEL32(00000000,00000000), ref: 100123A9
                                    • wsprintfA.USER32 ref: 10012616
                                    • _strlen.LIBCMT ref: 10012626
                                    • _strlen.LIBCMT ref: 10012642
                                    • CopyFileA.KERNEL32(?,?,00000000), ref: 100126AE
                                    • _memset.LIBCMT ref: 100126C2
                                    • _strcat.LIBCMT ref: 100126D8
                                    • CreateServiceA.ADVAPI32(?,?,?,000F01FF,00000110,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000), ref: 10012756
                                    • LockServiceDatabase.ADVAPI32(?), ref: 10012769
                                    • ChangeServiceConfig2A.ADVAPI32(00000000,00000001,?), ref: 10012799
                                    • ChangeServiceConfig2A.ADVAPI32(00000000,00000002,00015180), ref: 10012877
                                    • UnlockServiceDatabase.ADVAPI32(?), ref: 10012884
                                    • GetLastError.KERNEL32 ref: 10012893
                                    • OpenServiceA.ADVAPI32(?,?,000F01FF), ref: 100128B0
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Service$_strlen$ChangeConfig2CreateDatabaseFileOpen_memset$CopyDirectoryEnvironmentErrorExpandLastLockManagerModuleNameStringsUnlock_strcat_strncmp_strncpywsprintf
                                    • String ID: %$C:\Users\Public\Documents\$Description$SYSTEM\CurrentControlSet\Services\$Windows Update$Yyickg caosusmk$s
                                    • API String ID: 2269191997-3217403557
                                    • Opcode ID: da25e49445566c96217ba80189cd2cecd7e86491d1e1acde59f2152fe1c39007
                                    • Instruction ID: 58a78215622ab89836c283d46f1977e4f6cad2cf6e4b3b9b80a50220f8474d07
                                    • Opcode Fuzzy Hash: da25e49445566c96217ba80189cd2cecd7e86491d1e1acde59f2152fe1c39007
                                    • Instruction Fuzzy Hash: BEE17471D04298DFEB26CB94DC88BDE7BB8BB15704F0441D9E5486A2C1C7B95B88CF61
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File_memset$ModuleNamePathRemoveSpeclstrlen
                                    • String ID: && del "$ /c ping -n 4 127.0.0.1 > nul$" > nul$COMSPEC$D
                                    • API String ID: 322946884-2269649423
                                    • Opcode ID: 144a78e811b26684e0f96933bcd6fe390524fe62f1730313945f432d4c563e04
                                    • Instruction ID: 84f9132210fad28102cfca7cccb4be7a633d21108d91728e9d5e1e2c02768cad
                                    • Opcode Fuzzy Hash: 144a78e811b26684e0f96933bcd6fe390524fe62f1730313945f432d4c563e04
                                    • Instruction Fuzzy Hash: 17914F75A00219AFEB24DB64CC85BEA77B8FF48740F448599F20DAA191DF70AB84CF51
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _memset$State$AsyncSleeplstrlen
                                    • String ID: <BackSpace>$<Enter>$]$e
                                    • API String ID: 607291201-3604511016
                                    • Opcode ID: da57c67bcd9e4523acf9165be53d619ee9f3dc396b189a0e504f25392de7e49e
                                    • Instruction ID: 971390b8b5f7826b9d9bd22f466c4ca9011c4cb2ed80f64febdb7f556ca07fc7
                                    • Opcode Fuzzy Hash: da57c67bcd9e4523acf9165be53d619ee9f3dc396b189a0e504f25392de7e49e
                                    • Instruction Fuzzy Hash: 6091F4B4900718DFEB20CFA0DC49BEA7375FB84346F1041EDE509A6186DB76AA94DF41
                                    APIs
                                    • LoadLibraryA.KERNEL32(userenv.dll), ref: 100123D8
                                    • GetProcAddress.KERNEL32(?,CreateEnvironmentBlock), ref: 100123EA
                                    • _memset.LIBCMT ref: 10012417
                                    • _memset.LIBCMT ref: 10012427
                                    • GetCurrentProcess.KERNEL32 ref: 10012459
                                    • OpenProcessToken.ADVAPI32(?,000F01FF,00000000), ref: 1001246F
                                    • DuplicateTokenEx.ADVAPI32(00000000,02000000,00000000,00000001,00000001,00000000), ref: 10012488
                                    • LoadLibraryA.KERNEL32(Kernel32.dll,WTSGetActiveConsoleSessionId), ref: 10012498
                                    • GetProcAddress.KERNEL32(00000000), ref: 1001249F
                                    • SetTokenInformation.ADVAPI32(00000000,0000000C,00000000,00000004), ref: 100124C0
                                    • CreateProcessAsUserA.ADVAPI32(00000000,00000000,00000000,00000000,00000000,00000000,00000430,00000000,00000000,00000044,00000000), ref: 100124F6
                                    • CloseHandle.KERNEL32(00000000), ref: 10012506
                                    • CloseHandle.KERNEL32(00000000), ref: 10012510
                                    • FreeLibrary.KERNEL32(00000000), ref: 1001252F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: LibraryProcessToken$AddressCloseHandleLoadProc_memset$CreateCurrentDuplicateFreeInformationOpenUser
                                    • String ID: CreateEnvironmentBlock$D$Kernel32.dll$WTSGetActiveConsoleSessionId$userenv.dll
                                    • API String ID: 2385095549-609967149
                                    • Opcode ID: ac44d7a654e1ecf9cefedaa459ffae167c2ab3953bef6485a400e85d30f059f2
                                    • Instruction ID: fd1ae4a91e3460f93e873eecc7cbeda63378566b322c9237b013182db1ce3722
                                    • Opcode Fuzzy Hash: ac44d7a654e1ecf9cefedaa459ffae167c2ab3953bef6485a400e85d30f059f2
                                    • Instruction Fuzzy Hash: B741B6B5E00218EFEB14DFE0CC99BAEBBB4FB48705F104518E6156B281D7B59944CF90
                                    APIs
                                    • GetModuleHandleA.KERNEL32(kernel32,GetLogicalProcessorInformation,?,00000000), ref: 10005CC3
                                    • GetProcAddress.KERNEL32(00000000), ref: 10005CCA
                                    • GetLastError.KERNEL32 ref: 10005CEC
                                    • _free.LIBCMT ref: 10005CF8
                                      • Part of subcall function 1002043C: HeapFree.KERNEL32(00000000,00000000,?,10025D1C,00000000,100258E1,100204FB,?,?,100010EB,0000DF68,?,10001048,00000001), ref: 10020450
                                      • Part of subcall function 1002043C: GetLastError.KERNEL32(00000000,?,10025D1C,00000000,100258E1,100204FB,?,?,100010EB,0000DF68,?,10001048,00000001), ref: 10020462
                                    • _malloc.LIBCMT ref: 10005D04
                                    • _free.LIBCMT ref: 10005D3E
                                    • GetSystemInfo.KERNEL32(?), ref: 10005D54
                                    • _perror.LIBCMT ref: 10005D79
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ErrorLast_free$AddressFreeHandleHeapInfoModuleProcSystem_malloc_perror
                                    • String ID: GetLogicalProcessorInformation$kernel32$zstd
                                    • API String ID: 346688108-2576447550
                                    • Opcode ID: ebf4960832639757ba6ddf85c4acd03ed6aa7b5749e8a4a28e034f0c5179f344
                                    • Instruction ID: 534da2e331fe06abe5cc17a8b34cc9891e156add97b29abc730671e8849a38bb
                                    • Opcode Fuzzy Hash: ebf4960832639757ba6ddf85c4acd03ed6aa7b5749e8a4a28e034f0c5179f344
                                    • Instruction Fuzzy Hash: 3C212976A003115FF721E7249C89A4F73E8FF84292F940527FC0587215E73AEA4587D2
                                    APIs
                                    • socket.WS2_32(?,00000001,00000006), ref: 1001DC4B
                                    • bind.WS2_32(00000000,00000002,0000001C), ref: 1001DC70
                                    • WSAGetLastError.WS2_32(?,?,?,?), ref: 1001DCA8
                                    • SetLastError.KERNEL32 ref: 1001DCB6
                                    • WSAGetLastError.WS2_32(?,?,?,?), ref: 1001DCD7
                                    • SetLastError.KERNEL32 ref: 1001DCE5
                                    • WSAGetLastError.WS2_32(?,?,?), ref: 1001DCF6
                                    • SetLastError.KERNEL32 ref: 1001DD04
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ErrorLast$bindsocket
                                    • String ID: 0.0.0.0
                                    • API String ID: 2672188334-3771769585
                                    • Opcode ID: 67e94f2010b34371f429a1fa7c81e8d84f1349c60049d7ca6e869d281ca33336
                                    • Instruction ID: 8216ced0d739489223f21362e87208fc090313cd3a371b7f6b63c1b20dd229cb
                                    • Opcode Fuzzy Hash: 67e94f2010b34371f429a1fa7c81e8d84f1349c60049d7ca6e869d281ca33336
                                    • Instruction Fuzzy Hash: 8231E672A002159FE720EF68DC85BAB77E8EF45350F00452EFD09CA181EAB5D885D7A0
                                    APIs
                                    • GetCurrentProcessId.KERNEL32 ref: 1000F2C3
                                    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 1000F2DD
                                    • Process32First.KERNEL32(000000FF,00000128), ref: 1000F30E
                                    • OpenProcess.KERNEL32(00000001,00000000,00000000,000000FF,00000128,00000002,00000000), ref: 1000F347
                                    • TerminateProcess.KERNEL32(00000000,00000000), ref: 1000F367
                                    • CloseHandle.KERNEL32(00000000), ref: 1000F374
                                    • Process32Next.KERNEL32(000000FF,00000128), ref: 1000F388
                                    • CloseHandle.KERNEL32(000000FF,000000FF,00000128,00000002,00000000), ref: 1000F39C
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Process$CloseHandleProcess32$CreateCurrentFirstNextOpenSnapshotTerminateToolhelp32
                                    • String ID:
                                    • API String ID: 477742948-0
                                    • Opcode ID: 0e5e03193292138b7c311efabc93a15d5f194d092c39daaf66340cd660e8982b
                                    • Instruction ID: d41c4376eefb6253570006433f593cac2f32630ea850329660a4d75d5b4afe3c
                                    • Opcode Fuzzy Hash: 0e5e03193292138b7c311efabc93a15d5f194d092c39daaf66340cd660e8982b
                                    • Instruction Fuzzy Hash: 4921C370900228DFDB25EB60CD89BEDB7B4FB48750F1045D9E609AB290D774AB80DF50
                                    APIs
                                    • _memset.LIBCMT ref: 10012AB1
                                      • Part of subcall function 100122A0: GetModuleHandleA.KERNEL32(kernel32,IsWow64Process), ref: 100122C1
                                      • Part of subcall function 100122A0: GetProcAddress.KERNEL32(00000000), ref: 100122C8
                                      • Part of subcall function 100122A0: GetCurrentProcess.KERNEL32(00000000), ref: 100122DB
                                    • GetVersionExA.KERNEL32(0000009C), ref: 10012AED
                                      • Part of subcall function 10011EE0: LoadLibraryA.KERNEL32(ntdll.dll), ref: 10011EF9
                                      • Part of subcall function 10011EE0: GetProcAddress.KERNEL32(00000000,RtlGetNtVersionNumbers), ref: 10011F11
                                      • Part of subcall function 10011EE0: FreeLibrary.KERNEL32(00000000), ref: 10011F4A
                                      • Part of subcall function 10011980: LoadLibraryA.KERNEL32(Ole32.dll), ref: 10011995
                                      • Part of subcall function 10011980: GetProcAddress.KERNEL32(?,CoInitialize), ref: 100119A7
                                      • Part of subcall function 10011980: GetProcAddress.KERNEL32(?,CoUninitialize), ref: 100119B9
                                      • Part of subcall function 10011980: GetProcAddress.KERNEL32(?,CoCreateInstance), ref: 100119CB
                                      • Part of subcall function 10011980: LoadLibraryA.KERNEL32(Oleaut32.dll), ref: 100119D9
                                      • Part of subcall function 10011980: GetProcAddress.KERNEL32(?,SysFreeString), ref: 100119EB
                                      • Part of subcall function 10011C40: _strncpy.LIBCMT ref: 10011D43
                                      • Part of subcall function 100121A0: _memset.LIBCMT ref: 100121D2
                                      • Part of subcall function 10011D80: GetSystemInfo.KERNEL32(?), ref: 10011DCD
                                      • Part of subcall function 10011D80: __snprintf.LIBCMT ref: 10011DE8
                                      • Part of subcall function 10012130: _memset.LIBCMT ref: 1001214F
                                      • Part of subcall function 10012130: GlobalMemoryStatusEx.KERNEL32(00000040), ref: 10012162
                                      • Part of subcall function 10011E10: _memset.LIBCMT ref: 10011E5F
                                      • Part of subcall function 10011E10: _memset.LIBCMT ref: 10011E71
                                      • Part of subcall function 10011E10: lstrlenA.KERNEL32(?), ref: 10011EA4
                                      • Part of subcall function 10011E10: gethostname.WS2_32(?,10012B7F), ref: 10011EB6
                                      • Part of subcall function 10011E10: lstrlenA.KERNEL32(?), ref: 10011EC0
                                      • Part of subcall function 10013280: GetLastInputInfo.USER32(00000008), ref: 1001329B
                                    • _memmove.LIBCMT ref: 10012B9C
                                    • InternetGetConnectedState.WININET(?,00000000), ref: 10012BAD
                                    • _strlen.LIBCMT ref: 10012BB7
                                      • Part of subcall function 10006F00: _Func_class.LIBCPMTD ref: 10006F71
                                    • _Func_class.LIBCPMTD ref: 10012BD2
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressProc$_memset$Library$Load$Func_classInfolstrlen$ConnectedCurrentFreeGlobalHandleInputInternetLastMemoryModuleProcessStateStatusSystemVersion__snprintf_memmove_strlen_strncpygethostname
                                    • String ID:
                                    • API String ID: 1392860501-0
                                    • Opcode ID: 43b44d29e576c7a7eab6005ce55aa7196c291a1fb8a4cd9e799f16c790759da6
                                    • Instruction ID: 6fcb611156f6b3c8081496a382b787b04c25c68574042c94e1e96bd79d1c608f
                                    • Opcode Fuzzy Hash: 43b44d29e576c7a7eab6005ce55aa7196c291a1fb8a4cd9e799f16c790759da6
                                    • Instruction Fuzzy Hash: 514186B9D4021A6BDB14DBA0DC46FEE7378EF14344F4045A8F51D6A182EE34B7888B91
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: State$AsyncSleep_memsetlstrlen
                                    • String ID: ]$e
                                    • API String ID: 1122937223-1460998272
                                    • Opcode ID: eed0b91c2744c895165e97b4f44415f78997a58abc4c3c7c85806ef0c703c4ee
                                    • Instruction ID: 764bce47da2be80fe97f0ee0a60544cb6e7be49dbe84d1d57fcac03222c10f19
                                    • Opcode Fuzzy Hash: eed0b91c2744c895165e97b4f44415f78997a58abc4c3c7c85806ef0c703c4ee
                                    • Instruction Fuzzy Hash: 35011A34901728CFFB64CF15CC85BA977B2FB80391F1082A9C4095695ACB779EA1EE01
                                    APIs
                                    • WSAGetLastError.WS2_32(?,?,?,?,?,?,1001C326,FFFFFFFF,?,?,?,FFFFFFFF,?), ref: 1001C5E3
                                      • Part of subcall function 100172C0: __CxxThrowException@8.LIBCMT ref: 100172D2
                                      • Part of subcall function 100172C0: EnterCriticalSection.KERNEL32(00000000,1AA35F0A,00000000,00000098,?,?,00000000,10035B28,000000FF,?,?,101B722C,?,1001640E,80004005), ref: 10017312
                                      • Part of subcall function 100172C0: LeaveCriticalSection.KERNEL32(00000000,?,?,00000000,10035B28,000000FF,?,?,101B722C,?,1001640E,80004005,?,100168C9,00000400,00000400), ref: 1001737B
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalSection$EnterErrorException@8LastLeaveThrow
                                    • String ID:
                                    • API String ID: 1367629879-0
                                    • Opcode ID: 1a78252def1050f5be20003a34375eeef4699fcd1b0fa4c910ffc5e1ea9ae854
                                    • Instruction ID: 2045c5cf5837c9daf880452df431a01197e78d674d59fb6298516e1ae159bddb
                                    • Opcode Fuzzy Hash: 1a78252def1050f5be20003a34375eeef4699fcd1b0fa4c910ffc5e1ea9ae854
                                    • Instruction Fuzzy Hash: 7851BEB5900218AFDB21DFA4C841AAE77B5FF44390F100219F8599F291E770EDD0DB91
                                    APIs
                                    • FreeLibrary.KERNEL32(00000000), ref: 1001446A
                                    • _free.LIBCMT ref: 10014479
                                    • VirtualFree.KERNEL32(?,00000000,00008000,?,1001478E), ref: 10014498
                                    • GetProcessHeap.KERNEL32(00000000,00000000,?,1001478E), ref: 100144A4
                                    • HeapFree.KERNEL32(00000000,?,1001478E), ref: 100144AB
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Free$Heap$LibraryProcessVirtual_free
                                    • String ID:
                                    • API String ID: 3953351234-0
                                    • Opcode ID: d9d32f6ed72f362beb0b78fbb99d4c82a6959af6a865298871246b0d9bcbc94d
                                    • Instruction ID: e984664baf45058b12496fb5a6c08b784cfcca4bbda2656e475c534f62021b4f
                                    • Opcode Fuzzy Hash: d9d32f6ed72f362beb0b78fbb99d4c82a6959af6a865298871246b0d9bcbc94d
                                    • Instruction Fuzzy Hash: 6131B674A00208EFDB14CF94C598B9DB7B6FB49315F258288E9056B391C775EE86DF80
                                    APIs
                                    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,10011CAA), ref: 100152B1
                                      • Part of subcall function 1001EF9C: _malloc.LIBCMT ref: 1001EFB4
                                    • Process32First.KERNEL32(10011CAA,1AA35F0A), ref: 100152E0
                                    • Process32Next.KERNEL32(10011CAA,1AA35F0A), ref: 10015316
                                    • lstrcmpiA.KERNEL32(1AA35EE6,00000000), ref: 1001532A
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Process32$CreateFirstNextSnapshotToolhelp32_malloclstrcmpi
                                    • String ID:
                                    • API String ID: 242301054-0
                                    • Opcode ID: 335c3f3c8a0e05f5839a3b8562ab9f751be2bf2361413e739464e8ead2f72be9
                                    • Instruction ID: 03fd10ac50de1202267bfae5930d06ed0f63b87ea6e01dd6c59341b656d33967
                                    • Opcode Fuzzy Hash: 335c3f3c8a0e05f5839a3b8562ab9f751be2bf2361413e739464e8ead2f72be9
                                    • Instruction Fuzzy Hash: 8321BAB4A04208EBDB14CB98C981A9EB7F5EF48745F2480A8E818AF341D771EF81DB54
                                    APIs
                                      • Part of subcall function 10015000: LoadLibraryA.KERNEL32(ADVAPI32.dll), ref: 10015019
                                      • Part of subcall function 10015000: GetProcAddress.KERNEL32(?,OpenProcessToken), ref: 1001502B
                                      • Part of subcall function 10015000: GetProcAddress.KERNEL32(?,AdjustTokenPrivileges), ref: 1001503D
                                      • Part of subcall function 10015000: GetProcAddress.KERNEL32(?,LookupPrivilegeValueA), ref: 1001504F
                                      • Part of subcall function 10015000: LoadLibraryA.KERNEL32(kernel32.dll), ref: 1001505D
                                      • Part of subcall function 10015000: GetProcAddress.KERNEL32(?,GetCurrentProcess), ref: 1001506F
                                    • ExitWindowsEx.USER32(?,00000000), ref: 10010578
                                      • Part of subcall function 10015000: LoadLibraryA.KERNEL32(KERNEL32.dll), ref: 100150F0
                                      • Part of subcall function 10015000: GetProcAddress.KERNEL32(?,GetLastError), ref: 10015102
                                      • Part of subcall function 10015000: CloseHandle.KERNEL32(?), ref: 1001511A
                                      • Part of subcall function 10015000: FreeLibrary.KERNEL32(00000000), ref: 1001512A
                                      • Part of subcall function 10015000: FreeLibrary.KERNEL32(00000000), ref: 1001513A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressLibraryProc$Load$Free$CloseExitHandleWindows
                                    • String ID: SeShutdownPrivilege
                                    • API String ID: 3789203340-3733053543
                                    • Opcode ID: 1ee43cc076062974db8b991385aee2a4a112618670f0f8bd0dc99bd4091fe260
                                    • Instruction ID: 1f84b243cf82737e1a42207ec92b1639b24ad97c5d3f070e489050a92cf0a957
                                    • Opcode Fuzzy Hash: 1ee43cc076062974db8b991385aee2a4a112618670f0f8bd0dc99bd4091fe260
                                    • Instruction Fuzzy Hash: 5CD0C9BAA80318BBD625AAD1AC57FC936089714747F880014FA085D1C2E5A7B19042E2
                                    APIs
                                    • WSARecv.WS2_32(?,?,00000001,?,?,00000000,00000000), ref: 1001A49D
                                    • WSAGetLastError.WS2_32 ref: 1001A4A8
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ErrorLastRecv
                                    • String ID:
                                    • API String ID: 904507345-0
                                    • Opcode ID: 6d4a77044bf01599b4c4d9c9718d747d5542e35423cd9aede843caf72be793c6
                                    • Instruction ID: 82c1de10f7d51eada6aa726a5a3efe5d73ab1be028bbaf26b8a0bc00750a651c
                                    • Opcode Fuzzy Hash: 6d4a77044bf01599b4c4d9c9718d747d5542e35423cd9aede843caf72be793c6
                                    • Instruction Fuzzy Hash: 6EF0CD32A15118AFEB14CF94EC49BE97BA8EB05321F000289FD0C9B6C0D7B1AA40DBD1
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: hXMV$hXMV
                                    • API String ID: 0-400149659
                                    • Opcode ID: e9df29b40b8b17f0cd111d63266152e2dca58cd2ba3867890a7f6b55724276bc
                                    • Instruction ID: 4894185f0b18a9b9ee3a77af486a92bf4d51351e367bba8918dec77b28b3b147
                                    • Opcode Fuzzy Hash: e9df29b40b8b17f0cd111d63266152e2dca58cd2ba3867890a7f6b55724276bc
                                    • Instruction Fuzzy Hash: 9D01D672A04358ABC704CF99CD8079EFBF8F709660F60466AF405D3B90D7395544C790
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 12050be9e66c5deb1d9325e021b636a37a4104aea8b1783f5f3b593b0ddfebef
                                    • Instruction ID: a7514d67e8f405398fbd76f14816f866ec2f0755db8d1a5e84f2eed078b58306
                                    • Opcode Fuzzy Hash: 12050be9e66c5deb1d9325e021b636a37a4104aea8b1783f5f3b593b0ddfebef
                                    • Instruction Fuzzy Hash: 9C0192B4D04208FBDB04CF95C45179EBBF4EF88744F20C0AED8156B240C7B95A889F14
                                    APIs
                                    • _memset.LIBCMT ref: 10015432
                                    • _memset.LIBCMT ref: 10015448
                                    • _memset.LIBCMT ref: 1001545E
                                    • LoadLibraryA.KERNEL32(ADVAPI32.dll), ref: 1001546B
                                    • GetProcAddress.KERNEL32(00000000,RegQueryValueExA), ref: 10015493
                                    • GetProcAddress.KERNEL32(00000000,RegOpenKeyExA), ref: 100154AB
                                    • GetProcAddress.KERNEL32(00000000,RegEnumValueA), ref: 100154C3
                                    • GetProcAddress.KERNEL32(00000000,RegEnumKeyExA), ref: 100154DB
                                    • GetProcAddress.KERNEL32(00000000,RegCloseKey), ref: 100154F3
                                    • FreeLibrary.KERNEL32(00000000), ref: 1001553C
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressProc$_memset$Library$FreeLoad
                                    • String ID: ADVAPI32.dll$RegCloseKey$RegEnumKeyExA$RegEnumValueA$RegOpenKeyExA$RegQueryValueExA
                                    • API String ID: 2029490530-3713883646
                                    • Opcode ID: ce21794f6d49dae7673cc83d0b588799919480882acf9cc9429ea4c88414c882
                                    • Instruction ID: 42d3faf0a6d82433ca9894e8e05647cd2437e6e791ab8efedd1cac75c6c50b36
                                    • Opcode Fuzzy Hash: ce21794f6d49dae7673cc83d0b588799919480882acf9cc9429ea4c88414c882
                                    • Instruction Fuzzy Hash: 4AB17EB5904629EFDB20DF64CC89BEEB7B4FB48306F0445D8E909AA290D7759AC4CF50
                                    APIs
                                    • WinHttpOpen.WINHTTP(curl/7.83.1,00000000,00000000,00000000,00000000), ref: 10007197
                                    • WinHttpSetTimeouts.WINHTTP(00000000,000003E8,000003E8,000003E8,000003E8), ref: 100071BE
                                    • WinHttpConnect.WINHTTP(00000000,?,00000050,00000000), ref: 100071D6
                                    • WinHttpOpenRequest.WINHTTP(00000000,GET,?,00000000,00000000,00000000,00000000), ref: 100071FA
                                    • WinHttpSendRequest.WINHTTP(00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 10007219
                                    • WinHttpReceiveResponse.WINHTTP(00000000,00000000), ref: 1000722E
                                    • WinHttpQueryHeaders.WINHTTP(00000000,20000013,00000000,00000000,00000004,00000000), ref: 10007264
                                    • __CxxThrowException@8.LIBCMT ref: 10007272
                                    • WinHttpQueryDataAvailable.WINHTTP(00000000,00000000), ref: 10007293
                                    • GetLastError.KERNEL32 ref: 1000729D
                                    • __CxxThrowException@8.LIBCMT ref: 100072AF
                                    • std::ios_base::clear.LIBCPMTD ref: 100072C8
                                    • WinHttpReadData.WINHTTP(00000000,00000000,00000000,00000000,00000000,00000000), ref: 100072E4
                                    • std::ios_base::clear.LIBCPMTD ref: 100072FF
                                    • GetLastError.KERNEL32(00000000), ref: 1000730A
                                    • _wprintf.LIBCMT ref: 10007316
                                    • WinHttpCloseHandle.WINHTTP(00000000), ref: 10007328
                                    • WinHttpCloseHandle.WINHTTP(00000000), ref: 10007338
                                    • WinHttpCloseHandle.WINHTTP(00000000), ref: 10007348
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Http$CloseHandle$DataErrorException@8LastOpenQueryRequestThrowstd::ios_base::clear$AvailableConnectHeadersReadReceiveResponseSendTimeouts_wprintf
                                    • String ID: Error %d has occurred.$GET$curl/7.83.1
                                    • API String ID: 3568891788-3281102068
                                    • Opcode ID: a0faf76c0c659e3c95fc50e059929233ef8cb015fb8e25ec05d524550362fc63
                                    • Instruction ID: 96198f7158a5b0440b015918e988b78723295c7c608185cc2ea97e2543ed712c
                                    • Opcode Fuzzy Hash: a0faf76c0c659e3c95fc50e059929233ef8cb015fb8e25ec05d524550362fc63
                                    • Instruction Fuzzy Hash: CF7107B1D40248EFEB15DFA0CC99BEEBBB4FB04741F104119F51AAA2D4CB786A45DB50
                                    APIs
                                    • RegisterServiceCtrlHandlerA.ADVAPI32(TMzsft xtnogaqk,10012E80), ref: 10012C4D
                                    • FreeConsole.KERNEL32 ref: 10012C68
                                    • SetServiceStatus.ADVAPI32(?,101BD9EC), ref: 10012CB5
                                    • Sleep.KERNEL32(000001F4), ref: 10012CCA
                                    • SetServiceStatus.ADVAPI32(?,101BD9EC), ref: 10012CE6
                                    • CreateMutexA.KERNEL32(00000000,00000000,TMzsft xtnogaqk), ref: 10012D08
                                    • GetLastError.KERNEL32 ref: 10012D14
                                    • WSAStartup.WS2_32(00000202,?), ref: 10012D34
                                    • GetVersionExA.KERNEL32(00000094), ref: 10012D4B
                                    • Sleep.KERNEL32(000F4240,00000000), ref: 10012D73
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Service$SleepStatus$ConsoleCreateCtrlErrorFreeHandlerLastMutexRegisterStartupVersion
                                    • String ID: %s Win7$TMzsft xtnogaqk
                                    • API String ID: 1415809075-2726583022
                                    • Opcode ID: 3c918adf2ea9c1f546c4a298ab0c77e3fc501175bd32b3641c86ff31aace8df7
                                    • Instruction ID: 16fc8e2a50e62427ded2aaa4a0275d88474e0d3da89c2d2dd2af286da20813d4
                                    • Opcode Fuzzy Hash: 3c918adf2ea9c1f546c4a298ab0c77e3fc501175bd32b3641c86ff31aace8df7
                                    • Instruction Fuzzy Hash: 9B518EB5904224DFE729EF60CC8DB9A77B4FB04306F804298E10D6A5A1D7786AC8DF52
                                    APIs
                                    • LoadLibraryA.KERNEL32(wininet.dll), ref: 10015F01
                                    • GetProcAddress.KERNEL32(?,InternetOpenA), ref: 10015F19
                                    • FreeLibrary.KERNEL32(00000000), ref: 10015F57
                                    • GetProcAddress.KERNEL32(?,InternetOpenUrlA), ref: 10015F70
                                    • FreeLibrary.KERNEL32(00000000), ref: 10015FB7
                                    • CreateFileA.KERNEL32(1000F526,40000000,00000000,00000000,00000002,00000000,00000000), ref: 10015FD7
                                    • _memset.LIBCMT ref: 10015FFE
                                    • GetProcAddress.KERNEL32(?,InternetReadFile), ref: 10016012
                                    • WriteFile.KERNEL32(000000FF,?,00000000,00000000,00000000), ref: 10016086
                                    • CloseHandle.KERNEL32(000000FF), ref: 100160A0
                                    • Sleep.KERNEL32(00000001), ref: 100160A8
                                    • GetProcAddress.KERNEL32(?,InternetCloseHandle), ref: 100160BA
                                    • FreeLibrary.KERNEL32(00000000), ref: 100160F0
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressLibraryProc$Free$File$CloseCreateHandleLoadSleepWrite_memset
                                    • String ID: InternetCloseHandle$InternetOpenA$InternetOpenUrlA$InternetReadFile$MSIE 6.0$wininet.dll
                                    • API String ID: 2728150189-4269851202
                                    • Opcode ID: 91acf4dff87506ba4283441e8002569b8e5cf21a0175855ebad90579deee730e
                                    • Instruction ID: e100d08a212eeccd1dc3a45c1d5aa8af2f61e991188d98dff4208e55cab7884c
                                    • Opcode Fuzzy Hash: 91acf4dff87506ba4283441e8002569b8e5cf21a0175855ebad90579deee730e
                                    • Instruction Fuzzy Hash: DA51CCF5900228DFEB31DB64CD89BDA77B8AB48305F5081D8F709AA181C7759AC5CF68
                                    APIs
                                    • LoadLibraryA.KERNEL32(ADVAPI32.dll), ref: 10015019
                                    • GetProcAddress.KERNEL32(?,OpenProcessToken), ref: 1001502B
                                    • GetProcAddress.KERNEL32(?,AdjustTokenPrivileges), ref: 1001503D
                                    • GetProcAddress.KERNEL32(?,LookupPrivilegeValueA), ref: 1001504F
                                    • LoadLibraryA.KERNEL32(kernel32.dll), ref: 1001505D
                                    • GetProcAddress.KERNEL32(?,GetCurrentProcess), ref: 1001506F
                                    • LoadLibraryA.KERNEL32(KERNEL32.dll), ref: 100150F0
                                    • GetProcAddress.KERNEL32(?,GetLastError), ref: 10015102
                                    • CloseHandle.KERNEL32(?), ref: 1001511A
                                    • FreeLibrary.KERNEL32(00000000), ref: 1001512A
                                    • FreeLibrary.KERNEL32(00000000), ref: 1001513A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressLibraryProc$Load$Free$CloseHandle
                                    • String ID: ADVAPI32.dll$AdjustTokenPrivileges$GetCurrentProcess$GetLastError$KERNEL32.dll$LookupPrivilegeValueA$OpenProcessToken$kernel32.dll
                                    • API String ID: 2887716753-1648388921
                                    • Opcode ID: 09c34ea0c58a1937bffb1c09e732f69496aae19d3495c3a7a974608a733c4652
                                    • Instruction ID: 2ba7eb19521ecd2e0521120e7302f927c8c69f99e1a3e1b69f5f98f9208caa0c
                                    • Opcode Fuzzy Hash: 09c34ea0c58a1937bffb1c09e732f69496aae19d3495c3a7a974608a733c4652
                                    • Instruction Fuzzy Hash: 8441F775A00218EFEB16DFE4CC88BEEBBB5FB08301F144518F905AA291D7799940CBA0
                                    APIs
                                    • LoadLibraryA.KERNEL32(ADVAPI32.dll,1AA35F0A), ref: 10015C0D
                                    • GetProcAddress.KERNEL32(00000000,RegCreateKeyExA), ref: 10015C2C
                                    • GetProcAddress.KERNEL32(00000000,RegSetValueExA), ref: 10015C3E
                                    • GetProcAddress.KERNEL32(00000000,RegDeleteKeyA), ref: 10015C50
                                    • GetProcAddress.KERNEL32(00000000,RegDeleteValueA), ref: 10015C62
                                    • GetProcAddress.KERNEL32(00000000,RegOpenKeyExA), ref: 10015C74
                                    • GetProcAddress.KERNEL32(00000000,RegCloseKey), ref: 10015C86
                                    • FreeLibrary.KERNEL32(00000000), ref: 10015CB7
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressProc$Library$FreeLoad
                                    • String ID: ADVAPI32.dll$RegCloseKey$RegCreateKeyExA$RegDeleteKeyA$RegDeleteValueA$RegOpenKeyExA$RegSetValueExA
                                    • API String ID: 2449869053-3188892968
                                    • Opcode ID: a0bd9a62e12f23e275d41ab7552c4dc3de141cd94503504a1d0315d773db0a11
                                    • Instruction ID: 7e0e5bb135e0f492be458d9bdacf26a44bf840c8ddca4d957ca8ae1cdeebb231
                                    • Opcode Fuzzy Hash: a0bd9a62e12f23e275d41ab7552c4dc3de141cd94503504a1d0315d773db0a11
                                    • Instruction Fuzzy Hash: A791C575A00208EFDB14CFA4D988BEEBBB9FB48751F148519F505AB280D776E981CB60
                                    APIs
                                    • LoadLibraryA.KERNEL32(Ole32.dll), ref: 10011995
                                    • GetProcAddress.KERNEL32(?,CoInitialize), ref: 100119A7
                                    • GetProcAddress.KERNEL32(?,CoUninitialize), ref: 100119B9
                                    • GetProcAddress.KERNEL32(?,CoCreateInstance), ref: 100119CB
                                    • LoadLibraryA.KERNEL32(Oleaut32.dll), ref: 100119D9
                                    • GetProcAddress.KERNEL32(?,SysFreeString), ref: 100119EB
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressProc$LibraryLoad
                                    • String ID: CoCreateInstance$CoInitialize$CoUninitialize$FriendlyName$Ole32.dll$Oleaut32.dll$SysFreeString
                                    • API String ID: 2238633743-3340630095
                                    • Opcode ID: 1d44af109edd1136255a39dc8a1dfaf4e7fcfd6cc7004c71e0f7df510543376a
                                    • Instruction ID: 212faf0c9611e66aabaa8f64879106e5bf96d811b783168d703724af177fa0bf
                                    • Opcode Fuzzy Hash: 1d44af109edd1136255a39dc8a1dfaf4e7fcfd6cc7004c71e0f7df510543376a
                                    • Instruction Fuzzy Hash: 69519279E00218EFDB14DFE8D884AEEB7B5FF88701F108558E516AB290D774A985CF60
                                    APIs
                                    • LoadLibraryA.KERNEL32(user32.dll,1AA35F0A,?,?,?,00000000,10023340,101B6E88,000000FE,?,100158FA,00000000), ref: 1001598B
                                    • GetProcAddress.KERNEL32(?,GetThreadDesktop), ref: 100159A3
                                    • GetProcAddress.KERNEL32(?,GetUserObjectInformationA), ref: 100159BB
                                    • GetProcAddress.KERNEL32(?,SetThreadDesktop), ref: 100159D3
                                    • GetProcAddress.KERNEL32(?,CloseDesktop), ref: 100159EB
                                    • LoadLibraryA.KERNEL32(kernel32.dll,?,?,?,00000000,10023340,101B6E88,000000FE,?,100158FA,00000000), ref: 100159FC
                                    • GetProcAddress.KERNEL32(?,GetCurrentThreadId), ref: 10015A14
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressProc$LibraryLoad
                                    • String ID: CloseDesktop$GetCurrentThreadId$GetThreadDesktop$GetUserObjectInformationA$SetThreadDesktop$kernel32.dll$user32.dll
                                    • API String ID: 2238633743-588083535
                                    • Opcode ID: a1b5b4eb188306deb7be5c334ff11527cf8147aa92056ec69f43df2731cc529d
                                    • Instruction ID: 0747fb5764a0f845c2061594b4b15d20bfc1687557696379681bc3d3be76b4b8
                                    • Opcode Fuzzy Hash: a1b5b4eb188306deb7be5c334ff11527cf8147aa92056ec69f43df2731cc529d
                                    • Instruction Fuzzy Hash: 1641ED76901228EFDB21CFA4CC88BEEB7B4FF49311F104599F949AA251DB759A80CF50
                                    Strings
                                    • SocketClient.Connect %s,%d, xrefs: 10013497
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: SocketClient.Connect %s,%d
                                    • API String ID: 0-4086773378
                                    • Opcode ID: 806049d0937e817d2a7edc25e8aa56914ceb32bd5803814fc0c8e8b9f4b12fda
                                    • Instruction ID: 63baf142f1b2acfd1537a39fce8e3a032f44fd155c7a3820f2eaebd6526bdc0f
                                    • Opcode Fuzzy Hash: 806049d0937e817d2a7edc25e8aa56914ceb32bd5803814fc0c8e8b9f4b12fda
                                    • Instruction Fuzzy Hash: 3CC13479804A69CBDB21DF64CC907DEB7B5FF49340F0082D9E409AA291EB749AE4CF50
                                    APIs
                                    • InterlockedCompareExchange.KERNEL32(00000001,00000001,00000000), ref: 1001ABD3
                                    • InterlockedCompareExchange.KERNEL32(00000001,00000001,00000000), ref: 1001ABE7
                                    • InterlockedDecrement.KERNEL32(00000005), ref: 1001AC11
                                    • DeleteCriticalSection.KERNEL32(?), ref: 1001AC61
                                    • DeleteCriticalSection.KERNEL32(?), ref: 1001AC6B
                                    • HeapFree.KERNEL32(00000000,00000000,?), ref: 1001AC75
                                    • InterlockedCompareExchange.KERNEL32(00000001,00000001,00000000), ref: 1001ACEB
                                    • timeGetTime.WINMM ref: 1001AD11
                                    • timeGetTime.WINMM ref: 1001AD1F
                                    • InterlockedDecrement.KERNEL32(00000005), ref: 1001AD52
                                    • DeleteCriticalSection.KERNEL32(?), ref: 1001ADA2
                                    • DeleteCriticalSection.KERNEL32(?), ref: 1001ADAC
                                    • HeapFree.KERNEL32(?,00000000,?), ref: 1001ADB7
                                    • InterlockedCompareExchange.KERNEL32(00000001,00000001,00000000), ref: 1001ADC5
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Interlocked$CompareCriticalDeleteExchangeSection$DecrementFreeHeapTimetime
                                    • String ID:
                                    • API String ID: 575379910-0
                                    • Opcode ID: 4b2b9e06dbfc7a189fe832d31680b9342d4a4f911797ed680ce7ed66d266748b
                                    • Instruction ID: 5fcf9dceec55b2fe5c3f5871ba84e04da2ee91e5bcf3991c6e7a15184a02e640
                                    • Opcode Fuzzy Hash: 4b2b9e06dbfc7a189fe832d31680b9342d4a4f911797ed680ce7ed66d266748b
                                    • Instruction Fuzzy Hash: A9719D7190065AEFDB11CF68CC84B5AB7F8FF05311F004669E81A9F691D774E984CBA1
                                    APIs
                                    • DecodePointer.KERNEL32(?,00000001,10023AED,101B7938,00000008,10023C24,?,00000001,?,101B7958,0000000C,10023BC3,?,00000001,?), ref: 10022851
                                    • _free.LIBCMT ref: 1002286A
                                      • Part of subcall function 1002043C: HeapFree.KERNEL32(00000000,00000000,?,10025D1C,00000000,100258E1,100204FB,?,?,100010EB,0000DF68,?,10001048,00000001), ref: 10020450
                                      • Part of subcall function 1002043C: GetLastError.KERNEL32(00000000,?,10025D1C,00000000,100258E1,100204FB,?,?,100010EB,0000DF68,?,10001048,00000001), ref: 10020462
                                    • _free.LIBCMT ref: 1002287D
                                    • _free.LIBCMT ref: 1002289B
                                    • _free.LIBCMT ref: 100228AD
                                    • _free.LIBCMT ref: 100228BE
                                    • _free.LIBCMT ref: 100228C9
                                    • _free.LIBCMT ref: 100228E3
                                    • EncodePointer.KERNEL32(00000000), ref: 100228EA
                                    • _free.LIBCMT ref: 100228FF
                                    • _free.LIBCMT ref: 10022915
                                    • InterlockedDecrement.KERNEL32 ref: 10022927
                                    • _free.LIBCMT ref: 10022941
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _free$Pointer$DecodeDecrementEncodeErrorFreeHeapInterlockedLast
                                    • String ID:
                                    • API String ID: 4264854383-0
                                    • Opcode ID: 6e45babb980946f711f94ecee9eb40fee16fb67e0b8076907215f6ffe089f320
                                    • Instruction ID: da1824f0f3d6086db6776b7d0893ce00e841dd68cd6532bffb288ba0f97f575f
                                    • Opcode Fuzzy Hash: 6e45babb980946f711f94ecee9eb40fee16fb67e0b8076907215f6ffe089f320
                                    • Instruction Fuzzy Hash: 64218DBA805231ABC715EF74FCC040A37B5FB043647E1466AF900E7A7ADB399881CB41
                                    APIs
                                    • LoadLibraryA.KERNEL32(kernel32.dll), ref: 10015178
                                    • GetProcAddress.KERNEL32(?,CreateToolhelp32Snapshot), ref: 10015190
                                    • GetProcAddress.KERNEL32(?,Process32First), ref: 100151A8
                                    • GetProcAddress.KERNEL32(?,Process32Next), ref: 100151C0
                                    • lstrcmpiA.KERNEL32(1000E8DC,?), ref: 10015243
                                    • CloseHandle.KERNEL32(00000000), ref: 10015262
                                    • FreeLibrary.KERNEL32(00000000), ref: 10015278
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressProc$Library$CloseFreeHandleLoadlstrcmpi
                                    • String ID: CreateToolhelp32Snapshot$Process32First$Process32Next$kernel32.dll
                                    • API String ID: 1314729832-4285911020
                                    • Opcode ID: 1cd6a8fbb2155a4b1985ca30da2e4b0a3f5bfe765f9448f08b89226ab9c6a634
                                    • Instruction ID: b23b302b637ae1edde1f60404815d2dee06a1769a5a7b90f0171de9587be8fa8
                                    • Opcode Fuzzy Hash: 1cd6a8fbb2155a4b1985ca30da2e4b0a3f5bfe765f9448f08b89226ab9c6a634
                                    • Instruction Fuzzy Hash: 4B31AE75911228DBDB61DBA4CD88BEDB7B4FB49301F0005D8E90EAA250DB75AAC4CF50
                                    APIs
                                    • InterlockedCompareExchange.KERNEL32(?,00000001,00000000), ref: 100187D0
                                    • InterlockedCompareExchange.KERNEL32(?,00000001,00000000), ref: 100187DD
                                    • InterlockedDecrement.KERNEL32(00000000), ref: 100187FC
                                    • DeleteCriticalSection.KERNEL32(?), ref: 10018819
                                    • HeapFree.KERNEL32(?,00000000,?), ref: 10018824
                                    • InterlockedCompareExchange.KERNEL32(?,00000001,00000000), ref: 100188AF
                                    • timeGetTime.WINMM ref: 100188D1
                                    • timeGetTime.WINMM ref: 100188DC
                                    • InterlockedDecrement.KERNEL32(00000000), ref: 1001890A
                                    • DeleteCriticalSection.KERNEL32(-00000018), ref: 10018933
                                    • HeapFree.KERNEL32(?,00000000,00000000), ref: 10018940
                                    • InterlockedCompareExchange.KERNEL32(?,00000001,00000000), ref: 1001894E
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Interlocked$CompareExchange$CriticalDecrementDeleteFreeHeapSectionTimetime
                                    • String ID:
                                    • API String ID: 2485412644-0
                                    • Opcode ID: f37f0bf1c14315c2a0328e2bdc40fd7b1b2d9f8162c99514ea29b688ea27d9bd
                                    • Instruction ID: ccbf6a195e50664b114f756a4c275c858458adfb65b41e8f4299d56aa6b79b38
                                    • Opcode Fuzzy Hash: f37f0bf1c14315c2a0328e2bdc40fd7b1b2d9f8162c99514ea29b688ea27d9bd
                                    • Instruction Fuzzy Hash: 3C51AC76A00615EFDB11CF68CC84B9AB7F8FF04710F204569F919AB291D734EA80CB91
                                    APIs
                                      • Part of subcall function 1000F3B0: _memset.LIBCMT ref: 1000F3D5
                                      • Part of subcall function 1000F3B0: wsprintfA.USER32 ref: 1000F3ED
                                    • _memset.LIBCMT ref: 1000E1DD
                                    • _memset.LIBCMT ref: 1000E1FA
                                    • SHGetSpecialFolderPathA.SHELL32(00000000,00000000,0000001A,00000000,?,?,?,?,?,?,1AA35F0A), ref: 1000E20F
                                    • GetTempFileNameA.KERNEL32(00000000,bak,00000000,00000000,\360se6\User Data\,00000000,?,?,?,?,?,?,1AA35F0A), ref: 1000E258
                                    • Sleep.KERNEL32(000003E8,Default,?,?,?,?,?,?,1AA35F0A), ref: 1000E273
                                    • MoveFileExA.KERNEL32(00000000,00000000,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 1000E298
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _memset$File$FolderMoveNamePathSleepSpecialTempwsprintf
                                    • String ID: 360se6.exe$Default$\360se6\User Data\$bak
                                    • API String ID: 2742518391-1576209161
                                    • Opcode ID: cf5631d64cf3daff86f29a9e46f2c2e6785fc6ccd8703a21c0b353372ed7785e
                                    • Instruction ID: 701f933334c7848fb056ee3a11f22efabf5e93a761c2cecb354365ab54c774ad
                                    • Opcode Fuzzy Hash: cf5631d64cf3daff86f29a9e46f2c2e6785fc6ccd8703a21c0b353372ed7785e
                                    • Instruction Fuzzy Hash: B6316C75950258ABEB24DB60CC9ABDDB378EB14700F0001E9F5096A2D1EB787B84CF61
                                    APIs
                                      • Part of subcall function 1000F3B0: _memset.LIBCMT ref: 1000F3D5
                                      • Part of subcall function 1000F3B0: wsprintfA.USER32 ref: 1000F3ED
                                    • _memset.LIBCMT ref: 1000E33D
                                    • _memset.LIBCMT ref: 1000E35A
                                    • SHGetSpecialFolderPathA.SHELL32(00000000,00000000,0000001C,00000000,?,?,?,?,?,?,1AA35F0A), ref: 1000E36F
                                    • GetTempFileNameA.KERNEL32(00000000,bak,00000000,00000000,\Google\Chrome\User Data\,00000000,?,?,?,?,?,?,1AA35F0A), ref: 1000E3B8
                                    • Sleep.KERNEL32(000003E8,Default,?,?,?,?,?,?,1AA35F0A), ref: 1000E3D3
                                    • MoveFileExA.KERNEL32(00000000,00000000,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 1000E3F8
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _memset$File$FolderMoveNamePathSleepSpecialTempwsprintf
                                    • String ID: Default$\Google\Chrome\User Data\$bak$chrome.exe
                                    • API String ID: 2742518391-1166745273
                                    • Opcode ID: 40d655d6cc16712bff4f2fb1f87b01a0d4e762ec64db6e7df24cb74d5259b5f4
                                    • Instruction ID: fecff77be065e459785ac47ee9805b112d0841096ecda917c53accf8bb13844d
                                    • Opcode Fuzzy Hash: 40d655d6cc16712bff4f2fb1f87b01a0d4e762ec64db6e7df24cb74d5259b5f4
                                    • Instruction Fuzzy Hash: 20316A75950258EBEB24DB60CC9ABD9B378EB14700F0002E9F5096A2D1EB787B84CF65
                                    APIs
                                      • Part of subcall function 1000F3B0: _memset.LIBCMT ref: 1000F3D5
                                      • Part of subcall function 1000F3B0: wsprintfA.USER32 ref: 1000F3ED
                                    • _memset.LIBCMT ref: 1000E4ED
                                    • _memset.LIBCMT ref: 1000E50A
                                    • SHGetSpecialFolderPathA.SHELL32(00000000,00000000,0000001C,00000000,?,?,?,?,?,?,1AA35F0A), ref: 1000E51F
                                    • GetTempFileNameA.KERNEL32(00000000,bak,00000000,00000000,\Tencent\QQBrowser\User Data\,00000000,?,?,?,?,?,?,1AA35F0A), ref: 1000E568
                                    • Sleep.KERNEL32(000003E8,Default,?,?,?,?,?,?,1AA35F0A), ref: 1000E583
                                    • MoveFileExA.KERNEL32(00000000,00000000,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 1000E5A8
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _memset$File$FolderMoveNamePathSleepSpecialTempwsprintf
                                    • String ID: Default$QQBrowser.exe$\Tencent\QQBrowser\User Data\$bak
                                    • API String ID: 2742518391-2429508344
                                    • Opcode ID: 0e54152de5e706dd32317b2883b6d9b22f54a27d1984d202d2b92858c0c27df3
                                    • Instruction ID: 303e9ac27bd1ca3b56e85ec31da4520ec1f556187fdca0bed45659d0685da91e
                                    • Opcode Fuzzy Hash: 0e54152de5e706dd32317b2883b6d9b22f54a27d1984d202d2b92858c0c27df3
                                    • Instruction Fuzzy Hash: 00316C75950258EFEB24DB60CC9ABD9B378EB14700F0001D9F5096A2D1EB787B84CF61
                                    APIs
                                      • Part of subcall function 1000F3B0: _memset.LIBCMT ref: 1000F3D5
                                      • Part of subcall function 1000F3B0: wsprintfA.USER32 ref: 1000F3ED
                                    • _memset.LIBCMT ref: 1000E64D
                                    • _memset.LIBCMT ref: 1000E66A
                                    • SHGetSpecialFolderPathA.SHELL32(00000000,00000000,0000001A,00000000,?,?,?,?,?,?,1AA35F0A), ref: 1000E67F
                                    • GetTempFileNameA.KERNEL32(00000000,bak,00000000,00000000,\Microsoft\,00000000,?,?,?,?,?,?,1AA35F0A), ref: 1000E6C8
                                    • Sleep.KERNEL32(000003E8,Skype for Desktop,?,?,?,?,?,?,1AA35F0A), ref: 1000E6E3
                                    • MoveFileExA.KERNEL32(00000000,00000000,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 1000E708
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _memset$File$FolderMoveNamePathSleepSpecialTempwsprintf
                                    • String ID: Skype for Desktop$Skype.exe$\Microsoft\$bak
                                    • API String ID: 2742518391-3712293284
                                    • Opcode ID: 609e6d69384bd8dc0245cb6b53dc543715522320479eba0b398141e820af1bdb
                                    • Instruction ID: 5cbbd60c3ee543de6939a2953fd336e89185860d59f2e57474878281ef46e463
                                    • Opcode Fuzzy Hash: 609e6d69384bd8dc0245cb6b53dc543715522320479eba0b398141e820af1bdb
                                    • Instruction Fuzzy Hash: FB316A75950258ABEB24DB64CC9ABD9B378EB14700F0002E9F5096A2D1EB787B84CF61
                                    APIs
                                    • _memset.LIBCMT ref: 10013918
                                    • RegOpenKeyExA.ADVAPI32(80000001,101AFE40,00000000,00020006,?), ref: 10013944
                                    • _sprintf.LIBCMT ref: 1001397C
                                    • _strlen.LIBCMT ref: 1001398B
                                    • GetModuleFileNameA.KERNEL32(00000000,00000000,00000104), ref: 100139A9
                                    • RegSetValueExA.ADVAPI32(?,00000000,00000000,00000001,00000000,?), ref: 100139D7
                                    • RegCloseKey.ADVAPI32(?), ref: 100139EA
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseFileModuleNameOpenValue_memset_sprintf_strlen
                                    • String ID: %s%s$C:\Users\Public\Documents\$Windows Update
                                    • API String ID: 2914755242-3221868064
                                    • Opcode ID: a37f16671de4bf3d8217d41773bbf0f470df6e6be3ad6b2328483c6e46eca91b
                                    • Instruction ID: 74569bc2ad6f0a8eef20b1f4c122fea453a43a38896f5d2099743f1305caba47
                                    • Opcode Fuzzy Hash: a37f16671de4bf3d8217d41773bbf0f470df6e6be3ad6b2328483c6e46eca91b
                                    • Instruction Fuzzy Hash: 08210C75900218AFEB64DBA0CC86BD97778EB18701F404599E649AA181DBB46AC4CF91
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: char_traits$_memmove
                                    • String ID:
                                    • API String ID: 4015421094-0
                                    • Opcode ID: 8a46f27c53daf1bb3a5c5b26083eeb91bd03bd6e6ef27442f332e57adb46b26b
                                    • Instruction ID: 392e569acab4bc7803cc6a5d1307a5f36e8b576372a140fd2397c7b8e5873d66
                                    • Opcode Fuzzy Hash: 8a46f27c53daf1bb3a5c5b26083eeb91bd03bd6e6ef27442f332e57adb46b26b
                                    • Instruction Fuzzy Hash: 53A1B47AA00008EFDB04DF98DD92D9E77B6FF58298B248154F9099725ADB30FE50CB90
                                    APIs
                                    • __lock.LIBCMT ref: 10029B81
                                      • Part of subcall function 10027FF1: __mtinitlocknum.LIBCMT ref: 10028003
                                      • Part of subcall function 10027FF1: __amsg_exit.LIBCMT ref: 1002800F
                                      • Part of subcall function 10027FF1: EnterCriticalSection.KERNEL32(?,?,10025D6D,0000000D), ref: 1002801C
                                    • @_EH4_CallFilterFunc@8.LIBCMT ref: 10029B9F
                                    • __calloc_crt.LIBCMT ref: 10029BB8
                                    • @_EH4_CallFilterFunc@8.LIBCMT ref: 10029BD3
                                    • GetStartupInfoW.KERNEL32(?,101B7C90,00000064), ref: 10029C28
                                    • __calloc_crt.LIBCMT ref: 10029C73
                                    • GetFileType.KERNEL32(00000001), ref: 10029CBA
                                    • InitializeCriticalSectionAndSpinCount.KERNEL32(0000000D,00000FA0), ref: 10029CF3
                                    • GetStdHandle.KERNEL32(-000000F6), ref: 10029DAC
                                    • GetFileType.KERNEL32(00000000), ref: 10029DBE
                                    • InitializeCriticalSectionAndSpinCount.KERNEL32(-101BEA54,00000FA0), ref: 10029DF3
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalSection$CallCountFileFilterFunc@8InitializeSpinType__calloc_crt$EnterHandleInfoStartup__amsg_exit__lock__mtinitlocknum
                                    • String ID:
                                    • API String ID: 301580142-0
                                    • Opcode ID: 253e1a18d07f7ed5b743515052310a273316cb8cc387dfcc17b4352ffc5cb5ed
                                    • Instruction ID: 539e413c7bcea522b47ae7ad5c28c4f5532b66027edab54cb976d1ebee692ea2
                                    • Opcode Fuzzy Hash: 253e1a18d07f7ed5b743515052310a273316cb8cc387dfcc17b4352ffc5cb5ed
                                    • Instruction Fuzzy Hash: D3910671D043558FDB20CF68E88069DBBF4FF463A0B60426EE4AAAB3D1C7349842DB10
                                    APIs
                                    • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 1001039F
                                    • CreateFileA.KERNEL32(?,40000000,00000002,00000000,00000004,00000080,00000000), ref: 10010406
                                    • GetFileSize.KERNEL32(?,00000000), ref: 10010425
                                    • SetFilePointer.KERNEL32(?,00000000,00000000,00000002), ref: 1001044A
                                    • lstrlenA.KERNEL32(1000EEB8), ref: 10010454
                                    • lstrlenA.KERNEL32(1000EEB8,00000000,00000000), ref: 100104D6
                                    • WriteFile.KERNEL32(?,?,00000000), ref: 100104EB
                                    • CloseHandle.KERNEL32(?), ref: 100104F8
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$lstrlen$CloseCreateDirectoryHandlePointerSizeSystemWrite
                                    • String ID: .key
                                    • API String ID: 1674266968-343438762
                                    • Opcode ID: ffe63ab53faeb08c4fabfe3c25abd14c77d86f4555a55f109598a67c17bf6787
                                    • Instruction ID: 1c9aefebe2efcbaba9d66af4461c31df970b4e064e3fc872ccff81242f4e36e7
                                    • Opcode Fuzzy Hash: ffe63ab53faeb08c4fabfe3c25abd14c77d86f4555a55f109598a67c17bf6787
                                    • Instruction Fuzzy Hash: 7A410CB590022CDFDB29CB64DC86BD9B7B5BF48700F0085D9F649AA241D774AAC4CF90
                                    APIs
                                    • _strlen.LIBCMT ref: 1000FE67
                                    • ShellExecuteA.SHELL32(00000000,open,?,00000000,00000000,00000001), ref: 1000FE93
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ExecuteShell_strlen
                                    • String ID: D$open
                                    • API String ID: 4170776411-2491301029
                                    • Opcode ID: 45e0c28ea66c154113347479300cd7af64224d28f2b9312c10382868c233d3c8
                                    • Instruction ID: 2f325713f910cbc9df21e4a28366f17d85fbec6a5c87df3961e0dadf8c324f84
                                    • Opcode Fuzzy Hash: 45e0c28ea66c154113347479300cd7af64224d28f2b9312c10382868c233d3c8
                                    • Instruction Fuzzy Hash: E3418475900318EBEB20DF50CC46BEA77B8EF45740F00409CF608AB581DBB5AA85DF51
                                    APIs
                                      • Part of subcall function 1000F3B0: _memset.LIBCMT ref: 1000F3D5
                                      • Part of subcall function 1000F3B0: wsprintfA.USER32 ref: 1000F3ED
                                    • _memset.LIBCMT ref: 1000E7AD
                                    • _memset.LIBCMT ref: 1000E7CA
                                    • SHGetSpecialFolderPathA.SHELL32(00000000,00000000,0000001A,00000000,?,?,?,?,?,?,1AA35F0A), ref: 1000E7DF
                                    • GetTempFileNameA.KERNEL32(00000000,bak,00000000,00000000,101AF284,00000000,?,?,?,?,?,?,1AA35F0A), ref: 1000E828
                                    • Sleep.KERNEL32(000003E8,SogouExplorer,?,?,?,?,?,?,1AA35F0A), ref: 1000E843
                                    • MoveFileExA.KERNEL32(00000000,00000000,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 1000E868
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _memset$File$FolderMoveNamePathSleepSpecialTempwsprintf
                                    • String ID: SogouExplorer$SogouExplorer.exe$bak
                                    • API String ID: 2742518391-538188596
                                    • Opcode ID: 387075a032f40cdf426803d7b8eb962ed2b699bce44bc087e450045890685a63
                                    • Instruction ID: cdfe1adb3a5306c7d49e930ca4d3ffe4328d7c09e084d7f548619efed37bff03
                                    • Opcode Fuzzy Hash: 387075a032f40cdf426803d7b8eb962ed2b699bce44bc087e450045890685a63
                                    • Instruction Fuzzy Hash: 14316C75950258ABEB24DBA0CC9ABD9B374EF14700F0001D9F5096A2D1EB787B84CB55
                                    APIs
                                    • SetServiceStatus.ADVAPI32(?,101BD9EC), ref: 10012CB5
                                    • Sleep.KERNEL32(000001F4), ref: 10012CCA
                                    • SetServiceStatus.ADVAPI32(?,101BD9EC), ref: 10012CE6
                                    • CreateMutexA.KERNEL32(00000000,00000000,TMzsft xtnogaqk), ref: 10012D08
                                    • GetLastError.KERNEL32 ref: 10012D14
                                      • Part of subcall function 10022BD3: _doexit.LIBCMT ref: 10022BDD
                                    • WSAStartup.WS2_32(00000202,?), ref: 10012D34
                                    • GetVersionExA.KERNEL32(00000094), ref: 10012D4B
                                    • Sleep.KERNEL32(000F4240,00000000), ref: 10012D73
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ServiceSleepStatus$CreateErrorLastMutexStartupVersion_doexit
                                    • String ID: TMzsft xtnogaqk
                                    • API String ID: 4049670039-2123815393
                                    • Opcode ID: a53748f86f27197abeafadced6f73c21d7a14410f93471b365f7083a90965c1a
                                    • Instruction ID: 51f78178352a1e6bbcd1a39a8c3a93efe3193938c267407751cb2d4182533f7a
                                    • Opcode Fuzzy Hash: a53748f86f27197abeafadced6f73c21d7a14410f93471b365f7083a90965c1a
                                    • Instruction Fuzzy Hash: E5216DB4504220DFE329AF60CC8EB5937B4F70430AF804298E1096A9A6D7BC6588CF12
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _memset$FindWindow
                                    • String ID:
                                    • API String ID: 3918834205-0
                                    • Opcode ID: 39f1a4b514bf7a49ce17fcebaa32398609855f0b54f364aa2f0891fbe461ef20
                                    • Instruction ID: d02908bb6393ccc6194f76cc94439ad83e97ec676181d408bc8d9695fa0a8030
                                    • Opcode Fuzzy Hash: 39f1a4b514bf7a49ce17fcebaa32398609855f0b54f364aa2f0891fbe461ef20
                                    • Instruction Fuzzy Hash: E44161B5901218EBEB64CBA4DC85F9D77B4FB48304F008699EA0D9F282D774AAD4CF54
                                    APIs
                                      • Part of subcall function 10007130: WinHttpOpen.WINHTTP(curl/7.83.1,00000000,00000000,00000000,00000000), ref: 10007197
                                      • Part of subcall function 10007130: WinHttpSetTimeouts.WINHTTP(00000000,000003E8,000003E8,000003E8,000003E8), ref: 100071BE
                                      • Part of subcall function 10007130: WinHttpConnect.WINHTTP(00000000,?,00000050,00000000), ref: 100071D6
                                      • Part of subcall function 10007130: WinHttpOpenRequest.WINHTTP(00000000,GET,?,00000000,00000000,00000000,00000000), ref: 100071FA
                                      • Part of subcall function 10007130: WinHttpSendRequest.WINHTTP(00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 10007219
                                      • Part of subcall function 10007130: WinHttpReceiveResponse.WINHTTP(00000000,00000000), ref: 1000722E
                                      • Part of subcall function 10007130: WinHttpQueryHeaders.WINHTTP(00000000,20000013,00000000,00000000,00000004,00000000), ref: 10007264
                                      • Part of subcall function 10007130: __CxxThrowException@8.LIBCMT ref: 10007272
                                      • Part of subcall function 10006250: operator!=.LIBCPMTD ref: 1000628B
                                      • Part of subcall function 10006250: operator!=.LIBCPMTD ref: 100062CD
                                    • _Func_class.LIBCPMTD ref: 10006F71
                                    • _Func_class.LIBCPMTD ref: 10006FDF
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Http$Func_classOpenRequestoperator!=$ConnectException@8HeadersQueryReceiveResponseSendThrowTimeouts
                                    • String ID: 4.ipw.cn$ifconfig.cc$ifconfig.me$ip.ping0.cc
                                    • API String ID: 2327121134-1054840108
                                    • Opcode ID: e5f02f596ccace418473e767889c4ca837b0525676b23f026339b6d6215960db
                                    • Instruction ID: 8fedc6d71d1ea5c4082eb8e8fcd3074e9b412fba7bcbbe1695d31a67eb8f4e53
                                    • Opcode Fuzzy Hash: e5f02f596ccace418473e767889c4ca837b0525676b23f026339b6d6215960db
                                    • Instruction Fuzzy Hash: 2E513D75D00508DBDB18DFA8CC52ADDB7B6FF4C3A0F548129E41A6B295EB306A49CF60
                                    APIs
                                    • LoadLibraryA.KERNEL32(kernel32.dll), ref: 10013EBF
                                    • GetProcAddress.KERNEL32(?,IsBadReadPtr), ref: 10013ED1
                                    • LoadLibraryA.KERNEL32(?), ref: 10013F25
                                    • FreeLibrary.KERNEL32(00000000), ref: 10014063
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Library$Load$AddressFreeProc
                                    • String ID: IsBadReadPtr$kernel32.dll
                                    • API String ID: 2632591731-2271619998
                                    • Opcode ID: b8cf5a7d21cec9c91bc597fb19d05e0d91973cb50290725d0d54b057ef2bedf3
                                    • Instruction ID: 4d98165a6a2f5fd888ffb7798c0831731eea4b449ce7d88afba1872c43b950e1
                                    • Opcode Fuzzy Hash: b8cf5a7d21cec9c91bc597fb19d05e0d91973cb50290725d0d54b057ef2bedf3
                                    • Instruction Fuzzy Hash: 2F61B178A00209EFDB04CF95C484BAEBBB1FF48314F258599E915AB361C735AA85DF90
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _malloc_memmove_strlen
                                    • String ID: D
                                    • API String ID: 3238260300-2746444292
                                    • Opcode ID: 6855c12a7bdc6e0bd8773f4745c8c759726946dada61b8ef62cf01ab51cda593
                                    • Instruction ID: 6d557a2bb59ac2ae05f88cec7faa246fa2e5727cbdb9c8dfb4b7bdd6368fabdf
                                    • Opcode Fuzzy Hash: 6855c12a7bdc6e0bd8773f4745c8c759726946dada61b8ef62cf01ab51cda593
                                    • Instruction Fuzzy Hash: 163173B5D00218EBDB64CF60DC45BEB7378EB58345F404598E60DAA241EBB6AAC4CF91
                                    APIs
                                    • LoadLibraryA.KERNEL32(user32.dll,1AA35F0A), ref: 10015828
                                    • GetProcAddress.KERNEL32(?,OpenInputDesktop), ref: 1001587D
                                    • GetProcAddress.KERNEL32(?,OpenDesktopA), ref: 1001588F
                                    • GetProcAddress.KERNEL32(?,CloseDesktop), ref: 100158A1
                                      • Part of subcall function 10015950: LoadLibraryA.KERNEL32(user32.dll,1AA35F0A,?,?,?,00000000,10023340,101B6E88,000000FE,?,100158FA,00000000), ref: 1001598B
                                      • Part of subcall function 10015950: GetProcAddress.KERNEL32(?,GetThreadDesktop), ref: 100159A3
                                      • Part of subcall function 10015950: GetProcAddress.KERNEL32(?,GetUserObjectInformationA), ref: 100159BB
                                      • Part of subcall function 10015950: GetProcAddress.KERNEL32(?,SetThreadDesktop), ref: 100159D3
                                      • Part of subcall function 10015950: GetProcAddress.KERNEL32(?,CloseDesktop), ref: 100159EB
                                      • Part of subcall function 10015950: LoadLibraryA.KERNEL32(kernel32.dll,?,?,?,00000000,10023340,101B6E88,000000FE,?,100158FA,00000000), ref: 100159FC
                                      • Part of subcall function 10015950: GetProcAddress.KERNEL32(?,GetCurrentThreadId), ref: 10015A14
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressProc$LibraryLoad
                                    • String ID: CloseDesktop$OpenDesktopA$OpenInputDesktop$user32.dll
                                    • API String ID: 2238633743-3711086354
                                    • Opcode ID: 1873b1d038e82ffe73c977c033c60f3efe240073f85bcd7195dda5366d5656d8
                                    • Instruction ID: 34810388ce7dedadcc66fe602c4080af1544b897567115cb541a18f1db2ea245
                                    • Opcode Fuzzy Hash: 1873b1d038e82ffe73c977c033c60f3efe240073f85bcd7195dda5366d5656d8
                                    • Instruction Fuzzy Hash: 16416975D08388EEEB11CBE4D888BDEBFB5EF09315F140119E405BA281CBBA5944CB65
                                    APIs
                                      • Part of subcall function 1001B6A0: HeapAlloc.KERNEL32(?,00000000,?,?,?,?,?,?,1001D1A7,?,1001C0BB,?,?,?,?,1001EAD1), ref: 1001B6CA
                                    • EnterCriticalSection.KERNEL32(00000054,?,00000000,1AA35F0A,?,00000000), ref: 1001C3F8
                                      • Part of subcall function 1001BD70: timeGetTime.WINMM ref: 1001BD78
                                      • Part of subcall function 1001BD70: _memmove.LIBCMT ref: 1001BDDC
                                    • GetLastError.KERNEL32 ref: 1001C470
                                    • CreateIoCompletionPort.KERNEL32(?,?,00000000,00000000), ref: 1001C44A
                                      • Part of subcall function 100172C0: __CxxThrowException@8.LIBCMT ref: 100172D2
                                      • Part of subcall function 100172C0: EnterCriticalSection.KERNEL32(00000000,1AA35F0A,00000000,00000098,?,?,00000000,10035B28,000000FF,?,?,101B722C,?,1001640E,80004005), ref: 10017312
                                      • Part of subcall function 100172C0: LeaveCriticalSection.KERNEL32(00000000,?,?,00000000,10035B28,000000FF,?,?,101B722C,?,1001640E,80004005,?,100168C9,00000400,00000400), ref: 1001737B
                                    • connect.WS2_32(?,?,0000001C), ref: 1001C497
                                    • CreateIoCompletionPort.KERNEL32(?,?,00000000,00000000), ref: 1001C4CC
                                    • HeapFree.KERNEL32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 1001C552
                                    • LeaveCriticalSection.KERNEL32(00000054), ref: 1001C559
                                      • Part of subcall function 1001A870: ioctlsocket.WS2_32(?,8004667E,?), ref: 1001A87F
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalSection$CompletionCreateEnterHeapLeavePort$AllocErrorException@8FreeLastThrowTime_memmoveconnectioctlsockettime
                                    • String ID:
                                    • API String ID: 577898059-0
                                    • Opcode ID: fb6ef4b531d651df34b6af81ca114c1cb161ed1b6c4b7f8e2a56bc7a7bb065d0
                                    • Instruction ID: 13f5607a006f5134b6e7d624e793b95b5dada5aad690ad180316847aeaa3252a
                                    • Opcode Fuzzy Hash: fb6ef4b531d651df34b6af81ca114c1cb161ed1b6c4b7f8e2a56bc7a7bb065d0
                                    • Instruction Fuzzy Hash: CA518F75600208AFDB11DF64CC85FAA77AAFF44350F144428FD09EE2A1DB71E890DB60
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _memmove_s
                                    • String ID:
                                    • API String ID: 800865076-0
                                    • Opcode ID: bfd165e00e761db38f2bdf525350d73678aeff4c921f7e730ca0ddaf86c9b7a3
                                    • Instruction ID: e53b5beb10ba7e09faa63e27da374d48c55a1d98f715c35b0f5f6325fba29714
                                    • Opcode Fuzzy Hash: bfd165e00e761db38f2bdf525350d73678aeff4c921f7e730ca0ddaf86c9b7a3
                                    • Instruction Fuzzy Hash: 59418D36200655AFD711DF68C888B9EF7E9FF44364F10402AF9098B291DB75EDA08BA0
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _memset$Window$ForegroundLocalTextTimelstrlenwsprintf
                                    • String ID:
                                    • API String ID: 2818073195-0
                                    • Opcode ID: 75adef7124855e83a17f00d692abf37ea0045c21f2baa1bf399519b3b5abe7e2
                                    • Instruction ID: 03485689b72bf285f166b7c4cb3250636e2bcbf9ff048aaab2fc2e49669969a2
                                    • Opcode Fuzzy Hash: 75adef7124855e83a17f00d692abf37ea0045c21f2baa1bf399519b3b5abe7e2
                                    • Instruction Fuzzy Hash: 753168F5A0012D9BD734DB54CD85BE973B8EB44704F0041A8F7097A191EB787AC5CB69
                                    APIs
                                    • __ioinit.LIBCMT ref: 100298CC
                                      • Part of subcall function 10029B38: InitOnceExecuteOnce.KERNEL32(101BE634,10029B73,00000000,00000000,1003508B,101B7FB0,0000000C,10005D7E,zstd), ref: 10029B46
                                    • __get_osfhandle.LIBCMT ref: 100298E0
                                    • __get_osfhandle.LIBCMT ref: 1002990B
                                    • __get_osfhandle.LIBCMT ref: 10029914
                                    • __get_osfhandle.LIBCMT ref: 10029920
                                    • CloseHandle.KERNEL32(00000000,?,?,?,10029874,?,101B7C48,00000010,1002399B,00000000,?,?,?), ref: 10029927
                                    • GetLastError.KERNEL32(?,10029874,?,101B7C48,00000010,1002399B,00000000,?,?,?), ref: 10029931
                                    • __free_osfhnd.LIBCMT ref: 1002993E
                                    • __dosmaperr.LIBCMT ref: 10029960
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: __get_osfhandle$Once$CloseErrorExecuteHandleInitLast__dosmaperr__free_osfhnd__ioinit
                                    • String ID:
                                    • API String ID: 974577687-0
                                    • Opcode ID: aeb50e6623f9612fbfea4720a11a12ee66fd82b979432c8a2b3a73e6567c2db6
                                    • Instruction ID: 534cc79353f924f132b53f2d2c247f43b701ca5fdf2037831c5180732be56f73
                                    • Opcode Fuzzy Hash: aeb50e6623f9612fbfea4720a11a12ee66fd82b979432c8a2b3a73e6567c2db6
                                    • Instruction Fuzzy Hash: 491148326042A41AD261D63C798976E36CCDF42BF4FE6079DFD2EDB0D2EA24ACC18150
                                    APIs
                                    • SetServiceStatus.ADVAPI32(?,101BD9EC), ref: 10012EC6
                                    • Sleep.KERNEL32(000001F4), ref: 10012ED1
                                    • SetServiceStatus.ADVAPI32(?,101BD9EC), ref: 10012F10
                                    • Sleep.KERNEL32(000001F4), ref: 10012F1B
                                    • SetServiceStatus.ADVAPI32(?,101BD9EC), ref: 10012F5A
                                    • Sleep.KERNEL32(000001F4), ref: 10012F65
                                    • SetServiceStatus.ADVAPI32(?,101BD9EC), ref: 10012FA0
                                    • Sleep.KERNEL32(000001F4), ref: 10012FAB
                                    • SetServiceStatus.ADVAPI32(?,101BD9EC), ref: 10012FD1
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ServiceStatus$Sleep
                                    • String ID:
                                    • API String ID: 4108286180-0
                                    • Opcode ID: 3093577f81a1bfef1be0275f51949fcebcef33dae7894a088e6bc179c9b4736d
                                    • Instruction ID: 2eb2aa5b39fb85c5a3343167d6ecbcddaa6ef8ab947596cac2bc6c57621dfea1
                                    • Opcode Fuzzy Hash: 3093577f81a1bfef1be0275f51949fcebcef33dae7894a088e6bc179c9b4736d
                                    • Instruction Fuzzy Hash: 1C31F7B4104221DFE31DFF60CC98B957BB8F708308F804368E5095BAA5E7BD6598DB56
                                    APIs
                                    • _memset.LIBCMT ref: 100115CC
                                    • GetSystemDirectoryA.KERNEL32(00000000,00000104), ref: 100115E0
                                    • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000), ref: 10011647
                                    • GetFileSize.KERNEL32(000000FF,00000000), ref: 10011669
                                      • Part of subcall function 1001EF9C: _malloc.LIBCMT ref: 1001EFB4
                                    • ReadFile.KERNEL32(000000FF,?,00000000,00000000,00000000), ref: 100116B4
                                    • CloseHandle.KERNEL32(000000FF), ref: 10011771
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$CloseCreateDirectoryHandleReadSizeSystem_malloc_memset
                                    • String ID: .key
                                    • API String ID: 1189190961-343438762
                                    • Opcode ID: e3cca6749972bda63ac77e56a70e5a53b244fe33762708ed0120600f45f4504f
                                    • Instruction ID: 3d4300d2710fecc02f3fab15f3df85ad30c21ba86dc6f63d814e5d622af92f7c
                                    • Opcode Fuzzy Hash: e3cca6749972bda63ac77e56a70e5a53b244fe33762708ed0120600f45f4504f
                                    • Instruction Fuzzy Hash: 2551EAB5D0022C9BDB69CB64DC82BD9B7B4AB58300F0045D8E64DAB281DB74AFC4CF91
                                    APIs
                                    • _memset.LIBCMT ref: 10011E5F
                                    • _memset.LIBCMT ref: 10011E71
                                      • Part of subcall function 100153E0: _memset.LIBCMT ref: 10015432
                                      • Part of subcall function 100153E0: _memset.LIBCMT ref: 10015448
                                      • Part of subcall function 100153E0: _memset.LIBCMT ref: 1001545E
                                      • Part of subcall function 100153E0: LoadLibraryA.KERNEL32(ADVAPI32.dll), ref: 1001546B
                                    • lstrlenA.KERNEL32(?), ref: 10011EA4
                                    • gethostname.WS2_32(?,10012B7F), ref: 10011EB6
                                    • lstrlenA.KERNEL32(?), ref: 10011EC0
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _memset$lstrlen$LibraryLoadgethostname
                                    • String ID: HostName$SYSTEM\Setup
                                    • API String ID: 3877737349-3163474852
                                    • Opcode ID: 3c57c7ea14b851b5edd5a4aedf8599d14a790c5ab8a68f19adf55a60d148b559
                                    • Instruction ID: 6f4c2ddfbcec68ea414a63b34556a325c0cca03fb215b7fd9fe6e58d22cc8f59
                                    • Opcode Fuzzy Hash: 3c57c7ea14b851b5edd5a4aedf8599d14a790c5ab8a68f19adf55a60d148b559
                                    • Instruction Fuzzy Hash: B41133B9A40218EBD714DF94DC81FAA77B8EB88600F00815CFA0D5B281D635EB41CB94
                                    APIs
                                    • WaitForMultipleObjects.KERNEL32(00000040,?,00000001,000000FF), ref: 1001EA1C
                                    • CloseHandle.KERNEL32(?,?,00000001,000000FF), ref: 1001EA33
                                      • Part of subcall function 1001A570: PostQueuedCompletionStatus.KERNEL32(?,00000000,00000000,00000000,?,1001E9C8,?), ref: 1001A57C
                                    • GetCurrentThreadId.KERNEL32 ref: 1001EA8E
                                    • GetQueuedCompletionStatus.KERNEL32(?,?,?,?,000000FF), ref: 1001EAB3
                                    • GetLastError.KERNEL32(?,?,?), ref: 1001EAEF
                                    • WSAGetOverlappedResult.WS2_32(00000000,?,?,00000000,?), ref: 1001EB11
                                    • WSAGetLastError.WS2_32 ref: 1001EB1B
                                    • GetCurrentThreadId.KERNEL32 ref: 1001EB41
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CompletionCurrentErrorLastQueuedStatusThread$CloseHandleMultipleObjectsOverlappedPostResultWait
                                    • String ID:
                                    • API String ID: 1776276126-0
                                    • Opcode ID: b262b485ae6c8d05e2cc6277a80d9fb5ca37b47e31c1310d56df349767435e47
                                    • Instruction ID: 66b5417a272267f179c33290e45a533a74909bc530ce5bb48fcf6268d69e9a86
                                    • Opcode Fuzzy Hash: b262b485ae6c8d05e2cc6277a80d9fb5ca37b47e31c1310d56df349767435e47
                                    • Instruction Fuzzy Hash: A8519275900219AFDB11DFA8C8C5AAEBBB9FF48350F504569FA169B211DB30FE40CB91
                                    APIs
                                    • _memcpy_s.LIBCMT ref: 10019EDE
                                    • getaddrinfo.WS2_32(?,00000000,00000C00,00000000), ref: 10019F03
                                    • _free.LIBCMT ref: 10019F1C
                                    • WSASetLastError.WS2_32(00000000,?,?,?,?,?,?,?,?), ref: 10019F29
                                    • _memmove.LIBCMT ref: 10019F6D
                                    • freeaddrinfo.WS2_32(00000000,?,?,?,?,?,?,?,?), ref: 10019F7B
                                    • htons.WS2_32(?), ref: 10019F88
                                    • WSASetLastError.WS2_32(00002AF9,?,?,?,?,?,?,?,?), ref: 10019FAA
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ErrorLast$_free_memcpy_s_memmovefreeaddrinfogetaddrinfohtons
                                    • String ID:
                                    • API String ID: 1080299913-0
                                    • Opcode ID: 38c9a16045676048a6fe288dd4f45fcc865443c53d635113eaf2434cff52915d
                                    • Instruction ID: 09d37e572ec1318aebb19466cc5ed3869c43ff4f8d51cd655d2081561f1130ca
                                    • Opcode Fuzzy Hash: 38c9a16045676048a6fe288dd4f45fcc865443c53d635113eaf2434cff52915d
                                    • Instruction Fuzzy Hash: FF416171A00229ABDB20CF64CC85BAAB7B4FF55240F4181A9F94DDB111EB719EC9CB90
                                    APIs
                                    • _free.LIBCMT ref: 10002756
                                      • Part of subcall function 1002043C: HeapFree.KERNEL32(00000000,00000000,?,10025D1C,00000000,100258E1,100204FB,?,?,100010EB,0000DF68,?,10001048,00000001), ref: 10020450
                                      • Part of subcall function 1002043C: GetLastError.KERNEL32(00000000,?,10025D1C,00000000,100258E1,100204FB,?,?,100010EB,0000DF68,?,10001048,00000001), ref: 10020462
                                    • DeleteCriticalSection.KERNEL32(?), ref: 10002778
                                    • _free.LIBCMT ref: 1000277F
                                    • DeleteCriticalSection.KERNEL32(?,00000000), ref: 100027B2
                                    • _free.LIBCMT ref: 100027B9
                                    • _free.LIBCMT ref: 100027C2
                                    • _free.LIBCMT ref: 100027D1
                                    • _free.LIBCMT ref: 100027D7
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _free$CriticalDeleteSection$ErrorFreeHeapLast
                                    • String ID:
                                    • API String ID: 229044151-0
                                    • Opcode ID: 829fe4cc710feb83a16dcdc532ce873229ccf800336d69de1fb585340b12b445
                                    • Instruction ID: 16a73a784ab602da626493d70980f9eae99143d6bc0915a138f34a67110a4392
                                    • Opcode Fuzzy Hash: 829fe4cc710feb83a16dcdc532ce873229ccf800336d69de1fb585340b12b445
                                    • Instruction Fuzzy Hash: 560108B66007105BE612EF209C82A6B73AAEF80580F54442CF94A47207DB35F985C7E2
                                    APIs
                                    • DeleteCriticalSection.KERNEL32(?,?,?,00000000,1AA35F0A), ref: 10018E77
                                    • HeapFree.KERNEL32(?,00000000,?), ref: 10018E84
                                    • _free.LIBCMT ref: 10018F18
                                    • HeapDestroy.KERNEL32(?), ref: 10018F8E
                                    • HeapCreate.KERNEL32(?,?,?), ref: 10018F9F
                                    • HeapDestroy.KERNEL32(00000000), ref: 10018FAC
                                    • HeapCreate.KERNEL32(?,?,?), ref: 10018FB7
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Heap$CreateDestroy$CriticalDeleteFreeSection_free
                                    • String ID:
                                    • API String ID: 1764084169-0
                                    • Opcode ID: c3f88b120b0d50cfdc866e451160b25d59f4e1943c12536e881b99dc529dd748
                                    • Instruction ID: 8cea0ffc507937525084062c29ae185d00e44530d60b22a0429b01e019052092
                                    • Opcode Fuzzy Hash: c3f88b120b0d50cfdc866e451160b25d59f4e1943c12536e881b99dc529dd748
                                    • Instruction Fuzzy Hash: 2B5148B1A00606EFDB05CFA4C881B9ABBF5FF08304F044569E909AF651DB35EA55CBA0
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: bfd34e201d1059666f78fc474e3004731cd6cb8f970c98b5a1a8be2d127c39e0
                                    • Instruction ID: df39f66d2745d17a7fe87e744aa0e03a21574858425a6f03c3f21479afaab56c
                                    • Opcode Fuzzy Hash: bfd34e201d1059666f78fc474e3004731cd6cb8f970c98b5a1a8be2d127c39e0
                                    • Instruction Fuzzy Hash: 536109B9E00209EFDB44CF94C884B9EB7B5FF48304F218598E905AB395D775EA81DB90
                                    APIs
                                    • EnterCriticalSection.KERNEL32(?,?,?,?,?,?,100025EE,?,?,?,10002B57,?), ref: 1000208B
                                    • WakeAllConditionVariable.KERNEL32(?,?,?,?,100025EE,?,?,?,10002B57,?), ref: 100020AD
                                    • LeaveCriticalSection.KERNEL32(?,?,?,?,100025EE,?,?,?,10002B57,?), ref: 100020B4
                                    • EnterCriticalSection.KERNEL32(?,?,?,?,?,?,100025EE,?,?,?,10002B57,?), ref: 100020EC
                                    • SleepConditionVariableCS.KERNEL32(?,?,000000FF,?,?,?,100025EE,?,?,?,10002B57,?), ref: 1000210D
                                    • LeaveCriticalSection.KERNEL32(?,?,?,?,100025EE,?,?,?,10002B57,?), ref: 10002116
                                    • _free.LIBCMT ref: 1000213E
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalSection$ConditionEnterLeaveVariable$SleepWake_free
                                    • String ID:
                                    • API String ID: 1710734047-0
                                    • Opcode ID: e61bd854db23e898daa16de29f131cc90b3ab22f0d1ab1bd32c91fa0d06ec401
                                    • Instruction ID: 05dc04eb116ff6e28942813317816f3c30ed5ba661128168b5cad8891ce245dc
                                    • Opcode Fuzzy Hash: e61bd854db23e898daa16de29f131cc90b3ab22f0d1ab1bd32c91fa0d06ec401
                                    • Instruction Fuzzy Hash: 8D4190B1601B069FE724CF64C884796B7F4FF14390F51462AE91ACB695D730F894CBA1
                                    APIs
                                    • GetModuleHandleA.KERNEL32(kernel32.dll,?,?), ref: 1001A70C
                                    • GetProcAddress.KERNEL32(00000000,CreateFileTransactedA), ref: 1001A721
                                    • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,?,?), ref: 1001A76A
                                    • GetFileSize.KERNEL32(?,?), ref: 1001A78C
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$AddressCreateHandleModuleProcSize
                                    • String ID: CreateFileTransactedA$kernel32.dll
                                    • API String ID: 381258031-3827029016
                                    • Opcode ID: 2b602c5be5b8ceff7d4341a465a72c2674a25abf06f1222532ee79990a52c5db
                                    • Instruction ID: 3fd96c11bbd7488a8a418e2e25c194671cc8f240b4c6ee697fb62349ff201565
                                    • Opcode Fuzzy Hash: 2b602c5be5b8ceff7d4341a465a72c2674a25abf06f1222532ee79990a52c5db
                                    • Instruction Fuzzy Hash: 0431AD34744205BBEB31CA649C45B9977F8EF02B61F20425AFE18EE1D0D7B1EAD0D654
                                    APIs
                                    • setsockopt.WS2_32(00000001,0000FFFF,000000FB,00000001,00000004), ref: 1001A8E5
                                    • setsockopt.WS2_32(00000001,0000FFFF,00000004,00000000,00000004), ref: 1001A8F7
                                    • setsockopt.WS2_32(00000001,0000FFFF,000000FB,00000000,00000004), ref: 1001A91E
                                    • setsockopt.WS2_32(00000001,0000FFFF,00000004,00000000,00000004), ref: 1001A930
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: setsockopt
                                    • String ID:
                                    • API String ID: 3981526788-0
                                    • Opcode ID: 7b82cd8a322e7eafe5a33a62bfc76d56978321d665ea09961d1f1c17fe74bef7
                                    • Instruction ID: 2534b507c7e92884fcc3b13e06d001a7cc937f1284d80b897d24f64fcb9b5863
                                    • Opcode Fuzzy Hash: 7b82cd8a322e7eafe5a33a62bfc76d56978321d665ea09961d1f1c17fe74bef7
                                    • Instruction Fuzzy Hash: 2521FBB674421E7AEB10C6959C81FA9775CDF45771F200272FF18DB2C1D971994887A0
                                    APIs
                                    • SetLastError.KERNEL32(00000000,1AA35F0A,?,00000000,?,?,00000000,10035FA8,000000FF,?,1001DB19,00000000,?,?,1001D937,?), ref: 1001E8BC
                                    • EnterCriticalSection.KERNEL32(00000000,1AA35F0A,?,00000000,?,?,00000000,10035FA8,000000FF,?,1001DB19,00000000,?,?,1001D937,?), ref: 1001E8F8
                                    • SetLastError.KERNEL32(00000000,?,1001DB19,00000000,?,?,1001D937,?,00000000,?,?,?,?,1001EB3A,?,?), ref: 1001E90D
                                    • LeaveCriticalSection.KERNEL32(?,?,1001DB19,00000000,?,?,1001D937,?,00000000,?,?,?,?,1001EB3A,?,?), ref: 1001E92C
                                    • InterlockedDecrement.KERNEL32(00000028), ref: 1001E948
                                    • HeapFree.KERNEL32(?,00000000,00000000,00000000,?,1001DB19,00000000,?,?,1001D937,?,00000000,?,?,?), ref: 1001E969
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalErrorLastSection$DecrementEnterFreeHeapInterlockedLeave
                                    • String ID:
                                    • API String ID: 2534375417-0
                                    • Opcode ID: 8a373b9e699bbe36eec3ad261a269d3c2d471c0edf0be97ca4a8e9b207caec58
                                    • Instruction ID: c19bc2cfbfcf6eb32c943866d2ea1f3cbf7c2381cbd68fa049da8d29006db6f8
                                    • Opcode Fuzzy Hash: 8a373b9e699bbe36eec3ad261a269d3c2d471c0edf0be97ca4a8e9b207caec58
                                    • Instruction Fuzzy Hash: 46315A32600645AFDB61CF64CC88B9ABBF9FF48361F04452AF91ADB660DB31E854CB50
                                    APIs
                                    • _memset.LIBCMT ref: 100137E8
                                    • _strcat.LIBCMT ref: 10013887
                                    • RegOpenKeyExA.ADVAPI32(80000002,00000000,00000000,000F003F,?), ref: 100138BD
                                    • RegCloseKey.ADVAPI32(?), ref: 100138CE
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseOpen_memset_strcat
                                    • String ID: SYSTEM\CurrentControlSet\Services\$TMzsft xtnogaqk
                                    • API String ID: 3167732647-1014003165
                                    • Opcode ID: 2662b6faaf2599209bb8ca6bb403307948ab9ad392b1d5476d8a6161b5a9aa7b
                                    • Instruction ID: 22143534158840905b67e581eba63ca17ab0457cd731155eff119560de7604f3
                                    • Opcode Fuzzy Hash: 2662b6faaf2599209bb8ca6bb403307948ab9ad392b1d5476d8a6161b5a9aa7b
                                    • Instruction Fuzzy Hash: AD41D020D0C2C9D9EB02C7A888097DEBFB55B26749F0840D8D5887A282D7FE5758C7B6
                                    APIs
                                    • _calloc.LIBCMT ref: 10003330
                                      • Part of subcall function 10024166: __calloc_impl.LIBCMT ref: 10024179
                                    • InitializeCriticalSection.KERNEL32(00000018,00000000), ref: 1000335C
                                    • InitializeConditionVariable.KERNEL32(00000030), ref: 1000336C
                                    • InitializeConditionVariable.KERNEL32(00000034), ref: 10003372
                                    • __beginthreadex.LIBCMT ref: 100033A8
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Initialize$ConditionVariable$CriticalSection__beginthreadex__calloc_impl_calloc
                                    • String ID:
                                    • API String ID: 4275094566-0
                                    • Opcode ID: 1c90a2da0a09f1423271f63d7b8369d043ae484d91931262826aadb9d33fa527
                                    • Instruction ID: d63cbc47a989e61f8d5764840e3dc6a2f22de4f4aba891b4dc0ad6eac0f10f79
                                    • Opcode Fuzzy Hash: 1c90a2da0a09f1423271f63d7b8369d043ae484d91931262826aadb9d33fa527
                                    • Instruction Fuzzy Hash: 582192B660071AAFE711DF95EC84B97B7ECFB40350F504029EA08C7541EBB5B6598BA0
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: PathTemp_memset_strrchr
                                    • String ID: D
                                    • API String ID: 3269299267-2746444292
                                    • Opcode ID: 65dff33f197481420d75febd2944a67fcb56e30f99d0bf04b3eaf0f89ed5e44e
                                    • Instruction ID: 94703a5b4a1e95a47fdd501beecf67a154b79f006fe411b9632ef845b5e6f6b1
                                    • Opcode Fuzzy Hash: 65dff33f197481420d75febd2944a67fcb56e30f99d0bf04b3eaf0f89ed5e44e
                                    • Instruction Fuzzy Hash: 2F218BB9D00218EBDB24DB50DC45BDA7378EB58305F444498F54D9E281EBB5ABC4CFA0
                                    APIs
                                    • _strncmp.LIBCMT ref: 10012026
                                    • _memset.LIBCMT ref: 10012042
                                    • GetWindowTextA.USER32(00000000,00000000,00000040), ref: 10012061
                                    • _strncpy.LIBCMT ref: 100120B5
                                    • _strncat.LIBCMT ref: 100120CA
                                    • GetWindow.USER32(00000000,00000002), ref: 100120EA
                                    • GetClassNameA.USER32(00000000,00000000,00000080), ref: 10012109
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Window$ClassNameText_memset_strncat_strncmp_strncpy
                                    • String ID:
                                    • API String ID: 3228922498-0
                                    • Opcode ID: 9b23a114edeb7ee68d8fe2a349bbd8718838ecac6987a0b2f96da892dcbfe533
                                    • Instruction ID: 88a1f005e2bcef45723d5467eb62586ba9483bdea00c3cbe37d0c3424b11e526
                                    • Opcode Fuzzy Hash: 9b23a114edeb7ee68d8fe2a349bbd8718838ecac6987a0b2f96da892dcbfe533
                                    • Instruction Fuzzy Hash: FF215CB5901219DBEB60CBA4CC85F9D77B4FB48304F108698EA0DAB182D774AAC4CF64
                                    APIs
                                    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 10011B57
                                    • _memset.LIBCMT ref: 10011B99
                                    • Process32First.KERNEL32(000000FF,00000128), ref: 10011BB9
                                    • Process32Next.KERNEL32(000000FF,00000128), ref: 10011BF4
                                    • CloseHandle.KERNEL32(000000FF,000000FF,00000128,?,00000002,00000000), ref: 10011C04
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32_memset
                                    • String ID: WeChat.exe
                                    • API String ID: 2526126748-2865290047
                                    • Opcode ID: 39a29232ca075c726fda8ef9c875e25e6892fe3647a628bb6ce209c239f2d104
                                    • Instruction ID: de72c953fd82724fd2484dccbf463224b55a824a9cf3277821e8854a41679b26
                                    • Opcode Fuzzy Hash: 39a29232ca075c726fda8ef9c875e25e6892fe3647a628bb6ce209c239f2d104
                                    • Instruction Fuzzy Hash: 49212E759002199BDB64DBA0CD85BEDB3B4EF48301F1001E8E50DAB291EB74AE85CF90
                                    APIs
                                    • _free.LIBCMT ref: 10001236
                                      • Part of subcall function 1002043C: HeapFree.KERNEL32(00000000,00000000,?,10025D1C,00000000,100258E1,100204FB,?,?,100010EB,0000DF68,?,10001048,00000001), ref: 10020450
                                      • Part of subcall function 1002043C: GetLastError.KERNEL32(00000000,?,10025D1C,00000000,100258E1,100204FB,?,?,100010EB,0000DF68,?,10001048,00000001), ref: 10020462
                                    • _free.LIBCMT ref: 10001275
                                    • _free.LIBCMT ref: 1000128D
                                    • _free.LIBCMT ref: 100012A8
                                    • DeleteCriticalSection.KERNEL32(8415FF68,?), ref: 100012C6
                                    • _free.LIBCMT ref: 100012CD
                                    • _free.LIBCMT ref: 100012D6
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _free$CriticalDeleteErrorFreeHeapLastSection
                                    • String ID:
                                    • API String ID: 2933665753-0
                                    • Opcode ID: 2361ccc68d43a71e868931a2596d9ac44d138912533a7e2e7945e83494bb7265
                                    • Instruction ID: aaf221896ecc1e09f6eeffe9c750e8d10df9c6965350f993c9d4ceeb60f37a7f
                                    • Opcode Fuzzy Hash: 2361ccc68d43a71e868931a2596d9ac44d138912533a7e2e7945e83494bb7265
                                    • Instruction Fuzzy Hash: F81104B1800B455BE721EB61F8817A773E1FF00250F948439E55B4220AD731B9E8CBA2
                                    APIs
                                    • _memset.LIBCMT ref: 1000F648
                                    • CreateProcessA.KERNEL32(00000000,1000F402,00000000,00000000,00000001,08000020,00000000,00000000,00000044,00000000), ref: 1000F686
                                    • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 1000F696
                                    • CloseHandle.KERNEL32(00000000), ref: 1000F6A0
                                    • CloseHandle.KERNEL32(?), ref: 1000F6AA
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseHandle$CreateObjectProcessSingleWait_memset
                                    • String ID: D
                                    • API String ID: 3422168109-2746444292
                                    • Opcode ID: 6aa504984eda8c7b5acce5dc33e2805d2fb05eccdb010cb75b9960ebb1134bfa
                                    • Instruction ID: cb5451c512472725f5a4df07bad1c41973f3ae078433712cb33367d9263f6d2b
                                    • Opcode Fuzzy Hash: 6aa504984eda8c7b5acce5dc33e2805d2fb05eccdb010cb75b9960ebb1134bfa
                                    • Instruction Fuzzy Hash: CA113071A00248EFEB24DFE4DC46BAD7BB8EF48700F10421DF619AE2D4DBB5A9448B54
                                    APIs
                                    • __init_pointers.LIBCMT ref: 10025DD7
                                      • Part of subcall function 10022A20: EncodePointer.KERNEL32(00000000,00000001,10025DDC,10023A64,101B7938,00000008,10023C24,?,00000001,?,101B7958,0000000C,10023BC3,?,00000001,?), ref: 10022A23
                                      • Part of subcall function 10022A20: __initp_misc_winsig.LIBCMT ref: 10022A44
                                    • __mtinitlocks.LIBCMT ref: 10025DDC
                                      • Part of subcall function 10028120: InitializeCriticalSectionAndSpinCount.KERNEL32(101BB940,00000FA0,?,00000001,10025DE1,10023A64,101B7938,00000008,10023C24,?,00000001,?,101B7958,0000000C,10023BC3,?), ref: 1002813E
                                    • __mtterm.LIBCMT ref: 10025DE5
                                      • Part of subcall function 10025E4D: DeleteCriticalSection.KERNEL32(?,?,?,?,10023B29,10023B0F,101B7938,00000008,10023C24,?,00000001,?,101B7958,0000000C,10023BC3,?), ref: 1002803C
                                      • Part of subcall function 10025E4D: _free.LIBCMT ref: 10028043
                                      • Part of subcall function 10025E4D: DeleteCriticalSection.KERNEL32(101BB940,?,?,10023B29,10023B0F,101B7938,00000008,10023C24,?,00000001,?,101B7958,0000000C,10023BC3,?,00000001), ref: 10028065
                                    • __calloc_crt.LIBCMT ref: 10025E0A
                                    • __initptd.LIBCMT ref: 10025E2C
                                    • GetCurrentThreadId.KERNEL32 ref: 10025E33
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalSection$Delete$CountCurrentEncodeInitializePointerSpinThread__calloc_crt__init_pointers__initp_misc_winsig__initptd__mtinitlocks__mtterm_free
                                    • String ID:
                                    • API String ID: 757573777-0
                                    • Opcode ID: 5305d30ccda45478ab966d2ea542fe534dde36908a179f48a9bcc1fc7b76229d
                                    • Instruction ID: 58ec3693b2f49863f7a8b2837ed69b9cb9c38201cd79a3fee43b5d8399986583
                                    • Opcode Fuzzy Hash: 5305d30ccda45478ab966d2ea542fe534dde36908a179f48a9bcc1fc7b76229d
                                    • Instruction Fuzzy Hash: 31F0243A1093225AE779E7383C0724B37C8DF02272BA2461DF5A6C84D5FF72A9424658
                                    APIs
                                    • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize,100238FC,?), ref: 1002384D
                                    • GetProcAddress.KERNEL32(00000000), ref: 10023854
                                    • EncodePointer.KERNEL32(00000000), ref: 10023860
                                    • DecodePointer.KERNEL32(00000001,100238FC,?), ref: 1002387D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                    • String ID: RoInitialize$combase.dll
                                    • API String ID: 3489934621-340411864
                                    • Opcode ID: 8a1acb73c590863b49b739fc2dd12772df6c41613cc91e6a01cbeba2b542fb8d
                                    • Instruction ID: 1191a88cc48d34fd9790489e5a8225d39aecb065cdaa85872b62c02564ac10b9
                                    • Opcode Fuzzy Hash: 8a1acb73c590863b49b739fc2dd12772df6c41613cc91e6a01cbeba2b542fb8d
                                    • Instruction Fuzzy Hash: 05E09A70240322AFEB247F30CDCEB4536B5F708702F908120F002DD0A0EBB88440CA52
                                    APIs
                                    • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,10023822), ref: 10023922
                                    • GetProcAddress.KERNEL32(00000000), ref: 10023929
                                    • EncodePointer.KERNEL32(00000000), ref: 10023934
                                    • DecodePointer.KERNEL32(10023822), ref: 1002394F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                    • String ID: RoUninitialize$combase.dll
                                    • API String ID: 3489934621-2819208100
                                    • Opcode ID: 4920fa68460fbff39facb883f69098808d4252d96aa017c2b93aa0396bf9b739
                                    • Instruction ID: 1f88319e3d8987e8e0ffa380cb3ac5eb2f489078ab51b11df1e274af2f38050d
                                    • Opcode Fuzzy Hash: 4920fa68460fbff39facb883f69098808d4252d96aa017c2b93aa0396bf9b739
                                    • Instruction Fuzzy Hash: 06E04678600221AFEBA56F20CC8DB463BB5F715301F918620F105D80A5EBFA9580CF92
                                    APIs
                                    • _malloc.LIBCMT ref: 100161B4
                                      • Part of subcall function 10020474: __FF_MSGBANNER.LIBCMT ref: 1002048B
                                      • Part of subcall function 10020474: __NMSG_WRITE.LIBCMT ref: 10020492
                                      • Part of subcall function 10020474: HeapAlloc.KERNEL32(02FE0000,00000000,00000001,?,?,?,?,100010EB,0000DF68,?,10001048,00000001), ref: 100204B7
                                    • _free.LIBCMT ref: 10016270
                                    • std::exception::exception.LIBCMT ref: 100162BC
                                    • __CxxThrowException@8.LIBCMT ref: 100162D1
                                    • SetLastError.KERNEL32(00000018,?,101B722C,?,1001640E,80004005,?,100168C9,00000400,00000400), ref: 100162DC
                                    • _free.LIBCMT ref: 100162E7
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _free$AllocErrorException@8HeapLastThrow_mallocstd::exception::exception
                                    • String ID:
                                    • API String ID: 3049299895-0
                                    • Opcode ID: c4e75bb467dcd632cc6794f0c5e8569d33c960b951e8937276adff62c409ee6a
                                    • Instruction ID: ed2824db1dae17bfd308ba5dcb0e615037e45c0d1587b7e3fee2415e99e90dce
                                    • Opcode Fuzzy Hash: c4e75bb467dcd632cc6794f0c5e8569d33c960b951e8937276adff62c409ee6a
                                    • Instruction Fuzzy Hash: A0519AB6A006199FCB01CF98DC80B9EBBF4EB49710F554169E914AB341D775ED80CB90
                                    APIs
                                    • __ioinit.LIBCMT ref: 100285A6
                                      • Part of subcall function 10029B38: InitOnceExecuteOnce.KERNEL32(101BE634,10029B73,00000000,00000000,1003508B,101B7FB0,0000000C,10005D7E,zstd), ref: 10029B46
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Once$ExecuteInit__ioinit
                                    • String ID:
                                    • API String ID: 129814473-0
                                    • Opcode ID: 5f84c9e2474b48f1b5df84408ea3fed00915e9808a8aa5c3ede1912be93b9b93
                                    • Instruction ID: eb12839c2236a0a66080d8b7707541b2b015dfdafb5b4036e193e8b83220f103
                                    • Opcode Fuzzy Hash: 5f84c9e2474b48f1b5df84408ea3fed00915e9808a8aa5c3ede1912be93b9b93
                                    • Instruction Fuzzy Hash: 7A415679902B058FD320CB78E885A6E77E4EF413B0B90871DF8AB876D1D774EA408B10
                                    APIs
                                    • HeapAlloc.KERNEL32(00000094,00000000,?,00000000,00000000), ref: 1001E132
                                    • _memmove.LIBCMT ref: 1001E18D
                                    • InterlockedExchangeAdd.KERNEL32(-00000040,?), ref: 1001E19D
                                    • InterlockedDecrement.KERNEL32(00000028), ref: 1001E1B6
                                    • HeapFree.KERNEL32(?,00000000,00000000,00000000), ref: 1001E1E0
                                    • InterlockedExchangeAdd.KERNEL32(-00000040,?), ref: 1001E1F7
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Interlocked$ExchangeHeap$AllocDecrementFree_memmove
                                    • String ID:
                                    • API String ID: 3475820249-0
                                    • Opcode ID: 8410d57850f0f56a72160be52005f4586bc43fc5666634ebf8d9ae9adf307239
                                    • Instruction ID: 7998932e740281b790ced908d299ef40af193b578d293305540e12fdeb0e7596
                                    • Opcode Fuzzy Hash: 8410d57850f0f56a72160be52005f4586bc43fc5666634ebf8d9ae9adf307239
                                    • Instruction Fuzzy Hash: F5410D72900259AFDB11CF99C884A9EBBF8FF49314F1145AAEC199F211D770ED54CB90
                                    APIs
                                    • timeGetTime.WINMM(1AA35F0A,?,?,00000000,?,?,10035FD8,000000FF,?,1001D925,?,00000000,?,?,?), ref: 1001D984
                                    • EnterCriticalSection.KERNEL32(00000054,1AA35F0A,?,?,00000000,?,?,10035FD8,000000FF,?,1001D925,?,00000000,?,?,?), ref: 1001D9A8
                                    • SetLastError.KERNEL32(00000000,?,1001D925,?,00000000,?,?,?,?,1001EB3A,?,?), ref: 1001D9BD
                                    • LeaveCriticalSection.KERNEL32(00000054,?,1001D925,?,00000000,?,?,?,?,1001EB3A,?,?), ref: 1001D9E0
                                    • GetLastError.KERNEL32(?,00000000), ref: 1001DA42
                                    • HeapFree.KERNEL32(?,00000000,?,?,?,00000000), ref: 1001DA77
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalErrorLastSection$EnterFreeHeapLeaveTimetime
                                    • String ID:
                                    • API String ID: 340097737-0
                                    • Opcode ID: 63cb6f8e7694ae6483c047f050ef8b7d6c6ce7c6f04acb454207dabb1f28742f
                                    • Instruction ID: 651f3edefb78460789619dc2c76435f0b6e471a6de73fc66fbbe7bd7a0e23f04
                                    • Opcode Fuzzy Hash: 63cb6f8e7694ae6483c047f050ef8b7d6c6ce7c6f04acb454207dabb1f28742f
                                    • Instruction Fuzzy Hash: 5641AEB1600619AFDB11EF54CC85BAAB7F8FF08320F40452AF915CB691D774E940CBA1
                                    APIs
                                    • Concurrency::details::HardwareAffinity::operator!=.LIBCMTD ref: 1000C28F
                                    • std::error_category::default_error_condition.LIBCPMTD ref: 1000C2B0
                                    • std::error_category::default_error_condition.LIBCPMTD ref: 1000C2CA
                                    • Concurrency::details::HardwareAffinity::operator!=.LIBCMTD ref: 1000C2D6
                                    • _Copy_impl.LIBCPMTD ref: 1000C2F1
                                    • std::error_category::default_error_condition.LIBCPMTD ref: 1000C323
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: std::error_category::default_error_condition$Affinity::operator!=Concurrency::details::Hardware$Copy_impl
                                    • String ID:
                                    • API String ID: 1600619793-0
                                    • Opcode ID: b1d60bd1d2c90ce81873208b493584433b2c3e2ab3f7430867161bbb174af34e
                                    • Instruction ID: d7a5fca912ec06086403f1c670a1a813a5f108e565bd240dc1cb7e9a7b1914b0
                                    • Opcode Fuzzy Hash: b1d60bd1d2c90ce81873208b493584433b2c3e2ab3f7430867161bbb174af34e
                                    • Instruction Fuzzy Hash: ED310079910119ABDB08DF95CC91DFFB3B9FF88240B50852DB515A7296DF30BA05CB90
                                    APIs
                                    • Concurrency::details::HardwareAffinity::operator!=.LIBCMTD ref: 1000995F
                                    • std::error_category::default_error_condition.LIBCPMTD ref: 10009980
                                    • std::error_category::default_error_condition.LIBCPMTD ref: 1000999A
                                    • Concurrency::details::HardwareAffinity::operator!=.LIBCMTD ref: 100099A6
                                    • _Copy_impl.LIBCPMTD ref: 100099C1
                                    • std::error_category::default_error_condition.LIBCPMTD ref: 100099F3
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: std::error_category::default_error_condition$Affinity::operator!=Concurrency::details::Hardware$Copy_impl
                                    • String ID:
                                    • API String ID: 1600619793-0
                                    • Opcode ID: 2ed96429231faa1b98a0dfe9f2b9f2661ec804e65a12f5b07c9e7ace5e47c8cf
                                    • Instruction ID: fd5af44e1f88a068f71331fad6f74fd73f7a6a584799292872335351018ebe79
                                    • Opcode Fuzzy Hash: 2ed96429231faa1b98a0dfe9f2b9f2661ec804e65a12f5b07c9e7ace5e47c8cf
                                    • Instruction Fuzzy Hash: AD31FE79900519ABDB08DF95CC91DFFB3B9FF88240B50852DB515AB296DF30BA05CB90
                                    APIs
                                    • htons.WS2_32(?), ref: 1001A9E7
                                    • WSAAddressToStringA.WS2_32(?,0000001C,00000000,?,?), ref: 1001AA10
                                    • htons.WS2_32(?), ref: 1001AA2D
                                    • StrPBrkA.SHLWAPI(?,101B05A8,?,?,?,?,1001A154,?,?,?), ref: 1001AA53
                                    • StrChrA.SHLWAPI(?,00000025,?,?,?,?,1001A154,?,?,?), ref: 1001AA5E
                                    • _memmove.LIBCMT ref: 1001AA80
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: htons$AddressString_memmove
                                    • String ID:
                                    • API String ID: 2092185379-0
                                    • Opcode ID: 1da62bb18fa6672f18f6b109637b5a37ed39d3a7a0056215d56cfa2b173f808e
                                    • Instruction ID: 0d8a7e0632666a9e584c7e0b1c50e51ce1a1bb8526f63a46b25b18e10d486f15
                                    • Opcode Fuzzy Hash: 1da62bb18fa6672f18f6b109637b5a37ed39d3a7a0056215d56cfa2b173f808e
                                    • Instruction Fuzzy Hash: 2F218E36200326ABEB119FA4DD84BAA37ECEF49355F418025FD098A151D3B4D9C4D761
                                    APIs
                                    • _free.LIBCMT ref: 10017BAA
                                      • Part of subcall function 1002043C: HeapFree.KERNEL32(00000000,00000000,?,10025D1C,00000000,100258E1,100204FB,?,?,100010EB,0000DF68,?,10001048,00000001), ref: 10020450
                                      • Part of subcall function 1002043C: GetLastError.KERNEL32(00000000,?,10025D1C,00000000,100258E1,100204FB,?,?,100010EB,0000DF68,?,10001048,00000001), ref: 10020462
                                    • _free.LIBCMT ref: 10017BB2
                                    • _malloc.LIBCMT ref: 10017C09
                                    • _malloc.LIBCMT ref: 10017C16
                                    • _memset.LIBCMT ref: 10017C22
                                    • _memset.LIBCMT ref: 10017C2E
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _free_malloc_memset$ErrorFreeHeapLast
                                    • String ID:
                                    • API String ID: 3649356292-0
                                    • Opcode ID: e2ce2a3dfe1de264b51823140416de6bf36e0b396c0ae9a07080b5863090727e
                                    • Instruction ID: 4c7394fda08d7e2547570c27631cca39768b6331ab3c3b2927f712e97e116122
                                    • Opcode Fuzzy Hash: e2ce2a3dfe1de264b51823140416de6bf36e0b396c0ae9a07080b5863090727e
                                    • Instruction Fuzzy Hash: 91111BB55012009BDB10DF15DD85B867FA5FF51304F4880B8FA089E29BD776E554CBA4
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: DeleteFileFreeVirtual_memset_sprintf
                                    • String ID: %s%u
                                    • API String ID: 510910084-679674701
                                    • Opcode ID: adc25b0c065f21cbd1dfded628025ccd8d207bb86f6a67400b9d615e7817787c
                                    • Instruction ID: e4550e76bca269e0cd4f0d0c42d540de692b114aa9dc25b4e6c159d00a62e7eb
                                    • Opcode Fuzzy Hash: adc25b0c065f21cbd1dfded628025ccd8d207bb86f6a67400b9d615e7817787c
                                    • Instruction Fuzzy Hash: 3D31D4B59042689FC725CF14CC41BEEBBB4EB45315F108199FA585B3D1CB34AA81CF90
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _wprintfhtonsinet_addr
                                    • String ID: 2$OnConnect: %s,%d
                                    • API String ID: 3872430831-1911175251
                                    • Opcode ID: c5e6b32b25000850bdcfd3e7752fad518d315f21ca028ddb3caaaf99291d32ff
                                    • Instruction ID: b422dd61b17a844059851ccc93c32e4f95b7dbd58dc7ab89f53cd95de4c22344
                                    • Opcode Fuzzy Hash: c5e6b32b25000850bdcfd3e7752fad518d315f21ca028ddb3caaaf99291d32ff
                                    • Instruction Fuzzy Hash: B111D6B5A00208AFCB14DFA4D9809AEB7B9FF88200F108159F9099B251EB35AA45CB50
                                    APIs
                                    • _memset.LIBCMT ref: 100106F8
                                    • GetModuleFileNameA.KERNEL32(00000000,00000000,00000104), ref: 1001070E
                                    • _memset.LIBCMT ref: 10010729
                                    • ShellExecuteExA.SHELL32(0000003C), ref: 10010761
                                      • Part of subcall function 10022BD3: _doexit.LIBCMT ref: 10022BDD
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _memset$ExecuteFileModuleNameShell_doexit
                                    • String ID: <
                                    • API String ID: 862106238-4251816714
                                    • Opcode ID: 20cf96c7f9d228022f40f64b64e5aa891d9eb85aec194889f2121776d6cbdfe6
                                    • Instruction ID: ed08ded1bf864bf3e223a1e7aee1529ee6b636ef57dacc8919679b4bfa0f8810
                                    • Opcode Fuzzy Hash: 20cf96c7f9d228022f40f64b64e5aa891d9eb85aec194889f2121776d6cbdfe6
                                    • Instruction Fuzzy Hash: F5112174A443189BDB60DF60DC86BD977B8EB58701F4040D8E54CAA2D1DBB46BC8CF51
                                    APIs
                                      • Part of subcall function 100153E0: _memset.LIBCMT ref: 10015432
                                      • Part of subcall function 100153E0: _memset.LIBCMT ref: 10015448
                                      • Part of subcall function 100153E0: _memset.LIBCMT ref: 1001545E
                                      • Part of subcall function 100153E0: LoadLibraryA.KERNEL32(ADVAPI32.dll), ref: 1001546B
                                    • GetSystemInfo.KERNEL32(?), ref: 10011DCD
                                    • __snprintf.LIBCMT ref: 10011DE8
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _memset$InfoLibraryLoadSystem__snprintf
                                    • String ID: %d*%sMHz$HARDWARE\DESCRIPTION\System\CentralProcessor\0$~MHz
                                    • API String ID: 4072208565-2169120903
                                    • Opcode ID: 8cfe9623471b1fdf1c554914f6860f425b5aeaa8db3a3f010a36363e40d3c6a7
                                    • Instruction ID: d45dab53a83cfac9e0a1e2a4c9fe7e981714f2b5fce01b97ec9512f60cfb67df
                                    • Opcode Fuzzy Hash: 8cfe9623471b1fdf1c554914f6860f425b5aeaa8db3a3f010a36363e40d3c6a7
                                    • Instruction Fuzzy Hash: F6010075A10248EFDB00DBE8CD46BAEB7B4EF48604F50415DBA08EB281E6756A44C761
                                    APIs
                                    • _memset.LIBCMT ref: 100118F8
                                    • GetModuleFileNameA.KERNEL32(00000000,00000000,00000104), ref: 1001190E
                                    • _memset.LIBCMT ref: 10011929
                                    • ShellExecuteExA.SHELL32(0000003C), ref: 10011961
                                      • Part of subcall function 10022BD3: _doexit.LIBCMT ref: 10022BDD
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _memset$ExecuteFileModuleNameShell_doexit
                                    • String ID: <
                                    • API String ID: 862106238-4251816714
                                    • Opcode ID: 3b53686e11ed67b0b73857ac907e37981459c7ca599cd7ab1f7b00ff7bdf5b39
                                    • Instruction ID: 184780f53a04bf753c675ecee7cc99bb54cbc30637577b5367bcbf7d21cbf3cf
                                    • Opcode Fuzzy Hash: 3b53686e11ed67b0b73857ac907e37981459c7ca599cd7ab1f7b00ff7bdf5b39
                                    • Instruction Fuzzy Hash: 6A112D789043189BDB64DF60DC86BD977B8AF58700F4040D8E54CAA2D1DBB46BC8CF51
                                    APIs
                                    • LoadLibraryA.KERNEL32(ntdll.dll), ref: 10011EF9
                                    • GetProcAddress.KERNEL32(00000000,RtlGetNtVersionNumbers), ref: 10011F11
                                    • FreeLibrary.KERNEL32(00000000), ref: 10011F4A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Library$AddressFreeLoadProc
                                    • String ID: RtlGetNtVersionNumbers$ntdll.dll
                                    • API String ID: 145871493-1263206204
                                    • Opcode ID: cf38a511d7e8b4ae8d17f5c5b92b7a0423aa2ce6899e0fe5ee67ae0bceb075ab
                                    • Instruction ID: fc6e9e5f567ed89b3598dd89ccb3c317c7ae0145ebb98ab299a18f454954bdf5
                                    • Opcode Fuzzy Hash: cf38a511d7e8b4ae8d17f5c5b92b7a0423aa2ce6899e0fe5ee67ae0bceb075ab
                                    • Instruction Fuzzy Hash: EF01A579901208EFDB14DF94C988B9EBBB5FF48305F108598F8059B290D7759A45DF50
                                    APIs
                                    • GetModuleHandleA.KERNEL32(kernel32,IsWow64Process), ref: 100122C1
                                    • GetProcAddress.KERNEL32(00000000), ref: 100122C8
                                    • GetCurrentProcess.KERNEL32(00000000), ref: 100122DB
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressCurrentHandleModuleProcProcess
                                    • String ID: IsWow64Process$kernel32
                                    • API String ID: 4190356694-3789238822
                                    • Opcode ID: 4dbbbb52112192865a612101614944367de734d12e029e91dbf73928284f9556
                                    • Instruction ID: d8b697d57578edb345ad90496a9b557fc7605fd1813d4f5a4f7f5f71a7bdeb36
                                    • Opcode Fuzzy Hash: 4dbbbb52112192865a612101614944367de734d12e029e91dbf73928284f9556
                                    • Instruction Fuzzy Hash: 74F0FE75D00208FFDB10EFE4C94879DBBB8EF08205F404099E80997251DB389648DB50
                                    APIs
                                      • Part of subcall function 100184E0: GetNativeSystemInfo.KERNEL32(?,?,?,?,?,100167AB,1AA35F0A,00000000,?,?,?,1001849E), ref: 100184FB
                                      • Part of subcall function 100184E0: GetNativeSystemInfo.KERNEL32(?,?,?,?,?,100167AB,1AA35F0A,00000000,?,?,?,1001849E), ref: 10018516
                                    • CreateEventA.KERNEL32(00000000,00000001,00000001,00000000,1AA35F0A,00000000,?,?,?,1001849E), ref: 100167F5
                                    • HeapCreate.KERNEL32(00000004,00000000,00000000,?,?,?,1001849E), ref: 10016889
                                    • _free.LIBCMT ref: 1001693E
                                    • _free.LIBCMT ref: 10016946
                                    • _free.LIBCMT ref: 100169A9
                                      • Part of subcall function 100172C0: __CxxThrowException@8.LIBCMT ref: 100172D2
                                      • Part of subcall function 100172C0: EnterCriticalSection.KERNEL32(00000000,1AA35F0A,00000000,00000098,?,?,00000000,10035B28,000000FF,?,?,101B722C,?,1001640E,80004005), ref: 10017312
                                      • Part of subcall function 100172C0: LeaveCriticalSection.KERNEL32(00000000,?,?,00000000,10035B28,000000FF,?,?,101B722C,?,1001640E,80004005,?,100168C9,00000400,00000400), ref: 1001737B
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _free$CreateCriticalInfoNativeSectionSystem$EnterEventException@8HeapLeaveThrow
                                    • String ID:
                                    • API String ID: 471852966-0
                                    • Opcode ID: 62dcc8071ba77636672d3d9cd1e185c692ae9957d13345a13a02519507dda5e3
                                    • Instruction ID: d7e5b155edf1d74aaead93eb83c8ab603744e77deffcff0117244fe85bcfb593
                                    • Opcode Fuzzy Hash: 62dcc8071ba77636672d3d9cd1e185c692ae9957d13345a13a02519507dda5e3
                                    • Instruction Fuzzy Hash: C37118B0501B419FE761CF64C958787BBF4FF04308F108A1DE6AA9B691DBB9B148CB90
                                    APIs
                                    • getsockopt.WS2_32(?,0000FFFF,00001001,?,?), ref: 1001CD1D
                                    • InterlockedCompareExchange.KERNEL32(00000004,00000000,00000001), ref: 1001CD64
                                    • EnterCriticalSection.KERNEL32(?), ref: 1001CD7A
                                    • LeaveCriticalSection.KERNEL32(?), ref: 1001CD89
                                    • LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,10035AC4), ref: 1001CDCC
                                      • Part of subcall function 1001E2B0: InterlockedExchangeAdd.KERNEL32(00000044,?), ref: 1001E328
                                      • Part of subcall function 1001E2B0: InterlockedDecrement.KERNEL32(?), ref: 1001E33E
                                      • Part of subcall function 1001E2B0: HeapFree.KERNEL32(?,00000000,?,?), ref: 1001E36E
                                      • Part of subcall function 1001BE40: timeGetTime.WINMM(00000007,00000000,00000000,00000000,?,00000001,?,?,00000001,00000000), ref: 1001BE7F
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalInterlockedSection$ExchangeLeave$CompareDecrementEnterFreeHeapTimegetsockopttime
                                    • String ID:
                                    • API String ID: 1051621181-0
                                    • Opcode ID: 47ef961c13baaeb1f1c3f54f41a175c5428382baf7d5d31f1b2d3631bcd46669
                                    • Instruction ID: aa49a767c170bc5356aa645f39eb09f20ade229693a97dd4efdc251de6f66d51
                                    • Opcode Fuzzy Hash: 47ef961c13baaeb1f1c3f54f41a175c5428382baf7d5d31f1b2d3631bcd46669
                                    • Instruction Fuzzy Hash: ED41D072A00619AFD711CF94DC81F9EBBF8FB04351F10423AEA059B690D775E9A0CB90
                                    APIs
                                    • __malloc_crt.LIBCMT ref: 10032879
                                    • std::exception::exception.LIBCMT ref: 10032893
                                    • __CxxThrowException@8.LIBCMT ref: 100328C9
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Exception@8Throw__malloc_crtstd::exception::exception
                                    • String ID:
                                    • API String ID: 3183362523-0
                                    • Opcode ID: 12067b7f50e60089eb0c5929b79bbc81da0302d8a13d9fc531a0150228292b0c
                                    • Instruction ID: 3afcd033efa841a0b0f27a91848f479c7de1b815caadbdc1d716f9ba00caeb03
                                    • Opcode Fuzzy Hash: 12067b7f50e60089eb0c5929b79bbc81da0302d8a13d9fc531a0150228292b0c
                                    • Instruction Fuzzy Hash: B021FC3950420DAECB02EF64DC426CEB7B8EF00241F40C565FD45AE250EB34E680CB93
                                    APIs
                                    • _malloc.LIBCMT ref: 10023558
                                      • Part of subcall function 10020474: __FF_MSGBANNER.LIBCMT ref: 1002048B
                                      • Part of subcall function 10020474: __NMSG_WRITE.LIBCMT ref: 10020492
                                      • Part of subcall function 10020474: HeapAlloc.KERNEL32(02FE0000,00000000,00000001,?,?,?,?,100010EB,0000DF68,?,10001048,00000001), ref: 100204B7
                                    • _free.LIBCMT ref: 1002356B
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AllocHeap_free_malloc
                                    • String ID:
                                    • API String ID: 2734353464-0
                                    • Opcode ID: bad27d9961e6c256fd05d00a16dcfa7813a2fc78cb849604c55e28e4d427328b
                                    • Instruction ID: 8f73b662920d403f089da30250cd819716aaae5841175fa17ded837e2a866512
                                    • Opcode Fuzzy Hash: bad27d9961e6c256fd05d00a16dcfa7813a2fc78cb849604c55e28e4d427328b
                                    • Instruction Fuzzy Hash: 28112731900A366FCB21DB70BC4564E37E4EF003A0FE18525F90D9A1A1DF349940D794
                                    APIs
                                    • _free.LIBCMT ref: 1001DFDE
                                      • Part of subcall function 1002043C: HeapFree.KERNEL32(00000000,00000000,?,10025D1C,00000000,100258E1,100204FB,?,?,100010EB,0000DF68,?,10001048,00000001), ref: 10020450
                                      • Part of subcall function 1002043C: GetLastError.KERNEL32(00000000,?,10025D1C,00000000,100258E1,100204FB,?,?,100010EB,0000DF68,?,10001048,00000001), ref: 10020462
                                    • _free.LIBCMT ref: 1001DFE9
                                    • HeapDestroy.KERNEL32(?,?,80004005,?,1001E736), ref: 1001E03E
                                    • HeapCreate.KERNEL32(?,?,?,?,80004005,?,1001E736), ref: 1001E056
                                    • SetEvent.KERNEL32(?,?,80004005,?,1001E736), ref: 1001E093
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Heap$_free$CreateDestroyErrorEventFreeLast
                                    • String ID:
                                    • API String ID: 840158118-0
                                    • Opcode ID: 0e583d642f774632f9c27456ec0f16af5b2d05b50993fe6db7455c841bf81a0b
                                    • Instruction ID: 1bce1808b3a2e791fe6ccda0018e989c211068b54a4ee0f2cf5caece12fc7c46
                                    • Opcode Fuzzy Hash: 0e583d642f774632f9c27456ec0f16af5b2d05b50993fe6db7455c841bf81a0b
                                    • Instruction Fuzzy Hash: 3221D071401B428BE7229F35D908787BAE1BF49304F50891DE5AA96651DBBAB884CF40
                                    APIs
                                    • EnterCriticalSection.KERNEL32(?,?,00000000,?,?,1001BE50,?,?,00000054,?,1001D828,00000000,00000000,00000000,00000000), ref: 1001B651
                                    • EnterCriticalSection.KERNEL32(?,?,1001BE50,?,?,00000054,?,1001D828,00000000,00000000,00000000,00000000), ref: 1001B657
                                    • LeaveCriticalSection.KERNEL32(?,?,1001BE50,?,?,00000054,?,1001D828,00000000,00000000,00000000,00000000), ref: 1001B675
                                    • LeaveCriticalSection.KERNEL32(?,?,1001BE50,?,?,00000054,?,1001D828,00000000,00000000,00000000,00000000), ref: 1001B678
                                    • LeaveCriticalSection.KERNEL32(?,?,1001BE50,?,?,00000054,?,1001D828,00000000,00000000,00000000,00000000), ref: 1001B68A
                                    • LeaveCriticalSection.KERNEL32(?,?,1001BE50,?,?,00000054,?,1001D828,00000000,00000000,00000000,00000000), ref: 1001B68D
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalSection$Leave$Enter
                                    • String ID:
                                    • API String ID: 2978645861-0
                                    • Opcode ID: c76d05b3fccb81bbde97bbe8f299796e80221eabea18b0df9aee05efc5887d01
                                    • Instruction ID: 15876e7cb504465c55ff25fd79a18e235aef5e7f8048034f6523b5cd64803c08
                                    • Opcode Fuzzy Hash: c76d05b3fccb81bbde97bbe8f299796e80221eabea18b0df9aee05efc5887d01
                                    • Instruction Fuzzy Hash: 43F044722016146FD711AB6EDCC0A9BB7ECFFC9224B520136E908DB611C779E8458AB0
                                    APIs
                                      • Part of subcall function 10025CA4: __getptd_noexit.LIBCMT ref: 10025CA5
                                      • Part of subcall function 10025CA4: __amsg_exit.LIBCMT ref: 10025CB2
                                    • __amsg_exit.LIBCMT ref: 10027917
                                    • __lock.LIBCMT ref: 10027927
                                    • InterlockedDecrement.KERNEL32(?), ref: 10027944
                                    • _free.LIBCMT ref: 10027957
                                    • InterlockedIncrement.KERNEL32(02FFD9A8), ref: 1002796F
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd_noexit__lock_free
                                    • String ID:
                                    • API String ID: 1231874560-0
                                    • Opcode ID: 5b52af1cc653b6a68240cb3c15142706c47bbd1bbb99473af2bdf0793a479e8c
                                    • Instruction ID: e038a616fc268b6b30c8c800e06b11c4754edae7854568c1c2ca9af5bccd002d
                                    • Opcode Fuzzy Hash: 5b52af1cc653b6a68240cb3c15142706c47bbd1bbb99473af2bdf0793a479e8c
                                    • Instruction Fuzzy Hash: 0701C036A01732ABDB21DB69BA8174D77B0FF01650FD10145E8086BA92CB386981CFC1
                                    APIs
                                    • EnterCriticalSection.KERNEL32(00000018,00000000,0000003C,00000000,?,?,100033DA), ref: 1000340C
                                    • WakeAllConditionVariable.KERNEL32 ref: 1000341D
                                    • LeaveCriticalSection.KERNEL32(00000018), ref: 10003424
                                    • WaitForSingleObject.KERNEL32(?,000000FF,?), ref: 1000345C
                                    • GetLastError.KERNEL32 ref: 1000346D
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalSection$ConditionEnterErrorLastLeaveObjectSingleVariableWaitWake
                                    • String ID:
                                    • API String ID: 2002041392-0
                                    • Opcode ID: e75bfb5a0ad93df77c66187c49ea81158b5d7819f7b5d557b30da283341fa316
                                    • Instruction ID: 32492cade0fa7766ae1656b716e42035eae87337b4a1db3a89480abb877ebfd1
                                    • Opcode Fuzzy Hash: e75bfb5a0ad93df77c66187c49ea81158b5d7819f7b5d557b30da283341fa316
                                    • Instruction Fuzzy Hash: 8301B1325002169FEB52EF58DCC469773ECFF45391B018525EA589B119D730E989CBA2
                                    APIs
                                      • Part of subcall function 1001A990: setsockopt.WS2_32(?,0000FFFF,00007010,00000000,00000004), ref: 1001A9A6
                                    • EnterCriticalSection.KERNEL32 ref: 1001D7AC
                                    • LeaveCriticalSection.KERNEL32(00000054), ref: 1001D7C7
                                      • Part of subcall function 1001BE40: timeGetTime.WINMM(00000007,00000000,00000000,00000000,?,00000001,?,?,00000001,00000000), ref: 1001BE7F
                                    • SetLastError.KERNEL32(00000000), ref: 1001D7D1
                                    • LeaveCriticalSection.KERNEL32(00000054), ref: 1001D7EC
                                    • HeapFree.KERNEL32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 1001D842
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalSection$Leave$EnterErrorFreeHeapLastTimesetsockopttime
                                    • String ID:
                                    • API String ID: 4191520005-0
                                    • Opcode ID: d82dbdcae07a67b72c96c9c25426668b2813c80c10765768011baf3510c592d9
                                    • Instruction ID: 8b7f9298d96b99960fdb9572d67dbc8946c541a3fe55414fa74220fd8c56f37f
                                    • Opcode Fuzzy Hash: d82dbdcae07a67b72c96c9c25426668b2813c80c10765768011baf3510c592d9
                                    • Instruction Fuzzy Hash: E131C372600214EFD711DF48CC85B9EB7B8FF49721F10422AF9299B291DB75A840CB60
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AdjustPointer_memmove
                                    • String ID:
                                    • API String ID: 1721217611-0
                                    • Opcode ID: b405e0998ef0b9efc1edcd27beb66ba5646d659d8eec6f86d97dda6a22f7c017
                                    • Instruction ID: 0e35a04b9f418c62776a7450ae1d75bb5788a7e2c58344f017f8f72862e36527
                                    • Opcode Fuzzy Hash: b405e0998ef0b9efc1edcd27beb66ba5646d659d8eec6f86d97dda6a22f7c017
                                    • Instruction Fuzzy Hash: DC4192766043469AEB25CF50FC42F6A37F4DF097A0FA1401DF849AA5D1DF71E880DA62
                                    APIs
                                    • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 1002F22B
                                    • __isleadbyte_l.LIBCMT ref: 1002F259
                                    • MultiByteToWideChar.KERNEL32(00000000,00000009,0000000C,00000000,00000000,00000000), ref: 1002F287
                                    • MultiByteToWideChar.KERNEL32(00000000,00000009,0000000C,00000001,00000000,00000000), ref: 1002F2BD
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                    • String ID:
                                    • API String ID: 3058430110-0
                                    • Opcode ID: 2b3d1593b62abf2a8beba7a4b33d3e542d277218e77fbf3ac6909a8a0f39df84
                                    • Instruction ID: 88f6cfa15c5d6d04ed07b041f1d82007708ea3ed43a2cafbe05b56c4a286dddd
                                    • Opcode Fuzzy Hash: 2b3d1593b62abf2a8beba7a4b33d3e542d277218e77fbf3ac6909a8a0f39df84
                                    • Instruction Fuzzy Hash: 1D31BC3560029AEFDB11CE64E845BBA3BE5FF422A0F52443DE8249B1A1D770E844DB50
                                    APIs
                                    • SetLastError.KERNEL32(?), ref: 1001E41B
                                    • UnmapViewOfFile.KERNEL32(00000000), ref: 1001E441
                                    • CloseHandle.KERNEL32(00000000), ref: 1001E461
                                    • CloseHandle.KERNEL32(00000000), ref: 1001E483
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseHandle$ErrorFileLastUnmapView
                                    • String ID:
                                    • API String ID: 4017539725-0
                                    • Opcode ID: 496f3fa893c77ec6c9c64e1aa7dc66e4b9ed660e755f62b2c78ec002215d3852
                                    • Instruction ID: cba275ec36c653788e4822474d84c3c335d5b1142b70863171b6aa198203d996
                                    • Opcode Fuzzy Hash: 496f3fa893c77ec6c9c64e1aa7dc66e4b9ed660e755f62b2c78ec002215d3852
                                    • Instruction Fuzzy Hash: 1E3118B5A002599BDB11CFA4CC48BAFBBF8FF48754F004219F805EB241EB75E9448BA0
                                    APIs
                                    • InterlockedCompareExchange.KERNEL32(00000000,?,00000000), ref: 1001B765
                                    • InterlockedCompareExchange.KERNEL32(?,?,?), ref: 1001B777
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CompareExchangeInterlocked
                                    • String ID:
                                    • API String ID: 3335655927-0
                                    • Opcode ID: 9484bcffa374807802c2175ff6f6c2d2e59b0392790023a2fe2f7dd29207cd47
                                    • Instruction ID: a411b3ee14b548daa5b868b1c8f2e50aeeae3c08791ef6b703bc2ef0cd82c7fc
                                    • Opcode Fuzzy Hash: 9484bcffa374807802c2175ff6f6c2d2e59b0392790023a2fe2f7dd29207cd47
                                    • Instruction Fuzzy Hash: 6E219F36304A09ABD720DF6DDD80E96F3EDFBC8311F00456AEA89C7240DB31E9548BA0
                                    APIs
                                    • VirtualAlloc.KERNEL32(?,00000000,00001000,00000004), ref: 100140EE
                                    • _memset.LIBCMT ref: 1001410A
                                    • VirtualAlloc.KERNEL32(?,?,00001000,00000004,?,100146FE), ref: 1001412C
                                    • _memmove.LIBCMT ref: 1001414A
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AllocVirtual$_memmove_memset
                                    • String ID:
                                    • API String ID: 725130153-0
                                    • Opcode ID: f53fd65b4befc706c090b7c927cf75363b07fbc3177beadfb71f7d900ef2fefc
                                    • Instruction ID: 93ed00f0eb9094769ecb9556d8f7921b1dd27d8a6f78ffda3dd0833cdc577a5f
                                    • Opcode Fuzzy Hash: f53fd65b4befc706c090b7c927cf75363b07fbc3177beadfb71f7d900ef2fefc
                                    • Instruction Fuzzy Hash: F631EA74A00209EFCB08CF94C995EAEB7B1FF48704F218598E915AB351D770EE81DB50
                                    APIs
                                    • GetFileSize.KERNEL32(00000002,00000004,?,?,?,00000002,00000004), ref: 1001A3B3
                                    • CreateFileMappingA.KERNEL32(00000002,00000000,00000004,00000004,00000000,00000000), ref: 1001A3E0
                                    • MapViewOfFileEx.KERNEL32(00000000,?,?,?,?,00000000,?,00000002,00000004), ref: 1001A429
                                    • CloseHandle.KERNEL32(?,?,00000002,00000004), ref: 1001A43F
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$CloseCreateHandleMappingSizeView
                                    • String ID:
                                    • API String ID: 1374251026-0
                                    • Opcode ID: 4b8af0a805cdf8347236f9c71f45033270cfc3b78af84c4974c8e4d52b637325
                                    • Instruction ID: 8fce67c6ff09011a8acf264d9e13d81355b447303082185ad91e7b9cb9a6a423
                                    • Opcode Fuzzy Hash: 4b8af0a805cdf8347236f9c71f45033270cfc3b78af84c4974c8e4d52b637325
                                    • Instruction Fuzzy Hash: 272167B5A0061AAFD714DF69DC45A5AF7F8FB49350F10812AFD19D7200D770E9A09BD0
                                    APIs
                                    • _free.LIBCMT ref: 1001B152
                                      • Part of subcall function 1001B190: HeapFree.KERNEL32(?,00000000,?), ref: 1001B1E5
                                    • DeleteCriticalSection.KERNEL32(?,1AA35F0A), ref: 1001B113
                                    • DeleteCriticalSection.KERNEL32(?), ref: 1001B124
                                    • HeapFree.KERNEL32(?,00000000), ref: 1001B132
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalDeleteFreeHeapSection$_free
                                    • String ID:
                                    • API String ID: 210024702-0
                                    • Opcode ID: 2457e78313824737e41231bfbb3820b753e3b2e9e7e39901a1bfba69df0cf740
                                    • Instruction ID: 33c100260f324d21ff77bf2896aba4d0bbdecf1759cfcc0eaa01cd95da98a8db
                                    • Opcode Fuzzy Hash: 2457e78313824737e41231bfbb3820b753e3b2e9e7e39901a1bfba69df0cf740
                                    • Instruction Fuzzy Hash: 63319E71A00616EFDB11DFA8C884B5AFBF8FF05315F118269E9199F291D731E944CBA0
                                    APIs
                                    • EnterCriticalSection.KERNEL32(?,?,?,?,10001499,?,?,00000000,?,?,?), ref: 100034A7
                                    • SleepConditionVariableCS.KERNEL32(00000000,?,00000000), ref: 100034CB
                                    • LeaveCriticalSection.KERNEL32(?), ref: 100034D2
                                    • SleepConditionVariableCS.KERNEL32(00000000,?,000000FF), ref: 1000350E
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ConditionCriticalSectionSleepVariable$EnterLeave
                                    • String ID:
                                    • API String ID: 3020340620-0
                                    • Opcode ID: 05074beb6edb66eb96e78de5814604b12c6efd175baefdef2757970339633dab
                                    • Instruction ID: f135a66ef4c3fa2a34bb39291fcdf00077fd575a97a3f57769656b34936bebed
                                    • Opcode Fuzzy Hash: 05074beb6edb66eb96e78de5814604b12c6efd175baefdef2757970339633dab
                                    • Instruction Fuzzy Hash: 42110471500B558FE772CA58D9C4B5773E8FB007A6F51DE1DE4938A899C374F8888B21
                                    APIs
                                    • IsWindowVisible.USER32(?), ref: 1000ED07
                                    • _memset.LIBCMT ref: 1000ED30
                                    • SendMessageA.USER32(?,0000000D,00000400,00000000), ref: 1000ED4A
                                    • lstrlenA.KERNEL32(00000000), ref: 1000ED57
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: MessageSendVisibleWindow_memsetlstrlen
                                    • String ID:
                                    • API String ID: 1293396957-0
                                    • Opcode ID: c0acd891ebef83d26f17d4d1390c8d3953d1a4ad271df1068977982f2c5964a8
                                    • Instruction ID: 5b252e65773c6f6e6056f087db140e16ac5e3367f8d3fdb97bb4e1eeb390b3d9
                                    • Opcode Fuzzy Hash: c0acd891ebef83d26f17d4d1390c8d3953d1a4ad271df1068977982f2c5964a8
                                    • Instruction Fuzzy Hash: 7311B6F5A00205EBEB14DF60CD45BDA7368DF54340F0044A9FB09FB285EA75EA858B95
                                    APIs
                                    • EnterCriticalSection.KERNEL32(?), ref: 10003292
                                    • SleepConditionVariableCS.KERNEL32(?,?,000000FF), ref: 100032BD
                                    • EnterCriticalSection.KERNEL32(?), ref: 100032ED
                                    • WakeConditionVariable.KERNEL32(?), ref: 100032FA
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ConditionCriticalEnterSectionVariable$SleepWake
                                    • String ID:
                                    • API String ID: 1272541424-0
                                    • Opcode ID: d2ef4d3d3bece3ecb2957c56201156f867af3ba4ab4f7a9e8506c951494b066a
                                    • Instruction ID: d287fa8a1d97e4fb1d990ba0663406a79fc7a6a744e69c2c1aa7d7a44e5ccb06
                                    • Opcode Fuzzy Hash: d2ef4d3d3bece3ecb2957c56201156f867af3ba4ab4f7a9e8506c951494b066a
                                    • Instruction Fuzzy Hash: 2C115572100B159FE336DF68DCC485BB3F9FB44360B418E19E4A683A45CB30F8498B60
                                    APIs
                                    • PeekMessageA.USER32(1001C8E6,00000000,00000000,00000000,00000001), ref: 1001EB99
                                    • TranslateMessage.USER32(?), ref: 1001EBBE
                                    • DispatchMessageA.USER32(?), ref: 1001EBC4
                                    • PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 1001EBD6
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Message$Peek$DispatchTranslate
                                    • String ID:
                                    • API String ID: 1795658109-0
                                    • Opcode ID: 5f19f8642b326884221ac1f2436e0d1f5125d6a111024dfe36bdec5d200537f7
                                    • Instruction ID: 4683bdf92f3b324d92ef008ada9b145ce160014bd2fbc826a850825f78051344
                                    • Opcode Fuzzy Hash: 5f19f8642b326884221ac1f2436e0d1f5125d6a111024dfe36bdec5d200537f7
                                    • Instruction Fuzzy Hash: 0D018833A4421D67EB20DAD99CC1FEEF3ACEB44750F5005A2FE08EB1C0D6A5E94146A0
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CreateDirectory_memset_strlen_strncpy
                                    • String ID:
                                    • API String ID: 3994138041-0
                                    • Opcode ID: 5146f0f5f6924dacce34261d64f74e5090e561bcbd4e5be505613ef66d126bf7
                                    • Instruction ID: 101a95c8069f775dae9c248aff8c456d68721b5b320a68391b460c7f447a75fb
                                    • Opcode Fuzzy Hash: 5146f0f5f6924dacce34261d64f74e5090e561bcbd4e5be505613ef66d126bf7
                                    • Instruction Fuzzy Hash: CB1194B9D041189BCB10DB64DC81BDD77B8EF65304F0082E9E59D9B281DAB4EBD48F91
                                    APIs
                                      • Part of subcall function 10017520: _free.LIBCMT ref: 1001755A
                                    • HeapDestroy.KERNEL32(00000000,1AA35F0A,?,?,?,?,100359E3,000000FF), ref: 10016B70
                                    • HeapCreate.KERNEL32(00000001,?,?,1AA35F0A,?,?,?,?,100359E3,000000FF), ref: 10016B7F
                                    • _free.LIBCMT ref: 10016B8F
                                    • HeapDestroy.KERNEL32(?,?,?,?,?,100359E3,000000FF), ref: 10016BBD
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Heap$Destroy_free$Create
                                    • String ID:
                                    • API String ID: 3093871995-0
                                    • Opcode ID: 16e0c79affba40acb3f9a94d92ca98c28378774c059c7bd50a370be0c89aea4a
                                    • Instruction ID: d00498a318c3039bf53502062df662130d8b902564dd33ec98044163ccf8f0fc
                                    • Opcode Fuzzy Hash: 16e0c79affba40acb3f9a94d92ca98c28378774c059c7bd50a370be0c89aea4a
                                    • Instruction Fuzzy Hash: F71136B6904B149FD720CF69DC44B56BBF8FB08750F004A2DE89AC7651E775E944CB90
                                    APIs
                                    • ___BuildCatchObject.LIBCMT ref: 10026247
                                      • Part of subcall function 10026858: ___AdjustPointer.LIBCMT ref: 100268A1
                                    • _UnwindNestedFrames.LIBCMT ref: 1002625E
                                    • ___FrameUnwindToState.LIBCMT ref: 10026270
                                    • CallCatchBlock.LIBCMT ref: 10026294
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
                                    • String ID:
                                    • API String ID: 2633735394-0
                                    • Opcode ID: 6092b50bab1218cd8aabaab9e12c658e2e0f1782f2186364ed2301dcdcc7d9c1
                                    • Instruction ID: 780a5d68346db81fedf9f8d85dc8351bab79c3fb61c7619bb358afdc1328406f
                                    • Opcode Fuzzy Hash: 6092b50bab1218cd8aabaab9e12c658e2e0f1782f2186364ed2301dcdcc7d9c1
                                    • Instruction Fuzzy Hash: 88011732000109FBCF12CF95EC05EDA3BBAFF8C754F518115FA1865121C776E865ABA0
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                    • String ID:
                                    • API String ID: 3016257755-0
                                    • Opcode ID: 3c6a35542a271610c24967ae1addb0a5128256cd46e27c9700edfec13bdc5c5a
                                    • Instruction ID: c2eb68e8ade19565e9c0612c28aff17bdb070db1da49cc9352462dfe7f7478ea
                                    • Opcode Fuzzy Hash: 3c6a35542a271610c24967ae1addb0a5128256cd46e27c9700edfec13bdc5c5a
                                    • Instruction Fuzzy Hash: 1201407A40214EBBCF529E84EC51CDD3F72FB18294BA58415FE1858031C336DAB1AB91
                                    APIs
                                    • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 10015381
                                    • __beginthreadex.LIBCMT ref: 100153A3
                                    • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 100153B4
                                    • CloseHandle.KERNEL32(00000000), ref: 100153BE
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseCreateEventHandleObjectSingleWait__beginthreadex
                                    • String ID:
                                    • API String ID: 2993629242-0
                                    • Opcode ID: d7dcd88de3af4c7a17b78a3c7ea8846737ab5e00941b9493fb9a3973c1d0ec84
                                    • Instruction ID: 28439952cb9d60efeb8680ab5036a31f0774e1b625031860cf64c459a7230e8b
                                    • Opcode Fuzzy Hash: d7dcd88de3af4c7a17b78a3c7ea8846737ab5e00941b9493fb9a3973c1d0ec84
                                    • Instruction Fuzzy Hash: 9A111EB5A04249AFDB14DFA8CC81BEE7BB4EF49310F504249F919AB381D730AA40CB90
                                    APIs
                                    • __malloc_crt.LIBCMT ref: 10032807
                                    • std::exception::exception.LIBCMT ref: 10032821
                                    • __CxxThrowException@8.LIBCMT ref: 10032857
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Exception@8Throw__malloc_crtstd::exception::exception
                                    • String ID:
                                    • API String ID: 3183362523-0
                                    • Opcode ID: c060a18d73b796a30dd2a53eb01a138e769d2f3d535d15112ec57b6c053b814d
                                    • Instruction ID: 61d3b0669a0cbb4b249a077222c69809c774bd9a0b89fdd2f935691ba84154ea
                                    • Opcode Fuzzy Hash: c060a18d73b796a30dd2a53eb01a138e769d2f3d535d15112ec57b6c053b814d
                                    • Instruction Fuzzy Hash: AEF04F799002097ACB05DFA4D9859CDB7FCEA10284F80C056FD15AB141DB78E384CA91
                                    APIs
                                      • Part of subcall function 100174B0: HeapFree.KERNEL32(10016ACC,00000000,?,?,?,?,10016ACC,?,?,10016FF0), ref: 100174D5
                                      • Part of subcall function 100174B0: _free.LIBCMT ref: 100174EF
                                    • HeapDestroy.KERNEL32(00000000,?,?,10016FF0), ref: 10016AD3
                                    • HeapCreate.KERNEL32(?,?,?,?,?,10016FF0), ref: 10016AE2
                                    • _free.LIBCMT ref: 10016AF2
                                    • HeapDestroy.KERNEL32(?,10016FF0), ref: 10016B22
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Heap$Destroy_free$CreateFree
                                    • String ID:
                                    • API String ID: 4097506873-0
                                    • Opcode ID: 5821550070371558d6326ac293e511f2d9706211c5074b01848d33611e582a02
                                    • Instruction ID: 26b69236e6c287892c4b939c4df5092f0c49b63a1c7adf96395978ecd4ddac7a
                                    • Opcode Fuzzy Hash: 5821550070371558d6326ac293e511f2d9706211c5074b01848d33611e582a02
                                    • Instruction Fuzzy Hash: 07F01DB5200602AFEB05DF75DC48B46BBB8FF08345F404218E409CBA51DB35E4A5CBD0
                                    APIs
                                    • _memmove.LIBCMT ref: 1001BB2C
                                    • Concurrency::details::_Concurrent_queue_base_v4::_Internal_throw_exception.LIBCPMT ref: 1001BB66
                                      • Part of subcall function 1001ED68: std::exception::exception.LIBCMT ref: 1001ED7E
                                      • Part of subcall function 1001ED68: __CxxThrowException@8.LIBCMT ref: 1001ED93
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Concurrency::details::_Concurrent_queue_base_v4::_Exception@8Internal_throw_exceptionThrow_memmovestd::exception::exception
                                    • String ID: vector<T> too long
                                    • API String ID: 3224774664-3788999226
                                    • Opcode ID: 6098c6dfe018a0d1be71fac0227d1825c4ecc01241087ebe161bd52a6db14e3a
                                    • Instruction ID: eae54de508585d01ba0ea4a69c7d47a938ab1ba8a2878b9bbe041104eb365bc3
                                    • Opcode Fuzzy Hash: 6098c6dfe018a0d1be71fac0227d1825c4ecc01241087ebe161bd52a6db14e3a
                                    • Instruction Fuzzy Hash: 3C312876700A295BC714CEADDCC189ABB99EB88370724823AF918CB644D771F991C7D0
                                    APIs
                                    Strings
                                    • wmic cpu get processorid, xrefs: 100065E0
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: char_traitsconstruct
                                    • String ID: wmic cpu get processorid
                                    • API String ID: 489808500-2204115948
                                    • Opcode ID: 1010ae759fa7e10457475eff9b78d9461d1f2c37ab24339ddda26cbfa1624876
                                    • Instruction ID: dd645ee37d0e35d6a0c4dc76963d6f74060cdeeedd1d1d5c8c6965c7acc1db0f
                                    • Opcode Fuzzy Hash: 1010ae759fa7e10457475eff9b78d9461d1f2c37ab24339ddda26cbfa1624876
                                    • Instruction Fuzzy Hash: 01410F75E00209DFDB08CF98D891AEEB7B6FF4C750F208129E915A7385DB35A941CBA4
                                    APIs
                                    • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 10011461
                                    • DeleteFileA.KERNEL32(?), ref: 100114B6
                                      • Part of subcall function 10011580: _memset.LIBCMT ref: 100115CC
                                      • Part of subcall function 10011580: GetSystemDirectoryA.KERNEL32(00000000,00000104), ref: 100115E0
                                      • Part of subcall function 10011580: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000), ref: 10011647
                                      • Part of subcall function 10011580: GetFileSize.KERNEL32(000000FF,00000000), ref: 10011669
                                      • Part of subcall function 10011580: ReadFile.KERNEL32(000000FF,?,00000000,00000000,00000000), ref: 100116B4
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$DirectorySystem$CreateDeleteReadSize_memset
                                    • String ID: .key
                                    • API String ID: 3518743009-343438762
                                    • Opcode ID: eb43b5ddff7011dff6964891f9a77986a6cb4ad83d3904fe4c7462824836723d
                                    • Instruction ID: c5e3bf08ea98db34f13579d809896ca9d031d76340f358e502fc38b765e240d6
                                    • Opcode Fuzzy Hash: eb43b5ddff7011dff6964891f9a77986a6cb4ad83d3904fe4c7462824836723d
                                    • Instruction Fuzzy Hash: 9F31E675A0025C9BDB28CF64DC42BEEB7B9EB45310F5081A9F9059B281DB35AE85CB90
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _swscanf
                                    • String ID: %d.%d.%d.%d%c
                                    • API String ID: 2748852333-2398565245
                                    • Opcode ID: 18e54956b6ff5e5e5f09465d7c17339f29108a54fe6fde34eeeaabc51fafe8c6
                                    • Instruction ID: ed2d36106069c91f8a44cef8226e493977f524409a11eb0d6646e4ffefc909ba
                                    • Opcode Fuzzy Hash: 18e54956b6ff5e5e5f09465d7c17339f29108a54fe6fde34eeeaabc51fafe8c6
                                    • Instruction Fuzzy Hash: 37118232A001189BEB15DFA4D841AFE73BCEF19201F4101AEE90ADB151DB71EA848792
                                    APIs
                                    • FindWindowA.USER32(Shell_TrayWnd,00000000), ref: 1000F5EB
                                    • MessageBoxA.USER32(00000000), ref: 1000F5F2
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: FindMessageWindow
                                    • String ID: Shell_TrayWnd
                                    • API String ID: 2823233367-2988720461
                                    • Opcode ID: fa6ae15565b281fa731f87bbf66bd491b581fbd42e31be7702e6434cd4fda3cb
                                    • Instruction ID: 8a2575e9232a4e6788a4e3303b54ed8dbf7533174b6017679d5c7ff6e03b4625
                                    • Opcode Fuzzy Hash: fa6ae15565b281fa731f87bbf66bd491b581fbd42e31be7702e6434cd4fda3cb
                                    • Instruction Fuzzy Hash: 240116B4D00208EFEB10CFA4D949B9EB7F4FB48341F2084A9E905A7394D675AF40AB54
                                    APIs
                                    • _memset.LIBCMT ref: 1001214F
                                    • GlobalMemoryStatusEx.KERNEL32(00000040), ref: 10012162
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: GlobalMemoryStatus_memset
                                    • String ID: @
                                    • API String ID: 587104284-2766056989
                                    • Opcode ID: d7d7f9b0b0953cb5caef1f62c0310114e2340016ed59b2748a12603957ba9fb6
                                    • Instruction ID: 3d7f5f32418326eb2dbc6e30da0d634f8bec6cfce8173ea13a502be2592b4bca
                                    • Opcode Fuzzy Hash: d7d7f9b0b0953cb5caef1f62c0310114e2340016ed59b2748a12603957ba9fb6
                                    • Instruction Fuzzy Hash: 20F06DB0A10208ABDB14DFA4C941B9DBBF8EF18300F50412CE909EB381DB34EA45CB80
                                    APIs
                                    • _memset.LIBCMT ref: 1000F3D5
                                    • wsprintfA.USER32 ref: 1000F3ED
                                      • Part of subcall function 1000F630: _memset.LIBCMT ref: 1000F648
                                      • Part of subcall function 1000F630: CreateProcessA.KERNEL32(00000000,1000F402,00000000,00000000,00000001,08000020,00000000,00000000,00000044,00000000), ref: 1000F686
                                      • Part of subcall function 1000F630: WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 1000F696
                                      • Part of subcall function 1000F630: CloseHandle.KERNEL32(00000000), ref: 1000F6A0
                                      • Part of subcall function 1000F630: CloseHandle.KERNEL32(?), ref: 1000F6AA
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseHandle_memset$CreateObjectProcessSingleWaitwsprintf
                                    • String ID: taskkill /f /t /im %s
                                    • API String ID: 1221303216-1431264914
                                    • Opcode ID: e147f47295d6159a0972dd24f2dc00c959dda93d6aa0ae33a39929a26f1210c1
                                    • Instruction ID: 7a26d32dd3a77ef8c91e8ca8fb8e6281576ca4a882f0339c21baba38ccc25a09
                                    • Opcode Fuzzy Hash: e147f47295d6159a0972dd24f2dc00c959dda93d6aa0ae33a39929a26f1210c1
                                    • Instruction Fuzzy Hash: 33F05475E00108ABDF10DBA4DD46BA973B8EF54204F4040A8F94DDB182EE75BB58CB91
                                    APIs
                                    • EnterCriticalSection.KERNEL32(00000054,?,00000000), ref: 1001BC70
                                    • SetLastError.KERNEL32(00000000), ref: 1001BC7F
                                    • LeaveCriticalSection.KERNEL32(00000054), ref: 1001BCA7
                                    • HeapFree.KERNEL32(?,00000000,?,?), ref: 1001BD36
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalSection$EnterErrorFreeHeapLastLeave
                                    • String ID:
                                    • API String ID: 132244544-0
                                    • Opcode ID: 5ee7b2dd0110e595599aec328bd6a18fa6e2e8a676dff69a3f1635a7451a1511
                                    • Instruction ID: 85bd10d27e0b442e1dab5c9d78a6aaa91c45580178b632b1c4d7f06aa4383219
                                    • Opcode Fuzzy Hash: 5ee7b2dd0110e595599aec328bd6a18fa6e2e8a676dff69a3f1635a7451a1511
                                    • Instruction Fuzzy Hash: 90418E75A00649AFDB14CFA8D884BAEB7F8FF48350F10052AED05DB351DB35E9808B91
                                    APIs
                                    • SetLastError.KERNEL32(0000139F,1AA35F0A,?,?,?,?,0000000F,10035F78,000000FF,?,1001CE86), ref: 1001CED9
                                    • EnterCriticalSection.KERNEL32(?,1AA35F0A,?,?,?,?,0000000F,10035F78,000000FF,?,1001CE86), ref: 1001CF09
                                    • LeaveCriticalSection.KERNEL32(?,?,?,?,0000000F,10035F78,000000FF,?,1001CE86), ref: 1001CF3A
                                    • SetLastError.KERNEL32(00000057,1AA35F0A,?,?,?,?,0000000F,10035F78,000000FF,?,1001CE86), ref: 1001CF6A
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.3050953885.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000003.00000002.3050210685.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3051276828.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000003.00000002.3052456947.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalErrorLastSection$EnterLeave
                                    • String ID:
                                    • API String ID: 2124651672-0
                                    • Opcode ID: 5a7bbe1e01743a2055287aad97c0971164d7a590c1f1937ca8fb7b3f6b1a058c
                                    • Instruction ID: 7325f94427708edb1f6ad39a4a2f2957c0187faf522ed9944e05cc5fe4afe9c1
                                    • Opcode Fuzzy Hash: 5a7bbe1e01743a2055287aad97c0971164d7a590c1f1937ca8fb7b3f6b1a058c
                                    • Instruction Fuzzy Hash: B0218932A04248EFDB11CF58CC84F9ABBBAFB89761F10466EE8149A291D735D981CB50

                                    Execution Graph

                                    Execution Coverage:2.1%
                                    Dynamic/Decrypted Code Coverage:98.6%
                                    Signature Coverage:0%
                                    Total number of Nodes:503
                                    Total number of Limit Nodes:10
                                    execution_graph 24153 10013a20 24215 1000da40 24153->24215 24155 10013ab9 24156 10013ac2 IsUserAnAdmin 24155->24156 24157 10013aec 24155->24157 24156->24157 24160 10013acc 24156->24160 24158 10013b05 24157->24158 24240 10012260 6 API calls 24157->24240 24163 10013b77 24158->24163 24164 10013b0e _memset 24158->24164 24159 10013a42 _memset 24159->24155 24233 10022e79 24159->24233 24165 10013ae2 24160->24165 24166 10013ad5 ReleaseMutex 24160->24166 24242 10009ae0 InitializeCriticalSection 24163->24242 24172 10013b21 GetModuleFileNameA 24164->24172 24239 100118d0 72 API calls 2 library calls 24165->24239 24166->24165 24167 10013afa 24167->24158 24175 10022bd3 70 API calls 24167->24175 24171 10013ab2 24236 10022bd3 24171->24236 24241 10022df7 108 API calls 3 library calls 24172->24241 24173 10013b7c 24178 10013bc9 24173->24178 24243 10013240 11 API calls 24173->24243 24174 10013ae9 24174->24157 24175->24158 24182 10013be6 24178->24182 24183 10013bf9 24178->24183 24191 10013bf4 _strlen 24178->24191 24180 10013b53 DeleteFileA MoveFileA 24180->24163 24181 10013b8f 24185 10013ba1 24181->24185 24244 10013260 11 API calls 24181->24244 24186 10013c1b 24182->24186 24187 10013bef 24182->24187 24246 10006080 24183->24246 24245 10015350 96 API calls 2 library calls 24185->24245 24251 100137c0 8 API calls 3 library calls 24186->24251 24255 1001f13f 110 API calls 6 library calls 24187->24255 24196 10013ce4 24191->24196 24256 100132c0 239 API calls 2 library calls 24191->24256 24194 10013b9d 24194->24178 24194->24185 24195 10013c20 24198 10013c24 24195->24198 24199 10013c68 24195->24199 24257 100132c0 239 API calls 2 library calls 24196->24257 24197 10013c13 24197->24191 24252 1001f13f 110 API calls 6 library calls 24198->24252 24253 1001f13f 110 API calls 6 library calls 24199->24253 24203 10013bc6 24203->24178 24206 10013cfb 24258 1001ffa4 24206->24258 24207 10013c2e StartServiceCtrlDispatcherA 24210 10013c93 WSAStartup 24207->24210 24208 10013c72 24254 10012550 99 API calls 5 library calls 24208->24254 24210->24191 24212 10013d08 24213 10013c89 24214 10022bd3 70 API calls 24213->24214 24214->24210 24216 1000da70 type_info::name 24215->24216 24265 1000cfc0 24216->24265 24218 1000da85 type_info::name 24287 1000d420 24218->24287 24222 1000dab1 _Copy_impl 24223 1000dadf _Copy_impl 24222->24223 24312 1000de50 24222->24312 24318 1000d890 CryptAcquireContextA 24223->24318 24230 1000db00 codecvt 24231 1001ffa4 __ld12tod 6 API calls 24230->24231 24232 1000db33 24231->24232 24232->24159 24490 100287c6 24233->24490 24235 10013a8b CreateMutexA GetLastError 24235->24155 24235->24171 24532 10022aa4 24236->24532 24238 10022be2 24238->24155 24239->24174 24240->24167 24241->24180 24242->24173 24243->24181 24244->24194 24245->24203 24247 10006091 construct codecvt type_info::name 24246->24247 24565 10006b60 24247->24565 24250 100138f0 112 API calls 5 library calls 24250->24197 24251->24195 24252->24207 24253->24208 24254->24213 24255->24191 24256->24196 24257->24206 24259 1001ffac 24258->24259 24260 1001ffae IsProcessorFeaturePresent 24258->24260 24259->24212 24262 10022c38 24260->24262 24578 10022be7 5 API calls 2 library calls 24262->24578 24264 10022d1b 24264->24212 24266 1000cfdb __write_nolock 24265->24266 24267 10006080 71 API calls 24266->24267 24268 1000d01b _memset type_info::name 24267->24268 24269 1000d0b6 CreatePipe 24268->24269 24270 1000d126 GetStartupInfoA CreateProcessA 24269->24270 24286 1000d121 CloseHandle CloseHandle CloseHandle CloseHandle 24269->24286 24272 1000d198 WaitForSingleObject ReadFile 24270->24272 24270->24286 24273 1000d1e0 24272->24273 24272->24286 24335 1000cfa0 71 API calls 24273->24335 24275 1000d3e2 codecvt 24276 1001ffa4 __ld12tod 6 API calls 24275->24276 24277 1000d411 24276->24277 24277->24218 24278 1000d1fc _Copy_impl 24278->24286 24336 1000dde0 71 API calls 24278->24336 24280 1000d251 24337 10006250 71 API calls 5 library calls 24280->24337 24282 1000d269 _memset codecvt 24338 1000cf40 70 API calls ___crtsetenv 24282->24338 24284 1000d2a2 _memset _Copy_impl 24339 1000cfa0 71 API calls 24284->24339 24286->24275 24288 1000d43b __write_nolock 24287->24288 24289 10006080 71 API calls 24288->24289 24290 1000d47a _memset type_info::name 24289->24290 24291 1000d515 CreatePipe 24290->24291 24292 1000d585 GetStartupInfoA CreateProcessA 24291->24292 24294 1000d580 CloseHandle CloseHandle CloseHandle CloseHandle 24291->24294 24292->24294 24295 1000d5f7 WaitForSingleObject ReadFile 24292->24295 24298 1000d841 codecvt 24294->24298 24295->24294 24296 1000d63f 24295->24296 24340 1000cfa0 71 API calls 24296->24340 24299 1001ffa4 __ld12tod 6 API calls 24298->24299 24300 1000d870 24299->24300 24309 10007bf0 24300->24309 24301 1000d65b _Copy_impl 24301->24294 24341 1000dde0 71 API calls 24301->24341 24303 1000d6b0 24342 10006250 71 API calls 5 library calls 24303->24342 24305 1000d6c8 _memset codecvt 24343 1000cf40 70 API calls ___crtsetenv 24305->24343 24308 1000d701 _memset _Copy_impl 24344 1000cfa0 71 API calls 24308->24344 24345 10007c10 24309->24345 24311 10007c07 24311->24222 24356 10021e65 GetSystemTimeAsFileTime 24312->24356 24314 1000dac7 24315 1000de30 24314->24315 24358 10021dfa 24315->24358 24319 1000d8c0 GetLastError 24318->24319 24320 1000d8d1 CryptCreateHash 24318->24320 24321 1000da31 24319->24321 24322 1000d908 CryptHashData 24320->24322 24323 1000d8eb GetLastError CryptReleaseContext 24320->24323 24324 1001ffa4 __ld12tod 6 API calls 24321->24324 24325 1000d920 GetLastError CryptDestroyHash CryptReleaseContext 24322->24325 24326 1000d947 CryptGetHashParam 24322->24326 24323->24321 24327 1000da3b 24324->24327 24325->24321 24489 1001ef69 24326->24489 24327->24230 24334 1000db40 71 API calls char_traits 24334->24223 24335->24278 24336->24280 24337->24282 24338->24284 24339->24286 24340->24301 24341->24303 24342->24305 24343->24308 24344->24294 24346 10007c21 _Copy_impl 24345->24346 24347 10007c2e _Copy_impl 24346->24347 24353 100069d0 71 API calls codecvt 24346->24353 24349 10007c60 24347->24349 24354 10010b70 71 API calls std::ios_base::clear 24347->24354 24352 10007c80 std::ios_base::clear char_traits 24349->24352 24355 100067d0 71 API calls 2 library calls 24349->24355 24352->24311 24353->24347 24354->24349 24355->24352 24357 10021e93 __aulldiv 24356->24357 24357->24314 24359 10021e11 24358->24359 24360 10021e2f 24358->24360 24406 100258dc 70 API calls __getptd_noexit 24359->24406 24361 10021e49 24360->24361 24364 10021e3c 24360->24364 24373 10026fe8 24361->24373 24363 10021e16 24407 10024a04 9 API calls __isatty 24363->24407 24408 100258dc 70 API calls __getptd_noexit 24364->24408 24368 10021e53 24369 10021e21 24368->24369 24409 10026dea 70 API calls 3 library calls 24368->24409 24371 1001ffa4 __ld12tod 6 API calls 24369->24371 24372 1000dad3 24371->24372 24372->24334 24374 10027003 24373->24374 24375 10027019 _memset 24373->24375 24418 100258dc 70 API calls __getptd_noexit 24374->24418 24375->24374 24381 10027030 24375->24381 24377 10027008 24419 10024a04 9 API calls __isatty 24377->24419 24379 1002703b 24420 100258dc 70 API calls __getptd_noexit 24379->24420 24380 10027059 24410 1002ce25 24380->24410 24381->24379 24381->24380 24384 1002705e 24421 1002cb7e 70 API calls __isatty 24384->24421 24386 10027067 24387 10027255 24386->24387 24422 1002cba8 70 API calls __isatty 24386->24422 24435 10024a14 8 API calls 2 library calls 24387->24435 24390 1002725f 24391 10027079 24391->24387 24423 1002cbd2 24391->24423 24393 1002708b 24393->24387 24394 10027094 24393->24394 24395 1002710b 24394->24395 24397 100270a7 24394->24397 24433 1002cbfc 70 API calls 4 library calls 24395->24433 24430 1002cbfc 70 API calls 4 library calls 24397->24430 24399 10027112 24405 10027012 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 24399->24405 24434 1002ce75 70 API calls 3 library calls 24399->24434 24400 100270bf 24400->24405 24431 1002ce75 70 API calls 3 library calls 24400->24431 24403 100270d8 24403->24405 24432 1002cbfc 70 API calls 4 library calls 24403->24432 24405->24368 24406->24363 24407->24369 24408->24369 24409->24369 24411 1002ce31 ___BuildCatchObject 24410->24411 24413 1002ce66 ___BuildCatchObject 24411->24413 24436 10027ff1 24411->24436 24413->24384 24414 1002ce54 24474 1002ce6c LeaveCriticalSection _doexit 24414->24474 24415 1002ce41 24415->24414 24443 1002d09f 24415->24443 24418->24377 24419->24405 24420->24405 24421->24386 24422->24391 24424 1002cbf1 24423->24424 24425 1002cbdc 24423->24425 24424->24393 24487 100258dc 70 API calls __getptd_noexit 24425->24487 24427 1002cbe1 24488 10024a04 9 API calls __isatty 24427->24488 24429 1002cbec 24429->24393 24430->24400 24431->24403 24432->24405 24433->24399 24434->24405 24435->24390 24437 10028002 24436->24437 24438 10028015 EnterCriticalSection 24436->24438 24475 10028079 70 API calls 9 library calls 24437->24475 24438->24415 24440 10028008 24440->24438 24476 10022950 70 API calls 3 library calls 24440->24476 24444 1002d0ab ___BuildCatchObject 24443->24444 24445 10027ff1 __lock 70 API calls 24444->24445 24446 1002d0c6 __tzset_nolock 24445->24446 24447 1002cbd2 __tzset_nolock 70 API calls 24446->24447 24448 1002d0db 24447->24448 24464 1002d17a __tzset_nolock 24448->24464 24477 1002cb7e 70 API calls __isatty 24448->24477 24451 1002d0ed 24451->24464 24478 1002cba8 70 API calls __isatty 24451->24478 24452 1002d1c6 GetTimeZoneInformation 24452->24464 24455 1002d0ff 24455->24464 24479 1002dd2f 78 API calls 2 library calls 24455->24479 24457 1002d230 WideCharToMultiByte 24457->24464 24458 1002d10d 24480 1002f6f1 101 API calls 3 library calls 24458->24480 24459 1002d268 WideCharToMultiByte 24459->24464 24462 1002d161 _strlen 24482 1002476a 70 API calls _malloc 24462->24482 24463 1002d12e type_info::operator== 24463->24462 24463->24464 24468 1002d15b 24463->24468 24464->24452 24464->24457 24464->24459 24465 1002d3b1 __tzset_nolock ___BuildCatchObject 24464->24465 24466 10023218 70 API calls __tzset_nolock 24464->24466 24473 1002f6dd 83 API calls __tzset_nolock 24464->24473 24484 10024a14 8 API calls 2 library calls 24464->24484 24485 1002043c 70 API calls 2 library calls 24464->24485 24486 1002d331 LeaveCriticalSection _doexit 24464->24486 24465->24414 24466->24464 24481 1002043c 70 API calls 2 library calls 24468->24481 24470 1002d16f _strlen 24470->24464 24483 10021da5 70 API calls __isatty 24470->24483 24472 1002d19b 24472->24464 24473->24464 24474->24413 24475->24440 24477->24451 24478->24455 24479->24458 24480->24463 24481->24462 24482->24470 24483->24472 24484->24464 24485->24464 24486->24464 24487->24427 24488->24429 24491 100287e4 24490->24491 24492 100287cf 24490->24492 24493 10028825 24491->24493 24495 100287f2 24491->24495 24521 100258dc 70 API calls __getptd_noexit 24492->24521 24524 100258dc 70 API calls __getptd_noexit 24493->24524 24506 100286fe 24495->24506 24497 100287d4 24522 10024a04 9 API calls __isatty 24497->24522 24500 1002881d 24525 10024a04 9 API calls __isatty 24500->24525 24501 100287df 24501->24235 24504 10028835 24504->24235 24507 10028730 24506->24507 24508 10028718 24506->24508 24509 10028754 24507->24509 24511 1002873f 24507->24511 24527 100258dc 70 API calls __getptd_noexit 24508->24527 24526 10029b38 InitOnceExecuteOnce 24509->24526 24529 100258dc 70 API calls __getptd_noexit 24511->24529 24512 1002871d 24528 10024a04 9 API calls __isatty 24512->24528 24515 10028744 24530 10024a04 9 API calls __isatty 24515->24530 24517 10028728 24517->24504 24523 100258dc 70 API calls __getptd_noexit 24517->24523 24518 10028781 24518->24517 24531 100285a2 103 API calls 7 library calls 24518->24531 24521->24497 24522->24501 24523->24500 24524->24500 24525->24504 24526->24518 24527->24512 24528->24517 24529->24515 24530->24517 24531->24517 24533 10022ab0 ___BuildCatchObject 24532->24533 24534 10027ff1 __lock 63 API calls 24533->24534 24535 10022ab7 24534->24535 24536 10022b70 __initterm 24535->24536 24537 10022ae5 DecodePointer 24535->24537 24552 10022bbe 24536->24552 24537->24536 24539 10022afc DecodePointer 24537->24539 24546 10022b0c 24539->24546 24541 10022bcd ___BuildCatchObject 24541->24238 24543 10022b19 EncodePointer 24543->24546 24544 10022bb5 24557 10022833 24544->24557 24546->24536 24546->24543 24548 10022b29 DecodePointer EncodePointer 24546->24548 24549 10022b3b DecodePointer DecodePointer 24548->24549 24549->24546 24553 10022bc4 24552->24553 24554 10022b9e 24552->24554 24560 10028155 LeaveCriticalSection 24553->24560 24554->24541 24556 10028155 LeaveCriticalSection 24554->24556 24556->24544 24561 10022801 GetModuleHandleExW 24557->24561 24560->24554 24562 10022831 ExitProcess 24561->24562 24563 1002281a GetProcAddress 24561->24563 24563->24562 24564 1002282c 24563->24564 24564->24562 24566 10006b70 char_traits 24565->24566 24569 10006b90 24566->24569 24568 100060b2 24568->24250 24570 10006ba3 _Copy_impl 24569->24570 24571 10006bca 24570->24571 24572 10006baa std::ios_base::clear 24570->24572 24577 100067d0 71 API calls 2 library calls 24571->24577 24576 10006ab0 71 API calls 3 library calls 24572->24576 24575 10006bc8 std::ios_base::clear char_traits 24575->24568 24576->24575 24577->24575 24578->24264 24579 10029b73 24580 10029b7f ___BuildCatchObject 24579->24580 24581 10027ff1 __lock 70 API calls 24580->24581 24582 10029b86 24581->24582 24584 10029b94 ___BuildCatchObject @_EH4_CallFilterFunc@8 24582->24584 24599 10024720 24582->24599 24586 10029c24 GetStartupInfoW 24594 10029d62 24586->24594 24596 10029c39 24586->24596 24587 10029e26 24605 10029e37 LeaveCriticalSection _doexit 24587->24605 24589 10029e32 24589->24589 24590 10029dab GetStdHandle 24590->24594 24591 10024720 __calloc_crt 70 API calls 24591->24596 24592 10029dbd GetFileType 24592->24594 24593 10029c87 24593->24594 24597 10029cc7 InitializeCriticalSectionAndSpinCount 24593->24597 24598 10029cb9 GetFileType 24593->24598 24594->24587 24594->24590 24594->24592 24595 10029dea InitializeCriticalSectionAndSpinCount 24594->24595 24595->24594 24596->24591 24596->24593 24596->24594 24597->24593 24598->24593 24598->24597 24602 10024727 24599->24602 24601 10024764 24601->24584 24601->24586 24602->24601 24603 10024745 Sleep 24602->24603 24606 1002b663 24602->24606 24604 1002475c 24603->24604 24604->24601 24604->24602 24605->24589 24607 1002b66e 24606->24607 24612 1002b689 24606->24612 24608 1002b67a 24607->24608 24607->24612 24614 100258dc 70 API calls __getptd_noexit 24608->24614 24610 1002b699 HeapAlloc 24611 1002b67f 24610->24611 24610->24612 24611->24602 24612->24610 24612->24611 24615 100246bc DecodePointer 24612->24615 24614->24611 24615->24612 24616 10036790 24617 100367a4 24616->24617 24618 10036799 CloseHandle 24616->24618 24618->24617 24621 100326a6 24618->24621 24620 100326cf 24621->24616 24621->24620 24622 100172c0 78 API calls __CxxThrowException@8 24621->24622 24622->24621 24623 10023ba7 24624 10023bb0 24623->24624 24625 10023bb5 24623->24625 24637 1002a1a0 GetSystemTimeAsFileTime GetCurrentThreadId GetTickCount64 QueryPerformanceCounter 24624->24637 24629 10023bca 24625->24629 24628 10023bc3 24630 10023bd6 ___BuildCatchObject 24629->24630 24634 10023c24 ___DllMainCRTStartup 24630->24634 24636 10023c81 ___BuildCatchObject 24630->24636 24638 10023a3b 24630->24638 24632 10023c5e 24633 10023a3b __CRT_INIT@12 130 API calls 24632->24633 24632->24636 24633->24636 24634->24632 24635 10023a3b __CRT_INIT@12 130 API calls 24634->24635 24634->24636 24635->24632 24636->24628 24637->24625 24639 10023a47 ___BuildCatchObject 24638->24639 24640 10023ac3 24639->24640 24641 10023a4f 24639->24641 24642 10023ac7 24640->24642 24643 10023b2c 24640->24643 24684 10026dcd GetProcessHeap 24641->24684 24648 10023ae8 24642->24648 24682 10023a58 ___BuildCatchObject __CRT_INIT@12 24642->24682 24758 1002296c 70 API calls _doexit 24642->24758 24645 10023b31 24643->24645 24646 10023b8f 24643->24646 24763 10028186 FlsGetValue 24645->24763 24646->24682 24767 10025c6e 79 API calls 2 library calls 24646->24767 24647 10023a54 24647->24682 24685 10025dd7 24647->24685 24759 10022849 73 API calls _free 24648->24759 24652 10023b3c 24657 10024720 __calloc_crt 70 API calls 24652->24657 24652->24682 24655 10023aed 24658 10023afe __CRT_INIT@12 24655->24658 24760 10029e40 71 API calls _free 24655->24760 24656 10023a64 __RTC_Initialize 24663 10023a74 GetCommandLineA 24656->24663 24656->24682 24660 10023b4d 24657->24660 24762 10023b17 73 API calls __mtterm 24658->24762 24660->24682 24764 10028194 FlsSetValue 24660->24764 24662 10023af9 24761 10025e4d 73 API calls 2 library calls 24662->24761 24706 1002a23a GetEnvironmentStringsW 24663->24706 24667 10023b65 24669 10023b83 24667->24669 24670 10023b6b 24667->24670 24668 10023a84 __ioinit0 24719 10029e92 24668->24719 24766 1002043c 70 API calls 2 library calls 24669->24766 24765 10025d2b 70 API calls 4 library calls 24670->24765 24673 10023b73 GetCurrentThreadId 24673->24682 24676 10023aa7 24676->24682 24756 10029e40 71 API calls _free 24676->24756 24679 10023abc 24757 10025e4d 73 API calls 2 library calls 24679->24757 24682->24634 24684->24647 24768 10022a20 EncodePointer EncodePointer __init_pointers __initp_misc_winsig 24685->24768 24687 10025ddc 24769 10028120 InitializeCriticalSectionAndSpinCount 24687->24769 24689 10025de1 24690 10025de5 24689->24690 24771 1002816a FlsAlloc 24689->24771 24770 10025e4d 73 API calls 2 library calls 24690->24770 24693 10025dea 24693->24656 24694 10025df7 24694->24690 24695 10025e02 24694->24695 24696 10024720 __calloc_crt 70 API calls 24695->24696 24697 10025e0f 24696->24697 24698 10025e44 24697->24698 24772 10028194 FlsSetValue 24697->24772 24774 10025e4d 73 API calls 2 library calls 24698->24774 24701 10025e49 24701->24656 24702 10025e23 24702->24698 24703 10025e29 24702->24703 24773 10025d2b 70 API calls 4 library calls 24703->24773 24705 10025e31 GetCurrentThreadId 24705->24656 24708 1002a24d 24706->24708 24712 1002a2c0 24706->24712 24707 1002a265 WideCharToMultiByte 24709 1002a280 24707->24709 24710 1002a2b7 FreeEnvironmentStringsW 24707->24710 24708->24707 24708->24708 24775 1002476a 70 API calls _malloc 24709->24775 24710->24712 24712->24668 24713 1002a286 24713->24710 24714 1002a28d WideCharToMultiByte 24713->24714 24715 1002a2a3 24714->24715 24716 1002a2ac FreeEnvironmentStringsW 24714->24716 24776 1002043c 70 API calls 2 library calls 24715->24776 24716->24712 24718 1002a2a9 24718->24716 24720 10029ea0 24719->24720 24721 10029ea5 GetModuleFileNameA 24719->24721 24783 1002762f 96 API calls __setmbcp 24720->24783 24722 10029ed2 24721->24722 24777 10029f43 24722->24777 24726 10023a93 24726->24676 24732 1002a0bf 24726->24732 24727 10029f05 24784 1002476a 70 API calls _malloc 24727->24784 24729 10029f0b 24729->24726 24730 10029f43 _parse_cmdline 80 API calls 24729->24730 24731 10029f25 24730->24731 24731->24726 24733 1002a0c8 24732->24733 24736 1002a0cd _strlen 24732->24736 24787 1002762f 96 API calls __setmbcp 24733->24787 24735 10024720 __calloc_crt 70 API calls 24744 1002a103 _strlen 24735->24744 24736->24735 24739 10023a9c 24736->24739 24737 1002a155 24789 1002043c 70 API calls 2 library calls 24737->24789 24739->24676 24748 1002297b 24739->24748 24740 10024720 __calloc_crt 70 API calls 24740->24744 24741 1002a17c 24790 1002043c 70 API calls 2 library calls 24741->24790 24744->24737 24744->24739 24744->24740 24744->24741 24745 1002a193 24744->24745 24788 10021da5 70 API calls __isatty 24744->24788 24791 10024a14 8 API calls 2 library calls 24745->24791 24747 1002a19f 24749 10022987 __IsNonwritableInCurrentImage 24748->24749 24792 10028361 24749->24792 24751 100229a5 __initterm_e 24754 100229e2 __IsNonwritableInCurrentImage 24751->24754 24795 1001f115 24751->24795 24753 100229c6 24753->24754 24798 10036500 24753->24798 24754->24676 24756->24679 24757->24682 24758->24648 24759->24655 24760->24662 24761->24658 24762->24682 24763->24652 24764->24667 24765->24673 24766->24682 24767->24682 24768->24687 24769->24689 24770->24693 24771->24694 24772->24702 24773->24705 24774->24701 24775->24713 24776->24718 24779 10029f65 24777->24779 24780 10029fc9 24779->24780 24785 1002efd3 80 API calls x_ismbbtype_l 24779->24785 24781 10029ee8 24780->24781 24786 1002efd3 80 API calls x_ismbbtype_l 24780->24786 24781->24726 24781->24727 24783->24721 24784->24729 24785->24779 24786->24780 24787->24736 24788->24744 24789->24739 24790->24739 24791->24747 24793 10028364 EncodePointer 24792->24793 24793->24793 24794 1002837e 24793->24794 24794->24751 24805 1001f01f 24795->24805 24797 1001f120 24797->24753 24839 100241b0 24798->24839 24800 10036518 WSAStartup 24801 1001f115 _Error_objects 80 API calls 24800->24801 24802 10036533 24801->24802 24803 1001ffa4 __ld12tod 6 API calls 24802->24803 24804 10036543 24803->24804 24804->24753 24806 1001f02b ___BuildCatchObject 24805->24806 24813 10022a92 24806->24813 24812 1001f04e ___BuildCatchObject 24812->24797 24814 10027ff1 __lock 70 API calls 24813->24814 24815 1001f030 24814->24815 24816 1001f05f DecodePointer DecodePointer 24815->24816 24817 1001f08c 24816->24817 24818 1001f03c 24816->24818 24817->24818 24832 100246ef 71 API calls __isatty 24817->24832 24829 1001f059 24818->24829 24820 1001f09e 24821 1001f0ef EncodePointer EncodePointer 24820->24821 24822 1001f0c9 24820->24822 24823 1001f0bc 24820->24823 24821->24818 24822->24818 24824 1001f0c3 24822->24824 24833 100247b3 74 API calls __realloc_crt 24823->24833 24824->24822 24827 1001f0dd EncodePointer 24824->24827 24834 100247b3 74 API calls __realloc_crt 24824->24834 24827->24821 24828 1001f0d7 24828->24818 24828->24827 24835 10022a9b 24829->24835 24832->24820 24833->24824 24834->24828 24838 10028155 LeaveCriticalSection 24835->24838 24837 1001f05e 24837->24812 24838->24837 24840 6c696740 24841 6c6968bd 24840->24841 24842 6c696af6 VirtualAlloc 24841->24842 24843 6c696b75 _memmove 24841->24843 24844 6c69698f VirtualAlloc 24841->24844 24845 6c696a76 24841->24845 24842->24843 24846 6c696a51 _memset 24844->24846 24845->24842 24846->24845

                                    Control-flow Graph

                                    APIs
                                    • _memset.LIBCMT ref: 10013A60
                                    • swprintf.LIBCMT ref: 10013A86
                                    • CreateMutexA.KERNELBASE(00000000,00000000,00000000), ref: 10013A99
                                    • GetLastError.KERNEL32 ref: 10013AA5
                                      • Part of subcall function 10022BD3: _doexit.LIBCMT ref: 10022BDD
                                      • Part of subcall function 100138F0: _memset.LIBCMT ref: 10013918
                                      • Part of subcall function 100138F0: RegOpenKeyExA.ADVAPI32(80000001,101AFE40,00000000,00020006,?), ref: 10013944
                                      • Part of subcall function 100138F0: _sprintf.LIBCMT ref: 1001397C
                                      • Part of subcall function 100138F0: _strlen.LIBCMT ref: 1001398B
                                      • Part of subcall function 100138F0: RegSetValueExA.ADVAPI32(?,00000000,00000000,00000001,00000000,?), ref: 100139D7
                                      • Part of subcall function 100138F0: RegCloseKey.ADVAPI32(?), ref: 100139EA
                                    • IsUserAnAdmin.SHELL32 ref: 10013AC2
                                    • ReleaseMutex.KERNEL32(00000000), ref: 10013ADC
                                    • _memset.LIBCMT ref: 10013B1C
                                    • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 10013B32
                                    • _sprintf.LIBCMT ref: 10013B4E
                                    • DeleteFileA.KERNEL32(?), ref: 10013B5D
                                    • MoveFileA.KERNEL32(?,?), ref: 10013B71
                                    • _wprintf.LIBCMT ref: 10013CAC
                                    • _strlen.LIBCMT ref: 10013CB9
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File_memset$Mutex_sprintf_strlen$AdminCloseCreateDeleteErrorLastModuleMoveNameOpenReleaseUserValue_doexit_wprintfswprintf
                                    • String ID: %s%s$%s:%hd$206.238.77.142$206.238.77.142$C:\Users\Public\Documents\$Eaiawk mgqwgoywasgymoeeuu$EnOperationMode Error !$RunService !$TMzsft xtnogaqk$Windows Update$Yyickg caosusmk$service_is_exist !
                                    • API String ID: 2228167989-1563067711
                                    • Opcode ID: 2fc02c7820abb1e6e7b02b1e9042d30205a633eb3f33f25fe0a671c5299acd93
                                    • Instruction ID: 8ce7a2c48d05da8e1d18419a98124d55002a878a035d7289134c72219816da3c
                                    • Opcode Fuzzy Hash: 2fc02c7820abb1e6e7b02b1e9042d30205a633eb3f33f25fe0a671c5299acd93
                                    • Instruction Fuzzy Hash: CB61ECB5944314AAE721D7A08C87BE977B8EF00741F804099F6496D5D3EB78DAC4CBA2

                                    Control-flow Graph

                                    APIs
                                    • CryptAcquireContextA.ADVAPI32(00000000,00000000,00000000,00000001,F0000000), ref: 1000D8B6
                                    • GetLastError.KERNEL32 ref: 1000D8C0
                                    • CryptCreateHash.ADVAPI32(00000000,00000000,00000000,00000000,?), ref: 1000D8E1
                                    • GetLastError.KERNEL32 ref: 1000D8EB
                                    • CryptReleaseContext.ADVAPI32(00000000,00000000), ref: 1000D8FA
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Crypt$ContextErrorLast$AcquireCreateHashRelease
                                    • String ID: %02X
                                    • API String ID: 4104741015-436463671
                                    • Opcode ID: 783f6aeacaf77bddf85f865987ab6f2245b3743a8a3a9c8136557c6450919572
                                    • Instruction ID: e6624ba5d8ed9705aec1f79a9e38e76f649a0541b50efeb1c6887bd17401cf19
                                    • Opcode Fuzzy Hash: 783f6aeacaf77bddf85f865987ab6f2245b3743a8a3a9c8136557c6450919572
                                    • Instruction Fuzzy Hash: AE51C5B5A00219EFEB14DFA4CC85BEEB7B4FB48300F108559FA15AB295D778A940CF61
                                    APIs
                                    • NtQueryInformationProcess.NTDLL(-00000001,00000022,00BA26FB,00000004,00000000), ref: 00BA0A8A
                                    • NtSetInformationProcess.NTDLL(-00000001,00000022,?,00000004,00BA09F7,0000005D), ref: 00BA0AAA
                                    • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004,00000004,00BA09F7,0000005D), ref: 00BA0ACC
                                    • wsprintfA.USER32(?,?,?,?), ref: 00BA0B74
                                    • MessageBoxA.USER32(00000000,?,?,00000010), ref: 00BA0B8C
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000003.2102098932.0000000000BA0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00BA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_3_ba0000_rundll32.jbxd
                                    Similarity
                                    • API ID: InformationProcess$AllocMessageQueryVirtualwsprintf
                                    • String ID: Application error$SWVU$The procedure %s could not be located in the DLL %s.
                                    • API String ID: 2902211186-4283279704
                                    • Opcode ID: de0e8ee88c8a98f7b8a38ace4394a491acda8513ba92f7ded7199e416edf0d91
                                    • Instruction ID: 1507bff5166aa447380ee8c788899a7be47e8659a5c9016a5bdac0032a5328cf
                                    • Opcode Fuzzy Hash: de0e8ee88c8a98f7b8a38ace4394a491acda8513ba92f7ded7199e416edf0d91
                                    • Instruction Fuzzy Hash: 7741E172605746AFEB35AF24CC55FAB73E8EF06780F004568EE0697284DB70AD14CB94
                                    APIs
                                    • NtSetInformationProcess.NTDLL(-00000001,00000022,?,00000004,00BA09F7,0000005D), ref: 00BA0AAA
                                    • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004,00000004,00BA09F7,0000005D), ref: 00BA0ACC
                                    • wsprintfA.USER32(?,?,?,?), ref: 00BA0B74
                                    • MessageBoxA.USER32(00000000,?,?,00000010), ref: 00BA0B8C
                                    • ExitProcess.KERNEL32(00000000), ref: 00BA0B94
                                    • VirtualFree.KERNELBASE(?,00000000,00008000,?), ref: 00BA0BE7
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000003.2102098932.0000000000BA0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00BA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_3_ba0000_rundll32.jbxd
                                    Similarity
                                    • API ID: ProcessVirtual$AllocExitFreeInformationMessagewsprintf
                                    • String ID: Application error$SWVU$The procedure %s could not be located in the DLL %s.
                                    • API String ID: 2788668848-4283279704
                                    • Opcode ID: f644d6bb55c65f053268db4f25cec8320b3bbf1d1d06db4825fff5ba47126e3b
                                    • Instruction ID: 707e21e045b3e88ea457f0d55cdb48ffe7c65bf5acdb455907d30351f97a4e68
                                    • Opcode Fuzzy Hash: f644d6bb55c65f053268db4f25cec8320b3bbf1d1d06db4825fff5ba47126e3b
                                    • Instruction Fuzzy Hash: F731CE71255386ABDB39AF20CC55FEF37ACEF06781F004169FE4686285DB74A9108B20

                                    Control-flow Graph

                                    APIs
                                    • _memset.LIBCMT ref: 1000D055
                                    • _memset.LIBCMT ref: 1000D08B
                                    • _memset.LIBCMT ref: 1000D09E
                                    • _memset.LIBCMT ref: 1000D0B1
                                    • CreatePipe.KERNELBASE(?,?,0000000C,00000000), ref: 1000D10C
                                    • GetStartupInfoA.KERNEL32(00000044), ref: 1000D12D
                                    • CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000001,00000000,00000000,00000000,00000044,00000000), ref: 1000D17E
                                    • CloseHandle.KERNEL32(?,?), ref: 1000D39A
                                    • CloseHandle.KERNEL32(?), ref: 1000D3A7
                                    • CloseHandle.KERNEL32(?), ref: 1000D3B4
                                    • CloseHandle.KERNEL32(?), ref: 1000D3C1
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseHandle_memset$Create$InfoPipeProcessStartup
                                    • String ID: D$ProcessorId$wmic cpu get processorid
                                    • API String ID: 1762129635-53154263
                                    • Opcode ID: 2faa9055df3024060b3a78fac8b67b6add4b8c37b23ad85aa60008f06d3c8044
                                    • Instruction ID: 29feaeb9d2e0a167578c768367cdbb99c1f13e7196a5b6bb9c176603c2bdf5a2
                                    • Opcode Fuzzy Hash: 2faa9055df3024060b3a78fac8b67b6add4b8c37b23ad85aa60008f06d3c8044
                                    • Instruction Fuzzy Hash: D1B14E75902228DFEB29DB60CC99BDEB7B4FB48340F1041DAE109A7181DB756B84CF50

                                    Control-flow Graph

                                    APIs
                                    • _memset.LIBCMT ref: 1000D4B4
                                    • _memset.LIBCMT ref: 1000D4EA
                                    • _memset.LIBCMT ref: 1000D4FD
                                    • _memset.LIBCMT ref: 1000D510
                                    • CreatePipe.KERNELBASE(?,?,0000000C,00000000), ref: 1000D56B
                                    • GetStartupInfoA.KERNEL32(00000044), ref: 1000D58C
                                    • CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000001,00000000,00000000,00000000,00000044,00000000), ref: 1000D5DD
                                    • CloseHandle.KERNEL32(?,?), ref: 1000D7F9
                                    • CloseHandle.KERNEL32(?), ref: 1000D806
                                    • CloseHandle.KERNEL32(?), ref: 1000D813
                                    • CloseHandle.KERNEL32(?), ref: 1000D820
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseHandle_memset$Create$InfoPipeProcessStartup
                                    • String ID: D$SerialNumber$wmic diskdrive get serialnumber
                                    • API String ID: 1762129635-2526680146
                                    • Opcode ID: 284479aef56905e99ef7afbd9686248a6d4ef8a24c59542d99c3aafd4a34ee3f
                                    • Instruction ID: f7e6dc397231a2a0a1082a64f52227403f3a6002e1c9f0e787add4f7ccce3aad
                                    • Opcode Fuzzy Hash: 284479aef56905e99ef7afbd9686248a6d4ef8a24c59542d99c3aafd4a34ee3f
                                    • Instruction Fuzzy Hash: 8CB12B759162289BEB28DB64CC9DBEEB7B4FB48300F0041DAE50DAA191DB756B84CF50

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 242 10026fe8-10027001 243 10027003-1002700d call 100258dc call 10024a04 242->243 244 10027019-1002702e call 1001f840 242->244 251 10027012 243->251 244->243 250 10027030-10027033 244->250 252 10027047-1002704d 250->252 253 10027035 250->253 254 10027014-10027018 251->254 257 10027059 call 1002ce25 252->257 258 1002704f 252->258 255 10027037-10027039 253->255 256 1002703b-10027045 call 100258dc 253->256 255->252 255->256 256->251 262 1002705e-1002706a call 1002cb7e 257->262 258->256 259 10027051-10027057 258->259 259->256 259->257 266 10027070-1002707c call 1002cba8 262->266 267 10027255-1002725f call 10024a14 262->267 266->267 272 10027082-1002708e call 1002cbd2 266->272 272->267 275 10027094-1002709b 272->275 276 1002710b-10027116 call 1002cbfc 275->276 277 1002709d 275->277 276->254 284 1002711c-1002711f 276->284 279 100270a7-100270c3 call 1002cbfc 277->279 280 1002709f-100270a5 277->280 279->254 285 100270c9-100270cc 279->285 280->276 280->279 286 10027121-1002712a call 1002ce75 284->286 287 1002714e-1002715b 284->287 288 100270d2-100270db call 1002ce75 285->288 289 1002720e-10027210 285->289 286->287 295 1002712c-1002714c 286->295 290 1002715d-1002716c call 1002d670 287->290 288->289 298 100270e1-100270f9 call 1002cbfc 288->298 289->254 299 10027179-100271a0 call 1002d5c0 call 1002d670 290->299 300 1002716e-10027176 290->300 295->290 298->254 305 100270ff-10027106 298->305 308 100271a2-100271ab 299->308 309 100271ae-100271d5 call 1002d5c0 call 1002d670 299->309 300->299 305->289 308->309 314 100271e3-100271f2 call 1002d5c0 309->314 315 100271d7-100271e0 309->315 318 100271f4 314->318 319 1002721f-10027238 314->319 315->314 320 100271f6-100271f8 318->320 321 100271fa-10027208 318->321 322 1002723a-10027253 319->322 323 1002720b 319->323 320->321 324 10027215-10027217 320->324 321->323 322->289 323->289 324->289 325 10027219 324->325 325->319 326 1002721b-1002721d 325->326 326->289 326->319
                                    APIs
                                    • _memset.LIBCMT ref: 10027021
                                      • Part of subcall function 100258DC: __getptd_noexit.LIBCMT ref: 100258DC
                                    • __gmtime64_s.LIBCMT ref: 100270BA
                                    • __gmtime64_s.LIBCMT ref: 100270F0
                                    • __gmtime64_s.LIBCMT ref: 1002710D
                                    • __allrem.LIBCMT ref: 10027163
                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 1002717F
                                    • __allrem.LIBCMT ref: 10027196
                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 100271B4
                                    • __allrem.LIBCMT ref: 100271CB
                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 100271E9
                                    • __invoke_watson.LIBCMT ref: 1002725A
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                                    • String ID:
                                    • API String ID: 384356119-0
                                    • Opcode ID: faf785f0e9591b3d4b811fc4296c87dcbc334db000ad1bf2518f1b08427d47ec
                                    • Instruction ID: 713491a1cde179dae1e75a0093b68b8f74a69f94e9f1ec33854f382ae24b7f6e
                                    • Opcode Fuzzy Hash: faf785f0e9591b3d4b811fc4296c87dcbc334db000ad1bf2518f1b08427d47ec
                                    • Instruction Fuzzy Hash: 6B71D476A00717EBE715DE78EC82B5AB3E8FF40364F91412AF918D6681E770ED448790

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 327 10029b73-10029b92 call 10024850 call 10027ff1 332 10029bb2-10029bc6 call 10024720 327->332 333 10029b94-10029ba9 call 10028a50 327->333 339 10029bc8-10029bdd call 10028a50 332->339 340 10029bdf-10029be4 332->340 338 10029baa-10029baf call 10024895 333->338 339->338 341 10029bea-10029bf1 340->341 344 10029bf3-10029c22 341->344 345 10029c24-10029c33 GetStartupInfoW 341->345 344->341 348 10029d62-10029d68 345->348 349 10029c39-10029c3e 345->349 351 10029e26-10029e2d call 10029e37 348->351 352 10029d6e-10029d7f 348->352 349->348 350 10029c44-10029c5b 349->350 353 10029c62-10029c65 350->353 354 10029c5d-10029c5f 350->354 362 10029e32 351->362 355 10029d81-10029d84 352->355 356 10029d94-10029d9a 352->356 358 10029c68-10029c6e 353->358 354->353 355->356 359 10029d86-10029d8f 355->359 360 10029da1-10029da8 356->360 361 10029d9c-10029d9f 356->361 364 10029c90-10029c98 358->364 365 10029c70-10029c81 call 10024720 358->365 366 10029e20-10029e21 359->366 363 10029dab-10029db7 GetStdHandle 360->363 361->363 362->362 367 10029db9-10029dbb 363->367 368 10029dfe-10029e14 363->368 370 10029c9b-10029c9d 364->370 376 10029c87-10029c8d 365->376 377 10029d15-10029d1c 365->377 366->348 367->368 371 10029dbd-10029dc6 GetFileType 367->371 368->366 373 10029e16-10029e19 368->373 370->348 374 10029ca3-10029ca8 370->374 371->368 375 10029dc8-10029dd2 371->375 373->366 378 10029d02-10029d13 374->378 379 10029caa-10029cad 374->379 381 10029dd4-10029dda 375->381 382 10029ddc-10029ddf 375->382 376->364 383 10029d22-10029d30 377->383 378->370 379->378 380 10029caf-10029cb3 379->380 380->378 384 10029cb5-10029cb7 380->384 385 10029de7 381->385 386 10029de1-10029de5 382->386 387 10029dea-10029dfc InitializeCriticalSectionAndSpinCount 382->387 388 10029d32-10029d54 383->388 389 10029d56-10029d5d 383->389 390 10029cc7-10029cfc InitializeCriticalSectionAndSpinCount 384->390 391 10029cb9-10029cc5 GetFileType 384->391 385->387 386->385 387->366 388->383 389->358 392 10029cff 390->392 391->390 391->392 392->378
                                    APIs
                                    • __lock.LIBCMT ref: 10029B81
                                      • Part of subcall function 10027FF1: __mtinitlocknum.LIBCMT ref: 10028003
                                      • Part of subcall function 10027FF1: __amsg_exit.LIBCMT ref: 1002800F
                                      • Part of subcall function 10027FF1: EnterCriticalSection.KERNEL32(?,?,10025D6D,0000000D), ref: 1002801C
                                    • @_EH4_CallFilterFunc@8.LIBCMT ref: 10029B9F
                                    • __calloc_crt.LIBCMT ref: 10029BB8
                                    • @_EH4_CallFilterFunc@8.LIBCMT ref: 10029BD3
                                    • GetStartupInfoW.KERNEL32(?,101B7C90,00000064), ref: 10029C28
                                    • __calloc_crt.LIBCMT ref: 10029C73
                                    • GetFileType.KERNEL32(00000001), ref: 10029CBA
                                    • InitializeCriticalSectionAndSpinCount.KERNEL32(0000000D,00000FA0), ref: 10029CF3
                                    • GetStdHandle.KERNEL32(-000000F6), ref: 10029DAC
                                    • GetFileType.KERNELBASE(00000000), ref: 10029DBE
                                    • InitializeCriticalSectionAndSpinCount.KERNEL32(-101BEA54,00000FA0), ref: 10029DF3
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalSection$CallCountFileFilterFunc@8InitializeSpinType__calloc_crt$EnterHandleInfoStartup__amsg_exit__lock__mtinitlocknum
                                    • String ID:
                                    • API String ID: 301580142-0
                                    • Opcode ID: 253e1a18d07f7ed5b743515052310a273316cb8cc387dfcc17b4352ffc5cb5ed
                                    • Instruction ID: 539e413c7bcea522b47ae7ad5c28c4f5532b66027edab54cb976d1ebee692ea2
                                    • Opcode Fuzzy Hash: 253e1a18d07f7ed5b743515052310a273316cb8cc387dfcc17b4352ffc5cb5ed
                                    • Instruction Fuzzy Hash: D3910671D043558FDB20CF68E88069DBBF4FF463A0B60426EE4AAAB3D1C7349842DB10

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 393 6c696740-6c6968c9 395 6c696c7b-6c696c7e 393->395 396 6c6968cf-6c6968d6 393->396 397 6c6968dc-6c696989 396->397 398 6c696af6-6c696b70 VirtualAlloc call 6c912210 396->398 400 6c69698f-6c696a71 VirtualAlloc call 6c913d80 397->400 401 6c696a76 397->401 402 6c696b75-6c696c71 398->402 400->401 401->398 402->395
                                    APIs
                                    • VirtualAlloc.KERNEL32(0000FFFF,00000000,00001000,00000004), ref: 6C6969A4
                                    • _memset.LIBCMT ref: 6C696A4C
                                    • VirtualAlloc.KERNELBASE(0000FFFF,000000B8,00001000,00000004,?,6C698C38), ref: 6C696B0E
                                    • _memmove.LIBCMT ref: 6C696B70
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3008266392.000000006C681000.00000040.00000001.01000000.00000003.sdmp, Offset: 6C680000, based on PE: true
                                    • Associated: 00000004.00000002.3008223401.000000006C680000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000004.00000002.3008266392.000000006C9C3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000004.00000002.3008266392.000000006CBAB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000004.00000002.3008266392.000000006CBB3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000004.00000002.3008266392.000000006CBB9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000004.00000002.3009093322.000000006CC55000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_6c680000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AllocVirtual$_memmove_memset
                                    • String ID:
                                    • API String ID: 725130153-0
                                    • Opcode ID: af01bac3374c618721e138754d3ca3c72d74494653e4f821ac976264aae05339
                                    • Instruction ID: 395c12fc52dce5ac1d009dabf2c6e74aa10fdb6c514c0d7e02ec50b25f49a4c4
                                    • Opcode Fuzzy Hash: af01bac3374c618721e138754d3ca3c72d74494653e4f821ac976264aae05339
                                    • Instruction Fuzzy Hash: D9D16F75B0260DCFCB48CFD9E593A2DBBB1FB8A300B14821AD8A587754DB30A941CF49
                                    APIs
                                    • VirtualProtect.KERNELBASE(?,00001000,00000004,?,?), ref: 00BA13EA
                                    • VirtualProtect.KERNEL32(?,00001000,?,?), ref: 00BA1403
                                    Memory Dump Source
                                    • Source File: 00000004.00000003.2102098932.0000000000BA0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00BA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_3_ba0000_rundll32.jbxd
                                    Similarity
                                    • API ID: ProtectVirtual
                                    • String ID:
                                    • API String ID: 544645111-0
                                    • Opcode ID: 460e07aa1c6cfb092b5f976fa85d581fca477865be9a128e2591be7121e923ca
                                    • Instruction ID: b1d429a417b6c49ed05833987fabd77db929dafd5a81931b874044704500e5e3
                                    • Opcode Fuzzy Hash: 460e07aa1c6cfb092b5f976fa85d581fca477865be9a128e2591be7121e923ca
                                    • Instruction Fuzzy Hash: 74F08276200305AFDB19CF40C844FEA7779EB48391F104176EA42AB684C670F5148B10

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 405 1002ce25-1002ce38 call 10024850 408 1002ce66-1002ce6b call 10024895 405->408 409 1002ce3a-1002ce4d call 10027ff1 405->409 414 1002ce5a-1002ce61 call 1002ce6c 409->414 415 1002ce4f call 1002d09f 409->415 414->408 418 1002ce54 415->418 418->414
                                    APIs
                                    • __lock.LIBCMT ref: 1002CE3C
                                      • Part of subcall function 10027FF1: __mtinitlocknum.LIBCMT ref: 10028003
                                      • Part of subcall function 10027FF1: __amsg_exit.LIBCMT ref: 1002800F
                                      • Part of subcall function 10027FF1: EnterCriticalSection.KERNEL32(?,?,10025D6D,0000000D), ref: 1002801C
                                    • __tzset_nolock.LIBCMT ref: 1002CE4F
                                      • Part of subcall function 1002D09F: __lock.LIBCMT ref: 1002D0C1
                                      • Part of subcall function 1002D09F: ____lc_codepage_func.LIBCMT ref: 1002D108
                                      • Part of subcall function 1002D09F: __getenv_helper_nolock.LIBCMT ref: 1002D129
                                      • Part of subcall function 1002D09F: _free.LIBCMT ref: 1002D15C
                                      • Part of subcall function 1002D09F: _strlen.LIBCMT ref: 1002D163
                                      • Part of subcall function 1002D09F: __malloc_crt.LIBCMT ref: 1002D16A
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: __lock$CriticalEnterSection____lc_codepage_func__amsg_exit__getenv_helper_nolock__malloc_crt__mtinitlocknum__tzset_nolock_free_strlen
                                    • String ID:
                                    • API String ID: 1282695788-0
                                    • Opcode ID: fc85f6cf18a6252e642b57c3e1c2b749fe30e0e1031c663e82c605452884cce2
                                    • Instruction ID: a2ad06c6b65e7629715c0b93b357caa5f945d3fedfb1b9c2ad21f9bf3716e497
                                    • Opcode Fuzzy Hash: fc85f6cf18a6252e642b57c3e1c2b749fe30e0e1031c663e82c605452884cce2
                                    • Instruction Fuzzy Hash: 0BE0C238451A48D9DF10EBF0AA4275C32F0FB04B66FE20209E004041D28F7D35888923

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 419 10022833-10022842 call 10022801 ExitProcess
                                    APIs
                                    • ___crtCorExitProcess.LIBCMT ref: 10022839
                                      • Part of subcall function 10022801: GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,?,?,?,1002283E,00000000,?,100280A4,000000FF,0000001E,101B7BE8,00000008,10028008,00000000,?), ref: 10022810
                                      • Part of subcall function 10022801: GetProcAddress.KERNEL32(?,CorExitProcess), ref: 10022822
                                    • ExitProcess.KERNEL32 ref: 10022842
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ExitProcess$AddressHandleModuleProc___crt
                                    • String ID:
                                    • API String ID: 2427264223-0
                                    • Opcode ID: 3bf28b7052921138b5cd44a98d3311a828cfa0a63c341592180aa8684d3b340a
                                    • Instruction ID: c8f4cf039e012b41d150cd44d72804b099170dd8f7fcc5d26d0c23f5f7bd029f
                                    • Opcode Fuzzy Hash: 3bf28b7052921138b5cd44a98d3311a828cfa0a63c341592180aa8684d3b340a
                                    • Instruction Fuzzy Hash: B5B09230001108BFDB022F51DC4A8593FA9FB002A0B508020F80809032DF73BA929A81
                                    APIs
                                    • VirtualAlloc.KERNELBASE(00000000,-00000436,00001000,00000004), ref: 00BA087D
                                    • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 00BA08A9
                                    Memory Dump Source
                                    • Source File: 00000004.00000003.2102098932.0000000000BA0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00BA0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_3_ba0000_rundll32.jbxd
                                    Similarity
                                    • API ID: Virtual$AllocFree
                                    • String ID:
                                    • API String ID: 2087232378-0
                                    • Opcode ID: 7e515f7c385f7f07b94d9a5cb9b23266753d833ffbaa65bc10218dcc86593253
                                    • Instruction ID: 4181723301e8cfe3003c47583f47c12635cb7fa25731b05452caf335562b3efa
                                    • Opcode Fuzzy Hash: 7e515f7c385f7f07b94d9a5cb9b23266753d833ffbaa65bc10218dcc86593253
                                    • Instruction Fuzzy Hash: B0018471A01118BBEB14DE99CC41FAEB7E9EBC8760F14C16AF61897385D674AD10CBA0

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 443 100287c6-100287cd 444 100287e4-100287ea 443->444 445 100287cf-100287e3 call 100258dc call 10024a04 443->445 446 10028825-1002882a call 100258dc 444->446 447 100287ec-100287f0 444->447 457 10028830-10028835 call 10024a04 446->457 447->446 449 100287f2-10028804 call 100286fe 447->449 456 10028809-1002880e 449->456 459 10028813-10028816 456->459 460 10028810 456->460 462 10028838-1002883a 457->462 459->462 463 10028818-10028823 call 100258dc 459->463 460->459 463->457
                                    APIs
                                    • __vsnprintf_helper.LIBCMT ref: 10028804
                                      • Part of subcall function 100258DC: __getptd_noexit.LIBCMT ref: 100258DC
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: __getptd_noexit__vsnprintf_helper
                                    • String ID:
                                    • API String ID: 3160531876-0
                                    • Opcode ID: 27c6404f2f0232317e85ccf06d5d21fea70814579ac9fa2ba3f76d9bc6ee1ddf
                                    • Instruction ID: bfddb452ae6b37b50ba7c24d6e5f6263054393a432078eca8de479b56f7627c6
                                    • Opcode Fuzzy Hash: 27c6404f2f0232317e85ccf06d5d21fea70814579ac9fa2ba3f76d9bc6ee1ddf
                                    • Instruction Fuzzy Hash: A7F0C23980214DAECF019FA4BC0578E3BE4EF01370FD14251FA2C4A1D1CFB6955097A6

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 422 10021dfa-10021e0f 423 10021e11-10021e1c call 100258dc call 10024a04 422->423 424 10021e2f-10021e33 422->424 435 10021e21 423->435 425 10021e35 424->425 426 10021e49-10021e4e call 10026fe8 424->426 429 10021e37-10021e3a 425->429 430 10021e3c-10021e47 call 100258dc 425->430 434 10021e53-10021e57 426->434 429->426 429->430 430->435 434->435 437 10021e59-10021e63 call 10026dea 434->437 439 10021e23-10021e2e call 1001ffa4 435->439 437->439
                                    APIs
                                      • Part of subcall function 100258DC: __getptd_noexit.LIBCMT ref: 100258DC
                                    • _asctime.LIBCMT ref: 10021E5D
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: __getptd_noexit_asctime
                                    • String ID:
                                    • API String ID: 1865661205-0
                                    • Opcode ID: dcfe908546e3f88bc8117c10939122550607e7d39558988ca205b2cb5c272348
                                    • Instruction ID: 4125543197aa1fcd6f4b2a2d68e97bfeb0adc15cba48122be1fc6d66b0878a2d
                                    • Opcode Fuzzy Hash: dcfe908546e3f88bc8117c10939122550607e7d39558988ca205b2cb5c272348
                                    • Instruction Fuzzy Hash: 53F04939A002099EDF00DBA4EC56BCE77ECEF28255FD20469EC05EB091EB74E9848725

                                    Control-flow Graph

                                    APIs
                                    • WSAStartup.WS2_32(00000202), ref: 1003651E
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Startup
                                    • String ID:
                                    • API String ID: 724789610-0
                                    • Opcode ID: d3557ac59b8f8fefe8b80b3b61d78a442e21de74061af108e84e171f57d9cb46
                                    • Instruction ID: a027679b03284c68216ebb438d11db6f7a8099bc69e3ea9b22835e59c52e58d0
                                    • Opcode Fuzzy Hash: d3557ac59b8f8fefe8b80b3b61d78a442e21de74061af108e84e171f57d9cb46
                                    • Instruction Fuzzy Hash: ABE0DF74A04208ABCB00DBB4DD0755D77F4EF49200F80016CF9098B252EB34AA148A82

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 473 10022bd3-10022bdd call 10022aa4 475 10022be2-10022be6 473->475
                                    APIs
                                    • _doexit.LIBCMT ref: 10022BDD
                                      • Part of subcall function 10022AA4: __lock.LIBCMT ref: 10022AB2
                                      • Part of subcall function 10022AA4: DecodePointer.KERNEL32(101B78D8,0000001C,10022A1B,00000000,00000001,00000000,?,1002296B,000000FF,?,10028014,00000011,?,?,10025D6D,0000000D), ref: 10022AF1
                                      • Part of subcall function 10022AA4: DecodePointer.KERNEL32(?,1002296B,000000FF,?,10028014,00000011,?,?,10025D6D,0000000D), ref: 10022B02
                                      • Part of subcall function 10022AA4: EncodePointer.KERNEL32(00000000,?,1002296B,000000FF,?,10028014,00000011,?,?,10025D6D,0000000D), ref: 10022B1B
                                      • Part of subcall function 10022AA4: DecodePointer.KERNEL32(-00000004,?,1002296B,000000FF,?,10028014,00000011,?,?,10025D6D,0000000D), ref: 10022B2B
                                      • Part of subcall function 10022AA4: EncodePointer.KERNEL32(00000000,?,1002296B,000000FF,?,10028014,00000011,?,?,10025D6D,0000000D), ref: 10022B31
                                      • Part of subcall function 10022AA4: DecodePointer.KERNEL32(?,1002296B,000000FF,?,10028014,00000011,?,?,10025D6D,0000000D), ref: 10022B47
                                      • Part of subcall function 10022AA4: DecodePointer.KERNEL32(?,1002296B,000000FF,?,10028014,00000011,?,?,10025D6D,0000000D), ref: 10022B52
                                      • Part of subcall function 10022AA4: __initterm.LIBCMT ref: 10022B7A
                                      • Part of subcall function 10022AA4: __initterm.LIBCMT ref: 10022B8B
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Pointer$Decode$Encode__initterm$__lock_doexit
                                    • String ID:
                                    • API String ID: 3712619029-0
                                    • Opcode ID: e664eab0a2f8ce3703c552baf369986a84cdf03d3e0bf670d1975cdb5f15a4fc
                                    • Instruction ID: cfc2533f0be627bc8b7b8cac997dbfbd0b87b13c6f736a1528db1b5c4a82aaa4
                                    • Opcode Fuzzy Hash: e664eab0a2f8ce3703c552baf369986a84cdf03d3e0bf670d1975cdb5f15a4fc
                                    • Instruction Fuzzy Hash: 06B0123158030C33E9201581FC03F093B1C8F80A60F500020FF0C1C5E1A593756080CA

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 508 10036790-10036797 509 100367a4 508->509 510 10036799-100367a2 CloseHandle 508->510 510->509 511 100367a5-100367b8 call 100172c0 510->511 514 100326a6-100326b6 511->514 515 100367be 511->515 516 100326b8-100326c4 514->516 517 100326cf-100326d1 514->517 516->517 519 100326c6-100326cc 516->519 519->508
                                    APIs
                                    • CloseHandle.KERNELBASE(?), ref: 1003679A
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseHandle
                                    • String ID:
                                    • API String ID: 2962429428-0
                                    • Opcode ID: f611d1dd42dff66c0d1eb48c861494fca37600f237e2205797fc90e11b86f92c
                                    • Instruction ID: 8c8dd9ba5464cc4f96c2d7dd6b4eaa4fb058b5ebf7e2d6a9fdb27c8fe52b3e30
                                    • Opcode Fuzzy Hash: f611d1dd42dff66c0d1eb48c861494fca37600f237e2205797fc90e11b86f92c
                                    • Instruction Fuzzy Hash: 1BF05434301512CFEB16DF19CC44945B3E9FF413A67564669E495CF668D774DC00CA50
                                    APIs
                                    • GetModuleFileNameA.KERNEL32(00000000,?,00000104,1A75B7EA,?,?,?,00000000,10023340,101B6C90,000000FE,?,10013C89,TMzsft xtnogaqk,Yyickg caosusmk,Eaiawk mgqwgoywasgymoeeuu), ref: 10012594
                                    • ExpandEnvironmentStringsA.KERNEL32(C:\Users\Public\Documents\,?,00000104,?,?,?,00000000,10023340,101B6C90,000000FE,?,10013C89,TMzsft xtnogaqk,Yyickg caosusmk,Eaiawk mgqwgoywasgymoeeuu), ref: 100125AB
                                    • _strlen.LIBCMT ref: 100125B8
                                    • _strncmp.LIBCMT ref: 100125CF
                                    • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 1001270E
                                      • Part of subcall function 10012300: _memset.LIBCMT ref: 10012328
                                      • Part of subcall function 10012300: _strlen.LIBCMT ref: 1001234F
                                      • Part of subcall function 10012300: _strncpy.LIBCMT ref: 10012382
                                      • Part of subcall function 10012300: CreateDirectoryA.KERNEL32(00000000,00000000), ref: 100123A9
                                    • wsprintfA.USER32 ref: 10012616
                                    • _strlen.LIBCMT ref: 10012626
                                    • _strlen.LIBCMT ref: 10012642
                                    • CopyFileA.KERNEL32(?,?,00000000), ref: 100126AE
                                    • _memset.LIBCMT ref: 100126C2
                                    • _strcat.LIBCMT ref: 100126D8
                                    • CreateServiceA.ADVAPI32(?,?,?,000F01FF,00000110,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000), ref: 10012756
                                    • LockServiceDatabase.ADVAPI32(?), ref: 10012769
                                    • ChangeServiceConfig2A.ADVAPI32(00000000,00000001,?), ref: 10012799
                                    • ChangeServiceConfig2A.ADVAPI32(00000000,00000002,00015180), ref: 10012877
                                    • UnlockServiceDatabase.ADVAPI32(?), ref: 10012884
                                    • GetLastError.KERNEL32 ref: 10012893
                                    • OpenServiceA.ADVAPI32(?,?,000F01FF), ref: 100128B0
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Service$_strlen$ChangeConfig2CreateDatabaseFileOpen_memset$CopyDirectoryEnvironmentErrorExpandLastLockManagerModuleNameStringsUnlock_strcat_strncmp_strncpywsprintf
                                    • String ID: %$C:\Users\Public\Documents\$Description$SYSTEM\CurrentControlSet\Services\$Windows Update$Yyickg caosusmk$s
                                    • API String ID: 2269191997-3217403557
                                    • Opcode ID: da25e49445566c96217ba80189cd2cecd7e86491d1e1acde59f2152fe1c39007
                                    • Instruction ID: 58a78215622ab89836c283d46f1977e4f6cad2cf6e4b3b9b80a50220f8474d07
                                    • Opcode Fuzzy Hash: da25e49445566c96217ba80189cd2cecd7e86491d1e1acde59f2152fe1c39007
                                    • Instruction Fuzzy Hash: BEE17471D04298DFEB26CB94DC88BDE7BB8BB15704F0441D9E5486A2C1C7B95B88CF61
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File_memset$ModuleNamePathRemoveSpeclstrlen
                                    • String ID: && del "$ /c ping -n 4 127.0.0.1 > nul$" > nul$COMSPEC$D
                                    • API String ID: 322946884-2269649423
                                    • Opcode ID: 144a78e811b26684e0f96933bcd6fe390524fe62f1730313945f432d4c563e04
                                    • Instruction ID: 84f9132210fad28102cfca7cccb4be7a633d21108d91728e9d5e1e2c02768cad
                                    • Opcode Fuzzy Hash: 144a78e811b26684e0f96933bcd6fe390524fe62f1730313945f432d4c563e04
                                    • Instruction Fuzzy Hash: 17914F75A00219AFEB24DB64CC85BEA77B8FF48740F448599F20DAA191DF70AB84CF51
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _memset$State$AsyncSleeplstrlen
                                    • String ID: <BackSpace>$<Enter>$]$e
                                    • API String ID: 607291201-3604511016
                                    • Opcode ID: da57c67bcd9e4523acf9165be53d619ee9f3dc396b189a0e504f25392de7e49e
                                    • Instruction ID: 971390b8b5f7826b9d9bd22f466c4ca9011c4cb2ed80f64febdb7f556ca07fc7
                                    • Opcode Fuzzy Hash: da57c67bcd9e4523acf9165be53d619ee9f3dc396b189a0e504f25392de7e49e
                                    • Instruction Fuzzy Hash: 6091F4B4900718DFEB20CFA0DC49BEA7375FB84346F1041EDE509A6186DB76AA94DF41
                                    APIs
                                    • socket.WS2_32(?,00000001,00000006), ref: 1001DC4B
                                    • bind.WS2_32(00000000,00000002,0000001C), ref: 1001DC70
                                    • WSAGetLastError.WS2_32(?,?,?,?), ref: 1001DCA8
                                    • SetLastError.KERNEL32 ref: 1001DCB6
                                    • WSAGetLastError.WS2_32(?,?,?,?), ref: 1001DCD7
                                    • SetLastError.KERNEL32 ref: 1001DCE5
                                    • WSAGetLastError.WS2_32(?,?,?), ref: 1001DCF6
                                    • SetLastError.KERNEL32 ref: 1001DD04
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ErrorLast$bindsocket
                                    • String ID: 0.0.0.0
                                    • API String ID: 2672188334-3771769585
                                    • Opcode ID: 67e94f2010b34371f429a1fa7c81e8d84f1349c60049d7ca6e869d281ca33336
                                    • Instruction ID: 8216ced0d739489223f21362e87208fc090313cd3a371b7f6b63c1b20dd229cb
                                    • Opcode Fuzzy Hash: 67e94f2010b34371f429a1fa7c81e8d84f1349c60049d7ca6e869d281ca33336
                                    • Instruction Fuzzy Hash: 8231E672A002159FE720EF68DC85BAB77E8EF45350F00452EFD09CA181EAB5D885D7A0
                                    APIs
                                    • WSAGetLastError.WS2_32(?,?,?,?,?,?,1001C326,FFFFFFFF,?,?,?,FFFFFFFF,?), ref: 1001C5E3
                                      • Part of subcall function 100172C0: __CxxThrowException@8.LIBCMT ref: 100172D2
                                      • Part of subcall function 100172C0: EnterCriticalSection.KERNEL32(00000000,1A75B7EA,00000000,00000098,?,?,00000000,10035B28,000000FF,?,?,101B722C,?,1001640E,80004005), ref: 10017312
                                      • Part of subcall function 100172C0: LeaveCriticalSection.KERNEL32(00000000,?,?,00000000,10035B28,000000FF,?,?,101B722C,?,1001640E,80004005,?,100168C9,00000400,00000400), ref: 1001737B
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalSection$EnterErrorException@8LastLeaveThrow
                                    • String ID:
                                    • API String ID: 1367629879-0
                                    • Opcode ID: 1a78252def1050f5be20003a34375eeef4699fcd1b0fa4c910ffc5e1ea9ae854
                                    • Instruction ID: 2045c5cf5837c9daf880452df431a01197e78d674d59fb6298516e1ae159bddb
                                    • Opcode Fuzzy Hash: 1a78252def1050f5be20003a34375eeef4699fcd1b0fa4c910ffc5e1ea9ae854
                                    • Instruction Fuzzy Hash: 7851BEB5900218AFDB21DFA4C841AAE77B5FF44390F100219F8599F291E770EDD0DB91
                                    APIs
                                    • _memset.LIBCMT ref: 10015432
                                    • _memset.LIBCMT ref: 10015448
                                    • _memset.LIBCMT ref: 1001545E
                                    • LoadLibraryA.KERNEL32(ADVAPI32.dll), ref: 1001546B
                                    • GetProcAddress.KERNEL32(00000000,RegQueryValueExA), ref: 10015493
                                    • GetProcAddress.KERNEL32(00000000,RegOpenKeyExA), ref: 100154AB
                                    • GetProcAddress.KERNEL32(00000000,RegEnumValueA), ref: 100154C3
                                    • GetProcAddress.KERNEL32(00000000,RegEnumKeyExA), ref: 100154DB
                                    • GetProcAddress.KERNEL32(00000000,RegCloseKey), ref: 100154F3
                                    • FreeLibrary.KERNEL32(00000000), ref: 1001553C
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressProc$_memset$Library$FreeLoad
                                    • String ID: ADVAPI32.dll$RegCloseKey$RegEnumKeyExA$RegEnumValueA$RegOpenKeyExA$RegQueryValueExA
                                    • API String ID: 2029490530-3713883646
                                    • Opcode ID: ce21794f6d49dae7673cc83d0b588799919480882acf9cc9429ea4c88414c882
                                    • Instruction ID: 42d3faf0a6d82433ca9894e8e05647cd2437e6e791ab8efedd1cac75c6c50b36
                                    • Opcode Fuzzy Hash: ce21794f6d49dae7673cc83d0b588799919480882acf9cc9429ea4c88414c882
                                    • Instruction Fuzzy Hash: 4AB17EB5904629EFDB20DF64CC89BEEB7B4FB48306F0445D8E909AA290D7759AC4CF50
                                    APIs
                                    • WinHttpOpen.WINHTTP(curl/7.83.1,00000000,00000000,00000000,00000000), ref: 10007197
                                    • WinHttpSetTimeouts.WINHTTP(00000000,000003E8,000003E8,000003E8,000003E8), ref: 100071BE
                                    • WinHttpConnect.WINHTTP(00000000,?,00000050,00000000), ref: 100071D6
                                    • WinHttpOpenRequest.WINHTTP(00000000,GET,?,00000000,00000000,00000000,00000000), ref: 100071FA
                                    • WinHttpSendRequest.WINHTTP(00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 10007219
                                    • WinHttpReceiveResponse.WINHTTP(00000000,00000000), ref: 1000722E
                                    • WinHttpQueryHeaders.WINHTTP(00000000,20000013,00000000,00000000,00000004,00000000), ref: 10007264
                                    • __CxxThrowException@8.LIBCMT ref: 10007272
                                    • WinHttpQueryDataAvailable.WINHTTP(00000000,00000000), ref: 10007293
                                    • GetLastError.KERNEL32 ref: 1000729D
                                    • __CxxThrowException@8.LIBCMT ref: 100072AF
                                    • std::ios_base::clear.LIBCPMTD ref: 100072C8
                                    • WinHttpReadData.WINHTTP(00000000,00000000,00000000,00000000,00000000,00000000), ref: 100072E4
                                    • std::ios_base::clear.LIBCPMTD ref: 100072FF
                                    • GetLastError.KERNEL32(00000000), ref: 1000730A
                                    • _wprintf.LIBCMT ref: 10007316
                                    • WinHttpCloseHandle.WINHTTP(00000000), ref: 10007328
                                    • WinHttpCloseHandle.WINHTTP(00000000), ref: 10007338
                                    • WinHttpCloseHandle.WINHTTP(00000000), ref: 10007348
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Http$CloseHandle$DataErrorException@8LastOpenQueryRequestThrowstd::ios_base::clear$AvailableConnectHeadersReadReceiveResponseSendTimeouts_wprintf
                                    • String ID: Error %d has occurred.$GET$curl/7.83.1
                                    • API String ID: 3568891788-3281102068
                                    • Opcode ID: a0faf76c0c659e3c95fc50e059929233ef8cb015fb8e25ec05d524550362fc63
                                    • Instruction ID: 96198f7158a5b0440b015918e988b78723295c7c608185cc2ea97e2543ed712c
                                    • Opcode Fuzzy Hash: a0faf76c0c659e3c95fc50e059929233ef8cb015fb8e25ec05d524550362fc63
                                    • Instruction Fuzzy Hash: CF7107B1D40248EFEB15DFA0CC99BEEBBB4FB04741F104119F51AAA2D4CB786A45DB50
                                    APIs
                                    • RegisterServiceCtrlHandlerA.ADVAPI32(TMzsft xtnogaqk,10012E80), ref: 10012C4D
                                    • FreeConsole.KERNEL32 ref: 10012C68
                                    • SetServiceStatus.ADVAPI32(?,101BD9EC), ref: 10012CB5
                                    • Sleep.KERNEL32(000001F4), ref: 10012CCA
                                    • SetServiceStatus.ADVAPI32(?,101BD9EC), ref: 10012CE6
                                    • CreateMutexA.KERNEL32(00000000,00000000,TMzsft xtnogaqk), ref: 10012D08
                                    • GetLastError.KERNEL32 ref: 10012D14
                                    • WSAStartup.WS2_32(00000202,?), ref: 10012D34
                                    • GetVersionExA.KERNEL32(00000094), ref: 10012D4B
                                    • Sleep.KERNEL32(000F4240,00000000), ref: 10012D73
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Service$SleepStatus$ConsoleCreateCtrlErrorFreeHandlerLastMutexRegisterStartupVersion
                                    • String ID: %s Win7$TMzsft xtnogaqk
                                    • API String ID: 1415809075-2726583022
                                    • Opcode ID: 3c918adf2ea9c1f546c4a298ab0c77e3fc501175bd32b3641c86ff31aace8df7
                                    • Instruction ID: 16fc8e2a50e62427ded2aaa4a0275d88474e0d3da89c2d2dd2af286da20813d4
                                    • Opcode Fuzzy Hash: 3c918adf2ea9c1f546c4a298ab0c77e3fc501175bd32b3641c86ff31aace8df7
                                    • Instruction Fuzzy Hash: 9B518EB5904224DFE729EF60CC8DB9A77B4FB04306F804298E10D6A5A1D7786AC8DF52
                                    APIs
                                    • LoadLibraryA.KERNEL32(wininet.dll), ref: 10015F01
                                    • GetProcAddress.KERNEL32(?,InternetOpenA), ref: 10015F19
                                    • FreeLibrary.KERNEL32(00000000), ref: 10015F57
                                    • GetProcAddress.KERNEL32(?,InternetOpenUrlA), ref: 10015F70
                                    • FreeLibrary.KERNEL32(00000000), ref: 10015FB7
                                    • CreateFileA.KERNEL32(1000F526,40000000,00000000,00000000,00000002,00000000,00000000), ref: 10015FD7
                                    • _memset.LIBCMT ref: 10015FFE
                                    • GetProcAddress.KERNEL32(?,InternetReadFile), ref: 10016012
                                    • WriteFile.KERNEL32(000000FF,?,00000000,00000000,00000000), ref: 10016086
                                    • CloseHandle.KERNEL32(000000FF), ref: 100160A0
                                    • Sleep.KERNEL32(00000001), ref: 100160A8
                                    • GetProcAddress.KERNEL32(?,InternetCloseHandle), ref: 100160BA
                                    • FreeLibrary.KERNEL32(00000000), ref: 100160F0
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressLibraryProc$Free$File$CloseCreateHandleLoadSleepWrite_memset
                                    • String ID: InternetCloseHandle$InternetOpenA$InternetOpenUrlA$InternetReadFile$MSIE 6.0$wininet.dll
                                    • API String ID: 2728150189-4269851202
                                    • Opcode ID: 91acf4dff87506ba4283441e8002569b8e5cf21a0175855ebad90579deee730e
                                    • Instruction ID: e100d08a212eeccd1dc3a45c1d5aa8af2f61e991188d98dff4208e55cab7884c
                                    • Opcode Fuzzy Hash: 91acf4dff87506ba4283441e8002569b8e5cf21a0175855ebad90579deee730e
                                    • Instruction Fuzzy Hash: DA51CCF5900228DFEB31DB64CD89BDA77B8AB48305F5081D8F709AA181C7759AC5CF68
                                    APIs
                                    • LoadLibraryA.KERNEL32(userenv.dll), ref: 100123D8
                                    • GetProcAddress.KERNEL32(?,CreateEnvironmentBlock), ref: 100123EA
                                    • _memset.LIBCMT ref: 10012417
                                    • _memset.LIBCMT ref: 10012427
                                    • GetCurrentProcess.KERNEL32 ref: 10012459
                                    • OpenProcessToken.ADVAPI32(?,000F01FF,00000000), ref: 1001246F
                                    • DuplicateTokenEx.ADVAPI32(00000000,02000000,00000000,00000001,00000001,00000000), ref: 10012488
                                    • LoadLibraryA.KERNEL32(Kernel32.dll,WTSGetActiveConsoleSessionId), ref: 10012498
                                    • GetProcAddress.KERNEL32(00000000), ref: 1001249F
                                    • SetTokenInformation.ADVAPI32(00000000,0000000C,00000000,00000004), ref: 100124C0
                                    • CreateProcessAsUserA.ADVAPI32(00000000,00000000,00000000,00000000,00000000,00000000,00000430,00000000,00000000,00000044,00000000), ref: 100124F6
                                    • CloseHandle.KERNEL32(00000000), ref: 10012506
                                    • CloseHandle.KERNEL32(00000000), ref: 10012510
                                    • FreeLibrary.KERNEL32(00000000), ref: 1001252F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: LibraryProcessToken$AddressCloseHandleLoadProc_memset$CreateCurrentDuplicateFreeInformationOpenUser
                                    • String ID: CreateEnvironmentBlock$D$Kernel32.dll$WTSGetActiveConsoleSessionId$userenv.dll
                                    • API String ID: 2385095549-609967149
                                    • Opcode ID: ac44d7a654e1ecf9cefedaa459ffae167c2ab3953bef6485a400e85d30f059f2
                                    • Instruction ID: fd1ae4a91e3460f93e873eecc7cbeda63378566b322c9237b013182db1ce3722
                                    • Opcode Fuzzy Hash: ac44d7a654e1ecf9cefedaa459ffae167c2ab3953bef6485a400e85d30f059f2
                                    • Instruction Fuzzy Hash: B741B6B5E00218EFEB14DFE0CC99BAEBBB4FB48705F104518E6156B281D7B59944CF90
                                    APIs
                                    • LoadLibraryA.KERNEL32(ADVAPI32.dll), ref: 10015019
                                    • GetProcAddress.KERNEL32(?,OpenProcessToken), ref: 1001502B
                                    • GetProcAddress.KERNEL32(?,AdjustTokenPrivileges), ref: 1001503D
                                    • GetProcAddress.KERNEL32(?,LookupPrivilegeValueA), ref: 1001504F
                                    • LoadLibraryA.KERNEL32(kernel32.dll), ref: 1001505D
                                    • GetProcAddress.KERNEL32(?,GetCurrentProcess), ref: 1001506F
                                    • LoadLibraryA.KERNEL32(KERNEL32.dll), ref: 100150F0
                                    • GetProcAddress.KERNEL32(?,GetLastError), ref: 10015102
                                    • CloseHandle.KERNEL32(?), ref: 1001511A
                                    • FreeLibrary.KERNEL32(00000000), ref: 1001512A
                                    • FreeLibrary.KERNEL32(00000000), ref: 1001513A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressLibraryProc$Load$Free$CloseHandle
                                    • String ID: ADVAPI32.dll$AdjustTokenPrivileges$GetCurrentProcess$GetLastError$KERNEL32.dll$LookupPrivilegeValueA$OpenProcessToken$kernel32.dll
                                    • API String ID: 2887716753-1648388921
                                    • Opcode ID: 09c34ea0c58a1937bffb1c09e732f69496aae19d3495c3a7a974608a733c4652
                                    • Instruction ID: 2ba7eb19521ecd2e0521120e7302f927c8c69f99e1a3e1b69f5f98f9208caa0c
                                    • Opcode Fuzzy Hash: 09c34ea0c58a1937bffb1c09e732f69496aae19d3495c3a7a974608a733c4652
                                    • Instruction Fuzzy Hash: 8441F775A00218EFEB16DFE4CC88BEEBBB5FB08301F144518F905AA291D7799940CBA0
                                    APIs
                                    • LoadLibraryA.KERNEL32(ADVAPI32.dll,1A75B7EA), ref: 10015C0D
                                    • GetProcAddress.KERNEL32(00000000,RegCreateKeyExA), ref: 10015C2C
                                    • GetProcAddress.KERNEL32(00000000,RegSetValueExA), ref: 10015C3E
                                    • GetProcAddress.KERNEL32(00000000,RegDeleteKeyA), ref: 10015C50
                                    • GetProcAddress.KERNEL32(00000000,RegDeleteValueA), ref: 10015C62
                                    • GetProcAddress.KERNEL32(00000000,RegOpenKeyExA), ref: 10015C74
                                    • GetProcAddress.KERNEL32(00000000,RegCloseKey), ref: 10015C86
                                    • FreeLibrary.KERNEL32(00000000), ref: 10015CB7
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressProc$Library$FreeLoad
                                    • String ID: ADVAPI32.dll$RegCloseKey$RegCreateKeyExA$RegDeleteKeyA$RegDeleteValueA$RegOpenKeyExA$RegSetValueExA
                                    • API String ID: 2449869053-3188892968
                                    • Opcode ID: a0bd9a62e12f23e275d41ab7552c4dc3de141cd94503504a1d0315d773db0a11
                                    • Instruction ID: 7e0e5bb135e0f492be458d9bdacf26a44bf840c8ddca4d957ca8ae1cdeebb231
                                    • Opcode Fuzzy Hash: a0bd9a62e12f23e275d41ab7552c4dc3de141cd94503504a1d0315d773db0a11
                                    • Instruction Fuzzy Hash: A791C575A00208EFDB14CFA4D988BEEBBB9FB48751F148519F505AB280D776E981CB60
                                    APIs
                                    • LoadLibraryA.KERNEL32(Ole32.dll), ref: 10011995
                                    • GetProcAddress.KERNEL32(?,CoInitialize), ref: 100119A7
                                    • GetProcAddress.KERNEL32(?,CoUninitialize), ref: 100119B9
                                    • GetProcAddress.KERNEL32(?,CoCreateInstance), ref: 100119CB
                                    • LoadLibraryA.KERNEL32(Oleaut32.dll), ref: 100119D9
                                    • GetProcAddress.KERNEL32(?,SysFreeString), ref: 100119EB
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressProc$LibraryLoad
                                    • String ID: CoCreateInstance$CoInitialize$CoUninitialize$FriendlyName$Ole32.dll$Oleaut32.dll$SysFreeString
                                    • API String ID: 2238633743-3340630095
                                    • Opcode ID: 1d44af109edd1136255a39dc8a1dfaf4e7fcfd6cc7004c71e0f7df510543376a
                                    • Instruction ID: 212faf0c9611e66aabaa8f64879106e5bf96d811b783168d703724af177fa0bf
                                    • Opcode Fuzzy Hash: 1d44af109edd1136255a39dc8a1dfaf4e7fcfd6cc7004c71e0f7df510543376a
                                    • Instruction Fuzzy Hash: 69519279E00218EFDB14DFE8D884AEEB7B5FF88701F108558E516AB290D774A985CF60
                                    APIs
                                    • LoadLibraryA.KERNEL32(user32.dll,1A75B7EA,?,?,?,00000000,10023340,101B6E88,000000FE,?,100158FA,00000000), ref: 1001598B
                                    • GetProcAddress.KERNEL32(?,GetThreadDesktop), ref: 100159A3
                                    • GetProcAddress.KERNEL32(?,GetUserObjectInformationA), ref: 100159BB
                                    • GetProcAddress.KERNEL32(?,SetThreadDesktop), ref: 100159D3
                                    • GetProcAddress.KERNEL32(?,CloseDesktop), ref: 100159EB
                                    • LoadLibraryA.KERNEL32(kernel32.dll,?,?,?,00000000,10023340,101B6E88,000000FE,?,100158FA,00000000), ref: 100159FC
                                    • GetProcAddress.KERNEL32(?,GetCurrentThreadId), ref: 10015A14
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressProc$LibraryLoad
                                    • String ID: CloseDesktop$GetCurrentThreadId$GetThreadDesktop$GetUserObjectInformationA$SetThreadDesktop$kernel32.dll$user32.dll
                                    • API String ID: 2238633743-588083535
                                    • Opcode ID: a1b5b4eb188306deb7be5c334ff11527cf8147aa92056ec69f43df2731cc529d
                                    • Instruction ID: 0747fb5764a0f845c2061594b4b15d20bfc1687557696379681bc3d3be76b4b8
                                    • Opcode Fuzzy Hash: a1b5b4eb188306deb7be5c334ff11527cf8147aa92056ec69f43df2731cc529d
                                    • Instruction Fuzzy Hash: 1641ED76901228EFDB21CFA4CC88BEEB7B4FF49311F104599F949AA251DB759A80CF50
                                    Strings
                                    • SocketClient.Connect %s,%d, xrefs: 10013497
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: SocketClient.Connect %s,%d
                                    • API String ID: 0-4086773378
                                    • Opcode ID: 806049d0937e817d2a7edc25e8aa56914ceb32bd5803814fc0c8e8b9f4b12fda
                                    • Instruction ID: 63baf142f1b2acfd1537a39fce8e3a032f44fd155c7a3820f2eaebd6526bdc0f
                                    • Opcode Fuzzy Hash: 806049d0937e817d2a7edc25e8aa56914ceb32bd5803814fc0c8e8b9f4b12fda
                                    • Instruction Fuzzy Hash: 3CC13479804A69CBDB21DF64CC907DEB7B5FF49340F0082D9E409AA291EB749AE4CF50
                                    APIs
                                    • InterlockedCompareExchange.KERNEL32(00000001,00000001,00000000), ref: 1001ABD3
                                    • InterlockedCompareExchange.KERNEL32(00000001,00000001,00000000), ref: 1001ABE7
                                    • InterlockedDecrement.KERNEL32(00000005), ref: 1001AC11
                                    • DeleteCriticalSection.KERNEL32(?), ref: 1001AC61
                                    • DeleteCriticalSection.KERNEL32(?), ref: 1001AC6B
                                    • HeapFree.KERNEL32(00000000,00000000,?), ref: 1001AC75
                                    • InterlockedCompareExchange.KERNEL32(00000001,00000001,00000000), ref: 1001ACEB
                                    • timeGetTime.WINMM ref: 1001AD11
                                    • timeGetTime.WINMM ref: 1001AD1F
                                    • InterlockedDecrement.KERNEL32(00000005), ref: 1001AD52
                                    • DeleteCriticalSection.KERNEL32(?), ref: 1001ADA2
                                    • DeleteCriticalSection.KERNEL32(?), ref: 1001ADAC
                                    • HeapFree.KERNEL32(?,00000000,?), ref: 1001ADB7
                                    • InterlockedCompareExchange.KERNEL32(00000001,00000001,00000000), ref: 1001ADC5
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Interlocked$CompareCriticalDeleteExchangeSection$DecrementFreeHeapTimetime
                                    • String ID:
                                    • API String ID: 575379910-0
                                    • Opcode ID: 4b2b9e06dbfc7a189fe832d31680b9342d4a4f911797ed680ce7ed66d266748b
                                    • Instruction ID: 5fcf9dceec55b2fe5c3f5871ba84e04da2ee91e5bcf3991c6e7a15184a02e640
                                    • Opcode Fuzzy Hash: 4b2b9e06dbfc7a189fe832d31680b9342d4a4f911797ed680ce7ed66d266748b
                                    • Instruction Fuzzy Hash: A9719D7190065AEFDB11CF68CC84B5AB7F8FF05311F004669E81A9F691D774E984CBA1
                                    APIs
                                    • DecodePointer.KERNEL32(?,00000001,10023AED,101B7938,00000008,10023C24,?,00000001,?,101B7958,0000000C,10023BC3,?,00000001,?), ref: 10022851
                                    • _free.LIBCMT ref: 1002286A
                                      • Part of subcall function 1002043C: HeapFree.KERNEL32(00000000,00000000,?,10025D1C,00000000,100258E1,100204FB,?,?,100010EB,0000DF68,?,10001048,00000001), ref: 10020450
                                      • Part of subcall function 1002043C: GetLastError.KERNEL32(00000000,?,10025D1C,00000000,100258E1,100204FB,?,?,100010EB,0000DF68,?,10001048,00000001), ref: 10020462
                                    • _free.LIBCMT ref: 1002287D
                                    • _free.LIBCMT ref: 1002289B
                                    • _free.LIBCMT ref: 100228AD
                                    • _free.LIBCMT ref: 100228BE
                                    • _free.LIBCMT ref: 100228C9
                                    • _free.LIBCMT ref: 100228E3
                                    • EncodePointer.KERNEL32(00000000), ref: 100228EA
                                    • _free.LIBCMT ref: 100228FF
                                    • _free.LIBCMT ref: 10022915
                                    • InterlockedDecrement.KERNEL32 ref: 10022927
                                    • _free.LIBCMT ref: 10022941
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _free$Pointer$DecodeDecrementEncodeErrorFreeHeapInterlockedLast
                                    • String ID:
                                    • API String ID: 4264854383-0
                                    • Opcode ID: 6e45babb980946f711f94ecee9eb40fee16fb67e0b8076907215f6ffe089f320
                                    • Instruction ID: da1824f0f3d6086db6776b7d0893ce00e841dd68cd6532bffb288ba0f97f575f
                                    • Opcode Fuzzy Hash: 6e45babb980946f711f94ecee9eb40fee16fb67e0b8076907215f6ffe089f320
                                    • Instruction Fuzzy Hash: 64218DBA805231ABC715EF74FCC040A37B5FB043647E1466AF900E7A7ADB399881CB41
                                    APIs
                                    • GetModuleHandleA.KERNEL32(kernel32,GetLogicalProcessorInformation,?,00000000), ref: 10005CC3
                                    • GetProcAddress.KERNEL32(00000000), ref: 10005CCA
                                    • GetLastError.KERNEL32 ref: 10005CEC
                                    • _free.LIBCMT ref: 10005CF8
                                      • Part of subcall function 1002043C: HeapFree.KERNEL32(00000000,00000000,?,10025D1C,00000000,100258E1,100204FB,?,?,100010EB,0000DF68,?,10001048,00000001), ref: 10020450
                                      • Part of subcall function 1002043C: GetLastError.KERNEL32(00000000,?,10025D1C,00000000,100258E1,100204FB,?,?,100010EB,0000DF68,?,10001048,00000001), ref: 10020462
                                    • _malloc.LIBCMT ref: 10005D04
                                    • _free.LIBCMT ref: 10005D3E
                                    • GetSystemInfo.KERNEL32(?), ref: 10005D54
                                    • _perror.LIBCMT ref: 10005D79
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ErrorLast_free$AddressFreeHandleHeapInfoModuleProcSystem_malloc_perror
                                    • String ID: GetLogicalProcessorInformation$kernel32$zstd
                                    • API String ID: 346688108-2576447550
                                    • Opcode ID: ebf4960832639757ba6ddf85c4acd03ed6aa7b5749e8a4a28e034f0c5179f344
                                    • Instruction ID: 534da2e331fe06abe5cc17a8b34cc9891e156add97b29abc730671e8849a38bb
                                    • Opcode Fuzzy Hash: ebf4960832639757ba6ddf85c4acd03ed6aa7b5749e8a4a28e034f0c5179f344
                                    • Instruction Fuzzy Hash: 3C212976A003115FF721E7249C89A4F73E8FF84292F940527FC0587215E73AEA4587D2
                                    APIs
                                    • LoadLibraryA.KERNEL32(kernel32.dll), ref: 10015178
                                    • GetProcAddress.KERNEL32(?,CreateToolhelp32Snapshot), ref: 10015190
                                    • GetProcAddress.KERNEL32(?,Process32First), ref: 100151A8
                                    • GetProcAddress.KERNEL32(?,Process32Next), ref: 100151C0
                                    • lstrcmpiA.KERNEL32(1000E8DC,?), ref: 10015243
                                    • CloseHandle.KERNEL32(00000000), ref: 10015262
                                    • FreeLibrary.KERNEL32(00000000), ref: 10015278
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressProc$Library$CloseFreeHandleLoadlstrcmpi
                                    • String ID: CreateToolhelp32Snapshot$Process32First$Process32Next$kernel32.dll
                                    • API String ID: 1314729832-4285911020
                                    • Opcode ID: 1cd6a8fbb2155a4b1985ca30da2e4b0a3f5bfe765f9448f08b89226ab9c6a634
                                    • Instruction ID: b23b302b637ae1edde1f60404815d2dee06a1769a5a7b90f0171de9587be8fa8
                                    • Opcode Fuzzy Hash: 1cd6a8fbb2155a4b1985ca30da2e4b0a3f5bfe765f9448f08b89226ab9c6a634
                                    • Instruction Fuzzy Hash: 4B31AE75911228DBDB61DBA4CD88BEDB7B4FB49301F0005D8E90EAA250DB75AAC4CF50
                                    APIs
                                    • InterlockedCompareExchange.KERNEL32(?,00000001,00000000), ref: 100187D0
                                    • InterlockedCompareExchange.KERNEL32(?,00000001,00000000), ref: 100187DD
                                    • InterlockedDecrement.KERNEL32(00000000), ref: 100187FC
                                    • DeleteCriticalSection.KERNEL32(?), ref: 10018819
                                    • HeapFree.KERNEL32(?,00000000,?), ref: 10018824
                                    • InterlockedCompareExchange.KERNEL32(?,00000001,00000000), ref: 100188AF
                                    • timeGetTime.WINMM ref: 100188D1
                                    • timeGetTime.WINMM ref: 100188DC
                                    • InterlockedDecrement.KERNEL32(00000000), ref: 1001890A
                                    • DeleteCriticalSection.KERNEL32(-00000018), ref: 10018933
                                    • HeapFree.KERNEL32(?,00000000,00000000), ref: 10018940
                                    • InterlockedCompareExchange.KERNEL32(?,00000001,00000000), ref: 1001894E
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Interlocked$CompareExchange$CriticalDecrementDeleteFreeHeapSectionTimetime
                                    • String ID:
                                    • API String ID: 2485412644-0
                                    • Opcode ID: f37f0bf1c14315c2a0328e2bdc40fd7b1b2d9f8162c99514ea29b688ea27d9bd
                                    • Instruction ID: ccbf6a195e50664b114f756a4c275c858458adfb65b41e8f4299d56aa6b79b38
                                    • Opcode Fuzzy Hash: f37f0bf1c14315c2a0328e2bdc40fd7b1b2d9f8162c99514ea29b688ea27d9bd
                                    • Instruction Fuzzy Hash: 3C51AC76A00615EFDB11CF68CC84B9AB7F8FF04710F204569F919AB291D734EA80CB91
                                    APIs
                                      • Part of subcall function 1000F3B0: _memset.LIBCMT ref: 1000F3D5
                                      • Part of subcall function 1000F3B0: wsprintfA.USER32 ref: 1000F3ED
                                    • _memset.LIBCMT ref: 1000E1DD
                                    • _memset.LIBCMT ref: 1000E1FA
                                    • SHGetSpecialFolderPathA.SHELL32(00000000,00000000,0000001A,00000000,?,?,?,?,?,?,1A75B7EA), ref: 1000E20F
                                    • GetTempFileNameA.KERNEL32(00000000,bak,00000000,00000000,\360se6\User Data\,00000000,?,?,?,?,?,?,1A75B7EA), ref: 1000E258
                                    • Sleep.KERNEL32(000003E8,Default,?,?,?,?,?,?,1A75B7EA), ref: 1000E273
                                    • MoveFileExA.KERNEL32(00000000,00000000,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 1000E298
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _memset$File$FolderMoveNamePathSleepSpecialTempwsprintf
                                    • String ID: 360se6.exe$Default$\360se6\User Data\$bak
                                    • API String ID: 2742518391-1576209161
                                    • Opcode ID: cf5631d64cf3daff86f29a9e46f2c2e6785fc6ccd8703a21c0b353372ed7785e
                                    • Instruction ID: 701f933334c7848fb056ee3a11f22efabf5e93a761c2cecb354365ab54c774ad
                                    • Opcode Fuzzy Hash: cf5631d64cf3daff86f29a9e46f2c2e6785fc6ccd8703a21c0b353372ed7785e
                                    • Instruction Fuzzy Hash: B6316C75950258ABEB24DB60CC9ABDDB378EB14700F0001E9F5096A2D1EB787B84CF61
                                    APIs
                                      • Part of subcall function 1000F3B0: _memset.LIBCMT ref: 1000F3D5
                                      • Part of subcall function 1000F3B0: wsprintfA.USER32 ref: 1000F3ED
                                    • _memset.LIBCMT ref: 1000E33D
                                    • _memset.LIBCMT ref: 1000E35A
                                    • SHGetSpecialFolderPathA.SHELL32(00000000,00000000,0000001C,00000000,?,?,?,?,?,?,1A75B7EA), ref: 1000E36F
                                    • GetTempFileNameA.KERNEL32(00000000,bak,00000000,00000000,\Google\Chrome\User Data\,00000000,?,?,?,?,?,?,1A75B7EA), ref: 1000E3B8
                                    • Sleep.KERNEL32(000003E8,Default,?,?,?,?,?,?,1A75B7EA), ref: 1000E3D3
                                    • MoveFileExA.KERNEL32(00000000,00000000,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 1000E3F8
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _memset$File$FolderMoveNamePathSleepSpecialTempwsprintf
                                    • String ID: Default$\Google\Chrome\User Data\$bak$chrome.exe
                                    • API String ID: 2742518391-1166745273
                                    • Opcode ID: 40d655d6cc16712bff4f2fb1f87b01a0d4e762ec64db6e7df24cb74d5259b5f4
                                    • Instruction ID: fecff77be065e459785ac47ee9805b112d0841096ecda917c53accf8bb13844d
                                    • Opcode Fuzzy Hash: 40d655d6cc16712bff4f2fb1f87b01a0d4e762ec64db6e7df24cb74d5259b5f4
                                    • Instruction Fuzzy Hash: 20316A75950258EBEB24DB60CC9ABD9B378EB14700F0002E9F5096A2D1EB787B84CF65
                                    APIs
                                      • Part of subcall function 1000F3B0: _memset.LIBCMT ref: 1000F3D5
                                      • Part of subcall function 1000F3B0: wsprintfA.USER32 ref: 1000F3ED
                                    • _memset.LIBCMT ref: 1000E4ED
                                    • _memset.LIBCMT ref: 1000E50A
                                    • SHGetSpecialFolderPathA.SHELL32(00000000,00000000,0000001C,00000000,?,?,?,?,?,?,1A75B7EA), ref: 1000E51F
                                    • GetTempFileNameA.KERNEL32(00000000,bak,00000000,00000000,\Tencent\QQBrowser\User Data\,00000000,?,?,?,?,?,?,1A75B7EA), ref: 1000E568
                                    • Sleep.KERNEL32(000003E8,Default,?,?,?,?,?,?,1A75B7EA), ref: 1000E583
                                    • MoveFileExA.KERNEL32(00000000,00000000,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 1000E5A8
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _memset$File$FolderMoveNamePathSleepSpecialTempwsprintf
                                    • String ID: Default$QQBrowser.exe$\Tencent\QQBrowser\User Data\$bak
                                    • API String ID: 2742518391-2429508344
                                    • Opcode ID: 0e54152de5e706dd32317b2883b6d9b22f54a27d1984d202d2b92858c0c27df3
                                    • Instruction ID: 303e9ac27bd1ca3b56e85ec31da4520ec1f556187fdca0bed45659d0685da91e
                                    • Opcode Fuzzy Hash: 0e54152de5e706dd32317b2883b6d9b22f54a27d1984d202d2b92858c0c27df3
                                    • Instruction Fuzzy Hash: 00316C75950258EFEB24DB60CC9ABD9B378EB14700F0001D9F5096A2D1EB787B84CF61
                                    APIs
                                      • Part of subcall function 1000F3B0: _memset.LIBCMT ref: 1000F3D5
                                      • Part of subcall function 1000F3B0: wsprintfA.USER32 ref: 1000F3ED
                                    • _memset.LIBCMT ref: 1000E64D
                                    • _memset.LIBCMT ref: 1000E66A
                                    • SHGetSpecialFolderPathA.SHELL32(00000000,00000000,0000001A,00000000,?,?,?,?,?,?,1A75B7EA), ref: 1000E67F
                                    • GetTempFileNameA.KERNEL32(00000000,bak,00000000,00000000,\Microsoft\,00000000,?,?,?,?,?,?,1A75B7EA), ref: 1000E6C8
                                    • Sleep.KERNEL32(000003E8,Skype for Desktop,?,?,?,?,?,?,1A75B7EA), ref: 1000E6E3
                                    • MoveFileExA.KERNEL32(00000000,00000000,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 1000E708
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _memset$File$FolderMoveNamePathSleepSpecialTempwsprintf
                                    • String ID: Skype for Desktop$Skype.exe$\Microsoft\$bak
                                    • API String ID: 2742518391-3712293284
                                    • Opcode ID: 609e6d69384bd8dc0245cb6b53dc543715522320479eba0b398141e820af1bdb
                                    • Instruction ID: 5cbbd60c3ee543de6939a2953fd336e89185860d59f2e57474878281ef46e463
                                    • Opcode Fuzzy Hash: 609e6d69384bd8dc0245cb6b53dc543715522320479eba0b398141e820af1bdb
                                    • Instruction Fuzzy Hash: FB316A75950258ABEB24DB64CC9ABD9B378EB14700F0002E9F5096A2D1EB787B84CF61
                                    APIs
                                    • _memset.LIBCMT ref: 10013918
                                    • RegOpenKeyExA.ADVAPI32(80000001,101AFE40,00000000,00020006,?), ref: 10013944
                                    • _sprintf.LIBCMT ref: 1001397C
                                    • _strlen.LIBCMT ref: 1001398B
                                    • GetModuleFileNameA.KERNEL32(00000000,00000000,00000104), ref: 100139A9
                                    • RegSetValueExA.ADVAPI32(?,00000000,00000000,00000001,00000000,?), ref: 100139D7
                                    • RegCloseKey.ADVAPI32(?), ref: 100139EA
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseFileModuleNameOpenValue_memset_sprintf_strlen
                                    • String ID: %s%s$C:\Users\Public\Documents\$Windows Update
                                    • API String ID: 2914755242-3221868064
                                    • Opcode ID: a37f16671de4bf3d8217d41773bbf0f470df6e6be3ad6b2328483c6e46eca91b
                                    • Instruction ID: 74569bc2ad6f0a8eef20b1f4c122fea453a43a38896f5d2099743f1305caba47
                                    • Opcode Fuzzy Hash: a37f16671de4bf3d8217d41773bbf0f470df6e6be3ad6b2328483c6e46eca91b
                                    • Instruction Fuzzy Hash: 08210C75900218AFEB64DBA0CC86BD97778EB18701F404599E649AA181DBB46AC4CF91
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: char_traits$_memmove
                                    • String ID:
                                    • API String ID: 4015421094-0
                                    • Opcode ID: 8a46f27c53daf1bb3a5c5b26083eeb91bd03bd6e6ef27442f332e57adb46b26b
                                    • Instruction ID: 392e569acab4bc7803cc6a5d1307a5f36e8b576372a140fd2397c7b8e5873d66
                                    • Opcode Fuzzy Hash: 8a46f27c53daf1bb3a5c5b26083eeb91bd03bd6e6ef27442f332e57adb46b26b
                                    • Instruction Fuzzy Hash: 53A1B47AA00008EFDB04DF98DD92D9E77B6FF58298B248154F9099725ADB30FE50CB90
                                    APIs
                                    • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 1001039F
                                    • CreateFileA.KERNEL32(?,40000000,00000002,00000000,00000004,00000080,00000000), ref: 10010406
                                    • GetFileSize.KERNEL32(?,00000000), ref: 10010425
                                    • SetFilePointer.KERNEL32(?,00000000,00000000,00000002), ref: 1001044A
                                    • lstrlenA.KERNEL32(1000EEB8), ref: 10010454
                                    • lstrlenA.KERNEL32(1000EEB8,00000000,00000000), ref: 100104D6
                                    • WriteFile.KERNEL32(?,?,00000000), ref: 100104EB
                                    • CloseHandle.KERNEL32(?), ref: 100104F8
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$lstrlen$CloseCreateDirectoryHandlePointerSizeSystemWrite
                                    • String ID: .key
                                    • API String ID: 1674266968-343438762
                                    • Opcode ID: ffe63ab53faeb08c4fabfe3c25abd14c77d86f4555a55f109598a67c17bf6787
                                    • Instruction ID: 1c9aefebe2efcbaba9d66af4461c31df970b4e064e3fc872ccff81242f4e36e7
                                    • Opcode Fuzzy Hash: ffe63ab53faeb08c4fabfe3c25abd14c77d86f4555a55f109598a67c17bf6787
                                    • Instruction Fuzzy Hash: 7A410CB590022CDFDB29CB64DC86BD9B7B5BF48700F0085D9F649AA241D774AAC4CF90
                                    APIs
                                    • _strlen.LIBCMT ref: 1000FE67
                                    • ShellExecuteA.SHELL32(00000000,open,?,00000000,00000000,00000001), ref: 1000FE93
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ExecuteShell_strlen
                                    • String ID: D$open
                                    • API String ID: 4170776411-2491301029
                                    • Opcode ID: 45e0c28ea66c154113347479300cd7af64224d28f2b9312c10382868c233d3c8
                                    • Instruction ID: 2f325713f910cbc9df21e4a28366f17d85fbec6a5c87df3961e0dadf8c324f84
                                    • Opcode Fuzzy Hash: 45e0c28ea66c154113347479300cd7af64224d28f2b9312c10382868c233d3c8
                                    • Instruction Fuzzy Hash: E3418475900318EBEB20DF50CC46BEA77B8EF45740F00409CF608AB581DBB5AA85DF51
                                    APIs
                                      • Part of subcall function 1000F3B0: _memset.LIBCMT ref: 1000F3D5
                                      • Part of subcall function 1000F3B0: wsprintfA.USER32 ref: 1000F3ED
                                    • _memset.LIBCMT ref: 1000E7AD
                                    • _memset.LIBCMT ref: 1000E7CA
                                    • SHGetSpecialFolderPathA.SHELL32(00000000,00000000,0000001A,00000000,?,?,?,?,?,?,1A75B7EA), ref: 1000E7DF
                                    • GetTempFileNameA.KERNEL32(00000000,bak,00000000,00000000,101AF284,00000000,?,?,?,?,?,?,1A75B7EA), ref: 1000E828
                                    • Sleep.KERNEL32(000003E8,SogouExplorer,?,?,?,?,?,?,1A75B7EA), ref: 1000E843
                                    • MoveFileExA.KERNEL32(00000000,00000000,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 1000E868
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _memset$File$FolderMoveNamePathSleepSpecialTempwsprintf
                                    • String ID: SogouExplorer$SogouExplorer.exe$bak
                                    • API String ID: 2742518391-538188596
                                    • Opcode ID: 387075a032f40cdf426803d7b8eb962ed2b699bce44bc087e450045890685a63
                                    • Instruction ID: cdfe1adb3a5306c7d49e930ca4d3ffe4328d7c09e084d7f548619efed37bff03
                                    • Opcode Fuzzy Hash: 387075a032f40cdf426803d7b8eb962ed2b699bce44bc087e450045890685a63
                                    • Instruction Fuzzy Hash: 14316C75950258ABEB24DBA0CC9ABD9B374EF14700F0001D9F5096A2D1EB787B84CB55
                                    APIs
                                    • SetServiceStatus.ADVAPI32(?,101BD9EC), ref: 10012CB5
                                    • Sleep.KERNEL32(000001F4), ref: 10012CCA
                                    • SetServiceStatus.ADVAPI32(?,101BD9EC), ref: 10012CE6
                                    • CreateMutexA.KERNEL32(00000000,00000000,TMzsft xtnogaqk), ref: 10012D08
                                    • GetLastError.KERNEL32 ref: 10012D14
                                      • Part of subcall function 10022BD3: _doexit.LIBCMT ref: 10022BDD
                                    • WSAStartup.WS2_32(00000202,?), ref: 10012D34
                                    • GetVersionExA.KERNEL32(00000094), ref: 10012D4B
                                    • Sleep.KERNEL32(000F4240,00000000), ref: 10012D73
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ServiceSleepStatus$CreateErrorLastMutexStartupVersion_doexit
                                    • String ID: TMzsft xtnogaqk
                                    • API String ID: 4049670039-2123815393
                                    • Opcode ID: a53748f86f27197abeafadced6f73c21d7a14410f93471b365f7083a90965c1a
                                    • Instruction ID: 51f78178352a1e6bbcd1a39a8c3a93efe3193938c267407751cb2d4182533f7a
                                    • Opcode Fuzzy Hash: a53748f86f27197abeafadced6f73c21d7a14410f93471b365f7083a90965c1a
                                    • Instruction Fuzzy Hash: E5216DB4504220DFE329AF60CC8EB5937B4F70430AF804298E1096A9A6D7BC6588CF12
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _memset$FindWindow
                                    • String ID:
                                    • API String ID: 3918834205-0
                                    • Opcode ID: 39f1a4b514bf7a49ce17fcebaa32398609855f0b54f364aa2f0891fbe461ef20
                                    • Instruction ID: d02908bb6393ccc6194f76cc94439ad83e97ec676181d408bc8d9695fa0a8030
                                    • Opcode Fuzzy Hash: 39f1a4b514bf7a49ce17fcebaa32398609855f0b54f364aa2f0891fbe461ef20
                                    • Instruction Fuzzy Hash: E44161B5901218EBEB64CBA4DC85F9D77B4FB48304F008699EA0D9F282D774AAD4CF54
                                    APIs
                                      • Part of subcall function 10007130: WinHttpOpen.WINHTTP(curl/7.83.1,00000000,00000000,00000000,00000000), ref: 10007197
                                      • Part of subcall function 10007130: WinHttpSetTimeouts.WINHTTP(00000000,000003E8,000003E8,000003E8,000003E8), ref: 100071BE
                                      • Part of subcall function 10007130: WinHttpConnect.WINHTTP(00000000,?,00000050,00000000), ref: 100071D6
                                      • Part of subcall function 10007130: WinHttpOpenRequest.WINHTTP(00000000,GET,?,00000000,00000000,00000000,00000000), ref: 100071FA
                                      • Part of subcall function 10007130: WinHttpSendRequest.WINHTTP(00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 10007219
                                      • Part of subcall function 10007130: WinHttpReceiveResponse.WINHTTP(00000000,00000000), ref: 1000722E
                                      • Part of subcall function 10007130: WinHttpQueryHeaders.WINHTTP(00000000,20000013,00000000,00000000,00000004,00000000), ref: 10007264
                                      • Part of subcall function 10007130: __CxxThrowException@8.LIBCMT ref: 10007272
                                      • Part of subcall function 10006250: operator!=.LIBCPMTD ref: 1000628B
                                      • Part of subcall function 10006250: operator!=.LIBCPMTD ref: 100062CD
                                    • _Func_class.LIBCPMTD ref: 10006F71
                                    • _Func_class.LIBCPMTD ref: 10006FDF
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Http$Func_classOpenRequestoperator!=$ConnectException@8HeadersQueryReceiveResponseSendThrowTimeouts
                                    • String ID: 4.ipw.cn$ifconfig.cc$ifconfig.me$ip.ping0.cc
                                    • API String ID: 2327121134-1054840108
                                    • Opcode ID: e5f02f596ccace418473e767889c4ca837b0525676b23f026339b6d6215960db
                                    • Instruction ID: 8fedc6d71d1ea5c4082eb8e8fcd3074e9b412fba7bcbbe1695d31a67eb8f4e53
                                    • Opcode Fuzzy Hash: e5f02f596ccace418473e767889c4ca837b0525676b23f026339b6d6215960db
                                    • Instruction Fuzzy Hash: 2E513D75D00508DBDB18DFA8CC52ADDB7B6FF4C3A0F548129E41A6B295EB306A49CF60
                                    APIs
                                    • LoadLibraryA.KERNEL32(kernel32.dll), ref: 10013EBF
                                    • GetProcAddress.KERNEL32(?,IsBadReadPtr), ref: 10013ED1
                                    • LoadLibraryA.KERNEL32(?), ref: 10013F25
                                    • FreeLibrary.KERNEL32(00000000), ref: 10014063
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Library$Load$AddressFreeProc
                                    • String ID: IsBadReadPtr$kernel32.dll
                                    • API String ID: 2632591731-2271619998
                                    • Opcode ID: b8cf5a7d21cec9c91bc597fb19d05e0d91973cb50290725d0d54b057ef2bedf3
                                    • Instruction ID: 4d98165a6a2f5fd888ffb7798c0831731eea4b449ce7d88afba1872c43b950e1
                                    • Opcode Fuzzy Hash: b8cf5a7d21cec9c91bc597fb19d05e0d91973cb50290725d0d54b057ef2bedf3
                                    • Instruction Fuzzy Hash: 2F61B178A00209EFDB04CF95C484BAEBBB1FF48314F258599E915AB361C735AA85DF90
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _malloc_memmove_strlen
                                    • String ID: D
                                    • API String ID: 3238260300-2746444292
                                    • Opcode ID: 6855c12a7bdc6e0bd8773f4745c8c759726946dada61b8ef62cf01ab51cda593
                                    • Instruction ID: 6d557a2bb59ac2ae05f88cec7faa246fa2e5727cbdb9c8dfb4b7bdd6368fabdf
                                    • Opcode Fuzzy Hash: 6855c12a7bdc6e0bd8773f4745c8c759726946dada61b8ef62cf01ab51cda593
                                    • Instruction Fuzzy Hash: 163173B5D00218EBDB64CF60DC45BEB7378EB58345F404598E60DAA241EBB6AAC4CF91
                                    APIs
                                    • LoadLibraryA.KERNEL32(user32.dll,1A75B7EA), ref: 10015828
                                    • GetProcAddress.KERNEL32(?,OpenInputDesktop), ref: 1001587D
                                    • GetProcAddress.KERNEL32(?,OpenDesktopA), ref: 1001588F
                                    • GetProcAddress.KERNEL32(?,CloseDesktop), ref: 100158A1
                                      • Part of subcall function 10015950: LoadLibraryA.KERNEL32(user32.dll,1A75B7EA,?,?,?,00000000,10023340,101B6E88,000000FE,?,100158FA,00000000), ref: 1001598B
                                      • Part of subcall function 10015950: GetProcAddress.KERNEL32(?,GetThreadDesktop), ref: 100159A3
                                      • Part of subcall function 10015950: GetProcAddress.KERNEL32(?,GetUserObjectInformationA), ref: 100159BB
                                      • Part of subcall function 10015950: GetProcAddress.KERNEL32(?,SetThreadDesktop), ref: 100159D3
                                      • Part of subcall function 10015950: GetProcAddress.KERNEL32(?,CloseDesktop), ref: 100159EB
                                      • Part of subcall function 10015950: LoadLibraryA.KERNEL32(kernel32.dll,?,?,?,00000000,10023340,101B6E88,000000FE,?,100158FA,00000000), ref: 100159FC
                                      • Part of subcall function 10015950: GetProcAddress.KERNEL32(?,GetCurrentThreadId), ref: 10015A14
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressProc$LibraryLoad
                                    • String ID: CloseDesktop$OpenDesktopA$OpenInputDesktop$user32.dll
                                    • API String ID: 2238633743-3711086354
                                    • Opcode ID: 1873b1d038e82ffe73c977c033c60f3efe240073f85bcd7195dda5366d5656d8
                                    • Instruction ID: 34810388ce7dedadcc66fe602c4080af1544b897567115cb541a18f1db2ea245
                                    • Opcode Fuzzy Hash: 1873b1d038e82ffe73c977c033c60f3efe240073f85bcd7195dda5366d5656d8
                                    • Instruction Fuzzy Hash: 16416975D08388EEEB11CBE4D888BDEBFB5EF09315F140119E405BA281CBBA5944CB65
                                    APIs
                                      • Part of subcall function 1001B6A0: HeapAlloc.KERNEL32(?,00000000,?,?,?,?,?,?,1001D1A7,?,1001C0BB,?,?,?,?,1001EAD1), ref: 1001B6CA
                                    • EnterCriticalSection.KERNEL32(00000054,?,00000000,1A75B7EA,?,00000000), ref: 1001C3F8
                                      • Part of subcall function 1001BD70: timeGetTime.WINMM ref: 1001BD78
                                      • Part of subcall function 1001BD70: _memmove.LIBCMT ref: 1001BDDC
                                    • GetLastError.KERNEL32 ref: 1001C470
                                    • CreateIoCompletionPort.KERNEL32(?,?,00000000,00000000), ref: 1001C44A
                                      • Part of subcall function 100172C0: __CxxThrowException@8.LIBCMT ref: 100172D2
                                      • Part of subcall function 100172C0: EnterCriticalSection.KERNEL32(00000000,1A75B7EA,00000000,00000098,?,?,00000000,10035B28,000000FF,?,?,101B722C,?,1001640E,80004005), ref: 10017312
                                      • Part of subcall function 100172C0: LeaveCriticalSection.KERNEL32(00000000,?,?,00000000,10035B28,000000FF,?,?,101B722C,?,1001640E,80004005,?,100168C9,00000400,00000400), ref: 1001737B
                                    • connect.WS2_32(?,?,0000001C), ref: 1001C497
                                    • CreateIoCompletionPort.KERNEL32(?,?,00000000,00000000), ref: 1001C4CC
                                    • HeapFree.KERNEL32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 1001C552
                                    • LeaveCriticalSection.KERNEL32(00000054), ref: 1001C559
                                      • Part of subcall function 1001A870: ioctlsocket.WS2_32(?,8004667E,?), ref: 1001A87F
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalSection$CompletionCreateEnterHeapLeavePort$AllocErrorException@8FreeLastThrowTime_memmoveconnectioctlsockettime
                                    • String ID:
                                    • API String ID: 577898059-0
                                    • Opcode ID: fb6ef4b531d651df34b6af81ca114c1cb161ed1b6c4b7f8e2a56bc7a7bb065d0
                                    • Instruction ID: 13f5607a006f5134b6e7d624e793b95b5dada5aad690ad180316847aeaa3252a
                                    • Opcode Fuzzy Hash: fb6ef4b531d651df34b6af81ca114c1cb161ed1b6c4b7f8e2a56bc7a7bb065d0
                                    • Instruction Fuzzy Hash: CA518F75600208AFDB11DF64CC85FAA77AAFF44350F144428FD09EE2A1DB71E890DB60
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _memmove_s
                                    • String ID:
                                    • API String ID: 800865076-0
                                    • Opcode ID: bfd165e00e761db38f2bdf525350d73678aeff4c921f7e730ca0ddaf86c9b7a3
                                    • Instruction ID: e53b5beb10ba7e09faa63e27da374d48c55a1d98f715c35b0f5f6325fba29714
                                    • Opcode Fuzzy Hash: bfd165e00e761db38f2bdf525350d73678aeff4c921f7e730ca0ddaf86c9b7a3
                                    • Instruction Fuzzy Hash: 59418D36200655AFD711DF68C888B9EF7E9FF44364F10402AF9098B291DB75EDA08BA0
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _memset$Window$ForegroundLocalTextTimelstrlenwsprintf
                                    • String ID:
                                    • API String ID: 2818073195-0
                                    • Opcode ID: 75adef7124855e83a17f00d692abf37ea0045c21f2baa1bf399519b3b5abe7e2
                                    • Instruction ID: 03485689b72bf285f166b7c4cb3250636e2bcbf9ff048aaab2fc2e49669969a2
                                    • Opcode Fuzzy Hash: 75adef7124855e83a17f00d692abf37ea0045c21f2baa1bf399519b3b5abe7e2
                                    • Instruction Fuzzy Hash: 753168F5A0012D9BD734DB54CD85BE973B8EB44704F0041A8F7097A191EB787AC5CB69
                                    APIs
                                    • __ioinit.LIBCMT ref: 100298CC
                                      • Part of subcall function 10029B38: InitOnceExecuteOnce.KERNEL32(101BE634,10029B73,00000000,00000000,1003508B,101B7FB0,0000000C,10005D7E,zstd), ref: 10029B46
                                    • __get_osfhandle.LIBCMT ref: 100298E0
                                    • __get_osfhandle.LIBCMT ref: 1002990B
                                    • __get_osfhandle.LIBCMT ref: 10029914
                                    • __get_osfhandle.LIBCMT ref: 10029920
                                    • CloseHandle.KERNEL32(00000000,?,?,?,10029874,?,101B7C48,00000010,1002399B,00000000,?,?,?), ref: 10029927
                                    • GetLastError.KERNEL32(?,10029874,?,101B7C48,00000010,1002399B,00000000,?,?,?), ref: 10029931
                                    • __free_osfhnd.LIBCMT ref: 1002993E
                                    • __dosmaperr.LIBCMT ref: 10029960
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: __get_osfhandle$Once$CloseErrorExecuteHandleInitLast__dosmaperr__free_osfhnd__ioinit
                                    • String ID:
                                    • API String ID: 974577687-0
                                    • Opcode ID: aeb50e6623f9612fbfea4720a11a12ee66fd82b979432c8a2b3a73e6567c2db6
                                    • Instruction ID: 534cc79353f924f132b53f2d2c247f43b701ca5fdf2037831c5180732be56f73
                                    • Opcode Fuzzy Hash: aeb50e6623f9612fbfea4720a11a12ee66fd82b979432c8a2b3a73e6567c2db6
                                    • Instruction Fuzzy Hash: 491148326042A41AD261D63C798976E36CCDF42BF4FE6079DFD2EDB0D2EA24ACC18150
                                    APIs
                                    • SetServiceStatus.ADVAPI32(?,101BD9EC), ref: 10012EC6
                                    • Sleep.KERNEL32(000001F4), ref: 10012ED1
                                    • SetServiceStatus.ADVAPI32(?,101BD9EC), ref: 10012F10
                                    • Sleep.KERNEL32(000001F4), ref: 10012F1B
                                    • SetServiceStatus.ADVAPI32(?,101BD9EC), ref: 10012F5A
                                    • Sleep.KERNEL32(000001F4), ref: 10012F65
                                    • SetServiceStatus.ADVAPI32(?,101BD9EC), ref: 10012FA0
                                    • Sleep.KERNEL32(000001F4), ref: 10012FAB
                                    • SetServiceStatus.ADVAPI32(?,101BD9EC), ref: 10012FD1
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ServiceStatus$Sleep
                                    • String ID:
                                    • API String ID: 4108286180-0
                                    • Opcode ID: 3093577f81a1bfef1be0275f51949fcebcef33dae7894a088e6bc179c9b4736d
                                    • Instruction ID: 2eb2aa5b39fb85c5a3343167d6ecbcddaa6ef8ab947596cac2bc6c57621dfea1
                                    • Opcode Fuzzy Hash: 3093577f81a1bfef1be0275f51949fcebcef33dae7894a088e6bc179c9b4736d
                                    • Instruction Fuzzy Hash: 1C31F7B4104221DFE31DFF60CC98B957BB8F708308F804368E5095BAA5E7BD6598DB56
                                    APIs
                                    • _memset.LIBCMT ref: 100115CC
                                    • GetSystemDirectoryA.KERNEL32(00000000,00000104), ref: 100115E0
                                    • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000), ref: 10011647
                                    • GetFileSize.KERNEL32(000000FF,00000000), ref: 10011669
                                      • Part of subcall function 1001EF9C: _malloc.LIBCMT ref: 1001EFB4
                                    • ReadFile.KERNEL32(000000FF,?,00000000,00000000,00000000), ref: 100116B4
                                    • CloseHandle.KERNEL32(000000FF), ref: 10011771
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$CloseCreateDirectoryHandleReadSizeSystem_malloc_memset
                                    • String ID: .key
                                    • API String ID: 1189190961-343438762
                                    • Opcode ID: e3cca6749972bda63ac77e56a70e5a53b244fe33762708ed0120600f45f4504f
                                    • Instruction ID: 3d4300d2710fecc02f3fab15f3df85ad30c21ba86dc6f63d814e5d622af92f7c
                                    • Opcode Fuzzy Hash: e3cca6749972bda63ac77e56a70e5a53b244fe33762708ed0120600f45f4504f
                                    • Instruction Fuzzy Hash: 2551EAB5D0022C9BDB69CB64DC82BD9B7B4AB58300F0045D8E64DAB281DB74AFC4CF91
                                    APIs
                                    • _memset.LIBCMT ref: 10011E5F
                                    • _memset.LIBCMT ref: 10011E71
                                      • Part of subcall function 100153E0: _memset.LIBCMT ref: 10015432
                                      • Part of subcall function 100153E0: _memset.LIBCMT ref: 10015448
                                      • Part of subcall function 100153E0: _memset.LIBCMT ref: 1001545E
                                      • Part of subcall function 100153E0: LoadLibraryA.KERNEL32(ADVAPI32.dll), ref: 1001546B
                                    • lstrlenA.KERNEL32(?), ref: 10011EA4
                                    • gethostname.WS2_32(?,10012B7F), ref: 10011EB6
                                    • lstrlenA.KERNEL32(?), ref: 10011EC0
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _memset$lstrlen$LibraryLoadgethostname
                                    • String ID: HostName$SYSTEM\Setup
                                    • API String ID: 3877737349-3163474852
                                    • Opcode ID: 3c57c7ea14b851b5edd5a4aedf8599d14a790c5ab8a68f19adf55a60d148b559
                                    • Instruction ID: 6f4c2ddfbcec68ea414a63b34556a325c0cca03fb215b7fd9fe6e58d22cc8f59
                                    • Opcode Fuzzy Hash: 3c57c7ea14b851b5edd5a4aedf8599d14a790c5ab8a68f19adf55a60d148b559
                                    • Instruction Fuzzy Hash: B41133B9A40218EBD714DF94DC81FAA77B8EB88600F00815CFA0D5B281D635EB41CB94
                                    APIs
                                    • WaitForMultipleObjects.KERNEL32(00000040,?,00000001,000000FF), ref: 1001EA1C
                                    • CloseHandle.KERNEL32(?,?,00000001,000000FF), ref: 1001EA33
                                      • Part of subcall function 1001A570: PostQueuedCompletionStatus.KERNEL32(?,00000000,00000000,00000000,?,1001E9C8,?), ref: 1001A57C
                                    • GetCurrentThreadId.KERNEL32 ref: 1001EA8E
                                    • GetQueuedCompletionStatus.KERNEL32(?,?,?,?,000000FF), ref: 1001EAB3
                                    • GetLastError.KERNEL32(?,?,?), ref: 1001EAEF
                                    • WSAGetOverlappedResult.WS2_32(00000000,?,?,00000000,?), ref: 1001EB11
                                    • WSAGetLastError.WS2_32 ref: 1001EB1B
                                    • GetCurrentThreadId.KERNEL32 ref: 1001EB41
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CompletionCurrentErrorLastQueuedStatusThread$CloseHandleMultipleObjectsOverlappedPostResultWait
                                    • String ID:
                                    • API String ID: 1776276126-0
                                    • Opcode ID: b262b485ae6c8d05e2cc6277a80d9fb5ca37b47e31c1310d56df349767435e47
                                    • Instruction ID: 66b5417a272267f179c33290e45a533a74909bc530ce5bb48fcf6268d69e9a86
                                    • Opcode Fuzzy Hash: b262b485ae6c8d05e2cc6277a80d9fb5ca37b47e31c1310d56df349767435e47
                                    • Instruction Fuzzy Hash: A8519275900219AFDB11DFA8C8C5AAEBBB9FF48350F504569FA169B211DB30FE40CB91
                                    APIs
                                    • _memcpy_s.LIBCMT ref: 10019EDE
                                    • getaddrinfo.WS2_32(?,00000000,00000C00,00000000), ref: 10019F03
                                    • _free.LIBCMT ref: 10019F1C
                                    • WSASetLastError.WS2_32(00000000,?,?,?,?,?,?,?,?), ref: 10019F29
                                    • _memmove.LIBCMT ref: 10019F6D
                                    • freeaddrinfo.WS2_32(00000000,?,?,?,?,?,?,?,?), ref: 10019F7B
                                    • htons.WS2_32(?), ref: 10019F88
                                    • WSASetLastError.WS2_32(00002AF9,?,?,?,?,?,?,?,?), ref: 10019FAA
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ErrorLast$_free_memcpy_s_memmovefreeaddrinfogetaddrinfohtons
                                    • String ID:
                                    • API String ID: 1080299913-0
                                    • Opcode ID: 38c9a16045676048a6fe288dd4f45fcc865443c53d635113eaf2434cff52915d
                                    • Instruction ID: 09d37e572ec1318aebb19466cc5ed3869c43ff4f8d51cd655d2081561f1130ca
                                    • Opcode Fuzzy Hash: 38c9a16045676048a6fe288dd4f45fcc865443c53d635113eaf2434cff52915d
                                    • Instruction Fuzzy Hash: FF416171A00229ABDB20CF64CC85BAAB7B4FF55240F4181A9F94DDB111EB719EC9CB90
                                    APIs
                                    • GetCurrentProcessId.KERNEL32 ref: 1000F2C3
                                    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 1000F2DD
                                    • Process32First.KERNEL32(000000FF,00000128), ref: 1000F30E
                                    • OpenProcess.KERNEL32(00000001,00000000,00000000,000000FF,00000128,00000002,00000000), ref: 1000F347
                                    • TerminateProcess.KERNEL32(00000000,00000000), ref: 1000F367
                                    • CloseHandle.KERNEL32(00000000), ref: 1000F374
                                    • Process32Next.KERNEL32(000000FF,00000128), ref: 1000F388
                                    • CloseHandle.KERNEL32(000000FF,000000FF,00000128,00000002,00000000), ref: 1000F39C
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Process$CloseHandleProcess32$CreateCurrentFirstNextOpenSnapshotTerminateToolhelp32
                                    • String ID:
                                    • API String ID: 477742948-0
                                    • Opcode ID: 0e5e03193292138b7c311efabc93a15d5f194d092c39daaf66340cd660e8982b
                                    • Instruction ID: d41c4376eefb6253570006433f593cac2f32630ea850329660a4d75d5b4afe3c
                                    • Opcode Fuzzy Hash: 0e5e03193292138b7c311efabc93a15d5f194d092c39daaf66340cd660e8982b
                                    • Instruction Fuzzy Hash: 4921C370900228DFDB25EB60CD89BEDB7B4FB48750F1045D9E609AB290D774AB80DF50
                                    APIs
                                    • _free.LIBCMT ref: 10002756
                                      • Part of subcall function 1002043C: HeapFree.KERNEL32(00000000,00000000,?,10025D1C,00000000,100258E1,100204FB,?,?,100010EB,0000DF68,?,10001048,00000001), ref: 10020450
                                      • Part of subcall function 1002043C: GetLastError.KERNEL32(00000000,?,10025D1C,00000000,100258E1,100204FB,?,?,100010EB,0000DF68,?,10001048,00000001), ref: 10020462
                                    • DeleteCriticalSection.KERNEL32(?), ref: 10002778
                                    • _free.LIBCMT ref: 1000277F
                                    • DeleteCriticalSection.KERNEL32(?,00000000), ref: 100027B2
                                    • _free.LIBCMT ref: 100027B9
                                    • _free.LIBCMT ref: 100027C2
                                    • _free.LIBCMT ref: 100027D1
                                    • _free.LIBCMT ref: 100027D7
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _free$CriticalDeleteSection$ErrorFreeHeapLast
                                    • String ID:
                                    • API String ID: 229044151-0
                                    • Opcode ID: 829fe4cc710feb83a16dcdc532ce873229ccf800336d69de1fb585340b12b445
                                    • Instruction ID: 16a73a784ab602da626493d70980f9eae99143d6bc0915a138f34a67110a4392
                                    • Opcode Fuzzy Hash: 829fe4cc710feb83a16dcdc532ce873229ccf800336d69de1fb585340b12b445
                                    • Instruction Fuzzy Hash: 560108B66007105BE612EF209C82A6B73AAEF80580F54442CF94A47207DB35F985C7E2
                                    APIs
                                    • DeleteCriticalSection.KERNEL32(?,?,?,00000000,1A75B7EA), ref: 10018E77
                                    • HeapFree.KERNEL32(?,00000000,?), ref: 10018E84
                                    • _free.LIBCMT ref: 10018F18
                                    • HeapDestroy.KERNEL32(?), ref: 10018F8E
                                    • HeapCreate.KERNEL32(?,?,?), ref: 10018F9F
                                    • HeapDestroy.KERNEL32(00000000), ref: 10018FAC
                                    • HeapCreate.KERNEL32(?,?,?), ref: 10018FB7
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Heap$CreateDestroy$CriticalDeleteFreeSection_free
                                    • String ID:
                                    • API String ID: 1764084169-0
                                    • Opcode ID: c3f88b120b0d50cfdc866e451160b25d59f4e1943c12536e881b99dc529dd748
                                    • Instruction ID: 8cea0ffc507937525084062c29ae185d00e44530d60b22a0429b01e019052092
                                    • Opcode Fuzzy Hash: c3f88b120b0d50cfdc866e451160b25d59f4e1943c12536e881b99dc529dd748
                                    • Instruction Fuzzy Hash: 2B5148B1A00606EFDB05CFA4C881B9ABBF5FF08304F044569E909AF651DB35EA55CBA0
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: bfd34e201d1059666f78fc474e3004731cd6cb8f970c98b5a1a8be2d127c39e0
                                    • Instruction ID: df39f66d2745d17a7fe87e744aa0e03a21574858425a6f03c3f21479afaab56c
                                    • Opcode Fuzzy Hash: bfd34e201d1059666f78fc474e3004731cd6cb8f970c98b5a1a8be2d127c39e0
                                    • Instruction Fuzzy Hash: 536109B9E00209EFDB44CF94C884B9EB7B5FF48304F218598E905AB395D775EA81DB90
                                    APIs
                                    • EnterCriticalSection.KERNEL32(?,?,?,?,?,?,100025EE,?,?,?,10002B57,?), ref: 1000208B
                                    • WakeAllConditionVariable.KERNEL32(?,?,?,?,100025EE,?,?,?,10002B57,?), ref: 100020AD
                                    • LeaveCriticalSection.KERNEL32(?,?,?,?,100025EE,?,?,?,10002B57,?), ref: 100020B4
                                    • EnterCriticalSection.KERNEL32(?,?,?,?,?,?,100025EE,?,?,?,10002B57,?), ref: 100020EC
                                    • SleepConditionVariableCS.KERNEL32(?,?,000000FF,?,?,?,100025EE,?,?,?,10002B57,?), ref: 1000210D
                                    • LeaveCriticalSection.KERNEL32(?,?,?,?,100025EE,?,?,?,10002B57,?), ref: 10002116
                                    • _free.LIBCMT ref: 1000213E
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalSection$ConditionEnterLeaveVariable$SleepWake_free
                                    • String ID:
                                    • API String ID: 1710734047-0
                                    • Opcode ID: e61bd854db23e898daa16de29f131cc90b3ab22f0d1ab1bd32c91fa0d06ec401
                                    • Instruction ID: 05dc04eb116ff6e28942813317816f3c30ed5ba661128168b5cad8891ce245dc
                                    • Opcode Fuzzy Hash: e61bd854db23e898daa16de29f131cc90b3ab22f0d1ab1bd32c91fa0d06ec401
                                    • Instruction Fuzzy Hash: 8D4190B1601B069FE724CF64C884796B7F4FF14390F51462AE91ACB695D730F894CBA1
                                    APIs
                                    • GetModuleHandleA.KERNEL32(kernel32.dll,?,?), ref: 1001A70C
                                    • GetProcAddress.KERNEL32(00000000,CreateFileTransactedA), ref: 1001A721
                                    • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,?,?), ref: 1001A76A
                                    • GetFileSize.KERNEL32(?,?), ref: 1001A78C
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$AddressCreateHandleModuleProcSize
                                    • String ID: CreateFileTransactedA$kernel32.dll
                                    • API String ID: 381258031-3827029016
                                    • Opcode ID: 2b602c5be5b8ceff7d4341a465a72c2674a25abf06f1222532ee79990a52c5db
                                    • Instruction ID: 3fd96c11bbd7488a8a418e2e25c194671cc8f240b4c6ee697fb62349ff201565
                                    • Opcode Fuzzy Hash: 2b602c5be5b8ceff7d4341a465a72c2674a25abf06f1222532ee79990a52c5db
                                    • Instruction Fuzzy Hash: 0431AD34744205BBEB31CA649C45B9977F8EF02B61F20425AFE18EE1D0D7B1EAD0D654
                                    APIs
                                    • setsockopt.WS2_32(00000001,0000FFFF,000000FB,00000001,00000004), ref: 1001A8E5
                                    • setsockopt.WS2_32(00000001,0000FFFF,00000004,00000000,00000004), ref: 1001A8F7
                                    • setsockopt.WS2_32(00000001,0000FFFF,000000FB,00000000,00000004), ref: 1001A91E
                                    • setsockopt.WS2_32(00000001,0000FFFF,00000004,00000000,00000004), ref: 1001A930
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: setsockopt
                                    • String ID:
                                    • API String ID: 3981526788-0
                                    • Opcode ID: 7b82cd8a322e7eafe5a33a62bfc76d56978321d665ea09961d1f1c17fe74bef7
                                    • Instruction ID: 2534b507c7e92884fcc3b13e06d001a7cc937f1284d80b897d24f64fcb9b5863
                                    • Opcode Fuzzy Hash: 7b82cd8a322e7eafe5a33a62bfc76d56978321d665ea09961d1f1c17fe74bef7
                                    • Instruction Fuzzy Hash: 2521FBB674421E7AEB10C6959C81FA9775CDF45771F200272FF18DB2C1D971994887A0
                                    APIs
                                    • SetLastError.KERNEL32(00000000,1A75B7EA,?,00000000,?,?,00000000,10035FA8,000000FF,?,1001DB19,00000000,?,?,1001D937,?), ref: 1001E8BC
                                    • EnterCriticalSection.KERNEL32(00000000,1A75B7EA,?,00000000,?,?,00000000,10035FA8,000000FF,?,1001DB19,00000000,?,?,1001D937,?), ref: 1001E8F8
                                    • SetLastError.KERNEL32(00000000,?,1001DB19,00000000,?,?,1001D937,?,00000000,?,?,?,?,1001EB3A,?,?), ref: 1001E90D
                                    • LeaveCriticalSection.KERNEL32(?,?,1001DB19,00000000,?,?,1001D937,?,00000000,?,?,?,?,1001EB3A,?,?), ref: 1001E92C
                                    • InterlockedDecrement.KERNEL32(00000028), ref: 1001E948
                                    • HeapFree.KERNEL32(?,00000000,00000000,00000000,?,1001DB19,00000000,?,?,1001D937,?,00000000,?,?,?), ref: 1001E969
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalErrorLastSection$DecrementEnterFreeHeapInterlockedLeave
                                    • String ID:
                                    • API String ID: 2534375417-0
                                    • Opcode ID: 8a373b9e699bbe36eec3ad261a269d3c2d471c0edf0be97ca4a8e9b207caec58
                                    • Instruction ID: c19bc2cfbfcf6eb32c943866d2ea1f3cbf7c2381cbd68fa049da8d29006db6f8
                                    • Opcode Fuzzy Hash: 8a373b9e699bbe36eec3ad261a269d3c2d471c0edf0be97ca4a8e9b207caec58
                                    • Instruction Fuzzy Hash: 46315A32600645AFDB61CF64CC88B9ABBF9FF48361F04452AF91ADB660DB31E854CB50
                                    APIs
                                    • _memset.LIBCMT ref: 100137E8
                                    • _strcat.LIBCMT ref: 10013887
                                    • RegOpenKeyExA.ADVAPI32(80000002,00000000,00000000,000F003F,?), ref: 100138BD
                                    • RegCloseKey.ADVAPI32(?), ref: 100138CE
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseOpen_memset_strcat
                                    • String ID: SYSTEM\CurrentControlSet\Services\$TMzsft xtnogaqk
                                    • API String ID: 3167732647-1014003165
                                    • Opcode ID: 2662b6faaf2599209bb8ca6bb403307948ab9ad392b1d5476d8a6161b5a9aa7b
                                    • Instruction ID: 22143534158840905b67e581eba63ca17ab0457cd731155eff119560de7604f3
                                    • Opcode Fuzzy Hash: 2662b6faaf2599209bb8ca6bb403307948ab9ad392b1d5476d8a6161b5a9aa7b
                                    • Instruction Fuzzy Hash: AD41D020D0C2C9D9EB02C7A888097DEBFB55B26749F0840D8D5887A282D7FE5758C7B6
                                    APIs
                                    • _calloc.LIBCMT ref: 10003330
                                      • Part of subcall function 10024166: __calloc_impl.LIBCMT ref: 10024179
                                    • InitializeCriticalSection.KERNEL32(00000018,00000000), ref: 1000335C
                                    • InitializeConditionVariable.KERNEL32(00000030), ref: 1000336C
                                    • InitializeConditionVariable.KERNEL32(00000034), ref: 10003372
                                    • __beginthreadex.LIBCMT ref: 100033A8
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Initialize$ConditionVariable$CriticalSection__beginthreadex__calloc_impl_calloc
                                    • String ID:
                                    • API String ID: 4275094566-0
                                    • Opcode ID: 1c90a2da0a09f1423271f63d7b8369d043ae484d91931262826aadb9d33fa527
                                    • Instruction ID: d63cbc47a989e61f8d5764840e3dc6a2f22de4f4aba891b4dc0ad6eac0f10f79
                                    • Opcode Fuzzy Hash: 1c90a2da0a09f1423271f63d7b8369d043ae484d91931262826aadb9d33fa527
                                    • Instruction Fuzzy Hash: 582192B660071AAFE711DF95EC84B97B7ECFB40350F504029EA08C7541EBB5B6598BA0
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: PathTemp_memset_strrchr
                                    • String ID: D
                                    • API String ID: 3269299267-2746444292
                                    • Opcode ID: 65dff33f197481420d75febd2944a67fcb56e30f99d0bf04b3eaf0f89ed5e44e
                                    • Instruction ID: 94703a5b4a1e95a47fdd501beecf67a154b79f006fe411b9632ef845b5e6f6b1
                                    • Opcode Fuzzy Hash: 65dff33f197481420d75febd2944a67fcb56e30f99d0bf04b3eaf0f89ed5e44e
                                    • Instruction Fuzzy Hash: 2F218BB9D00218EBDB24DB50DC45BDA7378EB58305F444498F54D9E281EBB5ABC4CFA0
                                    APIs
                                    • _strncmp.LIBCMT ref: 10012026
                                    • _memset.LIBCMT ref: 10012042
                                    • GetWindowTextA.USER32(00000000,00000000,00000040), ref: 10012061
                                    • _strncpy.LIBCMT ref: 100120B5
                                    • _strncat.LIBCMT ref: 100120CA
                                    • GetWindow.USER32(00000000,00000002), ref: 100120EA
                                    • GetClassNameA.USER32(00000000,00000000,00000080), ref: 10012109
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Window$ClassNameText_memset_strncat_strncmp_strncpy
                                    • String ID:
                                    • API String ID: 3228922498-0
                                    • Opcode ID: 9b23a114edeb7ee68d8fe2a349bbd8718838ecac6987a0b2f96da892dcbfe533
                                    • Instruction ID: 88a1f005e2bcef45723d5467eb62586ba9483bdea00c3cbe37d0c3424b11e526
                                    • Opcode Fuzzy Hash: 9b23a114edeb7ee68d8fe2a349bbd8718838ecac6987a0b2f96da892dcbfe533
                                    • Instruction Fuzzy Hash: FF215CB5901219DBEB60CBA4CC85F9D77B4FB48304F108698EA0DAB182D774AAC4CF64
                                    APIs
                                    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 10011B57
                                    • _memset.LIBCMT ref: 10011B99
                                    • Process32First.KERNEL32(000000FF,00000128), ref: 10011BB9
                                    • Process32Next.KERNEL32(000000FF,00000128), ref: 10011BF4
                                    • CloseHandle.KERNEL32(000000FF,000000FF,00000128,?,00000002,00000000), ref: 10011C04
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32_memset
                                    • String ID: WeChat.exe
                                    • API String ID: 2526126748-2865290047
                                    • Opcode ID: 39a29232ca075c726fda8ef9c875e25e6892fe3647a628bb6ce209c239f2d104
                                    • Instruction ID: de72c953fd82724fd2484dccbf463224b55a824a9cf3277821e8854a41679b26
                                    • Opcode Fuzzy Hash: 39a29232ca075c726fda8ef9c875e25e6892fe3647a628bb6ce209c239f2d104
                                    • Instruction Fuzzy Hash: 49212E759002199BDB64DBA0CD85BEDB3B4EF48301F1001E8E50DAB291EB74AE85CF90
                                    APIs
                                    • _free.LIBCMT ref: 10001236
                                      • Part of subcall function 1002043C: HeapFree.KERNEL32(00000000,00000000,?,10025D1C,00000000,100258E1,100204FB,?,?,100010EB,0000DF68,?,10001048,00000001), ref: 10020450
                                      • Part of subcall function 1002043C: GetLastError.KERNEL32(00000000,?,10025D1C,00000000,100258E1,100204FB,?,?,100010EB,0000DF68,?,10001048,00000001), ref: 10020462
                                    • _free.LIBCMT ref: 10001275
                                    • _free.LIBCMT ref: 1000128D
                                    • _free.LIBCMT ref: 100012A8
                                    • DeleteCriticalSection.KERNEL32(8415FF68,?), ref: 100012C6
                                    • _free.LIBCMT ref: 100012CD
                                    • _free.LIBCMT ref: 100012D6
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _free$CriticalDeleteErrorFreeHeapLastSection
                                    • String ID:
                                    • API String ID: 2933665753-0
                                    • Opcode ID: 2361ccc68d43a71e868931a2596d9ac44d138912533a7e2e7945e83494bb7265
                                    • Instruction ID: aaf221896ecc1e09f6eeffe9c750e8d10df9c6965350f993c9d4ceeb60f37a7f
                                    • Opcode Fuzzy Hash: 2361ccc68d43a71e868931a2596d9ac44d138912533a7e2e7945e83494bb7265
                                    • Instruction Fuzzy Hash: F81104B1800B455BE721EB61F8817A773E1FF00250F948439E55B4220AD731B9E8CBA2
                                    APIs
                                    • _memset.LIBCMT ref: 1000F648
                                    • CreateProcessA.KERNEL32(00000000,1000F402,00000000,00000000,00000001,08000020,00000000,00000000,00000044,00000000), ref: 1000F686
                                    • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 1000F696
                                    • CloseHandle.KERNEL32(00000000), ref: 1000F6A0
                                    • CloseHandle.KERNEL32(?), ref: 1000F6AA
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseHandle$CreateObjectProcessSingleWait_memset
                                    • String ID: D
                                    • API String ID: 3422168109-2746444292
                                    • Opcode ID: 6aa504984eda8c7b5acce5dc33e2805d2fb05eccdb010cb75b9960ebb1134bfa
                                    • Instruction ID: cb5451c512472725f5a4df07bad1c41973f3ae078433712cb33367d9263f6d2b
                                    • Opcode Fuzzy Hash: 6aa504984eda8c7b5acce5dc33e2805d2fb05eccdb010cb75b9960ebb1134bfa
                                    • Instruction Fuzzy Hash: CA113071A00248EFEB24DFE4DC46BAD7BB8EF48700F10421DF619AE2D4DBB5A9448B54
                                    APIs
                                    • __init_pointers.LIBCMT ref: 10025DD7
                                      • Part of subcall function 10022A20: EncodePointer.KERNEL32(00000000,00000001,10025DDC,10023A64,101B7938,00000008,10023C24,?,00000001,?,101B7958,0000000C,10023BC3,?,00000001,?), ref: 10022A23
                                      • Part of subcall function 10022A20: __initp_misc_winsig.LIBCMT ref: 10022A44
                                    • __mtinitlocks.LIBCMT ref: 10025DDC
                                      • Part of subcall function 10028120: InitializeCriticalSectionAndSpinCount.KERNEL32(101BB940,00000FA0,?,00000001,10025DE1,10023A64,101B7938,00000008,10023C24,?,00000001,?,101B7958,0000000C,10023BC3,?), ref: 1002813E
                                    • __mtterm.LIBCMT ref: 10025DE5
                                      • Part of subcall function 10025E4D: DeleteCriticalSection.KERNEL32(?,?,?,?,10023B29,10023B0F,101B7938,00000008,10023C24,?,00000001,?,101B7958,0000000C,10023BC3,?), ref: 1002803C
                                      • Part of subcall function 10025E4D: _free.LIBCMT ref: 10028043
                                      • Part of subcall function 10025E4D: DeleteCriticalSection.KERNEL32(101BB940,?,?,10023B29,10023B0F,101B7938,00000008,10023C24,?,00000001,?,101B7958,0000000C,10023BC3,?,00000001), ref: 10028065
                                    • __calloc_crt.LIBCMT ref: 10025E0A
                                    • __initptd.LIBCMT ref: 10025E2C
                                    • GetCurrentThreadId.KERNEL32 ref: 10025E33
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalSection$Delete$CountCurrentEncodeInitializePointerSpinThread__calloc_crt__init_pointers__initp_misc_winsig__initptd__mtinitlocks__mtterm_free
                                    • String ID:
                                    • API String ID: 757573777-0
                                    • Opcode ID: 5305d30ccda45478ab966d2ea542fe534dde36908a179f48a9bcc1fc7b76229d
                                    • Instruction ID: 58ec3693b2f49863f7a8b2837ed69b9cb9c38201cd79a3fee43b5d8399986583
                                    • Opcode Fuzzy Hash: 5305d30ccda45478ab966d2ea542fe534dde36908a179f48a9bcc1fc7b76229d
                                    • Instruction Fuzzy Hash: 31F0243A1093225AE779E7383C0724B37C8DF02272BA2461DF5A6C84D5FF72A9424658
                                    APIs
                                    • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize,100238FC,?), ref: 1002384D
                                    • GetProcAddress.KERNEL32(00000000), ref: 10023854
                                    • EncodePointer.KERNEL32(00000000), ref: 10023860
                                    • DecodePointer.KERNEL32(00000001,100238FC,?), ref: 1002387D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                    • String ID: RoInitialize$combase.dll
                                    • API String ID: 3489934621-340411864
                                    • Opcode ID: 8a1acb73c590863b49b739fc2dd12772df6c41613cc91e6a01cbeba2b542fb8d
                                    • Instruction ID: 1191a88cc48d34fd9790489e5a8225d39aecb065cdaa85872b62c02564ac10b9
                                    • Opcode Fuzzy Hash: 8a1acb73c590863b49b739fc2dd12772df6c41613cc91e6a01cbeba2b542fb8d
                                    • Instruction Fuzzy Hash: 05E09A70240322AFEB247F30CDCEB4536B5F708702F908120F002DD0A0EBB88440CA52
                                    APIs
                                    • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,10023822), ref: 10023922
                                    • GetProcAddress.KERNEL32(00000000), ref: 10023929
                                    • EncodePointer.KERNEL32(00000000), ref: 10023934
                                    • DecodePointer.KERNEL32(10023822), ref: 1002394F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                    • String ID: RoUninitialize$combase.dll
                                    • API String ID: 3489934621-2819208100
                                    • Opcode ID: 4920fa68460fbff39facb883f69098808d4252d96aa017c2b93aa0396bf9b739
                                    • Instruction ID: 1f88319e3d8987e8e0ffa380cb3ac5eb2f489078ab51b11df1e274af2f38050d
                                    • Opcode Fuzzy Hash: 4920fa68460fbff39facb883f69098808d4252d96aa017c2b93aa0396bf9b739
                                    • Instruction Fuzzy Hash: 06E04678600221AFEBA56F20CC8DB463BB5F715301F918620F105D80A5EBFA9580CF92
                                    APIs
                                    • _malloc.LIBCMT ref: 100161B4
                                      • Part of subcall function 10020474: __FF_MSGBANNER.LIBCMT ref: 1002048B
                                      • Part of subcall function 10020474: __NMSG_WRITE.LIBCMT ref: 10020492
                                      • Part of subcall function 10020474: HeapAlloc.KERNEL32(008B0000,00000000,00000001,?,?,?,?,100010EB,0000DF68,?,10001048,00000001), ref: 100204B7
                                    • _free.LIBCMT ref: 10016270
                                    • std::exception::exception.LIBCMT ref: 100162BC
                                    • __CxxThrowException@8.LIBCMT ref: 100162D1
                                    • SetLastError.KERNEL32(00000018,?,101B722C,?,1001640E,80004005,?,100168C9,00000400,00000400), ref: 100162DC
                                    • _free.LIBCMT ref: 100162E7
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _free$AllocErrorException@8HeapLastThrow_mallocstd::exception::exception
                                    • String ID:
                                    • API String ID: 3049299895-0
                                    • Opcode ID: c4e75bb467dcd632cc6794f0c5e8569d33c960b951e8937276adff62c409ee6a
                                    • Instruction ID: ed2824db1dae17bfd308ba5dcb0e615037e45c0d1587b7e3fee2415e99e90dce
                                    • Opcode Fuzzy Hash: c4e75bb467dcd632cc6794f0c5e8569d33c960b951e8937276adff62c409ee6a
                                    • Instruction Fuzzy Hash: A0519AB6A006199FCB01CF98DC80B9EBBF4EB49710F554169E914AB341D775ED80CB90
                                    APIs
                                    • __ioinit.LIBCMT ref: 100285A6
                                      • Part of subcall function 10029B38: InitOnceExecuteOnce.KERNEL32(101BE634,10029B73,00000000,00000000,1003508B,101B7FB0,0000000C,10005D7E,zstd), ref: 10029B46
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Once$ExecuteInit__ioinit
                                    • String ID:
                                    • API String ID: 129814473-0
                                    • Opcode ID: 5f84c9e2474b48f1b5df84408ea3fed00915e9808a8aa5c3ede1912be93b9b93
                                    • Instruction ID: eb12839c2236a0a66080d8b7707541b2b015dfdafb5b4036e193e8b83220f103
                                    • Opcode Fuzzy Hash: 5f84c9e2474b48f1b5df84408ea3fed00915e9808a8aa5c3ede1912be93b9b93
                                    • Instruction Fuzzy Hash: 7A415679902B058FD320CB78E885A6E77E4EF413B0B90871DF8AB876D1D774EA408B10
                                    APIs
                                    • HeapAlloc.KERNEL32(00000094,00000000,?,00000000,00000000), ref: 1001E132
                                    • _memmove.LIBCMT ref: 1001E18D
                                    • InterlockedExchangeAdd.KERNEL32(-00000040,?), ref: 1001E19D
                                    • InterlockedDecrement.KERNEL32(00000028), ref: 1001E1B6
                                    • HeapFree.KERNEL32(?,00000000,00000000,00000000), ref: 1001E1E0
                                    • InterlockedExchangeAdd.KERNEL32(-00000040,?), ref: 1001E1F7
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Interlocked$ExchangeHeap$AllocDecrementFree_memmove
                                    • String ID:
                                    • API String ID: 3475820249-0
                                    • Opcode ID: 8410d57850f0f56a72160be52005f4586bc43fc5666634ebf8d9ae9adf307239
                                    • Instruction ID: 7998932e740281b790ced908d299ef40af193b578d293305540e12fdeb0e7596
                                    • Opcode Fuzzy Hash: 8410d57850f0f56a72160be52005f4586bc43fc5666634ebf8d9ae9adf307239
                                    • Instruction Fuzzy Hash: F5410D72900259AFDB11CF99C884A9EBBF8FF49314F1145AAEC199F211D770ED54CB90
                                    APIs
                                    • _memset.LIBCMT ref: 10012AB1
                                      • Part of subcall function 100122A0: GetModuleHandleA.KERNEL32(kernel32,IsWow64Process), ref: 100122C1
                                      • Part of subcall function 100122A0: GetProcAddress.KERNEL32(00000000), ref: 100122C8
                                      • Part of subcall function 100122A0: GetCurrentProcess.KERNEL32(00000000), ref: 100122DB
                                    • GetVersionExA.KERNEL32(0000009C), ref: 10012AED
                                      • Part of subcall function 10011EE0: LoadLibraryA.KERNEL32(ntdll.dll), ref: 10011EF9
                                      • Part of subcall function 10011EE0: GetProcAddress.KERNEL32(00000000,RtlGetNtVersionNumbers), ref: 10011F11
                                      • Part of subcall function 10011EE0: FreeLibrary.KERNEL32(00000000), ref: 10011F4A
                                      • Part of subcall function 10011980: LoadLibraryA.KERNEL32(Ole32.dll), ref: 10011995
                                      • Part of subcall function 10011980: GetProcAddress.KERNEL32(?,CoInitialize), ref: 100119A7
                                      • Part of subcall function 10011980: GetProcAddress.KERNEL32(?,CoUninitialize), ref: 100119B9
                                      • Part of subcall function 10011980: GetProcAddress.KERNEL32(?,CoCreateInstance), ref: 100119CB
                                      • Part of subcall function 10011980: LoadLibraryA.KERNEL32(Oleaut32.dll), ref: 100119D9
                                      • Part of subcall function 10011980: GetProcAddress.KERNEL32(?,SysFreeString), ref: 100119EB
                                      • Part of subcall function 10011C40: _strncpy.LIBCMT ref: 10011D43
                                      • Part of subcall function 100121A0: _memset.LIBCMT ref: 100121D2
                                      • Part of subcall function 10011D80: GetSystemInfo.KERNEL32(?), ref: 10011DCD
                                      • Part of subcall function 10011D80: __snprintf.LIBCMT ref: 10011DE8
                                      • Part of subcall function 10012130: _memset.LIBCMT ref: 1001214F
                                      • Part of subcall function 10012130: GlobalMemoryStatusEx.KERNEL32(00000040), ref: 10012162
                                      • Part of subcall function 10011E10: _memset.LIBCMT ref: 10011E5F
                                      • Part of subcall function 10011E10: _memset.LIBCMT ref: 10011E71
                                      • Part of subcall function 10011E10: lstrlenA.KERNEL32(?), ref: 10011EA4
                                      • Part of subcall function 10011E10: gethostname.WS2_32(?,10012B7F), ref: 10011EB6
                                      • Part of subcall function 10011E10: lstrlenA.KERNEL32(?), ref: 10011EC0
                                      • Part of subcall function 10013280: GetLastInputInfo.USER32(00000008), ref: 1001329B
                                    • _memmove.LIBCMT ref: 10012B9C
                                    • InternetGetConnectedState.WININET(?,00000000), ref: 10012BAD
                                    • _strlen.LIBCMT ref: 10012BB7
                                      • Part of subcall function 10006F00: _Func_class.LIBCPMTD ref: 10006F71
                                    • _Func_class.LIBCPMTD ref: 10012BD2
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressProc$_memset$Library$Load$Func_classInfolstrlen$ConnectedCurrentFreeGlobalHandleInputInternetLastMemoryModuleProcessStateStatusSystemVersion__snprintf_memmove_strlen_strncpygethostname
                                    • String ID:
                                    • API String ID: 1392860501-0
                                    • Opcode ID: 43b44d29e576c7a7eab6005ce55aa7196c291a1fb8a4cd9e799f16c790759da6
                                    • Instruction ID: 6fcb611156f6b3c8081496a382b787b04c25c68574042c94e1e96bd79d1c608f
                                    • Opcode Fuzzy Hash: 43b44d29e576c7a7eab6005ce55aa7196c291a1fb8a4cd9e799f16c790759da6
                                    • Instruction Fuzzy Hash: 514186B9D4021A6BDB14DBA0DC46FEE7378EF14344F4045A8F51D6A182EE34B7888B91
                                    APIs
                                    • timeGetTime.WINMM(1A75B7EA,?,?,00000000,?,?,10035FD8,000000FF,?,1001D925,?,00000000,?,?,?), ref: 1001D984
                                    • EnterCriticalSection.KERNEL32(00000054,1A75B7EA,?,?,00000000,?,?,10035FD8,000000FF,?,1001D925,?,00000000,?,?,?), ref: 1001D9A8
                                    • SetLastError.KERNEL32(00000000,?,1001D925,?,00000000,?,?,?,?,1001EB3A,?,?), ref: 1001D9BD
                                    • LeaveCriticalSection.KERNEL32(00000054,?,1001D925,?,00000000,?,?,?,?,1001EB3A,?,?), ref: 1001D9E0
                                    • GetLastError.KERNEL32(?,00000000), ref: 1001DA42
                                    • HeapFree.KERNEL32(?,00000000,?,?,?,00000000), ref: 1001DA77
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalErrorLastSection$EnterFreeHeapLeaveTimetime
                                    • String ID:
                                    • API String ID: 340097737-0
                                    • Opcode ID: 63cb6f8e7694ae6483c047f050ef8b7d6c6ce7c6f04acb454207dabb1f28742f
                                    • Instruction ID: 651f3edefb78460789619dc2c76435f0b6e471a6de73fc66fbbe7bd7a0e23f04
                                    • Opcode Fuzzy Hash: 63cb6f8e7694ae6483c047f050ef8b7d6c6ce7c6f04acb454207dabb1f28742f
                                    • Instruction Fuzzy Hash: 5641AEB1600619AFDB11EF54CC85BAAB7F8FF08320F40452AF915CB691D774E940CBA1
                                    APIs
                                    • Concurrency::details::HardwareAffinity::operator!=.LIBCMTD ref: 1000C28F
                                    • std::error_category::default_error_condition.LIBCPMTD ref: 1000C2B0
                                    • std::error_category::default_error_condition.LIBCPMTD ref: 1000C2CA
                                    • Concurrency::details::HardwareAffinity::operator!=.LIBCMTD ref: 1000C2D6
                                    • _Copy_impl.LIBCPMTD ref: 1000C2F1
                                    • std::error_category::default_error_condition.LIBCPMTD ref: 1000C323
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: std::error_category::default_error_condition$Affinity::operator!=Concurrency::details::Hardware$Copy_impl
                                    • String ID:
                                    • API String ID: 1600619793-0
                                    • Opcode ID: b1d60bd1d2c90ce81873208b493584433b2c3e2ab3f7430867161bbb174af34e
                                    • Instruction ID: d7a5fca912ec06086403f1c670a1a813a5f108e565bd240dc1cb7e9a7b1914b0
                                    • Opcode Fuzzy Hash: b1d60bd1d2c90ce81873208b493584433b2c3e2ab3f7430867161bbb174af34e
                                    • Instruction Fuzzy Hash: ED310079910119ABDB08DF95CC91DFFB3B9FF88240B50852DB515A7296DF30BA05CB90
                                    APIs
                                    • Concurrency::details::HardwareAffinity::operator!=.LIBCMTD ref: 1000995F
                                    • std::error_category::default_error_condition.LIBCPMTD ref: 10009980
                                    • std::error_category::default_error_condition.LIBCPMTD ref: 1000999A
                                    • Concurrency::details::HardwareAffinity::operator!=.LIBCMTD ref: 100099A6
                                    • _Copy_impl.LIBCPMTD ref: 100099C1
                                    • std::error_category::default_error_condition.LIBCPMTD ref: 100099F3
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: std::error_category::default_error_condition$Affinity::operator!=Concurrency::details::Hardware$Copy_impl
                                    • String ID:
                                    • API String ID: 1600619793-0
                                    • Opcode ID: 2ed96429231faa1b98a0dfe9f2b9f2661ec804e65a12f5b07c9e7ace5e47c8cf
                                    • Instruction ID: fd5af44e1f88a068f71331fad6f74fd73f7a6a584799292872335351018ebe79
                                    • Opcode Fuzzy Hash: 2ed96429231faa1b98a0dfe9f2b9f2661ec804e65a12f5b07c9e7ace5e47c8cf
                                    • Instruction Fuzzy Hash: AD31FE79900519ABDB08DF95CC91DFFB3B9FF88240B50852DB515AB296DF30BA05CB90
                                    APIs
                                    • htons.WS2_32(?), ref: 1001A9E7
                                    • WSAAddressToStringA.WS2_32(?,0000001C,00000000,?,?), ref: 1001AA10
                                    • htons.WS2_32(?), ref: 1001AA2D
                                    • StrPBrkA.SHLWAPI(?,101B05A8,?,?,?,?,1001A154,?,?,?), ref: 1001AA53
                                    • StrChrA.SHLWAPI(?,00000025,?,?,?,?,1001A154,?,?,?), ref: 1001AA5E
                                    • _memmove.LIBCMT ref: 1001AA80
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: htons$AddressString_memmove
                                    • String ID:
                                    • API String ID: 2092185379-0
                                    • Opcode ID: 1da62bb18fa6672f18f6b109637b5a37ed39d3a7a0056215d56cfa2b173f808e
                                    • Instruction ID: 0d8a7e0632666a9e584c7e0b1c50e51ce1a1bb8526f63a46b25b18e10d486f15
                                    • Opcode Fuzzy Hash: 1da62bb18fa6672f18f6b109637b5a37ed39d3a7a0056215d56cfa2b173f808e
                                    • Instruction Fuzzy Hash: 2F218E36200326ABEB119FA4DD84BAA37ECEF49355F418025FD098A151D3B4D9C4D761
                                    APIs
                                    • _free.LIBCMT ref: 10017BAA
                                      • Part of subcall function 1002043C: HeapFree.KERNEL32(00000000,00000000,?,10025D1C,00000000,100258E1,100204FB,?,?,100010EB,0000DF68,?,10001048,00000001), ref: 10020450
                                      • Part of subcall function 1002043C: GetLastError.KERNEL32(00000000,?,10025D1C,00000000,100258E1,100204FB,?,?,100010EB,0000DF68,?,10001048,00000001), ref: 10020462
                                    • _free.LIBCMT ref: 10017BB2
                                    • _malloc.LIBCMT ref: 10017C09
                                    • _malloc.LIBCMT ref: 10017C16
                                    • _memset.LIBCMT ref: 10017C22
                                    • _memset.LIBCMT ref: 10017C2E
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _free_malloc_memset$ErrorFreeHeapLast
                                    • String ID:
                                    • API String ID: 3649356292-0
                                    • Opcode ID: e2ce2a3dfe1de264b51823140416de6bf36e0b396c0ae9a07080b5863090727e
                                    • Instruction ID: 4c7394fda08d7e2547570c27631cca39768b6331ab3c3b2927f712e97e116122
                                    • Opcode Fuzzy Hash: e2ce2a3dfe1de264b51823140416de6bf36e0b396c0ae9a07080b5863090727e
                                    • Instruction Fuzzy Hash: 91111BB55012009BDB10DF15DD85B867FA5FF51304F4880B8FA089E29BD776E554CBA4
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: DeleteFileFreeVirtual_memset_sprintf
                                    • String ID: %s%u
                                    • API String ID: 510910084-679674701
                                    • Opcode ID: adc25b0c065f21cbd1dfded628025ccd8d207bb86f6a67400b9d615e7817787c
                                    • Instruction ID: e4550e76bca269e0cd4f0d0c42d540de692b114aa9dc25b4e6c159d00a62e7eb
                                    • Opcode Fuzzy Hash: adc25b0c065f21cbd1dfded628025ccd8d207bb86f6a67400b9d615e7817787c
                                    • Instruction Fuzzy Hash: 3D31D4B59042689FC725CF14CC41BEEBBB4EB45315F108199FA585B3D1CB34AA81CF90
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _wprintfhtonsinet_addr
                                    • String ID: 2$OnConnect: %s,%d
                                    • API String ID: 3872430831-1911175251
                                    • Opcode ID: c5e6b32b25000850bdcfd3e7752fad518d315f21ca028ddb3caaaf99291d32ff
                                    • Instruction ID: b422dd61b17a844059851ccc93c32e4f95b7dbd58dc7ab89f53cd95de4c22344
                                    • Opcode Fuzzy Hash: c5e6b32b25000850bdcfd3e7752fad518d315f21ca028ddb3caaaf99291d32ff
                                    • Instruction Fuzzy Hash: B111D6B5A00208AFCB14DFA4D9809AEB7B9FF88200F108159F9099B251EB35AA45CB50
                                    APIs
                                    • _memset.LIBCMT ref: 100106F8
                                    • GetModuleFileNameA.KERNEL32(00000000,00000000,00000104), ref: 1001070E
                                    • _memset.LIBCMT ref: 10010729
                                    • ShellExecuteExA.SHELL32(0000003C), ref: 10010761
                                      • Part of subcall function 10022BD3: _doexit.LIBCMT ref: 10022BDD
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _memset$ExecuteFileModuleNameShell_doexit
                                    • String ID: <
                                    • API String ID: 862106238-4251816714
                                    • Opcode ID: 20cf96c7f9d228022f40f64b64e5aa891d9eb85aec194889f2121776d6cbdfe6
                                    • Instruction ID: ed08ded1bf864bf3e223a1e7aee1529ee6b636ef57dacc8919679b4bfa0f8810
                                    • Opcode Fuzzy Hash: 20cf96c7f9d228022f40f64b64e5aa891d9eb85aec194889f2121776d6cbdfe6
                                    • Instruction Fuzzy Hash: F5112174A443189BDB60DF60DC86BD977B8EB58701F4040D8E54CAA2D1DBB46BC8CF51
                                    APIs
                                      • Part of subcall function 100153E0: _memset.LIBCMT ref: 10015432
                                      • Part of subcall function 100153E0: _memset.LIBCMT ref: 10015448
                                      • Part of subcall function 100153E0: _memset.LIBCMT ref: 1001545E
                                      • Part of subcall function 100153E0: LoadLibraryA.KERNEL32(ADVAPI32.dll), ref: 1001546B
                                    • GetSystemInfo.KERNEL32(?), ref: 10011DCD
                                    • __snprintf.LIBCMT ref: 10011DE8
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _memset$InfoLibraryLoadSystem__snprintf
                                    • String ID: %d*%sMHz$HARDWARE\DESCRIPTION\System\CentralProcessor\0$~MHz
                                    • API String ID: 4072208565-2169120903
                                    • Opcode ID: 8cfe9623471b1fdf1c554914f6860f425b5aeaa8db3a3f010a36363e40d3c6a7
                                    • Instruction ID: d45dab53a83cfac9e0a1e2a4c9fe7e981714f2b5fce01b97ec9512f60cfb67df
                                    • Opcode Fuzzy Hash: 8cfe9623471b1fdf1c554914f6860f425b5aeaa8db3a3f010a36363e40d3c6a7
                                    • Instruction Fuzzy Hash: F6010075A10248EFDB00DBE8CD46BAEB7B4EF48604F50415DBA08EB281E6756A44C761
                                    APIs
                                    • _memset.LIBCMT ref: 100118F8
                                    • GetModuleFileNameA.KERNEL32(00000000,00000000,00000104), ref: 1001190E
                                    • _memset.LIBCMT ref: 10011929
                                    • ShellExecuteExA.SHELL32(0000003C), ref: 10011961
                                      • Part of subcall function 10022BD3: _doexit.LIBCMT ref: 10022BDD
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _memset$ExecuteFileModuleNameShell_doexit
                                    • String ID: <
                                    • API String ID: 862106238-4251816714
                                    • Opcode ID: 3b53686e11ed67b0b73857ac907e37981459c7ca599cd7ab1f7b00ff7bdf5b39
                                    • Instruction ID: 184780f53a04bf753c675ecee7cc99bb54cbc30637577b5367bcbf7d21cbf3cf
                                    • Opcode Fuzzy Hash: 3b53686e11ed67b0b73857ac907e37981459c7ca599cd7ab1f7b00ff7bdf5b39
                                    • Instruction Fuzzy Hash: 6A112D789043189BDB64DF60DC86BD977B8AF58700F4040D8E54CAA2D1DBB46BC8CF51
                                    APIs
                                    • LoadLibraryA.KERNEL32(ntdll.dll), ref: 10011EF9
                                    • GetProcAddress.KERNEL32(00000000,RtlGetNtVersionNumbers), ref: 10011F11
                                    • FreeLibrary.KERNEL32(00000000), ref: 10011F4A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Library$AddressFreeLoadProc
                                    • String ID: RtlGetNtVersionNumbers$ntdll.dll
                                    • API String ID: 145871493-1263206204
                                    • Opcode ID: cf38a511d7e8b4ae8d17f5c5b92b7a0423aa2ce6899e0fe5ee67ae0bceb075ab
                                    • Instruction ID: fc6e9e5f567ed89b3598dd89ccb3c317c7ae0145ebb98ab299a18f454954bdf5
                                    • Opcode Fuzzy Hash: cf38a511d7e8b4ae8d17f5c5b92b7a0423aa2ce6899e0fe5ee67ae0bceb075ab
                                    • Instruction Fuzzy Hash: EF01A579901208EFDB14DF94C988B9EBBB5FF48305F108598F8059B290D7759A45DF50
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: State$AsyncSleep_memsetlstrlen
                                    • String ID: ]$e
                                    • API String ID: 1122937223-1460998272
                                    • Opcode ID: eed0b91c2744c895165e97b4f44415f78997a58abc4c3c7c85806ef0c703c4ee
                                    • Instruction ID: 764bce47da2be80fe97f0ee0a60544cb6e7be49dbe84d1d57fcac03222c10f19
                                    • Opcode Fuzzy Hash: eed0b91c2744c895165e97b4f44415f78997a58abc4c3c7c85806ef0c703c4ee
                                    • Instruction Fuzzy Hash: 35011A34901728CFFB64CF15CC85BA977B2FB80391F1082A9C4095695ACB779EA1EE01
                                    APIs
                                    • GetModuleHandleA.KERNEL32(kernel32,IsWow64Process), ref: 100122C1
                                    • GetProcAddress.KERNEL32(00000000), ref: 100122C8
                                    • GetCurrentProcess.KERNEL32(00000000), ref: 100122DB
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressCurrentHandleModuleProcProcess
                                    • String ID: IsWow64Process$kernel32
                                    • API String ID: 4190356694-3789238822
                                    • Opcode ID: 4dbbbb52112192865a612101614944367de734d12e029e91dbf73928284f9556
                                    • Instruction ID: d8b697d57578edb345ad90496a9b557fc7605fd1813d4f5a4f7f5f71a7bdeb36
                                    • Opcode Fuzzy Hash: 4dbbbb52112192865a612101614944367de734d12e029e91dbf73928284f9556
                                    • Instruction Fuzzy Hash: 74F0FE75D00208FFDB10EFE4C94879DBBB8EF08205F404099E80997251DB389648DB50
                                    APIs
                                      • Part of subcall function 100184E0: GetNativeSystemInfo.KERNEL32(?,?,?,?,?,100167AB,1A75B7EA,00000000,?,?,?,1001849E), ref: 100184FB
                                      • Part of subcall function 100184E0: GetNativeSystemInfo.KERNEL32(?,?,?,?,?,100167AB,1A75B7EA,00000000,?,?,?,1001849E), ref: 10018516
                                    • CreateEventA.KERNEL32(00000000,00000001,00000001,00000000,1A75B7EA,00000000,?,?,?,1001849E), ref: 100167F5
                                    • HeapCreate.KERNEL32(00000004,00000000,00000000,?,?,?,1001849E), ref: 10016889
                                    • _free.LIBCMT ref: 1001693E
                                    • _free.LIBCMT ref: 10016946
                                    • _free.LIBCMT ref: 100169A9
                                      • Part of subcall function 100172C0: __CxxThrowException@8.LIBCMT ref: 100172D2
                                      • Part of subcall function 100172C0: EnterCriticalSection.KERNEL32(00000000,1A75B7EA,00000000,00000098,?,?,00000000,10035B28,000000FF,?,?,101B722C,?,1001640E,80004005), ref: 10017312
                                      • Part of subcall function 100172C0: LeaveCriticalSection.KERNEL32(00000000,?,?,00000000,10035B28,000000FF,?,?,101B722C,?,1001640E,80004005,?,100168C9,00000400,00000400), ref: 1001737B
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _free$CreateCriticalInfoNativeSectionSystem$EnterEventException@8HeapLeaveThrow
                                    • String ID:
                                    • API String ID: 471852966-0
                                    • Opcode ID: 62dcc8071ba77636672d3d9cd1e185c692ae9957d13345a13a02519507dda5e3
                                    • Instruction ID: d7e5b155edf1d74aaead93eb83c8ab603744e77deffcff0117244fe85bcfb593
                                    • Opcode Fuzzy Hash: 62dcc8071ba77636672d3d9cd1e185c692ae9957d13345a13a02519507dda5e3
                                    • Instruction Fuzzy Hash: C37118B0501B419FE761CF64C958787BBF4FF04308F108A1DE6AA9B691DBB9B148CB90
                                    APIs
                                    • getsockopt.WS2_32(?,0000FFFF,00001001,?,?), ref: 1001CD1D
                                    • InterlockedCompareExchange.KERNEL32(00000004,00000000,00000001), ref: 1001CD64
                                    • EnterCriticalSection.KERNEL32(?), ref: 1001CD7A
                                    • LeaveCriticalSection.KERNEL32(?), ref: 1001CD89
                                    • LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,10035AC4), ref: 1001CDCC
                                      • Part of subcall function 1001E2B0: InterlockedExchangeAdd.KERNEL32(00000044,?), ref: 1001E328
                                      • Part of subcall function 1001E2B0: InterlockedDecrement.KERNEL32(?), ref: 1001E33E
                                      • Part of subcall function 1001E2B0: HeapFree.KERNEL32(?,00000000,?,?), ref: 1001E36E
                                      • Part of subcall function 1001BE40: timeGetTime.WINMM(00000007,00000000,00000000,00000000,?,00000001,?,?,00000001,00000000), ref: 1001BE7F
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalInterlockedSection$ExchangeLeave$CompareDecrementEnterFreeHeapTimegetsockopttime
                                    • String ID:
                                    • API String ID: 1051621181-0
                                    • Opcode ID: 47ef961c13baaeb1f1c3f54f41a175c5428382baf7d5d31f1b2d3631bcd46669
                                    • Instruction ID: aa49a767c170bc5356aa645f39eb09f20ade229693a97dd4efdc251de6f66d51
                                    • Opcode Fuzzy Hash: 47ef961c13baaeb1f1c3f54f41a175c5428382baf7d5d31f1b2d3631bcd46669
                                    • Instruction Fuzzy Hash: ED41D072A00619AFD711CF94DC81F9EBBF8FB04351F10423AEA059B690D775E9A0CB90
                                    APIs
                                    • FreeLibrary.KERNEL32(00000000), ref: 1001446A
                                    • _free.LIBCMT ref: 10014479
                                    • VirtualFree.KERNEL32(?,00000000,00008000,?,1001478E), ref: 10014498
                                    • GetProcessHeap.KERNEL32(00000000,00000000,?,1001478E), ref: 100144A4
                                    • HeapFree.KERNEL32(00000000,?,1001478E), ref: 100144AB
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Free$Heap$LibraryProcessVirtual_free
                                    • String ID:
                                    • API String ID: 3953351234-0
                                    • Opcode ID: d9d32f6ed72f362beb0b78fbb99d4c82a6959af6a865298871246b0d9bcbc94d
                                    • Instruction ID: e984664baf45058b12496fb5a6c08b784cfcca4bbda2656e475c534f62021b4f
                                    • Opcode Fuzzy Hash: d9d32f6ed72f362beb0b78fbb99d4c82a6959af6a865298871246b0d9bcbc94d
                                    • Instruction Fuzzy Hash: 6131B674A00208EFDB14CF94C598B9DB7B6FB49315F258288E9056B391C775EE86DF80
                                    APIs
                                    • __malloc_crt.LIBCMT ref: 10032879
                                    • std::exception::exception.LIBCMT ref: 10032893
                                    • __CxxThrowException@8.LIBCMT ref: 100328C9
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Exception@8Throw__malloc_crtstd::exception::exception
                                    • String ID:
                                    • API String ID: 3183362523-0
                                    • Opcode ID: 12067b7f50e60089eb0c5929b79bbc81da0302d8a13d9fc531a0150228292b0c
                                    • Instruction ID: 3afcd033efa841a0b0f27a91848f479c7de1b815caadbdc1d716f9ba00caeb03
                                    • Opcode Fuzzy Hash: 12067b7f50e60089eb0c5929b79bbc81da0302d8a13d9fc531a0150228292b0c
                                    • Instruction Fuzzy Hash: B021FC3950420DAECB02EF64DC426CEB7B8EF00241F40C565FD45AE250EB34E680CB93
                                    APIs
                                    • _malloc.LIBCMT ref: 10023558
                                      • Part of subcall function 10020474: __FF_MSGBANNER.LIBCMT ref: 1002048B
                                      • Part of subcall function 10020474: __NMSG_WRITE.LIBCMT ref: 10020492
                                      • Part of subcall function 10020474: HeapAlloc.KERNEL32(008B0000,00000000,00000001,?,?,?,?,100010EB,0000DF68,?,10001048,00000001), ref: 100204B7
                                    • _free.LIBCMT ref: 1002356B
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AllocHeap_free_malloc
                                    • String ID:
                                    • API String ID: 2734353464-0
                                    • Opcode ID: bad27d9961e6c256fd05d00a16dcfa7813a2fc78cb849604c55e28e4d427328b
                                    • Instruction ID: 8f73b662920d403f089da30250cd819716aaae5841175fa17ded837e2a866512
                                    • Opcode Fuzzy Hash: bad27d9961e6c256fd05d00a16dcfa7813a2fc78cb849604c55e28e4d427328b
                                    • Instruction Fuzzy Hash: 28112731900A366FCB21DB70BC4564E37E4EF003A0FE18525F90D9A1A1DF349940D794
                                    APIs
                                    • _free.LIBCMT ref: 1001DFDE
                                      • Part of subcall function 1002043C: HeapFree.KERNEL32(00000000,00000000,?,10025D1C,00000000,100258E1,100204FB,?,?,100010EB,0000DF68,?,10001048,00000001), ref: 10020450
                                      • Part of subcall function 1002043C: GetLastError.KERNEL32(00000000,?,10025D1C,00000000,100258E1,100204FB,?,?,100010EB,0000DF68,?,10001048,00000001), ref: 10020462
                                    • _free.LIBCMT ref: 1001DFE9
                                    • HeapDestroy.KERNEL32(?,?,80004005,?,1001E736), ref: 1001E03E
                                    • HeapCreate.KERNEL32(?,?,?,?,80004005,?,1001E736), ref: 1001E056
                                    • SetEvent.KERNEL32(?,?,80004005,?,1001E736), ref: 1001E093
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Heap$_free$CreateDestroyErrorEventFreeLast
                                    • String ID:
                                    • API String ID: 840158118-0
                                    • Opcode ID: 0e583d642f774632f9c27456ec0f16af5b2d05b50993fe6db7455c841bf81a0b
                                    • Instruction ID: 1bce1808b3a2e791fe6ccda0018e989c211068b54a4ee0f2cf5caece12fc7c46
                                    • Opcode Fuzzy Hash: 0e583d642f774632f9c27456ec0f16af5b2d05b50993fe6db7455c841bf81a0b
                                    • Instruction Fuzzy Hash: 3221D071401B428BE7229F35D908787BAE1BF49304F50891DE5AA96651DBBAB884CF40
                                    APIs
                                    • EnterCriticalSection.KERNEL32(?,?,00000000,?,?,1001BE50,?,?,00000054,?,1001D828,00000000,00000000,00000000,00000000), ref: 1001B651
                                    • EnterCriticalSection.KERNEL32(?,?,1001BE50,?,?,00000054,?,1001D828,00000000,00000000,00000000,00000000), ref: 1001B657
                                    • LeaveCriticalSection.KERNEL32(?,?,1001BE50,?,?,00000054,?,1001D828,00000000,00000000,00000000,00000000), ref: 1001B675
                                    • LeaveCriticalSection.KERNEL32(?,?,1001BE50,?,?,00000054,?,1001D828,00000000,00000000,00000000,00000000), ref: 1001B678
                                    • LeaveCriticalSection.KERNEL32(?,?,1001BE50,?,?,00000054,?,1001D828,00000000,00000000,00000000,00000000), ref: 1001B68A
                                    • LeaveCriticalSection.KERNEL32(?,?,1001BE50,?,?,00000054,?,1001D828,00000000,00000000,00000000,00000000), ref: 1001B68D
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalSection$Leave$Enter
                                    • String ID:
                                    • API String ID: 2978645861-0
                                    • Opcode ID: c76d05b3fccb81bbde97bbe8f299796e80221eabea18b0df9aee05efc5887d01
                                    • Instruction ID: 15876e7cb504465c55ff25fd79a18e235aef5e7f8048034f6523b5cd64803c08
                                    • Opcode Fuzzy Hash: c76d05b3fccb81bbde97bbe8f299796e80221eabea18b0df9aee05efc5887d01
                                    • Instruction Fuzzy Hash: 43F044722016146FD711AB6EDCC0A9BB7ECFFC9224B520136E908DB611C779E8458AB0
                                    APIs
                                      • Part of subcall function 10025CA4: __getptd_noexit.LIBCMT ref: 10025CA5
                                      • Part of subcall function 10025CA4: __amsg_exit.LIBCMT ref: 10025CB2
                                    • __amsg_exit.LIBCMT ref: 10027917
                                    • __lock.LIBCMT ref: 10027927
                                    • InterlockedDecrement.KERNEL32(?), ref: 10027944
                                    • _free.LIBCMT ref: 10027957
                                    • InterlockedIncrement.KERNEL32(008CD788), ref: 1002796F
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd_noexit__lock_free
                                    • String ID:
                                    • API String ID: 1231874560-0
                                    • Opcode ID: 5b52af1cc653b6a68240cb3c15142706c47bbd1bbb99473af2bdf0793a479e8c
                                    • Instruction ID: e038a616fc268b6b30c8c800e06b11c4754edae7854568c1c2ca9af5bccd002d
                                    • Opcode Fuzzy Hash: 5b52af1cc653b6a68240cb3c15142706c47bbd1bbb99473af2bdf0793a479e8c
                                    • Instruction Fuzzy Hash: 0701C036A01732ABDB21DB69BA8174D77B0FF01650FD10145E8086BA92CB386981CFC1
                                    APIs
                                    • EnterCriticalSection.KERNEL32(00000018,00000000,0000003C,00000000,?,?,100033DA), ref: 1000340C
                                    • WakeAllConditionVariable.KERNEL32 ref: 1000341D
                                    • LeaveCriticalSection.KERNEL32(00000018), ref: 10003424
                                    • WaitForSingleObject.KERNEL32(?,000000FF,?), ref: 1000345C
                                    • GetLastError.KERNEL32 ref: 1000346D
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalSection$ConditionEnterErrorLastLeaveObjectSingleVariableWaitWake
                                    • String ID:
                                    • API String ID: 2002041392-0
                                    • Opcode ID: e75bfb5a0ad93df77c66187c49ea81158b5d7819f7b5d557b30da283341fa316
                                    • Instruction ID: 32492cade0fa7766ae1656b716e42035eae87337b4a1db3a89480abb877ebfd1
                                    • Opcode Fuzzy Hash: e75bfb5a0ad93df77c66187c49ea81158b5d7819f7b5d557b30da283341fa316
                                    • Instruction Fuzzy Hash: 8301B1325002169FEB52EF58DCC469773ECFF45391B018525EA589B119D730E989CBA2
                                    APIs
                                      • Part of subcall function 1001A990: setsockopt.WS2_32(?,0000FFFF,00007010,00000000,00000004), ref: 1001A9A6
                                    • EnterCriticalSection.KERNEL32 ref: 1001D7AC
                                    • LeaveCriticalSection.KERNEL32(00000054), ref: 1001D7C7
                                      • Part of subcall function 1001BE40: timeGetTime.WINMM(00000007,00000000,00000000,00000000,?,00000001,?,?,00000001,00000000), ref: 1001BE7F
                                    • SetLastError.KERNEL32(00000000), ref: 1001D7D1
                                    • LeaveCriticalSection.KERNEL32(00000054), ref: 1001D7EC
                                    • HeapFree.KERNEL32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 1001D842
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalSection$Leave$EnterErrorFreeHeapLastTimesetsockopttime
                                    • String ID:
                                    • API String ID: 4191520005-0
                                    • Opcode ID: d82dbdcae07a67b72c96c9c25426668b2813c80c10765768011baf3510c592d9
                                    • Instruction ID: 8b7f9298d96b99960fdb9572d67dbc8946c541a3fe55414fa74220fd8c56f37f
                                    • Opcode Fuzzy Hash: d82dbdcae07a67b72c96c9c25426668b2813c80c10765768011baf3510c592d9
                                    • Instruction Fuzzy Hash: E131C372600214EFD711DF48CC85B9EB7B8FF49721F10422AF9299B291DB75A840CB60
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AdjustPointer_memmove
                                    • String ID:
                                    • API String ID: 1721217611-0
                                    • Opcode ID: b405e0998ef0b9efc1edcd27beb66ba5646d659d8eec6f86d97dda6a22f7c017
                                    • Instruction ID: 0e35a04b9f418c62776a7450ae1d75bb5788a7e2c58344f017f8f72862e36527
                                    • Opcode Fuzzy Hash: b405e0998ef0b9efc1edcd27beb66ba5646d659d8eec6f86d97dda6a22f7c017
                                    • Instruction Fuzzy Hash: DC4192766043469AEB25CF50FC42F6A37F4DF097A0FA1401DF849AA5D1DF71E880DA62
                                    APIs
                                    • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 1002F22B
                                    • __isleadbyte_l.LIBCMT ref: 1002F259
                                    • MultiByteToWideChar.KERNEL32(00000000,00000009,0000000C,00000000,00000000,00000000), ref: 1002F287
                                    • MultiByteToWideChar.KERNEL32(00000000,00000009,0000000C,00000001,00000000,00000000), ref: 1002F2BD
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                    • String ID:
                                    • API String ID: 3058430110-0
                                    • Opcode ID: 2b3d1593b62abf2a8beba7a4b33d3e542d277218e77fbf3ac6909a8a0f39df84
                                    • Instruction ID: 88f6cfa15c5d6d04ed07b041f1d82007708ea3ed43a2cafbe05b56c4a286dddd
                                    • Opcode Fuzzy Hash: 2b3d1593b62abf2a8beba7a4b33d3e542d277218e77fbf3ac6909a8a0f39df84
                                    • Instruction Fuzzy Hash: 1D31BC3560029AEFDB11CE64E845BBA3BE5FF422A0F52443DE8249B1A1D770E844DB50
                                    APIs
                                    • SetLastError.KERNEL32(?), ref: 1001E41B
                                    • UnmapViewOfFile.KERNEL32(00000000), ref: 1001E441
                                    • CloseHandle.KERNEL32(00000000), ref: 1001E461
                                    • CloseHandle.KERNEL32(00000000), ref: 1001E483
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseHandle$ErrorFileLastUnmapView
                                    • String ID:
                                    • API String ID: 4017539725-0
                                    • Opcode ID: 496f3fa893c77ec6c9c64e1aa7dc66e4b9ed660e755f62b2c78ec002215d3852
                                    • Instruction ID: cba275ec36c653788e4822474d84c3c335d5b1142b70863171b6aa198203d996
                                    • Opcode Fuzzy Hash: 496f3fa893c77ec6c9c64e1aa7dc66e4b9ed660e755f62b2c78ec002215d3852
                                    • Instruction Fuzzy Hash: 1E3118B5A002599BDB11CFA4CC48BAFBBF8FF48754F004219F805EB241EB75E9448BA0
                                    APIs
                                    • InterlockedCompareExchange.KERNEL32(00000000,?,00000000), ref: 1001B765
                                    • InterlockedCompareExchange.KERNEL32(?,?,?), ref: 1001B777
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CompareExchangeInterlocked
                                    • String ID:
                                    • API String ID: 3335655927-0
                                    • Opcode ID: 9484bcffa374807802c2175ff6f6c2d2e59b0392790023a2fe2f7dd29207cd47
                                    • Instruction ID: a411b3ee14b548daa5b868b1c8f2e50aeeae3c08791ef6b703bc2ef0cd82c7fc
                                    • Opcode Fuzzy Hash: 9484bcffa374807802c2175ff6f6c2d2e59b0392790023a2fe2f7dd29207cd47
                                    • Instruction Fuzzy Hash: 6E219F36304A09ABD720DF6DDD80E96F3EDFBC8311F00456AEA89C7240DB31E9548BA0
                                    APIs
                                    • VirtualAlloc.KERNEL32(?,00000000,00001000,00000004), ref: 100140EE
                                    • _memset.LIBCMT ref: 1001410A
                                    • VirtualAlloc.KERNEL32(?,?,00001000,00000004,?,100146FE), ref: 1001412C
                                    • _memmove.LIBCMT ref: 1001414A
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AllocVirtual$_memmove_memset
                                    • String ID:
                                    • API String ID: 725130153-0
                                    • Opcode ID: f53fd65b4befc706c090b7c927cf75363b07fbc3177beadfb71f7d900ef2fefc
                                    • Instruction ID: 93ed00f0eb9094769ecb9556d8f7921b1dd27d8a6f78ffda3dd0833cdc577a5f
                                    • Opcode Fuzzy Hash: f53fd65b4befc706c090b7c927cf75363b07fbc3177beadfb71f7d900ef2fefc
                                    • Instruction Fuzzy Hash: F631EA74A00209EFCB08CF94C995EAEB7B1FF48704F218598E915AB351D770EE81DB50
                                    APIs
                                    • GetFileSize.KERNEL32(00000002,00000004,?,?,?,00000002,00000004), ref: 1001A3B3
                                    • CreateFileMappingA.KERNEL32(00000002,00000000,00000004,00000004,00000000,00000000), ref: 1001A3E0
                                    • MapViewOfFileEx.KERNEL32(00000000,?,?,?,?,00000000,?,00000002,00000004), ref: 1001A429
                                    • CloseHandle.KERNEL32(?,?,00000002,00000004), ref: 1001A43F
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$CloseCreateHandleMappingSizeView
                                    • String ID:
                                    • API String ID: 1374251026-0
                                    • Opcode ID: 4b8af0a805cdf8347236f9c71f45033270cfc3b78af84c4974c8e4d52b637325
                                    • Instruction ID: 8fce67c6ff09011a8acf264d9e13d81355b447303082185ad91e7b9cb9a6a423
                                    • Opcode Fuzzy Hash: 4b8af0a805cdf8347236f9c71f45033270cfc3b78af84c4974c8e4d52b637325
                                    • Instruction Fuzzy Hash: 272167B5A0061AAFD714DF69DC45A5AF7F8FB49350F10812AFD19D7200D770E9A09BD0
                                    APIs
                                    • _free.LIBCMT ref: 1001B152
                                      • Part of subcall function 1001B190: HeapFree.KERNEL32(?,00000000,?), ref: 1001B1E5
                                    • DeleteCriticalSection.KERNEL32(?,1A75B7EA), ref: 1001B113
                                    • DeleteCriticalSection.KERNEL32(?), ref: 1001B124
                                    • HeapFree.KERNEL32(?,00000000), ref: 1001B132
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalDeleteFreeHeapSection$_free
                                    • String ID:
                                    • API String ID: 210024702-0
                                    • Opcode ID: 2457e78313824737e41231bfbb3820b753e3b2e9e7e39901a1bfba69df0cf740
                                    • Instruction ID: 33c100260f324d21ff77bf2896aba4d0bbdecf1759cfcc0eaa01cd95da98a8db
                                    • Opcode Fuzzy Hash: 2457e78313824737e41231bfbb3820b753e3b2e9e7e39901a1bfba69df0cf740
                                    • Instruction Fuzzy Hash: 63319E71A00616EFDB11DFA8C884B5AFBF8FF05315F118269E9199F291D731E944CBA0
                                    APIs
                                    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,10011CAA), ref: 100152B1
                                      • Part of subcall function 1001EF9C: _malloc.LIBCMT ref: 1001EFB4
                                    • Process32First.KERNEL32(10011CAA,1A75B7EA), ref: 100152E0
                                    • Process32Next.KERNEL32(10011CAA,1A75B7EA), ref: 10015316
                                    • lstrcmpiA.KERNEL32(1A75B7C6,00000000), ref: 1001532A
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Process32$CreateFirstNextSnapshotToolhelp32_malloclstrcmpi
                                    • String ID:
                                    • API String ID: 242301054-0
                                    • Opcode ID: 335c3f3c8a0e05f5839a3b8562ab9f751be2bf2361413e739464e8ead2f72be9
                                    • Instruction ID: 03fd10ac50de1202267bfae5930d06ed0f63b87ea6e01dd6c59341b656d33967
                                    • Opcode Fuzzy Hash: 335c3f3c8a0e05f5839a3b8562ab9f751be2bf2361413e739464e8ead2f72be9
                                    • Instruction Fuzzy Hash: 8321BAB4A04208EBDB14CB98C981A9EB7F5EF48745F2480A8E818AF341D771EF81DB54
                                    APIs
                                    • EnterCriticalSection.KERNEL32(?,?,?,?,10001499,?,?,00000000,?,?,?), ref: 100034A7
                                    • SleepConditionVariableCS.KERNEL32(00000000,?,00000000), ref: 100034CB
                                    • LeaveCriticalSection.KERNEL32(?), ref: 100034D2
                                    • SleepConditionVariableCS.KERNEL32(00000000,?,000000FF), ref: 1000350E
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ConditionCriticalSectionSleepVariable$EnterLeave
                                    • String ID:
                                    • API String ID: 3020340620-0
                                    • Opcode ID: 05074beb6edb66eb96e78de5814604b12c6efd175baefdef2757970339633dab
                                    • Instruction ID: f135a66ef4c3fa2a34bb39291fcdf00077fd575a97a3f57769656b34936bebed
                                    • Opcode Fuzzy Hash: 05074beb6edb66eb96e78de5814604b12c6efd175baefdef2757970339633dab
                                    • Instruction Fuzzy Hash: 42110471500B558FE772CA58D9C4B5773E8FB007A6F51DE1DE4938A899C374F8888B21
                                    APIs
                                    • IsWindowVisible.USER32(?), ref: 1000ED07
                                    • _memset.LIBCMT ref: 1000ED30
                                    • SendMessageA.USER32(?,0000000D,00000400,00000000), ref: 1000ED4A
                                    • lstrlenA.KERNEL32(00000000), ref: 1000ED57
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: MessageSendVisibleWindow_memsetlstrlen
                                    • String ID:
                                    • API String ID: 1293396957-0
                                    • Opcode ID: c0acd891ebef83d26f17d4d1390c8d3953d1a4ad271df1068977982f2c5964a8
                                    • Instruction ID: 5b252e65773c6f6e6056f087db140e16ac5e3367f8d3fdb97bb4e1eeb390b3d9
                                    • Opcode Fuzzy Hash: c0acd891ebef83d26f17d4d1390c8d3953d1a4ad271df1068977982f2c5964a8
                                    • Instruction Fuzzy Hash: 7311B6F5A00205EBEB14DF60CD45BDA7368DF54340F0044A9FB09FB285EA75EA858B95
                                    APIs
                                    • EnterCriticalSection.KERNEL32(?), ref: 10003292
                                    • SleepConditionVariableCS.KERNEL32(?,?,000000FF), ref: 100032BD
                                    • EnterCriticalSection.KERNEL32(?), ref: 100032ED
                                    • WakeConditionVariable.KERNEL32(?), ref: 100032FA
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ConditionCriticalEnterSectionVariable$SleepWake
                                    • String ID:
                                    • API String ID: 1272541424-0
                                    • Opcode ID: d2ef4d3d3bece3ecb2957c56201156f867af3ba4ab4f7a9e8506c951494b066a
                                    • Instruction ID: d287fa8a1d97e4fb1d990ba0663406a79fc7a6a744e69c2c1aa7d7a44e5ccb06
                                    • Opcode Fuzzy Hash: d2ef4d3d3bece3ecb2957c56201156f867af3ba4ab4f7a9e8506c951494b066a
                                    • Instruction Fuzzy Hash: 2C115572100B159FE336DF68DCC485BB3F9FB44360B418E19E4A683A45CB30F8498B60
                                    APIs
                                    • PeekMessageA.USER32(1001C8E6,00000000,00000000,00000000,00000001), ref: 1001EB99
                                    • TranslateMessage.USER32(?), ref: 1001EBBE
                                    • DispatchMessageA.USER32(?), ref: 1001EBC4
                                    • PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 1001EBD6
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Message$Peek$DispatchTranslate
                                    • String ID:
                                    • API String ID: 1795658109-0
                                    • Opcode ID: 5f19f8642b326884221ac1f2436e0d1f5125d6a111024dfe36bdec5d200537f7
                                    • Instruction ID: 4683bdf92f3b324d92ef008ada9b145ce160014bd2fbc826a850825f78051344
                                    • Opcode Fuzzy Hash: 5f19f8642b326884221ac1f2436e0d1f5125d6a111024dfe36bdec5d200537f7
                                    • Instruction Fuzzy Hash: 0D018833A4421D67EB20DAD99CC1FEEF3ACEB44750F5005A2FE08EB1C0D6A5E94146A0
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CreateDirectory_memset_strlen_strncpy
                                    • String ID:
                                    • API String ID: 3994138041-0
                                    • Opcode ID: 5146f0f5f6924dacce34261d64f74e5090e561bcbd4e5be505613ef66d126bf7
                                    • Instruction ID: 101a95c8069f775dae9c248aff8c456d68721b5b320a68391b460c7f447a75fb
                                    • Opcode Fuzzy Hash: 5146f0f5f6924dacce34261d64f74e5090e561bcbd4e5be505613ef66d126bf7
                                    • Instruction Fuzzy Hash: CB1194B9D041189BCB10DB64DC81BDD77B8EF65304F0082E9E59D9B281DAB4EBD48F91
                                    APIs
                                      • Part of subcall function 10017520: _free.LIBCMT ref: 1001755A
                                    • HeapDestroy.KERNEL32(00000000,1A75B7EA,?,?,?,?,100359E3,000000FF), ref: 10016B70
                                    • HeapCreate.KERNEL32(00000001,?,?,1A75B7EA,?,?,?,?,100359E3,000000FF), ref: 10016B7F
                                    • _free.LIBCMT ref: 10016B8F
                                    • HeapDestroy.KERNEL32(?,?,?,?,?,100359E3,000000FF), ref: 10016BBD
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Heap$Destroy_free$Create
                                    • String ID:
                                    • API String ID: 3093871995-0
                                    • Opcode ID: 16e0c79affba40acb3f9a94d92ca98c28378774c059c7bd50a370be0c89aea4a
                                    • Instruction ID: d00498a318c3039bf53502062df662130d8b902564dd33ec98044163ccf8f0fc
                                    • Opcode Fuzzy Hash: 16e0c79affba40acb3f9a94d92ca98c28378774c059c7bd50a370be0c89aea4a
                                    • Instruction Fuzzy Hash: F71136B6904B149FD720CF69DC44B56BBF8FB08750F004A2DE89AC7651E775E944CB90
                                    APIs
                                    • ___BuildCatchObject.LIBCMT ref: 10026247
                                      • Part of subcall function 10026858: ___AdjustPointer.LIBCMT ref: 100268A1
                                    • _UnwindNestedFrames.LIBCMT ref: 1002625E
                                    • ___FrameUnwindToState.LIBCMT ref: 10026270
                                    • CallCatchBlock.LIBCMT ref: 10026294
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
                                    • String ID:
                                    • API String ID: 2633735394-0
                                    • Opcode ID: 6092b50bab1218cd8aabaab9e12c658e2e0f1782f2186364ed2301dcdcc7d9c1
                                    • Instruction ID: 780a5d68346db81fedf9f8d85dc8351bab79c3fb61c7619bb358afdc1328406f
                                    • Opcode Fuzzy Hash: 6092b50bab1218cd8aabaab9e12c658e2e0f1782f2186364ed2301dcdcc7d9c1
                                    • Instruction Fuzzy Hash: 88011732000109FBCF12CF95EC05EDA3BBAFF8C754F518115FA1865121C776E865ABA0
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                    • String ID:
                                    • API String ID: 3016257755-0
                                    • Opcode ID: 3c6a35542a271610c24967ae1addb0a5128256cd46e27c9700edfec13bdc5c5a
                                    • Instruction ID: c2eb68e8ade19565e9c0612c28aff17bdb070db1da49cc9352462dfe7f7478ea
                                    • Opcode Fuzzy Hash: 3c6a35542a271610c24967ae1addb0a5128256cd46e27c9700edfec13bdc5c5a
                                    • Instruction Fuzzy Hash: 1201407A40214EBBCF529E84EC51CDD3F72FB18294BA58415FE1858031C336DAB1AB91
                                    APIs
                                    • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 10015381
                                    • __beginthreadex.LIBCMT ref: 100153A3
                                    • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 100153B4
                                    • CloseHandle.KERNEL32(00000000), ref: 100153BE
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseCreateEventHandleObjectSingleWait__beginthreadex
                                    • String ID:
                                    • API String ID: 2993629242-0
                                    • Opcode ID: d7dcd88de3af4c7a17b78a3c7ea8846737ab5e00941b9493fb9a3973c1d0ec84
                                    • Instruction ID: 28439952cb9d60efeb8680ab5036a31f0774e1b625031860cf64c459a7230e8b
                                    • Opcode Fuzzy Hash: d7dcd88de3af4c7a17b78a3c7ea8846737ab5e00941b9493fb9a3973c1d0ec84
                                    • Instruction Fuzzy Hash: 9A111EB5A04249AFDB14DFA8CC81BEE7BB4EF49310F504249F919AB381D730AA40CB90
                                    APIs
                                    • __malloc_crt.LIBCMT ref: 10032807
                                    • std::exception::exception.LIBCMT ref: 10032821
                                    • __CxxThrowException@8.LIBCMT ref: 10032857
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Exception@8Throw__malloc_crtstd::exception::exception
                                    • String ID:
                                    • API String ID: 3183362523-0
                                    • Opcode ID: c060a18d73b796a30dd2a53eb01a138e769d2f3d535d15112ec57b6c053b814d
                                    • Instruction ID: 61d3b0669a0cbb4b249a077222c69809c774bd9a0b89fdd2f935691ba84154ea
                                    • Opcode Fuzzy Hash: c060a18d73b796a30dd2a53eb01a138e769d2f3d535d15112ec57b6c053b814d
                                    • Instruction Fuzzy Hash: AEF04F799002097ACB05DFA4D9859CDB7FCEA10284F80C056FD15AB141DB78E384CA91
                                    APIs
                                      • Part of subcall function 100174B0: HeapFree.KERNEL32(10016ACC,00000000,?,?,?,?,10016ACC,?,?,10016FF0), ref: 100174D5
                                      • Part of subcall function 100174B0: _free.LIBCMT ref: 100174EF
                                    • HeapDestroy.KERNEL32(00000000,?,?,10016FF0), ref: 10016AD3
                                    • HeapCreate.KERNEL32(?,?,?,?,?,10016FF0), ref: 10016AE2
                                    • _free.LIBCMT ref: 10016AF2
                                    • HeapDestroy.KERNEL32(?,10016FF0), ref: 10016B22
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Heap$Destroy_free$CreateFree
                                    • String ID:
                                    • API String ID: 4097506873-0
                                    • Opcode ID: 5821550070371558d6326ac293e511f2d9706211c5074b01848d33611e582a02
                                    • Instruction ID: 26b69236e6c287892c4b939c4df5092f0c49b63a1c7adf96395978ecd4ddac7a
                                    • Opcode Fuzzy Hash: 5821550070371558d6326ac293e511f2d9706211c5074b01848d33611e582a02
                                    • Instruction Fuzzy Hash: 07F01DB5200602AFEB05DF75DC48B46BBB8FF08345F404218E409CBA51DB35E4A5CBD0
                                    APIs
                                    • _memmove.LIBCMT ref: 1001BB2C
                                    • Concurrency::details::_Concurrent_queue_base_v4::_Internal_throw_exception.LIBCPMT ref: 1001BB66
                                      • Part of subcall function 1001ED68: std::exception::exception.LIBCMT ref: 1001ED7E
                                      • Part of subcall function 1001ED68: __CxxThrowException@8.LIBCMT ref: 1001ED93
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Concurrency::details::_Concurrent_queue_base_v4::_Exception@8Internal_throw_exceptionThrow_memmovestd::exception::exception
                                    • String ID: vector<T> too long
                                    • API String ID: 3224774664-3788999226
                                    • Opcode ID: 6098c6dfe018a0d1be71fac0227d1825c4ecc01241087ebe161bd52a6db14e3a
                                    • Instruction ID: eae54de508585d01ba0ea4a69c7d47a938ab1ba8a2878b9bbe041104eb365bc3
                                    • Opcode Fuzzy Hash: 6098c6dfe018a0d1be71fac0227d1825c4ecc01241087ebe161bd52a6db14e3a
                                    • Instruction Fuzzy Hash: 3C312876700A295BC714CEADDCC189ABB99EB88370724823AF918CB644D771F991C7D0
                                    APIs
                                    Strings
                                    • wmic cpu get processorid, xrefs: 100065E0
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: char_traitsconstruct
                                    • String ID: wmic cpu get processorid
                                    • API String ID: 489808500-2204115948
                                    • Opcode ID: 1010ae759fa7e10457475eff9b78d9461d1f2c37ab24339ddda26cbfa1624876
                                    • Instruction ID: dd645ee37d0e35d6a0c4dc76963d6f74060cdeeedd1d1d5c8c6965c7acc1db0f
                                    • Opcode Fuzzy Hash: 1010ae759fa7e10457475eff9b78d9461d1f2c37ab24339ddda26cbfa1624876
                                    • Instruction Fuzzy Hash: 01410F75E00209DFDB08CF98D891AEEB7B6FF4C750F208129E915A7385DB35A941CBA4
                                    APIs
                                    • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 10011461
                                    • DeleteFileA.KERNEL32(?), ref: 100114B6
                                      • Part of subcall function 10011580: _memset.LIBCMT ref: 100115CC
                                      • Part of subcall function 10011580: GetSystemDirectoryA.KERNEL32(00000000,00000104), ref: 100115E0
                                      • Part of subcall function 10011580: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000), ref: 10011647
                                      • Part of subcall function 10011580: GetFileSize.KERNEL32(000000FF,00000000), ref: 10011669
                                      • Part of subcall function 10011580: ReadFile.KERNEL32(000000FF,?,00000000,00000000,00000000), ref: 100116B4
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$DirectorySystem$CreateDeleteReadSize_memset
                                    • String ID: .key
                                    • API String ID: 3518743009-343438762
                                    • Opcode ID: eb43b5ddff7011dff6964891f9a77986a6cb4ad83d3904fe4c7462824836723d
                                    • Instruction ID: c5e3bf08ea98db34f13579d809896ca9d031d76340f358e502fc38b765e240d6
                                    • Opcode Fuzzy Hash: eb43b5ddff7011dff6964891f9a77986a6cb4ad83d3904fe4c7462824836723d
                                    • Instruction Fuzzy Hash: 9F31E675A0025C9BDB28CF64DC42BEEB7B9EB45310F5081A9F9059B281DB35AE85CB90
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _swscanf
                                    • String ID: %d.%d.%d.%d%c
                                    • API String ID: 2748852333-2398565245
                                    • Opcode ID: 18e54956b6ff5e5e5f09465d7c17339f29108a54fe6fde34eeeaabc51fafe8c6
                                    • Instruction ID: ed2d36106069c91f8a44cef8226e493977f524409a11eb0d6646e4ffefc909ba
                                    • Opcode Fuzzy Hash: 18e54956b6ff5e5e5f09465d7c17339f29108a54fe6fde34eeeaabc51fafe8c6
                                    • Instruction Fuzzy Hash: 37118232A001189BEB15DFA4D841AFE73BCEF19201F4101AEE90ADB151DB71EA848792
                                    APIs
                                    • FindWindowA.USER32(Shell_TrayWnd,00000000), ref: 1000F5EB
                                    • MessageBoxA.USER32(00000000), ref: 1000F5F2
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: FindMessageWindow
                                    • String ID: Shell_TrayWnd
                                    • API String ID: 2823233367-2988720461
                                    • Opcode ID: fa6ae15565b281fa731f87bbf66bd491b581fbd42e31be7702e6434cd4fda3cb
                                    • Instruction ID: 8a2575e9232a4e6788a4e3303b54ed8dbf7533174b6017679d5c7ff6e03b4625
                                    • Opcode Fuzzy Hash: fa6ae15565b281fa731f87bbf66bd491b581fbd42e31be7702e6434cd4fda3cb
                                    • Instruction Fuzzy Hash: 240116B4D00208EFEB10CFA4D949B9EB7F4FB48341F2084A9E905A7394D675AF40AB54
                                    APIs
                                    • _memset.LIBCMT ref: 1001214F
                                    • GlobalMemoryStatusEx.KERNEL32(00000040), ref: 10012162
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: GlobalMemoryStatus_memset
                                    • String ID: @
                                    • API String ID: 587104284-2766056989
                                    • Opcode ID: d7d7f9b0b0953cb5caef1f62c0310114e2340016ed59b2748a12603957ba9fb6
                                    • Instruction ID: 3d7f5f32418326eb2dbc6e30da0d634f8bec6cfce8173ea13a502be2592b4bca
                                    • Opcode Fuzzy Hash: d7d7f9b0b0953cb5caef1f62c0310114e2340016ed59b2748a12603957ba9fb6
                                    • Instruction Fuzzy Hash: 20F06DB0A10208ABDB14DFA4C941B9DBBF8EF18300F50412CE909EB381DB34EA45CB80
                                    APIs
                                    • _memset.LIBCMT ref: 1000F3D5
                                    • wsprintfA.USER32 ref: 1000F3ED
                                      • Part of subcall function 1000F630: _memset.LIBCMT ref: 1000F648
                                      • Part of subcall function 1000F630: CreateProcessA.KERNEL32(00000000,1000F402,00000000,00000000,00000001,08000020,00000000,00000000,00000044,00000000), ref: 1000F686
                                      • Part of subcall function 1000F630: WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 1000F696
                                      • Part of subcall function 1000F630: CloseHandle.KERNEL32(00000000), ref: 1000F6A0
                                      • Part of subcall function 1000F630: CloseHandle.KERNEL32(?), ref: 1000F6AA
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseHandle_memset$CreateObjectProcessSingleWaitwsprintf
                                    • String ID: taskkill /f /t /im %s
                                    • API String ID: 1221303216-1431264914
                                    • Opcode ID: e147f47295d6159a0972dd24f2dc00c959dda93d6aa0ae33a39929a26f1210c1
                                    • Instruction ID: 7a26d32dd3a77ef8c91e8ca8fb8e6281576ca4a882f0339c21baba38ccc25a09
                                    • Opcode Fuzzy Hash: e147f47295d6159a0972dd24f2dc00c959dda93d6aa0ae33a39929a26f1210c1
                                    • Instruction Fuzzy Hash: 33F05475E00108ABDF10DBA4DD46BA973B8EF54204F4040A8F94DDB182EE75BB58CB91
                                    APIs
                                    • EnterCriticalSection.KERNEL32(00000054,?,00000000), ref: 1001BC70
                                    • SetLastError.KERNEL32(00000000), ref: 1001BC7F
                                    • LeaveCriticalSection.KERNEL32(00000054), ref: 1001BCA7
                                    • HeapFree.KERNEL32(?,00000000,?,?), ref: 1001BD36
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalSection$EnterErrorFreeHeapLastLeave
                                    • String ID:
                                    • API String ID: 132244544-0
                                    • Opcode ID: 5ee7b2dd0110e595599aec328bd6a18fa6e2e8a676dff69a3f1635a7451a1511
                                    • Instruction ID: 85bd10d27e0b442e1dab5c9d78a6aaa91c45580178b632b1c4d7f06aa4383219
                                    • Opcode Fuzzy Hash: 5ee7b2dd0110e595599aec328bd6a18fa6e2e8a676dff69a3f1635a7451a1511
                                    • Instruction Fuzzy Hash: 90418E75A00649AFDB14CFA8D884BAEB7F8FF48350F10052AED05DB351DB35E9808B91
                                    APIs
                                    • SetLastError.KERNEL32(0000139F,1A75B7EA,?,?,?,?,0000000F,10035F78,000000FF,?,1001CE86), ref: 1001CED9
                                    • EnterCriticalSection.KERNEL32(?,1A75B7EA,?,?,?,?,0000000F,10035F78,000000FF,?,1001CE86), ref: 1001CF09
                                    • LeaveCriticalSection.KERNEL32(?,?,?,?,0000000F,10035F78,000000FF,?,1001CE86), ref: 1001CF3A
                                    • SetLastError.KERNEL32(00000057,1A75B7EA,?,?,?,?,0000000F,10035F78,000000FF,?,1001CE86), ref: 1001CF6A
                                    Memory Dump Source
                                    • Source File: 00000004.00000002.3007906861.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000004.00000002.3007867521.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3007965752.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000004.00000002.3008143605.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_4_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalErrorLastSection$EnterLeave
                                    • String ID:
                                    • API String ID: 2124651672-0
                                    • Opcode ID: 5a7bbe1e01743a2055287aad97c0971164d7a590c1f1937ca8fb7b3f6b1a058c
                                    • Instruction ID: 7325f94427708edb1f6ad39a4a2f2957c0187faf522ed9944e05cc5fe4afe9c1
                                    • Opcode Fuzzy Hash: 5a7bbe1e01743a2055287aad97c0971164d7a590c1f1937ca8fb7b3f6b1a058c
                                    • Instruction Fuzzy Hash: B0218932A04248EFDB11CF58CC84F9ABBBAFB89761F10466EE8149A291D735D981CB50

                                    Execution Graph

                                    Execution Coverage:2%
                                    Dynamic/Decrypted Code Coverage:98.5%
                                    Signature Coverage:0%
                                    Total number of Nodes:457
                                    Total number of Limit Nodes:8
                                    execution_graph 24152 10013a20 24214 1000da40 24152->24214 24154 10013ab9 24155 10013ac2 IsUserAnAdmin 24154->24155 24156 10013aec 24154->24156 24155->24156 24159 10013acc 24155->24159 24157 10013b05 24156->24157 24239 10012260 6 API calls 24156->24239 24162 10013b77 24157->24162 24163 10013b0e _memset 24157->24163 24158 10013a42 _memset 24158->24154 24232 10022e79 24158->24232 24164 10013ae2 24159->24164 24165 10013ad5 ReleaseMutex 24159->24165 24241 10009ae0 InitializeCriticalSection 24162->24241 24171 10013b21 GetModuleFileNameA 24163->24171 24238 100118d0 72 API calls 2 library calls 24164->24238 24165->24164 24166 10013afa 24166->24157 24174 10022bd3 70 API calls 24166->24174 24170 10013ab2 24235 10022bd3 24170->24235 24240 10022df7 108 API calls 3 library calls 24171->24240 24172 10013b7c 24177 10013bc9 24172->24177 24242 10013240 11 API calls 24172->24242 24173 10013ae9 24173->24156 24174->24157 24181 10013be6 24177->24181 24182 10013bf9 24177->24182 24190 10013bf4 _strlen 24177->24190 24179 10013b53 DeleteFileA MoveFileA 24179->24162 24180 10013b8f 24184 10013ba1 24180->24184 24243 10013260 11 API calls 24180->24243 24185 10013c1b 24181->24185 24186 10013bef 24181->24186 24245 10006080 24182->24245 24244 10015350 96 API calls 2 library calls 24184->24244 24250 100137c0 8 API calls 3 library calls 24185->24250 24254 1001f13f 110 API calls 7 library calls 24186->24254 24195 10013ce4 24190->24195 24255 100132c0 239 API calls 2 library calls 24190->24255 24193 10013b9d 24193->24177 24193->24184 24194 10013c20 24197 10013c24 24194->24197 24198 10013c68 24194->24198 24256 100132c0 239 API calls 2 library calls 24195->24256 24196 10013c13 24196->24190 24251 1001f13f 110 API calls 7 library calls 24197->24251 24252 1001f13f 110 API calls 7 library calls 24198->24252 24202 10013bc6 24202->24177 24205 10013cfb 24257 1001ffa4 24205->24257 24206 10013c2e StartServiceCtrlDispatcherA 24209 10013c93 WSAStartup 24206->24209 24207 10013c72 24253 10012550 99 API calls 5 library calls 24207->24253 24209->24190 24211 10013d08 24212 10013c89 24213 10022bd3 70 API calls 24212->24213 24213->24209 24215 1000da70 type_info::name 24214->24215 24264 1000cfc0 24215->24264 24217 1000da85 type_info::name 24286 1000d420 24217->24286 24221 1000dab1 _Copy_impl 24222 1000dadf _Copy_impl 24221->24222 24311 1000de50 24221->24311 24317 1000d890 CryptAcquireContextA 24222->24317 24229 1000db00 codecvt 24230 1001ffa4 __write_nolock 6 API calls 24229->24230 24231 1000db33 24230->24231 24231->24158 24489 100287c6 24232->24489 24234 10013a8b CreateMutexA GetLastError 24234->24154 24234->24170 24511 10022aa4 24235->24511 24237 10022be2 24237->24154 24238->24173 24239->24166 24240->24179 24241->24172 24242->24180 24243->24193 24244->24202 24246 10006091 construct codecvt type_info::name 24245->24246 24544 10006b60 24246->24544 24249 100138f0 112 API calls 5 library calls 24249->24196 24250->24194 24251->24206 24252->24207 24253->24212 24254->24190 24255->24195 24256->24205 24258 1001ffac 24257->24258 24259 1001ffae IsProcessorFeaturePresent 24257->24259 24258->24211 24261 10022c38 24259->24261 24557 10022be7 5 API calls ___raise_securityfailure 24261->24557 24263 10022d1b 24263->24211 24265 1000cfdb __write_nolock 24264->24265 24266 10006080 71 API calls 24265->24266 24267 1000d01b _memset type_info::name 24266->24267 24268 1000d0b6 CreatePipe 24267->24268 24269 1000d126 GetStartupInfoA CreateProcessA 24268->24269 24285 1000d121 CloseHandle CloseHandle CloseHandle CloseHandle 24268->24285 24271 1000d198 WaitForSingleObject ReadFile 24269->24271 24269->24285 24272 1000d1e0 24271->24272 24271->24285 24334 1000cfa0 71 API calls 24272->24334 24274 1000d3e2 codecvt 24275 1001ffa4 __write_nolock 6 API calls 24274->24275 24276 1000d411 24275->24276 24276->24217 24277 1000d1fc _Copy_impl 24277->24285 24335 1000dde0 71 API calls 24277->24335 24279 1000d251 24336 10006250 71 API calls 5 library calls 24279->24336 24281 1000d269 _memset codecvt 24337 1000cf40 70 API calls __setenvp 24281->24337 24283 1000d2a2 _memset _Copy_impl 24338 1000cfa0 71 API calls 24283->24338 24285->24274 24287 1000d43b __write_nolock 24286->24287 24288 10006080 71 API calls 24287->24288 24289 1000d47a _memset type_info::name 24288->24289 24290 1000d515 CreatePipe 24289->24290 24291 1000d585 GetStartupInfoA CreateProcessA 24290->24291 24293 1000d580 CloseHandle CloseHandle CloseHandle CloseHandle 24290->24293 24291->24293 24294 1000d5f7 WaitForSingleObject ReadFile 24291->24294 24297 1000d841 codecvt 24293->24297 24294->24293 24295 1000d63f 24294->24295 24339 1000cfa0 71 API calls 24295->24339 24298 1001ffa4 __write_nolock 6 API calls 24297->24298 24299 1000d870 24298->24299 24308 10007bf0 24299->24308 24300 1000d65b _Copy_impl 24300->24293 24340 1000dde0 71 API calls 24300->24340 24302 1000d6b0 24341 10006250 71 API calls 5 library calls 24302->24341 24304 1000d6c8 _memset codecvt 24342 1000cf40 70 API calls __setenvp 24304->24342 24307 1000d701 _memset _Copy_impl 24343 1000cfa0 71 API calls 24307->24343 24344 10007c10 24308->24344 24310 10007c07 24310->24221 24355 10021e65 GetSystemTimeAsFileTime 24311->24355 24313 1000dac7 24314 1000de30 24313->24314 24357 10021dfa 24314->24357 24318 1000d8c0 GetLastError 24317->24318 24319 1000d8d1 CryptCreateHash 24317->24319 24320 1000da31 24318->24320 24321 1000d908 CryptHashData 24319->24321 24322 1000d8eb GetLastError CryptReleaseContext 24319->24322 24323 1001ffa4 __write_nolock 6 API calls 24320->24323 24324 1000d920 GetLastError CryptDestroyHash CryptReleaseContext 24321->24324 24325 1000d947 CryptGetHashParam 24321->24325 24322->24320 24326 1000da3b 24323->24326 24324->24320 24488 1001ef69 24325->24488 24326->24229 24333 1000db40 71 API calls char_traits 24333->24222 24334->24277 24335->24279 24336->24281 24337->24283 24338->24285 24339->24300 24340->24302 24341->24304 24342->24307 24343->24293 24345 10007c21 _Copy_impl 24344->24345 24346 10007c2e _Copy_impl 24345->24346 24352 100069d0 71 API calls codecvt 24345->24352 24348 10007c60 24346->24348 24353 10010b70 71 API calls std::ios_base::clear 24346->24353 24351 10007c80 std::ios_base::clear char_traits 24348->24351 24354 100067d0 71 API calls 2 library calls 24348->24354 24351->24310 24352->24346 24353->24348 24354->24351 24356 10021e93 __aulldiv 24355->24356 24356->24313 24358 10021e11 24357->24358 24359 10021e2f 24357->24359 24405 100258dc 70 API calls __getptd_noexit 24358->24405 24360 10021e49 24359->24360 24363 10021e3c 24359->24363 24372 10026fe8 24360->24372 24362 10021e16 24406 10024a04 9 API calls __write_nolock 24362->24406 24407 100258dc 70 API calls __getptd_noexit 24363->24407 24367 10021e53 24368 10021e21 24367->24368 24408 10026dea 70 API calls 3 library calls 24367->24408 24370 1001ffa4 __write_nolock 6 API calls 24368->24370 24371 1000dad3 24370->24371 24371->24333 24373 10027003 24372->24373 24374 10027019 _memset 24372->24374 24417 100258dc 70 API calls __getptd_noexit 24373->24417 24374->24373 24380 10027030 24374->24380 24376 10027008 24418 10024a04 9 API calls __write_nolock 24376->24418 24378 1002703b 24419 100258dc 70 API calls __getptd_noexit 24378->24419 24379 10027059 24409 1002ce25 24379->24409 24380->24378 24380->24379 24383 1002705e 24420 1002cb7e 70 API calls __write_nolock 24383->24420 24385 10027067 24386 10027255 24385->24386 24421 1002cba8 70 API calls __write_nolock 24385->24421 24434 10024a14 8 API calls 2 library calls 24386->24434 24389 1002725f 24390 10027079 24390->24386 24422 1002cbd2 24390->24422 24392 1002708b 24392->24386 24393 10027094 24392->24393 24394 1002710b 24393->24394 24396 100270a7 24393->24396 24432 1002cbfc 70 API calls 4 library calls 24394->24432 24429 1002cbfc 70 API calls 4 library calls 24396->24429 24398 10027112 24404 10027012 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 24398->24404 24433 1002ce75 70 API calls 3 library calls 24398->24433 24399 100270bf 24399->24404 24430 1002ce75 70 API calls 3 library calls 24399->24430 24402 100270d8 24402->24404 24431 1002cbfc 70 API calls 4 library calls 24402->24431 24404->24367 24405->24362 24406->24368 24407->24368 24408->24368 24410 1002ce31 ___DllMainCRTStartup 24409->24410 24411 1002ce66 ___DllMainCRTStartup 24410->24411 24435 10027ff1 24410->24435 24411->24383 24413 1002ce54 24473 1002ce6c LeaveCriticalSection _doexit 24413->24473 24414 1002ce41 24414->24413 24442 1002d09f 24414->24442 24417->24376 24418->24404 24419->24404 24420->24385 24421->24390 24423 1002cbf1 24422->24423 24424 1002cbdc 24422->24424 24423->24392 24486 100258dc 70 API calls __getptd_noexit 24424->24486 24426 1002cbe1 24487 10024a04 9 API calls __write_nolock 24426->24487 24428 1002cbec 24428->24392 24429->24399 24430->24402 24431->24404 24432->24398 24433->24404 24434->24389 24436 10028002 24435->24436 24437 10028015 EnterCriticalSection 24435->24437 24474 10028079 70 API calls 8 library calls 24436->24474 24437->24414 24439 10028008 24439->24437 24475 10022950 70 API calls 3 library calls 24439->24475 24443 1002d0ab ___DllMainCRTStartup 24442->24443 24444 10027ff1 __lock 70 API calls 24443->24444 24445 1002d0c6 __tzset_nolock 24444->24445 24446 1002cbd2 __tzset_nolock 70 API calls 24445->24446 24447 1002d0db 24446->24447 24463 1002d17a __tzset_nolock 24447->24463 24476 1002cb7e 70 API calls __write_nolock 24447->24476 24450 1002d0ed 24450->24463 24477 1002cba8 70 API calls __write_nolock 24450->24477 24451 1002d1c6 GetTimeZoneInformation 24451->24463 24454 1002d0ff 24454->24463 24478 1002dd2f 78 API calls 2 library calls 24454->24478 24456 1002d230 WideCharToMultiByte 24456->24463 24457 1002d10d 24479 1002f6f1 101 API calls 3 library calls 24457->24479 24458 1002d268 WideCharToMultiByte 24458->24463 24461 1002d161 _strlen 24481 1002476a 70 API calls _malloc 24461->24481 24462 1002d12e __tzset_nolock 24462->24461 24462->24463 24467 1002d15b 24462->24467 24463->24451 24463->24456 24463->24458 24464 1002d3b1 __tzset_nolock ___DllMainCRTStartup 24463->24464 24465 10023218 70 API calls __tzset_nolock 24463->24465 24472 1002f6dd 83 API calls __tzset_nolock 24463->24472 24483 10024a14 8 API calls 2 library calls 24463->24483 24484 1002043c 70 API calls 2 library calls 24463->24484 24485 1002d331 LeaveCriticalSection _doexit 24463->24485 24464->24413 24465->24463 24480 1002043c 70 API calls 2 library calls 24467->24480 24469 1002d16f _strlen 24469->24463 24482 10021da5 70 API calls __write_nolock 24469->24482 24471 1002d19b 24471->24463 24472->24463 24473->24411 24474->24439 24476->24450 24477->24454 24478->24457 24479->24462 24480->24461 24481->24469 24482->24471 24483->24463 24484->24463 24485->24463 24486->24426 24487->24428 24490 100287e4 24489->24490 24491 100287cf 24489->24491 24492 10028825 24490->24492 24494 100287f2 24490->24494 24505 100258dc 70 API calls __getptd_noexit 24491->24505 24509 100258dc 70 API calls __getptd_noexit 24492->24509 24507 100286fe 103 API calls 2 library calls 24494->24507 24496 100287d4 24506 10024a04 9 API calls __write_nolock 24496->24506 24499 1002881d 24510 10024a04 9 API calls __write_nolock 24499->24510 24500 100287df 24500->24234 24501 10028809 24503 10028835 24501->24503 24508 100258dc 70 API calls __getptd_noexit 24501->24508 24503->24234 24505->24496 24506->24500 24507->24501 24508->24499 24509->24499 24510->24503 24512 10022ab0 ___DllMainCRTStartup 24511->24512 24513 10027ff1 __lock 63 API calls 24512->24513 24514 10022ab7 24513->24514 24515 10022b70 __initterm 24514->24515 24516 10022ae5 DecodePointer 24514->24516 24531 10022bbe 24515->24531 24516->24515 24518 10022afc DecodePointer 24516->24518 24525 10022b0c 24518->24525 24520 10022bcd ___DllMainCRTStartup 24520->24237 24522 10022b19 EncodePointer 24522->24525 24523 10022bb5 24536 10022833 24523->24536 24525->24515 24525->24522 24527 10022b29 DecodePointer EncodePointer 24525->24527 24529 10022b3b DecodePointer DecodePointer 24527->24529 24529->24525 24532 10022bc4 24531->24532 24533 10022b9e 24531->24533 24539 10028155 LeaveCriticalSection 24532->24539 24533->24520 24535 10028155 LeaveCriticalSection 24533->24535 24535->24523 24540 10022801 GetModuleHandleExW 24536->24540 24539->24533 24541 10022831 ExitProcess 24540->24541 24542 1002281a GetProcAddress 24540->24542 24542->24541 24543 1002282c 24542->24543 24543->24541 24545 10006b70 char_traits 24544->24545 24548 10006b90 24545->24548 24547 100060b2 24547->24249 24549 10006ba3 _Copy_impl 24548->24549 24550 10006bca 24549->24550 24551 10006baa std::ios_base::clear 24549->24551 24556 100067d0 71 API calls 2 library calls 24550->24556 24555 10006ab0 71 API calls 3 library calls 24551->24555 24554 10006bc8 std::ios_base::clear char_traits 24554->24547 24555->24554 24556->24554 24557->24263 24558 10023ba7 24559 10023bb0 24558->24559 24560 10023bb5 24558->24560 24572 1002a1a0 GetSystemTimeAsFileTime GetCurrentThreadId GetTickCount64 QueryPerformanceCounter 24559->24572 24564 10023bca 24560->24564 24563 10023bc3 24565 10023bd6 ___DllMainCRTStartup 24564->24565 24569 10023c24 ___DllMainCRTStartup 24565->24569 24571 10023c81 ___DllMainCRTStartup 24565->24571 24573 10023a3b 24565->24573 24567 10023c5e 24568 10023a3b __CRT_INIT@12 130 API calls 24567->24568 24567->24571 24568->24571 24569->24567 24570 10023a3b __CRT_INIT@12 130 API calls 24569->24570 24569->24571 24570->24567 24571->24563 24572->24560 24574 10023a47 ___DllMainCRTStartup 24573->24574 24575 10023ac3 24574->24575 24576 10023a4f 24574->24576 24577 10023ac7 24575->24577 24578 10023b2c 24575->24578 24621 10026dcd GetProcessHeap 24576->24621 24583 10023ae8 24577->24583 24619 10023a58 ___DllMainCRTStartup __CRT_INIT@12 24577->24619 24697 1002296c 70 API calls _doexit 24577->24697 24580 10023b31 24578->24580 24581 10023b8f 24578->24581 24702 10028186 FlsGetValue 24580->24702 24581->24619 24707 10025c6e 79 API calls 2 library calls 24581->24707 24582 10023a54 24582->24619 24622 10025dd7 24582->24622 24698 10022849 73 API calls _free 24583->24698 24587 10023b3c 24590 10023b41 24587->24590 24587->24619 24703 10024720 70 API calls __calloc_impl 24590->24703 24591 10023aed 24594 10023afe __CRT_INIT@12 24591->24594 24699 10029e40 71 API calls _free 24591->24699 24592 10023a64 __RTC_Initialize 24599 10023a74 GetCommandLineA 24592->24599 24592->24619 24701 10023b17 73 API calls __mtterm 24594->24701 24596 10023b4d 24596->24619 24704 10028194 FlsSetValue 24596->24704 24598 10023af9 24700 10025e4d 73 API calls 2 library calls 24598->24700 24643 1002a23a GetEnvironmentStringsW 24599->24643 24603 10023b65 24605 10023b83 24603->24605 24606 10023b6b 24603->24606 24604 10023a84 __ioinit0 24656 10029e92 24604->24656 24706 1002043c 70 API calls 2 library calls 24605->24706 24705 10025d2b 70 API calls 4 library calls 24606->24705 24609 10023b73 GetCurrentThreadId 24609->24619 24610 10023b89 24610->24619 24613 10023aa7 24613->24619 24695 10029e40 71 API calls _free 24613->24695 24616 10023abc 24696 10025e4d 73 API calls 2 library calls 24616->24696 24619->24569 24621->24582 24708 10022a20 EncodePointer EncodePointer __init_pointers __initp_misc_winsig 24622->24708 24624 10025ddc 24709 10028120 InitializeCriticalSectionAndSpinCount 24624->24709 24626 10025de1 24627 10025de5 24626->24627 24711 1002816a FlsAlloc 24626->24711 24710 10025e4d 73 API calls 2 library calls 24627->24710 24630 10025dea 24630->24592 24631 10025df7 24631->24627 24632 10025e02 24631->24632 24712 10024720 70 API calls __calloc_impl 24632->24712 24634 10025e0f 24635 10025e44 24634->24635 24713 10028194 FlsSetValue 24634->24713 24715 10025e4d 73 API calls 2 library calls 24635->24715 24638 10025e49 24638->24592 24639 10025e23 24639->24635 24640 10025e29 24639->24640 24714 10025d2b 70 API calls 4 library calls 24640->24714 24642 10025e31 GetCurrentThreadId 24642->24592 24645 1002a24d 24643->24645 24649 1002a2c0 24643->24649 24644 1002a265 WideCharToMultiByte 24646 1002a280 24644->24646 24647 1002a2b7 FreeEnvironmentStringsW 24644->24647 24645->24644 24645->24645 24716 1002476a 70 API calls _malloc 24646->24716 24647->24649 24649->24604 24650 1002a286 24650->24647 24651 1002a28d WideCharToMultiByte 24650->24651 24652 1002a2a3 24651->24652 24653 1002a2ac FreeEnvironmentStringsW 24651->24653 24717 1002043c 70 API calls 2 library calls 24652->24717 24653->24649 24655 1002a2a9 24655->24653 24657 10029ea0 24656->24657 24658 10029ea5 GetModuleFileNameA 24656->24658 24724 1002762f 96 API calls __setmbcp 24657->24724 24659 10029ed2 24658->24659 24718 10029f43 24659->24718 24663 10023a93 24663->24613 24669 1002a0bf 24663->24669 24664 10029f05 24725 1002476a 70 API calls _malloc 24664->24725 24666 10029f0b 24666->24663 24667 10029f43 _parse_cmdline 80 API calls 24666->24667 24668 10029f25 24667->24668 24668->24663 24670 1002a0c8 24669->24670 24675 1002a0cd _strlen 24669->24675 24728 1002762f 96 API calls __setmbcp 24670->24728 24672 10023a9c 24672->24613 24687 1002297b 24672->24687 24673 1002a0f8 24729 10024720 70 API calls __calloc_impl 24673->24729 24675->24672 24675->24673 24676 1002a155 24732 1002043c 70 API calls 2 library calls 24676->24732 24678 1002a161 24678->24672 24680 1002a17c 24733 1002043c 70 API calls 2 library calls 24680->24733 24683 1002a103 _strlen 24683->24672 24683->24676 24683->24680 24684 1002a193 24683->24684 24730 10024720 70 API calls __calloc_impl 24683->24730 24731 10021da5 70 API calls __write_nolock 24683->24731 24734 10024a14 8 API calls 2 library calls 24684->24734 24686 1002a19f 24688 10022987 __IsNonwritableInCurrentImage 24687->24688 24735 10028361 24688->24735 24690 100229a5 __initterm_e 24693 100229e2 __IsNonwritableInCurrentImage 24690->24693 24738 1001f115 24690->24738 24692 100229c6 24692->24693 24741 10036500 24692->24741 24693->24613 24695->24616 24696->24619 24697->24583 24698->24591 24699->24598 24700->24594 24701->24619 24702->24587 24703->24596 24704->24603 24705->24609 24706->24610 24707->24619 24708->24624 24709->24626 24710->24630 24711->24631 24712->24634 24713->24639 24714->24642 24715->24638 24716->24650 24717->24655 24720 10029f65 24718->24720 24722 10029fc9 24720->24722 24726 1002efd3 80 API calls x_ismbbtype_l 24720->24726 24721 10029ee8 24721->24663 24721->24664 24722->24721 24727 1002efd3 80 API calls x_ismbbtype_l 24722->24727 24724->24658 24725->24666 24726->24720 24727->24722 24728->24675 24729->24683 24730->24683 24731->24683 24732->24678 24733->24678 24734->24686 24736 10028364 EncodePointer 24735->24736 24736->24736 24737 1002837e 24736->24737 24737->24690 24748 1001f01f 24738->24748 24740 1001f120 24740->24692 24782 100241b0 24741->24782 24743 10036518 WSAStartup 24744 1001f115 _Error_objects 80 API calls 24743->24744 24745 10036533 24744->24745 24746 1001ffa4 __write_nolock 6 API calls 24745->24746 24747 10036543 24746->24747 24747->24692 24749 1001f02b ___DllMainCRTStartup 24748->24749 24756 10022a92 24749->24756 24755 1001f04e ___DllMainCRTStartup 24755->24740 24757 10027ff1 __lock 70 API calls 24756->24757 24758 1001f030 24757->24758 24759 1001f05f DecodePointer DecodePointer 24758->24759 24760 1001f08c 24759->24760 24761 1001f03c 24759->24761 24760->24761 24775 100246ef 71 API calls __write_nolock 24760->24775 24772 1001f059 24761->24772 24763 1001f09e 24764 1001f0ef EncodePointer EncodePointer 24763->24764 24765 1001f0c9 24763->24765 24766 1001f0bc 24763->24766 24764->24761 24765->24761 24767 1001f0c3 24765->24767 24776 100247b3 74 API calls __realloc_crt 24766->24776 24767->24765 24770 1001f0dd EncodePointer 24767->24770 24777 100247b3 74 API calls __realloc_crt 24767->24777 24770->24764 24771 1001f0d7 24771->24761 24771->24770 24778 10022a9b 24772->24778 24775->24763 24776->24767 24777->24771 24781 10028155 LeaveCriticalSection 24778->24781 24780 1001f05e 24780->24755 24781->24780 24783 6c696740 24784 6c6968bd 24783->24784 24785 6c696af6 VirtualAlloc 24784->24785 24786 6c69698f VirtualAlloc 24784->24786 24787 6c696a76 24784->24787 24788 6c696b75 _memmove 24784->24788 24785->24788 24789 6c696a51 _memset 24786->24789 24787->24785 24789->24787

                                    Control-flow Graph

                                    APIs
                                    • _memset.LIBCMT ref: 10013A60
                                    • swprintf.LIBCMT ref: 10013A86
                                    • CreateMutexA.KERNELBASE(00000000,00000000,00000000), ref: 10013A99
                                    • GetLastError.KERNEL32 ref: 10013AA5
                                      • Part of subcall function 10022BD3: _doexit.LIBCMT ref: 10022BDD
                                      • Part of subcall function 100138F0: _memset.LIBCMT ref: 10013918
                                      • Part of subcall function 100138F0: RegOpenKeyExA.ADVAPI32(80000001,101AFE40,00000000,00020006,?), ref: 10013944
                                      • Part of subcall function 100138F0: _sprintf.LIBCMT ref: 1001397C
                                      • Part of subcall function 100138F0: _strlen.LIBCMT ref: 1001398B
                                      • Part of subcall function 100138F0: RegSetValueExA.ADVAPI32(?,00000000,00000000,00000001,00000000,?), ref: 100139D7
                                      • Part of subcall function 100138F0: RegCloseKey.ADVAPI32(?), ref: 100139EA
                                    • IsUserAnAdmin.SHELL32 ref: 10013AC2
                                    • ReleaseMutex.KERNEL32(00000000), ref: 10013ADC
                                    • _memset.LIBCMT ref: 10013B1C
                                    • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 10013B32
                                    • _sprintf.LIBCMT ref: 10013B4E
                                    • DeleteFileA.KERNEL32(?), ref: 10013B5D
                                    • MoveFileA.KERNEL32(?,?), ref: 10013B71
                                    • _wprintf.LIBCMT ref: 10013CAC
                                    • _strlen.LIBCMT ref: 10013CB9
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File_memset$Mutex_sprintf_strlen$AdminCloseCreateDeleteErrorLastModuleMoveNameOpenReleaseUserValue_doexit_wprintfswprintf
                                    • String ID: %s%s$%s:%hd$206.238.77.142$206.238.77.142$C:\Users\Public\Documents\$Eaiawk mgqwgoywasgymoeeuu$EnOperationMode Error !$RunService !$TMzsft xtnogaqk$Windows Update$Yyickg caosusmk$service_is_exist !
                                    • API String ID: 2228167989-1563067711
                                    • Opcode ID: 2fc02c7820abb1e6e7b02b1e9042d30205a633eb3f33f25fe0a671c5299acd93
                                    • Instruction ID: 8ce7a2c48d05da8e1d18419a98124d55002a878a035d7289134c72219816da3c
                                    • Opcode Fuzzy Hash: 2fc02c7820abb1e6e7b02b1e9042d30205a633eb3f33f25fe0a671c5299acd93
                                    • Instruction Fuzzy Hash: CB61ECB5944314AAE721D7A08C87BE977B8EF00741F804099F6496D5D3EB78DAC4CBA2

                                    Control-flow Graph

                                    APIs
                                    • CryptAcquireContextA.ADVAPI32(00000000,00000000,00000000,00000001,F0000000), ref: 1000D8B6
                                    • GetLastError.KERNEL32 ref: 1000D8C0
                                    • CryptCreateHash.ADVAPI32(00000000,00000000,00000000,00000000,?), ref: 1000D8E1
                                    • GetLastError.KERNEL32 ref: 1000D8EB
                                    • CryptReleaseContext.ADVAPI32(00000000,00000000), ref: 1000D8FA
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Crypt$ContextErrorLast$AcquireCreateHashRelease
                                    • String ID: %02X
                                    • API String ID: 4104741015-436463671
                                    • Opcode ID: 783f6aeacaf77bddf85f865987ab6f2245b3743a8a3a9c8136557c6450919572
                                    • Instruction ID: e6624ba5d8ed9705aec1f79a9e38e76f649a0541b50efeb1c6887bd17401cf19
                                    • Opcode Fuzzy Hash: 783f6aeacaf77bddf85f865987ab6f2245b3743a8a3a9c8136557c6450919572
                                    • Instruction Fuzzy Hash: AE51C5B5A00219EFEB14DFA4CC85BEEB7B4FB48300F108559FA15AB295D778A940CF61
                                    APIs
                                    • NtQueryInformationProcess.NTDLL(-00000001,00000022,033A26FB,00000004,00000000), ref: 033A0A8A
                                    • NtSetInformationProcess.NTDLL(-00000001,00000022,?,00000004,033A09F7,0000005D), ref: 033A0AAA
                                    • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004,00000004,033A09F7,0000005D), ref: 033A0ACC
                                    • wsprintfA.USER32(?,?,?,?), ref: 033A0B74
                                    • MessageBoxA.USER32(00000000,?,?,00000010), ref: 033A0B8C
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000003.2149767299.00000000033A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_3_33a0000_rundll32.jbxd
                                    Similarity
                                    • API ID: InformationProcess$AllocMessageQueryVirtualwsprintf
                                    • String ID: Application error$SWVU$The procedure %s could not be located in the DLL %s.
                                    • API String ID: 2902211186-4283279704
                                    • Opcode ID: de0e8ee88c8a98f7b8a38ace4394a491acda8513ba92f7ded7199e416edf0d91
                                    • Instruction ID: a1ae5263fca18ae43e41f367c8cc3594420918898d3b1a05ac0a29e9e77fd424
                                    • Opcode Fuzzy Hash: de0e8ee88c8a98f7b8a38ace4394a491acda8513ba92f7ded7199e416edf0d91
                                    • Instruction Fuzzy Hash: 9041C272641B469FEB39DF28CC94FABB3A8EF04785F044528EE459B284DB70E914CB50
                                    APIs
                                    • NtSetInformationProcess.NTDLL(-00000001,00000022,?,00000004,033A09F7,0000005D), ref: 033A0AAA
                                    • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004,00000004,033A09F7,0000005D), ref: 033A0ACC
                                    • wsprintfA.USER32(?,?,?,?), ref: 033A0B74
                                    • MessageBoxA.USER32(00000000,?,?,00000010), ref: 033A0B8C
                                    • ExitProcess.KERNEL32(00000000), ref: 033A0B94
                                    • VirtualFree.KERNELBASE(?,00000000,00008000,?), ref: 033A0BE7
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000003.2149767299.00000000033A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_3_33a0000_rundll32.jbxd
                                    Similarity
                                    • API ID: ProcessVirtual$AllocExitFreeInformationMessagewsprintf
                                    • String ID: Application error$SWVU$The procedure %s could not be located in the DLL %s.
                                    • API String ID: 2788668848-4283279704
                                    • Opcode ID: f644d6bb55c65f053268db4f25cec8320b3bbf1d1d06db4825fff5ba47126e3b
                                    • Instruction ID: 5f7db994d38d22bda2af5698fa4aa1ac380e17c0a706b373c3bc0e1aa832a375
                                    • Opcode Fuzzy Hash: f644d6bb55c65f053268db4f25cec8320b3bbf1d1d06db4825fff5ba47126e3b
                                    • Instruction Fuzzy Hash: 6831D071641B869FDB39DF24CC94FEF77ACEF05785F044129EE428A284DB74A9108B20

                                    Control-flow Graph

                                    APIs
                                    • _memset.LIBCMT ref: 1000D055
                                    • _memset.LIBCMT ref: 1000D08B
                                    • _memset.LIBCMT ref: 1000D09E
                                    • _memset.LIBCMT ref: 1000D0B1
                                    • CreatePipe.KERNELBASE(?,?,0000000C,00000000), ref: 1000D10C
                                    • GetStartupInfoA.KERNEL32(00000044), ref: 1000D12D
                                    • CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000001,00000000,00000000,00000000,00000044,00000000), ref: 1000D17E
                                    • CloseHandle.KERNEL32(?,?), ref: 1000D39A
                                    • CloseHandle.KERNEL32(?), ref: 1000D3A7
                                    • CloseHandle.KERNEL32(?), ref: 1000D3B4
                                    • CloseHandle.KERNEL32(?), ref: 1000D3C1
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseHandle_memset$Create$InfoPipeProcessStartup
                                    • String ID: D$ProcessorId$wmic cpu get processorid
                                    • API String ID: 1762129635-53154263
                                    • Opcode ID: 2faa9055df3024060b3a78fac8b67b6add4b8c37b23ad85aa60008f06d3c8044
                                    • Instruction ID: 29feaeb9d2e0a167578c768367cdbb99c1f13e7196a5b6bb9c176603c2bdf5a2
                                    • Opcode Fuzzy Hash: 2faa9055df3024060b3a78fac8b67b6add4b8c37b23ad85aa60008f06d3c8044
                                    • Instruction Fuzzy Hash: D1B14E75902228DFEB29DB60CC99BDEB7B4FB48340F1041DAE109A7181DB756B84CF50

                                    Control-flow Graph

                                    APIs
                                    • _memset.LIBCMT ref: 1000D4B4
                                    • _memset.LIBCMT ref: 1000D4EA
                                    • _memset.LIBCMT ref: 1000D4FD
                                    • _memset.LIBCMT ref: 1000D510
                                    • CreatePipe.KERNELBASE(?,?,0000000C,00000000), ref: 1000D56B
                                    • GetStartupInfoA.KERNEL32(00000044), ref: 1000D58C
                                    • CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000001,00000000,00000000,00000000,00000044,00000000), ref: 1000D5DD
                                    • CloseHandle.KERNEL32(?,?), ref: 1000D7F9
                                    • CloseHandle.KERNEL32(?), ref: 1000D806
                                    • CloseHandle.KERNEL32(?), ref: 1000D813
                                    • CloseHandle.KERNEL32(?), ref: 1000D820
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseHandle_memset$Create$InfoPipeProcessStartup
                                    • String ID: D$SerialNumber$wmic diskdrive get serialnumber
                                    • API String ID: 1762129635-2526680146
                                    • Opcode ID: 284479aef56905e99ef7afbd9686248a6d4ef8a24c59542d99c3aafd4a34ee3f
                                    • Instruction ID: f7e6dc397231a2a0a1082a64f52227403f3a6002e1c9f0e787add4f7ccce3aad
                                    • Opcode Fuzzy Hash: 284479aef56905e99ef7afbd9686248a6d4ef8a24c59542d99c3aafd4a34ee3f
                                    • Instruction Fuzzy Hash: 8CB12B759162289BEB28DB64CC9DBEEB7B4FB48300F0041DAE50DAA191DB756B84CF50

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 242 10026fe8-10027001 243 10027003-1002700d call 100258dc call 10024a04 242->243 244 10027019-1002702e call 1001f840 242->244 251 10027012 243->251 244->243 250 10027030-10027033 244->250 252 10027047-1002704d 250->252 253 10027035 250->253 254 10027014-10027018 251->254 257 10027059 call 1002ce25 252->257 258 1002704f 252->258 255 10027037-10027039 253->255 256 1002703b-10027045 call 100258dc 253->256 255->252 255->256 256->251 262 1002705e-1002706a call 1002cb7e 257->262 258->256 259 10027051-10027057 258->259 259->256 259->257 266 10027070-1002707c call 1002cba8 262->266 267 10027255-1002725f call 10024a14 262->267 266->267 272 10027082-1002708e call 1002cbd2 266->272 272->267 275 10027094-1002709b 272->275 276 1002710b-10027116 call 1002cbfc 275->276 277 1002709d 275->277 276->254 284 1002711c-1002711f 276->284 279 100270a7-100270c3 call 1002cbfc 277->279 280 1002709f-100270a5 277->280 279->254 285 100270c9-100270cc 279->285 280->276 280->279 286 10027121-1002712a call 1002ce75 284->286 287 1002714e-1002715b 284->287 288 100270d2-100270db call 1002ce75 285->288 289 1002720e-10027210 285->289 286->287 295 1002712c-1002714c 286->295 290 1002715d-1002716c call 1002d670 287->290 288->289 298 100270e1-100270f9 call 1002cbfc 288->298 289->254 299 10027179-100271a0 call 1002d5c0 call 1002d670 290->299 300 1002716e-10027176 290->300 295->290 298->254 305 100270ff-10027106 298->305 308 100271a2-100271ab 299->308 309 100271ae-100271d5 call 1002d5c0 call 1002d670 299->309 300->299 305->289 308->309 314 100271e3-100271f2 call 1002d5c0 309->314 315 100271d7-100271e0 309->315 318 100271f4 314->318 319 1002721f-10027238 314->319 315->314 320 100271f6-100271f8 318->320 321 100271fa-10027208 318->321 322 1002723a-10027253 319->322 323 1002720b 319->323 320->321 324 10027215-10027217 320->324 321->323 322->289 323->289 324->289 325 10027219 324->325 325->319 326 1002721b-1002721d 325->326 326->289 326->319
                                    APIs
                                    • _memset.LIBCMT ref: 10027021
                                      • Part of subcall function 100258DC: __getptd_noexit.LIBCMT ref: 100258DC
                                    • __gmtime64_s.LIBCMT ref: 100270BA
                                    • __gmtime64_s.LIBCMT ref: 100270F0
                                    • __gmtime64_s.LIBCMT ref: 1002710D
                                    • __allrem.LIBCMT ref: 10027163
                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 1002717F
                                    • __allrem.LIBCMT ref: 10027196
                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 100271B4
                                    • __allrem.LIBCMT ref: 100271CB
                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 100271E9
                                    • __invoke_watson.LIBCMT ref: 1002725A
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                                    • String ID:
                                    • API String ID: 384356119-0
                                    • Opcode ID: faf785f0e9591b3d4b811fc4296c87dcbc334db000ad1bf2518f1b08427d47ec
                                    • Instruction ID: 713491a1cde179dae1e75a0093b68b8f74a69f94e9f1ec33854f382ae24b7f6e
                                    • Opcode Fuzzy Hash: faf785f0e9591b3d4b811fc4296c87dcbc334db000ad1bf2518f1b08427d47ec
                                    • Instruction Fuzzy Hash: 6B71D476A00717EBE715DE78EC82B5AB3E8FF40364F91412AF918D6681E770ED448790

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 327 6c696740-6c6968c9 329 6c696c7b-6c696c7e 327->329 330 6c6968cf-6c6968d6 327->330 331 6c6968dc-6c696989 330->331 332 6c696af6-6c696b70 VirtualAlloc call 6c912210 330->332 334 6c69698f-6c696a71 VirtualAlloc call 6c913d80 331->334 335 6c696a76 331->335 336 6c696b75-6c696c71 332->336 334->335 335->332 336->329
                                    APIs
                                    • VirtualAlloc.KERNEL32(0000FFFF,00000000,00001000,00000004), ref: 6C6969A4
                                    • _memset.LIBCMT ref: 6C696A4C
                                    • VirtualAlloc.KERNELBASE(0000FFFF,000000B8,00001000,00000004,?,6C698C38), ref: 6C696B0E
                                    • _memmove.LIBCMT ref: 6C696B70
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054985603.000000006C681000.00000040.00000001.01000000.00000003.sdmp, Offset: 6C680000, based on PE: true
                                    • Associated: 00000006.00000002.3054920038.000000006C680000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000006.00000002.3054985603.000000006C9C3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000006.00000002.3054985603.000000006CBAB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000006.00000002.3054985603.000000006CBB3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000006.00000002.3054985603.000000006CBB9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000006.00000002.3056021665.000000006CC55000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_6c680000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AllocVirtual$_memmove_memset
                                    • String ID:
                                    • API String ID: 725130153-0
                                    • Opcode ID: af01bac3374c618721e138754d3ca3c72d74494653e4f821ac976264aae05339
                                    • Instruction ID: 395c12fc52dce5ac1d009dabf2c6e74aa10fdb6c514c0d7e02ec50b25f49a4c4
                                    • Opcode Fuzzy Hash: af01bac3374c618721e138754d3ca3c72d74494653e4f821ac976264aae05339
                                    • Instruction Fuzzy Hash: D9D16F75B0260DCFCB48CFD9E593A2DBBB1FB8A300B14821AD8A587754DB30A941CF49
                                    APIs
                                    • VirtualProtect.KERNELBASE(?,00001000,00000004,?,?), ref: 033A13EA
                                    • VirtualProtect.KERNEL32(?,00001000,?,?), ref: 033A1403
                                    Memory Dump Source
                                    • Source File: 00000006.00000003.2149767299.00000000033A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_3_33a0000_rundll32.jbxd
                                    Similarity
                                    • API ID: ProtectVirtual
                                    • String ID:
                                    • API String ID: 544645111-0
                                    • Opcode ID: 460e07aa1c6cfb092b5f976fa85d581fca477865be9a128e2591be7121e923ca
                                    • Instruction ID: b1d429a417b6c49ed05833987fabd77db929dafd5a81931b874044704500e5e3
                                    • Opcode Fuzzy Hash: 460e07aa1c6cfb092b5f976fa85d581fca477865be9a128e2591be7121e923ca
                                    • Instruction Fuzzy Hash: 74F08276200305AFDB19CF40C844FEA7779EB48391F104176EA42AB684C670F5148B10

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 345 1002ce25-1002ce38 call 10024850 348 1002ce66-1002ce6b call 10024895 345->348 349 1002ce3a-1002ce4d call 10027ff1 345->349 354 1002ce5a-1002ce61 call 1002ce6c 349->354 355 1002ce4f call 1002d09f 349->355 354->348 358 1002ce54 355->358 358->354
                                    APIs
                                    • __lock.LIBCMT ref: 1002CE3C
                                      • Part of subcall function 10027FF1: __mtinitlocknum.LIBCMT ref: 10028003
                                      • Part of subcall function 10027FF1: __amsg_exit.LIBCMT ref: 1002800F
                                      • Part of subcall function 10027FF1: EnterCriticalSection.KERNEL32(?,?,10025D6D,0000000D), ref: 1002801C
                                    • __tzset_nolock.LIBCMT ref: 1002CE4F
                                      • Part of subcall function 1002D09F: __lock.LIBCMT ref: 1002D0C1
                                      • Part of subcall function 1002D09F: ____lc_codepage_func.LIBCMT ref: 1002D108
                                      • Part of subcall function 1002D09F: __getenv_helper_nolock.LIBCMT ref: 1002D129
                                      • Part of subcall function 1002D09F: _free.LIBCMT ref: 1002D15C
                                      • Part of subcall function 1002D09F: _strlen.LIBCMT ref: 1002D163
                                      • Part of subcall function 1002D09F: __malloc_crt.LIBCMT ref: 1002D16A
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: __lock$CriticalEnterSection____lc_codepage_func__amsg_exit__getenv_helper_nolock__malloc_crt__mtinitlocknum__tzset_nolock_free_strlen
                                    • String ID:
                                    • API String ID: 1282695788-0
                                    • Opcode ID: fc85f6cf18a6252e642b57c3e1c2b749fe30e0e1031c663e82c605452884cce2
                                    • Instruction ID: a2ad06c6b65e7629715c0b93b357caa5f945d3fedfb1b9c2ad21f9bf3716e497
                                    • Opcode Fuzzy Hash: fc85f6cf18a6252e642b57c3e1c2b749fe30e0e1031c663e82c605452884cce2
                                    • Instruction Fuzzy Hash: 0BE0C238451A48D9DF10EBF0AA4275C32F0FB04B66FE20209E004041D28F7D35888923

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 359 10022833-10022842 call 10022801 ExitProcess
                                    APIs
                                    • ___crtCorExitProcess.LIBCMT ref: 10022839
                                      • Part of subcall function 10022801: GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,?,?,?,1002283E,00000000,?,100280A4,000000FF,0000001E,101B7BE8,00000008,10028008,00000000,?), ref: 10022810
                                      • Part of subcall function 10022801: GetProcAddress.KERNEL32(?,CorExitProcess), ref: 10022822
                                    • ExitProcess.KERNEL32 ref: 10022842
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ExitProcess$AddressHandleModuleProc___crt
                                    • String ID:
                                    • API String ID: 2427264223-0
                                    • Opcode ID: 3bf28b7052921138b5cd44a98d3311a828cfa0a63c341592180aa8684d3b340a
                                    • Instruction ID: c8f4cf039e012b41d150cd44d72804b099170dd8f7fcc5d26d0c23f5f7bd029f
                                    • Opcode Fuzzy Hash: 3bf28b7052921138b5cd44a98d3311a828cfa0a63c341592180aa8684d3b340a
                                    • Instruction Fuzzy Hash: B5B09230001108BFDB022F51DC4A8593FA9FB002A0B508020F80809032DF73BA929A81
                                    APIs
                                    • VirtualAlloc.KERNELBASE(00000000,-00000436,00001000,00000004), ref: 033A087D
                                    • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 033A08A9
                                    Memory Dump Source
                                    • Source File: 00000006.00000003.2149767299.00000000033A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_3_33a0000_rundll32.jbxd
                                    Similarity
                                    • API ID: Virtual$AllocFree
                                    • String ID:
                                    • API String ID: 2087232378-0
                                    • Opcode ID: 7e515f7c385f7f07b94d9a5cb9b23266753d833ffbaa65bc10218dcc86593253
                                    • Instruction ID: 29b3916060dcfc313f431ac2c3ce83f0c16348864b6c37a4efd373bce2f03555
                                    • Opcode Fuzzy Hash: 7e515f7c385f7f07b94d9a5cb9b23266753d833ffbaa65bc10218dcc86593253
                                    • Instruction Fuzzy Hash: 34018871A011147BE704CE99CC40FAEB7A9EBC8760F14C169F51897384D674AD10CBA0

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 362 10021dfa-10021e0f 363 10021e11-10021e1c call 100258dc call 10024a04 362->363 364 10021e2f-10021e33 362->364 375 10021e21 363->375 365 10021e35 364->365 366 10021e49-10021e4e call 10026fe8 364->366 369 10021e37-10021e3a 365->369 370 10021e3c-10021e47 call 100258dc 365->370 374 10021e53-10021e57 366->374 369->366 369->370 370->375 374->375 377 10021e59-10021e63 call 10026dea 374->377 379 10021e23-10021e2e call 1001ffa4 375->379 377->379
                                    APIs
                                      • Part of subcall function 100258DC: __getptd_noexit.LIBCMT ref: 100258DC
                                    • _asctime.LIBCMT ref: 10021E5D
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: __getptd_noexit_asctime
                                    • String ID:
                                    • API String ID: 1865661205-0
                                    • Opcode ID: dcfe908546e3f88bc8117c10939122550607e7d39558988ca205b2cb5c272348
                                    • Instruction ID: 4125543197aa1fcd6f4b2a2d68e97bfeb0adc15cba48122be1fc6d66b0878a2d
                                    • Opcode Fuzzy Hash: dcfe908546e3f88bc8117c10939122550607e7d39558988ca205b2cb5c272348
                                    • Instruction Fuzzy Hash: 53F04939A002099EDF00DBA4EC56BCE77ECEF28255FD20469EC05EB091EB74E9848725

                                    Control-flow Graph

                                    APIs
                                    • WSAStartup.WS2_32(00000202), ref: 1003651E
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Startup
                                    • String ID:
                                    • API String ID: 724789610-0
                                    • Opcode ID: d3557ac59b8f8fefe8b80b3b61d78a442e21de74061af108e84e171f57d9cb46
                                    • Instruction ID: a027679b03284c68216ebb438d11db6f7a8099bc69e3ea9b22835e59c52e58d0
                                    • Opcode Fuzzy Hash: d3557ac59b8f8fefe8b80b3b61d78a442e21de74061af108e84e171f57d9cb46
                                    • Instruction Fuzzy Hash: ABE0DF74A04208ABCB00DBB4DD0755D77F4EF49200F80016CF9098B252EB34AA148A82

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 390 10022bd3-10022bdd call 10022aa4 392 10022be2-10022be6 390->392
                                    APIs
                                    • _doexit.LIBCMT ref: 10022BDD
                                      • Part of subcall function 10022AA4: __lock.LIBCMT ref: 10022AB2
                                      • Part of subcall function 10022AA4: DecodePointer.KERNEL32(101B78D8,0000001C,10022A1B,00000000,00000001,00000000,?,1002296B,000000FF,?,10028014,00000011,?,?,10025D6D,0000000D), ref: 10022AF1
                                      • Part of subcall function 10022AA4: DecodePointer.KERNEL32(?,1002296B,000000FF,?,10028014,00000011,?,?,10025D6D,0000000D), ref: 10022B02
                                      • Part of subcall function 10022AA4: EncodePointer.KERNEL32(00000000,?,1002296B,000000FF,?,10028014,00000011,?,?,10025D6D,0000000D), ref: 10022B1B
                                      • Part of subcall function 10022AA4: DecodePointer.KERNEL32(-00000004,?,1002296B,000000FF,?,10028014,00000011,?,?,10025D6D,0000000D), ref: 10022B2B
                                      • Part of subcall function 10022AA4: EncodePointer.KERNEL32(00000000,?,1002296B,000000FF,?,10028014,00000011,?,?,10025D6D,0000000D), ref: 10022B31
                                      • Part of subcall function 10022AA4: DecodePointer.KERNEL32(?,1002296B,000000FF,?,10028014,00000011,?,?,10025D6D,0000000D), ref: 10022B47
                                      • Part of subcall function 10022AA4: DecodePointer.KERNEL32(?,1002296B,000000FF,?,10028014,00000011,?,?,10025D6D,0000000D), ref: 10022B52
                                      • Part of subcall function 10022AA4: __initterm.LIBCMT ref: 10022B7A
                                      • Part of subcall function 10022AA4: __initterm.LIBCMT ref: 10022B8B
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Pointer$Decode$Encode__initterm$__lock_doexit
                                    • String ID:
                                    • API String ID: 3712619029-0
                                    • Opcode ID: e664eab0a2f8ce3703c552baf369986a84cdf03d3e0bf670d1975cdb5f15a4fc
                                    • Instruction ID: cfc2533f0be627bc8b7b8cac997dbfbd0b87b13c6f736a1528db1b5c4a82aaa4
                                    • Opcode Fuzzy Hash: e664eab0a2f8ce3703c552baf369986a84cdf03d3e0bf670d1975cdb5f15a4fc
                                    • Instruction Fuzzy Hash: 06B0123158030C33E9201581FC03F093B1C8F80A60F500020FF0C1C5E1A593756080CA
                                    APIs
                                    • GetModuleFileNameA.KERNEL32(00000000,?,00000104,1DFFD115,?,?,?,00000000,10023340,101B6C90,000000FE,?,10013C89,TMzsft xtnogaqk,Yyickg caosusmk,Eaiawk mgqwgoywasgymoeeuu), ref: 10012594
                                    • ExpandEnvironmentStringsA.KERNEL32(C:\Users\Public\Documents\,?,00000104,?,?,?,00000000,10023340,101B6C90,000000FE,?,10013C89,TMzsft xtnogaqk,Yyickg caosusmk,Eaiawk mgqwgoywasgymoeeuu), ref: 100125AB
                                    • _strlen.LIBCMT ref: 100125B8
                                    • _strncmp.LIBCMT ref: 100125CF
                                    • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 1001270E
                                      • Part of subcall function 10012300: _memset.LIBCMT ref: 10012328
                                      • Part of subcall function 10012300: _strlen.LIBCMT ref: 1001234F
                                      • Part of subcall function 10012300: _strncpy.LIBCMT ref: 10012382
                                      • Part of subcall function 10012300: CreateDirectoryA.KERNEL32(00000000,00000000), ref: 100123A9
                                    • wsprintfA.USER32 ref: 10012616
                                    • _strlen.LIBCMT ref: 10012626
                                    • _strlen.LIBCMT ref: 10012642
                                    • CopyFileA.KERNEL32(?,?,00000000), ref: 100126AE
                                    • _memset.LIBCMT ref: 100126C2
                                    • _strcat.LIBCMT ref: 100126D8
                                    • CreateServiceA.ADVAPI32(?,?,?,000F01FF,00000110,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000), ref: 10012756
                                    • LockServiceDatabase.ADVAPI32(?), ref: 10012769
                                    • ChangeServiceConfig2A.ADVAPI32(00000000,00000001,?), ref: 10012799
                                    • ChangeServiceConfig2A.ADVAPI32(00000000,00000002,00015180), ref: 10012877
                                    • UnlockServiceDatabase.ADVAPI32(?), ref: 10012884
                                    • GetLastError.KERNEL32 ref: 10012893
                                    • OpenServiceA.ADVAPI32(?,?,000F01FF), ref: 100128B0
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Service$_strlen$ChangeConfig2CreateDatabaseFileOpen_memset$CopyDirectoryEnvironmentErrorExpandLastLockManagerModuleNameStringsUnlock_strcat_strncmp_strncpywsprintf
                                    • String ID: %$C:\Users\Public\Documents\$Description$SYSTEM\CurrentControlSet\Services\$Windows Update$Yyickg caosusmk$s
                                    • API String ID: 2269191997-3217403557
                                    • Opcode ID: da25e49445566c96217ba80189cd2cecd7e86491d1e1acde59f2152fe1c39007
                                    • Instruction ID: 58a78215622ab89836c283d46f1977e4f6cad2cf6e4b3b9b80a50220f8474d07
                                    • Opcode Fuzzy Hash: da25e49445566c96217ba80189cd2cecd7e86491d1e1acde59f2152fe1c39007
                                    • Instruction Fuzzy Hash: BEE17471D04298DFEB26CB94DC88BDE7BB8BB15704F0441D9E5486A2C1C7B95B88CF61
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File_memset$ModuleNamePathRemoveSpeclstrlen
                                    • String ID: && del "$ /c ping -n 4 127.0.0.1 > nul$" > nul$COMSPEC$D
                                    • API String ID: 322946884-2269649423
                                    • Opcode ID: 144a78e811b26684e0f96933bcd6fe390524fe62f1730313945f432d4c563e04
                                    • Instruction ID: 84f9132210fad28102cfca7cccb4be7a633d21108d91728e9d5e1e2c02768cad
                                    • Opcode Fuzzy Hash: 144a78e811b26684e0f96933bcd6fe390524fe62f1730313945f432d4c563e04
                                    • Instruction Fuzzy Hash: 17914F75A00219AFEB24DB64CC85BEA77B8FF48740F448599F20DAA191DF70AB84CF51
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _memset$State$AsyncSleeplstrlen
                                    • String ID: <BackSpace>$<Enter>$]$e
                                    • API String ID: 607291201-3604511016
                                    • Opcode ID: da57c67bcd9e4523acf9165be53d619ee9f3dc396b189a0e504f25392de7e49e
                                    • Instruction ID: 971390b8b5f7826b9d9bd22f466c4ca9011c4cb2ed80f64febdb7f556ca07fc7
                                    • Opcode Fuzzy Hash: da57c67bcd9e4523acf9165be53d619ee9f3dc396b189a0e504f25392de7e49e
                                    • Instruction Fuzzy Hash: 6091F4B4900718DFEB20CFA0DC49BEA7375FB84346F1041EDE509A6186DB76AA94DF41
                                    APIs
                                    • socket.WS2_32(?,00000001,00000006), ref: 1001DC4B
                                    • bind.WS2_32(00000000,00000002,0000001C), ref: 1001DC70
                                    • WSAGetLastError.WS2_32(?,?,?,?), ref: 1001DCA8
                                    • SetLastError.KERNEL32 ref: 1001DCB6
                                    • WSAGetLastError.WS2_32(?,?,?,?), ref: 1001DCD7
                                    • SetLastError.KERNEL32 ref: 1001DCE5
                                    • WSAGetLastError.WS2_32(?,?,?), ref: 1001DCF6
                                    • SetLastError.KERNEL32 ref: 1001DD04
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ErrorLast$bindsocket
                                    • String ID: 0.0.0.0
                                    • API String ID: 2672188334-3771769585
                                    • Opcode ID: 67e94f2010b34371f429a1fa7c81e8d84f1349c60049d7ca6e869d281ca33336
                                    • Instruction ID: 8216ced0d739489223f21362e87208fc090313cd3a371b7f6b63c1b20dd229cb
                                    • Opcode Fuzzy Hash: 67e94f2010b34371f429a1fa7c81e8d84f1349c60049d7ca6e869d281ca33336
                                    • Instruction Fuzzy Hash: 8231E672A002159FE720EF68DC85BAB77E8EF45350F00452EFD09CA181EAB5D885D7A0
                                    APIs
                                    • WSAGetLastError.WS2_32(?,?,?,?,?,?,1001C326,FFFFFFFF,?,?,?,FFFFFFFF,?), ref: 1001C5E3
                                      • Part of subcall function 100172C0: __CxxThrowException@8.LIBCMT ref: 100172D2
                                      • Part of subcall function 100172C0: EnterCriticalSection.KERNEL32(00000000,1DFFD115,00000000,00000098,?,?,00000000,10035B28,000000FF,?,?,101B722C,?,1001640E,80004005), ref: 10017312
                                      • Part of subcall function 100172C0: LeaveCriticalSection.KERNEL32(00000000,?,?,00000000,10035B28,000000FF,?,?,101B722C,?,1001640E,80004005,?,100168C9,00000400,00000400), ref: 1001737B
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalSection$EnterErrorException@8LastLeaveThrow
                                    • String ID:
                                    • API String ID: 1367629879-0
                                    • Opcode ID: 1a78252def1050f5be20003a34375eeef4699fcd1b0fa4c910ffc5e1ea9ae854
                                    • Instruction ID: 2045c5cf5837c9daf880452df431a01197e78d674d59fb6298516e1ae159bddb
                                    • Opcode Fuzzy Hash: 1a78252def1050f5be20003a34375eeef4699fcd1b0fa4c910ffc5e1ea9ae854
                                    • Instruction Fuzzy Hash: 7851BEB5900218AFDB21DFA4C841AAE77B5FF44390F100219F8599F291E770EDD0DB91
                                    APIs
                                    • _memset.LIBCMT ref: 10015432
                                    • _memset.LIBCMT ref: 10015448
                                    • _memset.LIBCMT ref: 1001545E
                                    • LoadLibraryA.KERNEL32(ADVAPI32.dll), ref: 1001546B
                                    • GetProcAddress.KERNEL32(00000000,RegQueryValueExA), ref: 10015493
                                    • GetProcAddress.KERNEL32(00000000,RegOpenKeyExA), ref: 100154AB
                                    • GetProcAddress.KERNEL32(00000000,RegEnumValueA), ref: 100154C3
                                    • GetProcAddress.KERNEL32(00000000,RegEnumKeyExA), ref: 100154DB
                                    • GetProcAddress.KERNEL32(00000000,RegCloseKey), ref: 100154F3
                                    • FreeLibrary.KERNEL32(00000000), ref: 1001553C
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressProc$_memset$Library$FreeLoad
                                    • String ID: ADVAPI32.dll$RegCloseKey$RegEnumKeyExA$RegEnumValueA$RegOpenKeyExA$RegQueryValueExA
                                    • API String ID: 2029490530-3713883646
                                    • Opcode ID: ce21794f6d49dae7673cc83d0b588799919480882acf9cc9429ea4c88414c882
                                    • Instruction ID: 42d3faf0a6d82433ca9894e8e05647cd2437e6e791ab8efedd1cac75c6c50b36
                                    • Opcode Fuzzy Hash: ce21794f6d49dae7673cc83d0b588799919480882acf9cc9429ea4c88414c882
                                    • Instruction Fuzzy Hash: 4AB17EB5904629EFDB20DF64CC89BEEB7B4FB48306F0445D8E909AA290D7759AC4CF50
                                    APIs
                                    • WinHttpOpen.WINHTTP(curl/7.83.1,00000000,00000000,00000000,00000000), ref: 10007197
                                    • WinHttpSetTimeouts.WINHTTP(00000000,000003E8,000003E8,000003E8,000003E8), ref: 100071BE
                                    • WinHttpConnect.WINHTTP(00000000,?,00000050,00000000), ref: 100071D6
                                    • WinHttpOpenRequest.WINHTTP(00000000,GET,?,00000000,00000000,00000000,00000000), ref: 100071FA
                                    • WinHttpSendRequest.WINHTTP(00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 10007219
                                    • WinHttpReceiveResponse.WINHTTP(00000000,00000000), ref: 1000722E
                                    • WinHttpQueryHeaders.WINHTTP(00000000,20000013,00000000,00000000,00000004,00000000), ref: 10007264
                                    • __CxxThrowException@8.LIBCMT ref: 10007272
                                    • WinHttpQueryDataAvailable.WINHTTP(00000000,00000000), ref: 10007293
                                    • GetLastError.KERNEL32 ref: 1000729D
                                    • __CxxThrowException@8.LIBCMT ref: 100072AF
                                    • std::ios_base::clear.LIBCPMTD ref: 100072C8
                                    • WinHttpReadData.WINHTTP(00000000,00000000,00000000,00000000,00000000,00000000), ref: 100072E4
                                    • std::ios_base::clear.LIBCPMTD ref: 100072FF
                                    • GetLastError.KERNEL32(00000000), ref: 1000730A
                                    • _wprintf.LIBCMT ref: 10007316
                                    • WinHttpCloseHandle.WINHTTP(00000000), ref: 10007328
                                    • WinHttpCloseHandle.WINHTTP(00000000), ref: 10007338
                                    • WinHttpCloseHandle.WINHTTP(00000000), ref: 10007348
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Http$CloseHandle$DataErrorException@8LastOpenQueryRequestThrowstd::ios_base::clear$AvailableConnectHeadersReadReceiveResponseSendTimeouts_wprintf
                                    • String ID: Error %d has occurred.$GET$curl/7.83.1
                                    • API String ID: 3568891788-3281102068
                                    • Opcode ID: a0faf76c0c659e3c95fc50e059929233ef8cb015fb8e25ec05d524550362fc63
                                    • Instruction ID: 96198f7158a5b0440b015918e988b78723295c7c608185cc2ea97e2543ed712c
                                    • Opcode Fuzzy Hash: a0faf76c0c659e3c95fc50e059929233ef8cb015fb8e25ec05d524550362fc63
                                    • Instruction Fuzzy Hash: CF7107B1D40248EFEB15DFA0CC99BEEBBB4FB04741F104119F51AAA2D4CB786A45DB50
                                    APIs
                                    • RegisterServiceCtrlHandlerA.ADVAPI32(TMzsft xtnogaqk,10012E80), ref: 10012C4D
                                    • FreeConsole.KERNEL32 ref: 10012C68
                                    • SetServiceStatus.ADVAPI32(?,101BD9EC), ref: 10012CB5
                                    • Sleep.KERNEL32(000001F4), ref: 10012CCA
                                    • SetServiceStatus.ADVAPI32(?,101BD9EC), ref: 10012CE6
                                    • CreateMutexA.KERNEL32(00000000,00000000,TMzsft xtnogaqk), ref: 10012D08
                                    • GetLastError.KERNEL32 ref: 10012D14
                                    • WSAStartup.WS2_32(00000202,?), ref: 10012D34
                                    • GetVersionExA.KERNEL32(00000094), ref: 10012D4B
                                    • Sleep.KERNEL32(000F4240,00000000), ref: 10012D73
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Service$SleepStatus$ConsoleCreateCtrlErrorFreeHandlerLastMutexRegisterStartupVersion
                                    • String ID: %s Win7$TMzsft xtnogaqk
                                    • API String ID: 1415809075-2726583022
                                    • Opcode ID: 3c918adf2ea9c1f546c4a298ab0c77e3fc501175bd32b3641c86ff31aace8df7
                                    • Instruction ID: 16fc8e2a50e62427ded2aaa4a0275d88474e0d3da89c2d2dd2af286da20813d4
                                    • Opcode Fuzzy Hash: 3c918adf2ea9c1f546c4a298ab0c77e3fc501175bd32b3641c86ff31aace8df7
                                    • Instruction Fuzzy Hash: 9B518EB5904224DFE729EF60CC8DB9A77B4FB04306F804298E10D6A5A1D7786AC8DF52
                                    APIs
                                    • LoadLibraryA.KERNEL32(wininet.dll), ref: 10015F01
                                    • GetProcAddress.KERNEL32(?,InternetOpenA), ref: 10015F19
                                    • FreeLibrary.KERNEL32(00000000), ref: 10015F57
                                    • GetProcAddress.KERNEL32(?,InternetOpenUrlA), ref: 10015F70
                                    • FreeLibrary.KERNEL32(00000000), ref: 10015FB7
                                    • CreateFileA.KERNEL32(1000F526,40000000,00000000,00000000,00000002,00000000,00000000), ref: 10015FD7
                                    • _memset.LIBCMT ref: 10015FFE
                                    • GetProcAddress.KERNEL32(?,InternetReadFile), ref: 10016012
                                    • WriteFile.KERNEL32(000000FF,?,00000000,00000000,00000000), ref: 10016086
                                    • CloseHandle.KERNEL32(000000FF), ref: 100160A0
                                    • Sleep.KERNEL32(00000001), ref: 100160A8
                                    • GetProcAddress.KERNEL32(?,InternetCloseHandle), ref: 100160BA
                                    • FreeLibrary.KERNEL32(00000000), ref: 100160F0
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressLibraryProc$Free$File$CloseCreateHandleLoadSleepWrite_memset
                                    • String ID: InternetCloseHandle$InternetOpenA$InternetOpenUrlA$InternetReadFile$MSIE 6.0$wininet.dll
                                    • API String ID: 2728150189-4269851202
                                    • Opcode ID: 91acf4dff87506ba4283441e8002569b8e5cf21a0175855ebad90579deee730e
                                    • Instruction ID: e100d08a212eeccd1dc3a45c1d5aa8af2f61e991188d98dff4208e55cab7884c
                                    • Opcode Fuzzy Hash: 91acf4dff87506ba4283441e8002569b8e5cf21a0175855ebad90579deee730e
                                    • Instruction Fuzzy Hash: DA51CCF5900228DFEB31DB64CD89BDA77B8AB48305F5081D8F709AA181C7759AC5CF68
                                    APIs
                                    • LoadLibraryA.KERNEL32(userenv.dll), ref: 100123D8
                                    • GetProcAddress.KERNEL32(?,CreateEnvironmentBlock), ref: 100123EA
                                    • _memset.LIBCMT ref: 10012417
                                    • _memset.LIBCMT ref: 10012427
                                    • GetCurrentProcess.KERNEL32 ref: 10012459
                                    • OpenProcessToken.ADVAPI32(?,000F01FF,00000000), ref: 1001246F
                                    • DuplicateTokenEx.ADVAPI32(00000000,02000000,00000000,00000001,00000001,00000000), ref: 10012488
                                    • LoadLibraryA.KERNEL32(Kernel32.dll,WTSGetActiveConsoleSessionId), ref: 10012498
                                    • GetProcAddress.KERNEL32(00000000), ref: 1001249F
                                    • SetTokenInformation.ADVAPI32(00000000,0000000C,00000000,00000004), ref: 100124C0
                                    • CreateProcessAsUserA.ADVAPI32(00000000,00000000,00000000,00000000,00000000,00000000,00000430,00000000,00000000,00000044,00000000), ref: 100124F6
                                    • CloseHandle.KERNEL32(00000000), ref: 10012506
                                    • CloseHandle.KERNEL32(00000000), ref: 10012510
                                    • FreeLibrary.KERNEL32(00000000), ref: 1001252F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: LibraryProcessToken$AddressCloseHandleLoadProc_memset$CreateCurrentDuplicateFreeInformationOpenUser
                                    • String ID: CreateEnvironmentBlock$D$Kernel32.dll$WTSGetActiveConsoleSessionId$userenv.dll
                                    • API String ID: 2385095549-609967149
                                    • Opcode ID: ac44d7a654e1ecf9cefedaa459ffae167c2ab3953bef6485a400e85d30f059f2
                                    • Instruction ID: fd1ae4a91e3460f93e873eecc7cbeda63378566b322c9237b013182db1ce3722
                                    • Opcode Fuzzy Hash: ac44d7a654e1ecf9cefedaa459ffae167c2ab3953bef6485a400e85d30f059f2
                                    • Instruction Fuzzy Hash: B741B6B5E00218EFEB14DFE0CC99BAEBBB4FB48705F104518E6156B281D7B59944CF90
                                    APIs
                                    • LoadLibraryA.KERNEL32(ADVAPI32.dll), ref: 10015019
                                    • GetProcAddress.KERNEL32(?,OpenProcessToken), ref: 1001502B
                                    • GetProcAddress.KERNEL32(?,AdjustTokenPrivileges), ref: 1001503D
                                    • GetProcAddress.KERNEL32(?,LookupPrivilegeValueA), ref: 1001504F
                                    • LoadLibraryA.KERNEL32(kernel32.dll), ref: 1001505D
                                    • GetProcAddress.KERNEL32(?,GetCurrentProcess), ref: 1001506F
                                    • LoadLibraryA.KERNEL32(KERNEL32.dll), ref: 100150F0
                                    • GetProcAddress.KERNEL32(?,GetLastError), ref: 10015102
                                    • CloseHandle.KERNEL32(?), ref: 1001511A
                                    • FreeLibrary.KERNEL32(00000000), ref: 1001512A
                                    • FreeLibrary.KERNEL32(00000000), ref: 1001513A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressLibraryProc$Load$Free$CloseHandle
                                    • String ID: ADVAPI32.dll$AdjustTokenPrivileges$GetCurrentProcess$GetLastError$KERNEL32.dll$LookupPrivilegeValueA$OpenProcessToken$kernel32.dll
                                    • API String ID: 2887716753-1648388921
                                    • Opcode ID: 09c34ea0c58a1937bffb1c09e732f69496aae19d3495c3a7a974608a733c4652
                                    • Instruction ID: 2ba7eb19521ecd2e0521120e7302f927c8c69f99e1a3e1b69f5f98f9208caa0c
                                    • Opcode Fuzzy Hash: 09c34ea0c58a1937bffb1c09e732f69496aae19d3495c3a7a974608a733c4652
                                    • Instruction Fuzzy Hash: 8441F775A00218EFEB16DFE4CC88BEEBBB5FB08301F144518F905AA291D7799940CBA0
                                    APIs
                                    • LoadLibraryA.KERNEL32(ADVAPI32.dll,1DFFD115), ref: 10015C0D
                                    • GetProcAddress.KERNEL32(00000000,RegCreateKeyExA), ref: 10015C2C
                                    • GetProcAddress.KERNEL32(00000000,RegSetValueExA), ref: 10015C3E
                                    • GetProcAddress.KERNEL32(00000000,RegDeleteKeyA), ref: 10015C50
                                    • GetProcAddress.KERNEL32(00000000,RegDeleteValueA), ref: 10015C62
                                    • GetProcAddress.KERNEL32(00000000,RegOpenKeyExA), ref: 10015C74
                                    • GetProcAddress.KERNEL32(00000000,RegCloseKey), ref: 10015C86
                                    • FreeLibrary.KERNEL32(00000000), ref: 10015CB7
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressProc$Library$FreeLoad
                                    • String ID: ADVAPI32.dll$RegCloseKey$RegCreateKeyExA$RegDeleteKeyA$RegDeleteValueA$RegOpenKeyExA$RegSetValueExA
                                    • API String ID: 2449869053-3188892968
                                    • Opcode ID: a0bd9a62e12f23e275d41ab7552c4dc3de141cd94503504a1d0315d773db0a11
                                    • Instruction ID: 7e0e5bb135e0f492be458d9bdacf26a44bf840c8ddca4d957ca8ae1cdeebb231
                                    • Opcode Fuzzy Hash: a0bd9a62e12f23e275d41ab7552c4dc3de141cd94503504a1d0315d773db0a11
                                    • Instruction Fuzzy Hash: A791C575A00208EFDB14CFA4D988BEEBBB9FB48751F148519F505AB280D776E981CB60
                                    APIs
                                    • LoadLibraryA.KERNEL32(Ole32.dll), ref: 10011995
                                    • GetProcAddress.KERNEL32(?,CoInitialize), ref: 100119A7
                                    • GetProcAddress.KERNEL32(?,CoUninitialize), ref: 100119B9
                                    • GetProcAddress.KERNEL32(?,CoCreateInstance), ref: 100119CB
                                    • LoadLibraryA.KERNEL32(Oleaut32.dll), ref: 100119D9
                                    • GetProcAddress.KERNEL32(?,SysFreeString), ref: 100119EB
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressProc$LibraryLoad
                                    • String ID: CoCreateInstance$CoInitialize$CoUninitialize$FriendlyName$Ole32.dll$Oleaut32.dll$SysFreeString
                                    • API String ID: 2238633743-3340630095
                                    • Opcode ID: 1d44af109edd1136255a39dc8a1dfaf4e7fcfd6cc7004c71e0f7df510543376a
                                    • Instruction ID: 212faf0c9611e66aabaa8f64879106e5bf96d811b783168d703724af177fa0bf
                                    • Opcode Fuzzy Hash: 1d44af109edd1136255a39dc8a1dfaf4e7fcfd6cc7004c71e0f7df510543376a
                                    • Instruction Fuzzy Hash: 69519279E00218EFDB14DFE8D884AEEB7B5FF88701F108558E516AB290D774A985CF60
                                    APIs
                                    • LoadLibraryA.KERNEL32(user32.dll,1DFFD115,?,?,?,00000000,10023340,101B6E88,000000FE,?,100158FA,00000000), ref: 1001598B
                                    • GetProcAddress.KERNEL32(?,GetThreadDesktop), ref: 100159A3
                                    • GetProcAddress.KERNEL32(?,GetUserObjectInformationA), ref: 100159BB
                                    • GetProcAddress.KERNEL32(?,SetThreadDesktop), ref: 100159D3
                                    • GetProcAddress.KERNEL32(?,CloseDesktop), ref: 100159EB
                                    • LoadLibraryA.KERNEL32(kernel32.dll,?,?,?,00000000,10023340,101B6E88,000000FE,?,100158FA,00000000), ref: 100159FC
                                    • GetProcAddress.KERNEL32(?,GetCurrentThreadId), ref: 10015A14
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressProc$LibraryLoad
                                    • String ID: CloseDesktop$GetCurrentThreadId$GetThreadDesktop$GetUserObjectInformationA$SetThreadDesktop$kernel32.dll$user32.dll
                                    • API String ID: 2238633743-588083535
                                    • Opcode ID: a1b5b4eb188306deb7be5c334ff11527cf8147aa92056ec69f43df2731cc529d
                                    • Instruction ID: 0747fb5764a0f845c2061594b4b15d20bfc1687557696379681bc3d3be76b4b8
                                    • Opcode Fuzzy Hash: a1b5b4eb188306deb7be5c334ff11527cf8147aa92056ec69f43df2731cc529d
                                    • Instruction Fuzzy Hash: 1641ED76901228EFDB21CFA4CC88BEEB7B4FF49311F104599F949AA251DB759A80CF50
                                    Strings
                                    • SocketClient.Connect %s,%d, xrefs: 10013497
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: SocketClient.Connect %s,%d
                                    • API String ID: 0-4086773378
                                    • Opcode ID: 806049d0937e817d2a7edc25e8aa56914ceb32bd5803814fc0c8e8b9f4b12fda
                                    • Instruction ID: 63baf142f1b2acfd1537a39fce8e3a032f44fd155c7a3820f2eaebd6526bdc0f
                                    • Opcode Fuzzy Hash: 806049d0937e817d2a7edc25e8aa56914ceb32bd5803814fc0c8e8b9f4b12fda
                                    • Instruction Fuzzy Hash: 3CC13479804A69CBDB21DF64CC907DEB7B5FF49340F0082D9E409AA291EB749AE4CF50
                                    APIs
                                    • InterlockedCompareExchange.KERNEL32(00000001,00000001,00000000), ref: 1001ABD3
                                    • InterlockedCompareExchange.KERNEL32(00000001,00000001,00000000), ref: 1001ABE7
                                    • InterlockedDecrement.KERNEL32(00000005), ref: 1001AC11
                                    • DeleteCriticalSection.KERNEL32(?), ref: 1001AC61
                                    • DeleteCriticalSection.KERNEL32(?), ref: 1001AC6B
                                    • HeapFree.KERNEL32(00000000,00000000,?), ref: 1001AC75
                                    • InterlockedCompareExchange.KERNEL32(00000001,00000001,00000000), ref: 1001ACEB
                                    • timeGetTime.WINMM ref: 1001AD11
                                    • timeGetTime.WINMM ref: 1001AD1F
                                    • InterlockedDecrement.KERNEL32(00000005), ref: 1001AD52
                                    • DeleteCriticalSection.KERNEL32(?), ref: 1001ADA2
                                    • DeleteCriticalSection.KERNEL32(?), ref: 1001ADAC
                                    • HeapFree.KERNEL32(?,00000000,?), ref: 1001ADB7
                                    • InterlockedCompareExchange.KERNEL32(00000001,00000001,00000000), ref: 1001ADC5
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Interlocked$CompareCriticalDeleteExchangeSection$DecrementFreeHeapTimetime
                                    • String ID:
                                    • API String ID: 575379910-0
                                    • Opcode ID: 4b2b9e06dbfc7a189fe832d31680b9342d4a4f911797ed680ce7ed66d266748b
                                    • Instruction ID: 5fcf9dceec55b2fe5c3f5871ba84e04da2ee91e5bcf3991c6e7a15184a02e640
                                    • Opcode Fuzzy Hash: 4b2b9e06dbfc7a189fe832d31680b9342d4a4f911797ed680ce7ed66d266748b
                                    • Instruction Fuzzy Hash: A9719D7190065AEFDB11CF68CC84B5AB7F8FF05311F004669E81A9F691D774E984CBA1
                                    APIs
                                    • DecodePointer.KERNEL32(?,00000001,10023AED,101B7938,00000008,10023C24,?,00000001,?,101B7958,0000000C,10023BC3,?,00000001,?), ref: 10022851
                                    • _free.LIBCMT ref: 1002286A
                                      • Part of subcall function 1002043C: HeapFree.KERNEL32(00000000,00000000,?,10025D1C,00000000,100258E1,100204FB,?,?,100010EB,0000DF68,?,10001048,00000001), ref: 10020450
                                      • Part of subcall function 1002043C: GetLastError.KERNEL32(00000000,?,10025D1C,00000000,100258E1,100204FB,?,?,100010EB,0000DF68,?,10001048,00000001), ref: 10020462
                                    • _free.LIBCMT ref: 1002287D
                                    • _free.LIBCMT ref: 1002289B
                                    • _free.LIBCMT ref: 100228AD
                                    • _free.LIBCMT ref: 100228BE
                                    • _free.LIBCMT ref: 100228C9
                                    • _free.LIBCMT ref: 100228E3
                                    • EncodePointer.KERNEL32(00000000), ref: 100228EA
                                    • _free.LIBCMT ref: 100228FF
                                    • _free.LIBCMT ref: 10022915
                                    • InterlockedDecrement.KERNEL32 ref: 10022927
                                    • _free.LIBCMT ref: 10022941
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _free$Pointer$DecodeDecrementEncodeErrorFreeHeapInterlockedLast
                                    • String ID:
                                    • API String ID: 4264854383-0
                                    • Opcode ID: 6e45babb980946f711f94ecee9eb40fee16fb67e0b8076907215f6ffe089f320
                                    • Instruction ID: da1824f0f3d6086db6776b7d0893ce00e841dd68cd6532bffb288ba0f97f575f
                                    • Opcode Fuzzy Hash: 6e45babb980946f711f94ecee9eb40fee16fb67e0b8076907215f6ffe089f320
                                    • Instruction Fuzzy Hash: 64218DBA805231ABC715EF74FCC040A37B5FB043647E1466AF900E7A7ADB399881CB41
                                    APIs
                                    • GetModuleHandleA.KERNEL32(kernel32,GetLogicalProcessorInformation,?,00000000), ref: 10005CC3
                                    • GetProcAddress.KERNEL32(00000000), ref: 10005CCA
                                    • GetLastError.KERNEL32 ref: 10005CEC
                                    • _free.LIBCMT ref: 10005CF8
                                      • Part of subcall function 1002043C: HeapFree.KERNEL32(00000000,00000000,?,10025D1C,00000000,100258E1,100204FB,?,?,100010EB,0000DF68,?,10001048,00000001), ref: 10020450
                                      • Part of subcall function 1002043C: GetLastError.KERNEL32(00000000,?,10025D1C,00000000,100258E1,100204FB,?,?,100010EB,0000DF68,?,10001048,00000001), ref: 10020462
                                    • _malloc.LIBCMT ref: 10005D04
                                    • _free.LIBCMT ref: 10005D3E
                                    • GetSystemInfo.KERNEL32(?), ref: 10005D54
                                    • _perror.LIBCMT ref: 10005D79
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ErrorLast_free$AddressFreeHandleHeapInfoModuleProcSystem_malloc_perror
                                    • String ID: GetLogicalProcessorInformation$kernel32$zstd
                                    • API String ID: 346688108-2576447550
                                    • Opcode ID: ebf4960832639757ba6ddf85c4acd03ed6aa7b5749e8a4a28e034f0c5179f344
                                    • Instruction ID: 534da2e331fe06abe5cc17a8b34cc9891e156add97b29abc730671e8849a38bb
                                    • Opcode Fuzzy Hash: ebf4960832639757ba6ddf85c4acd03ed6aa7b5749e8a4a28e034f0c5179f344
                                    • Instruction Fuzzy Hash: 3C212976A003115FF721E7249C89A4F73E8FF84292F940527FC0587215E73AEA4587D2
                                    APIs
                                    • LoadLibraryA.KERNEL32(kernel32.dll), ref: 10015178
                                    • GetProcAddress.KERNEL32(?,CreateToolhelp32Snapshot), ref: 10015190
                                    • GetProcAddress.KERNEL32(?,Process32First), ref: 100151A8
                                    • GetProcAddress.KERNEL32(?,Process32Next), ref: 100151C0
                                    • lstrcmpiA.KERNEL32(1000E8DC,?), ref: 10015243
                                    • CloseHandle.KERNEL32(00000000), ref: 10015262
                                    • FreeLibrary.KERNEL32(00000000), ref: 10015278
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressProc$Library$CloseFreeHandleLoadlstrcmpi
                                    • String ID: CreateToolhelp32Snapshot$Process32First$Process32Next$kernel32.dll
                                    • API String ID: 1314729832-4285911020
                                    • Opcode ID: 1cd6a8fbb2155a4b1985ca30da2e4b0a3f5bfe765f9448f08b89226ab9c6a634
                                    • Instruction ID: b23b302b637ae1edde1f60404815d2dee06a1769a5a7b90f0171de9587be8fa8
                                    • Opcode Fuzzy Hash: 1cd6a8fbb2155a4b1985ca30da2e4b0a3f5bfe765f9448f08b89226ab9c6a634
                                    • Instruction Fuzzy Hash: 4B31AE75911228DBDB61DBA4CD88BEDB7B4FB49301F0005D8E90EAA250DB75AAC4CF50
                                    APIs
                                    • InterlockedCompareExchange.KERNEL32(?,00000001,00000000), ref: 100187D0
                                    • InterlockedCompareExchange.KERNEL32(?,00000001,00000000), ref: 100187DD
                                    • InterlockedDecrement.KERNEL32(00000000), ref: 100187FC
                                    • DeleteCriticalSection.KERNEL32(?), ref: 10018819
                                    • HeapFree.KERNEL32(?,00000000,?), ref: 10018824
                                    • InterlockedCompareExchange.KERNEL32(?,00000001,00000000), ref: 100188AF
                                    • timeGetTime.WINMM ref: 100188D1
                                    • timeGetTime.WINMM ref: 100188DC
                                    • InterlockedDecrement.KERNEL32(00000000), ref: 1001890A
                                    • DeleteCriticalSection.KERNEL32(-00000018), ref: 10018933
                                    • HeapFree.KERNEL32(?,00000000,00000000), ref: 10018940
                                    • InterlockedCompareExchange.KERNEL32(?,00000001,00000000), ref: 1001894E
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Interlocked$CompareExchange$CriticalDecrementDeleteFreeHeapSectionTimetime
                                    • String ID:
                                    • API String ID: 2485412644-0
                                    • Opcode ID: f37f0bf1c14315c2a0328e2bdc40fd7b1b2d9f8162c99514ea29b688ea27d9bd
                                    • Instruction ID: ccbf6a195e50664b114f756a4c275c858458adfb65b41e8f4299d56aa6b79b38
                                    • Opcode Fuzzy Hash: f37f0bf1c14315c2a0328e2bdc40fd7b1b2d9f8162c99514ea29b688ea27d9bd
                                    • Instruction Fuzzy Hash: 3C51AC76A00615EFDB11CF68CC84B9AB7F8FF04710F204569F919AB291D734EA80CB91
                                    APIs
                                      • Part of subcall function 1000F3B0: _memset.LIBCMT ref: 1000F3D5
                                      • Part of subcall function 1000F3B0: wsprintfA.USER32 ref: 1000F3ED
                                    • _memset.LIBCMT ref: 1000E1DD
                                    • _memset.LIBCMT ref: 1000E1FA
                                    • SHGetSpecialFolderPathA.SHELL32(00000000,00000000,0000001A,00000000,?,?,?,?,?,?,1DFFD115), ref: 1000E20F
                                    • GetTempFileNameA.KERNEL32(00000000,bak,00000000,00000000,\360se6\User Data\,00000000,?,?,?,?,?,?,1DFFD115), ref: 1000E258
                                    • Sleep.KERNEL32(000003E8,Default,?,?,?,?,?,?,1DFFD115), ref: 1000E273
                                    • MoveFileExA.KERNEL32(00000000,00000000,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 1000E298
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _memset$File$FolderMoveNamePathSleepSpecialTempwsprintf
                                    • String ID: 360se6.exe$Default$\360se6\User Data\$bak
                                    • API String ID: 2742518391-1576209161
                                    • Opcode ID: cf5631d64cf3daff86f29a9e46f2c2e6785fc6ccd8703a21c0b353372ed7785e
                                    • Instruction ID: 701f933334c7848fb056ee3a11f22efabf5e93a761c2cecb354365ab54c774ad
                                    • Opcode Fuzzy Hash: cf5631d64cf3daff86f29a9e46f2c2e6785fc6ccd8703a21c0b353372ed7785e
                                    • Instruction Fuzzy Hash: B6316C75950258ABEB24DB60CC9ABDDB378EB14700F0001E9F5096A2D1EB787B84CF61
                                    APIs
                                      • Part of subcall function 1000F3B0: _memset.LIBCMT ref: 1000F3D5
                                      • Part of subcall function 1000F3B0: wsprintfA.USER32 ref: 1000F3ED
                                    • _memset.LIBCMT ref: 1000E33D
                                    • _memset.LIBCMT ref: 1000E35A
                                    • SHGetSpecialFolderPathA.SHELL32(00000000,00000000,0000001C,00000000,?,?,?,?,?,?,1DFFD115), ref: 1000E36F
                                    • GetTempFileNameA.KERNEL32(00000000,bak,00000000,00000000,\Google\Chrome\User Data\,00000000,?,?,?,?,?,?,1DFFD115), ref: 1000E3B8
                                    • Sleep.KERNEL32(000003E8,Default,?,?,?,?,?,?,1DFFD115), ref: 1000E3D3
                                    • MoveFileExA.KERNEL32(00000000,00000000,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 1000E3F8
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _memset$File$FolderMoveNamePathSleepSpecialTempwsprintf
                                    • String ID: Default$\Google\Chrome\User Data\$bak$chrome.exe
                                    • API String ID: 2742518391-1166745273
                                    • Opcode ID: 40d655d6cc16712bff4f2fb1f87b01a0d4e762ec64db6e7df24cb74d5259b5f4
                                    • Instruction ID: fecff77be065e459785ac47ee9805b112d0841096ecda917c53accf8bb13844d
                                    • Opcode Fuzzy Hash: 40d655d6cc16712bff4f2fb1f87b01a0d4e762ec64db6e7df24cb74d5259b5f4
                                    • Instruction Fuzzy Hash: 20316A75950258EBEB24DB60CC9ABD9B378EB14700F0002E9F5096A2D1EB787B84CF65
                                    APIs
                                      • Part of subcall function 1000F3B0: _memset.LIBCMT ref: 1000F3D5
                                      • Part of subcall function 1000F3B0: wsprintfA.USER32 ref: 1000F3ED
                                    • _memset.LIBCMT ref: 1000E4ED
                                    • _memset.LIBCMT ref: 1000E50A
                                    • SHGetSpecialFolderPathA.SHELL32(00000000,00000000,0000001C,00000000,?,?,?,?,?,?,1DFFD115), ref: 1000E51F
                                    • GetTempFileNameA.KERNEL32(00000000,bak,00000000,00000000,\Tencent\QQBrowser\User Data\,00000000,?,?,?,?,?,?,1DFFD115), ref: 1000E568
                                    • Sleep.KERNEL32(000003E8,Default,?,?,?,?,?,?,1DFFD115), ref: 1000E583
                                    • MoveFileExA.KERNEL32(00000000,00000000,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 1000E5A8
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _memset$File$FolderMoveNamePathSleepSpecialTempwsprintf
                                    • String ID: Default$QQBrowser.exe$\Tencent\QQBrowser\User Data\$bak
                                    • API String ID: 2742518391-2429508344
                                    • Opcode ID: 0e54152de5e706dd32317b2883b6d9b22f54a27d1984d202d2b92858c0c27df3
                                    • Instruction ID: 303e9ac27bd1ca3b56e85ec31da4520ec1f556187fdca0bed45659d0685da91e
                                    • Opcode Fuzzy Hash: 0e54152de5e706dd32317b2883b6d9b22f54a27d1984d202d2b92858c0c27df3
                                    • Instruction Fuzzy Hash: 00316C75950258EFEB24DB60CC9ABD9B378EB14700F0001D9F5096A2D1EB787B84CF61
                                    APIs
                                      • Part of subcall function 1000F3B0: _memset.LIBCMT ref: 1000F3D5
                                      • Part of subcall function 1000F3B0: wsprintfA.USER32 ref: 1000F3ED
                                    • _memset.LIBCMT ref: 1000E64D
                                    • _memset.LIBCMT ref: 1000E66A
                                    • SHGetSpecialFolderPathA.SHELL32(00000000,00000000,0000001A,00000000,?,?,?,?,?,?,1DFFD115), ref: 1000E67F
                                    • GetTempFileNameA.KERNEL32(00000000,bak,00000000,00000000,\Microsoft\,00000000,?,?,?,?,?,?,1DFFD115), ref: 1000E6C8
                                    • Sleep.KERNEL32(000003E8,Skype for Desktop,?,?,?,?,?,?,1DFFD115), ref: 1000E6E3
                                    • MoveFileExA.KERNEL32(00000000,00000000,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 1000E708
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _memset$File$FolderMoveNamePathSleepSpecialTempwsprintf
                                    • String ID: Skype for Desktop$Skype.exe$\Microsoft\$bak
                                    • API String ID: 2742518391-3712293284
                                    • Opcode ID: 609e6d69384bd8dc0245cb6b53dc543715522320479eba0b398141e820af1bdb
                                    • Instruction ID: 5cbbd60c3ee543de6939a2953fd336e89185860d59f2e57474878281ef46e463
                                    • Opcode Fuzzy Hash: 609e6d69384bd8dc0245cb6b53dc543715522320479eba0b398141e820af1bdb
                                    • Instruction Fuzzy Hash: FB316A75950258ABEB24DB64CC9ABD9B378EB14700F0002E9F5096A2D1EB787B84CF61
                                    APIs
                                    • _memset.LIBCMT ref: 10013918
                                    • RegOpenKeyExA.ADVAPI32(80000001,101AFE40,00000000,00020006,?), ref: 10013944
                                    • _sprintf.LIBCMT ref: 1001397C
                                    • _strlen.LIBCMT ref: 1001398B
                                    • GetModuleFileNameA.KERNEL32(00000000,00000000,00000104), ref: 100139A9
                                    • RegSetValueExA.ADVAPI32(?,00000000,00000000,00000001,00000000,?), ref: 100139D7
                                    • RegCloseKey.ADVAPI32(?), ref: 100139EA
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseFileModuleNameOpenValue_memset_sprintf_strlen
                                    • String ID: %s%s$C:\Users\Public\Documents\$Windows Update
                                    • API String ID: 2914755242-3221868064
                                    • Opcode ID: a37f16671de4bf3d8217d41773bbf0f470df6e6be3ad6b2328483c6e46eca91b
                                    • Instruction ID: 74569bc2ad6f0a8eef20b1f4c122fea453a43a38896f5d2099743f1305caba47
                                    • Opcode Fuzzy Hash: a37f16671de4bf3d8217d41773bbf0f470df6e6be3ad6b2328483c6e46eca91b
                                    • Instruction Fuzzy Hash: 08210C75900218AFEB64DBA0CC86BD97778EB18701F404599E649AA181DBB46AC4CF91
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: char_traits$_memmove
                                    • String ID:
                                    • API String ID: 4015421094-0
                                    • Opcode ID: 8a46f27c53daf1bb3a5c5b26083eeb91bd03bd6e6ef27442f332e57adb46b26b
                                    • Instruction ID: 392e569acab4bc7803cc6a5d1307a5f36e8b576372a140fd2397c7b8e5873d66
                                    • Opcode Fuzzy Hash: 8a46f27c53daf1bb3a5c5b26083eeb91bd03bd6e6ef27442f332e57adb46b26b
                                    • Instruction Fuzzy Hash: 53A1B47AA00008EFDB04DF98DD92D9E77B6FF58298B248154F9099725ADB30FE50CB90
                                    APIs
                                    • __lock.LIBCMT ref: 10029B81
                                      • Part of subcall function 10027FF1: __mtinitlocknum.LIBCMT ref: 10028003
                                      • Part of subcall function 10027FF1: __amsg_exit.LIBCMT ref: 1002800F
                                      • Part of subcall function 10027FF1: EnterCriticalSection.KERNEL32(?,?,10025D6D,0000000D), ref: 1002801C
                                    • @_EH4_CallFilterFunc@8.LIBCMT ref: 10029B9F
                                    • __calloc_crt.LIBCMT ref: 10029BB8
                                    • @_EH4_CallFilterFunc@8.LIBCMT ref: 10029BD3
                                    • GetStartupInfoW.KERNEL32(?,101B7C90,00000064), ref: 10029C28
                                    • __calloc_crt.LIBCMT ref: 10029C73
                                    • GetFileType.KERNEL32(00000001), ref: 10029CBA
                                    • InitializeCriticalSectionAndSpinCount.KERNEL32(0000000D,00000FA0), ref: 10029CF3
                                    • GetStdHandle.KERNEL32(-000000F6), ref: 10029DAC
                                    • GetFileType.KERNEL32(00000000), ref: 10029DBE
                                    • InitializeCriticalSectionAndSpinCount.KERNEL32(-101BEA54,00000FA0), ref: 10029DF3
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalSection$CallCountFileFilterFunc@8InitializeSpinType__calloc_crt$EnterHandleInfoStartup__amsg_exit__lock__mtinitlocknum
                                    • String ID:
                                    • API String ID: 301580142-0
                                    • Opcode ID: 253e1a18d07f7ed5b743515052310a273316cb8cc387dfcc17b4352ffc5cb5ed
                                    • Instruction ID: 539e413c7bcea522b47ae7ad5c28c4f5532b66027edab54cb976d1ebee692ea2
                                    • Opcode Fuzzy Hash: 253e1a18d07f7ed5b743515052310a273316cb8cc387dfcc17b4352ffc5cb5ed
                                    • Instruction Fuzzy Hash: D3910671D043558FDB20CF68E88069DBBF4FF463A0B60426EE4AAAB3D1C7349842DB10
                                    APIs
                                    • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 1001039F
                                    • CreateFileA.KERNEL32(?,40000000,00000002,00000000,00000004,00000080,00000000), ref: 10010406
                                    • GetFileSize.KERNEL32(?,00000000), ref: 10010425
                                    • SetFilePointer.KERNEL32(?,00000000,00000000,00000002), ref: 1001044A
                                    • lstrlenA.KERNEL32(1000EEB8), ref: 10010454
                                    • lstrlenA.KERNEL32(1000EEB8,00000000,00000000), ref: 100104D6
                                    • WriteFile.KERNEL32(?,?,00000000), ref: 100104EB
                                    • CloseHandle.KERNEL32(?), ref: 100104F8
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$lstrlen$CloseCreateDirectoryHandlePointerSizeSystemWrite
                                    • String ID: .key
                                    • API String ID: 1674266968-343438762
                                    • Opcode ID: ffe63ab53faeb08c4fabfe3c25abd14c77d86f4555a55f109598a67c17bf6787
                                    • Instruction ID: 1c9aefebe2efcbaba9d66af4461c31df970b4e064e3fc872ccff81242f4e36e7
                                    • Opcode Fuzzy Hash: ffe63ab53faeb08c4fabfe3c25abd14c77d86f4555a55f109598a67c17bf6787
                                    • Instruction Fuzzy Hash: 7A410CB590022CDFDB29CB64DC86BD9B7B5BF48700F0085D9F649AA241D774AAC4CF90
                                    APIs
                                    • _strlen.LIBCMT ref: 1000FE67
                                    • ShellExecuteA.SHELL32(00000000,open,?,00000000,00000000,00000001), ref: 1000FE93
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ExecuteShell_strlen
                                    • String ID: D$open
                                    • API String ID: 4170776411-2491301029
                                    • Opcode ID: 45e0c28ea66c154113347479300cd7af64224d28f2b9312c10382868c233d3c8
                                    • Instruction ID: 2f325713f910cbc9df21e4a28366f17d85fbec6a5c87df3961e0dadf8c324f84
                                    • Opcode Fuzzy Hash: 45e0c28ea66c154113347479300cd7af64224d28f2b9312c10382868c233d3c8
                                    • Instruction Fuzzy Hash: E3418475900318EBEB20DF50CC46BEA77B8EF45740F00409CF608AB581DBB5AA85DF51
                                    APIs
                                      • Part of subcall function 1000F3B0: _memset.LIBCMT ref: 1000F3D5
                                      • Part of subcall function 1000F3B0: wsprintfA.USER32 ref: 1000F3ED
                                    • _memset.LIBCMT ref: 1000E7AD
                                    • _memset.LIBCMT ref: 1000E7CA
                                    • SHGetSpecialFolderPathA.SHELL32(00000000,00000000,0000001A,00000000,?,?,?,?,?,?,1DFFD115), ref: 1000E7DF
                                    • GetTempFileNameA.KERNEL32(00000000,bak,00000000,00000000,101AF284,00000000,?,?,?,?,?,?,1DFFD115), ref: 1000E828
                                    • Sleep.KERNEL32(000003E8,SogouExplorer,?,?,?,?,?,?,1DFFD115), ref: 1000E843
                                    • MoveFileExA.KERNEL32(00000000,00000000,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 1000E868
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _memset$File$FolderMoveNamePathSleepSpecialTempwsprintf
                                    • String ID: SogouExplorer$SogouExplorer.exe$bak
                                    • API String ID: 2742518391-538188596
                                    • Opcode ID: 387075a032f40cdf426803d7b8eb962ed2b699bce44bc087e450045890685a63
                                    • Instruction ID: cdfe1adb3a5306c7d49e930ca4d3ffe4328d7c09e084d7f548619efed37bff03
                                    • Opcode Fuzzy Hash: 387075a032f40cdf426803d7b8eb962ed2b699bce44bc087e450045890685a63
                                    • Instruction Fuzzy Hash: 14316C75950258ABEB24DBA0CC9ABD9B374EF14700F0001D9F5096A2D1EB787B84CB55
                                    APIs
                                    • SetServiceStatus.ADVAPI32(?,101BD9EC), ref: 10012CB5
                                    • Sleep.KERNEL32(000001F4), ref: 10012CCA
                                    • SetServiceStatus.ADVAPI32(?,101BD9EC), ref: 10012CE6
                                    • CreateMutexA.KERNEL32(00000000,00000000,TMzsft xtnogaqk), ref: 10012D08
                                    • GetLastError.KERNEL32 ref: 10012D14
                                      • Part of subcall function 10022BD3: _doexit.LIBCMT ref: 10022BDD
                                    • WSAStartup.WS2_32(00000202,?), ref: 10012D34
                                    • GetVersionExA.KERNEL32(00000094), ref: 10012D4B
                                    • Sleep.KERNEL32(000F4240,00000000), ref: 10012D73
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ServiceSleepStatus$CreateErrorLastMutexStartupVersion_doexit
                                    • String ID: TMzsft xtnogaqk
                                    • API String ID: 4049670039-2123815393
                                    • Opcode ID: a53748f86f27197abeafadced6f73c21d7a14410f93471b365f7083a90965c1a
                                    • Instruction ID: 51f78178352a1e6bbcd1a39a8c3a93efe3193938c267407751cb2d4182533f7a
                                    • Opcode Fuzzy Hash: a53748f86f27197abeafadced6f73c21d7a14410f93471b365f7083a90965c1a
                                    • Instruction Fuzzy Hash: E5216DB4504220DFE329AF60CC8EB5937B4F70430AF804298E1096A9A6D7BC6588CF12
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _memset$FindWindow
                                    • String ID:
                                    • API String ID: 3918834205-0
                                    • Opcode ID: 39f1a4b514bf7a49ce17fcebaa32398609855f0b54f364aa2f0891fbe461ef20
                                    • Instruction ID: d02908bb6393ccc6194f76cc94439ad83e97ec676181d408bc8d9695fa0a8030
                                    • Opcode Fuzzy Hash: 39f1a4b514bf7a49ce17fcebaa32398609855f0b54f364aa2f0891fbe461ef20
                                    • Instruction Fuzzy Hash: E44161B5901218EBEB64CBA4DC85F9D77B4FB48304F008699EA0D9F282D774AAD4CF54
                                    APIs
                                      • Part of subcall function 10007130: WinHttpOpen.WINHTTP(curl/7.83.1,00000000,00000000,00000000,00000000), ref: 10007197
                                      • Part of subcall function 10007130: WinHttpSetTimeouts.WINHTTP(00000000,000003E8,000003E8,000003E8,000003E8), ref: 100071BE
                                      • Part of subcall function 10007130: WinHttpConnect.WINHTTP(00000000,?,00000050,00000000), ref: 100071D6
                                      • Part of subcall function 10007130: WinHttpOpenRequest.WINHTTP(00000000,GET,?,00000000,00000000,00000000,00000000), ref: 100071FA
                                      • Part of subcall function 10007130: WinHttpSendRequest.WINHTTP(00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 10007219
                                      • Part of subcall function 10007130: WinHttpReceiveResponse.WINHTTP(00000000,00000000), ref: 1000722E
                                      • Part of subcall function 10007130: WinHttpQueryHeaders.WINHTTP(00000000,20000013,00000000,00000000,00000004,00000000), ref: 10007264
                                      • Part of subcall function 10007130: __CxxThrowException@8.LIBCMT ref: 10007272
                                      • Part of subcall function 10006250: operator!=.LIBCPMTD ref: 1000628B
                                      • Part of subcall function 10006250: operator!=.LIBCPMTD ref: 100062CD
                                    • _Func_class.LIBCPMTD ref: 10006F71
                                    • _Func_class.LIBCPMTD ref: 10006FDF
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Http$Func_classOpenRequestoperator!=$ConnectException@8HeadersQueryReceiveResponseSendThrowTimeouts
                                    • String ID: 4.ipw.cn$ifconfig.cc$ifconfig.me$ip.ping0.cc
                                    • API String ID: 2327121134-1054840108
                                    • Opcode ID: e5f02f596ccace418473e767889c4ca837b0525676b23f026339b6d6215960db
                                    • Instruction ID: 8fedc6d71d1ea5c4082eb8e8fcd3074e9b412fba7bcbbe1695d31a67eb8f4e53
                                    • Opcode Fuzzy Hash: e5f02f596ccace418473e767889c4ca837b0525676b23f026339b6d6215960db
                                    • Instruction Fuzzy Hash: 2E513D75D00508DBDB18DFA8CC52ADDB7B6FF4C3A0F548129E41A6B295EB306A49CF60
                                    APIs
                                    • LoadLibraryA.KERNEL32(kernel32.dll), ref: 10013EBF
                                    • GetProcAddress.KERNEL32(?,IsBadReadPtr), ref: 10013ED1
                                    • LoadLibraryA.KERNEL32(?), ref: 10013F25
                                    • FreeLibrary.KERNEL32(00000000), ref: 10014063
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Library$Load$AddressFreeProc
                                    • String ID: IsBadReadPtr$kernel32.dll
                                    • API String ID: 2632591731-2271619998
                                    • Opcode ID: b8cf5a7d21cec9c91bc597fb19d05e0d91973cb50290725d0d54b057ef2bedf3
                                    • Instruction ID: 4d98165a6a2f5fd888ffb7798c0831731eea4b449ce7d88afba1872c43b950e1
                                    • Opcode Fuzzy Hash: b8cf5a7d21cec9c91bc597fb19d05e0d91973cb50290725d0d54b057ef2bedf3
                                    • Instruction Fuzzy Hash: 2F61B178A00209EFDB04CF95C484BAEBBB1FF48314F258599E915AB361C735AA85DF90
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _malloc_memmove_strlen
                                    • String ID: D
                                    • API String ID: 3238260300-2746444292
                                    • Opcode ID: 6855c12a7bdc6e0bd8773f4745c8c759726946dada61b8ef62cf01ab51cda593
                                    • Instruction ID: 6d557a2bb59ac2ae05f88cec7faa246fa2e5727cbdb9c8dfb4b7bdd6368fabdf
                                    • Opcode Fuzzy Hash: 6855c12a7bdc6e0bd8773f4745c8c759726946dada61b8ef62cf01ab51cda593
                                    • Instruction Fuzzy Hash: 163173B5D00218EBDB64CF60DC45BEB7378EB58345F404598E60DAA241EBB6AAC4CF91
                                    APIs
                                    • LoadLibraryA.KERNEL32(user32.dll,1DFFD115), ref: 10015828
                                    • GetProcAddress.KERNEL32(?,OpenInputDesktop), ref: 1001587D
                                    • GetProcAddress.KERNEL32(?,OpenDesktopA), ref: 1001588F
                                    • GetProcAddress.KERNEL32(?,CloseDesktop), ref: 100158A1
                                      • Part of subcall function 10015950: LoadLibraryA.KERNEL32(user32.dll,1DFFD115,?,?,?,00000000,10023340,101B6E88,000000FE,?,100158FA,00000000), ref: 1001598B
                                      • Part of subcall function 10015950: GetProcAddress.KERNEL32(?,GetThreadDesktop), ref: 100159A3
                                      • Part of subcall function 10015950: GetProcAddress.KERNEL32(?,GetUserObjectInformationA), ref: 100159BB
                                      • Part of subcall function 10015950: GetProcAddress.KERNEL32(?,SetThreadDesktop), ref: 100159D3
                                      • Part of subcall function 10015950: GetProcAddress.KERNEL32(?,CloseDesktop), ref: 100159EB
                                      • Part of subcall function 10015950: LoadLibraryA.KERNEL32(kernel32.dll,?,?,?,00000000,10023340,101B6E88,000000FE,?,100158FA,00000000), ref: 100159FC
                                      • Part of subcall function 10015950: GetProcAddress.KERNEL32(?,GetCurrentThreadId), ref: 10015A14
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressProc$LibraryLoad
                                    • String ID: CloseDesktop$OpenDesktopA$OpenInputDesktop$user32.dll
                                    • API String ID: 2238633743-3711086354
                                    • Opcode ID: 1873b1d038e82ffe73c977c033c60f3efe240073f85bcd7195dda5366d5656d8
                                    • Instruction ID: 34810388ce7dedadcc66fe602c4080af1544b897567115cb541a18f1db2ea245
                                    • Opcode Fuzzy Hash: 1873b1d038e82ffe73c977c033c60f3efe240073f85bcd7195dda5366d5656d8
                                    • Instruction Fuzzy Hash: 16416975D08388EEEB11CBE4D888BDEBFB5EF09315F140119E405BA281CBBA5944CB65
                                    APIs
                                      • Part of subcall function 1001B6A0: HeapAlloc.KERNEL32(?,00000000,?,?,?,?,?,?,1001D1A7,?,1001C0BB,?,?,?,?,1001EAD1), ref: 1001B6CA
                                    • EnterCriticalSection.KERNEL32(00000054,?,00000000,1DFFD115,?,00000000), ref: 1001C3F8
                                      • Part of subcall function 1001BD70: timeGetTime.WINMM ref: 1001BD78
                                      • Part of subcall function 1001BD70: _memmove.LIBCMT ref: 1001BDDC
                                    • GetLastError.KERNEL32 ref: 1001C470
                                    • CreateIoCompletionPort.KERNEL32(?,?,00000000,00000000), ref: 1001C44A
                                      • Part of subcall function 100172C0: __CxxThrowException@8.LIBCMT ref: 100172D2
                                      • Part of subcall function 100172C0: EnterCriticalSection.KERNEL32(00000000,1DFFD115,00000000,00000098,?,?,00000000,10035B28,000000FF,?,?,101B722C,?,1001640E,80004005), ref: 10017312
                                      • Part of subcall function 100172C0: LeaveCriticalSection.KERNEL32(00000000,?,?,00000000,10035B28,000000FF,?,?,101B722C,?,1001640E,80004005,?,100168C9,00000400,00000400), ref: 1001737B
                                    • connect.WS2_32(?,?,0000001C), ref: 1001C497
                                    • CreateIoCompletionPort.KERNEL32(?,?,00000000,00000000), ref: 1001C4CC
                                    • HeapFree.KERNEL32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 1001C552
                                    • LeaveCriticalSection.KERNEL32(00000054), ref: 1001C559
                                      • Part of subcall function 1001A870: ioctlsocket.WS2_32(?,8004667E,?), ref: 1001A87F
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalSection$CompletionCreateEnterHeapLeavePort$AllocErrorException@8FreeLastThrowTime_memmoveconnectioctlsockettime
                                    • String ID:
                                    • API String ID: 577898059-0
                                    • Opcode ID: fb6ef4b531d651df34b6af81ca114c1cb161ed1b6c4b7f8e2a56bc7a7bb065d0
                                    • Instruction ID: 13f5607a006f5134b6e7d624e793b95b5dada5aad690ad180316847aeaa3252a
                                    • Opcode Fuzzy Hash: fb6ef4b531d651df34b6af81ca114c1cb161ed1b6c4b7f8e2a56bc7a7bb065d0
                                    • Instruction Fuzzy Hash: CA518F75600208AFDB11DF64CC85FAA77AAFF44350F144428FD09EE2A1DB71E890DB60
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _memmove_s
                                    • String ID:
                                    • API String ID: 800865076-0
                                    • Opcode ID: bfd165e00e761db38f2bdf525350d73678aeff4c921f7e730ca0ddaf86c9b7a3
                                    • Instruction ID: e53b5beb10ba7e09faa63e27da374d48c55a1d98f715c35b0f5f6325fba29714
                                    • Opcode Fuzzy Hash: bfd165e00e761db38f2bdf525350d73678aeff4c921f7e730ca0ddaf86c9b7a3
                                    • Instruction Fuzzy Hash: 59418D36200655AFD711DF68C888B9EF7E9FF44364F10402AF9098B291DB75EDA08BA0
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _memset$Window$ForegroundLocalTextTimelstrlenwsprintf
                                    • String ID:
                                    • API String ID: 2818073195-0
                                    • Opcode ID: 75adef7124855e83a17f00d692abf37ea0045c21f2baa1bf399519b3b5abe7e2
                                    • Instruction ID: 03485689b72bf285f166b7c4cb3250636e2bcbf9ff048aaab2fc2e49669969a2
                                    • Opcode Fuzzy Hash: 75adef7124855e83a17f00d692abf37ea0045c21f2baa1bf399519b3b5abe7e2
                                    • Instruction Fuzzy Hash: 753168F5A0012D9BD734DB54CD85BE973B8EB44704F0041A8F7097A191EB787AC5CB69
                                    APIs
                                    • __ioinit.LIBCMT ref: 100298CC
                                      • Part of subcall function 10029B38: InitOnceExecuteOnce.KERNEL32(101BE634,10029B73,00000000,00000000,1003508B,101B7FB0,0000000C,10005D7E,zstd), ref: 10029B46
                                    • __get_osfhandle.LIBCMT ref: 100298E0
                                    • __get_osfhandle.LIBCMT ref: 1002990B
                                    • __get_osfhandle.LIBCMT ref: 10029914
                                    • __get_osfhandle.LIBCMT ref: 10029920
                                    • CloseHandle.KERNEL32(00000000,?,?,?,10029874,?,101B7C48,00000010,1002399B,00000000,?,?,?), ref: 10029927
                                    • GetLastError.KERNEL32(?,10029874,?,101B7C48,00000010,1002399B,00000000,?,?,?), ref: 10029931
                                    • __free_osfhnd.LIBCMT ref: 1002993E
                                    • __dosmaperr.LIBCMT ref: 10029960
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: __get_osfhandle$Once$CloseErrorExecuteHandleInitLast__dosmaperr__free_osfhnd__ioinit
                                    • String ID:
                                    • API String ID: 974577687-0
                                    • Opcode ID: aeb50e6623f9612fbfea4720a11a12ee66fd82b979432c8a2b3a73e6567c2db6
                                    • Instruction ID: 534cc79353f924f132b53f2d2c247f43b701ca5fdf2037831c5180732be56f73
                                    • Opcode Fuzzy Hash: aeb50e6623f9612fbfea4720a11a12ee66fd82b979432c8a2b3a73e6567c2db6
                                    • Instruction Fuzzy Hash: 491148326042A41AD261D63C798976E36CCDF42BF4FE6079DFD2EDB0D2EA24ACC18150
                                    APIs
                                    • SetServiceStatus.ADVAPI32(?,101BD9EC), ref: 10012EC6
                                    • Sleep.KERNEL32(000001F4), ref: 10012ED1
                                    • SetServiceStatus.ADVAPI32(?,101BD9EC), ref: 10012F10
                                    • Sleep.KERNEL32(000001F4), ref: 10012F1B
                                    • SetServiceStatus.ADVAPI32(?,101BD9EC), ref: 10012F5A
                                    • Sleep.KERNEL32(000001F4), ref: 10012F65
                                    • SetServiceStatus.ADVAPI32(?,101BD9EC), ref: 10012FA0
                                    • Sleep.KERNEL32(000001F4), ref: 10012FAB
                                    • SetServiceStatus.ADVAPI32(?,101BD9EC), ref: 10012FD1
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ServiceStatus$Sleep
                                    • String ID:
                                    • API String ID: 4108286180-0
                                    • Opcode ID: 3093577f81a1bfef1be0275f51949fcebcef33dae7894a088e6bc179c9b4736d
                                    • Instruction ID: 2eb2aa5b39fb85c5a3343167d6ecbcddaa6ef8ab947596cac2bc6c57621dfea1
                                    • Opcode Fuzzy Hash: 3093577f81a1bfef1be0275f51949fcebcef33dae7894a088e6bc179c9b4736d
                                    • Instruction Fuzzy Hash: 1C31F7B4104221DFE31DFF60CC98B957BB8F708308F804368E5095BAA5E7BD6598DB56
                                    APIs
                                    • _memset.LIBCMT ref: 100115CC
                                    • GetSystemDirectoryA.KERNEL32(00000000,00000104), ref: 100115E0
                                    • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000), ref: 10011647
                                    • GetFileSize.KERNEL32(000000FF,00000000), ref: 10011669
                                      • Part of subcall function 1001EF9C: _malloc.LIBCMT ref: 1001EFB4
                                    • ReadFile.KERNEL32(000000FF,?,00000000,00000000,00000000), ref: 100116B4
                                    • CloseHandle.KERNEL32(000000FF), ref: 10011771
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$CloseCreateDirectoryHandleReadSizeSystem_malloc_memset
                                    • String ID: .key
                                    • API String ID: 1189190961-343438762
                                    • Opcode ID: e3cca6749972bda63ac77e56a70e5a53b244fe33762708ed0120600f45f4504f
                                    • Instruction ID: 3d4300d2710fecc02f3fab15f3df85ad30c21ba86dc6f63d814e5d622af92f7c
                                    • Opcode Fuzzy Hash: e3cca6749972bda63ac77e56a70e5a53b244fe33762708ed0120600f45f4504f
                                    • Instruction Fuzzy Hash: 2551EAB5D0022C9BDB69CB64DC82BD9B7B4AB58300F0045D8E64DAB281DB74AFC4CF91
                                    APIs
                                    • _memset.LIBCMT ref: 10011E5F
                                    • _memset.LIBCMT ref: 10011E71
                                      • Part of subcall function 100153E0: _memset.LIBCMT ref: 10015432
                                      • Part of subcall function 100153E0: _memset.LIBCMT ref: 10015448
                                      • Part of subcall function 100153E0: _memset.LIBCMT ref: 1001545E
                                      • Part of subcall function 100153E0: LoadLibraryA.KERNEL32(ADVAPI32.dll), ref: 1001546B
                                    • lstrlenA.KERNEL32(?), ref: 10011EA4
                                    • gethostname.WS2_32(?,10012B7F), ref: 10011EB6
                                    • lstrlenA.KERNEL32(?), ref: 10011EC0
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _memset$lstrlen$LibraryLoadgethostname
                                    • String ID: HostName$SYSTEM\Setup
                                    • API String ID: 3877737349-3163474852
                                    • Opcode ID: 3c57c7ea14b851b5edd5a4aedf8599d14a790c5ab8a68f19adf55a60d148b559
                                    • Instruction ID: 6f4c2ddfbcec68ea414a63b34556a325c0cca03fb215b7fd9fe6e58d22cc8f59
                                    • Opcode Fuzzy Hash: 3c57c7ea14b851b5edd5a4aedf8599d14a790c5ab8a68f19adf55a60d148b559
                                    • Instruction Fuzzy Hash: B41133B9A40218EBD714DF94DC81FAA77B8EB88600F00815CFA0D5B281D635EB41CB94
                                    APIs
                                    • WaitForMultipleObjects.KERNEL32(00000040,?,00000001,000000FF), ref: 1001EA1C
                                    • CloseHandle.KERNEL32(?,?,00000001,000000FF), ref: 1001EA33
                                      • Part of subcall function 1001A570: PostQueuedCompletionStatus.KERNEL32(?,00000000,00000000,00000000,?,1001E9C8,?), ref: 1001A57C
                                    • GetCurrentThreadId.KERNEL32 ref: 1001EA8E
                                    • GetQueuedCompletionStatus.KERNEL32(?,?,?,?,000000FF), ref: 1001EAB3
                                    • GetLastError.KERNEL32(?,?,?), ref: 1001EAEF
                                    • WSAGetOverlappedResult.WS2_32(00000000,?,?,00000000,?), ref: 1001EB11
                                    • WSAGetLastError.WS2_32 ref: 1001EB1B
                                    • GetCurrentThreadId.KERNEL32 ref: 1001EB41
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CompletionCurrentErrorLastQueuedStatusThread$CloseHandleMultipleObjectsOverlappedPostResultWait
                                    • String ID:
                                    • API String ID: 1776276126-0
                                    • Opcode ID: b262b485ae6c8d05e2cc6277a80d9fb5ca37b47e31c1310d56df349767435e47
                                    • Instruction ID: 66b5417a272267f179c33290e45a533a74909bc530ce5bb48fcf6268d69e9a86
                                    • Opcode Fuzzy Hash: b262b485ae6c8d05e2cc6277a80d9fb5ca37b47e31c1310d56df349767435e47
                                    • Instruction Fuzzy Hash: A8519275900219AFDB11DFA8C8C5AAEBBB9FF48350F504569FA169B211DB30FE40CB91
                                    APIs
                                    • _memcpy_s.LIBCMT ref: 10019EDE
                                    • getaddrinfo.WS2_32(?,00000000,00000C00,00000000), ref: 10019F03
                                    • _free.LIBCMT ref: 10019F1C
                                    • WSASetLastError.WS2_32(00000000,?,?,?,?,?,?,?,?), ref: 10019F29
                                    • _memmove.LIBCMT ref: 10019F6D
                                    • freeaddrinfo.WS2_32(00000000,?,?,?,?,?,?,?,?), ref: 10019F7B
                                    • htons.WS2_32(?), ref: 10019F88
                                    • WSASetLastError.WS2_32(00002AF9,?,?,?,?,?,?,?,?), ref: 10019FAA
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ErrorLast$_free_memcpy_s_memmovefreeaddrinfogetaddrinfohtons
                                    • String ID:
                                    • API String ID: 1080299913-0
                                    • Opcode ID: 38c9a16045676048a6fe288dd4f45fcc865443c53d635113eaf2434cff52915d
                                    • Instruction ID: 09d37e572ec1318aebb19466cc5ed3869c43ff4f8d51cd655d2081561f1130ca
                                    • Opcode Fuzzy Hash: 38c9a16045676048a6fe288dd4f45fcc865443c53d635113eaf2434cff52915d
                                    • Instruction Fuzzy Hash: FF416171A00229ABDB20CF64CC85BAAB7B4FF55240F4181A9F94DDB111EB719EC9CB90
                                    APIs
                                    • GetCurrentProcessId.KERNEL32 ref: 1000F2C3
                                    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 1000F2DD
                                    • Process32First.KERNEL32(000000FF,00000128), ref: 1000F30E
                                    • OpenProcess.KERNEL32(00000001,00000000,00000000,000000FF,00000128,00000002,00000000), ref: 1000F347
                                    • TerminateProcess.KERNEL32(00000000,00000000), ref: 1000F367
                                    • CloseHandle.KERNEL32(00000000), ref: 1000F374
                                    • Process32Next.KERNEL32(000000FF,00000128), ref: 1000F388
                                    • CloseHandle.KERNEL32(000000FF,000000FF,00000128,00000002,00000000), ref: 1000F39C
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Process$CloseHandleProcess32$CreateCurrentFirstNextOpenSnapshotTerminateToolhelp32
                                    • String ID:
                                    • API String ID: 477742948-0
                                    • Opcode ID: 0e5e03193292138b7c311efabc93a15d5f194d092c39daaf66340cd660e8982b
                                    • Instruction ID: d41c4376eefb6253570006433f593cac2f32630ea850329660a4d75d5b4afe3c
                                    • Opcode Fuzzy Hash: 0e5e03193292138b7c311efabc93a15d5f194d092c39daaf66340cd660e8982b
                                    • Instruction Fuzzy Hash: 4921C370900228DFDB25EB60CD89BEDB7B4FB48750F1045D9E609AB290D774AB80DF50
                                    APIs
                                    • _free.LIBCMT ref: 10002756
                                      • Part of subcall function 1002043C: HeapFree.KERNEL32(00000000,00000000,?,10025D1C,00000000,100258E1,100204FB,?,?,100010EB,0000DF68,?,10001048,00000001), ref: 10020450
                                      • Part of subcall function 1002043C: GetLastError.KERNEL32(00000000,?,10025D1C,00000000,100258E1,100204FB,?,?,100010EB,0000DF68,?,10001048,00000001), ref: 10020462
                                    • DeleteCriticalSection.KERNEL32(?), ref: 10002778
                                    • _free.LIBCMT ref: 1000277F
                                    • DeleteCriticalSection.KERNEL32(?,00000000), ref: 100027B2
                                    • _free.LIBCMT ref: 100027B9
                                    • _free.LIBCMT ref: 100027C2
                                    • _free.LIBCMT ref: 100027D1
                                    • _free.LIBCMT ref: 100027D7
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _free$CriticalDeleteSection$ErrorFreeHeapLast
                                    • String ID:
                                    • API String ID: 229044151-0
                                    • Opcode ID: 829fe4cc710feb83a16dcdc532ce873229ccf800336d69de1fb585340b12b445
                                    • Instruction ID: 16a73a784ab602da626493d70980f9eae99143d6bc0915a138f34a67110a4392
                                    • Opcode Fuzzy Hash: 829fe4cc710feb83a16dcdc532ce873229ccf800336d69de1fb585340b12b445
                                    • Instruction Fuzzy Hash: 560108B66007105BE612EF209C82A6B73AAEF80580F54442CF94A47207DB35F985C7E2
                                    APIs
                                    • DeleteCriticalSection.KERNEL32(?,?,?,00000000,1DFFD115), ref: 10018E77
                                    • HeapFree.KERNEL32(?,00000000,?), ref: 10018E84
                                    • _free.LIBCMT ref: 10018F18
                                    • HeapDestroy.KERNEL32(?), ref: 10018F8E
                                    • HeapCreate.KERNEL32(?,?,?), ref: 10018F9F
                                    • HeapDestroy.KERNEL32(00000000), ref: 10018FAC
                                    • HeapCreate.KERNEL32(?,?,?), ref: 10018FB7
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Heap$CreateDestroy$CriticalDeleteFreeSection_free
                                    • String ID:
                                    • API String ID: 1764084169-0
                                    • Opcode ID: c3f88b120b0d50cfdc866e451160b25d59f4e1943c12536e881b99dc529dd748
                                    • Instruction ID: 8cea0ffc507937525084062c29ae185d00e44530d60b22a0429b01e019052092
                                    • Opcode Fuzzy Hash: c3f88b120b0d50cfdc866e451160b25d59f4e1943c12536e881b99dc529dd748
                                    • Instruction Fuzzy Hash: 2B5148B1A00606EFDB05CFA4C881B9ABBF5FF08304F044569E909AF651DB35EA55CBA0
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: bfd34e201d1059666f78fc474e3004731cd6cb8f970c98b5a1a8be2d127c39e0
                                    • Instruction ID: df39f66d2745d17a7fe87e744aa0e03a21574858425a6f03c3f21479afaab56c
                                    • Opcode Fuzzy Hash: bfd34e201d1059666f78fc474e3004731cd6cb8f970c98b5a1a8be2d127c39e0
                                    • Instruction Fuzzy Hash: 536109B9E00209EFDB44CF94C884B9EB7B5FF48304F218598E905AB395D775EA81DB90
                                    APIs
                                    • EnterCriticalSection.KERNEL32(?,?,?,?,?,?,100025EE,?,?,?,10002B57,?), ref: 1000208B
                                    • WakeAllConditionVariable.KERNEL32(?,?,?,?,100025EE,?,?,?,10002B57,?), ref: 100020AD
                                    • LeaveCriticalSection.KERNEL32(?,?,?,?,100025EE,?,?,?,10002B57,?), ref: 100020B4
                                    • EnterCriticalSection.KERNEL32(?,?,?,?,?,?,100025EE,?,?,?,10002B57,?), ref: 100020EC
                                    • SleepConditionVariableCS.KERNEL32(?,?,000000FF,?,?,?,100025EE,?,?,?,10002B57,?), ref: 1000210D
                                    • LeaveCriticalSection.KERNEL32(?,?,?,?,100025EE,?,?,?,10002B57,?), ref: 10002116
                                    • _free.LIBCMT ref: 1000213E
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalSection$ConditionEnterLeaveVariable$SleepWake_free
                                    • String ID:
                                    • API String ID: 1710734047-0
                                    • Opcode ID: e61bd854db23e898daa16de29f131cc90b3ab22f0d1ab1bd32c91fa0d06ec401
                                    • Instruction ID: 05dc04eb116ff6e28942813317816f3c30ed5ba661128168b5cad8891ce245dc
                                    • Opcode Fuzzy Hash: e61bd854db23e898daa16de29f131cc90b3ab22f0d1ab1bd32c91fa0d06ec401
                                    • Instruction Fuzzy Hash: 8D4190B1601B069FE724CF64C884796B7F4FF14390F51462AE91ACB695D730F894CBA1
                                    APIs
                                    • GetModuleHandleA.KERNEL32(kernel32.dll,?,?), ref: 1001A70C
                                    • GetProcAddress.KERNEL32(00000000,CreateFileTransactedA), ref: 1001A721
                                    • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,?,?), ref: 1001A76A
                                    • GetFileSize.KERNEL32(?,?), ref: 1001A78C
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$AddressCreateHandleModuleProcSize
                                    • String ID: CreateFileTransactedA$kernel32.dll
                                    • API String ID: 381258031-3827029016
                                    • Opcode ID: 2b602c5be5b8ceff7d4341a465a72c2674a25abf06f1222532ee79990a52c5db
                                    • Instruction ID: 3fd96c11bbd7488a8a418e2e25c194671cc8f240b4c6ee697fb62349ff201565
                                    • Opcode Fuzzy Hash: 2b602c5be5b8ceff7d4341a465a72c2674a25abf06f1222532ee79990a52c5db
                                    • Instruction Fuzzy Hash: 0431AD34744205BBEB31CA649C45B9977F8EF02B61F20425AFE18EE1D0D7B1EAD0D654
                                    APIs
                                    • setsockopt.WS2_32(00000001,0000FFFF,000000FB,00000001,00000004), ref: 1001A8E5
                                    • setsockopt.WS2_32(00000001,0000FFFF,00000004,00000000,00000004), ref: 1001A8F7
                                    • setsockopt.WS2_32(00000001,0000FFFF,000000FB,00000000,00000004), ref: 1001A91E
                                    • setsockopt.WS2_32(00000001,0000FFFF,00000004,00000000,00000004), ref: 1001A930
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: setsockopt
                                    • String ID:
                                    • API String ID: 3981526788-0
                                    • Opcode ID: 7b82cd8a322e7eafe5a33a62bfc76d56978321d665ea09961d1f1c17fe74bef7
                                    • Instruction ID: 2534b507c7e92884fcc3b13e06d001a7cc937f1284d80b897d24f64fcb9b5863
                                    • Opcode Fuzzy Hash: 7b82cd8a322e7eafe5a33a62bfc76d56978321d665ea09961d1f1c17fe74bef7
                                    • Instruction Fuzzy Hash: 2521FBB674421E7AEB10C6959C81FA9775CDF45771F200272FF18DB2C1D971994887A0
                                    APIs
                                    • SetLastError.KERNEL32(00000000,1DFFD115,?,00000000,?,?,00000000,10035FA8,000000FF,?,1001DB19,00000000,?,?,1001D937,?), ref: 1001E8BC
                                    • EnterCriticalSection.KERNEL32(00000000,1DFFD115,?,00000000,?,?,00000000,10035FA8,000000FF,?,1001DB19,00000000,?,?,1001D937,?), ref: 1001E8F8
                                    • SetLastError.KERNEL32(00000000,?,1001DB19,00000000,?,?,1001D937,?,00000000,?,?,?,?,1001EB3A,?,?), ref: 1001E90D
                                    • LeaveCriticalSection.KERNEL32(?,?,1001DB19,00000000,?,?,1001D937,?,00000000,?,?,?,?,1001EB3A,?,?), ref: 1001E92C
                                    • InterlockedDecrement.KERNEL32(00000028), ref: 1001E948
                                    • HeapFree.KERNEL32(?,00000000,00000000,00000000,?,1001DB19,00000000,?,?,1001D937,?,00000000,?,?,?), ref: 1001E969
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalErrorLastSection$DecrementEnterFreeHeapInterlockedLeave
                                    • String ID:
                                    • API String ID: 2534375417-0
                                    • Opcode ID: 8a373b9e699bbe36eec3ad261a269d3c2d471c0edf0be97ca4a8e9b207caec58
                                    • Instruction ID: c19bc2cfbfcf6eb32c943866d2ea1f3cbf7c2381cbd68fa049da8d29006db6f8
                                    • Opcode Fuzzy Hash: 8a373b9e699bbe36eec3ad261a269d3c2d471c0edf0be97ca4a8e9b207caec58
                                    • Instruction Fuzzy Hash: 46315A32600645AFDB61CF64CC88B9ABBF9FF48361F04452AF91ADB660DB31E854CB50
                                    APIs
                                    • _memset.LIBCMT ref: 100137E8
                                    • _strcat.LIBCMT ref: 10013887
                                    • RegOpenKeyExA.ADVAPI32(80000002,00000000,00000000,000F003F,?), ref: 100138BD
                                    • RegCloseKey.ADVAPI32(?), ref: 100138CE
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseOpen_memset_strcat
                                    • String ID: SYSTEM\CurrentControlSet\Services\$TMzsft xtnogaqk
                                    • API String ID: 3167732647-1014003165
                                    • Opcode ID: 2662b6faaf2599209bb8ca6bb403307948ab9ad392b1d5476d8a6161b5a9aa7b
                                    • Instruction ID: 22143534158840905b67e581eba63ca17ab0457cd731155eff119560de7604f3
                                    • Opcode Fuzzy Hash: 2662b6faaf2599209bb8ca6bb403307948ab9ad392b1d5476d8a6161b5a9aa7b
                                    • Instruction Fuzzy Hash: AD41D020D0C2C9D9EB02C7A888097DEBFB55B26749F0840D8D5887A282D7FE5758C7B6
                                    APIs
                                    • _calloc.LIBCMT ref: 10003330
                                      • Part of subcall function 10024166: __calloc_impl.LIBCMT ref: 10024179
                                    • InitializeCriticalSection.KERNEL32(00000018,00000000), ref: 1000335C
                                    • InitializeConditionVariable.KERNEL32(00000030), ref: 1000336C
                                    • InitializeConditionVariable.KERNEL32(00000034), ref: 10003372
                                    • __beginthreadex.LIBCMT ref: 100033A8
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Initialize$ConditionVariable$CriticalSection__beginthreadex__calloc_impl_calloc
                                    • String ID:
                                    • API String ID: 4275094566-0
                                    • Opcode ID: 1c90a2da0a09f1423271f63d7b8369d043ae484d91931262826aadb9d33fa527
                                    • Instruction ID: d63cbc47a989e61f8d5764840e3dc6a2f22de4f4aba891b4dc0ad6eac0f10f79
                                    • Opcode Fuzzy Hash: 1c90a2da0a09f1423271f63d7b8369d043ae484d91931262826aadb9d33fa527
                                    • Instruction Fuzzy Hash: 582192B660071AAFE711DF95EC84B97B7ECFB40350F504029EA08C7541EBB5B6598BA0
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: PathTemp_memset_strrchr
                                    • String ID: D
                                    • API String ID: 3269299267-2746444292
                                    • Opcode ID: 65dff33f197481420d75febd2944a67fcb56e30f99d0bf04b3eaf0f89ed5e44e
                                    • Instruction ID: 94703a5b4a1e95a47fdd501beecf67a154b79f006fe411b9632ef845b5e6f6b1
                                    • Opcode Fuzzy Hash: 65dff33f197481420d75febd2944a67fcb56e30f99d0bf04b3eaf0f89ed5e44e
                                    • Instruction Fuzzy Hash: 2F218BB9D00218EBDB24DB50DC45BDA7378EB58305F444498F54D9E281EBB5ABC4CFA0
                                    APIs
                                    • _strncmp.LIBCMT ref: 10012026
                                    • _memset.LIBCMT ref: 10012042
                                    • GetWindowTextA.USER32(00000000,00000000,00000040), ref: 10012061
                                    • _strncpy.LIBCMT ref: 100120B5
                                    • _strncat.LIBCMT ref: 100120CA
                                    • GetWindow.USER32(00000000,00000002), ref: 100120EA
                                    • GetClassNameA.USER32(00000000,00000000,00000080), ref: 10012109
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Window$ClassNameText_memset_strncat_strncmp_strncpy
                                    • String ID:
                                    • API String ID: 3228922498-0
                                    • Opcode ID: 9b23a114edeb7ee68d8fe2a349bbd8718838ecac6987a0b2f96da892dcbfe533
                                    • Instruction ID: 88a1f005e2bcef45723d5467eb62586ba9483bdea00c3cbe37d0c3424b11e526
                                    • Opcode Fuzzy Hash: 9b23a114edeb7ee68d8fe2a349bbd8718838ecac6987a0b2f96da892dcbfe533
                                    • Instruction Fuzzy Hash: FF215CB5901219DBEB60CBA4CC85F9D77B4FB48304F108698EA0DAB182D774AAC4CF64
                                    APIs
                                    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 10011B57
                                    • _memset.LIBCMT ref: 10011B99
                                    • Process32First.KERNEL32(000000FF,00000128), ref: 10011BB9
                                    • Process32Next.KERNEL32(000000FF,00000128), ref: 10011BF4
                                    • CloseHandle.KERNEL32(000000FF,000000FF,00000128,?,00000002,00000000), ref: 10011C04
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32_memset
                                    • String ID: WeChat.exe
                                    • API String ID: 2526126748-2865290047
                                    • Opcode ID: 39a29232ca075c726fda8ef9c875e25e6892fe3647a628bb6ce209c239f2d104
                                    • Instruction ID: de72c953fd82724fd2484dccbf463224b55a824a9cf3277821e8854a41679b26
                                    • Opcode Fuzzy Hash: 39a29232ca075c726fda8ef9c875e25e6892fe3647a628bb6ce209c239f2d104
                                    • Instruction Fuzzy Hash: 49212E759002199BDB64DBA0CD85BEDB3B4EF48301F1001E8E50DAB291EB74AE85CF90
                                    APIs
                                    • _free.LIBCMT ref: 10001236
                                      • Part of subcall function 1002043C: HeapFree.KERNEL32(00000000,00000000,?,10025D1C,00000000,100258E1,100204FB,?,?,100010EB,0000DF68,?,10001048,00000001), ref: 10020450
                                      • Part of subcall function 1002043C: GetLastError.KERNEL32(00000000,?,10025D1C,00000000,100258E1,100204FB,?,?,100010EB,0000DF68,?,10001048,00000001), ref: 10020462
                                    • _free.LIBCMT ref: 10001275
                                    • _free.LIBCMT ref: 1000128D
                                    • _free.LIBCMT ref: 100012A8
                                    • DeleteCriticalSection.KERNEL32(8415FF68,?), ref: 100012C6
                                    • _free.LIBCMT ref: 100012CD
                                    • _free.LIBCMT ref: 100012D6
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _free$CriticalDeleteErrorFreeHeapLastSection
                                    • String ID:
                                    • API String ID: 2933665753-0
                                    • Opcode ID: 2361ccc68d43a71e868931a2596d9ac44d138912533a7e2e7945e83494bb7265
                                    • Instruction ID: aaf221896ecc1e09f6eeffe9c750e8d10df9c6965350f993c9d4ceeb60f37a7f
                                    • Opcode Fuzzy Hash: 2361ccc68d43a71e868931a2596d9ac44d138912533a7e2e7945e83494bb7265
                                    • Instruction Fuzzy Hash: F81104B1800B455BE721EB61F8817A773E1FF00250F948439E55B4220AD731B9E8CBA2
                                    APIs
                                    • _memset.LIBCMT ref: 1000F648
                                    • CreateProcessA.KERNEL32(00000000,1000F402,00000000,00000000,00000001,08000020,00000000,00000000,00000044,00000000), ref: 1000F686
                                    • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 1000F696
                                    • CloseHandle.KERNEL32(00000000), ref: 1000F6A0
                                    • CloseHandle.KERNEL32(?), ref: 1000F6AA
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseHandle$CreateObjectProcessSingleWait_memset
                                    • String ID: D
                                    • API String ID: 3422168109-2746444292
                                    • Opcode ID: 6aa504984eda8c7b5acce5dc33e2805d2fb05eccdb010cb75b9960ebb1134bfa
                                    • Instruction ID: cb5451c512472725f5a4df07bad1c41973f3ae078433712cb33367d9263f6d2b
                                    • Opcode Fuzzy Hash: 6aa504984eda8c7b5acce5dc33e2805d2fb05eccdb010cb75b9960ebb1134bfa
                                    • Instruction Fuzzy Hash: CA113071A00248EFEB24DFE4DC46BAD7BB8EF48700F10421DF619AE2D4DBB5A9448B54
                                    APIs
                                    • __init_pointers.LIBCMT ref: 10025DD7
                                      • Part of subcall function 10022A20: EncodePointer.KERNEL32(00000000,00000001,10025DDC,10023A64,101B7938,00000008,10023C24,?,00000001,?,101B7958,0000000C,10023BC3,?,00000001,?), ref: 10022A23
                                      • Part of subcall function 10022A20: __initp_misc_winsig.LIBCMT ref: 10022A44
                                    • __mtinitlocks.LIBCMT ref: 10025DDC
                                      • Part of subcall function 10028120: InitializeCriticalSectionAndSpinCount.KERNEL32(101BB940,00000FA0,?,00000001,10025DE1,10023A64,101B7938,00000008,10023C24,?,00000001,?,101B7958,0000000C,10023BC3,?), ref: 1002813E
                                    • __mtterm.LIBCMT ref: 10025DE5
                                      • Part of subcall function 10025E4D: DeleteCriticalSection.KERNEL32(?,?,?,?,10023B29,10023B0F,101B7938,00000008,10023C24,?,00000001,?,101B7958,0000000C,10023BC3,?), ref: 1002803C
                                      • Part of subcall function 10025E4D: _free.LIBCMT ref: 10028043
                                      • Part of subcall function 10025E4D: DeleteCriticalSection.KERNEL32(101BB940,?,?,10023B29,10023B0F,101B7938,00000008,10023C24,?,00000001,?,101B7958,0000000C,10023BC3,?,00000001), ref: 10028065
                                    • __calloc_crt.LIBCMT ref: 10025E0A
                                    • __initptd.LIBCMT ref: 10025E2C
                                    • GetCurrentThreadId.KERNEL32 ref: 10025E33
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalSection$Delete$CountCurrentEncodeInitializePointerSpinThread__calloc_crt__init_pointers__initp_misc_winsig__initptd__mtinitlocks__mtterm_free
                                    • String ID:
                                    • API String ID: 757573777-0
                                    • Opcode ID: 5305d30ccda45478ab966d2ea542fe534dde36908a179f48a9bcc1fc7b76229d
                                    • Instruction ID: 58ec3693b2f49863f7a8b2837ed69b9cb9c38201cd79a3fee43b5d8399986583
                                    • Opcode Fuzzy Hash: 5305d30ccda45478ab966d2ea542fe534dde36908a179f48a9bcc1fc7b76229d
                                    • Instruction Fuzzy Hash: 31F0243A1093225AE779E7383C0724B37C8DF02272BA2461DF5A6C84D5FF72A9424658
                                    APIs
                                    • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize,100238FC,?), ref: 1002384D
                                    • GetProcAddress.KERNEL32(00000000), ref: 10023854
                                    • EncodePointer.KERNEL32(00000000), ref: 10023860
                                    • DecodePointer.KERNEL32(00000001,100238FC,?), ref: 1002387D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                    • String ID: RoInitialize$combase.dll
                                    • API String ID: 3489934621-340411864
                                    • Opcode ID: 8a1acb73c590863b49b739fc2dd12772df6c41613cc91e6a01cbeba2b542fb8d
                                    • Instruction ID: 1191a88cc48d34fd9790489e5a8225d39aecb065cdaa85872b62c02564ac10b9
                                    • Opcode Fuzzy Hash: 8a1acb73c590863b49b739fc2dd12772df6c41613cc91e6a01cbeba2b542fb8d
                                    • Instruction Fuzzy Hash: 05E09A70240322AFEB247F30CDCEB4536B5F708702F908120F002DD0A0EBB88440CA52
                                    APIs
                                    • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,10023822), ref: 10023922
                                    • GetProcAddress.KERNEL32(00000000), ref: 10023929
                                    • EncodePointer.KERNEL32(00000000), ref: 10023934
                                    • DecodePointer.KERNEL32(10023822), ref: 1002394F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                    • String ID: RoUninitialize$combase.dll
                                    • API String ID: 3489934621-2819208100
                                    • Opcode ID: 4920fa68460fbff39facb883f69098808d4252d96aa017c2b93aa0396bf9b739
                                    • Instruction ID: 1f88319e3d8987e8e0ffa380cb3ac5eb2f489078ab51b11df1e274af2f38050d
                                    • Opcode Fuzzy Hash: 4920fa68460fbff39facb883f69098808d4252d96aa017c2b93aa0396bf9b739
                                    • Instruction Fuzzy Hash: 06E04678600221AFEBA56F20CC8DB463BB5F715301F918620F105D80A5EBFA9580CF92
                                    APIs
                                    • _malloc.LIBCMT ref: 100161B4
                                      • Part of subcall function 10020474: __FF_MSGBANNER.LIBCMT ref: 1002048B
                                      • Part of subcall function 10020474: __NMSG_WRITE.LIBCMT ref: 10020492
                                      • Part of subcall function 10020474: HeapAlloc.KERNEL32(033C0000,00000000,00000001,?,?,?,?,100010EB,0000DF68,?,10001048,00000001), ref: 100204B7
                                    • _free.LIBCMT ref: 10016270
                                    • std::exception::exception.LIBCMT ref: 100162BC
                                    • __CxxThrowException@8.LIBCMT ref: 100162D1
                                    • SetLastError.KERNEL32(00000018,?,101B722C,?,1001640E,80004005,?,100168C9,00000400,00000400), ref: 100162DC
                                    • _free.LIBCMT ref: 100162E7
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _free$AllocErrorException@8HeapLastThrow_mallocstd::exception::exception
                                    • String ID:
                                    • API String ID: 3049299895-0
                                    • Opcode ID: c4e75bb467dcd632cc6794f0c5e8569d33c960b951e8937276adff62c409ee6a
                                    • Instruction ID: ed2824db1dae17bfd308ba5dcb0e615037e45c0d1587b7e3fee2415e99e90dce
                                    • Opcode Fuzzy Hash: c4e75bb467dcd632cc6794f0c5e8569d33c960b951e8937276adff62c409ee6a
                                    • Instruction Fuzzy Hash: A0519AB6A006199FCB01CF98DC80B9EBBF4EB49710F554169E914AB341D775ED80CB90
                                    APIs
                                    • __ioinit.LIBCMT ref: 100285A6
                                      • Part of subcall function 10029B38: InitOnceExecuteOnce.KERNEL32(101BE634,10029B73,00000000,00000000,1003508B,101B7FB0,0000000C,10005D7E,zstd), ref: 10029B46
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Once$ExecuteInit__ioinit
                                    • String ID:
                                    • API String ID: 129814473-0
                                    • Opcode ID: 5f84c9e2474b48f1b5df84408ea3fed00915e9808a8aa5c3ede1912be93b9b93
                                    • Instruction ID: eb12839c2236a0a66080d8b7707541b2b015dfdafb5b4036e193e8b83220f103
                                    • Opcode Fuzzy Hash: 5f84c9e2474b48f1b5df84408ea3fed00915e9808a8aa5c3ede1912be93b9b93
                                    • Instruction Fuzzy Hash: 7A415679902B058FD320CB78E885A6E77E4EF413B0B90871DF8AB876D1D774EA408B10
                                    APIs
                                    • HeapAlloc.KERNEL32(00000094,00000000,?,00000000,00000000), ref: 1001E132
                                    • _memmove.LIBCMT ref: 1001E18D
                                    • InterlockedExchangeAdd.KERNEL32(-00000040,?), ref: 1001E19D
                                    • InterlockedDecrement.KERNEL32(00000028), ref: 1001E1B6
                                    • HeapFree.KERNEL32(?,00000000,00000000,00000000), ref: 1001E1E0
                                    • InterlockedExchangeAdd.KERNEL32(-00000040,?), ref: 1001E1F7
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Interlocked$ExchangeHeap$AllocDecrementFree_memmove
                                    • String ID:
                                    • API String ID: 3475820249-0
                                    • Opcode ID: 8410d57850f0f56a72160be52005f4586bc43fc5666634ebf8d9ae9adf307239
                                    • Instruction ID: 7998932e740281b790ced908d299ef40af193b578d293305540e12fdeb0e7596
                                    • Opcode Fuzzy Hash: 8410d57850f0f56a72160be52005f4586bc43fc5666634ebf8d9ae9adf307239
                                    • Instruction Fuzzy Hash: F5410D72900259AFDB11CF99C884A9EBBF8FF49314F1145AAEC199F211D770ED54CB90
                                    APIs
                                    • _memset.LIBCMT ref: 10012AB1
                                      • Part of subcall function 100122A0: GetModuleHandleA.KERNEL32(kernel32,IsWow64Process), ref: 100122C1
                                      • Part of subcall function 100122A0: GetProcAddress.KERNEL32(00000000), ref: 100122C8
                                      • Part of subcall function 100122A0: GetCurrentProcess.KERNEL32(00000000), ref: 100122DB
                                    • GetVersionExA.KERNEL32(0000009C), ref: 10012AED
                                      • Part of subcall function 10011EE0: LoadLibraryA.KERNEL32(ntdll.dll), ref: 10011EF9
                                      • Part of subcall function 10011EE0: GetProcAddress.KERNEL32(00000000,RtlGetNtVersionNumbers), ref: 10011F11
                                      • Part of subcall function 10011EE0: FreeLibrary.KERNEL32(00000000), ref: 10011F4A
                                      • Part of subcall function 10011980: LoadLibraryA.KERNEL32(Ole32.dll), ref: 10011995
                                      • Part of subcall function 10011980: GetProcAddress.KERNEL32(?,CoInitialize), ref: 100119A7
                                      • Part of subcall function 10011980: GetProcAddress.KERNEL32(?,CoUninitialize), ref: 100119B9
                                      • Part of subcall function 10011980: GetProcAddress.KERNEL32(?,CoCreateInstance), ref: 100119CB
                                      • Part of subcall function 10011980: LoadLibraryA.KERNEL32(Oleaut32.dll), ref: 100119D9
                                      • Part of subcall function 10011980: GetProcAddress.KERNEL32(?,SysFreeString), ref: 100119EB
                                      • Part of subcall function 10011C40: _strncpy.LIBCMT ref: 10011D43
                                      • Part of subcall function 100121A0: _memset.LIBCMT ref: 100121D2
                                      • Part of subcall function 10011D80: GetSystemInfo.KERNEL32(?), ref: 10011DCD
                                      • Part of subcall function 10011D80: __snprintf.LIBCMT ref: 10011DE8
                                      • Part of subcall function 10012130: _memset.LIBCMT ref: 1001214F
                                      • Part of subcall function 10012130: GlobalMemoryStatusEx.KERNEL32(00000040), ref: 10012162
                                      • Part of subcall function 10011E10: _memset.LIBCMT ref: 10011E5F
                                      • Part of subcall function 10011E10: _memset.LIBCMT ref: 10011E71
                                      • Part of subcall function 10011E10: lstrlenA.KERNEL32(?), ref: 10011EA4
                                      • Part of subcall function 10011E10: gethostname.WS2_32(?,10012B7F), ref: 10011EB6
                                      • Part of subcall function 10011E10: lstrlenA.KERNEL32(?), ref: 10011EC0
                                      • Part of subcall function 10013280: GetLastInputInfo.USER32(00000008), ref: 1001329B
                                    • _memmove.LIBCMT ref: 10012B9C
                                    • InternetGetConnectedState.WININET(?,00000000), ref: 10012BAD
                                    • _strlen.LIBCMT ref: 10012BB7
                                      • Part of subcall function 10006F00: _Func_class.LIBCPMTD ref: 10006F71
                                    • _Func_class.LIBCPMTD ref: 10012BD2
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressProc$_memset$Library$Load$Func_classInfolstrlen$ConnectedCurrentFreeGlobalHandleInputInternetLastMemoryModuleProcessStateStatusSystemVersion__snprintf_memmove_strlen_strncpygethostname
                                    • String ID:
                                    • API String ID: 1392860501-0
                                    • Opcode ID: 43b44d29e576c7a7eab6005ce55aa7196c291a1fb8a4cd9e799f16c790759da6
                                    • Instruction ID: 6fcb611156f6b3c8081496a382b787b04c25c68574042c94e1e96bd79d1c608f
                                    • Opcode Fuzzy Hash: 43b44d29e576c7a7eab6005ce55aa7196c291a1fb8a4cd9e799f16c790759da6
                                    • Instruction Fuzzy Hash: 514186B9D4021A6BDB14DBA0DC46FEE7378EF14344F4045A8F51D6A182EE34B7888B91
                                    APIs
                                    • timeGetTime.WINMM(1DFFD115,?,?,00000000,?,?,10035FD8,000000FF,?,1001D925,?,00000000,?,?,?), ref: 1001D984
                                    • EnterCriticalSection.KERNEL32(00000054,1DFFD115,?,?,00000000,?,?,10035FD8,000000FF,?,1001D925,?,00000000,?,?,?), ref: 1001D9A8
                                    • SetLastError.KERNEL32(00000000,?,1001D925,?,00000000,?,?,?,?,1001EB3A,?,?), ref: 1001D9BD
                                    • LeaveCriticalSection.KERNEL32(00000054,?,1001D925,?,00000000,?,?,?,?,1001EB3A,?,?), ref: 1001D9E0
                                    • GetLastError.KERNEL32(?,00000000), ref: 1001DA42
                                    • HeapFree.KERNEL32(?,00000000,?,?,?,00000000), ref: 1001DA77
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalErrorLastSection$EnterFreeHeapLeaveTimetime
                                    • String ID:
                                    • API String ID: 340097737-0
                                    • Opcode ID: 63cb6f8e7694ae6483c047f050ef8b7d6c6ce7c6f04acb454207dabb1f28742f
                                    • Instruction ID: 651f3edefb78460789619dc2c76435f0b6e471a6de73fc66fbbe7bd7a0e23f04
                                    • Opcode Fuzzy Hash: 63cb6f8e7694ae6483c047f050ef8b7d6c6ce7c6f04acb454207dabb1f28742f
                                    • Instruction Fuzzy Hash: 5641AEB1600619AFDB11EF54CC85BAAB7F8FF08320F40452AF915CB691D774E940CBA1
                                    APIs
                                    • Concurrency::details::HardwareAffinity::operator!=.LIBCMTD ref: 1000C28F
                                    • std::error_category::default_error_condition.LIBCPMTD ref: 1000C2B0
                                    • std::error_category::default_error_condition.LIBCPMTD ref: 1000C2CA
                                    • Concurrency::details::HardwareAffinity::operator!=.LIBCMTD ref: 1000C2D6
                                    • _Copy_impl.LIBCPMTD ref: 1000C2F1
                                    • std::error_category::default_error_condition.LIBCPMTD ref: 1000C323
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: std::error_category::default_error_condition$Affinity::operator!=Concurrency::details::Hardware$Copy_impl
                                    • String ID:
                                    • API String ID: 1600619793-0
                                    • Opcode ID: b1d60bd1d2c90ce81873208b493584433b2c3e2ab3f7430867161bbb174af34e
                                    • Instruction ID: d7a5fca912ec06086403f1c670a1a813a5f108e565bd240dc1cb7e9a7b1914b0
                                    • Opcode Fuzzy Hash: b1d60bd1d2c90ce81873208b493584433b2c3e2ab3f7430867161bbb174af34e
                                    • Instruction Fuzzy Hash: ED310079910119ABDB08DF95CC91DFFB3B9FF88240B50852DB515A7296DF30BA05CB90
                                    APIs
                                    • Concurrency::details::HardwareAffinity::operator!=.LIBCMTD ref: 1000995F
                                    • std::error_category::default_error_condition.LIBCPMTD ref: 10009980
                                    • std::error_category::default_error_condition.LIBCPMTD ref: 1000999A
                                    • Concurrency::details::HardwareAffinity::operator!=.LIBCMTD ref: 100099A6
                                    • _Copy_impl.LIBCPMTD ref: 100099C1
                                    • std::error_category::default_error_condition.LIBCPMTD ref: 100099F3
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: std::error_category::default_error_condition$Affinity::operator!=Concurrency::details::Hardware$Copy_impl
                                    • String ID:
                                    • API String ID: 1600619793-0
                                    • Opcode ID: 2ed96429231faa1b98a0dfe9f2b9f2661ec804e65a12f5b07c9e7ace5e47c8cf
                                    • Instruction ID: fd5af44e1f88a068f71331fad6f74fd73f7a6a584799292872335351018ebe79
                                    • Opcode Fuzzy Hash: 2ed96429231faa1b98a0dfe9f2b9f2661ec804e65a12f5b07c9e7ace5e47c8cf
                                    • Instruction Fuzzy Hash: AD31FE79900519ABDB08DF95CC91DFFB3B9FF88240B50852DB515AB296DF30BA05CB90
                                    APIs
                                    • htons.WS2_32(?), ref: 1001A9E7
                                    • WSAAddressToStringA.WS2_32(?,0000001C,00000000,?,?), ref: 1001AA10
                                    • htons.WS2_32(?), ref: 1001AA2D
                                    • StrPBrkA.SHLWAPI(?,101B05A8,?,?,?,?,1001A154,?,?,?), ref: 1001AA53
                                    • StrChrA.SHLWAPI(?,00000025,?,?,?,?,1001A154,?,?,?), ref: 1001AA5E
                                    • _memmove.LIBCMT ref: 1001AA80
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: htons$AddressString_memmove
                                    • String ID:
                                    • API String ID: 2092185379-0
                                    • Opcode ID: 1da62bb18fa6672f18f6b109637b5a37ed39d3a7a0056215d56cfa2b173f808e
                                    • Instruction ID: 0d8a7e0632666a9e584c7e0b1c50e51ce1a1bb8526f63a46b25b18e10d486f15
                                    • Opcode Fuzzy Hash: 1da62bb18fa6672f18f6b109637b5a37ed39d3a7a0056215d56cfa2b173f808e
                                    • Instruction Fuzzy Hash: 2F218E36200326ABEB119FA4DD84BAA37ECEF49355F418025FD098A151D3B4D9C4D761
                                    APIs
                                    • _free.LIBCMT ref: 10017BAA
                                      • Part of subcall function 1002043C: HeapFree.KERNEL32(00000000,00000000,?,10025D1C,00000000,100258E1,100204FB,?,?,100010EB,0000DF68,?,10001048,00000001), ref: 10020450
                                      • Part of subcall function 1002043C: GetLastError.KERNEL32(00000000,?,10025D1C,00000000,100258E1,100204FB,?,?,100010EB,0000DF68,?,10001048,00000001), ref: 10020462
                                    • _free.LIBCMT ref: 10017BB2
                                    • _malloc.LIBCMT ref: 10017C09
                                    • _malloc.LIBCMT ref: 10017C16
                                    • _memset.LIBCMT ref: 10017C22
                                    • _memset.LIBCMT ref: 10017C2E
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _free_malloc_memset$ErrorFreeHeapLast
                                    • String ID:
                                    • API String ID: 3649356292-0
                                    • Opcode ID: e2ce2a3dfe1de264b51823140416de6bf36e0b396c0ae9a07080b5863090727e
                                    • Instruction ID: 4c7394fda08d7e2547570c27631cca39768b6331ab3c3b2927f712e97e116122
                                    • Opcode Fuzzy Hash: e2ce2a3dfe1de264b51823140416de6bf36e0b396c0ae9a07080b5863090727e
                                    • Instruction Fuzzy Hash: 91111BB55012009BDB10DF15DD85B867FA5FF51304F4880B8FA089E29BD776E554CBA4
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: DeleteFileFreeVirtual_memset_sprintf
                                    • String ID: %s%u
                                    • API String ID: 510910084-679674701
                                    • Opcode ID: adc25b0c065f21cbd1dfded628025ccd8d207bb86f6a67400b9d615e7817787c
                                    • Instruction ID: e4550e76bca269e0cd4f0d0c42d540de692b114aa9dc25b4e6c159d00a62e7eb
                                    • Opcode Fuzzy Hash: adc25b0c065f21cbd1dfded628025ccd8d207bb86f6a67400b9d615e7817787c
                                    • Instruction Fuzzy Hash: 3D31D4B59042689FC725CF14CC41BEEBBB4EB45315F108199FA585B3D1CB34AA81CF90
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _wprintfhtonsinet_addr
                                    • String ID: 2$OnConnect: %s,%d
                                    • API String ID: 3872430831-1911175251
                                    • Opcode ID: c5e6b32b25000850bdcfd3e7752fad518d315f21ca028ddb3caaaf99291d32ff
                                    • Instruction ID: b422dd61b17a844059851ccc93c32e4f95b7dbd58dc7ab89f53cd95de4c22344
                                    • Opcode Fuzzy Hash: c5e6b32b25000850bdcfd3e7752fad518d315f21ca028ddb3caaaf99291d32ff
                                    • Instruction Fuzzy Hash: B111D6B5A00208AFCB14DFA4D9809AEB7B9FF88200F108159F9099B251EB35AA45CB50
                                    APIs
                                    • _memset.LIBCMT ref: 100106F8
                                    • GetModuleFileNameA.KERNEL32(00000000,00000000,00000104), ref: 1001070E
                                    • _memset.LIBCMT ref: 10010729
                                    • ShellExecuteExA.SHELL32(0000003C), ref: 10010761
                                      • Part of subcall function 10022BD3: _doexit.LIBCMT ref: 10022BDD
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _memset$ExecuteFileModuleNameShell_doexit
                                    • String ID: <
                                    • API String ID: 862106238-4251816714
                                    • Opcode ID: 20cf96c7f9d228022f40f64b64e5aa891d9eb85aec194889f2121776d6cbdfe6
                                    • Instruction ID: ed08ded1bf864bf3e223a1e7aee1529ee6b636ef57dacc8919679b4bfa0f8810
                                    • Opcode Fuzzy Hash: 20cf96c7f9d228022f40f64b64e5aa891d9eb85aec194889f2121776d6cbdfe6
                                    • Instruction Fuzzy Hash: F5112174A443189BDB60DF60DC86BD977B8EB58701F4040D8E54CAA2D1DBB46BC8CF51
                                    APIs
                                      • Part of subcall function 100153E0: _memset.LIBCMT ref: 10015432
                                      • Part of subcall function 100153E0: _memset.LIBCMT ref: 10015448
                                      • Part of subcall function 100153E0: _memset.LIBCMT ref: 1001545E
                                      • Part of subcall function 100153E0: LoadLibraryA.KERNEL32(ADVAPI32.dll), ref: 1001546B
                                    • GetSystemInfo.KERNEL32(?), ref: 10011DCD
                                    • __snprintf.LIBCMT ref: 10011DE8
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _memset$InfoLibraryLoadSystem__snprintf
                                    • String ID: %d*%sMHz$HARDWARE\DESCRIPTION\System\CentralProcessor\0$~MHz
                                    • API String ID: 4072208565-2169120903
                                    • Opcode ID: 8cfe9623471b1fdf1c554914f6860f425b5aeaa8db3a3f010a36363e40d3c6a7
                                    • Instruction ID: d45dab53a83cfac9e0a1e2a4c9fe7e981714f2b5fce01b97ec9512f60cfb67df
                                    • Opcode Fuzzy Hash: 8cfe9623471b1fdf1c554914f6860f425b5aeaa8db3a3f010a36363e40d3c6a7
                                    • Instruction Fuzzy Hash: F6010075A10248EFDB00DBE8CD46BAEB7B4EF48604F50415DBA08EB281E6756A44C761
                                    APIs
                                    • _memset.LIBCMT ref: 100118F8
                                    • GetModuleFileNameA.KERNEL32(00000000,00000000,00000104), ref: 1001190E
                                    • _memset.LIBCMT ref: 10011929
                                    • ShellExecuteExA.SHELL32(0000003C), ref: 10011961
                                      • Part of subcall function 10022BD3: _doexit.LIBCMT ref: 10022BDD
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _memset$ExecuteFileModuleNameShell_doexit
                                    • String ID: <
                                    • API String ID: 862106238-4251816714
                                    • Opcode ID: 3b53686e11ed67b0b73857ac907e37981459c7ca599cd7ab1f7b00ff7bdf5b39
                                    • Instruction ID: 184780f53a04bf753c675ecee7cc99bb54cbc30637577b5367bcbf7d21cbf3cf
                                    • Opcode Fuzzy Hash: 3b53686e11ed67b0b73857ac907e37981459c7ca599cd7ab1f7b00ff7bdf5b39
                                    • Instruction Fuzzy Hash: 6A112D789043189BDB64DF60DC86BD977B8AF58700F4040D8E54CAA2D1DBB46BC8CF51
                                    APIs
                                    • LoadLibraryA.KERNEL32(ntdll.dll), ref: 10011EF9
                                    • GetProcAddress.KERNEL32(00000000,RtlGetNtVersionNumbers), ref: 10011F11
                                    • FreeLibrary.KERNEL32(00000000), ref: 10011F4A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Library$AddressFreeLoadProc
                                    • String ID: RtlGetNtVersionNumbers$ntdll.dll
                                    • API String ID: 145871493-1263206204
                                    • Opcode ID: cf38a511d7e8b4ae8d17f5c5b92b7a0423aa2ce6899e0fe5ee67ae0bceb075ab
                                    • Instruction ID: fc6e9e5f567ed89b3598dd89ccb3c317c7ae0145ebb98ab299a18f454954bdf5
                                    • Opcode Fuzzy Hash: cf38a511d7e8b4ae8d17f5c5b92b7a0423aa2ce6899e0fe5ee67ae0bceb075ab
                                    • Instruction Fuzzy Hash: EF01A579901208EFDB14DF94C988B9EBBB5FF48305F108598F8059B290D7759A45DF50
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: State$AsyncSleep_memsetlstrlen
                                    • String ID: ]$e
                                    • API String ID: 1122937223-1460998272
                                    • Opcode ID: eed0b91c2744c895165e97b4f44415f78997a58abc4c3c7c85806ef0c703c4ee
                                    • Instruction ID: 764bce47da2be80fe97f0ee0a60544cb6e7be49dbe84d1d57fcac03222c10f19
                                    • Opcode Fuzzy Hash: eed0b91c2744c895165e97b4f44415f78997a58abc4c3c7c85806ef0c703c4ee
                                    • Instruction Fuzzy Hash: 35011A34901728CFFB64CF15CC85BA977B2FB80391F1082A9C4095695ACB779EA1EE01
                                    APIs
                                    • GetModuleHandleA.KERNEL32(kernel32,IsWow64Process), ref: 100122C1
                                    • GetProcAddress.KERNEL32(00000000), ref: 100122C8
                                    • GetCurrentProcess.KERNEL32(00000000), ref: 100122DB
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressCurrentHandleModuleProcProcess
                                    • String ID: IsWow64Process$kernel32
                                    • API String ID: 4190356694-3789238822
                                    • Opcode ID: 4dbbbb52112192865a612101614944367de734d12e029e91dbf73928284f9556
                                    • Instruction ID: d8b697d57578edb345ad90496a9b557fc7605fd1813d4f5a4f7f5f71a7bdeb36
                                    • Opcode Fuzzy Hash: 4dbbbb52112192865a612101614944367de734d12e029e91dbf73928284f9556
                                    • Instruction Fuzzy Hash: 74F0FE75D00208FFDB10EFE4C94879DBBB8EF08205F404099E80997251DB389648DB50
                                    APIs
                                      • Part of subcall function 100184E0: GetNativeSystemInfo.KERNEL32(?,?,?,?,?,100167AB,1DFFD115,00000000,?,?,?,1001849E), ref: 100184FB
                                      • Part of subcall function 100184E0: GetNativeSystemInfo.KERNEL32(?,?,?,?,?,100167AB,1DFFD115,00000000,?,?,?,1001849E), ref: 10018516
                                    • CreateEventA.KERNEL32(00000000,00000001,00000001,00000000,1DFFD115,00000000,?,?,?,1001849E), ref: 100167F5
                                    • HeapCreate.KERNEL32(00000004,00000000,00000000,?,?,?,1001849E), ref: 10016889
                                    • _free.LIBCMT ref: 1001693E
                                    • _free.LIBCMT ref: 10016946
                                    • _free.LIBCMT ref: 100169A9
                                      • Part of subcall function 100172C0: __CxxThrowException@8.LIBCMT ref: 100172D2
                                      • Part of subcall function 100172C0: EnterCriticalSection.KERNEL32(00000000,1DFFD115,00000000,00000098,?,?,00000000,10035B28,000000FF,?,?,101B722C,?,1001640E,80004005), ref: 10017312
                                      • Part of subcall function 100172C0: LeaveCriticalSection.KERNEL32(00000000,?,?,00000000,10035B28,000000FF,?,?,101B722C,?,1001640E,80004005,?,100168C9,00000400,00000400), ref: 1001737B
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _free$CreateCriticalInfoNativeSectionSystem$EnterEventException@8HeapLeaveThrow
                                    • String ID:
                                    • API String ID: 471852966-0
                                    • Opcode ID: 62dcc8071ba77636672d3d9cd1e185c692ae9957d13345a13a02519507dda5e3
                                    • Instruction ID: d7e5b155edf1d74aaead93eb83c8ab603744e77deffcff0117244fe85bcfb593
                                    • Opcode Fuzzy Hash: 62dcc8071ba77636672d3d9cd1e185c692ae9957d13345a13a02519507dda5e3
                                    • Instruction Fuzzy Hash: C37118B0501B419FE761CF64C958787BBF4FF04308F108A1DE6AA9B691DBB9B148CB90
                                    APIs
                                    • getsockopt.WS2_32(?,0000FFFF,00001001,?,?), ref: 1001CD1D
                                    • InterlockedCompareExchange.KERNEL32(00000004,00000000,00000001), ref: 1001CD64
                                    • EnterCriticalSection.KERNEL32(?), ref: 1001CD7A
                                    • LeaveCriticalSection.KERNEL32(?), ref: 1001CD89
                                    • LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,10035AC4), ref: 1001CDCC
                                      • Part of subcall function 1001E2B0: InterlockedExchangeAdd.KERNEL32(00000044,?), ref: 1001E328
                                      • Part of subcall function 1001E2B0: InterlockedDecrement.KERNEL32(?), ref: 1001E33E
                                      • Part of subcall function 1001E2B0: HeapFree.KERNEL32(?,00000000,?,?), ref: 1001E36E
                                      • Part of subcall function 1001BE40: timeGetTime.WINMM(00000007,00000000,00000000,00000000,?,00000001,?,?,00000001,00000000), ref: 1001BE7F
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalInterlockedSection$ExchangeLeave$CompareDecrementEnterFreeHeapTimegetsockopttime
                                    • String ID:
                                    • API String ID: 1051621181-0
                                    • Opcode ID: 47ef961c13baaeb1f1c3f54f41a175c5428382baf7d5d31f1b2d3631bcd46669
                                    • Instruction ID: aa49a767c170bc5356aa645f39eb09f20ade229693a97dd4efdc251de6f66d51
                                    • Opcode Fuzzy Hash: 47ef961c13baaeb1f1c3f54f41a175c5428382baf7d5d31f1b2d3631bcd46669
                                    • Instruction Fuzzy Hash: ED41D072A00619AFD711CF94DC81F9EBBF8FB04351F10423AEA059B690D775E9A0CB90
                                    APIs
                                    • FreeLibrary.KERNEL32(00000000), ref: 1001446A
                                    • _free.LIBCMT ref: 10014479
                                    • VirtualFree.KERNEL32(?,00000000,00008000,?,1001478E), ref: 10014498
                                    • GetProcessHeap.KERNEL32(00000000,00000000,?,1001478E), ref: 100144A4
                                    • HeapFree.KERNEL32(00000000,?,1001478E), ref: 100144AB
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Free$Heap$LibraryProcessVirtual_free
                                    • String ID:
                                    • API String ID: 3953351234-0
                                    • Opcode ID: d9d32f6ed72f362beb0b78fbb99d4c82a6959af6a865298871246b0d9bcbc94d
                                    • Instruction ID: e984664baf45058b12496fb5a6c08b784cfcca4bbda2656e475c534f62021b4f
                                    • Opcode Fuzzy Hash: d9d32f6ed72f362beb0b78fbb99d4c82a6959af6a865298871246b0d9bcbc94d
                                    • Instruction Fuzzy Hash: 6131B674A00208EFDB14CF94C598B9DB7B6FB49315F258288E9056B391C775EE86DF80
                                    APIs
                                    • __malloc_crt.LIBCMT ref: 10032879
                                    • std::exception::exception.LIBCMT ref: 10032893
                                    • __CxxThrowException@8.LIBCMT ref: 100328C9
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Exception@8Throw__malloc_crtstd::exception::exception
                                    • String ID:
                                    • API String ID: 3183362523-0
                                    • Opcode ID: 12067b7f50e60089eb0c5929b79bbc81da0302d8a13d9fc531a0150228292b0c
                                    • Instruction ID: 3afcd033efa841a0b0f27a91848f479c7de1b815caadbdc1d716f9ba00caeb03
                                    • Opcode Fuzzy Hash: 12067b7f50e60089eb0c5929b79bbc81da0302d8a13d9fc531a0150228292b0c
                                    • Instruction Fuzzy Hash: B021FC3950420DAECB02EF64DC426CEB7B8EF00241F40C565FD45AE250EB34E680CB93
                                    APIs
                                    • _malloc.LIBCMT ref: 10023558
                                      • Part of subcall function 10020474: __FF_MSGBANNER.LIBCMT ref: 1002048B
                                      • Part of subcall function 10020474: __NMSG_WRITE.LIBCMT ref: 10020492
                                      • Part of subcall function 10020474: HeapAlloc.KERNEL32(033C0000,00000000,00000001,?,?,?,?,100010EB,0000DF68,?,10001048,00000001), ref: 100204B7
                                    • _free.LIBCMT ref: 1002356B
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AllocHeap_free_malloc
                                    • String ID:
                                    • API String ID: 2734353464-0
                                    • Opcode ID: bad27d9961e6c256fd05d00a16dcfa7813a2fc78cb849604c55e28e4d427328b
                                    • Instruction ID: 8f73b662920d403f089da30250cd819716aaae5841175fa17ded837e2a866512
                                    • Opcode Fuzzy Hash: bad27d9961e6c256fd05d00a16dcfa7813a2fc78cb849604c55e28e4d427328b
                                    • Instruction Fuzzy Hash: 28112731900A366FCB21DB70BC4564E37E4EF003A0FE18525F90D9A1A1DF349940D794
                                    APIs
                                    • _free.LIBCMT ref: 1001DFDE
                                      • Part of subcall function 1002043C: HeapFree.KERNEL32(00000000,00000000,?,10025D1C,00000000,100258E1,100204FB,?,?,100010EB,0000DF68,?,10001048,00000001), ref: 10020450
                                      • Part of subcall function 1002043C: GetLastError.KERNEL32(00000000,?,10025D1C,00000000,100258E1,100204FB,?,?,100010EB,0000DF68,?,10001048,00000001), ref: 10020462
                                    • _free.LIBCMT ref: 1001DFE9
                                    • HeapDestroy.KERNEL32(?,?,80004005,?,1001E736), ref: 1001E03E
                                    • HeapCreate.KERNEL32(?,?,?,?,80004005,?,1001E736), ref: 1001E056
                                    • SetEvent.KERNEL32(?,?,80004005,?,1001E736), ref: 1001E093
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Heap$_free$CreateDestroyErrorEventFreeLast
                                    • String ID:
                                    • API String ID: 840158118-0
                                    • Opcode ID: 0e583d642f774632f9c27456ec0f16af5b2d05b50993fe6db7455c841bf81a0b
                                    • Instruction ID: 1bce1808b3a2e791fe6ccda0018e989c211068b54a4ee0f2cf5caece12fc7c46
                                    • Opcode Fuzzy Hash: 0e583d642f774632f9c27456ec0f16af5b2d05b50993fe6db7455c841bf81a0b
                                    • Instruction Fuzzy Hash: 3221D071401B428BE7229F35D908787BAE1BF49304F50891DE5AA96651DBBAB884CF40
                                    APIs
                                    • EnterCriticalSection.KERNEL32(?,?,00000000,?,?,1001BE50,?,?,00000054,?,1001D828,00000000,00000000,00000000,00000000), ref: 1001B651
                                    • EnterCriticalSection.KERNEL32(?,?,1001BE50,?,?,00000054,?,1001D828,00000000,00000000,00000000,00000000), ref: 1001B657
                                    • LeaveCriticalSection.KERNEL32(?,?,1001BE50,?,?,00000054,?,1001D828,00000000,00000000,00000000,00000000), ref: 1001B675
                                    • LeaveCriticalSection.KERNEL32(?,?,1001BE50,?,?,00000054,?,1001D828,00000000,00000000,00000000,00000000), ref: 1001B678
                                    • LeaveCriticalSection.KERNEL32(?,?,1001BE50,?,?,00000054,?,1001D828,00000000,00000000,00000000,00000000), ref: 1001B68A
                                    • LeaveCriticalSection.KERNEL32(?,?,1001BE50,?,?,00000054,?,1001D828,00000000,00000000,00000000,00000000), ref: 1001B68D
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalSection$Leave$Enter
                                    • String ID:
                                    • API String ID: 2978645861-0
                                    • Opcode ID: c76d05b3fccb81bbde97bbe8f299796e80221eabea18b0df9aee05efc5887d01
                                    • Instruction ID: 15876e7cb504465c55ff25fd79a18e235aef5e7f8048034f6523b5cd64803c08
                                    • Opcode Fuzzy Hash: c76d05b3fccb81bbde97bbe8f299796e80221eabea18b0df9aee05efc5887d01
                                    • Instruction Fuzzy Hash: 43F044722016146FD711AB6EDCC0A9BB7ECFFC9224B520136E908DB611C779E8458AB0
                                    APIs
                                      • Part of subcall function 10025CA4: __getptd_noexit.LIBCMT ref: 10025CA5
                                      • Part of subcall function 10025CA4: __amsg_exit.LIBCMT ref: 10025CB2
                                    • __amsg_exit.LIBCMT ref: 10027917
                                    • __lock.LIBCMT ref: 10027927
                                    • InterlockedDecrement.KERNEL32(?), ref: 10027944
                                    • _free.LIBCMT ref: 10027957
                                    • InterlockedIncrement.KERNEL32(033DF960), ref: 1002796F
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd_noexit__lock_free
                                    • String ID:
                                    • API String ID: 1231874560-0
                                    • Opcode ID: 5b52af1cc653b6a68240cb3c15142706c47bbd1bbb99473af2bdf0793a479e8c
                                    • Instruction ID: e038a616fc268b6b30c8c800e06b11c4754edae7854568c1c2ca9af5bccd002d
                                    • Opcode Fuzzy Hash: 5b52af1cc653b6a68240cb3c15142706c47bbd1bbb99473af2bdf0793a479e8c
                                    • Instruction Fuzzy Hash: 0701C036A01732ABDB21DB69BA8174D77B0FF01650FD10145E8086BA92CB386981CFC1
                                    APIs
                                    • EnterCriticalSection.KERNEL32(00000018,00000000,0000003C,00000000,?,?,100033DA), ref: 1000340C
                                    • WakeAllConditionVariable.KERNEL32 ref: 1000341D
                                    • LeaveCriticalSection.KERNEL32(00000018), ref: 10003424
                                    • WaitForSingleObject.KERNEL32(?,000000FF,?), ref: 1000345C
                                    • GetLastError.KERNEL32 ref: 1000346D
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalSection$ConditionEnterErrorLastLeaveObjectSingleVariableWaitWake
                                    • String ID:
                                    • API String ID: 2002041392-0
                                    • Opcode ID: e75bfb5a0ad93df77c66187c49ea81158b5d7819f7b5d557b30da283341fa316
                                    • Instruction ID: 32492cade0fa7766ae1656b716e42035eae87337b4a1db3a89480abb877ebfd1
                                    • Opcode Fuzzy Hash: e75bfb5a0ad93df77c66187c49ea81158b5d7819f7b5d557b30da283341fa316
                                    • Instruction Fuzzy Hash: 8301B1325002169FEB52EF58DCC469773ECFF45391B018525EA589B119D730E989CBA2
                                    APIs
                                      • Part of subcall function 1001A990: setsockopt.WS2_32(?,0000FFFF,00007010,00000000,00000004), ref: 1001A9A6
                                    • EnterCriticalSection.KERNEL32 ref: 1001D7AC
                                    • LeaveCriticalSection.KERNEL32(00000054), ref: 1001D7C7
                                      • Part of subcall function 1001BE40: timeGetTime.WINMM(00000007,00000000,00000000,00000000,?,00000001,?,?,00000001,00000000), ref: 1001BE7F
                                    • SetLastError.KERNEL32(00000000), ref: 1001D7D1
                                    • LeaveCriticalSection.KERNEL32(00000054), ref: 1001D7EC
                                    • HeapFree.KERNEL32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 1001D842
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalSection$Leave$EnterErrorFreeHeapLastTimesetsockopttime
                                    • String ID:
                                    • API String ID: 4191520005-0
                                    • Opcode ID: d82dbdcae07a67b72c96c9c25426668b2813c80c10765768011baf3510c592d9
                                    • Instruction ID: 8b7f9298d96b99960fdb9572d67dbc8946c541a3fe55414fa74220fd8c56f37f
                                    • Opcode Fuzzy Hash: d82dbdcae07a67b72c96c9c25426668b2813c80c10765768011baf3510c592d9
                                    • Instruction Fuzzy Hash: E131C372600214EFD711DF48CC85B9EB7B8FF49721F10422AF9299B291DB75A840CB60
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AdjustPointer_memmove
                                    • String ID:
                                    • API String ID: 1721217611-0
                                    • Opcode ID: b405e0998ef0b9efc1edcd27beb66ba5646d659d8eec6f86d97dda6a22f7c017
                                    • Instruction ID: 0e35a04b9f418c62776a7450ae1d75bb5788a7e2c58344f017f8f72862e36527
                                    • Opcode Fuzzy Hash: b405e0998ef0b9efc1edcd27beb66ba5646d659d8eec6f86d97dda6a22f7c017
                                    • Instruction Fuzzy Hash: DC4192766043469AEB25CF50FC42F6A37F4DF097A0FA1401DF849AA5D1DF71E880DA62
                                    APIs
                                    • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 1002F22B
                                    • __isleadbyte_l.LIBCMT ref: 1002F259
                                    • MultiByteToWideChar.KERNEL32(00000000,00000009,0000000C,00000000,00000000,00000000), ref: 1002F287
                                    • MultiByteToWideChar.KERNEL32(00000000,00000009,0000000C,00000001,00000000,00000000), ref: 1002F2BD
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                    • String ID:
                                    • API String ID: 3058430110-0
                                    • Opcode ID: 2b3d1593b62abf2a8beba7a4b33d3e542d277218e77fbf3ac6909a8a0f39df84
                                    • Instruction ID: 88f6cfa15c5d6d04ed07b041f1d82007708ea3ed43a2cafbe05b56c4a286dddd
                                    • Opcode Fuzzy Hash: 2b3d1593b62abf2a8beba7a4b33d3e542d277218e77fbf3ac6909a8a0f39df84
                                    • Instruction Fuzzy Hash: 1D31BC3560029AEFDB11CE64E845BBA3BE5FF422A0F52443DE8249B1A1D770E844DB50
                                    APIs
                                    • SetLastError.KERNEL32(?), ref: 1001E41B
                                    • UnmapViewOfFile.KERNEL32(00000000), ref: 1001E441
                                    • CloseHandle.KERNEL32(00000000), ref: 1001E461
                                    • CloseHandle.KERNEL32(00000000), ref: 1001E483
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseHandle$ErrorFileLastUnmapView
                                    • String ID:
                                    • API String ID: 4017539725-0
                                    • Opcode ID: 496f3fa893c77ec6c9c64e1aa7dc66e4b9ed660e755f62b2c78ec002215d3852
                                    • Instruction ID: cba275ec36c653788e4822474d84c3c335d5b1142b70863171b6aa198203d996
                                    • Opcode Fuzzy Hash: 496f3fa893c77ec6c9c64e1aa7dc66e4b9ed660e755f62b2c78ec002215d3852
                                    • Instruction Fuzzy Hash: 1E3118B5A002599BDB11CFA4CC48BAFBBF8FF48754F004219F805EB241EB75E9448BA0
                                    APIs
                                    • InterlockedCompareExchange.KERNEL32(00000000,?,00000000), ref: 1001B765
                                    • InterlockedCompareExchange.KERNEL32(?,?,?), ref: 1001B777
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CompareExchangeInterlocked
                                    • String ID:
                                    • API String ID: 3335655927-0
                                    • Opcode ID: 9484bcffa374807802c2175ff6f6c2d2e59b0392790023a2fe2f7dd29207cd47
                                    • Instruction ID: a411b3ee14b548daa5b868b1c8f2e50aeeae3c08791ef6b703bc2ef0cd82c7fc
                                    • Opcode Fuzzy Hash: 9484bcffa374807802c2175ff6f6c2d2e59b0392790023a2fe2f7dd29207cd47
                                    • Instruction Fuzzy Hash: 6E219F36304A09ABD720DF6DDD80E96F3EDFBC8311F00456AEA89C7240DB31E9548BA0
                                    APIs
                                    • VirtualAlloc.KERNEL32(?,00000000,00001000,00000004), ref: 100140EE
                                    • _memset.LIBCMT ref: 1001410A
                                    • VirtualAlloc.KERNEL32(?,?,00001000,00000004,?,100146FE), ref: 1001412C
                                    • _memmove.LIBCMT ref: 1001414A
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AllocVirtual$_memmove_memset
                                    • String ID:
                                    • API String ID: 725130153-0
                                    • Opcode ID: f53fd65b4befc706c090b7c927cf75363b07fbc3177beadfb71f7d900ef2fefc
                                    • Instruction ID: 93ed00f0eb9094769ecb9556d8f7921b1dd27d8a6f78ffda3dd0833cdc577a5f
                                    • Opcode Fuzzy Hash: f53fd65b4befc706c090b7c927cf75363b07fbc3177beadfb71f7d900ef2fefc
                                    • Instruction Fuzzy Hash: F631EA74A00209EFCB08CF94C995EAEB7B1FF48704F218598E915AB351D770EE81DB50
                                    APIs
                                    • GetFileSize.KERNEL32(00000002,00000004,?,?,?,00000002,00000004), ref: 1001A3B3
                                    • CreateFileMappingA.KERNEL32(00000002,00000000,00000004,00000004,00000000,00000000), ref: 1001A3E0
                                    • MapViewOfFileEx.KERNEL32(00000000,?,?,?,?,00000000,?,00000002,00000004), ref: 1001A429
                                    • CloseHandle.KERNEL32(?,?,00000002,00000004), ref: 1001A43F
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$CloseCreateHandleMappingSizeView
                                    • String ID:
                                    • API String ID: 1374251026-0
                                    • Opcode ID: 4b8af0a805cdf8347236f9c71f45033270cfc3b78af84c4974c8e4d52b637325
                                    • Instruction ID: 8fce67c6ff09011a8acf264d9e13d81355b447303082185ad91e7b9cb9a6a423
                                    • Opcode Fuzzy Hash: 4b8af0a805cdf8347236f9c71f45033270cfc3b78af84c4974c8e4d52b637325
                                    • Instruction Fuzzy Hash: 272167B5A0061AAFD714DF69DC45A5AF7F8FB49350F10812AFD19D7200D770E9A09BD0
                                    APIs
                                    • _free.LIBCMT ref: 1001B152
                                      • Part of subcall function 1001B190: HeapFree.KERNEL32(?,00000000,?), ref: 1001B1E5
                                    • DeleteCriticalSection.KERNEL32(?,1DFFD115), ref: 1001B113
                                    • DeleteCriticalSection.KERNEL32(?), ref: 1001B124
                                    • HeapFree.KERNEL32(?,00000000), ref: 1001B132
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalDeleteFreeHeapSection$_free
                                    • String ID:
                                    • API String ID: 210024702-0
                                    • Opcode ID: 2457e78313824737e41231bfbb3820b753e3b2e9e7e39901a1bfba69df0cf740
                                    • Instruction ID: 33c100260f324d21ff77bf2896aba4d0bbdecf1759cfcc0eaa01cd95da98a8db
                                    • Opcode Fuzzy Hash: 2457e78313824737e41231bfbb3820b753e3b2e9e7e39901a1bfba69df0cf740
                                    • Instruction Fuzzy Hash: 63319E71A00616EFDB11DFA8C884B5AFBF8FF05315F118269E9199F291D731E944CBA0
                                    APIs
                                    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,10011CAA), ref: 100152B1
                                      • Part of subcall function 1001EF9C: _malloc.LIBCMT ref: 1001EFB4
                                    • Process32First.KERNEL32(10011CAA,1DFFD115), ref: 100152E0
                                    • Process32Next.KERNEL32(10011CAA,1DFFD115), ref: 10015316
                                    • lstrcmpiA.KERNEL32(1DFFD0F1,00000000), ref: 1001532A
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Process32$CreateFirstNextSnapshotToolhelp32_malloclstrcmpi
                                    • String ID:
                                    • API String ID: 242301054-0
                                    • Opcode ID: 335c3f3c8a0e05f5839a3b8562ab9f751be2bf2361413e739464e8ead2f72be9
                                    • Instruction ID: 03fd10ac50de1202267bfae5930d06ed0f63b87ea6e01dd6c59341b656d33967
                                    • Opcode Fuzzy Hash: 335c3f3c8a0e05f5839a3b8562ab9f751be2bf2361413e739464e8ead2f72be9
                                    • Instruction Fuzzy Hash: 8321BAB4A04208EBDB14CB98C981A9EB7F5EF48745F2480A8E818AF341D771EF81DB54
                                    APIs
                                    • EnterCriticalSection.KERNEL32(?,?,?,?,10001499,?,?,00000000,?,?,?), ref: 100034A7
                                    • SleepConditionVariableCS.KERNEL32(00000000,?,00000000), ref: 100034CB
                                    • LeaveCriticalSection.KERNEL32(?), ref: 100034D2
                                    • SleepConditionVariableCS.KERNEL32(00000000,?,000000FF), ref: 1000350E
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ConditionCriticalSectionSleepVariable$EnterLeave
                                    • String ID:
                                    • API String ID: 3020340620-0
                                    • Opcode ID: 05074beb6edb66eb96e78de5814604b12c6efd175baefdef2757970339633dab
                                    • Instruction ID: f135a66ef4c3fa2a34bb39291fcdf00077fd575a97a3f57769656b34936bebed
                                    • Opcode Fuzzy Hash: 05074beb6edb66eb96e78de5814604b12c6efd175baefdef2757970339633dab
                                    • Instruction Fuzzy Hash: 42110471500B558FE772CA58D9C4B5773E8FB007A6F51DE1DE4938A899C374F8888B21
                                    APIs
                                    • IsWindowVisible.USER32(?), ref: 1000ED07
                                    • _memset.LIBCMT ref: 1000ED30
                                    • SendMessageA.USER32(?,0000000D,00000400,00000000), ref: 1000ED4A
                                    • lstrlenA.KERNEL32(00000000), ref: 1000ED57
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: MessageSendVisibleWindow_memsetlstrlen
                                    • String ID:
                                    • API String ID: 1293396957-0
                                    • Opcode ID: c0acd891ebef83d26f17d4d1390c8d3953d1a4ad271df1068977982f2c5964a8
                                    • Instruction ID: 5b252e65773c6f6e6056f087db140e16ac5e3367f8d3fdb97bb4e1eeb390b3d9
                                    • Opcode Fuzzy Hash: c0acd891ebef83d26f17d4d1390c8d3953d1a4ad271df1068977982f2c5964a8
                                    • Instruction Fuzzy Hash: 7311B6F5A00205EBEB14DF60CD45BDA7368DF54340F0044A9FB09FB285EA75EA858B95
                                    APIs
                                    • EnterCriticalSection.KERNEL32(?), ref: 10003292
                                    • SleepConditionVariableCS.KERNEL32(?,?,000000FF), ref: 100032BD
                                    • EnterCriticalSection.KERNEL32(?), ref: 100032ED
                                    • WakeConditionVariable.KERNEL32(?), ref: 100032FA
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ConditionCriticalEnterSectionVariable$SleepWake
                                    • String ID:
                                    • API String ID: 1272541424-0
                                    • Opcode ID: d2ef4d3d3bece3ecb2957c56201156f867af3ba4ab4f7a9e8506c951494b066a
                                    • Instruction ID: d287fa8a1d97e4fb1d990ba0663406a79fc7a6a744e69c2c1aa7d7a44e5ccb06
                                    • Opcode Fuzzy Hash: d2ef4d3d3bece3ecb2957c56201156f867af3ba4ab4f7a9e8506c951494b066a
                                    • Instruction Fuzzy Hash: 2C115572100B159FE336DF68DCC485BB3F9FB44360B418E19E4A683A45CB30F8498B60
                                    APIs
                                    • PeekMessageA.USER32(1001C8E6,00000000,00000000,00000000,00000001), ref: 1001EB99
                                    • TranslateMessage.USER32(?), ref: 1001EBBE
                                    • DispatchMessageA.USER32(?), ref: 1001EBC4
                                    • PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 1001EBD6
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Message$Peek$DispatchTranslate
                                    • String ID:
                                    • API String ID: 1795658109-0
                                    • Opcode ID: 5f19f8642b326884221ac1f2436e0d1f5125d6a111024dfe36bdec5d200537f7
                                    • Instruction ID: 4683bdf92f3b324d92ef008ada9b145ce160014bd2fbc826a850825f78051344
                                    • Opcode Fuzzy Hash: 5f19f8642b326884221ac1f2436e0d1f5125d6a111024dfe36bdec5d200537f7
                                    • Instruction Fuzzy Hash: 0D018833A4421D67EB20DAD99CC1FEEF3ACEB44750F5005A2FE08EB1C0D6A5E94146A0
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CreateDirectory_memset_strlen_strncpy
                                    • String ID:
                                    • API String ID: 3994138041-0
                                    • Opcode ID: 5146f0f5f6924dacce34261d64f74e5090e561bcbd4e5be505613ef66d126bf7
                                    • Instruction ID: 101a95c8069f775dae9c248aff8c456d68721b5b320a68391b460c7f447a75fb
                                    • Opcode Fuzzy Hash: 5146f0f5f6924dacce34261d64f74e5090e561bcbd4e5be505613ef66d126bf7
                                    • Instruction Fuzzy Hash: CB1194B9D041189BCB10DB64DC81BDD77B8EF65304F0082E9E59D9B281DAB4EBD48F91
                                    APIs
                                      • Part of subcall function 10017520: _free.LIBCMT ref: 1001755A
                                    • HeapDestroy.KERNEL32(00000000,1DFFD115,?,?,?,?,100359E3,000000FF), ref: 10016B70
                                    • HeapCreate.KERNEL32(00000001,?,?,1DFFD115,?,?,?,?,100359E3,000000FF), ref: 10016B7F
                                    • _free.LIBCMT ref: 10016B8F
                                    • HeapDestroy.KERNEL32(?,?,?,?,?,100359E3,000000FF), ref: 10016BBD
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Heap$Destroy_free$Create
                                    • String ID:
                                    • API String ID: 3093871995-0
                                    • Opcode ID: 16e0c79affba40acb3f9a94d92ca98c28378774c059c7bd50a370be0c89aea4a
                                    • Instruction ID: d00498a318c3039bf53502062df662130d8b902564dd33ec98044163ccf8f0fc
                                    • Opcode Fuzzy Hash: 16e0c79affba40acb3f9a94d92ca98c28378774c059c7bd50a370be0c89aea4a
                                    • Instruction Fuzzy Hash: F71136B6904B149FD720CF69DC44B56BBF8FB08750F004A2DE89AC7651E775E944CB90
                                    APIs
                                    • ___BuildCatchObject.LIBCMT ref: 10026247
                                      • Part of subcall function 10026858: ___AdjustPointer.LIBCMT ref: 100268A1
                                    • _UnwindNestedFrames.LIBCMT ref: 1002625E
                                    • ___FrameUnwindToState.LIBCMT ref: 10026270
                                    • CallCatchBlock.LIBCMT ref: 10026294
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
                                    • String ID:
                                    • API String ID: 2633735394-0
                                    • Opcode ID: 6092b50bab1218cd8aabaab9e12c658e2e0f1782f2186364ed2301dcdcc7d9c1
                                    • Instruction ID: 780a5d68346db81fedf9f8d85dc8351bab79c3fb61c7619bb358afdc1328406f
                                    • Opcode Fuzzy Hash: 6092b50bab1218cd8aabaab9e12c658e2e0f1782f2186364ed2301dcdcc7d9c1
                                    • Instruction Fuzzy Hash: 88011732000109FBCF12CF95EC05EDA3BBAFF8C754F518115FA1865121C776E865ABA0
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                    • String ID:
                                    • API String ID: 3016257755-0
                                    • Opcode ID: 3c6a35542a271610c24967ae1addb0a5128256cd46e27c9700edfec13bdc5c5a
                                    • Instruction ID: c2eb68e8ade19565e9c0612c28aff17bdb070db1da49cc9352462dfe7f7478ea
                                    • Opcode Fuzzy Hash: 3c6a35542a271610c24967ae1addb0a5128256cd46e27c9700edfec13bdc5c5a
                                    • Instruction Fuzzy Hash: 1201407A40214EBBCF529E84EC51CDD3F72FB18294BA58415FE1858031C336DAB1AB91
                                    APIs
                                    • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 10015381
                                    • __beginthreadex.LIBCMT ref: 100153A3
                                    • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 100153B4
                                    • CloseHandle.KERNEL32(00000000), ref: 100153BE
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseCreateEventHandleObjectSingleWait__beginthreadex
                                    • String ID:
                                    • API String ID: 2993629242-0
                                    • Opcode ID: d7dcd88de3af4c7a17b78a3c7ea8846737ab5e00941b9493fb9a3973c1d0ec84
                                    • Instruction ID: 28439952cb9d60efeb8680ab5036a31f0774e1b625031860cf64c459a7230e8b
                                    • Opcode Fuzzy Hash: d7dcd88de3af4c7a17b78a3c7ea8846737ab5e00941b9493fb9a3973c1d0ec84
                                    • Instruction Fuzzy Hash: 9A111EB5A04249AFDB14DFA8CC81BEE7BB4EF49310F504249F919AB381D730AA40CB90
                                    APIs
                                    • __malloc_crt.LIBCMT ref: 10032807
                                    • std::exception::exception.LIBCMT ref: 10032821
                                    • __CxxThrowException@8.LIBCMT ref: 10032857
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Exception@8Throw__malloc_crtstd::exception::exception
                                    • String ID:
                                    • API String ID: 3183362523-0
                                    • Opcode ID: c060a18d73b796a30dd2a53eb01a138e769d2f3d535d15112ec57b6c053b814d
                                    • Instruction ID: 61d3b0669a0cbb4b249a077222c69809c774bd9a0b89fdd2f935691ba84154ea
                                    • Opcode Fuzzy Hash: c060a18d73b796a30dd2a53eb01a138e769d2f3d535d15112ec57b6c053b814d
                                    • Instruction Fuzzy Hash: AEF04F799002097ACB05DFA4D9859CDB7FCEA10284F80C056FD15AB141DB78E384CA91
                                    APIs
                                      • Part of subcall function 100174B0: HeapFree.KERNEL32(10016ACC,00000000,?,?,?,?,10016ACC,?,?,10016FF0), ref: 100174D5
                                      • Part of subcall function 100174B0: _free.LIBCMT ref: 100174EF
                                    • HeapDestroy.KERNEL32(00000000,?,?,10016FF0), ref: 10016AD3
                                    • HeapCreate.KERNEL32(?,?,?,?,?,10016FF0), ref: 10016AE2
                                    • _free.LIBCMT ref: 10016AF2
                                    • HeapDestroy.KERNEL32(?,10016FF0), ref: 10016B22
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Heap$Destroy_free$CreateFree
                                    • String ID:
                                    • API String ID: 4097506873-0
                                    • Opcode ID: 5821550070371558d6326ac293e511f2d9706211c5074b01848d33611e582a02
                                    • Instruction ID: 26b69236e6c287892c4b939c4df5092f0c49b63a1c7adf96395978ecd4ddac7a
                                    • Opcode Fuzzy Hash: 5821550070371558d6326ac293e511f2d9706211c5074b01848d33611e582a02
                                    • Instruction Fuzzy Hash: 07F01DB5200602AFEB05DF75DC48B46BBB8FF08345F404218E409CBA51DB35E4A5CBD0
                                    APIs
                                    • _memmove.LIBCMT ref: 1001BB2C
                                    • Concurrency::details::_Concurrent_queue_base_v4::_Internal_throw_exception.LIBCPMT ref: 1001BB66
                                      • Part of subcall function 1001ED68: std::exception::exception.LIBCMT ref: 1001ED7E
                                      • Part of subcall function 1001ED68: __CxxThrowException@8.LIBCMT ref: 1001ED93
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Concurrency::details::_Concurrent_queue_base_v4::_Exception@8Internal_throw_exceptionThrow_memmovestd::exception::exception
                                    • String ID: vector<T> too long
                                    • API String ID: 3224774664-3788999226
                                    • Opcode ID: 6098c6dfe018a0d1be71fac0227d1825c4ecc01241087ebe161bd52a6db14e3a
                                    • Instruction ID: eae54de508585d01ba0ea4a69c7d47a938ab1ba8a2878b9bbe041104eb365bc3
                                    • Opcode Fuzzy Hash: 6098c6dfe018a0d1be71fac0227d1825c4ecc01241087ebe161bd52a6db14e3a
                                    • Instruction Fuzzy Hash: 3C312876700A295BC714CEADDCC189ABB99EB88370724823AF918CB644D771F991C7D0
                                    APIs
                                    Strings
                                    • wmic cpu get processorid, xrefs: 100065E0
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: char_traitsconstruct
                                    • String ID: wmic cpu get processorid
                                    • API String ID: 489808500-2204115948
                                    • Opcode ID: 1010ae759fa7e10457475eff9b78d9461d1f2c37ab24339ddda26cbfa1624876
                                    • Instruction ID: dd645ee37d0e35d6a0c4dc76963d6f74060cdeeedd1d1d5c8c6965c7acc1db0f
                                    • Opcode Fuzzy Hash: 1010ae759fa7e10457475eff9b78d9461d1f2c37ab24339ddda26cbfa1624876
                                    • Instruction Fuzzy Hash: 01410F75E00209DFDB08CF98D891AEEB7B6FF4C750F208129E915A7385DB35A941CBA4
                                    APIs
                                    • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 10011461
                                    • DeleteFileA.KERNEL32(?), ref: 100114B6
                                      • Part of subcall function 10011580: _memset.LIBCMT ref: 100115CC
                                      • Part of subcall function 10011580: GetSystemDirectoryA.KERNEL32(00000000,00000104), ref: 100115E0
                                      • Part of subcall function 10011580: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000), ref: 10011647
                                      • Part of subcall function 10011580: GetFileSize.KERNEL32(000000FF,00000000), ref: 10011669
                                      • Part of subcall function 10011580: ReadFile.KERNEL32(000000FF,?,00000000,00000000,00000000), ref: 100116B4
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$DirectorySystem$CreateDeleteReadSize_memset
                                    • String ID: .key
                                    • API String ID: 3518743009-343438762
                                    • Opcode ID: eb43b5ddff7011dff6964891f9a77986a6cb4ad83d3904fe4c7462824836723d
                                    • Instruction ID: c5e3bf08ea98db34f13579d809896ca9d031d76340f358e502fc38b765e240d6
                                    • Opcode Fuzzy Hash: eb43b5ddff7011dff6964891f9a77986a6cb4ad83d3904fe4c7462824836723d
                                    • Instruction Fuzzy Hash: 9F31E675A0025C9BDB28CF64DC42BEEB7B9EB45310F5081A9F9059B281DB35AE85CB90
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _swscanf
                                    • String ID: %d.%d.%d.%d%c
                                    • API String ID: 2748852333-2398565245
                                    • Opcode ID: 18e54956b6ff5e5e5f09465d7c17339f29108a54fe6fde34eeeaabc51fafe8c6
                                    • Instruction ID: ed2d36106069c91f8a44cef8226e493977f524409a11eb0d6646e4ffefc909ba
                                    • Opcode Fuzzy Hash: 18e54956b6ff5e5e5f09465d7c17339f29108a54fe6fde34eeeaabc51fafe8c6
                                    • Instruction Fuzzy Hash: 37118232A001189BEB15DFA4D841AFE73BCEF19201F4101AEE90ADB151DB71EA848792
                                    APIs
                                    • FindWindowA.USER32(Shell_TrayWnd,00000000), ref: 1000F5EB
                                    • MessageBoxA.USER32(00000000), ref: 1000F5F2
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: FindMessageWindow
                                    • String ID: Shell_TrayWnd
                                    • API String ID: 2823233367-2988720461
                                    • Opcode ID: fa6ae15565b281fa731f87bbf66bd491b581fbd42e31be7702e6434cd4fda3cb
                                    • Instruction ID: 8a2575e9232a4e6788a4e3303b54ed8dbf7533174b6017679d5c7ff6e03b4625
                                    • Opcode Fuzzy Hash: fa6ae15565b281fa731f87bbf66bd491b581fbd42e31be7702e6434cd4fda3cb
                                    • Instruction Fuzzy Hash: 240116B4D00208EFEB10CFA4D949B9EB7F4FB48341F2084A9E905A7394D675AF40AB54
                                    APIs
                                    • _memset.LIBCMT ref: 1001214F
                                    • GlobalMemoryStatusEx.KERNEL32(00000040), ref: 10012162
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: GlobalMemoryStatus_memset
                                    • String ID: @
                                    • API String ID: 587104284-2766056989
                                    • Opcode ID: d7d7f9b0b0953cb5caef1f62c0310114e2340016ed59b2748a12603957ba9fb6
                                    • Instruction ID: 3d7f5f32418326eb2dbc6e30da0d634f8bec6cfce8173ea13a502be2592b4bca
                                    • Opcode Fuzzy Hash: d7d7f9b0b0953cb5caef1f62c0310114e2340016ed59b2748a12603957ba9fb6
                                    • Instruction Fuzzy Hash: 20F06DB0A10208ABDB14DFA4C941B9DBBF8EF18300F50412CE909EB381DB34EA45CB80
                                    APIs
                                    • _memset.LIBCMT ref: 1000F3D5
                                    • wsprintfA.USER32 ref: 1000F3ED
                                      • Part of subcall function 1000F630: _memset.LIBCMT ref: 1000F648
                                      • Part of subcall function 1000F630: CreateProcessA.KERNEL32(00000000,1000F402,00000000,00000000,00000001,08000020,00000000,00000000,00000044,00000000), ref: 1000F686
                                      • Part of subcall function 1000F630: WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 1000F696
                                      • Part of subcall function 1000F630: CloseHandle.KERNEL32(00000000), ref: 1000F6A0
                                      • Part of subcall function 1000F630: CloseHandle.KERNEL32(?), ref: 1000F6AA
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseHandle_memset$CreateObjectProcessSingleWaitwsprintf
                                    • String ID: taskkill /f /t /im %s
                                    • API String ID: 1221303216-1431264914
                                    • Opcode ID: e147f47295d6159a0972dd24f2dc00c959dda93d6aa0ae33a39929a26f1210c1
                                    • Instruction ID: 7a26d32dd3a77ef8c91e8ca8fb8e6281576ca4a882f0339c21baba38ccc25a09
                                    • Opcode Fuzzy Hash: e147f47295d6159a0972dd24f2dc00c959dda93d6aa0ae33a39929a26f1210c1
                                    • Instruction Fuzzy Hash: 33F05475E00108ABDF10DBA4DD46BA973B8EF54204F4040A8F94DDB182EE75BB58CB91
                                    APIs
                                    • EnterCriticalSection.KERNEL32(00000054,?,00000000), ref: 1001BC70
                                    • SetLastError.KERNEL32(00000000), ref: 1001BC7F
                                    • LeaveCriticalSection.KERNEL32(00000054), ref: 1001BCA7
                                    • HeapFree.KERNEL32(?,00000000,?,?), ref: 1001BD36
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalSection$EnterErrorFreeHeapLastLeave
                                    • String ID:
                                    • API String ID: 132244544-0
                                    • Opcode ID: 5ee7b2dd0110e595599aec328bd6a18fa6e2e8a676dff69a3f1635a7451a1511
                                    • Instruction ID: 85bd10d27e0b442e1dab5c9d78a6aaa91c45580178b632b1c4d7f06aa4383219
                                    • Opcode Fuzzy Hash: 5ee7b2dd0110e595599aec328bd6a18fa6e2e8a676dff69a3f1635a7451a1511
                                    • Instruction Fuzzy Hash: 90418E75A00649AFDB14CFA8D884BAEB7F8FF48350F10052AED05DB351DB35E9808B91
                                    APIs
                                    • SetLastError.KERNEL32(0000139F,1DFFD115,?,?,?,?,0000000F,10035F78,000000FF,?,1001CE86), ref: 1001CED9
                                    • EnterCriticalSection.KERNEL32(?,1DFFD115,?,?,?,?,0000000F,10035F78,000000FF,?,1001CE86), ref: 1001CF09
                                    • LeaveCriticalSection.KERNEL32(?,?,?,?,0000000F,10035F78,000000FF,?,1001CE86), ref: 1001CF3A
                                    • SetLastError.KERNEL32(00000057,1DFFD115,?,?,?,?,0000000F,10035F78,000000FF,?,1001CE86), ref: 1001CF6A
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.3054387752.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 00000006.00000002.3054340307.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054474547.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 00000006.00000002.3054812215.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalErrorLastSection$EnterLeave
                                    • String ID:
                                    • API String ID: 2124651672-0
                                    • Opcode ID: 5a7bbe1e01743a2055287aad97c0971164d7a590c1f1937ca8fb7b3f6b1a058c
                                    • Instruction ID: 7325f94427708edb1f6ad39a4a2f2957c0187faf522ed9944e05cc5fe4afe9c1
                                    • Opcode Fuzzy Hash: 5a7bbe1e01743a2055287aad97c0971164d7a590c1f1937ca8fb7b3f6b1a058c
                                    • Instruction Fuzzy Hash: B0218932A04248EFDB11CF58CC84F9ABBBAFB89761F10466EE8149A291D735D981CB50
                                    APIs
                                    • NtQueryInformationProcess.NTDLL(-00000001,00000022,005326FB,00000004,00000000), ref: 00530A8A
                                    • NtSetInformationProcess.NTDLL(-00000001,00000022,?,00000004,005309F7,0000005D), ref: 00530AAA
                                    • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004,00000004,005309F7,0000005D), ref: 00530ACC
                                    • wsprintfA.USER32(?,?,?,?), ref: 00530B74
                                    • MessageBoxA.USER32(00000000,?,?,00000010), ref: 00530B8C
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000003.2168929398.0000000000530000.00000040.00001000.00020000.00000000.sdmp, Offset: 00530000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_3_530000_rundll32.jbxd
                                    Similarity
                                    • API ID: InformationProcess$AllocMessageQueryVirtualwsprintf
                                    • String ID: Application error$SWVU$The procedure %s could not be located in the DLL %s.
                                    • API String ID: 2902211186-4283279704
                                    • Opcode ID: de0e8ee88c8a98f7b8a38ace4394a491acda8513ba92f7ded7199e416edf0d91
                                    • Instruction ID: ba88ecb875cf2e488da5f5642fade325ba9b21567fa9d8ee2f486c84f9552662
                                    • Opcode Fuzzy Hash: de0e8ee88c8a98f7b8a38ace4394a491acda8513ba92f7ded7199e416edf0d91
                                    • Instruction Fuzzy Hash: DB41B0726017469FEB359F24CC69BABBBA8FF44781F004528EE4697284DB70AD10CB54
                                    APIs
                                    • NtSetInformationProcess.NTDLL(-00000001,00000022,?,00000004,005309F7,0000005D), ref: 00530AAA
                                    • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004,00000004,005309F7,0000005D), ref: 00530ACC
                                    • wsprintfA.USER32(?,?,?,?), ref: 00530B74
                                    • MessageBoxA.USER32(00000000,?,?,00000010), ref: 00530B8C
                                    • ExitProcess.KERNEL32(00000000), ref: 00530B94
                                    • VirtualFree.KERNELBASE(?,00000000,00008000,?), ref: 00530BE7
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000007.00000003.2168929398.0000000000530000.00000040.00001000.00020000.00000000.sdmp, Offset: 00530000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_3_530000_rundll32.jbxd
                                    Similarity
                                    • API ID: ProcessVirtual$AllocExitFreeInformationMessagewsprintf
                                    • String ID: Application error$SWVU$The procedure %s could not be located in the DLL %s.
                                    • API String ID: 2788668848-4283279704
                                    • Opcode ID: f644d6bb55c65f053268db4f25cec8320b3bbf1d1d06db4825fff5ba47126e3b
                                    • Instruction ID: 8391ea42fdc1797dd4320df7ee6e380f40504d26fb42a9789caf3b16a512e9d1
                                    • Opcode Fuzzy Hash: f644d6bb55c65f053268db4f25cec8320b3bbf1d1d06db4825fff5ba47126e3b
                                    • Instruction Fuzzy Hash: 43319D7124138A9BDB399F20CC69FEF7BACEF45781F004529FE46862C5DA74A9108A64
                                    APIs
                                    • VirtualProtect.KERNEL32(?,00001000,00000004,?,?), ref: 005313EA
                                    • VirtualProtect.KERNEL32(?,00001000,?,?), ref: 00531403
                                    Memory Dump Source
                                    • Source File: 00000007.00000003.2168929398.0000000000530000.00000040.00001000.00020000.00000000.sdmp, Offset: 00530000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_3_530000_rundll32.jbxd
                                    Similarity
                                    • API ID: ProtectVirtual
                                    • String ID:
                                    • API String ID: 544645111-0
                                    • Opcode ID: 460e07aa1c6cfb092b5f976fa85d581fca477865be9a128e2591be7121e923ca
                                    • Instruction ID: b1d429a417b6c49ed05833987fabd77db929dafd5a81931b874044704500e5e3
                                    • Opcode Fuzzy Hash: 460e07aa1c6cfb092b5f976fa85d581fca477865be9a128e2591be7121e923ca
                                    • Instruction Fuzzy Hash: 74F08276200305AFDB19CF40C844FEA7779EB48391F104176EA42AB684C670F5148B10
                                    APIs
                                    • VirtualAlloc.KERNEL32(00000000,-00000436,00001000,00000004), ref: 0053087D
                                    • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 005308A9
                                    Memory Dump Source
                                    • Source File: 00000007.00000003.2168929398.0000000000530000.00000040.00001000.00020000.00000000.sdmp, Offset: 00530000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_7_3_530000_rundll32.jbxd
                                    Similarity
                                    • API ID: Virtual$AllocFree
                                    • String ID:
                                    • API String ID: 2087232378-0
                                    • Opcode ID: 7e515f7c385f7f07b94d9a5cb9b23266753d833ffbaa65bc10218dcc86593253
                                    • Instruction ID: 4426bb100af0c1772b8f7cacb043132421f1b2e67447461f6e8d2d46386c02ed
                                    • Opcode Fuzzy Hash: 7e515f7c385f7f07b94d9a5cb9b23266753d833ffbaa65bc10218dcc86593253
                                    • Instruction Fuzzy Hash: 2D018471A01214BBEB04CE99CC41FAFB7A9EBC8760F14C16AF61897385D674AD10CBA0

                                    Execution Graph

                                    Execution Coverage:1.9%
                                    Dynamic/Decrypted Code Coverage:98.5%
                                    Signature Coverage:0%
                                    Total number of Nodes:457
                                    Total number of Limit Nodes:8
                                    execution_graph 24152 10013a20 24214 1000da40 24152->24214 24154 10013ab9 24155 10013ac2 IsUserAnAdmin 24154->24155 24156 10013aec 24154->24156 24155->24156 24159 10013acc 24155->24159 24157 10013b05 24156->24157 24239 10012260 6 API calls 24156->24239 24162 10013b77 24157->24162 24163 10013b0e _memset 24157->24163 24158 10013a42 _memset 24158->24154 24232 10022e79 24158->24232 24164 10013ae2 24159->24164 24165 10013ad5 ReleaseMutex 24159->24165 24241 10009ae0 InitializeCriticalSection 24162->24241 24171 10013b21 GetModuleFileNameA 24163->24171 24238 100118d0 72 API calls 2 library calls 24164->24238 24165->24164 24166 10013afa 24166->24157 24174 10022bd3 70 API calls 24166->24174 24170 10013ab2 24235 10022bd3 24170->24235 24240 10022df7 108 API calls 4 library calls 24171->24240 24172 10013b7c 24177 10013bc9 24172->24177 24242 10013240 11 API calls 24172->24242 24173 10013ae9 24173->24156 24174->24157 24181 10013be6 24177->24181 24182 10013bf9 24177->24182 24190 10013bf4 _strlen 24177->24190 24179 10013b53 DeleteFileA MoveFileA 24179->24162 24180 10013b8f 24184 10013ba1 24180->24184 24243 10013260 11 API calls 24180->24243 24185 10013c1b 24181->24185 24186 10013bef 24181->24186 24245 10006080 24182->24245 24244 10015350 96 API calls 2 library calls 24184->24244 24250 100137c0 8 API calls 3 library calls 24185->24250 24254 1001f13f 110 API calls 6 library calls 24186->24254 24195 10013ce4 24190->24195 24255 100132c0 239 API calls 2 library calls 24190->24255 24193 10013b9d 24193->24177 24193->24184 24194 10013c20 24197 10013c24 24194->24197 24198 10013c68 24194->24198 24256 100132c0 239 API calls 2 library calls 24195->24256 24196 10013c13 24196->24190 24251 1001f13f 110 API calls 6 library calls 24197->24251 24252 1001f13f 110 API calls 6 library calls 24198->24252 24202 10013bc6 24202->24177 24205 10013cfb 24257 1001ffa4 24205->24257 24206 10013c2e StartServiceCtrlDispatcherA 24209 10013c93 WSAStartup 24206->24209 24207 10013c72 24253 10012550 99 API calls 5 library calls 24207->24253 24209->24190 24211 10013d08 24212 10013c89 24213 10022bd3 70 API calls 24212->24213 24213->24209 24215 1000da70 type_info::name 24214->24215 24264 1000cfc0 24215->24264 24217 1000da85 type_info::name 24286 1000d420 24217->24286 24221 1000dab1 _Copy_impl 24222 1000dadf _Copy_impl 24221->24222 24311 1000de50 24221->24311 24317 1000d890 CryptAcquireContextA 24222->24317 24229 1000db00 codecvt 24230 1001ffa4 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 6 API calls 24229->24230 24231 1000db33 24230->24231 24231->24158 24489 100287c6 24232->24489 24234 10013a8b CreateMutexA GetLastError 24234->24154 24234->24170 24511 10022aa4 24235->24511 24237 10022be2 24237->24154 24238->24173 24239->24166 24240->24179 24241->24172 24242->24180 24243->24193 24244->24202 24246 10006091 construct codecvt type_info::name 24245->24246 24544 10006b60 24246->24544 24249 100138f0 112 API calls 5 library calls 24249->24196 24250->24194 24251->24206 24252->24207 24253->24212 24254->24190 24255->24195 24256->24205 24258 1001ffac 24257->24258 24259 1001ffae IsProcessorFeaturePresent 24257->24259 24258->24211 24261 10022c38 24259->24261 24557 10022be7 5 API calls 2 library calls 24261->24557 24263 10022d1b 24263->24211 24265 1000cfdb __write_nolock 24264->24265 24266 10006080 71 API calls 24265->24266 24267 1000d01b _memset type_info::name 24266->24267 24268 1000d0b6 CreatePipe 24267->24268 24269 1000d126 GetStartupInfoA CreateProcessA 24268->24269 24285 1000d121 CloseHandle CloseHandle CloseHandle CloseHandle 24268->24285 24271 1000d198 WaitForSingleObject ReadFile 24269->24271 24269->24285 24272 1000d1e0 24271->24272 24271->24285 24334 1000cfa0 71 API calls 24272->24334 24274 1000d3e2 codecvt 24275 1001ffa4 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 6 API calls 24274->24275 24276 1000d411 24275->24276 24276->24217 24277 1000d1fc _Copy_impl 24277->24285 24335 1000dde0 71 API calls 24277->24335 24279 1000d251 24336 10006250 71 API calls 5 library calls 24279->24336 24281 1000d269 _memset codecvt 24337 1000cf40 70 API calls _$I10_OUTPUT 24281->24337 24283 1000d2a2 _memset _Copy_impl 24338 1000cfa0 71 API calls 24283->24338 24285->24274 24287 1000d43b __write_nolock 24286->24287 24288 10006080 71 API calls 24287->24288 24289 1000d47a _memset type_info::name 24288->24289 24290 1000d515 CreatePipe 24289->24290 24291 1000d585 GetStartupInfoA CreateProcessA 24290->24291 24293 1000d580 CloseHandle CloseHandle CloseHandle CloseHandle 24290->24293 24291->24293 24294 1000d5f7 WaitForSingleObject ReadFile 24291->24294 24297 1000d841 codecvt 24293->24297 24294->24293 24295 1000d63f 24294->24295 24339 1000cfa0 71 API calls 24295->24339 24298 1001ffa4 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 6 API calls 24297->24298 24299 1000d870 24298->24299 24308 10007bf0 24299->24308 24300 1000d65b _Copy_impl 24300->24293 24340 1000dde0 71 API calls 24300->24340 24302 1000d6b0 24341 10006250 71 API calls 5 library calls 24302->24341 24304 1000d6c8 _memset codecvt 24342 1000cf40 70 API calls _$I10_OUTPUT 24304->24342 24307 1000d701 _memset _Copy_impl 24343 1000cfa0 71 API calls 24307->24343 24344 10007c10 24308->24344 24310 10007c07 24310->24221 24355 10021e65 GetSystemTimeAsFileTime 24311->24355 24313 1000dac7 24314 1000de30 24313->24314 24357 10021dfa 24314->24357 24318 1000d8c0 GetLastError 24317->24318 24319 1000d8d1 CryptCreateHash 24317->24319 24320 1000da31 24318->24320 24321 1000d908 CryptHashData 24319->24321 24322 1000d8eb GetLastError CryptReleaseContext 24319->24322 24323 1001ffa4 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 6 API calls 24320->24323 24324 1000d920 GetLastError CryptDestroyHash CryptReleaseContext 24321->24324 24325 1000d947 CryptGetHashParam 24321->24325 24322->24320 24326 1000da3b 24323->24326 24324->24320 24488 1001ef69 24325->24488 24326->24229 24333 1000db40 71 API calls char_traits 24333->24222 24334->24277 24335->24279 24336->24281 24337->24283 24338->24285 24339->24300 24340->24302 24341->24304 24342->24307 24343->24293 24345 10007c21 _Copy_impl 24344->24345 24346 10007c2e _Copy_impl 24345->24346 24352 100069d0 71 API calls codecvt 24345->24352 24348 10007c60 24346->24348 24353 10010b70 71 API calls std::ios_base::clear 24346->24353 24351 10007c80 std::ios_base::clear char_traits 24348->24351 24354 100067d0 71 API calls 2 library calls 24348->24354 24351->24310 24352->24346 24353->24348 24354->24351 24356 10021e93 __aulldiv 24355->24356 24356->24313 24358 10021e11 24357->24358 24359 10021e2f 24357->24359 24405 100258dc 70 API calls __getptd_noexit 24358->24405 24360 10021e49 24359->24360 24363 10021e3c 24359->24363 24372 10026fe8 24360->24372 24362 10021e16 24406 10024a04 9 API calls _vscan_fn 24362->24406 24407 100258dc 70 API calls __getptd_noexit 24363->24407 24367 10021e53 24368 10021e21 24367->24368 24408 10026dea 70 API calls 4 library calls 24367->24408 24370 1001ffa4 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 6 API calls 24368->24370 24371 1000dad3 24370->24371 24371->24333 24373 10027003 24372->24373 24374 10027019 _memset 24372->24374 24417 100258dc 70 API calls __getptd_noexit 24373->24417 24374->24373 24380 10027030 24374->24380 24376 10027008 24418 10024a04 9 API calls _vscan_fn 24376->24418 24378 1002703b 24419 100258dc 70 API calls __getptd_noexit 24378->24419 24379 10027059 24409 1002ce25 24379->24409 24380->24378 24380->24379 24383 1002705e 24420 1002cb7e 70 API calls 2 library calls 24383->24420 24385 10027067 24386 10027255 24385->24386 24421 1002cba8 70 API calls 2 library calls 24385->24421 24434 10024a14 8 API calls 2 library calls 24386->24434 24389 1002725f 24390 10027079 24390->24386 24422 1002cbd2 24390->24422 24392 1002708b 24392->24386 24393 10027094 24392->24393 24394 1002710b 24393->24394 24396 100270a7 24393->24396 24432 1002cbfc 70 API calls 5 library calls 24394->24432 24429 1002cbfc 70 API calls 5 library calls 24396->24429 24398 10027112 24404 10027012 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 24398->24404 24433 1002ce75 70 API calls 3 library calls 24398->24433 24399 100270bf 24399->24404 24430 1002ce75 70 API calls 3 library calls 24399->24430 24402 100270d8 24402->24404 24431 1002cbfc 70 API calls 5 library calls 24402->24431 24404->24367 24405->24362 24406->24368 24407->24368 24408->24368 24410 1002ce31 __setmbcp 24409->24410 24411 1002ce66 __setmbcp 24410->24411 24435 10027ff1 24410->24435 24411->24383 24413 1002ce54 24473 1002ce6c LeaveCriticalSection _doexit 24413->24473 24414 1002ce41 24414->24413 24442 1002d09f 24414->24442 24417->24376 24418->24404 24419->24404 24420->24385 24421->24390 24423 1002cbf1 24422->24423 24424 1002cbdc 24422->24424 24423->24392 24486 100258dc 70 API calls __getptd_noexit 24424->24486 24426 1002cbe1 24487 10024a04 9 API calls _vscan_fn 24426->24487 24428 1002cbec 24428->24392 24429->24399 24430->24402 24431->24404 24432->24398 24433->24404 24434->24389 24436 10028002 24435->24436 24437 10028015 EnterCriticalSection 24435->24437 24474 10028079 70 API calls 7 library calls 24436->24474 24437->24414 24439 10028008 24439->24437 24475 10022950 70 API calls 3 library calls 24439->24475 24443 1002d0ab __setmbcp 24442->24443 24444 10027ff1 __lock 70 API calls 24443->24444 24445 1002d0c6 __tzset_nolock 24444->24445 24446 1002cbd2 __tzset_nolock 70 API calls 24445->24446 24447 1002d0db 24446->24447 24463 1002d17a __tzset_nolock 24447->24463 24476 1002cb7e 70 API calls 2 library calls 24447->24476 24450 1002d0ed 24450->24463 24477 1002cba8 70 API calls 2 library calls 24450->24477 24451 1002d1c6 GetTimeZoneInformation 24451->24463 24454 1002d0ff 24454->24463 24478 1002dd2f 78 API calls 2 library calls 24454->24478 24456 1002d230 WideCharToMultiByte 24456->24463 24457 1002d10d 24479 1002f6f1 101 API calls 3 library calls 24457->24479 24458 1002d268 WideCharToMultiByte 24458->24463 24461 1002d161 _strlen 24481 1002476a 70 API calls _malloc 24461->24481 24462 1002d12e ___TypeMatch 24462->24461 24462->24463 24467 1002d15b 24462->24467 24463->24451 24463->24456 24463->24458 24464 1002d3b1 __tzset_nolock __setmbcp 24463->24464 24465 10023218 70 API calls __tzset_nolock 24463->24465 24472 1002f6dd 83 API calls __tzset_nolock 24463->24472 24483 10024a14 8 API calls 2 library calls 24463->24483 24484 1002043c 70 API calls 2 library calls 24463->24484 24485 1002d331 LeaveCriticalSection _doexit 24463->24485 24464->24413 24465->24463 24480 1002043c 70 API calls 2 library calls 24467->24480 24469 1002d16f _strlen 24469->24463 24482 10021da5 70 API calls 2 library calls 24469->24482 24471 1002d19b 24471->24463 24472->24463 24473->24411 24474->24439 24476->24450 24477->24454 24478->24457 24479->24462 24480->24461 24481->24469 24482->24471 24483->24463 24484->24463 24485->24463 24486->24426 24487->24428 24490 100287e4 24489->24490 24491 100287cf 24489->24491 24492 10028825 24490->24492 24494 100287f2 24490->24494 24505 100258dc 70 API calls __getptd_noexit 24491->24505 24509 100258dc 70 API calls __getptd_noexit 24492->24509 24507 100286fe 103 API calls 3 library calls 24494->24507 24496 100287d4 24506 10024a04 9 API calls _vscan_fn 24496->24506 24499 1002881d 24510 10024a04 9 API calls _vscan_fn 24499->24510 24500 100287df 24500->24234 24501 10028809 24503 10028835 24501->24503 24508 100258dc 70 API calls __getptd_noexit 24501->24508 24503->24234 24505->24496 24506->24500 24507->24501 24508->24499 24509->24499 24510->24503 24512 10022ab0 __setmbcp 24511->24512 24513 10027ff1 __lock 63 API calls 24512->24513 24514 10022ab7 24513->24514 24515 10022b70 __initterm 24514->24515 24516 10022ae5 DecodePointer 24514->24516 24531 10022bbe 24515->24531 24516->24515 24518 10022afc DecodePointer 24516->24518 24525 10022b0c 24518->24525 24520 10022bcd __setmbcp 24520->24237 24522 10022b19 EncodePointer 24522->24525 24523 10022bb5 24536 10022833 24523->24536 24525->24515 24525->24522 24527 10022b29 DecodePointer EncodePointer 24525->24527 24529 10022b3b DecodePointer DecodePointer 24527->24529 24529->24525 24532 10022bc4 24531->24532 24533 10022b9e 24531->24533 24539 10028155 LeaveCriticalSection 24532->24539 24533->24520 24535 10028155 LeaveCriticalSection 24533->24535 24535->24523 24540 10022801 GetModuleHandleExW 24536->24540 24539->24533 24541 10022831 ExitProcess 24540->24541 24542 1002281a GetProcAddress 24540->24542 24542->24541 24543 1002282c 24542->24543 24543->24541 24545 10006b70 char_traits 24544->24545 24548 10006b90 24545->24548 24547 100060b2 24547->24249 24549 10006ba3 _Copy_impl 24548->24549 24550 10006bca 24549->24550 24551 10006baa std::ios_base::clear 24549->24551 24556 100067d0 71 API calls 2 library calls 24550->24556 24555 10006ab0 71 API calls 3 library calls 24551->24555 24554 10006bc8 std::ios_base::clear char_traits 24554->24547 24555->24554 24556->24554 24557->24263 24558 10023ba7 24559 10023bb0 24558->24559 24560 10023bb5 24558->24560 24572 1002a1a0 GetSystemTimeAsFileTime GetCurrentThreadId GetTickCount64 QueryPerformanceCounter 24559->24572 24564 10023bca 24560->24564 24563 10023bc3 24565 10023bd6 __setmbcp 24564->24565 24569 10023c24 ___DllMainCRTStartup 24565->24569 24571 10023c81 __setmbcp 24565->24571 24573 10023a3b 24565->24573 24567 10023c5e 24568 10023a3b __CRT_INIT@12 130 API calls 24567->24568 24567->24571 24568->24571 24569->24567 24570 10023a3b __CRT_INIT@12 130 API calls 24569->24570 24569->24571 24570->24567 24571->24563 24572->24560 24574 10023a47 __setmbcp 24573->24574 24575 10023ac3 24574->24575 24576 10023a4f 24574->24576 24577 10023ac7 24575->24577 24578 10023b2c 24575->24578 24621 10026dcd GetProcessHeap 24576->24621 24583 10023ae8 24577->24583 24619 10023a58 __CRT_INIT@12 __setmbcp 24577->24619 24697 1002296c 70 API calls _doexit 24577->24697 24580 10023b31 24578->24580 24581 10023b8f 24578->24581 24702 10028186 FlsGetValue 24580->24702 24581->24619 24707 10025c6e 79 API calls 2 library calls 24581->24707 24582 10023a54 24582->24619 24622 10025dd7 24582->24622 24698 10022849 73 API calls _free 24583->24698 24587 10023b3c 24590 10023b41 24587->24590 24587->24619 24703 10024720 70 API calls __calloc_impl 24590->24703 24591 10023aed 24594 10023afe __CRT_INIT@12 24591->24594 24699 10029e40 71 API calls _free 24591->24699 24592 10023a64 __RTC_Initialize 24599 10023a74 GetCommandLineA 24592->24599 24592->24619 24701 10023b17 73 API calls __mtterm 24594->24701 24596 10023b4d 24596->24619 24704 10028194 FlsSetValue 24596->24704 24598 10023af9 24700 10025e4d 73 API calls 2 library calls 24598->24700 24643 1002a23a GetEnvironmentStringsW 24599->24643 24603 10023b65 24605 10023b83 24603->24605 24606 10023b6b 24603->24606 24604 10023a84 __ioinit0 24656 10029e92 24604->24656 24706 1002043c 70 API calls 2 library calls 24605->24706 24705 10025d2b 70 API calls 4 library calls 24606->24705 24609 10023b73 GetCurrentThreadId 24609->24619 24610 10023b89 24610->24619 24613 10023aa7 24613->24619 24695 10029e40 71 API calls _free 24613->24695 24616 10023abc 24696 10025e4d 73 API calls 2 library calls 24616->24696 24619->24569 24621->24582 24708 10022a20 EncodePointer EncodePointer __init_pointers __initp_misc_winsig 24622->24708 24624 10025ddc 24709 10028120 InitializeCriticalSectionAndSpinCount 24624->24709 24626 10025de1 24627 10025de5 24626->24627 24711 1002816a FlsAlloc 24626->24711 24710 10025e4d 73 API calls 2 library calls 24627->24710 24630 10025dea 24630->24592 24631 10025df7 24631->24627 24632 10025e02 24631->24632 24712 10024720 70 API calls __calloc_impl 24632->24712 24634 10025e0f 24635 10025e44 24634->24635 24713 10028194 FlsSetValue 24634->24713 24715 10025e4d 73 API calls 2 library calls 24635->24715 24638 10025e49 24638->24592 24639 10025e23 24639->24635 24640 10025e29 24639->24640 24714 10025d2b 70 API calls 4 library calls 24640->24714 24642 10025e31 GetCurrentThreadId 24642->24592 24645 1002a24d 24643->24645 24649 1002a2c0 24643->24649 24644 1002a265 WideCharToMultiByte 24646 1002a280 24644->24646 24647 1002a2b7 FreeEnvironmentStringsW 24644->24647 24645->24644 24645->24645 24716 1002476a 70 API calls _malloc 24646->24716 24647->24649 24649->24604 24650 1002a286 24650->24647 24651 1002a28d WideCharToMultiByte 24650->24651 24652 1002a2a3 24651->24652 24653 1002a2ac FreeEnvironmentStringsW 24651->24653 24717 1002043c 70 API calls 2 library calls 24652->24717 24653->24649 24655 1002a2a9 24655->24653 24657 10029ea0 24656->24657 24658 10029ea5 GetModuleFileNameA 24656->24658 24724 1002762f 96 API calls __setmbcp 24657->24724 24659 10029ed2 24658->24659 24718 10029f43 24659->24718 24663 10023a93 24663->24613 24669 1002a0bf 24663->24669 24664 10029f05 24725 1002476a 70 API calls _malloc 24664->24725 24666 10029f0b 24666->24663 24667 10029f43 _parse_cmdline 80 API calls 24666->24667 24668 10029f25 24667->24668 24668->24663 24670 1002a0c8 24669->24670 24675 1002a0cd _strlen 24669->24675 24728 1002762f 96 API calls __setmbcp 24670->24728 24672 10023a9c 24672->24613 24687 1002297b 24672->24687 24673 1002a0f8 24729 10024720 70 API calls __calloc_impl 24673->24729 24675->24672 24675->24673 24676 1002a155 24732 1002043c 70 API calls 2 library calls 24676->24732 24678 1002a161 24678->24672 24680 1002a17c 24733 1002043c 70 API calls 2 library calls 24680->24733 24683 1002a103 _strlen 24683->24672 24683->24676 24683->24680 24684 1002a193 24683->24684 24730 10024720 70 API calls __calloc_impl 24683->24730 24731 10021da5 70 API calls 2 library calls 24683->24731 24734 10024a14 8 API calls 2 library calls 24684->24734 24686 1002a19f 24688 10022987 __IsNonwritableInCurrentImage 24687->24688 24735 10028361 24688->24735 24690 100229a5 __initterm_e 24693 100229e2 __IsNonwritableInCurrentImage 24690->24693 24738 1001f115 24690->24738 24692 100229c6 24692->24693 24741 10036500 24692->24741 24693->24613 24695->24616 24696->24619 24697->24583 24698->24591 24699->24598 24700->24594 24701->24619 24702->24587 24703->24596 24704->24603 24705->24609 24706->24610 24707->24619 24708->24624 24709->24626 24710->24630 24711->24631 24712->24634 24713->24639 24714->24642 24715->24638 24716->24650 24717->24655 24720 10029f65 24718->24720 24722 10029fc9 24720->24722 24726 1002efd3 80 API calls x_ismbbtype_l 24720->24726 24721 10029ee8 24721->24663 24721->24664 24722->24721 24727 1002efd3 80 API calls x_ismbbtype_l 24722->24727 24724->24658 24725->24666 24726->24720 24727->24722 24728->24675 24729->24683 24730->24683 24731->24683 24732->24678 24733->24678 24734->24686 24736 10028364 EncodePointer 24735->24736 24736->24736 24737 1002837e 24736->24737 24737->24690 24748 1001f01f 24738->24748 24740 1001f120 24740->24692 24782 100241b0 24741->24782 24743 10036518 WSAStartup 24744 1001f115 _Error_objects 80 API calls 24743->24744 24745 10036533 24744->24745 24746 1001ffa4 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 6 API calls 24745->24746 24747 10036543 24746->24747 24747->24692 24749 1001f02b __setmbcp 24748->24749 24756 10022a92 24749->24756 24755 1001f04e __setmbcp 24755->24740 24757 10027ff1 __lock 70 API calls 24756->24757 24758 1001f030 24757->24758 24759 1001f05f DecodePointer DecodePointer 24758->24759 24760 1001f08c 24759->24760 24761 1001f03c 24759->24761 24760->24761 24775 100246ef 71 API calls 2 library calls 24760->24775 24772 1001f059 24761->24772 24763 1001f09e 24764 1001f0ef EncodePointer EncodePointer 24763->24764 24765 1001f0c9 24763->24765 24766 1001f0bc 24763->24766 24764->24761 24765->24761 24767 1001f0c3 24765->24767 24776 100247b3 74 API calls __recalloc 24766->24776 24767->24765 24770 1001f0dd EncodePointer 24767->24770 24777 100247b3 74 API calls __recalloc 24767->24777 24770->24764 24771 1001f0d7 24771->24761 24771->24770 24778 10022a9b 24772->24778 24775->24763 24776->24767 24777->24771 24781 10028155 LeaveCriticalSection 24778->24781 24780 1001f05e 24780->24755 24781->24780 24783 6c696740 24784 6c6968bd 24783->24784 24785 6c696af6 VirtualAlloc 24784->24785 24786 6c69698f VirtualAlloc 24784->24786 24787 6c696a76 24784->24787 24788 6c696b75 _memmove 24784->24788 24785->24788 24789 6c696a51 _memset 24786->24789 24787->24785 24789->24787

                                    Control-flow Graph

                                    APIs
                                    • _memset.LIBCMT ref: 10013A60
                                    • swprintf.LIBCMT ref: 10013A86
                                    • CreateMutexA.KERNELBASE(00000000,00000000,00000000), ref: 10013A99
                                    • GetLastError.KERNEL32 ref: 10013AA5
                                      • Part of subcall function 10022BD3: _doexit.LIBCMT ref: 10022BDD
                                      • Part of subcall function 100138F0: _memset.LIBCMT ref: 10013918
                                      • Part of subcall function 100138F0: RegOpenKeyExA.ADVAPI32(80000001,101AFE40,00000000,00020006,?), ref: 10013944
                                      • Part of subcall function 100138F0: _sprintf.LIBCMT ref: 1001397C
                                      • Part of subcall function 100138F0: _strlen.LIBCMT ref: 1001398B
                                      • Part of subcall function 100138F0: RegSetValueExA.ADVAPI32(?,00000000,00000000,00000001,00000000,?), ref: 100139D7
                                      • Part of subcall function 100138F0: RegCloseKey.ADVAPI32(?), ref: 100139EA
                                    • IsUserAnAdmin.SHELL32 ref: 10013AC2
                                    • ReleaseMutex.KERNEL32(00000000), ref: 10013ADC
                                    • _memset.LIBCMT ref: 10013B1C
                                    • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 10013B32
                                    • _sprintf.LIBCMT ref: 10013B4E
                                    • DeleteFileA.KERNEL32(?), ref: 10013B5D
                                    • MoveFileA.KERNEL32(?,?), ref: 10013B71
                                    • _wprintf.LIBCMT ref: 10013CAC
                                    • _strlen.LIBCMT ref: 10013CB9
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3012198157.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000E.00000002.3012110827.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012409035.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File_memset$Mutex_sprintf_strlen$AdminCloseCreateDeleteErrorLastModuleMoveNameOpenReleaseUserValue_doexit_wprintfswprintf
                                    • String ID: %s%s$%s:%hd$206.238.77.142$206.238.77.142$C:\Users\Public\Documents\$Eaiawk mgqwgoywasgymoeeuu$EnOperationMode Error !$RunService !$TMzsft xtnogaqk$Windows Update$Yyickg caosusmk$service_is_exist !
                                    • API String ID: 2228167989-1563067711
                                    • Opcode ID: 2fc02c7820abb1e6e7b02b1e9042d30205a633eb3f33f25fe0a671c5299acd93
                                    • Instruction ID: 8ce7a2c48d05da8e1d18419a98124d55002a878a035d7289134c72219816da3c
                                    • Opcode Fuzzy Hash: 2fc02c7820abb1e6e7b02b1e9042d30205a633eb3f33f25fe0a671c5299acd93
                                    • Instruction Fuzzy Hash: CB61ECB5944314AAE721D7A08C87BE977B8EF00741F804099F6496D5D3EB78DAC4CBA2

                                    Control-flow Graph

                                    APIs
                                    • CryptAcquireContextA.ADVAPI32(00000000,00000000,00000000,00000001,F0000000), ref: 1000D8B6
                                    • GetLastError.KERNEL32 ref: 1000D8C0
                                    • CryptCreateHash.ADVAPI32(00000000,00000000,00000000,00000000,?), ref: 1000D8E1
                                    • GetLastError.KERNEL32 ref: 1000D8EB
                                    • CryptReleaseContext.ADVAPI32(00000000,00000000), ref: 1000D8FA
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3012198157.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000E.00000002.3012110827.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012409035.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Crypt$ContextErrorLast$AcquireCreateHashRelease
                                    • String ID: %02X
                                    • API String ID: 4104741015-436463671
                                    • Opcode ID: 783f6aeacaf77bddf85f865987ab6f2245b3743a8a3a9c8136557c6450919572
                                    • Instruction ID: e6624ba5d8ed9705aec1f79a9e38e76f649a0541b50efeb1c6887bd17401cf19
                                    • Opcode Fuzzy Hash: 783f6aeacaf77bddf85f865987ab6f2245b3743a8a3a9c8136557c6450919572
                                    • Instruction Fuzzy Hash: AE51C5B5A00219EFEB14DFA4CC85BEEB7B4FB48300F108559FA15AB295D778A940CF61
                                    APIs
                                    • NtQueryInformationProcess.NTDLL(-00000001,00000022,00B126FB,00000004,00000000), ref: 00B10A8A
                                    • NtSetInformationProcess.NTDLL(-00000001,00000022,?,00000004,00B109F7,0000005D), ref: 00B10AAA
                                    • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004,00000004,00B109F7,0000005D), ref: 00B10ACC
                                    • wsprintfA.USER32(?,?,?,?), ref: 00B10B74
                                    • MessageBoxA.USER32(00000000,?,?,00000010), ref: 00B10B8C
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000E.00000003.2279305836.0000000000B10000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_3_b10000_rundll32.jbxd
                                    Similarity
                                    • API ID: InformationProcess$AllocMessageQueryVirtualwsprintf
                                    • String ID: Application error$SWVU$The procedure %s could not be located in the DLL %s.
                                    • API String ID: 2902211186-4283279704
                                    • Opcode ID: de0e8ee88c8a98f7b8a38ace4394a491acda8513ba92f7ded7199e416edf0d91
                                    • Instruction ID: 2d108d7b0d255283aec6670e0109959256a125daad4d79a2d08688890311dace
                                    • Opcode Fuzzy Hash: de0e8ee88c8a98f7b8a38ace4394a491acda8513ba92f7ded7199e416edf0d91
                                    • Instruction Fuzzy Hash: 5441D072611746AFEB35AF24CC55FEB73A8EF04781F404568EE0597288DBB0AD90CB94
                                    APIs
                                    • NtSetInformationProcess.NTDLL(-00000001,00000022,?,00000004,00B109F7,0000005D), ref: 00B10AAA
                                    • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004,00000004,00B109F7,0000005D), ref: 00B10ACC
                                    • wsprintfA.USER32(?,?,?,?), ref: 00B10B74
                                    • MessageBoxA.USER32(00000000,?,?,00000010), ref: 00B10B8C
                                    • ExitProcess.KERNEL32(00000000), ref: 00B10B94
                                    • VirtualFree.KERNELBASE(?,00000000,00008000,?), ref: 00B10BE7
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000E.00000003.2279305836.0000000000B10000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_3_b10000_rundll32.jbxd
                                    Similarity
                                    • API ID: ProcessVirtual$AllocExitFreeInformationMessagewsprintf
                                    • String ID: Application error$SWVU$The procedure %s could not be located in the DLL %s.
                                    • API String ID: 2788668848-4283279704
                                    • Opcode ID: f644d6bb55c65f053268db4f25cec8320b3bbf1d1d06db4825fff5ba47126e3b
                                    • Instruction ID: eccc78b599f17ae4db4a13088ee46b2a5036d8dc4fb74ceb0749e951a28fe42b
                                    • Opcode Fuzzy Hash: f644d6bb55c65f053268db4f25cec8320b3bbf1d1d06db4825fff5ba47126e3b
                                    • Instruction Fuzzy Hash: 9731E071251386ABDB39AF20CC55FEF37ACEF05781F004169FE4286285DEB0A9908B10

                                    Control-flow Graph

                                    APIs
                                    • _memset.LIBCMT ref: 1000D055
                                    • _memset.LIBCMT ref: 1000D08B
                                    • _memset.LIBCMT ref: 1000D09E
                                    • _memset.LIBCMT ref: 1000D0B1
                                    • CreatePipe.KERNELBASE(?,?,0000000C,00000000), ref: 1000D10C
                                    • GetStartupInfoA.KERNEL32(00000044), ref: 1000D12D
                                    • CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000001,00000000,00000000,00000000,00000044,00000000), ref: 1000D17E
                                    • CloseHandle.KERNEL32(?,?), ref: 1000D39A
                                    • CloseHandle.KERNEL32(?), ref: 1000D3A7
                                    • CloseHandle.KERNEL32(?), ref: 1000D3B4
                                    • CloseHandle.KERNEL32(?), ref: 1000D3C1
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3012198157.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000E.00000002.3012110827.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012409035.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseHandle_memset$Create$InfoPipeProcessStartup
                                    • String ID: D$ProcessorId$wmic cpu get processorid
                                    • API String ID: 1762129635-53154263
                                    • Opcode ID: 2faa9055df3024060b3a78fac8b67b6add4b8c37b23ad85aa60008f06d3c8044
                                    • Instruction ID: 29feaeb9d2e0a167578c768367cdbb99c1f13e7196a5b6bb9c176603c2bdf5a2
                                    • Opcode Fuzzy Hash: 2faa9055df3024060b3a78fac8b67b6add4b8c37b23ad85aa60008f06d3c8044
                                    • Instruction Fuzzy Hash: D1B14E75902228DFEB29DB60CC99BDEB7B4FB48340F1041DAE109A7181DB756B84CF50

                                    Control-flow Graph

                                    APIs
                                    • _memset.LIBCMT ref: 1000D4B4
                                    • _memset.LIBCMT ref: 1000D4EA
                                    • _memset.LIBCMT ref: 1000D4FD
                                    • _memset.LIBCMT ref: 1000D510
                                    • CreatePipe.KERNELBASE(?,?,0000000C,00000000), ref: 1000D56B
                                    • GetStartupInfoA.KERNEL32(00000044), ref: 1000D58C
                                    • CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000001,00000000,00000000,00000000,00000044,00000000), ref: 1000D5DD
                                    • CloseHandle.KERNEL32(?,?), ref: 1000D7F9
                                    • CloseHandle.KERNEL32(?), ref: 1000D806
                                    • CloseHandle.KERNEL32(?), ref: 1000D813
                                    • CloseHandle.KERNEL32(?), ref: 1000D820
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3012198157.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000E.00000002.3012110827.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012409035.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseHandle_memset$Create$InfoPipeProcessStartup
                                    • String ID: D$SerialNumber$wmic diskdrive get serialnumber
                                    • API String ID: 1762129635-2526680146
                                    • Opcode ID: 284479aef56905e99ef7afbd9686248a6d4ef8a24c59542d99c3aafd4a34ee3f
                                    • Instruction ID: f7e6dc397231a2a0a1082a64f52227403f3a6002e1c9f0e787add4f7ccce3aad
                                    • Opcode Fuzzy Hash: 284479aef56905e99ef7afbd9686248a6d4ef8a24c59542d99c3aafd4a34ee3f
                                    • Instruction Fuzzy Hash: 8CB12B759162289BEB28DB64CC9DBEEB7B4FB48300F0041DAE50DAA191DB756B84CF50

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 242 10026fe8-10027001 243 10027003-1002700d call 100258dc call 10024a04 242->243 244 10027019-1002702e call 1001f840 242->244 251 10027012 243->251 244->243 250 10027030-10027033 244->250 252 10027047-1002704d 250->252 253 10027035 250->253 254 10027014-10027018 251->254 257 10027059 call 1002ce25 252->257 258 1002704f 252->258 255 10027037-10027039 253->255 256 1002703b-10027045 call 100258dc 253->256 255->252 255->256 256->251 262 1002705e-1002706a call 1002cb7e 257->262 258->256 259 10027051-10027057 258->259 259->256 259->257 266 10027070-1002707c call 1002cba8 262->266 267 10027255-1002725f call 10024a14 262->267 266->267 272 10027082-1002708e call 1002cbd2 266->272 272->267 275 10027094-1002709b 272->275 276 1002710b-10027116 call 1002cbfc 275->276 277 1002709d 275->277 276->254 284 1002711c-1002711f 276->284 279 100270a7-100270c3 call 1002cbfc 277->279 280 1002709f-100270a5 277->280 279->254 285 100270c9-100270cc 279->285 280->276 280->279 286 10027121-1002712a call 1002ce75 284->286 287 1002714e-1002715b 284->287 288 100270d2-100270db call 1002ce75 285->288 289 1002720e-10027210 285->289 286->287 295 1002712c-1002714c 286->295 290 1002715d-1002716c call 1002d670 287->290 288->289 298 100270e1-100270f9 call 1002cbfc 288->298 289->254 299 10027179-100271a0 call 1002d5c0 call 1002d670 290->299 300 1002716e-10027176 290->300 295->290 298->254 305 100270ff-10027106 298->305 308 100271a2-100271ab 299->308 309 100271ae-100271d5 call 1002d5c0 call 1002d670 299->309 300->299 305->289 308->309 314 100271e3-100271f2 call 1002d5c0 309->314 315 100271d7-100271e0 309->315 318 100271f4 314->318 319 1002721f-10027238 314->319 315->314 320 100271f6-100271f8 318->320 321 100271fa-10027208 318->321 322 1002723a-10027253 319->322 323 1002720b 319->323 320->321 324 10027215-10027217 320->324 321->323 322->289 323->289 324->289 325 10027219 324->325 325->319 326 1002721b-1002721d 325->326 326->289 326->319
                                    APIs
                                    • _memset.LIBCMT ref: 10027021
                                      • Part of subcall function 100258DC: __getptd_noexit.LIBCMT ref: 100258DC
                                    • __gmtime64_s.LIBCMT ref: 100270BA
                                    • __gmtime64_s.LIBCMT ref: 100270F0
                                    • __gmtime64_s.LIBCMT ref: 1002710D
                                    • __allrem.LIBCMT ref: 10027163
                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 1002717F
                                    • __allrem.LIBCMT ref: 10027196
                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 100271B4
                                    • __allrem.LIBCMT ref: 100271CB
                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 100271E9
                                    • __invoke_watson.LIBCMT ref: 1002725A
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3012198157.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000E.00000002.3012110827.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012409035.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                                    • String ID:
                                    • API String ID: 384356119-0
                                    • Opcode ID: faf785f0e9591b3d4b811fc4296c87dcbc334db000ad1bf2518f1b08427d47ec
                                    • Instruction ID: 713491a1cde179dae1e75a0093b68b8f74a69f94e9f1ec33854f382ae24b7f6e
                                    • Opcode Fuzzy Hash: faf785f0e9591b3d4b811fc4296c87dcbc334db000ad1bf2518f1b08427d47ec
                                    • Instruction Fuzzy Hash: 6B71D476A00717EBE715DE78EC82B5AB3E8FF40364F91412AF918D6681E770ED448790

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 327 6c696740-6c6968c9 329 6c696c7b-6c696c7e 327->329 330 6c6968cf-6c6968d6 327->330 331 6c6968dc-6c696989 330->331 332 6c696af6-6c696b70 VirtualAlloc call 6c912210 330->332 334 6c69698f-6c696a71 VirtualAlloc call 6c913d80 331->334 335 6c696a76 331->335 336 6c696b75-6c696c71 332->336 334->335 335->332 336->329
                                    APIs
                                    • VirtualAlloc.KERNEL32(0000FFFF,00000000,00001000,00000004), ref: 6C6969A4
                                    • _memset.LIBCMT ref: 6C696A4C
                                    • VirtualAlloc.KERNELBASE(0000FFFF,000000B8,00001000,00000004,?,6C698C38), ref: 6C696B0E
                                    • _memmove.LIBCMT ref: 6C696B70
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3013317433.000000006C681000.00000040.00000001.01000000.00000003.sdmp, Offset: 6C680000, based on PE: true
                                    • Associated: 0000000E.00000002.3013239239.000000006C680000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000000E.00000002.3013317433.000000006C9C3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000000E.00000002.3013317433.000000006CBAB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000000E.00000002.3013317433.000000006CBB3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000000E.00000002.3013317433.000000006CBB9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000000E.00000002.3015754617.000000006CC55000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_6c680000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AllocVirtual$_memmove_memset
                                    • String ID:
                                    • API String ID: 725130153-0
                                    • Opcode ID: af01bac3374c618721e138754d3ca3c72d74494653e4f821ac976264aae05339
                                    • Instruction ID: 395c12fc52dce5ac1d009dabf2c6e74aa10fdb6c514c0d7e02ec50b25f49a4c4
                                    • Opcode Fuzzy Hash: af01bac3374c618721e138754d3ca3c72d74494653e4f821ac976264aae05339
                                    • Instruction Fuzzy Hash: D9D16F75B0260DCFCB48CFD9E593A2DBBB1FB8A300B14821AD8A587754DB30A941CF49
                                    APIs
                                    • VirtualProtect.KERNELBASE(?,00001000,00000004,?,?), ref: 00B113EA
                                    • VirtualProtect.KERNEL32(?,00001000,?,?), ref: 00B11403
                                    Memory Dump Source
                                    • Source File: 0000000E.00000003.2279305836.0000000000B10000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_3_b10000_rundll32.jbxd
                                    Similarity
                                    • API ID: ProtectVirtual
                                    • String ID:
                                    • API String ID: 544645111-0
                                    • Opcode ID: 460e07aa1c6cfb092b5f976fa85d581fca477865be9a128e2591be7121e923ca
                                    • Instruction ID: b1d429a417b6c49ed05833987fabd77db929dafd5a81931b874044704500e5e3
                                    • Opcode Fuzzy Hash: 460e07aa1c6cfb092b5f976fa85d581fca477865be9a128e2591be7121e923ca
                                    • Instruction Fuzzy Hash: 74F08276200305AFDB19CF40C844FEA7779EB48391F104176EA42AB684C670F5148B10

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 339 1002ce25-1002ce38 call 10024850 342 1002ce66-1002ce6b call 10024895 339->342 343 1002ce3a-1002ce4d call 10027ff1 339->343 348 1002ce5a-1002ce61 call 1002ce6c 343->348 349 1002ce4f call 1002d09f 343->349 348->342 352 1002ce54 349->352 352->348
                                    APIs
                                    • __lock.LIBCMT ref: 1002CE3C
                                      • Part of subcall function 10027FF1: __mtinitlocknum.LIBCMT ref: 10028003
                                      • Part of subcall function 10027FF1: __amsg_exit.LIBCMT ref: 1002800F
                                      • Part of subcall function 10027FF1: EnterCriticalSection.KERNEL32(?,?,10025D6D,0000000D), ref: 1002801C
                                    • __tzset_nolock.LIBCMT ref: 1002CE4F
                                      • Part of subcall function 1002D09F: __lock.LIBCMT ref: 1002D0C1
                                      • Part of subcall function 1002D09F: ____lc_codepage_func.LIBCMT ref: 1002D108
                                      • Part of subcall function 1002D09F: __getenv_helper_nolock.LIBCMT ref: 1002D129
                                      • Part of subcall function 1002D09F: _free.LIBCMT ref: 1002D15C
                                      • Part of subcall function 1002D09F: _strlen.LIBCMT ref: 1002D163
                                      • Part of subcall function 1002D09F: __malloc_crt.LIBCMT ref: 1002D16A
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3012198157.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000E.00000002.3012110827.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012409035.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: __lock$CriticalEnterSection____lc_codepage_func__amsg_exit__getenv_helper_nolock__malloc_crt__mtinitlocknum__tzset_nolock_free_strlen
                                    • String ID:
                                    • API String ID: 1282695788-0
                                    • Opcode ID: fc85f6cf18a6252e642b57c3e1c2b749fe30e0e1031c663e82c605452884cce2
                                    • Instruction ID: a2ad06c6b65e7629715c0b93b357caa5f945d3fedfb1b9c2ad21f9bf3716e497
                                    • Opcode Fuzzy Hash: fc85f6cf18a6252e642b57c3e1c2b749fe30e0e1031c663e82c605452884cce2
                                    • Instruction Fuzzy Hash: 0BE0C238451A48D9DF10EBF0AA4275C32F0FB04B66FE20209E004041D28F7D35888923

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 353 10022833-10022842 call 10022801 ExitProcess
                                    APIs
                                    • ___crtCorExitProcess.LIBCMT ref: 10022839
                                      • Part of subcall function 10022801: GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,?,?,?,1002283E,00000000,?,100280A4,000000FF,0000001E,101B7BE8,00000008,10028008,00000000,?), ref: 10022810
                                      • Part of subcall function 10022801: GetProcAddress.KERNEL32(?,CorExitProcess), ref: 10022822
                                    • ExitProcess.KERNEL32 ref: 10022842
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3012198157.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000E.00000002.3012110827.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012409035.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ExitProcess$AddressHandleModuleProc___crt
                                    • String ID:
                                    • API String ID: 2427264223-0
                                    • Opcode ID: 3bf28b7052921138b5cd44a98d3311a828cfa0a63c341592180aa8684d3b340a
                                    • Instruction ID: c8f4cf039e012b41d150cd44d72804b099170dd8f7fcc5d26d0c23f5f7bd029f
                                    • Opcode Fuzzy Hash: 3bf28b7052921138b5cd44a98d3311a828cfa0a63c341592180aa8684d3b340a
                                    • Instruction Fuzzy Hash: B5B09230001108BFDB022F51DC4A8593FA9FB002A0B508020F80809032DF73BA929A81
                                    APIs
                                    • VirtualAlloc.KERNELBASE(00000000,-00000436,00001000,00000004), ref: 00B1087D
                                    • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 00B108A9
                                    Memory Dump Source
                                    • Source File: 0000000E.00000003.2279305836.0000000000B10000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B10000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_3_b10000_rundll32.jbxd
                                    Similarity
                                    • API ID: Virtual$AllocFree
                                    • String ID:
                                    • API String ID: 2087232378-0
                                    • Opcode ID: 7e515f7c385f7f07b94d9a5cb9b23266753d833ffbaa65bc10218dcc86593253
                                    • Instruction ID: 7c2231c22552269cc660295264dc84100b832581a91abcc5b612a6dcbc40c4bd
                                    • Opcode Fuzzy Hash: 7e515f7c385f7f07b94d9a5cb9b23266753d833ffbaa65bc10218dcc86593253
                                    • Instruction Fuzzy Hash: B6018871A011147BE704DE99CC41FAEB7E9EBC8760F14C169F51897385D674AD10CBA0

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 356 10021dfa-10021e0f 357 10021e11-10021e1c call 100258dc call 10024a04 356->357 358 10021e2f-10021e33 356->358 369 10021e21 357->369 359 10021e35 358->359 360 10021e49-10021e4e call 10026fe8 358->360 363 10021e37-10021e3a 359->363 364 10021e3c-10021e47 call 100258dc 359->364 368 10021e53-10021e57 360->368 363->360 363->364 364->369 368->369 371 10021e59-10021e63 call 10026dea 368->371 373 10021e23-10021e2e call 1001ffa4 369->373 371->373
                                    APIs
                                      • Part of subcall function 100258DC: __getptd_noexit.LIBCMT ref: 100258DC
                                    • _asctime.LIBCMT ref: 10021E5D
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3012198157.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000E.00000002.3012110827.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012409035.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: __getptd_noexit_asctime
                                    • String ID:
                                    • API String ID: 1865661205-0
                                    • Opcode ID: dcfe908546e3f88bc8117c10939122550607e7d39558988ca205b2cb5c272348
                                    • Instruction ID: 4125543197aa1fcd6f4b2a2d68e97bfeb0adc15cba48122be1fc6d66b0878a2d
                                    • Opcode Fuzzy Hash: dcfe908546e3f88bc8117c10939122550607e7d39558988ca205b2cb5c272348
                                    • Instruction Fuzzy Hash: 53F04939A002099EDF00DBA4EC56BCE77ECEF28255FD20469EC05EB091EB74E9848725

                                    Control-flow Graph

                                    APIs
                                    • WSAStartup.WS2_32(00000202), ref: 1003651E
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3012198157.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000E.00000002.3012110827.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012409035.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Startup
                                    • String ID:
                                    • API String ID: 724789610-0
                                    • Opcode ID: d3557ac59b8f8fefe8b80b3b61d78a442e21de74061af108e84e171f57d9cb46
                                    • Instruction ID: a027679b03284c68216ebb438d11db6f7a8099bc69e3ea9b22835e59c52e58d0
                                    • Opcode Fuzzy Hash: d3557ac59b8f8fefe8b80b3b61d78a442e21de74061af108e84e171f57d9cb46
                                    • Instruction Fuzzy Hash: ABE0DF74A04208ABCB00DBB4DD0755D77F4EF49200F80016CF9098B252EB34AA148A82

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 384 10022bd3-10022bdd call 10022aa4 386 10022be2-10022be6 384->386
                                    APIs
                                    • _doexit.LIBCMT ref: 10022BDD
                                      • Part of subcall function 10022AA4: __lock.LIBCMT ref: 10022AB2
                                      • Part of subcall function 10022AA4: DecodePointer.KERNEL32(101B78D8,0000001C,10022A1B,00000000,00000001,00000000,?,1002296B,000000FF,?,10028014,00000011,?,?,10025D6D,0000000D), ref: 10022AF1
                                      • Part of subcall function 10022AA4: DecodePointer.KERNEL32(?,1002296B,000000FF,?,10028014,00000011,?,?,10025D6D,0000000D), ref: 10022B02
                                      • Part of subcall function 10022AA4: EncodePointer.KERNEL32(00000000,?,1002296B,000000FF,?,10028014,00000011,?,?,10025D6D,0000000D), ref: 10022B1B
                                      • Part of subcall function 10022AA4: DecodePointer.KERNEL32(-00000004,?,1002296B,000000FF,?,10028014,00000011,?,?,10025D6D,0000000D), ref: 10022B2B
                                      • Part of subcall function 10022AA4: EncodePointer.KERNEL32(00000000,?,1002296B,000000FF,?,10028014,00000011,?,?,10025D6D,0000000D), ref: 10022B31
                                      • Part of subcall function 10022AA4: DecodePointer.KERNEL32(?,1002296B,000000FF,?,10028014,00000011,?,?,10025D6D,0000000D), ref: 10022B47
                                      • Part of subcall function 10022AA4: DecodePointer.KERNEL32(?,1002296B,000000FF,?,10028014,00000011,?,?,10025D6D,0000000D), ref: 10022B52
                                      • Part of subcall function 10022AA4: __initterm.LIBCMT ref: 10022B7A
                                      • Part of subcall function 10022AA4: __initterm.LIBCMT ref: 10022B8B
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3012198157.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000E.00000002.3012110827.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012409035.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Pointer$Decode$Encode__initterm$__lock_doexit
                                    • String ID:
                                    • API String ID: 3712619029-0
                                    • Opcode ID: e664eab0a2f8ce3703c552baf369986a84cdf03d3e0bf670d1975cdb5f15a4fc
                                    • Instruction ID: cfc2533f0be627bc8b7b8cac997dbfbd0b87b13c6f736a1528db1b5c4a82aaa4
                                    • Opcode Fuzzy Hash: e664eab0a2f8ce3703c552baf369986a84cdf03d3e0bf670d1975cdb5f15a4fc
                                    • Instruction Fuzzy Hash: 06B0123158030C33E9201581FC03F093B1C8F80A60F500020FF0C1C5E1A593756080CA
                                    APIs
                                    • GetModuleFileNameA.KERNEL32(00000000,?,00000104,0F3104C0,?,?,?,00000000,10023340,101B6C90,000000FE,?,10013C89,TMzsft xtnogaqk,Yyickg caosusmk,Eaiawk mgqwgoywasgymoeeuu), ref: 10012594
                                    • ExpandEnvironmentStringsA.KERNEL32(C:\Users\Public\Documents\,?,00000104,?,?,?,00000000,10023340,101B6C90,000000FE,?,10013C89,TMzsft xtnogaqk,Yyickg caosusmk,Eaiawk mgqwgoywasgymoeeuu), ref: 100125AB
                                    • _strlen.LIBCMT ref: 100125B8
                                    • _strncmp.LIBCMT ref: 100125CF
                                    • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 1001270E
                                      • Part of subcall function 10012300: _memset.LIBCMT ref: 10012328
                                      • Part of subcall function 10012300: _strlen.LIBCMT ref: 1001234F
                                      • Part of subcall function 10012300: _strncpy.LIBCMT ref: 10012382
                                      • Part of subcall function 10012300: CreateDirectoryA.KERNEL32(00000000,00000000), ref: 100123A9
                                    • wsprintfA.USER32 ref: 10012616
                                    • _strlen.LIBCMT ref: 10012626
                                    • _strlen.LIBCMT ref: 10012642
                                    • CopyFileA.KERNEL32(?,?,00000000), ref: 100126AE
                                    • _memset.LIBCMT ref: 100126C2
                                    • _strcat.LIBCMT ref: 100126D8
                                    • CreateServiceA.ADVAPI32(?,?,?,000F01FF,00000110,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000), ref: 10012756
                                    • LockServiceDatabase.ADVAPI32(?), ref: 10012769
                                    • ChangeServiceConfig2A.ADVAPI32(00000000,00000001,?), ref: 10012799
                                    • ChangeServiceConfig2A.ADVAPI32(00000000,00000002,00015180), ref: 10012877
                                    • UnlockServiceDatabase.ADVAPI32(?), ref: 10012884
                                    • GetLastError.KERNEL32 ref: 10012893
                                    • OpenServiceA.ADVAPI32(?,?,000F01FF), ref: 100128B0
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3012198157.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000E.00000002.3012110827.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012409035.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Service$_strlen$ChangeConfig2CreateDatabaseFileOpen_memset$CopyDirectoryEnvironmentErrorExpandLastLockManagerModuleNameStringsUnlock_strcat_strncmp_strncpywsprintf
                                    • String ID: %$C:\Users\Public\Documents\$Description$SYSTEM\CurrentControlSet\Services\$Windows Update$Yyickg caosusmk$s
                                    • API String ID: 2269191997-3217403557
                                    • Opcode ID: da25e49445566c96217ba80189cd2cecd7e86491d1e1acde59f2152fe1c39007
                                    • Instruction ID: 58a78215622ab89836c283d46f1977e4f6cad2cf6e4b3b9b80a50220f8474d07
                                    • Opcode Fuzzy Hash: da25e49445566c96217ba80189cd2cecd7e86491d1e1acde59f2152fe1c39007
                                    • Instruction Fuzzy Hash: BEE17471D04298DFEB26CB94DC88BDE7BB8BB15704F0441D9E5486A2C1C7B95B88CF61
                                    APIs
                                    • WSAGetLastError.WS2_32(?,?,?,?,?,?,1001C326,FFFFFFFF,?,?,?,FFFFFFFF,?), ref: 1001C5E3
                                      • Part of subcall function 100172C0: __CxxThrowException@8.LIBCMT ref: 100172D2
                                      • Part of subcall function 100172C0: EnterCriticalSection.KERNEL32(00000000,0F3104C0,00000000,00000098,?,?,00000000,10035B28,000000FF,?,?,101B722C,?,1001640E,80004005), ref: 10017312
                                      • Part of subcall function 100172C0: LeaveCriticalSection.KERNEL32(00000000,?,?,00000000,10035B28,000000FF,?,?,101B722C,?,1001640E,80004005,?,100168C9,00000400,00000400), ref: 1001737B
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3012198157.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000E.00000002.3012110827.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012409035.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalSection$EnterErrorException@8LastLeaveThrow
                                    • String ID:
                                    • API String ID: 1367629879-0
                                    • Opcode ID: 1a78252def1050f5be20003a34375eeef4699fcd1b0fa4c910ffc5e1ea9ae854
                                    • Instruction ID: 2045c5cf5837c9daf880452df431a01197e78d674d59fb6298516e1ae159bddb
                                    • Opcode Fuzzy Hash: 1a78252def1050f5be20003a34375eeef4699fcd1b0fa4c910ffc5e1ea9ae854
                                    • Instruction Fuzzy Hash: 7851BEB5900218AFDB21DFA4C841AAE77B5FF44390F100219F8599F291E770EDD0DB91
                                    APIs
                                    • _memset.LIBCMT ref: 10015432
                                    • _memset.LIBCMT ref: 10015448
                                    • _memset.LIBCMT ref: 1001545E
                                    • LoadLibraryA.KERNEL32(ADVAPI32.dll), ref: 1001546B
                                    • GetProcAddress.KERNEL32(00000000,RegQueryValueExA), ref: 10015493
                                    • GetProcAddress.KERNEL32(00000000,RegOpenKeyExA), ref: 100154AB
                                    • GetProcAddress.KERNEL32(00000000,RegEnumValueA), ref: 100154C3
                                    • GetProcAddress.KERNEL32(00000000,RegEnumKeyExA), ref: 100154DB
                                    • GetProcAddress.KERNEL32(00000000,RegCloseKey), ref: 100154F3
                                    • FreeLibrary.KERNEL32(00000000), ref: 1001553C
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3012198157.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000E.00000002.3012110827.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012409035.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressProc$_memset$Library$FreeLoad
                                    • String ID: ADVAPI32.dll$RegCloseKey$RegEnumKeyExA$RegEnumValueA$RegOpenKeyExA$RegQueryValueExA
                                    • API String ID: 2029490530-3713883646
                                    • Opcode ID: ce21794f6d49dae7673cc83d0b588799919480882acf9cc9429ea4c88414c882
                                    • Instruction ID: 42d3faf0a6d82433ca9894e8e05647cd2437e6e791ab8efedd1cac75c6c50b36
                                    • Opcode Fuzzy Hash: ce21794f6d49dae7673cc83d0b588799919480882acf9cc9429ea4c88414c882
                                    • Instruction Fuzzy Hash: 4AB17EB5904629EFDB20DF64CC89BEEB7B4FB48306F0445D8E909AA290D7759AC4CF50
                                    APIs
                                    • WinHttpOpen.WINHTTP(curl/7.83.1,00000000,00000000,00000000,00000000), ref: 10007197
                                    • WinHttpSetTimeouts.WINHTTP(00000000,000003E8,000003E8,000003E8,000003E8), ref: 100071BE
                                    • WinHttpConnect.WINHTTP(00000000,?,00000050,00000000), ref: 100071D6
                                    • WinHttpOpenRequest.WINHTTP(00000000,GET,?,00000000,00000000,00000000,00000000), ref: 100071FA
                                    • WinHttpSendRequest.WINHTTP(00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 10007219
                                    • WinHttpReceiveResponse.WINHTTP(00000000,00000000), ref: 1000722E
                                    • WinHttpQueryHeaders.WINHTTP(00000000,20000013,00000000,00000000,00000004,00000000), ref: 10007264
                                    • __CxxThrowException@8.LIBCMT ref: 10007272
                                    • WinHttpQueryDataAvailable.WINHTTP(00000000,00000000), ref: 10007293
                                    • GetLastError.KERNEL32 ref: 1000729D
                                    • __CxxThrowException@8.LIBCMT ref: 100072AF
                                    • std::ios_base::clear.LIBCPMTD ref: 100072C8
                                    • WinHttpReadData.WINHTTP(00000000,00000000,00000000,00000000,00000000,00000000), ref: 100072E4
                                    • std::ios_base::clear.LIBCPMTD ref: 100072FF
                                    • GetLastError.KERNEL32(00000000), ref: 1000730A
                                    • _wprintf.LIBCMT ref: 10007316
                                    • WinHttpCloseHandle.WINHTTP(00000000), ref: 10007328
                                    • WinHttpCloseHandle.WINHTTP(00000000), ref: 10007338
                                    • WinHttpCloseHandle.WINHTTP(00000000), ref: 10007348
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3012198157.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000E.00000002.3012110827.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012409035.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Http$CloseHandle$DataErrorException@8LastOpenQueryRequestThrowstd::ios_base::clear$AvailableConnectHeadersReadReceiveResponseSendTimeouts_wprintf
                                    • String ID: Error %d has occurred.$GET$curl/7.83.1
                                    • API String ID: 3568891788-3281102068
                                    • Opcode ID: a0faf76c0c659e3c95fc50e059929233ef8cb015fb8e25ec05d524550362fc63
                                    • Instruction ID: 96198f7158a5b0440b015918e988b78723295c7c608185cc2ea97e2543ed712c
                                    • Opcode Fuzzy Hash: a0faf76c0c659e3c95fc50e059929233ef8cb015fb8e25ec05d524550362fc63
                                    • Instruction Fuzzy Hash: CF7107B1D40248EFEB15DFA0CC99BEEBBB4FB04741F104119F51AAA2D4CB786A45DB50
                                    APIs
                                    • LoadLibraryA.KERNEL32(userenv.dll), ref: 100123D8
                                    • GetProcAddress.KERNEL32(?,CreateEnvironmentBlock), ref: 100123EA
                                    • _memset.LIBCMT ref: 10012417
                                    • _memset.LIBCMT ref: 10012427
                                    • GetCurrentProcess.KERNEL32 ref: 10012459
                                    • OpenProcessToken.ADVAPI32(?,000F01FF,00000000), ref: 1001246F
                                    • DuplicateTokenEx.ADVAPI32(00000000,02000000,00000000,00000001,00000001,00000000), ref: 10012488
                                    • LoadLibraryA.KERNEL32(Kernel32.dll,WTSGetActiveConsoleSessionId), ref: 10012498
                                    • GetProcAddress.KERNEL32(00000000), ref: 1001249F
                                    • SetTokenInformation.ADVAPI32(00000000,0000000C,00000000,00000004), ref: 100124C0
                                    • CreateProcessAsUserA.ADVAPI32(00000000,00000000,00000000,00000000,00000000,00000000,00000430,00000000,00000000,00000044,00000000), ref: 100124F6
                                    • CloseHandle.KERNEL32(00000000), ref: 10012506
                                    • CloseHandle.KERNEL32(00000000), ref: 10012510
                                    • FreeLibrary.KERNEL32(00000000), ref: 1001252F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3012198157.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000E.00000002.3012110827.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012409035.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: LibraryProcessToken$AddressCloseHandleLoadProc_memset$CreateCurrentDuplicateFreeInformationOpenUser
                                    • String ID: CreateEnvironmentBlock$D$Kernel32.dll$WTSGetActiveConsoleSessionId$userenv.dll
                                    • API String ID: 2385095549-609967149
                                    • Opcode ID: ac44d7a654e1ecf9cefedaa459ffae167c2ab3953bef6485a400e85d30f059f2
                                    • Instruction ID: fd1ae4a91e3460f93e873eecc7cbeda63378566b322c9237b013182db1ce3722
                                    • Opcode Fuzzy Hash: ac44d7a654e1ecf9cefedaa459ffae167c2ab3953bef6485a400e85d30f059f2
                                    • Instruction Fuzzy Hash: B741B6B5E00218EFEB14DFE0CC99BAEBBB4FB48705F104518E6156B281D7B59944CF90
                                    APIs
                                    • LoadLibraryA.KERNEL32(ADVAPI32.dll), ref: 10015019
                                    • GetProcAddress.KERNEL32(?,OpenProcessToken), ref: 1001502B
                                    • GetProcAddress.KERNEL32(?,AdjustTokenPrivileges), ref: 1001503D
                                    • GetProcAddress.KERNEL32(?,LookupPrivilegeValueA), ref: 1001504F
                                    • LoadLibraryA.KERNEL32(kernel32.dll), ref: 1001505D
                                    • GetProcAddress.KERNEL32(?,GetCurrentProcess), ref: 1001506F
                                    • LoadLibraryA.KERNEL32(KERNEL32.dll), ref: 100150F0
                                    • GetProcAddress.KERNEL32(?,GetLastError), ref: 10015102
                                    • CloseHandle.KERNEL32(?), ref: 1001511A
                                    • FreeLibrary.KERNEL32(00000000), ref: 1001512A
                                    • FreeLibrary.KERNEL32(00000000), ref: 1001513A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3012198157.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000E.00000002.3012110827.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012409035.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressLibraryProc$Load$Free$CloseHandle
                                    • String ID: ADVAPI32.dll$AdjustTokenPrivileges$GetCurrentProcess$GetLastError$KERNEL32.dll$LookupPrivilegeValueA$OpenProcessToken$kernel32.dll
                                    • API String ID: 2887716753-1648388921
                                    • Opcode ID: 09c34ea0c58a1937bffb1c09e732f69496aae19d3495c3a7a974608a733c4652
                                    • Instruction ID: 2ba7eb19521ecd2e0521120e7302f927c8c69f99e1a3e1b69f5f98f9208caa0c
                                    • Opcode Fuzzy Hash: 09c34ea0c58a1937bffb1c09e732f69496aae19d3495c3a7a974608a733c4652
                                    • Instruction Fuzzy Hash: 8441F775A00218EFEB16DFE4CC88BEEBBB5FB08301F144518F905AA291D7799940CBA0
                                    Strings
                                    • SocketClient.Connect %s,%d, xrefs: 10013497
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3012198157.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000E.00000002.3012110827.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012409035.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: SocketClient.Connect %s,%d
                                    • API String ID: 0-4086773378
                                    • Opcode ID: 806049d0937e817d2a7edc25e8aa56914ceb32bd5803814fc0c8e8b9f4b12fda
                                    • Instruction ID: 63baf142f1b2acfd1537a39fce8e3a032f44fd155c7a3820f2eaebd6526bdc0f
                                    • Opcode Fuzzy Hash: 806049d0937e817d2a7edc25e8aa56914ceb32bd5803814fc0c8e8b9f4b12fda
                                    • Instruction Fuzzy Hash: 3CC13479804A69CBDB21DF64CC907DEB7B5FF49340F0082D9E409AA291EB749AE4CF50
                                    APIs
                                    • LoadLibraryA.KERNEL32(kernel32.dll), ref: 10015178
                                    • GetProcAddress.KERNEL32(?,CreateToolhelp32Snapshot), ref: 10015190
                                    • GetProcAddress.KERNEL32(?,Process32First), ref: 100151A8
                                    • GetProcAddress.KERNEL32(?,Process32Next), ref: 100151C0
                                    • lstrcmpiA.KERNEL32(1000E8DC,?), ref: 10015243
                                    • CloseHandle.KERNEL32(00000000), ref: 10015262
                                    • FreeLibrary.KERNEL32(00000000), ref: 10015278
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3012198157.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000E.00000002.3012110827.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012409035.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressProc$Library$CloseFreeHandleLoadlstrcmpi
                                    • String ID: CreateToolhelp32Snapshot$Process32First$Process32Next$kernel32.dll
                                    • API String ID: 1314729832-4285911020
                                    • Opcode ID: 1cd6a8fbb2155a4b1985ca30da2e4b0a3f5bfe765f9448f08b89226ab9c6a634
                                    • Instruction ID: b23b302b637ae1edde1f60404815d2dee06a1769a5a7b90f0171de9587be8fa8
                                    • Opcode Fuzzy Hash: 1cd6a8fbb2155a4b1985ca30da2e4b0a3f5bfe765f9448f08b89226ab9c6a634
                                    • Instruction Fuzzy Hash: 4B31AE75911228DBDB61DBA4CD88BEDB7B4FB49301F0005D8E90EAA250DB75AAC4CF50
                                    APIs
                                    • InterlockedCompareExchange.KERNEL32(?,00000001,00000000), ref: 100187D0
                                    • InterlockedCompareExchange.KERNEL32(?,00000001,00000000), ref: 100187DD
                                    • InterlockedDecrement.KERNEL32(00000000), ref: 100187FC
                                    • DeleteCriticalSection.KERNEL32(?), ref: 10018819
                                    • HeapFree.KERNEL32(?,00000000,?), ref: 10018824
                                    • InterlockedCompareExchange.KERNEL32(?,00000001,00000000), ref: 100188AF
                                    • timeGetTime.WINMM ref: 100188D1
                                    • timeGetTime.WINMM ref: 100188DC
                                    • InterlockedDecrement.KERNEL32(00000000), ref: 1001890A
                                    • DeleteCriticalSection.KERNEL32(-00000018), ref: 10018933
                                    • HeapFree.KERNEL32(?,00000000,00000000), ref: 10018940
                                    • InterlockedCompareExchange.KERNEL32(?,00000001,00000000), ref: 1001894E
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3012198157.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000E.00000002.3012110827.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012409035.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Interlocked$CompareExchange$CriticalDecrementDeleteFreeHeapSectionTimetime
                                    • String ID:
                                    • API String ID: 2485412644-0
                                    • Opcode ID: f37f0bf1c14315c2a0328e2bdc40fd7b1b2d9f8162c99514ea29b688ea27d9bd
                                    • Instruction ID: ccbf6a195e50664b114f756a4c275c858458adfb65b41e8f4299d56aa6b79b38
                                    • Opcode Fuzzy Hash: f37f0bf1c14315c2a0328e2bdc40fd7b1b2d9f8162c99514ea29b688ea27d9bd
                                    • Instruction Fuzzy Hash: 3C51AC76A00615EFDB11CF68CC84B9AB7F8FF04710F204569F919AB291D734EA80CB91
                                    APIs
                                      • Part of subcall function 1000F3B0: _memset.LIBCMT ref: 1000F3D5
                                      • Part of subcall function 1000F3B0: wsprintfA.USER32 ref: 1000F3ED
                                    • _memset.LIBCMT ref: 1000E1DD
                                    • _memset.LIBCMT ref: 1000E1FA
                                    • SHGetSpecialFolderPathA.SHELL32(00000000,00000000,0000001A,00000000,?,?,?,?,?,?,0F3104C0), ref: 1000E20F
                                    • GetTempFileNameA.KERNEL32(00000000,bak,00000000,00000000,\360se6\User Data\,00000000,?,?,?,?,?,?,0F3104C0), ref: 1000E258
                                    • Sleep.KERNEL32(000003E8,Default,?,?,?,?,?,?,0F3104C0), ref: 1000E273
                                    • MoveFileExA.KERNEL32(00000000,00000000,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 1000E298
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3012198157.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000E.00000002.3012110827.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012409035.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _memset$File$FolderMoveNamePathSleepSpecialTempwsprintf
                                    • String ID: 360se6.exe$Default$\360se6\User Data\$bak
                                    • API String ID: 2742518391-1576209161
                                    • Opcode ID: cf5631d64cf3daff86f29a9e46f2c2e6785fc6ccd8703a21c0b353372ed7785e
                                    • Instruction ID: 701f933334c7848fb056ee3a11f22efabf5e93a761c2cecb354365ab54c774ad
                                    • Opcode Fuzzy Hash: cf5631d64cf3daff86f29a9e46f2c2e6785fc6ccd8703a21c0b353372ed7785e
                                    • Instruction Fuzzy Hash: B6316C75950258ABEB24DB60CC9ABDDB378EB14700F0001E9F5096A2D1EB787B84CF61
                                    APIs
                                      • Part of subcall function 1000F3B0: _memset.LIBCMT ref: 1000F3D5
                                      • Part of subcall function 1000F3B0: wsprintfA.USER32 ref: 1000F3ED
                                    • _memset.LIBCMT ref: 1000E33D
                                    • _memset.LIBCMT ref: 1000E35A
                                    • SHGetSpecialFolderPathA.SHELL32(00000000,00000000,0000001C,00000000,?,?,?,?,?,?,0F3104C0), ref: 1000E36F
                                    • GetTempFileNameA.KERNEL32(00000000,bak,00000000,00000000,\Google\Chrome\User Data\,00000000,?,?,?,?,?,?,0F3104C0), ref: 1000E3B8
                                    • Sleep.KERNEL32(000003E8,Default,?,?,?,?,?,?,0F3104C0), ref: 1000E3D3
                                    • MoveFileExA.KERNEL32(00000000,00000000,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 1000E3F8
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3012198157.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000E.00000002.3012110827.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012409035.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _memset$File$FolderMoveNamePathSleepSpecialTempwsprintf
                                    • String ID: Default$\Google\Chrome\User Data\$bak$chrome.exe
                                    • API String ID: 2742518391-1166745273
                                    • Opcode ID: 40d655d6cc16712bff4f2fb1f87b01a0d4e762ec64db6e7df24cb74d5259b5f4
                                    • Instruction ID: fecff77be065e459785ac47ee9805b112d0841096ecda917c53accf8bb13844d
                                    • Opcode Fuzzy Hash: 40d655d6cc16712bff4f2fb1f87b01a0d4e762ec64db6e7df24cb74d5259b5f4
                                    • Instruction Fuzzy Hash: 20316A75950258EBEB24DB60CC9ABD9B378EB14700F0002E9F5096A2D1EB787B84CF65
                                    APIs
                                      • Part of subcall function 1000F3B0: _memset.LIBCMT ref: 1000F3D5
                                      • Part of subcall function 1000F3B0: wsprintfA.USER32 ref: 1000F3ED
                                    • _memset.LIBCMT ref: 1000E4ED
                                    • _memset.LIBCMT ref: 1000E50A
                                    • SHGetSpecialFolderPathA.SHELL32(00000000,00000000,0000001C,00000000,?,?,?,?,?,?,0F3104C0), ref: 1000E51F
                                    • GetTempFileNameA.KERNEL32(00000000,bak,00000000,00000000,\Tencent\QQBrowser\User Data\,00000000,?,?,?,?,?,?,0F3104C0), ref: 1000E568
                                    • Sleep.KERNEL32(000003E8,Default,?,?,?,?,?,?,0F3104C0), ref: 1000E583
                                    • MoveFileExA.KERNEL32(00000000,00000000,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 1000E5A8
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3012198157.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000E.00000002.3012110827.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012409035.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _memset$File$FolderMoveNamePathSleepSpecialTempwsprintf
                                    • String ID: Default$QQBrowser.exe$\Tencent\QQBrowser\User Data\$bak
                                    • API String ID: 2742518391-2429508344
                                    • Opcode ID: 0e54152de5e706dd32317b2883b6d9b22f54a27d1984d202d2b92858c0c27df3
                                    • Instruction ID: 303e9ac27bd1ca3b56e85ec31da4520ec1f556187fdca0bed45659d0685da91e
                                    • Opcode Fuzzy Hash: 0e54152de5e706dd32317b2883b6d9b22f54a27d1984d202d2b92858c0c27df3
                                    • Instruction Fuzzy Hash: 00316C75950258EFEB24DB60CC9ABD9B378EB14700F0001D9F5096A2D1EB787B84CF61
                                    APIs
                                      • Part of subcall function 1000F3B0: _memset.LIBCMT ref: 1000F3D5
                                      • Part of subcall function 1000F3B0: wsprintfA.USER32 ref: 1000F3ED
                                    • _memset.LIBCMT ref: 1000E64D
                                    • _memset.LIBCMT ref: 1000E66A
                                    • SHGetSpecialFolderPathA.SHELL32(00000000,00000000,0000001A,00000000,?,?,?,?,?,?,0F3104C0), ref: 1000E67F
                                    • GetTempFileNameA.KERNEL32(00000000,bak,00000000,00000000,\Microsoft\,00000000,?,?,?,?,?,?,0F3104C0), ref: 1000E6C8
                                    • Sleep.KERNEL32(000003E8,Skype for Desktop,?,?,?,?,?,?,0F3104C0), ref: 1000E6E3
                                    • MoveFileExA.KERNEL32(00000000,00000000,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 1000E708
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3012198157.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000E.00000002.3012110827.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012409035.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _memset$File$FolderMoveNamePathSleepSpecialTempwsprintf
                                    • String ID: Skype for Desktop$Skype.exe$\Microsoft\$bak
                                    • API String ID: 2742518391-3712293284
                                    • Opcode ID: 609e6d69384bd8dc0245cb6b53dc543715522320479eba0b398141e820af1bdb
                                    • Instruction ID: 5cbbd60c3ee543de6939a2953fd336e89185860d59f2e57474878281ef46e463
                                    • Opcode Fuzzy Hash: 609e6d69384bd8dc0245cb6b53dc543715522320479eba0b398141e820af1bdb
                                    • Instruction Fuzzy Hash: FB316A75950258ABEB24DB64CC9ABD9B378EB14700F0002E9F5096A2D1EB787B84CF61
                                    APIs
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3012198157.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000E.00000002.3012110827.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012409035.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: char_traits$_memmove
                                    • String ID:
                                    • API String ID: 4015421094-0
                                    • Opcode ID: 8a46f27c53daf1bb3a5c5b26083eeb91bd03bd6e6ef27442f332e57adb46b26b
                                    • Instruction ID: 392e569acab4bc7803cc6a5d1307a5f36e8b576372a140fd2397c7b8e5873d66
                                    • Opcode Fuzzy Hash: 8a46f27c53daf1bb3a5c5b26083eeb91bd03bd6e6ef27442f332e57adb46b26b
                                    • Instruction Fuzzy Hash: 53A1B47AA00008EFDB04DF98DD92D9E77B6FF58298B248154F9099725ADB30FE50CB90
                                    APIs
                                    • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 1001039F
                                    • CreateFileA.KERNEL32(?,40000000,00000002,00000000,00000004,00000080,00000000), ref: 10010406
                                    • GetFileSize.KERNEL32(?,00000000), ref: 10010425
                                    • SetFilePointer.KERNEL32(?,00000000,00000000,00000002), ref: 1001044A
                                    • lstrlenA.KERNEL32(1000EEB8), ref: 10010454
                                    • lstrlenA.KERNEL32(1000EEB8,00000000,00000000), ref: 100104D6
                                    • WriteFile.KERNEL32(?,?,00000000), ref: 100104EB
                                    • CloseHandle.KERNEL32(?), ref: 100104F8
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3012198157.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000E.00000002.3012110827.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012409035.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$lstrlen$CloseCreateDirectoryHandlePointerSizeSystemWrite
                                    • String ID: .key
                                    • API String ID: 1674266968-343438762
                                    • Opcode ID: ffe63ab53faeb08c4fabfe3c25abd14c77d86f4555a55f109598a67c17bf6787
                                    • Instruction ID: 1c9aefebe2efcbaba9d66af4461c31df970b4e064e3fc872ccff81242f4e36e7
                                    • Opcode Fuzzy Hash: ffe63ab53faeb08c4fabfe3c25abd14c77d86f4555a55f109598a67c17bf6787
                                    • Instruction Fuzzy Hash: 7A410CB590022CDFDB29CB64DC86BD9B7B5BF48700F0085D9F649AA241D774AAC4CF90
                                    APIs
                                      • Part of subcall function 1000F3B0: _memset.LIBCMT ref: 1000F3D5
                                      • Part of subcall function 1000F3B0: wsprintfA.USER32 ref: 1000F3ED
                                    • _memset.LIBCMT ref: 1000E7AD
                                    • _memset.LIBCMT ref: 1000E7CA
                                    • SHGetSpecialFolderPathA.SHELL32(00000000,00000000,0000001A,00000000,?,?,?,?,?,?,0F3104C0), ref: 1000E7DF
                                    • GetTempFileNameA.KERNEL32(00000000,bak,00000000,00000000,101AF284,00000000,?,?,?,?,?,?,0F3104C0), ref: 1000E828
                                    • Sleep.KERNEL32(000003E8,SogouExplorer,?,?,?,?,?,?,0F3104C0), ref: 1000E843
                                    • MoveFileExA.KERNEL32(00000000,00000000,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 1000E868
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3012198157.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000E.00000002.3012110827.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012409035.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _memset$File$FolderMoveNamePathSleepSpecialTempwsprintf
                                    • String ID: SogouExplorer$SogouExplorer.exe$bak
                                    • API String ID: 2742518391-538188596
                                    • Opcode ID: 387075a032f40cdf426803d7b8eb962ed2b699bce44bc087e450045890685a63
                                    • Instruction ID: cdfe1adb3a5306c7d49e930ca4d3ffe4328d7c09e084d7f548619efed37bff03
                                    • Opcode Fuzzy Hash: 387075a032f40cdf426803d7b8eb962ed2b699bce44bc087e450045890685a63
                                    • Instruction Fuzzy Hash: 14316C75950258ABEB24DBA0CC9ABD9B374EF14700F0001D9F5096A2D1EB787B84CB55
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3012198157.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000E.00000002.3012110827.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012409035.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _malloc_memmove_strlen
                                    • String ID: D
                                    • API String ID: 3238260300-2746444292
                                    • Opcode ID: 6855c12a7bdc6e0bd8773f4745c8c759726946dada61b8ef62cf01ab51cda593
                                    • Instruction ID: 6d557a2bb59ac2ae05f88cec7faa246fa2e5727cbdb9c8dfb4b7bdd6368fabdf
                                    • Opcode Fuzzy Hash: 6855c12a7bdc6e0bd8773f4745c8c759726946dada61b8ef62cf01ab51cda593
                                    • Instruction Fuzzy Hash: 163173B5D00218EBDB64CF60DC45BEB7378EB58345F404598E60DAA241EBB6AAC4CF91
                                    APIs
                                      • Part of subcall function 1001B6A0: HeapAlloc.KERNEL32(?,00000000,?,?,?,?,?,?,1001D1A7,?,1001C0BB,?,?,?,?,1001EAD1), ref: 1001B6CA
                                    • EnterCriticalSection.KERNEL32(00000054,?,00000000,0F3104C0,?,00000000), ref: 1001C3F8
                                      • Part of subcall function 1001BD70: timeGetTime.WINMM ref: 1001BD78
                                      • Part of subcall function 1001BD70: _memmove.LIBCMT ref: 1001BDDC
                                    • GetLastError.KERNEL32 ref: 1001C470
                                    • CreateIoCompletionPort.KERNEL32(?,?,00000000,00000000), ref: 1001C44A
                                      • Part of subcall function 100172C0: __CxxThrowException@8.LIBCMT ref: 100172D2
                                      • Part of subcall function 100172C0: EnterCriticalSection.KERNEL32(00000000,0F3104C0,00000000,00000098,?,?,00000000,10035B28,000000FF,?,?,101B722C,?,1001640E,80004005), ref: 10017312
                                      • Part of subcall function 100172C0: LeaveCriticalSection.KERNEL32(00000000,?,?,00000000,10035B28,000000FF,?,?,101B722C,?,1001640E,80004005,?,100168C9,00000400,00000400), ref: 1001737B
                                    • connect.WS2_32(?,?,0000001C), ref: 1001C497
                                    • CreateIoCompletionPort.KERNEL32(?,?,00000000,00000000), ref: 1001C4CC
                                    • HeapFree.KERNEL32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 1001C552
                                    • LeaveCriticalSection.KERNEL32(00000054), ref: 1001C559
                                      • Part of subcall function 1001A870: ioctlsocket.WS2_32(?,8004667E,?), ref: 1001A87F
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3012198157.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000E.00000002.3012110827.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012409035.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalSection$CompletionCreateEnterHeapLeavePort$AllocErrorException@8FreeLastThrowTime_memmoveconnectioctlsockettime
                                    • String ID:
                                    • API String ID: 577898059-0
                                    • Opcode ID: fb6ef4b531d651df34b6af81ca114c1cb161ed1b6c4b7f8e2a56bc7a7bb065d0
                                    • Instruction ID: 13f5607a006f5134b6e7d624e793b95b5dada5aad690ad180316847aeaa3252a
                                    • Opcode Fuzzy Hash: fb6ef4b531d651df34b6af81ca114c1cb161ed1b6c4b7f8e2a56bc7a7bb065d0
                                    • Instruction Fuzzy Hash: CA518F75600208AFDB11DF64CC85FAA77AAFF44350F144428FD09EE2A1DB71E890DB60
                                    APIs
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3012198157.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000E.00000002.3012110827.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012409035.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _memmove_s
                                    • String ID:
                                    • API String ID: 800865076-0
                                    • Opcode ID: bfd165e00e761db38f2bdf525350d73678aeff4c921f7e730ca0ddaf86c9b7a3
                                    • Instruction ID: e53b5beb10ba7e09faa63e27da374d48c55a1d98f715c35b0f5f6325fba29714
                                    • Opcode Fuzzy Hash: bfd165e00e761db38f2bdf525350d73678aeff4c921f7e730ca0ddaf86c9b7a3
                                    • Instruction Fuzzy Hash: 59418D36200655AFD711DF68C888B9EF7E9FF44364F10402AF9098B291DB75EDA08BA0
                                    APIs
                                    • _memset.LIBCMT ref: 100115CC
                                    • GetSystemDirectoryA.KERNEL32(00000000,00000104), ref: 100115E0
                                    • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000), ref: 10011647
                                    • GetFileSize.KERNEL32(000000FF,00000000), ref: 10011669
                                      • Part of subcall function 1001EF9C: _malloc.LIBCMT ref: 1001EFB4
                                    • ReadFile.KERNEL32(000000FF,?,00000000,00000000,00000000), ref: 100116B4
                                    • CloseHandle.KERNEL32(000000FF), ref: 10011771
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3012198157.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000E.00000002.3012110827.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012409035.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$CloseCreateDirectoryHandleReadSizeSystem_malloc_memset
                                    • String ID: .key
                                    • API String ID: 1189190961-343438762
                                    • Opcode ID: e3cca6749972bda63ac77e56a70e5a53b244fe33762708ed0120600f45f4504f
                                    • Instruction ID: 3d4300d2710fecc02f3fab15f3df85ad30c21ba86dc6f63d814e5d622af92f7c
                                    • Opcode Fuzzy Hash: e3cca6749972bda63ac77e56a70e5a53b244fe33762708ed0120600f45f4504f
                                    • Instruction Fuzzy Hash: 2551EAB5D0022C9BDB69CB64DC82BD9B7B4AB58300F0045D8E64DAB281DB74AFC4CF91
                                    APIs
                                    • GetCurrentProcessId.KERNEL32 ref: 1000F2C3
                                    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 1000F2DD
                                    • Process32First.KERNEL32(000000FF,00000128), ref: 1000F30E
                                    • OpenProcess.KERNEL32(00000001,00000000,00000000,000000FF,00000128,00000002,00000000), ref: 1000F347
                                    • TerminateProcess.KERNEL32(00000000,00000000), ref: 1000F367
                                    • CloseHandle.KERNEL32(00000000), ref: 1000F374
                                    • Process32Next.KERNEL32(000000FF,00000128), ref: 1000F388
                                    • CloseHandle.KERNEL32(000000FF,000000FF,00000128,00000002,00000000), ref: 1000F39C
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3012198157.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000E.00000002.3012110827.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012409035.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Process$CloseHandleProcess32$CreateCurrentFirstNextOpenSnapshotTerminateToolhelp32
                                    • String ID:
                                    • API String ID: 477742948-0
                                    • Opcode ID: 0e5e03193292138b7c311efabc93a15d5f194d092c39daaf66340cd660e8982b
                                    • Instruction ID: d41c4376eefb6253570006433f593cac2f32630ea850329660a4d75d5b4afe3c
                                    • Opcode Fuzzy Hash: 0e5e03193292138b7c311efabc93a15d5f194d092c39daaf66340cd660e8982b
                                    • Instruction Fuzzy Hash: 4921C370900228DFDB25EB60CD89BEDB7B4FB48750F1045D9E609AB290D774AB80DF50
                                    APIs
                                    • _free.LIBCMT ref: 10002756
                                      • Part of subcall function 1002043C: HeapFree.KERNEL32(00000000,00000000,?,10025D1C,00000000,100258E1,100204FB,?,?,100010EB,0000DF68,?,10001048,00000001), ref: 10020450
                                      • Part of subcall function 1002043C: GetLastError.KERNEL32(00000000,?,10025D1C,00000000,100258E1,100204FB,?,?,100010EB,0000DF68,?,10001048,00000001), ref: 10020462
                                    • DeleteCriticalSection.KERNEL32(?), ref: 10002778
                                    • _free.LIBCMT ref: 1000277F
                                    • DeleteCriticalSection.KERNEL32(?,00000000), ref: 100027B2
                                    • _free.LIBCMT ref: 100027B9
                                    • _free.LIBCMT ref: 100027C2
                                    • _free.LIBCMT ref: 100027D1
                                    • _free.LIBCMT ref: 100027D7
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3012198157.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000E.00000002.3012110827.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012409035.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _free$CriticalDeleteSection$ErrorFreeHeapLast
                                    • String ID:
                                    • API String ID: 229044151-0
                                    • Opcode ID: 829fe4cc710feb83a16dcdc532ce873229ccf800336d69de1fb585340b12b445
                                    • Instruction ID: 16a73a784ab602da626493d70980f9eae99143d6bc0915a138f34a67110a4392
                                    • Opcode Fuzzy Hash: 829fe4cc710feb83a16dcdc532ce873229ccf800336d69de1fb585340b12b445
                                    • Instruction Fuzzy Hash: 560108B66007105BE612EF209C82A6B73AAEF80580F54442CF94A47207DB35F985C7E2
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3012198157.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000E.00000002.3012110827.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012409035.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: bfd34e201d1059666f78fc474e3004731cd6cb8f970c98b5a1a8be2d127c39e0
                                    • Instruction ID: df39f66d2745d17a7fe87e744aa0e03a21574858425a6f03c3f21479afaab56c
                                    • Opcode Fuzzy Hash: bfd34e201d1059666f78fc474e3004731cd6cb8f970c98b5a1a8be2d127c39e0
                                    • Instruction Fuzzy Hash: 536109B9E00209EFDB44CF94C884B9EB7B5FF48304F218598E905AB395D775EA81DB90
                                    APIs
                                    • EnterCriticalSection.KERNEL32(?,?,?,?,?,?,100025EE,?,?,?,10002B57,?), ref: 1000208B
                                    • WakeAllConditionVariable.KERNEL32(?,?,?,?,100025EE,?,?,?,10002B57,?), ref: 100020AD
                                    • LeaveCriticalSection.KERNEL32(?,?,?,?,100025EE,?,?,?,10002B57,?), ref: 100020B4
                                    • EnterCriticalSection.KERNEL32(?,?,?,?,?,?,100025EE,?,?,?,10002B57,?), ref: 100020EC
                                    • SleepConditionVariableCS.KERNEL32(?,?,000000FF,?,?,?,100025EE,?,?,?,10002B57,?), ref: 1000210D
                                    • LeaveCriticalSection.KERNEL32(?,?,?,?,100025EE,?,?,?,10002B57,?), ref: 10002116
                                    • _free.LIBCMT ref: 1000213E
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3012198157.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000E.00000002.3012110827.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012409035.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalSection$ConditionEnterLeaveVariable$SleepWake_free
                                    • String ID:
                                    • API String ID: 1710734047-0
                                    • Opcode ID: e61bd854db23e898daa16de29f131cc90b3ab22f0d1ab1bd32c91fa0d06ec401
                                    • Instruction ID: 05dc04eb116ff6e28942813317816f3c30ed5ba661128168b5cad8891ce245dc
                                    • Opcode Fuzzy Hash: e61bd854db23e898daa16de29f131cc90b3ab22f0d1ab1bd32c91fa0d06ec401
                                    • Instruction Fuzzy Hash: 8D4190B1601B069FE724CF64C884796B7F4FF14390F51462AE91ACB695D730F894CBA1
                                    APIs
                                    • GetModuleHandleA.KERNEL32(kernel32.dll,?,?), ref: 1001A70C
                                    • GetProcAddress.KERNEL32(00000000,CreateFileTransactedA), ref: 1001A721
                                    • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,?,?), ref: 1001A76A
                                    • GetFileSize.KERNEL32(?,?), ref: 1001A78C
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3012198157.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000E.00000002.3012110827.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012409035.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$AddressCreateHandleModuleProcSize
                                    • String ID: CreateFileTransactedA$kernel32.dll
                                    • API String ID: 381258031-3827029016
                                    • Opcode ID: 2b602c5be5b8ceff7d4341a465a72c2674a25abf06f1222532ee79990a52c5db
                                    • Instruction ID: 3fd96c11bbd7488a8a418e2e25c194671cc8f240b4c6ee697fb62349ff201565
                                    • Opcode Fuzzy Hash: 2b602c5be5b8ceff7d4341a465a72c2674a25abf06f1222532ee79990a52c5db
                                    • Instruction Fuzzy Hash: 0431AD34744205BBEB31CA649C45B9977F8EF02B61F20425AFE18EE1D0D7B1EAD0D654
                                    APIs
                                    • _calloc.LIBCMT ref: 10003330
                                      • Part of subcall function 10024166: __calloc_impl.LIBCMT ref: 10024179
                                    • InitializeCriticalSection.KERNEL32(00000018,00000000), ref: 1000335C
                                    • InitializeConditionVariable.KERNEL32(00000030), ref: 1000336C
                                    • InitializeConditionVariable.KERNEL32(00000034), ref: 10003372
                                    • __beginthreadex.LIBCMT ref: 100033A8
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3012198157.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000E.00000002.3012110827.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012409035.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Initialize$ConditionVariable$CriticalSection__beginthreadex__calloc_impl_calloc
                                    • String ID:
                                    • API String ID: 4275094566-0
                                    • Opcode ID: 1c90a2da0a09f1423271f63d7b8369d043ae484d91931262826aadb9d33fa527
                                    • Instruction ID: d63cbc47a989e61f8d5764840e3dc6a2f22de4f4aba891b4dc0ad6eac0f10f79
                                    • Opcode Fuzzy Hash: 1c90a2da0a09f1423271f63d7b8369d043ae484d91931262826aadb9d33fa527
                                    • Instruction Fuzzy Hash: 582192B660071AAFE711DF95EC84B97B7ECFB40350F504029EA08C7541EBB5B6598BA0
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3012198157.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000E.00000002.3012110827.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012409035.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: PathTemp_memset_strrchr
                                    • String ID: D
                                    • API String ID: 3269299267-2746444292
                                    • Opcode ID: 65dff33f197481420d75febd2944a67fcb56e30f99d0bf04b3eaf0f89ed5e44e
                                    • Instruction ID: 94703a5b4a1e95a47fdd501beecf67a154b79f006fe411b9632ef845b5e6f6b1
                                    • Opcode Fuzzy Hash: 65dff33f197481420d75febd2944a67fcb56e30f99d0bf04b3eaf0f89ed5e44e
                                    • Instruction Fuzzy Hash: 2F218BB9D00218EBDB24DB50DC45BDA7378EB58305F444498F54D9E281EBB5ABC4CFA0
                                    APIs
                                    • _free.LIBCMT ref: 10001236
                                      • Part of subcall function 1002043C: HeapFree.KERNEL32(00000000,00000000,?,10025D1C,00000000,100258E1,100204FB,?,?,100010EB,0000DF68,?,10001048,00000001), ref: 10020450
                                      • Part of subcall function 1002043C: GetLastError.KERNEL32(00000000,?,10025D1C,00000000,100258E1,100204FB,?,?,100010EB,0000DF68,?,10001048,00000001), ref: 10020462
                                    • _free.LIBCMT ref: 10001275
                                    • _free.LIBCMT ref: 1000128D
                                    • _free.LIBCMT ref: 100012A8
                                    • DeleteCriticalSection.KERNEL32(8415FF68,?), ref: 100012C6
                                    • _free.LIBCMT ref: 100012CD
                                    • _free.LIBCMT ref: 100012D6
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3012198157.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000E.00000002.3012110827.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012409035.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _free$CriticalDeleteErrorFreeHeapLastSection
                                    • String ID:
                                    • API String ID: 2933665753-0
                                    • Opcode ID: 2361ccc68d43a71e868931a2596d9ac44d138912533a7e2e7945e83494bb7265
                                    • Instruction ID: aaf221896ecc1e09f6eeffe9c750e8d10df9c6965350f993c9d4ceeb60f37a7f
                                    • Opcode Fuzzy Hash: 2361ccc68d43a71e868931a2596d9ac44d138912533a7e2e7945e83494bb7265
                                    • Instruction Fuzzy Hash: F81104B1800B455BE721EB61F8817A773E1FF00250F948439E55B4220AD731B9E8CBA2
                                    APIs
                                    • _memset.LIBCMT ref: 1000F648
                                    • CreateProcessA.KERNEL32(00000000,1000F402,00000000,00000000,00000001,08000020,00000000,00000000,00000044,00000000), ref: 1000F686
                                    • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 1000F696
                                    • CloseHandle.KERNEL32(00000000), ref: 1000F6A0
                                    • CloseHandle.KERNEL32(?), ref: 1000F6AA
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3012198157.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000E.00000002.3012110827.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012409035.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseHandle$CreateObjectProcessSingleWait_memset
                                    • String ID: D
                                    • API String ID: 3422168109-2746444292
                                    • Opcode ID: 6aa504984eda8c7b5acce5dc33e2805d2fb05eccdb010cb75b9960ebb1134bfa
                                    • Instruction ID: cb5451c512472725f5a4df07bad1c41973f3ae078433712cb33367d9263f6d2b
                                    • Opcode Fuzzy Hash: 6aa504984eda8c7b5acce5dc33e2805d2fb05eccdb010cb75b9960ebb1134bfa
                                    • Instruction Fuzzy Hash: CA113071A00248EFEB24DFE4DC46BAD7BB8EF48700F10421DF619AE2D4DBB5A9448B54
                                    APIs
                                    • _malloc.LIBCMT ref: 100161B4
                                      • Part of subcall function 10020474: __FF_MSGBANNER.LIBCMT ref: 1002048B
                                      • Part of subcall function 10020474: __NMSG_WRITE.LIBCMT ref: 10020492
                                      • Part of subcall function 10020474: HeapAlloc.KERNEL32(00670000,00000000,00000001,?,?,?,?,100010EB,0000DF68,?,10001048,00000001), ref: 100204B7
                                    • _free.LIBCMT ref: 10016270
                                    • std::exception::exception.LIBCMT ref: 100162BC
                                    • __CxxThrowException@8.LIBCMT ref: 100162D1
                                    • SetLastError.KERNEL32(00000018,?,101B722C,?,1001640E,80004005,?,100168C9,00000400,00000400), ref: 100162DC
                                    • _free.LIBCMT ref: 100162E7
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3012198157.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000E.00000002.3012110827.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012409035.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _free$AllocErrorException@8HeapLastThrow_mallocstd::exception::exception
                                    • String ID:
                                    • API String ID: 3049299895-0
                                    • Opcode ID: c4e75bb467dcd632cc6794f0c5e8569d33c960b951e8937276adff62c409ee6a
                                    • Instruction ID: ed2824db1dae17bfd308ba5dcb0e615037e45c0d1587b7e3fee2415e99e90dce
                                    • Opcode Fuzzy Hash: c4e75bb467dcd632cc6794f0c5e8569d33c960b951e8937276adff62c409ee6a
                                    • Instruction Fuzzy Hash: A0519AB6A006199FCB01CF98DC80B9EBBF4EB49710F554169E914AB341D775ED80CB90
                                    APIs
                                    • __ioinit.LIBCMT ref: 100285A6
                                      • Part of subcall function 10029B38: InitOnceExecuteOnce.KERNEL32(101BE634,10029B73,00000000,00000000,1003508B,101B7FB0,0000000C,10005D7E,zstd), ref: 10029B46
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3012198157.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000E.00000002.3012110827.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012409035.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Once$ExecuteInit__ioinit
                                    • String ID:
                                    • API String ID: 129814473-0
                                    • Opcode ID: 5f84c9e2474b48f1b5df84408ea3fed00915e9808a8aa5c3ede1912be93b9b93
                                    • Instruction ID: eb12839c2236a0a66080d8b7707541b2b015dfdafb5b4036e193e8b83220f103
                                    • Opcode Fuzzy Hash: 5f84c9e2474b48f1b5df84408ea3fed00915e9808a8aa5c3ede1912be93b9b93
                                    • Instruction Fuzzy Hash: 7A415679902B058FD320CB78E885A6E77E4EF413B0B90871DF8AB876D1D774EA408B10
                                    APIs
                                    • HeapAlloc.KERNEL32(00000094,00000000,?,00000000,00000000), ref: 1001E132
                                    • _memmove.LIBCMT ref: 1001E18D
                                    • InterlockedExchangeAdd.KERNEL32(-00000040,?), ref: 1001E19D
                                    • InterlockedDecrement.KERNEL32(00000028), ref: 1001E1B6
                                    • HeapFree.KERNEL32(?,00000000,00000000,00000000), ref: 1001E1E0
                                    • InterlockedExchangeAdd.KERNEL32(-00000040,?), ref: 1001E1F7
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3012198157.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000E.00000002.3012110827.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012409035.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Interlocked$ExchangeHeap$AllocDecrementFree_memmove
                                    • String ID:
                                    • API String ID: 3475820249-0
                                    • Opcode ID: 8410d57850f0f56a72160be52005f4586bc43fc5666634ebf8d9ae9adf307239
                                    • Instruction ID: 7998932e740281b790ced908d299ef40af193b578d293305540e12fdeb0e7596
                                    • Opcode Fuzzy Hash: 8410d57850f0f56a72160be52005f4586bc43fc5666634ebf8d9ae9adf307239
                                    • Instruction Fuzzy Hash: F5410D72900259AFDB11CF99C884A9EBBF8FF49314F1145AAEC199F211D770ED54CB90
                                    APIs
                                    • Concurrency::details::HardwareAffinity::operator!=.LIBCMTD ref: 1000C28F
                                    • std::error_category::default_error_condition.LIBCPMTD ref: 1000C2B0
                                    • std::error_category::default_error_condition.LIBCPMTD ref: 1000C2CA
                                    • Concurrency::details::HardwareAffinity::operator!=.LIBCMTD ref: 1000C2D6
                                    • _Copy_impl.LIBCPMTD ref: 1000C2F1
                                    • std::error_category::default_error_condition.LIBCPMTD ref: 1000C323
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3012198157.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000E.00000002.3012110827.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012409035.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: std::error_category::default_error_condition$Affinity::operator!=Concurrency::details::Hardware$Copy_impl
                                    • String ID:
                                    • API String ID: 1600619793-0
                                    • Opcode ID: b1d60bd1d2c90ce81873208b493584433b2c3e2ab3f7430867161bbb174af34e
                                    • Instruction ID: d7a5fca912ec06086403f1c670a1a813a5f108e565bd240dc1cb7e9a7b1914b0
                                    • Opcode Fuzzy Hash: b1d60bd1d2c90ce81873208b493584433b2c3e2ab3f7430867161bbb174af34e
                                    • Instruction Fuzzy Hash: ED310079910119ABDB08DF95CC91DFFB3B9FF88240B50852DB515A7296DF30BA05CB90
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3012198157.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000E.00000002.3012110827.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012409035.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _wprintfhtonsinet_addr
                                    • String ID: 2$OnConnect: %s,%d
                                    • API String ID: 3872430831-1911175251
                                    • Opcode ID: c5e6b32b25000850bdcfd3e7752fad518d315f21ca028ddb3caaaf99291d32ff
                                    • Instruction ID: b422dd61b17a844059851ccc93c32e4f95b7dbd58dc7ab89f53cd95de4c22344
                                    • Opcode Fuzzy Hash: c5e6b32b25000850bdcfd3e7752fad518d315f21ca028ddb3caaaf99291d32ff
                                    • Instruction Fuzzy Hash: B111D6B5A00208AFCB14DFA4D9809AEB7B9FF88200F108159F9099B251EB35AA45CB50
                                    APIs
                                    • _memset.LIBCMT ref: 100106F8
                                    • GetModuleFileNameA.KERNEL32(00000000,00000000,00000104), ref: 1001070E
                                    • _memset.LIBCMT ref: 10010729
                                    • ShellExecuteExA.SHELL32(0000003C), ref: 10010761
                                      • Part of subcall function 10022BD3: _doexit.LIBCMT ref: 10022BDD
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3012198157.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000E.00000002.3012110827.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012409035.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _memset$ExecuteFileModuleNameShell_doexit
                                    • String ID: <
                                    • API String ID: 862106238-4251816714
                                    • Opcode ID: 20cf96c7f9d228022f40f64b64e5aa891d9eb85aec194889f2121776d6cbdfe6
                                    • Instruction ID: ed08ded1bf864bf3e223a1e7aee1529ee6b636ef57dacc8919679b4bfa0f8810
                                    • Opcode Fuzzy Hash: 20cf96c7f9d228022f40f64b64e5aa891d9eb85aec194889f2121776d6cbdfe6
                                    • Instruction Fuzzy Hash: F5112174A443189BDB60DF60DC86BD977B8EB58701F4040D8E54CAA2D1DBB46BC8CF51
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3012198157.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000E.00000002.3012110827.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012409035.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: State$AsyncSleep_memsetlstrlen
                                    • String ID: ]$e
                                    • API String ID: 1122937223-1460998272
                                    • Opcode ID: eed0b91c2744c895165e97b4f44415f78997a58abc4c3c7c85806ef0c703c4ee
                                    • Instruction ID: 764bce47da2be80fe97f0ee0a60544cb6e7be49dbe84d1d57fcac03222c10f19
                                    • Opcode Fuzzy Hash: eed0b91c2744c895165e97b4f44415f78997a58abc4c3c7c85806ef0c703c4ee
                                    • Instruction Fuzzy Hash: 35011A34901728CFFB64CF15CC85BA977B2FB80391F1082A9C4095695ACB779EA1EE01
                                    APIs
                                    • GetModuleHandleA.KERNEL32(kernel32,IsWow64Process), ref: 100122C1
                                    • GetProcAddress.KERNEL32(00000000), ref: 100122C8
                                    • GetCurrentProcess.KERNEL32(00000000), ref: 100122DB
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3012198157.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000E.00000002.3012110827.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012409035.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressCurrentHandleModuleProcProcess
                                    • String ID: IsWow64Process$kernel32
                                    • API String ID: 4190356694-3789238822
                                    • Opcode ID: 4dbbbb52112192865a612101614944367de734d12e029e91dbf73928284f9556
                                    • Instruction ID: d8b697d57578edb345ad90496a9b557fc7605fd1813d4f5a4f7f5f71a7bdeb36
                                    • Opcode Fuzzy Hash: 4dbbbb52112192865a612101614944367de734d12e029e91dbf73928284f9556
                                    • Instruction Fuzzy Hash: 74F0FE75D00208FFDB10EFE4C94879DBBB8EF08205F404099E80997251DB389648DB50
                                    APIs
                                      • Part of subcall function 100184E0: GetNativeSystemInfo.KERNEL32(?,?,?,?,?,100167AB,0F3104C0,00000000,?,?,?,1001849E), ref: 100184FB
                                      • Part of subcall function 100184E0: GetNativeSystemInfo.KERNEL32(?,?,?,?,?,100167AB,0F3104C0,00000000,?,?,?,1001849E), ref: 10018516
                                    • CreateEventA.KERNEL32(00000000,00000001,00000001,00000000,0F3104C0,00000000,?,?,?,1001849E), ref: 100167F5
                                    • HeapCreate.KERNEL32(00000004,00000000,00000000,?,?,?,1001849E), ref: 10016889
                                    • _free.LIBCMT ref: 1001693E
                                    • _free.LIBCMT ref: 10016946
                                    • _free.LIBCMT ref: 100169A9
                                      • Part of subcall function 100172C0: __CxxThrowException@8.LIBCMT ref: 100172D2
                                      • Part of subcall function 100172C0: EnterCriticalSection.KERNEL32(00000000,0F3104C0,00000000,00000098,?,?,00000000,10035B28,000000FF,?,?,101B722C,?,1001640E,80004005), ref: 10017312
                                      • Part of subcall function 100172C0: LeaveCriticalSection.KERNEL32(00000000,?,?,00000000,10035B28,000000FF,?,?,101B722C,?,1001640E,80004005,?,100168C9,00000400,00000400), ref: 1001737B
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3012198157.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000E.00000002.3012110827.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012409035.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _free$CreateCriticalInfoNativeSectionSystem$EnterEventException@8HeapLeaveThrow
                                    • String ID:
                                    • API String ID: 471852966-0
                                    • Opcode ID: 62dcc8071ba77636672d3d9cd1e185c692ae9957d13345a13a02519507dda5e3
                                    • Instruction ID: d7e5b155edf1d74aaead93eb83c8ab603744e77deffcff0117244fe85bcfb593
                                    • Opcode Fuzzy Hash: 62dcc8071ba77636672d3d9cd1e185c692ae9957d13345a13a02519507dda5e3
                                    • Instruction Fuzzy Hash: C37118B0501B419FE761CF64C958787BBF4FF04308F108A1DE6AA9B691DBB9B148CB90
                                    APIs
                                    • FreeLibrary.KERNEL32(00000000), ref: 1001446A
                                    • _free.LIBCMT ref: 10014479
                                    • VirtualFree.KERNEL32(?,00000000,00008000,?,1001478E), ref: 10014498
                                    • GetProcessHeap.KERNEL32(00000000,00000000,?,1001478E), ref: 100144A4
                                    • HeapFree.KERNEL32(00000000,?,1001478E), ref: 100144AB
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3012198157.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000E.00000002.3012110827.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012409035.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Free$Heap$LibraryProcessVirtual_free
                                    • String ID:
                                    • API String ID: 3953351234-0
                                    • Opcode ID: d9d32f6ed72f362beb0b78fbb99d4c82a6959af6a865298871246b0d9bcbc94d
                                    • Instruction ID: e984664baf45058b12496fb5a6c08b784cfcca4bbda2656e475c534f62021b4f
                                    • Opcode Fuzzy Hash: d9d32f6ed72f362beb0b78fbb99d4c82a6959af6a865298871246b0d9bcbc94d
                                    • Instruction Fuzzy Hash: 6131B674A00208EFDB14CF94C598B9DB7B6FB49315F258288E9056B391C775EE86DF80
                                    APIs
                                    • _malloc.LIBCMT ref: 10023558
                                      • Part of subcall function 10020474: __FF_MSGBANNER.LIBCMT ref: 1002048B
                                      • Part of subcall function 10020474: __NMSG_WRITE.LIBCMT ref: 10020492
                                      • Part of subcall function 10020474: HeapAlloc.KERNEL32(00670000,00000000,00000001,?,?,?,?,100010EB,0000DF68,?,10001048,00000001), ref: 100204B7
                                    • _free.LIBCMT ref: 1002356B
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3012198157.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000E.00000002.3012110827.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012409035.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AllocHeap_free_malloc
                                    • String ID:
                                    • API String ID: 2734353464-0
                                    • Opcode ID: bad27d9961e6c256fd05d00a16dcfa7813a2fc78cb849604c55e28e4d427328b
                                    • Instruction ID: 8f73b662920d403f089da30250cd819716aaae5841175fa17ded837e2a866512
                                    • Opcode Fuzzy Hash: bad27d9961e6c256fd05d00a16dcfa7813a2fc78cb849604c55e28e4d427328b
                                    • Instruction Fuzzy Hash: 28112731900A366FCB21DB70BC4564E37E4EF003A0FE18525F90D9A1A1DF349940D794
                                    APIs
                                    • EnterCriticalSection.KERNEL32(?,?,00000000,?,?,1001BE50,?,?,00000054,?,1001D828,00000000,00000000,00000000,00000000), ref: 1001B651
                                    • EnterCriticalSection.KERNEL32(?,?,1001BE50,?,?,00000054,?,1001D828,00000000,00000000,00000000,00000000), ref: 1001B657
                                    • LeaveCriticalSection.KERNEL32(?,?,1001BE50,?,?,00000054,?,1001D828,00000000,00000000,00000000,00000000), ref: 1001B675
                                    • LeaveCriticalSection.KERNEL32(?,?,1001BE50,?,?,00000054,?,1001D828,00000000,00000000,00000000,00000000), ref: 1001B678
                                    • LeaveCriticalSection.KERNEL32(?,?,1001BE50,?,?,00000054,?,1001D828,00000000,00000000,00000000,00000000), ref: 1001B68A
                                    • LeaveCriticalSection.KERNEL32(?,?,1001BE50,?,?,00000054,?,1001D828,00000000,00000000,00000000,00000000), ref: 1001B68D
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3012198157.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000E.00000002.3012110827.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012409035.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalSection$Leave$Enter
                                    • String ID:
                                    • API String ID: 2978645861-0
                                    • Opcode ID: c76d05b3fccb81bbde97bbe8f299796e80221eabea18b0df9aee05efc5887d01
                                    • Instruction ID: 15876e7cb504465c55ff25fd79a18e235aef5e7f8048034f6523b5cd64803c08
                                    • Opcode Fuzzy Hash: c76d05b3fccb81bbde97bbe8f299796e80221eabea18b0df9aee05efc5887d01
                                    • Instruction Fuzzy Hash: 43F044722016146FD711AB6EDCC0A9BB7ECFFC9224B520136E908DB611C779E8458AB0
                                    APIs
                                    • EnterCriticalSection.KERNEL32(00000018,00000000,0000003C,00000000,?,?,100033DA), ref: 1000340C
                                    • WakeAllConditionVariable.KERNEL32 ref: 1000341D
                                    • LeaveCriticalSection.KERNEL32(00000018), ref: 10003424
                                    • WaitForSingleObject.KERNEL32(?,000000FF,?), ref: 1000345C
                                    • GetLastError.KERNEL32 ref: 1000346D
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3012198157.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000E.00000002.3012110827.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012409035.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalSection$ConditionEnterErrorLastLeaveObjectSingleVariableWaitWake
                                    • String ID:
                                    • API String ID: 2002041392-0
                                    • Opcode ID: e75bfb5a0ad93df77c66187c49ea81158b5d7819f7b5d557b30da283341fa316
                                    • Instruction ID: 32492cade0fa7766ae1656b716e42035eae87337b4a1db3a89480abb877ebfd1
                                    • Opcode Fuzzy Hash: e75bfb5a0ad93df77c66187c49ea81158b5d7819f7b5d557b30da283341fa316
                                    • Instruction Fuzzy Hash: 8301B1325002169FEB52EF58DCC469773ECFF45391B018525EA589B119D730E989CBA2
                                    APIs
                                    • RtlDecodePointer.NTDLL(?), ref: 6C91323C
                                    • RtlEncodePointer.NTDLL(00000000), ref: 6C91332D
                                    • InterlockedDecrement.KERNEL32(006944E0), ref: 6C9133B6
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3013317433.000000006C681000.00000040.00000001.01000000.00000003.sdmp, Offset: 6C680000, based on PE: true
                                    • Associated: 0000000E.00000002.3013239239.000000006C680000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000000E.00000002.3013317433.000000006C9C3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000000E.00000002.3013317433.000000006CBAB000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000000E.00000002.3013317433.000000006CBB3000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000000E.00000002.3013317433.000000006CBB9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 0000000E.00000002.3015754617.000000006CC55000.00000040.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_6c680000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Pointer$DecodeDecrementEncodeInterlocked
                                    • String ID: Di
                                    • API String ID: 3602974720-1145751393
                                    • Opcode ID: 8f15731da986caa946230992b7ebf71952455fe40306a3c33999598b776fb09e
                                    • Instruction ID: 92f80892776e3af2ee8edce7e798e8075a7ccf06445e3b7baf39e0cd0704cf2b
                                    • Opcode Fuzzy Hash: 8f15731da986caa946230992b7ebf71952455fe40306a3c33999598b776fb09e
                                    • Instruction Fuzzy Hash: 1541CEB2A09348EBEB08DBB0D847B6D3735FB56309F604528D6106BFC1DBBA9904CB54
                                    APIs
                                      • Part of subcall function 1001A990: setsockopt.WS2_32(?,0000FFFF,00007010,00000000,00000004), ref: 1001A9A6
                                    • EnterCriticalSection.KERNEL32 ref: 1001D7AC
                                    • LeaveCriticalSection.KERNEL32(00000054), ref: 1001D7C7
                                      • Part of subcall function 1001BE40: timeGetTime.WINMM(00000007,00000000,00000000,00000000,?,00000001,?,?,00000001,00000000), ref: 1001BE7F
                                    • SetLastError.KERNEL32(00000000), ref: 1001D7D1
                                    • LeaveCriticalSection.KERNEL32(00000054), ref: 1001D7EC
                                    • HeapFree.KERNEL32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 1001D842
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3012198157.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000E.00000002.3012110827.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012409035.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalSection$Leave$EnterErrorFreeHeapLastTimesetsockopttime
                                    • String ID:
                                    • API String ID: 4191520005-0
                                    • Opcode ID: d82dbdcae07a67b72c96c9c25426668b2813c80c10765768011baf3510c592d9
                                    • Instruction ID: 8b7f9298d96b99960fdb9572d67dbc8946c541a3fe55414fa74220fd8c56f37f
                                    • Opcode Fuzzy Hash: d82dbdcae07a67b72c96c9c25426668b2813c80c10765768011baf3510c592d9
                                    • Instruction Fuzzy Hash: E131C372600214EFD711DF48CC85B9EB7B8FF49721F10422AF9299B291DB75A840CB60
                                    APIs
                                    • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 1002F22B
                                    • __isleadbyte_l.LIBCMT ref: 1002F259
                                    • MultiByteToWideChar.KERNEL32(00000000,00000009,0000000C,00000000,00000000,00000000), ref: 1002F287
                                    • MultiByteToWideChar.KERNEL32(00000000,00000009,0000000C,00000001,00000000,00000000), ref: 1002F2BD
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3012198157.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000E.00000002.3012110827.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012409035.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                    • String ID:
                                    • API String ID: 3058430110-0
                                    • Opcode ID: 2b3d1593b62abf2a8beba7a4b33d3e542d277218e77fbf3ac6909a8a0f39df84
                                    • Instruction ID: 88f6cfa15c5d6d04ed07b041f1d82007708ea3ed43a2cafbe05b56c4a286dddd
                                    • Opcode Fuzzy Hash: 2b3d1593b62abf2a8beba7a4b33d3e542d277218e77fbf3ac6909a8a0f39df84
                                    • Instruction Fuzzy Hash: 1D31BC3560029AEFDB11CE64E845BBA3BE5FF422A0F52443DE8249B1A1D770E844DB50
                                    APIs
                                    • SetLastError.KERNEL32(?), ref: 1001E41B
                                    • UnmapViewOfFile.KERNEL32(00000000), ref: 1001E441
                                    • CloseHandle.KERNEL32(00000000), ref: 1001E461
                                    • CloseHandle.KERNEL32(00000000), ref: 1001E483
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3012198157.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000E.00000002.3012110827.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012409035.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseHandle$ErrorFileLastUnmapView
                                    • String ID:
                                    • API String ID: 4017539725-0
                                    • Opcode ID: 496f3fa893c77ec6c9c64e1aa7dc66e4b9ed660e755f62b2c78ec002215d3852
                                    • Instruction ID: cba275ec36c653788e4822474d84c3c335d5b1142b70863171b6aa198203d996
                                    • Opcode Fuzzy Hash: 496f3fa893c77ec6c9c64e1aa7dc66e4b9ed660e755f62b2c78ec002215d3852
                                    • Instruction Fuzzy Hash: 1E3118B5A002599BDB11CFA4CC48BAFBBF8FF48754F004219F805EB241EB75E9448BA0
                                    APIs
                                    • InterlockedCompareExchange.KERNEL32(00000000,?,00000000), ref: 1001B765
                                    • InterlockedCompareExchange.KERNEL32(?,?,?), ref: 1001B777
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3012198157.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000E.00000002.3012110827.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012409035.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CompareExchangeInterlocked
                                    • String ID:
                                    • API String ID: 3335655927-0
                                    • Opcode ID: 9484bcffa374807802c2175ff6f6c2d2e59b0392790023a2fe2f7dd29207cd47
                                    • Instruction ID: a411b3ee14b548daa5b868b1c8f2e50aeeae3c08791ef6b703bc2ef0cd82c7fc
                                    • Opcode Fuzzy Hash: 9484bcffa374807802c2175ff6f6c2d2e59b0392790023a2fe2f7dd29207cd47
                                    • Instruction Fuzzy Hash: 6E219F36304A09ABD720DF6DDD80E96F3EDFBC8311F00456AEA89C7240DB31E9548BA0
                                    APIs
                                    • VirtualAlloc.KERNEL32(?,00000000,00001000,00000004), ref: 100140EE
                                    • _memset.LIBCMT ref: 1001410A
                                    • VirtualAlloc.KERNEL32(?,?,00001000,00000004,?,100146FE), ref: 1001412C
                                    • _memmove.LIBCMT ref: 1001414A
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3012198157.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000E.00000002.3012110827.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012409035.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AllocVirtual$_memmove_memset
                                    • String ID:
                                    • API String ID: 725130153-0
                                    • Opcode ID: f53fd65b4befc706c090b7c927cf75363b07fbc3177beadfb71f7d900ef2fefc
                                    • Instruction ID: 93ed00f0eb9094769ecb9556d8f7921b1dd27d8a6f78ffda3dd0833cdc577a5f
                                    • Opcode Fuzzy Hash: f53fd65b4befc706c090b7c927cf75363b07fbc3177beadfb71f7d900ef2fefc
                                    • Instruction Fuzzy Hash: F631EA74A00209EFCB08CF94C995EAEB7B1FF48704F218598E915AB351D770EE81DB50
                                    APIs
                                    • GetFileSize.KERNEL32(00000002,00000004,?,?,?,00000002,00000004), ref: 1001A3B3
                                    • CreateFileMappingA.KERNEL32(00000002,00000000,00000004,00000004,00000000,00000000), ref: 1001A3E0
                                    • MapViewOfFileEx.KERNEL32(00000000,?,?,?,?,00000000,?,00000002,00000004), ref: 1001A429
                                    • CloseHandle.KERNEL32(?,?,00000002,00000004), ref: 1001A43F
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3012198157.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000E.00000002.3012110827.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012409035.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$CloseCreateHandleMappingSizeView
                                    • String ID:
                                    • API String ID: 1374251026-0
                                    • Opcode ID: 4b8af0a805cdf8347236f9c71f45033270cfc3b78af84c4974c8e4d52b637325
                                    • Instruction ID: 8fce67c6ff09011a8acf264d9e13d81355b447303082185ad91e7b9cb9a6a423
                                    • Opcode Fuzzy Hash: 4b8af0a805cdf8347236f9c71f45033270cfc3b78af84c4974c8e4d52b637325
                                    • Instruction Fuzzy Hash: 272167B5A0061AAFD714DF69DC45A5AF7F8FB49350F10812AFD19D7200D770E9A09BD0
                                    APIs
                                    • _free.LIBCMT ref: 1001B152
                                      • Part of subcall function 1001B190: HeapFree.KERNEL32(?,00000000,?), ref: 1001B1E5
                                    • DeleteCriticalSection.KERNEL32(?,0F3104C0), ref: 1001B113
                                    • DeleteCriticalSection.KERNEL32(?), ref: 1001B124
                                    • HeapFree.KERNEL32(?,00000000), ref: 1001B132
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3012198157.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000E.00000002.3012110827.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012409035.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalDeleteFreeHeapSection$_free
                                    • String ID:
                                    • API String ID: 210024702-0
                                    • Opcode ID: 2457e78313824737e41231bfbb3820b753e3b2e9e7e39901a1bfba69df0cf740
                                    • Instruction ID: 33c100260f324d21ff77bf2896aba4d0bbdecf1759cfcc0eaa01cd95da98a8db
                                    • Opcode Fuzzy Hash: 2457e78313824737e41231bfbb3820b753e3b2e9e7e39901a1bfba69df0cf740
                                    • Instruction Fuzzy Hash: 63319E71A00616EFDB11DFA8C884B5AFBF8FF05315F118269E9199F291D731E944CBA0
                                    APIs
                                    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,10011CAA), ref: 100152B1
                                      • Part of subcall function 1001EF9C: _malloc.LIBCMT ref: 1001EFB4
                                    • Process32First.KERNEL32(10011CAA,0F3104C0), ref: 100152E0
                                    • Process32Next.KERNEL32(10011CAA,0F3104C0), ref: 10015316
                                    • lstrcmpiA.KERNEL32(0F31049C,00000000), ref: 1001532A
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3012198157.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000E.00000002.3012110827.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012409035.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Process32$CreateFirstNextSnapshotToolhelp32_malloclstrcmpi
                                    • String ID:
                                    • API String ID: 242301054-0
                                    • Opcode ID: 335c3f3c8a0e05f5839a3b8562ab9f751be2bf2361413e739464e8ead2f72be9
                                    • Instruction ID: 03fd10ac50de1202267bfae5930d06ed0f63b87ea6e01dd6c59341b656d33967
                                    • Opcode Fuzzy Hash: 335c3f3c8a0e05f5839a3b8562ab9f751be2bf2361413e739464e8ead2f72be9
                                    • Instruction Fuzzy Hash: 8321BAB4A04208EBDB14CB98C981A9EB7F5EF48745F2480A8E818AF341D771EF81DB54
                                    APIs
                                    • EnterCriticalSection.KERNEL32(?,?,?,?,10001499,?,?,00000000,?,?,?), ref: 100034A7
                                    • SleepConditionVariableCS.KERNEL32(00000000,?,00000000), ref: 100034CB
                                    • LeaveCriticalSection.KERNEL32(?), ref: 100034D2
                                    • SleepConditionVariableCS.KERNEL32(00000000,?,000000FF), ref: 1000350E
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3012198157.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000E.00000002.3012110827.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012409035.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ConditionCriticalSectionSleepVariable$EnterLeave
                                    • String ID:
                                    • API String ID: 3020340620-0
                                    • Opcode ID: 05074beb6edb66eb96e78de5814604b12c6efd175baefdef2757970339633dab
                                    • Instruction ID: f135a66ef4c3fa2a34bb39291fcdf00077fd575a97a3f57769656b34936bebed
                                    • Opcode Fuzzy Hash: 05074beb6edb66eb96e78de5814604b12c6efd175baefdef2757970339633dab
                                    • Instruction Fuzzy Hash: 42110471500B558FE772CA58D9C4B5773E8FB007A6F51DE1DE4938A899C374F8888B21
                                    APIs
                                    • EnterCriticalSection.KERNEL32(?), ref: 10003292
                                    • SleepConditionVariableCS.KERNEL32(?,?,000000FF), ref: 100032BD
                                    • EnterCriticalSection.KERNEL32(?), ref: 100032ED
                                    • WakeConditionVariable.KERNEL32(?), ref: 100032FA
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3012198157.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000E.00000002.3012110827.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012409035.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ConditionCriticalEnterSectionVariable$SleepWake
                                    • String ID:
                                    • API String ID: 1272541424-0
                                    • Opcode ID: d2ef4d3d3bece3ecb2957c56201156f867af3ba4ab4f7a9e8506c951494b066a
                                    • Instruction ID: d287fa8a1d97e4fb1d990ba0663406a79fc7a6a744e69c2c1aa7d7a44e5ccb06
                                    • Opcode Fuzzy Hash: d2ef4d3d3bece3ecb2957c56201156f867af3ba4ab4f7a9e8506c951494b066a
                                    • Instruction Fuzzy Hash: 2C115572100B159FE336DF68DCC485BB3F9FB44360B418E19E4A683A45CB30F8498B60
                                    APIs
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3012198157.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000E.00000002.3012110827.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012409035.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CreateDirectory_memset_strlen_strncpy
                                    • String ID:
                                    • API String ID: 3994138041-0
                                    • Opcode ID: 5146f0f5f6924dacce34261d64f74e5090e561bcbd4e5be505613ef66d126bf7
                                    • Instruction ID: 101a95c8069f775dae9c248aff8c456d68721b5b320a68391b460c7f447a75fb
                                    • Opcode Fuzzy Hash: 5146f0f5f6924dacce34261d64f74e5090e561bcbd4e5be505613ef66d126bf7
                                    • Instruction Fuzzy Hash: CB1194B9D041189BCB10DB64DC81BDD77B8EF65304F0082E9E59D9B281DAB4EBD48F91
                                    APIs
                                    • ___BuildCatchObject.LIBCMT ref: 10026247
                                      • Part of subcall function 10026858: ___AdjustPointer.LIBCMT ref: 100268A1
                                    • _UnwindNestedFrames.LIBCMT ref: 1002625E
                                    • ___FrameUnwindToState.LIBCMT ref: 10026270
                                    • CallCatchBlock.LIBCMT ref: 10026294
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3012198157.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000E.00000002.3012110827.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012409035.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
                                    • String ID:
                                    • API String ID: 2633735394-0
                                    • Opcode ID: 6092b50bab1218cd8aabaab9e12c658e2e0f1782f2186364ed2301dcdcc7d9c1
                                    • Instruction ID: 780a5d68346db81fedf9f8d85dc8351bab79c3fb61c7619bb358afdc1328406f
                                    • Opcode Fuzzy Hash: 6092b50bab1218cd8aabaab9e12c658e2e0f1782f2186364ed2301dcdcc7d9c1
                                    • Instruction Fuzzy Hash: 88011732000109FBCF12CF95EC05EDA3BBAFF8C754F518115FA1865121C776E865ABA0
                                    APIs
                                    • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 10015381
                                    • __beginthreadex.LIBCMT ref: 100153A3
                                    • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 100153B4
                                    • CloseHandle.KERNEL32(00000000), ref: 100153BE
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3012198157.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000E.00000002.3012110827.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012409035.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseCreateEventHandleObjectSingleWait__beginthreadex
                                    • String ID:
                                    • API String ID: 2993629242-0
                                    • Opcode ID: d7dcd88de3af4c7a17b78a3c7ea8846737ab5e00941b9493fb9a3973c1d0ec84
                                    • Instruction ID: 28439952cb9d60efeb8680ab5036a31f0774e1b625031860cf64c459a7230e8b
                                    • Opcode Fuzzy Hash: d7dcd88de3af4c7a17b78a3c7ea8846737ab5e00941b9493fb9a3973c1d0ec84
                                    • Instruction Fuzzy Hash: 9A111EB5A04249AFDB14DFA8CC81BEE7BB4EF49310F504249F919AB381D730AA40CB90
                                    APIs
                                    Strings
                                    • wmic cpu get processorid, xrefs: 100065E0
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3012198157.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000E.00000002.3012110827.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012409035.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: char_traitsconstruct
                                    • String ID: wmic cpu get processorid
                                    • API String ID: 489808500-2204115948
                                    • Opcode ID: 1010ae759fa7e10457475eff9b78d9461d1f2c37ab24339ddda26cbfa1624876
                                    • Instruction ID: dd645ee37d0e35d6a0c4dc76963d6f74060cdeeedd1d1d5c8c6965c7acc1db0f
                                    • Opcode Fuzzy Hash: 1010ae759fa7e10457475eff9b78d9461d1f2c37ab24339ddda26cbfa1624876
                                    • Instruction Fuzzy Hash: 01410F75E00209DFDB08CF98D891AEEB7B6FF4C750F208129E915A7385DB35A941CBA4
                                    APIs
                                    • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 10011461
                                    • DeleteFileA.KERNEL32(?), ref: 100114B6
                                      • Part of subcall function 10011580: _memset.LIBCMT ref: 100115CC
                                      • Part of subcall function 10011580: GetSystemDirectoryA.KERNEL32(00000000,00000104), ref: 100115E0
                                      • Part of subcall function 10011580: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000), ref: 10011647
                                      • Part of subcall function 10011580: GetFileSize.KERNEL32(000000FF,00000000), ref: 10011669
                                      • Part of subcall function 10011580: ReadFile.KERNEL32(000000FF,?,00000000,00000000,00000000), ref: 100116B4
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3012198157.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000E.00000002.3012110827.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012409035.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$DirectorySystem$CreateDeleteReadSize_memset
                                    • String ID: .key
                                    • API String ID: 3518743009-343438762
                                    • Opcode ID: eb43b5ddff7011dff6964891f9a77986a6cb4ad83d3904fe4c7462824836723d
                                    • Instruction ID: c5e3bf08ea98db34f13579d809896ca9d031d76340f358e502fc38b765e240d6
                                    • Opcode Fuzzy Hash: eb43b5ddff7011dff6964891f9a77986a6cb4ad83d3904fe4c7462824836723d
                                    • Instruction Fuzzy Hash: 9F31E675A0025C9BDB28CF64DC42BEEB7B9EB45310F5081A9F9059B281DB35AE85CB90
                                    APIs
                                    • FindWindowA.USER32(Shell_TrayWnd,00000000), ref: 1000F5EB
                                    • MessageBoxA.USER32(00000000), ref: 1000F5F2
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3012198157.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000E.00000002.3012110827.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012409035.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: FindMessageWindow
                                    • String ID: Shell_TrayWnd
                                    • API String ID: 2823233367-2988720461
                                    • Opcode ID: fa6ae15565b281fa731f87bbf66bd491b581fbd42e31be7702e6434cd4fda3cb
                                    • Instruction ID: 8a2575e9232a4e6788a4e3303b54ed8dbf7533174b6017679d5c7ff6e03b4625
                                    • Opcode Fuzzy Hash: fa6ae15565b281fa731f87bbf66bd491b581fbd42e31be7702e6434cd4fda3cb
                                    • Instruction Fuzzy Hash: 240116B4D00208EFEB10CFA4D949B9EB7F4FB48341F2084A9E905A7394D675AF40AB54
                                    APIs
                                    • _memset.LIBCMT ref: 1001214F
                                    • GlobalMemoryStatusEx.KERNEL32(00000040), ref: 10012162
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3012198157.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000E.00000002.3012110827.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012409035.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: GlobalMemoryStatus_memset
                                    • String ID: @
                                    • API String ID: 587104284-2766056989
                                    • Opcode ID: d7d7f9b0b0953cb5caef1f62c0310114e2340016ed59b2748a12603957ba9fb6
                                    • Instruction ID: 3d7f5f32418326eb2dbc6e30da0d634f8bec6cfce8173ea13a502be2592b4bca
                                    • Opcode Fuzzy Hash: d7d7f9b0b0953cb5caef1f62c0310114e2340016ed59b2748a12603957ba9fb6
                                    • Instruction Fuzzy Hash: 20F06DB0A10208ABDB14DFA4C941B9DBBF8EF18300F50412CE909EB381DB34EA45CB80
                                    APIs
                                    • _memset.LIBCMT ref: 1000F3D5
                                    • wsprintfA.USER32 ref: 1000F3ED
                                      • Part of subcall function 1000F630: _memset.LIBCMT ref: 1000F648
                                      • Part of subcall function 1000F630: CreateProcessA.KERNEL32(00000000,1000F402,00000000,00000000,00000001,08000020,00000000,00000000,00000044,00000000), ref: 1000F686
                                      • Part of subcall function 1000F630: WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 1000F696
                                      • Part of subcall function 1000F630: CloseHandle.KERNEL32(00000000), ref: 1000F6A0
                                      • Part of subcall function 1000F630: CloseHandle.KERNEL32(?), ref: 1000F6AA
                                    Strings
                                    Memory Dump Source
                                    • Source File: 0000000E.00000002.3012198157.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                    • Associated: 0000000E.00000002.3012110827.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012409035.0000000010037000.00000002.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BA000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    • Associated: 0000000E.00000002.3012975071.00000000101BE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_14_2_10000000_rundll32.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseHandle_memset$CreateObjectProcessSingleWaitwsprintf
                                    • String ID: taskkill /f /t /im %s
                                    • API String ID: 1221303216-1431264914
                                    • Opcode ID: e147f47295d6159a0972dd24f2dc00c959dda93d6aa0ae33a39929a26f1210c1
                                    • Instruction ID: 7a26d32dd3a77ef8c91e8ca8fb8e6281576ca4a882f0339c21baba38ccc25a09
                                    • Opcode Fuzzy Hash: e147f47295d6159a0972dd24f2dc00c959dda93d6aa0ae33a39929a26f1210c1
                                    • Instruction Fuzzy Hash: 33F05475E00108ABDF10DBA4DD46BA973B8EF54204F4040A8F94DDB182EE75BB58CB91