Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
LX4CUQO8qI.dll

Overview

General Information

Sample name:LX4CUQO8qI.dll
renamed because original name is a hash value
Original sample name:882E00DD2C44F57162C0AC90858E8FC7.dll
Analysis ID:1500271
MD5:882e00dd2c44f57162c0ac90858e8fc7
SHA1:8e7c38c20fb19e890c896a4c98108b291237afb8
SHA256:d999e7ee9fb086bf4109f9c1821d959fd8b038902fa6f8dff2c3beafc36bee7b
Tags:dll
Infos:

Detection

CobaltStrike
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected CobaltStrike
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to detect sleep reduction / modifications
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Found decision node followed by non-executed suspicious APIs
Found evasive API chain (date check)
Found evasive API chain (may stop execution after checking a module file name)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
May check if the current machine is a sandbox (GetTickCount - Sleep)
PE file contains sections with non-standard names
Registers a DLL
Sample execution stops while process was sleeping (likely an evasion)
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • loaddll32.exe (PID: 7704 cmdline: loaddll32.exe "C:\Users\user\Desktop\LX4CUQO8qI.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 7712 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7752 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\LX4CUQO8qI.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 7780 cmdline: rundll32.exe "C:\Users\user\Desktop\LX4CUQO8qI.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
    • regsvr32.exe (PID: 7764 cmdline: regsvr32.exe /s C:\Users\user\Desktop\LX4CUQO8qI.dll MD5: 878E47C8656E53AE8A8A21E927C6F7E0)
    • rundll32.exe (PID: 7788 cmdline: rundll32.exe C:\Users\user\Desktop\LX4CUQO8qI.dll,DllGetClassObject MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7868 cmdline: rundll32.exe C:\Users\user\Desktop\LX4CUQO8qI.dll,DllMain MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7924 cmdline: rundll32.exe C:\Users\user\Desktop\LX4CUQO8qI.dll,DllRegisterServer MD5: 889B99C52A60DD49227C5E485A016679)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Cobalt Strike, CobaltStrikeCobalt Strike is a paid penetration testing product that allows an attacker to deploy an agent named 'Beacon' on the victim machine. Beacon includes a wealth of functionality to the attacker, including, but not limited to command execution, key logging, file transfer, SOCKS proxying, privilege escalation, mimikatz, port scanning and lateral movement. Beacon is in-memory/file-less, in that it consists of stageless or multi-stage shellcode that once loaded by exploiting a vulnerability or executing a shellcode loader, will reflectively load itself into the memory of a process without touching the disk. It supports C2 and staging over HTTP, HTTPS, DNS, SMB named pipes as well as forward and reverse TCP; Beacons can be daisy-chained. Cobalt Strike comes with a toolkit for developing shellcode loaders, called Artifact Kit.The Beacon implant has become popular amongst targeted attackers and criminal users as it is well written, stable, and highly customizable.
  • APT 29
  • APT32
  • APT41
  • AQUATIC PANDA
  • Anunak
  • Cobalt
  • Codoso
  • CopyKittens
  • DarkHydrus
  • FIN6
  • FIN7
  • Leviathan
  • Mustang Panda
  • Shell Crew
  • Stone Panda
  • TianWu
  • UNC1878
  • UNC2452
  • Winnti Umbrella
https://malpedia.caad.fkie.fraunhofer.de/details/win.cobalt_strike
{"BeaconType": ["HTTPS"], "Port": 2003, "SleepTime": 30000, "MaxGetSize": 1398102, "Jitter": 20, "C2Server": "154.82.113.115,/owa/", "HttpPostUri": "/OWA/", "Malleable_C2_Instructions": ["Base64 URL-safe decode"], "HttpGet_Verb": "GET", "HttpPost_Verb": "GET", "HttpPostChunk": 96, "Spawnto_x86": "%windir%\\syswow64\\gpupdate.exe", "Spawnto_x64": "%windir%\\sysnative\\gpupdate.exe", "CryptoScheme": 0, "Proxy_Behavior": "Use IE settings", "Watermark": 987654321, "bStageCleanup": "True", "bCFGCaution": "True", "KillDate": 0, "bProcInject_StartRWX": "True", "bProcInject_UseRWX": "False", "bProcInject_MinAllocSize": 16700, "ProcInject_PrependAppend_x86": "Empty", "ProcInject_PrependAppend_x64": "Empty", "ProcInject_Execute": ["ntdll.dll:RtlUserThreadStart", "SetThreadContext", "NtQueueApcThread-s", "kernel32.dll:LoadLibraryA", "RtlCreateUserThread"], "ProcInject_AllocationMethod": "NtMapViewOfSection", "bUsesCookies": "True", "HostHeader": ""}
SourceRuleDescriptionAuthorStrings
00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Metasploit_7bc0f998Identifies the API address lookup function leverage by metasploit shellcodeunknown
  • 0x887:$a1: 48 31 D2 65 48 8B 52 60 48 8B 52 18 48 8B 52 20 48 8B 72 50 48 0F B7 4A 4A 4D 31 C9 48 31 C0 AC 3C 61
00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Metasploit_c9773203Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families.unknown
  • 0x8f3:$a: 48 31 C0 AC 41 C1 C9 0D 41 01 C1 38 E0 75 F1 4C 03 4C 24 08 45 39 D1
00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_CobaltStrike_3Yara detected CobaltStrikeJoe Security
    00000000.00000003.1756940749.0000000001080000.00000040.00000020.00020000.00000000.sdmpJoeSecurity_CobaltStrike_2Yara detected CobaltStrikeJoe Security
      00000000.00000003.1756940749.0000000001080000.00000040.00000020.00020000.00000000.sdmpJoeSecurity_CobaltStrike_3Yara detected CobaltStrikeJoe Security
        Click to see the 4 entries
        SourceRuleDescriptionAuthorStrings
        0.2.loaddll32.exe.960000.0.raw.unpackJoeSecurity_CobaltStrike_3Yara detected CobaltStrikeJoe Security
          0.2.loaddll32.exe.960000.0.unpackJoeSecurity_CobaltStrike_3Yara detected CobaltStrikeJoe Security
            0.2.loaddll32.exe.960000.0.unpackWindows_Trojan_Metasploit_7bc0f998Identifies the API address lookup function leverage by metasploit shellcodeunknown
            • 0x34487:$a1: 48 31 D2 65 48 8B 52 60 48 8B 52 18 48 8B 52 20 48 8B 72 50 48 0F B7 4A 4A 4D 31 C9 48 31 C0 AC 3C 61
            0.2.loaddll32.exe.960000.0.unpackWindows_Trojan_Metasploit_c9773203Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families.unknown
            • 0x344f3:$a: 48 31 C0 AC 41 C1 C9 0D 41 01 C1 38 E0 75 F1 4C 03 4C 24 08 45 39 D1
            No Sigma rule has matched
            Timestamp:2024-08-28T07:10:22.534991+0200
            SID:2028765
            Severity:3
            Source Port:49742
            Destination Port:2003
            Protocol:TCP
            Classtype:Unknown Traffic
            Timestamp:2024-08-28T07:10:28.243287+0200
            SID:2028765
            Severity:3
            Source Port:49743
            Destination Port:2003
            Protocol:TCP
            Classtype:Unknown Traffic
            Timestamp:2024-08-28T07:09:32.344215+0200
            SID:2035651
            Severity:1
            Source Port:2003
            Destination Port:49730
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-08-28T07:11:27.521168+0200
            SID:2028765
            Severity:3
            Source Port:49754
            Destination Port:2003
            Protocol:TCP
            Classtype:Unknown Traffic
            Timestamp:2024-08-28T07:10:16.208107+0200
            SID:2028765
            Severity:3
            Source Port:49741
            Destination Port:2003
            Protocol:TCP
            Classtype:Unknown Traffic
            Timestamp:2024-08-28T07:10:58.177119+0200
            SID:2028765
            Severity:3
            Source Port:49749
            Destination Port:2003
            Protocol:TCP
            Classtype:Unknown Traffic
            Timestamp:2024-08-28T07:10:40.161221+0200
            SID:2028765
            Severity:3
            Source Port:49746
            Destination Port:2003
            Protocol:TCP
            Classtype:Unknown Traffic
            Timestamp:2024-08-28T07:11:16.231106+0200
            SID:2028765
            Severity:3
            Source Port:49752
            Destination Port:2003
            Protocol:TCP
            Classtype:Unknown Traffic
            Timestamp:2024-08-28T07:11:10.815329+0200
            SID:2028765
            Severity:3
            Source Port:49751
            Destination Port:2003
            Protocol:TCP
            Classtype:Unknown Traffic
            Timestamp:2024-08-28T07:11:21.946675+0200
            SID:2028765
            Severity:3
            Source Port:49753
            Destination Port:2003
            Protocol:TCP
            Classtype:Unknown Traffic
            Timestamp:2024-08-28T07:10:46.453380+0200
            SID:2028765
            Severity:3
            Source Port:49747
            Destination Port:2003
            Protocol:TCP
            Classtype:Unknown Traffic
            Timestamp:2024-08-28T07:11:04.280237+0200
            SID:2028765
            Severity:3
            Source Port:49750
            Destination Port:2003
            Protocol:TCP
            Classtype:Unknown Traffic
            Timestamp:2024-08-28T07:10:08.303721+0200
            SID:2028765
            Severity:3
            Source Port:49739
            Destination Port:2003
            Protocol:TCP
            Classtype:Unknown Traffic
            Timestamp:2024-08-28T07:10:33.718106+0200
            SID:2028765
            Severity:3
            Source Port:49744
            Destination Port:2003
            Protocol:TCP
            Classtype:Unknown Traffic
            Timestamp:2024-08-28T07:10:52.741600+0200
            SID:2028765
            Severity:3
            Source Port:49748
            Destination Port:2003
            Protocol:TCP
            Classtype:Unknown Traffic
            Timestamp:2024-08-28T07:09:30.416134+0200
            SID:2028765
            Severity:3
            Source Port:49730
            Destination Port:2003
            Protocol:TCP
            Classtype:Unknown Traffic
            Timestamp:2024-08-28T07:10:03.136520+0200
            SID:2028765
            Severity:3
            Source Port:49738
            Destination Port:2003
            Protocol:TCP
            Classtype:Unknown Traffic

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: LX4CUQO8qI.dllAvira: detected
            Source: 00000000.00000003.1756940749.0000000001080000.00000040.00000020.00020000.00000000.sdmpMalware Configuration Extractor: CobaltStrike {"BeaconType": ["HTTPS"], "Port": 2003, "SleepTime": 30000, "MaxGetSize": 1398102, "Jitter": 20, "C2Server": "154.82.113.115,/owa/", "HttpPostUri": "/OWA/", "Malleable_C2_Instructions": ["Base64 URL-safe decode"], "HttpGet_Verb": "GET", "HttpPost_Verb": "GET", "HttpPostChunk": 96, "Spawnto_x86": "%windir%\\syswow64\\gpupdate.exe", "Spawnto_x64": "%windir%\\sysnative\\gpupdate.exe", "CryptoScheme": 0, "Proxy_Behavior": "Use IE settings", "Watermark": 987654321, "bStageCleanup": "True", "bCFGCaution": "True", "KillDate": 0, "bProcInject_StartRWX": "True", "bProcInject_UseRWX": "False", "bProcInject_MinAllocSize": 16700, "ProcInject_PrependAppend_x86": "Empty", "ProcInject_PrependAppend_x64": "Empty", "ProcInject_Execute": ["ntdll.dll:RtlUserThreadStart", "SetThreadContext", "NtQueueApcThread-s", "kernel32.dll:LoadLibraryA", "RtlCreateUserThread"], "ProcInject_AllocationMethod": "NtMapViewOfSection", "bUsesCookies": "True", "HostHeader": ""}
            Source: https://154.82.113.115/Virustotal: Detection: 9%Perma Link
            Source: 154.82.113.115Virustotal: Detection: 9%Perma Link
            Source: LX4CUQO8qI.dllReversingLabs: Detection: 65%
            Source: LX4CUQO8qI.dllVirustotal: Detection: 60%Perma Link
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 97.4% probability
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_0096D7AA CryptAcquireContextA,CryptAcquireContextA,CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,0_2_0096D7AA
            Source: LX4CUQO8qI.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED, DLL
            Source: LX4CUQO8qI.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_0096480C _malloc,_memset,_strncmp,GetCurrentDirectoryA,FindFirstFileA,GetLastError,FileTimeToSystemTime,SystemTimeToTzSpecificLocalTime,FindNextFileA,FindClose,0_2_0096480C
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_0096925B _malloc,__snprintf,FindFirstFileA,_malloc,__snprintf,FindNextFileA,FindClose,0_2_0096925B

            Networking

            barindex
            Source: Network trafficSuricata IDS: 2035651 - Severity 1 - ET MALWARE Meterpreter or Other Reverse Shell SSL Cert : 154.82.113.115:2003 -> 192.168.2.4:49730
            Source: Malware configuration extractorURLs: 154.82.113.115
            Source: global trafficTCP traffic: 192.168.2.4:49730 -> 154.82.113.115:2003
            Source: Joe Sandbox ViewASN Name: ROOTNETWORKSUS ROOTNETWORKSUS
            Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49750 -> 154.82.113.115:2003
            Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49751 -> 154.82.113.115:2003
            Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49744 -> 154.82.113.115:2003
            Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49730 -> 154.82.113.115:2003
            Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49747 -> 154.82.113.115:2003
            Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49754 -> 154.82.113.115:2003
            Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49749 -> 154.82.113.115:2003
            Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49739 -> 154.82.113.115:2003
            Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49748 -> 154.82.113.115:2003
            Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49743 -> 154.82.113.115:2003
            Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49738 -> 154.82.113.115:2003
            Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49752 -> 154.82.113.115:2003
            Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49741 -> 154.82.113.115:2003
            Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49746 -> 154.82.113.115:2003
            Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49753 -> 154.82.113.115:2003
            Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49742 -> 154.82.113.115:2003
            Source: unknownTCP traffic detected without corresponding DNS query: 154.82.113.115
            Source: unknownTCP traffic detected without corresponding DNS query: 154.82.113.115
            Source: unknownTCP traffic detected without corresponding DNS query: 154.82.113.115
            Source: unknownTCP traffic detected without corresponding DNS query: 154.82.113.115
            Source: unknownTCP traffic detected without corresponding DNS query: 154.82.113.115
            Source: unknownTCP traffic detected without corresponding DNS query: 154.82.113.115
            Source: unknownTCP traffic detected without corresponding DNS query: 154.82.113.115
            Source: unknownTCP traffic detected without corresponding DNS query: 154.82.113.115
            Source: unknownTCP traffic detected without corresponding DNS query: 154.82.113.115
            Source: unknownTCP traffic detected without corresponding DNS query: 154.82.113.115
            Source: unknownTCP traffic detected without corresponding DNS query: 154.82.113.115
            Source: unknownTCP traffic detected without corresponding DNS query: 154.82.113.115
            Source: unknownTCP traffic detected without corresponding DNS query: 154.82.113.115
            Source: unknownTCP traffic detected without corresponding DNS query: 154.82.113.115
            Source: unknownTCP traffic detected without corresponding DNS query: 154.82.113.115
            Source: unknownTCP traffic detected without corresponding DNS query: 154.82.113.115
            Source: unknownTCP traffic detected without corresponding DNS query: 154.82.113.115
            Source: unknownTCP traffic detected without corresponding DNS query: 154.82.113.115
            Source: unknownTCP traffic detected without corresponding DNS query: 154.82.113.115
            Source: unknownTCP traffic detected without corresponding DNS query: 154.82.113.115
            Source: unknownTCP traffic detected without corresponding DNS query: 154.82.113.115
            Source: unknownTCP traffic detected without corresponding DNS query: 154.82.113.115
            Source: unknownTCP traffic detected without corresponding DNS query: 154.82.113.115
            Source: unknownTCP traffic detected without corresponding DNS query: 154.82.113.115
            Source: unknownTCP traffic detected without corresponding DNS query: 154.82.113.115
            Source: unknownTCP traffic detected without corresponding DNS query: 154.82.113.115
            Source: unknownTCP traffic detected without corresponding DNS query: 154.82.113.115
            Source: unknownTCP traffic detected without corresponding DNS query: 154.82.113.115
            Source: unknownTCP traffic detected without corresponding DNS query: 154.82.113.115
            Source: unknownTCP traffic detected without corresponding DNS query: 154.82.113.115
            Source: unknownTCP traffic detected without corresponding DNS query: 154.82.113.115
            Source: unknownTCP traffic detected without corresponding DNS query: 154.82.113.115
            Source: unknownTCP traffic detected without corresponding DNS query: 154.82.113.115
            Source: unknownTCP traffic detected without corresponding DNS query: 154.82.113.115
            Source: unknownTCP traffic detected without corresponding DNS query: 154.82.113.115
            Source: unknownTCP traffic detected without corresponding DNS query: 154.82.113.115
            Source: unknownTCP traffic detected without corresponding DNS query: 154.82.113.115
            Source: unknownTCP traffic detected without corresponding DNS query: 154.82.113.115
            Source: unknownTCP traffic detected without corresponding DNS query: 154.82.113.115
            Source: unknownTCP traffic detected without corresponding DNS query: 154.82.113.115
            Source: unknownTCP traffic detected without corresponding DNS query: 154.82.113.115
            Source: unknownTCP traffic detected without corresponding DNS query: 154.82.113.115
            Source: unknownTCP traffic detected without corresponding DNS query: 154.82.113.115
            Source: unknownTCP traffic detected without corresponding DNS query: 154.82.113.115
            Source: unknownTCP traffic detected without corresponding DNS query: 154.82.113.115
            Source: unknownTCP traffic detected without corresponding DNS query: 154.82.113.115
            Source: unknownTCP traffic detected without corresponding DNS query: 154.82.113.115
            Source: unknownTCP traffic detected without corresponding DNS query: 154.82.113.115
            Source: unknownTCP traffic detected without corresponding DNS query: 154.82.113.115
            Source: unknownTCP traffic detected without corresponding DNS query: 154.82.113.115
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_0096296B _memset,__snprintf,__snprintf,__snprintf,HttpOpenRequestA,HttpSendRequestA,InternetCloseHandle,InternetQueryDataAvailable,InternetReadFile,InternetCloseHandle,InternetCloseHandle,0_2_0096296B
            Source: 77EC63BDA74BD0D0E0426DC8F80085060.0.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
            Source: loaddll32.exe, 00000000.00000003.2094032497.0000000000A70000.00000004.00000020.00020000.00000000.sdmp, loaddll32.exe, 00000000.00000003.2093978733.0000000000A4E000.00000004.00000020.00020000.00000000.sdmp, loaddll32.exe, 00000000.00000002.2936517291.0000000000A72000.00000004.00000020.00020000.00000000.sdmp, loaddll32.exe, 00000000.00000003.1794866952.0000000000A4E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab(
            Source: loaddll32.exe, 00000000.00000002.2936517291.0000000000A4E000.00000004.00000020.00020000.00000000.sdmp, loaddll32.exe, 00000000.00000003.2093978733.0000000000A4E000.00000004.00000020.00020000.00000000.sdmp, loaddll32.exe, 00000000.00000003.1794866952.0000000000A4E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/enlJ
            Source: loaddll32.exe, 00000000.00000002.2936517291.0000000000A28000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://154.82.113.115/
            Source: loaddll32.exe, 00000000.00000002.2936517291.0000000000A4E000.00000004.00000020.00020000.00000000.sdmp, loaddll32.exe, 00000000.00000002.2936517291.0000000000A72000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://154.82.113.115:2003/
            Source: loaddll32.exe, 00000000.00000002.2936517291.0000000000A4E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://154.82.113.115:2003/hy
            Source: loaddll32.exe, 00000000.00000002.2936517291.0000000000A4E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://154.82.113.115:2003/oft
            Source: loaddll32.exe, 00000000.00000002.2936891536.000000000129C000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: https://154.82.113.115:2003/owa/?wa=FPR-lSl93sxmVlVCOAlZFbF7o1dHykWQX
            Source: loaddll32.exe, 00000000.00000002.2936517291.0000000000A28000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://154.82.113.115:2003/owa/?wa=FPR-lSl93sxmVlVCOAlZFbF7o1dHykWQXURFaS8Dwbgi6FyenzDlocbqwA4aTXi6

            System Summary

            barindex
            Source: 0.2.loaddll32.exe.960000.0.unpack, type: UNPACKEDPEMatched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown
            Source: 0.2.loaddll32.exe.960000.0.unpack, type: UNPACKEDPEMatched rule: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. Author: unknown
            Source: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown
            Source: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. Author: unknown
            Source: 00000000.00000003.1756940749.0000000001080000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown
            Source: 00000000.00000003.1756940749.0000000001080000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. Author: unknown
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00964065 CreateProcessAsUserA,GetLastError,GetLastError,GetLastError,CreateProcessA,GetLastError,0_2_00964065
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_3_010989540_3_01098954
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_3_010A5DB80_3_010A5DB8
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_3_010A24700_3_010A2470
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_3_010A57E80_3_010A57E8
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_3_0109365C0_3_0109365C
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_009838D10_2_009838D1
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_009840FD0_2_009840FD
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_009830280_2_00983028
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_009861450_2_00986145
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_009869700_2_00986970
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_009742140_2_00974214
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_009863A00_2_009863A0
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00985B200_2_00985B20
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00983CDD0_2_00983CDD
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_009834FD0_2_009834FD
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_0097950C0_2_0097950C
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_3_0108CD8D0_3_0108CD8D
            Source: C:\Windows\System32\loaddll32.exeCode function: String function: 00979AD4 appears 39 times
            Source: C:\Windows\System32\loaddll32.exeCode function: String function: 01098F1C appears 35 times
            Source: LX4CUQO8qI.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED, DLL
            Source: 0.2.loaddll32.exe.960000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Metasploit_7bc0f998 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = fdb5c665503f07b2fc1ed7e4e688295e1222a500bfb68418661db60c8e75e835, id = 7bc0f998-7014-4883-8a56-d5ee00c15aed, last_modified = 2021-08-23
            Source: 0.2.loaddll32.exe.960000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Metasploit_c9773203 os = windows, severity = x86, description = Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., creation_date = 2021-04-07, scan_context = file, memory, reference = https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = afde93eeb14b4d0c182f475a22430f101394938868741ffa06445e478b6ece36, id = c9773203-6d1e-4246-a1e0-314217e0207a, last_modified = 2021-08-23
            Source: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_7bc0f998 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = fdb5c665503f07b2fc1ed7e4e688295e1222a500bfb68418661db60c8e75e835, id = 7bc0f998-7014-4883-8a56-d5ee00c15aed, last_modified = 2021-08-23
            Source: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_c9773203 os = windows, severity = x86, description = Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., creation_date = 2021-04-07, scan_context = file, memory, reference = https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = afde93eeb14b4d0c182f475a22430f101394938868741ffa06445e478b6ece36, id = c9773203-6d1e-4246-a1e0-314217e0207a, last_modified = 2021-08-23
            Source: 00000000.00000003.1756940749.0000000001080000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_7bc0f998 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = fdb5c665503f07b2fc1ed7e4e688295e1222a500bfb68418661db60c8e75e835, id = 7bc0f998-7014-4883-8a56-d5ee00c15aed, last_modified = 2021-08-23
            Source: 00000000.00000003.1756940749.0000000001080000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_c9773203 os = windows, severity = x86, description = Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., creation_date = 2021-04-07, scan_context = file, memory, reference = https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = afde93eeb14b4d0c182f475a22430f101394938868741ffa06445e478b6ece36, id = c9773203-6d1e-4246-a1e0-314217e0207a, last_modified = 2021-08-23
            Source: classification engineClassification label: mal100.troj.evad.winDLL@14/4@0/1
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_009637C3 LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,0_2_009637C3
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00969031 _memset,GetCurrentProcess,CreateToolhelp32Snapshot,Process32First,ProcessIdToSessionId,Process32Next,0_2_00969031
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7712:120:WilError_03
            Source: LX4CUQO8qI.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LX4CUQO8qI.dll",#1
            Source: LX4CUQO8qI.dllReversingLabs: Detection: 65%
            Source: LX4CUQO8qI.dllVirustotal: Detection: 60%
            Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\LX4CUQO8qI.dll"
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\LX4CUQO8qI.dll",#1
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\LX4CUQO8qI.dll
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LX4CUQO8qI.dll",#1
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\LX4CUQO8qI.dll,DllGetClassObject
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\LX4CUQO8qI.dll,DllMain
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\LX4CUQO8qI.dll,DllRegisterServer
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\LX4CUQO8qI.dll",#1Jump to behavior
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\LX4CUQO8qI.dllJump to behavior
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\LX4CUQO8qI.dll,DllGetClassObjectJump to behavior
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\LX4CUQO8qI.dll,DllMainJump to behavior
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\LX4CUQO8qI.dll,DllRegisterServerJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LX4CUQO8qI.dll",#1Jump to behavior
            Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Windows\System32\loaddll32.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Windows\System32\loaddll32.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\System32\loaddll32.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\System32\loaddll32.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\System32\loaddll32.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\System32\loaddll32.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\System32\loaddll32.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\System32\loaddll32.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\System32\loaddll32.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\System32\loaddll32.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\System32\loaddll32.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\loaddll32.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Windows\System32\loaddll32.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Windows\System32\loaddll32.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\System32\loaddll32.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Windows\System32\loaddll32.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Windows\System32\loaddll32.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\System32\loaddll32.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\System32\loaddll32.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Windows\System32\loaddll32.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Windows\System32\loaddll32.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Windows\System32\loaddll32.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\System32\loaddll32.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Windows\System32\loaddll32.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\System32\loaddll32.exeSection loaded: cryptnet.dllJump to behavior
            Source: C:\Windows\System32\loaddll32.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Windows\System32\loaddll32.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Windows\System32\loaddll32.exeSection loaded: webio.dllJump to behavior
            Source: C:\Windows\System32\loaddll32.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\System32\loaddll32.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Windows\System32\loaddll32.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Windows\System32\loaddll32.exeSection loaded: cabinet.dllJump to behavior
            Source: C:\Windows\System32\loaddll32.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Windows\System32\loaddll32.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: aclayers.dllJump to behavior
            Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sfc.dllJump to behavior
            Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sfc_os.dllJump to behavior
            Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\System32\loaddll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
            Source: LX4CUQO8qI.dllStatic PE information: Image base 0x6cfc0000 > 0x60000000
            Source: LX4CUQO8qI.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_009809A5 LoadLibraryA,GetProcAddress,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,0_2_009809A5
            Source: LX4CUQO8qI.dllStatic PE information: section name: .eh_fram
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\LX4CUQO8qI.dll
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_3_01096248 push eax; ret 0_3_0109624F
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_3_0109572F push edi; ret 0_3_01095730
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_3_01096F68 push dword ptr [ecx-75h]; iretd 0_3_01096F70
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_3_01098F61 push ecx; ret 0_3_01098F74
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_0098ABE1 push FFFFFFCBh; retf 0_2_0098ABE5
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00979B19 push ecx; ret 0_2_00979B2C
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_0098932C pushfd ; ret 0_2_00989331
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00976E00 push eax; ret 0_2_00976E07
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_0391061C push eax; mov dword ptr [esp], ebx0_2_0391065F
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_009633740_2_00963374
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00966C1F0_2_00966C1F
            Source: C:\Windows\System32\loaddll32.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_0-20603
            Source: C:\Windows\System32\loaddll32.exeEvasive API call chain: GetLocalTime,DecisionNodesgraph_0-19760
            Source: C:\Windows\System32\loaddll32.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-20367
            Source: C:\Windows\System32\loaddll32.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_0-19098
            Source: C:\Windows\System32\loaddll32.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleepgraph_0-18709
            Source: C:\Windows\System32\loaddll32.exeAPI coverage: 8.2 %
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00966C1F0_2_00966C1F
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_0096480C _malloc,_memset,_strncmp,GetCurrentDirectoryA,FindFirstFileA,GetLastError,FileTimeToSystemTime,SystemTimeToTzSpecificLocalTime,FindNextFileA,FindClose,0_2_0096480C
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_0096925B _malloc,__snprintf,FindFirstFileA,_malloc,__snprintf,FindNextFileA,FindClose,0_2_0096925B
            Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
            Source: loaddll32.exe, 00000000.00000002.2936517291.00000000009DD000.00000004.00000020.00020000.00000000.sdmp, loaddll32.exe, 00000000.00000002.2936517291.0000000000A28000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: C:\Windows\System32\loaddll32.exeAPI call chain: ExitProcess graph end nodegraph_0-19099
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_0391047E LdrInitializeThunk,0_2_0391047E
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_0097EB2E IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0097EB2E
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_009809A5 LoadLibraryA,GetProcAddress,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,0_2_009809A5
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_3_010B479D mov eax, dword ptr fs:[00000030h]0_3_010B479D
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_3_010B47AA mov eax, dword ptr fs:[00000030h]0_3_010B47AA
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_039101A1 mov eax, dword ptr fs:[00000030h]0_2_039101A1
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_039101AE mov eax, dword ptr fs:[00000030h]0_2_039101AE
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00984B20 CreateFileA,__lseeki64_nolock,__lseeki64_nolock,GetProcessHeap,HeapAlloc,__setmode_nolock,__write_nolock,__setmode_nolock,GetProcessHeap,HeapFree,__lseeki64_nolock,SetEndOfFile,GetLastError,__lseeki64_nolock,0_2_00984B20
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00981150 __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00981150
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_0097EB2E IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0097EB2E
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_0097AD12 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0097AD12
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_0096CAAA LogonUserA,GetLastError,ImpersonateLoggedOnUser,GetLastError,0_2_0096CAAA
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\LX4CUQO8qI.dll",#1Jump to behavior
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_0096CC7A GetCurrentProcessId,AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_0096CC7A
            Source: C:\Windows\System32\loaddll32.exeCode function: GetLocaleInfoA,0_2_009846F0
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00963873 CreateNamedPipeA,0_2_00963873
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00978876 GetSystemTimeAsFileTime,__aulldiv,0_2_00978876
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00966CD1 GetUserNameA,GetComputerNameA,GetModuleFileNameA,_strrchr,GetVersionExA,__snprintf,0_2_00966CD1
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00966CD1 GetUserNameA,GetComputerNameA,GetModuleFileNameA,_strrchr,GetVersionExA,__snprintf,0_2_00966CD1
            Source: C:\Windows\System32\loaddll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 00000000.00000003.1756940749.0000000001080000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: loaddll32.exe PID: 7704, type: MEMORYSTR
            Source: Yara matchFile source: 0.2.loaddll32.exe.960000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.loaddll32.exe.960000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00967293 socket,htons,ioctlsocket,closesocket,bind,listen,0_2_00967293
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00967375 htonl,htons,socket,closesocket,bind,ioctlsocket,0_2_00967375
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_0096D5DB socket,closesocket,htons,bind,listen,0_2_0096D5DB
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire Infrastructure2
            Valid Accounts
            3
            Native API
            2
            Valid Accounts
            2
            Valid Accounts
            2
            Valid Accounts
            OS Credential Dumping1
            System Time Discovery
            Remote Services1
            Archive Collected Data
            2
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault AccountsScheduled Task/Job1
            DLL Side-Loading
            21
            Access Token Manipulation
            1
            Virtualization/Sandbox Evasion
            LSASS Memory131
            Security Software Discovery
            Remote Desktop ProtocolData from Removable Media1
            Non-Standard Port
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)12
            Process Injection
            21
            Access Token Manipulation
            Security Account Manager1
            Virtualization/Sandbox Evasion
            SMB/Windows Admin SharesData from Network Shared Drive1
            Ingress Tool Transfer
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
            DLL Side-Loading
            12
            Process Injection
            NTDS1
            Process Discovery
            Distributed Component Object ModelInput Capture1
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
            Deobfuscate/Decode Files or Information
            LSA Secrets1
            Account Discovery
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
            Obfuscated Files or Information
            Cached Domain Credentials1
            System Owner/User Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
            Regsvr32
            DCSync1
            File and Directory Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
            Rundll32
            Proc Filesystem14
            System Information Discovery
            Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
            DLL Side-Loading
            /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 signatures2 2 Behavior Graph ID: 1500271 Sample: LX4CUQO8qI.dll Startdate: 28/08/2024 Architecture: WINDOWS Score: 100 23 Multi AV Scanner detection for domain / URL 2->23 25 Suricata IDS alerts for network traffic 2->25 27 Found malware configuration 2->27 29 6 other signatures 2->29 7 loaddll32.exe 1 2->7         started        process3 dnsIp4 21 154.82.113.115, 2003, 49730, 49738 ROOTNETWORKSUS Seychelles 7->21 31 Contains functionality to detect sleep reduction / modifications 7->31 11 cmd.exe 1 7->11         started        13 rundll32.exe 7->13         started        15 conhost.exe 7->15         started        17 3 other processes 7->17 signatures5 process6 process7 19 rundll32.exe 11->19         started       

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            LX4CUQO8qI.dll66%ReversingLabsWin32.Trojan.CobaltStrike
            LX4CUQO8qI.dll60%VirustotalBrowse
            LX4CUQO8qI.dll100%AviraHEUR/AGEN.1354117
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            bg.microsoft.map.fastly.net0%VirustotalBrowse
            edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com0%VirustotalBrowse
            SourceDetectionScannerLabelLink
            https://154.82.113.115/0%Avira URL Cloudsafe
            https://154.82.113.115:2003/owa/?wa=FPR-lSl93sxmVlVCOAlZFbF7o1dHykWQXURFaS8Dwbgi6FyenzDlocbqwA4aTXi60%Avira URL Cloudsafe
            154.82.113.1150%Avira URL Cloudsafe
            https://154.82.113.115:2003/0%Avira URL Cloudsafe
            https://154.82.113.115:2003/hy0%Avira URL Cloudsafe
            https://154.82.113.115:2003/oft0%Avira URL Cloudsafe
            https://154.82.113.115:2003/owa/?wa=FPR-lSl93sxmVlVCOAlZFbF7o1dHykWQX0%Avira URL Cloudsafe
            https://154.82.113.115/9%VirustotalBrowse
            154.82.113.1159%VirustotalBrowse
            NameIPActiveMaliciousAntivirus DetectionReputation
            bg.microsoft.map.fastly.net
            199.232.210.172
            truefalseunknown
            edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com
            84.201.210.21
            truefalseunknown
            NameMaliciousAntivirus DetectionReputation
            154.82.113.115true
            • 9%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            NameSourceMaliciousAntivirus DetectionReputation
            https://154.82.113.115/loaddll32.exe, 00000000.00000002.2936517291.0000000000A28000.00000004.00000020.00020000.00000000.sdmpfalse
            • 9%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            https://154.82.113.115:2003/owa/?wa=FPR-lSl93sxmVlVCOAlZFbF7o1dHykWQXURFaS8Dwbgi6FyenzDlocbqwA4aTXi6loaddll32.exe, 00000000.00000002.2936517291.0000000000A28000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://154.82.113.115:2003/loaddll32.exe, 00000000.00000002.2936517291.0000000000A4E000.00000004.00000020.00020000.00000000.sdmp, loaddll32.exe, 00000000.00000002.2936517291.0000000000A72000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://154.82.113.115:2003/hyloaddll32.exe, 00000000.00000002.2936517291.0000000000A4E000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://154.82.113.115:2003/oftloaddll32.exe, 00000000.00000002.2936517291.0000000000A4E000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://154.82.113.115:2003/owa/?wa=FPR-lSl93sxmVlVCOAlZFbF7o1dHykWQXloaddll32.exe, 00000000.00000002.2936891536.000000000129C000.00000004.00000010.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            154.82.113.115
            unknownSeychelles
            32708ROOTNETWORKSUStrue
            Joe Sandbox version:40.0.0 Tourmaline
            Analysis ID:1500271
            Start date and time:2024-08-28 07:08:29 +02:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 5m 19s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Run name:Run with higher sleep bypass
            Number of analysed new started processes analysed:12
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:LX4CUQO8qI.dll
            renamed because original name is a hash value
            Original Sample Name:882E00DD2C44F57162C0AC90858E8FC7.dll
            Detection:MAL
            Classification:mal100.troj.evad.winDLL@14/4@0/1
            EGA Information:
            • Successful, ratio: 100%
            HCA Information:
            • Successful, ratio: 92%
            • Number of executed functions: 23
            • Number of non-executed functions: 119
            Cookbook Comments:
            • Found application associated with file extension: .dll
            • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
            • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
            • Excluded IPs from analysis (whitelisted): 199.232.210.172
            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, ctldl.windowsupdate.com, wu-b-net.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
            • Not all processes where analyzed, report is missing behavior information
            • Report size getting too big, too many NtOpenKeyEx calls found.
            • Report size getting too big, too many NtQueryValueKey calls found.
            No simulations
            No context
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.comhttp://autoiothiatowers.web.app/0.05389702077273273Get hashmaliciousHTMLPhisherBrowse
            • 217.20.57.26
            https://appeal-right.netlify.app/Get hashmaliciousUnknownBrowse
            • 217.20.57.21
            http://pub-ceb6fc917f1a45e3a1cfe0221e017792.r2.dev/index.htmlGet hashmaliciousUnknownBrowse
            • 84.201.210.34
            https://bx1f04.na1.hubspotlinks.com/Ctc/2D+113/bX1F04/VWNJB36hmH_dW5B6f4M3tvNPkW6wcfC_5kfpqkN8pR4CT3qn9gW8wLKSR6lZ3lWW4RH0pD8cfc9fW1F_Bh_64Dbx_W8NP5442K_JLsW7VR2DZ6lXzbTW28cFfX9gXt3BW7kls0H2y2hq_W3ngTnJ28DTx_W6DvQHq8CwpszW2lLgbg3Q_MrpW2nSqGh8-5CjqW8mVvJw37-m1FW7tfJZm8wSKY9W920ndF61Cm7DW9fdnsh4qV1mzW6pLzrc94r10SW7SD62m3Qvv5jW87mYgh1YRjnYVKpmxr6B_xWTW3fp6Zx8jLGfWW7jL-y0457X8VN1TltTwsBPcYW7WJ-FL8qLjSdW7qm5WN8GZBkfW95bMcn6zJPqCVf27963J_4FxV1TfBP8XznlQW4GzPL-176L_NW72HRpV192F4df1YJ3TM04Get hashmaliciousUnknownBrowse
            • 217.20.57.36
            Vak#U0131fBank - #U00d6deme onay makbuzu 20240826.pdf.exeGet hashmaliciousQuasarBrowse
            • 84.201.210.37
            https://clickme.thryv.com/ls/click?upn=u001.Als7cfHaJU2yMdsJgpsIFl8RKvJCjgfWXgpyGiQbouwIVFCzJZdO6C7IEJWnFiPmUdkD_OEO3HRIZ3eedLymwLhvJt9sqs3j4T3CqpVCO9A0ZKplqH1W1Ad1lCPdQBrRfbSauZPLLCLTYBsXDRt8yGG5FOZ7NK342oFTufTBA9n-2F9XZOJptL-2BsSl02HxRvbllikFuSJtHHDkVwyIj5AuFgiubBu9sTxc8j0-2BQG5wldcZa7WyDp4BZYdRmFKi1MU2RpCFoGVLX1rLVx-2BFFfe8ZtbBDm0OusvqG9hc8jycErQH9w4yo0iZBNb6ruS35AQpqe-2Bn9sSG0dYdsEjJuPPD68-2FQoiA15kbRIRZcVBuBtywmpClclGh64Ps2rLg6E3U3-2Ft-2B24zaJbCf8tvrjozgadicpaRwQ3KIy53pMZsOUCbTeEqGc-3D#bGFtYmVydC5nZW9yZ2lhQGFpZGIub3JnGet hashmaliciousUnknownBrowse
            • 217.20.57.27
            SecuriteInfo.com.Trojan-Downloader.Win32.Agent.xycwio.1244.6578.exeGet hashmaliciousCoinhiveBrowse
            • 217.20.57.42
            http://telegramr.club/Get hashmaliciousTelegram PhisherBrowse
            • 217.20.57.22
            https://meta.submitdisablecase.eu/community-standard/407721902629009Get hashmaliciousUnknownBrowse
            • 217.20.57.43
            https://ipfs.io/ipfs/bafkreietmk3h6ldxpjxm2yqz3nui477zqwmz5m6du5fljx4a5bnqt4gzseGet hashmaliciousHTMLPhisherBrowse
            • 217.20.57.37
            bg.microsoft.map.fastly.netibero.batGet hashmaliciousSilverRatBrowse
            • 199.232.210.172
            https://www.wpspublish.com/customer/account/createPassword/?id=28732&token=k5FPAv4ZQlJ0DbFv9HIliRQV9FN7ztvsGet hashmaliciousUnknownBrowse
            • 199.232.210.172
            http://wpspublish.comGet hashmaliciousUnknownBrowse
            • 199.232.214.172
            http://pub-10050726d25949d8bd6cb438a8b6b09c.r2.dev/home.htmlGet hashmaliciousUnknownBrowse
            • 199.232.210.172
            https://emea.dcv.ms/haHCQHi4RDGet hashmaliciousHTMLPhisherBrowse
            • 199.232.210.172
            http://get-verified-free-badge.vercel.app/Get hashmaliciousUnknownBrowse
            • 199.232.210.172
            https://rondgeusbe-f69b39.ingress-erytho.ewp.live/wp-content/plugins/esidem/pages/region.phpGet hashmaliciousUnknownBrowse
            • 199.232.210.172
            http://pub-78727057140540a199a7e00bf238a392.r2.dev/index.htmlGet hashmaliciousUnknownBrowse
            • 199.232.210.172
            http://onoff.vn/blog/wp-content/builds/app/smserror.phpGet hashmaliciousUnknownBrowse
            • 199.232.210.172
            https://office.microsoftoniline.com/common/oauth2/v2.0/authorize/?clinet_id=2e5d6a57-eb8c-44bf3-8bd3-fc61824af882Get hashmaliciousUnknownBrowse
            • 199.232.210.172
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            ROOTNETWORKSUS3621103789.exeGet hashmaliciousUnknownBrowse
            • 154.82.84.197
            #U540d#U5f55#U5217#U8868_install_.exeGet hashmaliciousGhostRatBrowse
            • 154.82.92.202
            #U901a#U77e5#U5982#U4e0b.exeGet hashmaliciousGhostRatBrowse
            • 154.82.92.202
            http://telegxawm.com/Get hashmaliciousUnknownBrowse
            • 154.82.100.126
            sora.x86.elfGet hashmaliciousMiraiBrowse
            • 38.145.246.108
            SvpnLong2.exeGet hashmaliciousUnknownBrowse
            • 154.82.85.236
            SvpnLong2.exeGet hashmaliciousUnknownBrowse
            • 154.82.85.236
            down.exeGet hashmaliciousGhostRat, Mimikatz, NitolBrowse
            • 154.82.85.12
            Supe.exeGet hashmaliciousUnknownBrowse
            • 154.82.85.236
            Supe.exeGet hashmaliciousUnknownBrowse
            • 154.82.85.236
            No context
            No context
            Process:C:\Windows\System32\loaddll32.exe
            File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
            Category:dropped
            Size (bytes):71954
            Entropy (8bit):7.996617769952133
            Encrypted:true
            SSDEEP:1536:gc257bHnClJ3v5mnAQEBP+bfnW8Ctl8G1G4eu76NWDdB34w18R5cBWcJAm68+Q:gp2ld5jPqW8LgeulxB3fgcEfDQ
            MD5:49AEBF8CBD62D92AC215B2923FB1B9F5
            SHA1:1723BE06719828DDA65AD804298D0431F6AFF976
            SHA-256:B33EFCB95235B98B48508E019AFA4B7655E80CF071DEFABD8B2123FC8B29307F
            SHA-512:BF86116B015FB56709516D686E168E7C9C68365136231CC51D0B6542AE95323A71D2C7ACEC84AAD7DCECC2E410843F6D82A0A6D51B9ACFC721A9C84FDD877B5B
            Malicious:false
            Reputation:high, very likely benign file
            Preview:MSCF............,...................I..................XaK .authroot.stl.[.i..6..CK..<Tk......4.cl!Kg..E..*Y.f_..".$mR"$.J.E.KB."..rKv.."{.g....3.W.....c..9.s...=....y6#..x..........D......\(.#.s.!.A.......cd.c........+^.ov...n.....3BL..0.......BPUR&.X..02.q...R...J.....w.....b.vy>....-.&..(..oe."."...J9...0U.6J..|U..S.....M.F8g...=.......p...........l.?3.J.x.G.Ep..$g..tj......)v]9(:.)W.8.Op.1Q..:.nPd........7.7..M].V F..g.....12..!7(...B.......h.RZ.......l.<.....6..Z^.`p?... .p.Gp.#.'.X..........|!.8.....".m.49r?.I...g...8.v.....a``.g.R4.i...J8q....NFW,E.6Y....!.o5%.Y.....R..<..S9....r....WO...(.....F..Q=*....-..7d..O(....-..+k.........K..........{Q....Z..j._.E...QZ.~.\.^......N.9.k..O.}dD.b1r...[}/....T..E..G..c.|.c.&>?..^t. ..;..X.d.E.0G....[Q.*,*......#.Dp..L.o|#syc.J............}G-.ou6.=52..XWi=...m.....^u......c..fc?&pR7S5....I...j.G........j.j..Tc.El.....B.pQ.,Bp....j...9g.. >..s..m#.Nb.o_u.M.V...........\#...v..Mo\sF..s....Y...
            Process:C:\Windows\System32\loaddll32.exe
            File Type:data
            Category:modified
            Size (bytes):328
            Entropy (8bit):3.229605184327072
            Encrypted:false
            SSDEEP:6:kKv9UswD8HGsL+N+SkQlPlEGYRMY9z+4KlDA3RUebT3:2DImsLNkPlE99SNxAhUe/3
            MD5:1D03BEA958C410A26CEAC6A48F63D21F
            SHA1:1AD004103D1D2F31E32636BA17FC7E9C400AF016
            SHA-256:42C7EA99DE8977C620714CF23F3CDB5670B93603C96C1F3FC119BF584809A9DB
            SHA-512:863CCFED9F211804A48534FD2D81748D41EF7F9B0D184D6B23B9F149A7007ACC477DF40D18D50CF9655D71048A902D45B72E5D230B9DE4CA97B5273760785BAB
            Malicious:false
            Reputation:low
            Preview:p...... ......... Hw....(....................................................... ........G..@.......&......X........h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".a.7.2.8.2.e.b.4.0.b.1.d.a.1.:.0."...
            Process:C:\Windows\System32\loaddll32.exe
            File Type:data
            Category:dropped
            Size (bytes):239616
            Entropy (8bit):7.528695531238492
            Encrypted:false
            SSDEEP:3072:SnvEg+AeNNOcCsO8JzxPuvEKbZTOTCMIGEvWZSfx13gArA7lre5YtszmY229qZAt:SbWNKshx2JZmrxkn3gmAJoYjY2HZA4I3
            MD5:4ACFF65641011450C7E5669D6390148A
            SHA1:2BB5CAD326881A622BC7662FF2E6FD2AC1817179
            SHA-256:E8432C9C2694766BD8ED345EC636DF00B5E57C053F1BBDCDD59B7BABC319EE59
            SHA-512:6C35481D4434FE4B025C21C064F8427AB1FCE31B503FB1EE788BC380CAE307E3E81679B533BEB739C2328CC6945C051ADB11B4A14B7CE8019D65DD23C4BCAD92
            Malicious:false
            Reputation:low
            Preview:.;GH4Q.2.:...p.E....FZv.[.U.2.6...Q.2.a...Q.2.a...Q.2.a..\Q.2.~........A.p.Z..5}.>.@..5n.?.].Awh.#.\..{-......qh.\.8.a...Q.2.$...P.2.a...Q.2.a..<Q...`...+.2.....Q.2.....A.2.....Q.".q...S.2.a...Q.2.a...Q.2.....U.2.a...Q.3.a...A.2.a...A.2.a...Q.2FJ...Q.2R{...Q.2.a...Q.2.a...Q.2.a...Q.2.Q...I.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.....R.2.a...Q.2.a...Q.2.a...Q.2..pu.Q.23....A.2.....U.2.a...Q.2.a...Q.R..ql.0.2.......2...../.2.a...Q.2.a...Q.r..ty.Q.2.....a.2.....M.2.a...Q.2.a...Q...pa.2.2.A...a.2.C....2.a...Q.2.a...Q.p.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2
            Process:C:\Windows\SysWOW64\rundll32.exe
            File Type:data
            Category:dropped
            Size (bytes):102400
            Entropy (8bit):7.6470620959270175
            Encrypted:false
            SSDEEP:3072:SnvEg+AeNNOcCsO8JzxPuvEKbZTOTCMIGEvWZT:SbWNKshx2JZmrxT
            MD5:74FFE47C6D4DE71335D2D8D99E13D37B
            SHA1:59E3B38BBE6536D2E81579F86E5A0B0784A12004
            SHA-256:ADDDD0957AAFDB649C1EA22A48322EDA7F8C1C07E40B506A5B0255BAD59426A9
            SHA-512:05773724BF1E6F60B8F68AB50171637AD091E8B60F59659F442DEF9580A1AD973EC93FF6244786FFA10B83B57DA656D87EDC7DAFFC34B77A7DF5E95662203F2D
            Malicious:false
            Reputation:low
            Preview:.;GH4Q.2.:...p.E....FZv.[.U.2.6...Q.2.a...Q.2.a...Q.2.a..\Q.2.~........A.p.Z..5}.>.@..5n.?.].Awh.#.\..{-......qh.\.8.a...Q.2.$...P.2.a...Q.2.a..<Q...`...+.2.....Q.2.....A.2.....Q.".q...S.2.a...Q.2.a...Q.2.....U.2.a...Q.3.a...A.2.a...A.2.a...Q.2FJ...Q.2R{...Q.2.a...Q.2.a...Q.2.a...Q.2.Q...I.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.....R.2.a...Q.2.a...Q.2.a...Q.2..pu.Q.23....A.2.....U.2.a...Q.2.a...Q.R..ql.0.2.......2...../.2.a...Q.2.a...Q.r..ty.Q.2.....a.2.....M.2.a...Q.2.a...Q...pa.2.2.A...a.2.C....2.a...Q.2.a...Q.p.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2.a...Q.2
            File type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
            Entropy (8bit):6.6167264315880985
            TrID:
            • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
            • Generic Win/DOS Executable (2004/3) 0.20%
            • DOS Executable Generic (2002/1) 0.20%
            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
            File name:LX4CUQO8qI.dll
            File size:355'840 bytes
            MD5:882e00dd2c44f57162c0ac90858e8fc7
            SHA1:8e7c38c20fb19e890c896a4c98108b291237afb8
            SHA256:d999e7ee9fb086bf4109f9c1821d959fd8b038902fa6f8dff2c3beafc36bee7b
            SHA512:05e75efbd6f383564091950f6d8bfe5069700c859f9beb20a7627fc9052a0cea5beb8d133a4e3fee6c71386992ac4efa6beb5d86262b5729f934a3c0e8c4619b
            SSDEEP:6144:DsyrpKZu/6bWNKshx2JZmrxkn3gmAJoYjY2HZA4I:DdVKZu/6phJZminOGOY259I
            TLSH:8B749D9AE5CE3BBFF151D730C40FA725AF9029983369872C49C587592BA761333C981B
            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...;.&f...........#...).v...j.....................l................................."....@... ............................
            Icon Hash:7ae282899bbab082
            Entrypoint:0x6cfc1390
            Entrypoint Section:.text
            Digitally signed:false
            Imagebase:0x6cfc0000
            Subsystem:windows cui
            Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED, DLL
            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT
            Time Stamp:0x6626E13B [Mon Apr 22 22:14:19 2024 UTC]
            TLS Callbacks:0x6cfc1ca0, 0x6cfc1c50
            CLR (.Net) Version:
            OS Version Major:4
            OS Version Minor:0
            File Version Major:4
            File Version Minor:0
            Subsystem Version Major:4
            Subsystem Version Minor:0
            Import Hash:b189f83bdce907074c1f8f63d1974fe5
            Instruction
            sub esp, 0Ch
            mov dword ptr [6D018120h], 00000000h
            mov ecx, dword ptr [esp+18h]
            mov edx, dword ptr [esp+14h]
            mov eax, dword ptr [esp+10h]
            call 00007FE5F0E896F7h
            add esp, 0Ch
            retn 000Ch
            lea esi, dword ptr [esi+00000000h]
            lea esi, dword ptr [esi+00h]
            nop
            sub esp, 1Ch
            mov eax, dword ptr [esp+20h]
            mov dword ptr [esp], 6D018000h
            mov dword ptr [esp+04h], eax
            call 00007FE5F0E9025Eh
            add esp, 1Ch
            ret
            nop
            nop
            nop
            nop
            nop
            push ebp
            mov ebp, esp
            push edi
            push esi
            push ebx
            sub esp, 1Ch
            mov dword ptr [esp], 6D015000h
            call dword ptr [6D01A170h]
            sub esp, 04h
            test eax, eax
            je 00007FE5F0E89915h
            mov ebx, eax
            mov dword ptr [esp], 6D015000h
            call dword ptr [6D01A198h]
            mov edi, dword ptr [6D01A178h]
            sub esp, 04h
            mov dword ptr [6D018010h], eax
            mov dword ptr [esp+04h], 6D015013h
            mov dword ptr [esp], ebx
            call edi
            sub esp, 08h
            mov esi, eax
            mov dword ptr [esp+04h], 6D015029h
            mov dword ptr [esp], ebx
            call edi
            sub esp, 08h
            mov dword ptr [6CFC9004h], eax
            test esi, esi
            je 00007FE5F0E898B3h
            mov dword ptr [esp+04h], 6D018014h
            mov dword ptr [esp], 6D016124h
            call esi
            mov dword ptr [eax+eax], 00000000h
            NameVirtual AddressVirtual Size Is in Section
            IMAGE_DIRECTORY_ENTRY_EXPORT0x590000xaa.edata
            IMAGE_DIRECTORY_ENTRY_IMPORT0x5a0000x6bc.idata
            IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
            IMAGE_DIRECTORY_ENTRY_BASERELOC0x5d0000x440.reloc
            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
            IMAGE_DIRECTORY_ENTRY_TLS0x5508c0x18.rdata
            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IAT0x5a1380xfc.idata
            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
            .text0x10000x74140x76007b0ba2fcfe5af863b8a244efed9daee3False0.5615068855932204data6.221679032999006IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            .data0x90000x4bc840x4be00c2d0f53aa616f3acbcdfa7422204216eFalse0.5452243358731467data6.566620498653716IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            .rdata0x550000x80c0xa00528975c1e588ce61a8d4929a68abb985False0.3359375data4.914761132868546IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .eh_fram0x560000x171c0x1800939f3d7920cb73aa42f05db7121f35b1False0.3489583333333333data4.806623669374318IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .bss0x580000xb300x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            .edata0x590000xaa0x2008f6553dc45cea0fe170cb488b61b82eeFalse0.265625data1.962743792527949IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .idata0x5a0000x6bc0x8005dc42cd4f08ec230e77ec216282edbccFalse0.38330078125data4.5785745189937455IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            .CRT0x5b0000x2c0x200d8422d6e25ecb2eb08bca8f681b56a0bFalse0.0546875data0.20153937813451883IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            .tls0x5c0000x80x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            .reloc0x5d0000x4400x6005562fa3d49c966c6955281f58b6f3fefFalse0.6412760416666666data5.234940914371754IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
            DLLImport
            KERNEL32.dllCloseHandle, ConvertThreadToFiber, CreateFiber, CreateFileA, CreateMailslotA, CreateThread, DeleteCriticalSection, DeleteFiber, EnterCriticalSection, FreeLibrary, GetCurrentProcess, GetCurrentThreadId, GetLastError, GetMailslotInfo, GetModuleHandleA, GetModuleHandleW, GetProcAddress, GetTickCount, HeapAlloc, HeapCreate, HeapReAlloc, InitializeCriticalSection, IsDBCSLeadByteEx, LeaveCriticalSection, LoadLibraryA, MultiByteToWideChar, ReadFile, Sleep, SleepEx, SwitchToFiber, TlsGetValue, VirtualProtect, VirtualQuery, WaitForSingleObject, WideCharToMultiByte, WriteFile
            msvcrt.dll__mb_cur_max, _amsg_exit, _errno, _initterm, _iob, _lock, _unlock, abort, atoi, calloc, fputc, free, fwrite, localeconv, malloc, memcpy, memset, realloc, setlocale, strchr, strerror, strlen, strncmp, vfprintf, wcslen
            NameOrdinalAddress
            DllGetClassObject10x6cfc1b56
            DllMain20x6cfc1b0b
            DllRegisterServer30x6cfc1b50
            DllUnregisterServer40x6cfc1b53
            StartW50x6cfc1b63
            TimestampProtocolSIDSignatureSeveritySource PortDest PortSource IPDest IP
            2024-08-28T07:10:22.534991+0200TCP2028765ET JA3 Hash - [Abuse.ch] Possible Dridex3497422003192.168.2.4154.82.113.115
            2024-08-28T07:10:28.243287+0200TCP2028765ET JA3 Hash - [Abuse.ch] Possible Dridex3497432003192.168.2.4154.82.113.115
            2024-08-28T07:09:32.344215+0200TCP2035651ET MALWARE Meterpreter or Other Reverse Shell SSL Cert1200349730154.82.113.115192.168.2.4
            2024-08-28T07:11:27.521168+0200TCP2028765ET JA3 Hash - [Abuse.ch] Possible Dridex3497542003192.168.2.4154.82.113.115
            2024-08-28T07:10:16.208107+0200TCP2028765ET JA3 Hash - [Abuse.ch] Possible Dridex3497412003192.168.2.4154.82.113.115
            2024-08-28T07:10:58.177119+0200TCP2028765ET JA3 Hash - [Abuse.ch] Possible Dridex3497492003192.168.2.4154.82.113.115
            2024-08-28T07:10:40.161221+0200TCP2028765ET JA3 Hash - [Abuse.ch] Possible Dridex3497462003192.168.2.4154.82.113.115
            2024-08-28T07:11:16.231106+0200TCP2028765ET JA3 Hash - [Abuse.ch] Possible Dridex3497522003192.168.2.4154.82.113.115
            2024-08-28T07:11:10.815329+0200TCP2028765ET JA3 Hash - [Abuse.ch] Possible Dridex3497512003192.168.2.4154.82.113.115
            2024-08-28T07:11:21.946675+0200TCP2028765ET JA3 Hash - [Abuse.ch] Possible Dridex3497532003192.168.2.4154.82.113.115
            2024-08-28T07:10:46.453380+0200TCP2028765ET JA3 Hash - [Abuse.ch] Possible Dridex3497472003192.168.2.4154.82.113.115
            2024-08-28T07:11:04.280237+0200TCP2028765ET JA3 Hash - [Abuse.ch] Possible Dridex3497502003192.168.2.4154.82.113.115
            2024-08-28T07:10:08.303721+0200TCP2028765ET JA3 Hash - [Abuse.ch] Possible Dridex3497392003192.168.2.4154.82.113.115
            2024-08-28T07:10:33.718106+0200TCP2028765ET JA3 Hash - [Abuse.ch] Possible Dridex3497442003192.168.2.4154.82.113.115
            2024-08-28T07:10:52.741600+0200TCP2028765ET JA3 Hash - [Abuse.ch] Possible Dridex3497482003192.168.2.4154.82.113.115
            2024-08-28T07:09:30.416134+0200TCP2028765ET JA3 Hash - [Abuse.ch] Possible Dridex3497302003192.168.2.4154.82.113.115
            2024-08-28T07:10:03.136520+0200TCP2028765ET JA3 Hash - [Abuse.ch] Possible Dridex3497382003192.168.2.4154.82.113.115
            TimestampSource PortDest PortSource IPDest IP
            Aug 28, 2024 07:09:29.552496910 CEST497302003192.168.2.4154.82.113.115
            Aug 28, 2024 07:09:29.557540894 CEST200349730154.82.113.115192.168.2.4
            Aug 28, 2024 07:09:29.557624102 CEST497302003192.168.2.4154.82.113.115
            Aug 28, 2024 07:09:29.566930056 CEST497302003192.168.2.4154.82.113.115
            Aug 28, 2024 07:09:29.571799040 CEST200349730154.82.113.115192.168.2.4
            Aug 28, 2024 07:09:30.415929079 CEST200349730154.82.113.115192.168.2.4
            Aug 28, 2024 07:09:30.416134119 CEST497302003192.168.2.4154.82.113.115
            Aug 28, 2024 07:09:30.679497957 CEST200349730154.82.113.115192.168.2.4
            Aug 28, 2024 07:09:30.679660082 CEST497302003192.168.2.4154.82.113.115
            Aug 28, 2024 07:09:32.339308023 CEST497302003192.168.2.4154.82.113.115
            Aug 28, 2024 07:09:32.344214916 CEST200349730154.82.113.115192.168.2.4
            Aug 28, 2024 07:09:32.640942097 CEST200349730154.82.113.115192.168.2.4
            Aug 28, 2024 07:09:32.641005993 CEST497302003192.168.2.4154.82.113.115
            Aug 28, 2024 07:09:32.950792074 CEST200349730154.82.113.115192.168.2.4
            Aug 28, 2024 07:09:32.950949907 CEST497302003192.168.2.4154.82.113.115
            Aug 28, 2024 07:09:32.955272913 CEST497302003192.168.2.4154.82.113.115
            Aug 28, 2024 07:09:32.962480068 CEST200349730154.82.113.115192.168.2.4
            Aug 28, 2024 07:09:33.260396957 CEST200349730154.82.113.115192.168.2.4
            Aug 28, 2024 07:09:33.260413885 CEST200349730154.82.113.115192.168.2.4
            Aug 28, 2024 07:09:33.260478973 CEST497302003192.168.2.4154.82.113.115
            Aug 28, 2024 07:09:33.261339903 CEST497302003192.168.2.4154.82.113.115
            Aug 28, 2024 07:09:33.266108036 CEST200349730154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:01.958992004 CEST497382003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:01.963778973 CEST200349738154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:01.963888884 CEST497382003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:01.964539051 CEST497382003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:01.964539051 CEST497382003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:01.969269037 CEST200349738154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:01.969393969 CEST200349738154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:03.136444092 CEST200349738154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:03.136496067 CEST200349738154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:03.136519909 CEST497382003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:03.136547089 CEST497382003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:03.136568069 CEST200349738154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:03.136604071 CEST497382003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:03.137042046 CEST497382003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:03.141779900 CEST200349738154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:03.199342966 CEST497382003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:03.204082966 CEST200349738154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:03.692744017 CEST200349738154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:03.692823887 CEST497382003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:03.692838907 CEST200349738154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:03.692878962 CEST497382003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:03.692991972 CEST497382003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:03.698405981 CEST200349738154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:07.423533916 CEST497392003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:07.428430080 CEST200349739154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:07.428500891 CEST497392003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:07.429438114 CEST497392003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:07.434252977 CEST200349739154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:08.303601980 CEST200349739154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:08.303720951 CEST497392003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:08.559834003 CEST200349739154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:08.559926033 CEST497392003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:08.560836077 CEST497392003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:08.564593077 CEST497392003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:08.565576077 CEST200349739154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:08.569331884 CEST200349739154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:10.116363049 CEST200349739154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:10.116378069 CEST200349739154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:10.116386890 CEST200349739154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:10.116441965 CEST497392003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:10.116476059 CEST497392003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:10.116574049 CEST200349739154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:10.116616964 CEST497392003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:10.116710901 CEST497392003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:10.117238998 CEST200349739154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:10.117302895 CEST497392003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:10.117908001 CEST200349739154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:10.117942095 CEST497392003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:10.121588945 CEST200349739154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:14.552598953 CEST497412003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:14.557573080 CEST200349741154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:14.557636023 CEST497412003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:14.557876110 CEST497412003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:14.562637091 CEST200349741154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:16.207902908 CEST200349741154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:16.208106995 CEST497412003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:16.208158970 CEST200349741154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:16.208205938 CEST497412003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:16.208683014 CEST200349741154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:16.208740950 CEST497412003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:16.208817005 CEST200349741154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:16.208856106 CEST497412003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:16.209034920 CEST497412003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:16.210259914 CEST497412003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:16.520242929 CEST497412003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:16.603624105 CEST200349741154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:16.603684902 CEST497412003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:16.604624033 CEST200349741154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:16.604633093 CEST200349741154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:16.604640961 CEST200349741154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:16.916984081 CEST200349741154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:16.917072058 CEST200349741154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:16.917078972 CEST497412003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:16.917114973 CEST200349741154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:16.917121887 CEST497412003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:16.917152882 CEST497412003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:16.917505026 CEST497412003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:16.922336102 CEST200349741154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:20.646409988 CEST497422003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:21.031791925 CEST200349742154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:21.031873941 CEST497422003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:21.034441948 CEST497422003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:21.039244890 CEST200349742154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:22.534687996 CEST200349742154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:22.534722090 CEST200349742154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:22.534734964 CEST200349742154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:22.534742117 CEST200349742154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:22.534991026 CEST497422003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:22.534991026 CEST497422003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:22.535372972 CEST497422003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:22.536791086 CEST497422003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:22.540074110 CEST200349742154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:22.540131092 CEST497422003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:22.540131092 CEST200349742154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:22.541672945 CEST200349742154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:23.088709116 CEST200349742154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:23.088736057 CEST200349742154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:23.088956118 CEST497422003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:23.088956118 CEST497422003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:23.093789101 CEST200349742154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:27.172983885 CEST497432003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:27.333549976 CEST200349743154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:27.333734035 CEST497432003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:27.334048033 CEST497432003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:27.338849068 CEST200349743154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:28.243228912 CEST200349743154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:28.243287086 CEST497432003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:28.510557890 CEST200349743154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:28.510870934 CEST497432003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:28.511223078 CEST497432003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:28.512475967 CEST497432003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:28.515958071 CEST200349743154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:28.517277956 CEST200349743154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:29.112097025 CEST200349743154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:29.112184048 CEST200349743154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:29.112220049 CEST497432003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:29.112364054 CEST497432003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:29.112365007 CEST497432003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:29.117305040 CEST200349743154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:32.820000887 CEST497442003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:32.824949026 CEST200349744154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:32.825009108 CEST497442003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:32.825274944 CEST497442003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:32.830708981 CEST200349744154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:33.718008995 CEST200349744154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:33.718106031 CEST497442003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:34.044672012 CEST200349744154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:34.044751883 CEST497442003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:34.045131922 CEST497442003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:34.046422005 CEST497442003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:34.051151037 CEST200349744154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:34.052891970 CEST200349744154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:34.626121044 CEST200349744154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:34.626133919 CEST200349744154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:34.626146078 CEST200349744154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:34.626189947 CEST497442003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:34.626219988 CEST497442003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:34.626354933 CEST497442003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:34.631268978 CEST200349744154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:39.240241051 CEST497462003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:39.245431900 CEST200349746154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:39.245520115 CEST497462003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:39.245860100 CEST497462003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:39.250688076 CEST200349746154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:40.161151886 CEST200349746154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:40.161221027 CEST497462003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:40.427700996 CEST200349746154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:40.427886963 CEST497462003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:40.428163052 CEST497462003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:40.432948112 CEST200349746154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:40.433528900 CEST497462003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:40.438546896 CEST200349746154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:41.017203093 CEST200349746154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:41.017219067 CEST200349746154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:41.017227888 CEST200349746154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:41.017394066 CEST497462003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:41.017496109 CEST497462003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:41.022242069 CEST200349746154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:45.505904913 CEST497472003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:45.511054039 CEST200349747154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:45.516330957 CEST497472003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:45.516556978 CEST497472003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:45.521364927 CEST200349747154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:46.453315973 CEST200349747154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:46.453380108 CEST497472003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:46.726427078 CEST200349747154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:46.726499081 CEST497472003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:46.726794004 CEST497472003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:46.728053093 CEST497472003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:46.731662989 CEST200349747154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:46.732808113 CEST200349747154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:47.303457975 CEST200349747154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:47.303486109 CEST200349747154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:47.303491116 CEST200349747154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:47.303769112 CEST497472003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:47.303880930 CEST497472003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:47.308656931 CEST200349747154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:51.412240982 CEST497482003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:51.879065037 CEST200349748154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:51.879163027 CEST497482003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:51.879477978 CEST497482003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:51.884300947 CEST200349748154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:52.741529942 CEST200349748154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:52.741600037 CEST497482003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:52.991293907 CEST200349748154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:52.991384983 CEST497482003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:52.991753101 CEST497482003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:52.993002892 CEST497482003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:52.996463060 CEST200349748154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:52.997752905 CEST200349748154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:53.783526897 CEST200349748154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:53.783550978 CEST200349748154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:53.783597946 CEST497482003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:53.783623934 CEST497482003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:53.783639908 CEST200349748154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:53.783680916 CEST497482003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:53.783771992 CEST497482003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:53.788522005 CEST200349748154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:57.287189007 CEST497492003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:57.292135954 CEST200349749154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:57.292207003 CEST497492003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:57.292623997 CEST497492003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:57.297693014 CEST200349749154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:58.177057028 CEST200349749154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:58.177119017 CEST497492003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:58.434926033 CEST200349749154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:58.434993029 CEST497492003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:58.435336113 CEST497492003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:58.436542034 CEST497492003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:58.440099001 CEST200349749154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:58.441312075 CEST200349749154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:58.997040987 CEST200349749154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:58.997104883 CEST497492003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:58.997195959 CEST497492003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:58.997257948 CEST200349749154.82.113.115192.168.2.4
            Aug 28, 2024 07:10:58.997298956 CEST497492003192.168.2.4154.82.113.115
            Aug 28, 2024 07:10:59.008179903 CEST200349749154.82.113.115192.168.2.4
            Aug 28, 2024 07:11:03.396634102 CEST497502003192.168.2.4154.82.113.115
            Aug 28, 2024 07:11:03.401597023 CEST200349750154.82.113.115192.168.2.4
            Aug 28, 2024 07:11:03.401683092 CEST497502003192.168.2.4154.82.113.115
            Aug 28, 2024 07:11:03.402002096 CEST497502003192.168.2.4154.82.113.115
            Aug 28, 2024 07:11:03.406740904 CEST200349750154.82.113.115192.168.2.4
            Aug 28, 2024 07:11:04.280163050 CEST200349750154.82.113.115192.168.2.4
            Aug 28, 2024 07:11:04.280236959 CEST497502003192.168.2.4154.82.113.115
            Aug 28, 2024 07:11:04.547662020 CEST200349750154.82.113.115192.168.2.4
            Aug 28, 2024 07:11:04.547730923 CEST497502003192.168.2.4154.82.113.115
            Aug 28, 2024 07:11:04.548013926 CEST497502003192.168.2.4154.82.113.115
            Aug 28, 2024 07:11:04.549177885 CEST497502003192.168.2.4154.82.113.115
            Aug 28, 2024 07:11:04.552782059 CEST200349750154.82.113.115192.168.2.4
            Aug 28, 2024 07:11:04.553971052 CEST200349750154.82.113.115192.168.2.4
            Aug 28, 2024 07:11:05.116439104 CEST200349750154.82.113.115192.168.2.4
            Aug 28, 2024 07:11:05.116518021 CEST497502003192.168.2.4154.82.113.115
            Aug 28, 2024 07:11:05.116820097 CEST200349750154.82.113.115192.168.2.4
            Aug 28, 2024 07:11:05.116837025 CEST200349750154.82.113.115192.168.2.4
            Aug 28, 2024 07:11:05.116871119 CEST497502003192.168.2.4154.82.113.115
            Aug 28, 2024 07:11:05.116899014 CEST497502003192.168.2.4154.82.113.115
            Aug 28, 2024 07:11:05.116966009 CEST497502003192.168.2.4154.82.113.115
            Aug 28, 2024 07:11:05.121700048 CEST200349750154.82.113.115192.168.2.4
            Aug 28, 2024 07:11:09.912731886 CEST497512003192.168.2.4154.82.113.115
            Aug 28, 2024 07:11:09.919423103 CEST200349751154.82.113.115192.168.2.4
            Aug 28, 2024 07:11:09.919559956 CEST497512003192.168.2.4154.82.113.115
            Aug 28, 2024 07:11:09.920243025 CEST497512003192.168.2.4154.82.113.115
            Aug 28, 2024 07:11:09.925558090 CEST200349751154.82.113.115192.168.2.4
            Aug 28, 2024 07:11:10.815268040 CEST200349751154.82.113.115192.168.2.4
            Aug 28, 2024 07:11:10.815329075 CEST497512003192.168.2.4154.82.113.115
            Aug 28, 2024 07:11:11.087714911 CEST200349751154.82.113.115192.168.2.4
            Aug 28, 2024 07:11:11.087846994 CEST497512003192.168.2.4154.82.113.115
            Aug 28, 2024 07:11:11.090090990 CEST497512003192.168.2.4154.82.113.115
            Aug 28, 2024 07:11:11.094959021 CEST200349751154.82.113.115192.168.2.4
            Aug 28, 2024 07:11:11.100217104 CEST497512003192.168.2.4154.82.113.115
            Aug 28, 2024 07:11:11.105067968 CEST200349751154.82.113.115192.168.2.4
            Aug 28, 2024 07:11:11.672967911 CEST200349751154.82.113.115192.168.2.4
            Aug 28, 2024 07:11:11.673068047 CEST497512003192.168.2.4154.82.113.115
            Aug 28, 2024 07:11:11.673161030 CEST200349751154.82.113.115192.168.2.4
            Aug 28, 2024 07:11:11.673229933 CEST497512003192.168.2.4154.82.113.115
            Aug 28, 2024 07:11:11.673348904 CEST497512003192.168.2.4154.82.113.115
            Aug 28, 2024 07:11:11.678124905 CEST200349751154.82.113.115192.168.2.4
            Aug 28, 2024 07:11:15.334232092 CEST497522003192.168.2.4154.82.113.115
            Aug 28, 2024 07:11:15.339215994 CEST200349752154.82.113.115192.168.2.4
            Aug 28, 2024 07:11:15.339303970 CEST497522003192.168.2.4154.82.113.115
            Aug 28, 2024 07:11:15.339905024 CEST497522003192.168.2.4154.82.113.115
            Aug 28, 2024 07:11:15.344686031 CEST200349752154.82.113.115192.168.2.4
            Aug 28, 2024 07:11:16.231000900 CEST200349752154.82.113.115192.168.2.4
            Aug 28, 2024 07:11:16.231106043 CEST497522003192.168.2.4154.82.113.115
            Aug 28, 2024 07:11:16.484085083 CEST200349752154.82.113.115192.168.2.4
            Aug 28, 2024 07:11:16.484177113 CEST497522003192.168.2.4154.82.113.115
            Aug 28, 2024 07:11:16.484497070 CEST497522003192.168.2.4154.82.113.115
            Aug 28, 2024 07:11:16.485647917 CEST497522003192.168.2.4154.82.113.115
            Aug 28, 2024 07:11:16.489237070 CEST200349752154.82.113.115192.168.2.4
            Aug 28, 2024 07:11:16.490474939 CEST200349752154.82.113.115192.168.2.4
            Aug 28, 2024 07:11:17.045351982 CEST200349752154.82.113.115192.168.2.4
            Aug 28, 2024 07:11:17.045450926 CEST497522003192.168.2.4154.82.113.115
            Aug 28, 2024 07:11:17.045463085 CEST200349752154.82.113.115192.168.2.4
            Aug 28, 2024 07:11:17.045500994 CEST497522003192.168.2.4154.82.113.115
            Aug 28, 2024 07:11:17.045542002 CEST497522003192.168.2.4154.82.113.115
            Aug 28, 2024 07:11:17.050589085 CEST200349752154.82.113.115192.168.2.4
            Aug 28, 2024 07:11:21.068504095 CEST497532003192.168.2.4154.82.113.115
            Aug 28, 2024 07:11:21.074434042 CEST200349753154.82.113.115192.168.2.4
            Aug 28, 2024 07:11:21.074517012 CEST497532003192.168.2.4154.82.113.115
            Aug 28, 2024 07:11:21.074817896 CEST497532003192.168.2.4154.82.113.115
            Aug 28, 2024 07:11:21.079579115 CEST200349753154.82.113.115192.168.2.4
            Aug 28, 2024 07:11:21.946587086 CEST200349753154.82.113.115192.168.2.4
            Aug 28, 2024 07:11:21.946675062 CEST497532003192.168.2.4154.82.113.115
            Aug 28, 2024 07:11:22.200846910 CEST200349753154.82.113.115192.168.2.4
            Aug 28, 2024 07:11:22.200921059 CEST497532003192.168.2.4154.82.113.115
            Aug 28, 2024 07:11:22.201266050 CEST497532003192.168.2.4154.82.113.115
            Aug 28, 2024 07:11:22.202500105 CEST497532003192.168.2.4154.82.113.115
            Aug 28, 2024 07:11:22.205995083 CEST200349753154.82.113.115192.168.2.4
            Aug 28, 2024 07:11:22.207256079 CEST200349753154.82.113.115192.168.2.4
            Aug 28, 2024 07:11:22.775135040 CEST200349753154.82.113.115192.168.2.4
            Aug 28, 2024 07:11:22.775154114 CEST200349753154.82.113.115192.168.2.4
            Aug 28, 2024 07:11:22.775218964 CEST497532003192.168.2.4154.82.113.115
            Aug 28, 2024 07:11:22.811084986 CEST497532003192.168.2.4154.82.113.115
            Aug 28, 2024 07:11:22.815872908 CEST200349753154.82.113.115192.168.2.4
            Aug 28, 2024 07:11:26.665013075 CEST497542003192.168.2.4154.82.113.115
            Aug 28, 2024 07:11:26.670118093 CEST200349754154.82.113.115192.168.2.4
            Aug 28, 2024 07:11:26.670208931 CEST497542003192.168.2.4154.82.113.115
            Aug 28, 2024 07:11:26.670849085 CEST497542003192.168.2.4154.82.113.115
            Aug 28, 2024 07:11:26.675625086 CEST200349754154.82.113.115192.168.2.4
            Aug 28, 2024 07:11:27.521167994 CEST497542003192.168.2.4154.82.113.115
            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
            Aug 28, 2024 07:09:30.767981052 CEST1.1.1.1192.168.2.40xf24No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
            Aug 28, 2024 07:09:30.767981052 CEST1.1.1.1192.168.2.40xf24No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
            Aug 28, 2024 07:10:36.942295074 CEST1.1.1.1192.168.2.40x4cbaNo error (0)edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com84.201.210.21A (IP address)IN (0x0001)false
            Aug 28, 2024 07:10:36.942295074 CEST1.1.1.1192.168.2.40x4cbaNo error (0)edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.57.37A (IP address)IN (0x0001)false
            Aug 28, 2024 07:10:36.942295074 CEST1.1.1.1192.168.2.40x4cbaNo error (0)edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.57.24A (IP address)IN (0x0001)false
            Aug 28, 2024 07:10:36.942295074 CEST1.1.1.1192.168.2.40x4cbaNo error (0)edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.57.19A (IP address)IN (0x0001)false
            Aug 28, 2024 07:10:36.942295074 CEST1.1.1.1192.168.2.40x4cbaNo error (0)edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.57.22A (IP address)IN (0x0001)false
            Aug 28, 2024 07:10:36.942295074 CEST1.1.1.1192.168.2.40x4cbaNo error (0)edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com84.201.210.35A (IP address)IN (0x0001)false
            Aug 28, 2024 07:10:36.942295074 CEST1.1.1.1192.168.2.40x4cbaNo error (0)edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.57.25A (IP address)IN (0x0001)false
            Aug 28, 2024 07:10:36.942295074 CEST1.1.1.1192.168.2.40x4cbaNo error (0)edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.57.41A (IP address)IN (0x0001)false

            Click to jump to process

            Click to jump to process

            Click to dive into process behavior distribution

            Click to jump to process

            Target ID:0
            Start time:01:09:17
            Start date:28/08/2024
            Path:C:\Windows\System32\loaddll32.exe
            Wow64 process (32bit):true
            Commandline:loaddll32.exe "C:\Users\user\Desktop\LX4CUQO8qI.dll"
            Imagebase:0x5b0000
            File size:126'464 bytes
            MD5 hash:51E6071F9CBA48E79F10C84515AAE618
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Yara matches:
            • Rule: Windows_Trojan_Metasploit_7bc0f998, Description: Identifies the API address lookup function leverage by metasploit shellcode, Source: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
            • Rule: Windows_Trojan_Metasploit_c9773203, Description: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., Source: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
            • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
            • Rule: JoeSecurity_CobaltStrike_2, Description: Yara detected CobaltStrike, Source: 00000000.00000003.1756940749.0000000001080000.00000040.00000020.00020000.00000000.sdmp, Author: Joe Security
            • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000000.00000003.1756940749.0000000001080000.00000040.00000020.00020000.00000000.sdmp, Author: Joe Security
            • Rule: Windows_Trojan_Metasploit_7bc0f998, Description: Identifies the API address lookup function leverage by metasploit shellcode, Source: 00000000.00000003.1756940749.0000000001080000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
            • Rule: Windows_Trojan_Metasploit_c9773203, Description: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., Source: 00000000.00000003.1756940749.0000000001080000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
            Reputation:high
            Has exited:true

            Target ID:1
            Start time:01:09:17
            Start date:28/08/2024
            Path:C:\Windows\System32\conhost.exe
            Wow64 process (32bit):false
            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Imagebase:0x7ff7699e0000
            File size:862'208 bytes
            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Target ID:2
            Start time:01:09:17
            Start date:28/08/2024
            Path:C:\Windows\SysWOW64\cmd.exe
            Wow64 process (32bit):true
            Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\LX4CUQO8qI.dll",#1
            Imagebase:0x240000
            File size:236'544 bytes
            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Target ID:3
            Start time:01:09:17
            Start date:28/08/2024
            Path:C:\Windows\SysWOW64\regsvr32.exe
            Wow64 process (32bit):true
            Commandline:regsvr32.exe /s C:\Users\user\Desktop\LX4CUQO8qI.dll
            Imagebase:0xe00000
            File size:20'992 bytes
            MD5 hash:878E47C8656E53AE8A8A21E927C6F7E0
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Target ID:4
            Start time:01:09:17
            Start date:28/08/2024
            Path:C:\Windows\SysWOW64\rundll32.exe
            Wow64 process (32bit):true
            Commandline:rundll32.exe "C:\Users\user\Desktop\LX4CUQO8qI.dll",#1
            Imagebase:0x3b0000
            File size:61'440 bytes
            MD5 hash:889B99C52A60DD49227C5E485A016679
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Target ID:5
            Start time:01:09:17
            Start date:28/08/2024
            Path:C:\Windows\SysWOW64\rundll32.exe
            Wow64 process (32bit):true
            Commandline:rundll32.exe C:\Users\user\Desktop\LX4CUQO8qI.dll,DllGetClassObject
            Imagebase:0x3b0000
            File size:61'440 bytes
            MD5 hash:889B99C52A60DD49227C5E485A016679
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Target ID:6
            Start time:01:09:20
            Start date:28/08/2024
            Path:C:\Windows\SysWOW64\rundll32.exe
            Wow64 process (32bit):true
            Commandline:rundll32.exe C:\Users\user\Desktop\LX4CUQO8qI.dll,DllMain
            Imagebase:0x3b0000
            File size:61'440 bytes
            MD5 hash:889B99C52A60DD49227C5E485A016679
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Target ID:7
            Start time:01:09:23
            Start date:28/08/2024
            Path:C:\Windows\SysWOW64\rundll32.exe
            Wow64 process (32bit):true
            Commandline:rundll32.exe C:\Users\user\Desktop\LX4CUQO8qI.dll,DllRegisterServer
            Imagebase:0x3b0000
            File size:61'440 bytes
            MD5 hash:889B99C52A60DD49227C5E485A016679
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Reset < >

              Execution Graph

              Execution Coverage:4.8%
              Dynamic/Decrypted Code Coverage:100%
              Signature Coverage:5.1%
              Total number of Nodes:2000
              Total number of Limit Nodes:18
              execution_graph 18614 978d0d 18615 978d1d 18614->18615 18616 978d18 18614->18616 18620 978c17 18615->18620 18632 9805a3 18616->18632 18619 978d2b 18621 978c23 __setmbcp 18620->18621 18622 978c70 18621->18622 18625 978cc0 __setmbcp 18621->18625 18636 978ae2 18621->18636 18622->18625 18687 96934f 18622->18687 18625->18619 18626 978ca0 18626->18625 18628 978ae2 __CRT_INIT@12 154 API calls 18626->18628 18628->18625 18629 96934f ___DllMainCRTStartup 641 API calls 18630 978c97 18629->18630 18631 978ae2 __CRT_INIT@12 154 API calls 18630->18631 18631->18626 18633 9805c8 18632->18633 18634 9805d5 GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 18632->18634 18633->18634 18635 9805cc 18633->18635 18634->18635 18635->18615 18637 978af1 18636->18637 18638 978b6d 18636->18638 18707 978dbb HeapCreate 18637->18707 18640 978ba4 18638->18640 18642 978b73 18638->18642 18641 978ba9 18640->18641 18643 978c02 18640->18643 18835 97bdcd TlsGetValue 18641->18835 18646 978b8e 18642->18646 18660 978afc 18642->18660 18832 97770a 18642->18832 18643->18660 18887 97c0e7 18643->18887 18651 97e942 __ioterm 68 API calls 18646->18651 18646->18660 18654 978b98 18651->18654 18653 978b08 __RTC_Initialize 18656 978b0c 18653->18656 18662 978b18 GetCommandLineA 18653->18662 18658 97be01 __mtterm 7 API calls 18654->18658 18784 978deb 18656->18784 18661 978b9d 18658->18661 18659 978bc6 18846 97bd52 TlsGetValue 18659->18846 18660->18622 18664 978deb __heap_term 4 API calls 18661->18664 18743 98046c 18662->18743 18664->18660 18669 978bf6 18874 976f24 18669->18874 18670 978bdf 18856 97be3e 18670->18856 18671 978b32 18674 978b36 18671->18674 18675 978b3d 18671->18675 18790 97be01 18674->18790 18796 9803b1 18675->18796 18676 978be6 GetCurrentThreadId 18676->18660 18677 978b5b 18677->18660 18681 978b56 18681->18677 18827 97e942 18681->18827 18688 96935f ___DllMainCRTStartup 18687->18688 18689 9693e9 18687->18689 18694 9693e6 18688->18694 18706 9693ce 18688->18706 19704 96c4f4 18688->19704 19788 96ae96 18689->19788 18691 9693f1 18691->18694 18694->18626 18694->18629 18695 969389 18696 9693d0 18695->18696 18697 969398 18695->18697 18695->18706 18700 9693d9 18696->18700 18696->18706 18698 9693a4 18697->18698 18699 9693b5 18697->18699 18702 9693ac HeapDestroy 18698->18702 18698->18706 19774 96beae 18699->19774 19780 96c482 18700->19780 18702->18706 18705 96beae ___DllMainCRTStartup 2 API calls 18705->18706 19711 96131c 18706->19711 18708 978af7 18707->18708 18708->18660 18709 97c155 GetModuleHandleW 18708->18709 18710 97c170 18709->18710 18711 97c169 18709->18711 18713 97c17a GetProcAddress GetProcAddress GetProcAddress GetProcAddress 18710->18713 18714 97c2d8 18710->18714 18898 97743e 18711->18898 18715 97c1c3 TlsAlloc 18713->18715 18716 97be01 __mtterm 7 API calls 18714->18716 18719 97c2dd 18715->18719 18720 97c211 TlsSetValue 18715->18720 18716->18719 18719->18653 18720->18719 18721 97c222 18720->18721 18902 977719 18721->18902 18726 97bcd7 __encode_pointer 6 API calls 18727 97c242 18726->18727 18728 97bcd7 __encode_pointer 6 API calls 18727->18728 18729 97c252 18728->18729 18730 97bcd7 __encode_pointer 6 API calls 18729->18730 18731 97c262 18730->18731 18919 978e5f 18731->18919 18734 97bd52 __decode_pointer 6 API calls 18735 97c283 18734->18735 18735->18714 18736 98004d __calloc_crt 67 API calls 18735->18736 18737 97c29c 18736->18737 18737->18714 18738 97bd52 __decode_pointer 6 API calls 18737->18738 18739 97c2b6 18738->18739 18739->18714 18740 97c2bd 18739->18740 18741 97be3e __initptd 67 API calls 18740->18741 18742 97c2c5 GetCurrentThreadId 18741->18742 18742->18719 18744 9804a9 18743->18744 18745 98048a GetEnvironmentStringsW 18743->18745 18747 980492 18744->18747 18748 980542 18744->18748 18746 98049e GetLastError 18745->18746 18745->18747 18746->18744 18749 9804d4 WideCharToMultiByte 18747->18749 18750 9804c5 GetEnvironmentStringsW 18747->18750 18751 98054b GetEnvironmentStrings 18748->18751 18753 978b28 18748->18753 18756 980508 18749->18756 18757 980537 FreeEnvironmentStringsW 18749->18757 18750->18749 18750->18753 18751->18753 18754 98055b 18751->18754 18769 97e6ee 18753->18769 18758 980008 __malloc_crt 67 API calls 18754->18758 18934 980008 18756->18934 18757->18753 18760 980575 18758->18760 18762 98057c FreeEnvironmentStringsA 18760->18762 18764 980588 _memcpy_s 18760->18764 18762->18753 18763 980516 WideCharToMultiByte 18765 980528 18763->18765 18766 980530 18763->18766 18767 980592 FreeEnvironmentStringsA 18764->18767 18768 976f24 ___endstdio 67 API calls 18765->18768 18766->18757 18767->18753 18768->18766 19181 979ad4 18769->19181 18771 97e6fa GetStartupInfoA 18772 98004d __calloc_crt 67 API calls 18771->18772 18780 97e71b 18772->18780 18773 97e939 __setmbcp 18773->18671 18774 97e8b6 GetStdHandle 18779 97e880 18774->18779 18775 98004d __calloc_crt 67 API calls 18775->18780 18776 97e91b SetHandleCount 18776->18773 18777 97e8c8 GetFileType 18777->18779 18778 97e803 18778->18773 18778->18779 18781 97e82c GetFileType 18778->18781 18783 97c9e6 ___lock_fhandle InitializeCriticalSectionAndSpinCount 18778->18783 18779->18773 18779->18774 18779->18776 18779->18777 18782 97c9e6 ___lock_fhandle InitializeCriticalSectionAndSpinCount 18779->18782 18780->18773 18780->18775 18780->18778 18780->18779 18781->18778 18782->18779 18783->18778 18785 978df4 18784->18785 18786 978e4b HeapDestroy 18784->18786 18787 978e39 HeapFree 18785->18787 18788 978e10 VirtualFree HeapFree 18785->18788 18786->18660 18787->18786 18788->18788 18789 978e38 18788->18789 18789->18787 18791 97be0b 18790->18791 18795 97be17 18790->18795 18794 97bd52 __decode_pointer 6 API calls 18791->18794 18792 97be2b TlsFree 18793 97be39 18792->18793 18793->18793 18794->18795 18795->18792 18795->18793 18797 9803cb GetModuleFileNameA 18796->18797 18798 9803c6 18796->18798 18800 9803f2 18797->18800 19182 97f74d 18798->19182 19186 980217 18800->19186 18802 978b42 18802->18681 18807 980139 18802->18807 18804 980008 __malloc_crt 67 API calls 18805 980434 18804->18805 18805->18802 18806 980217 _parse_cmdline 77 API calls 18805->18806 18806->18802 18808 980142 18807->18808 18811 980147 _strlen 18807->18811 18809 97f74d ___initmbctable 111 API calls 18808->18809 18809->18811 18810 978b4b 18810->18681 18821 97752d 18810->18821 18811->18810 18812 98004d __calloc_crt 67 API calls 18811->18812 18815 98017c _strlen 18812->18815 18813 9801da 18814 976f24 ___endstdio 67 API calls 18813->18814 18814->18810 18815->18810 18815->18813 18816 98004d __calloc_crt 67 API calls 18815->18816 18817 980200 18815->18817 18818 980ccb _strcpy_s 67 API calls 18815->18818 18820 97ad12 __invoke_watson 10 API calls 18815->18820 18816->18815 18819 976f24 ___endstdio 67 API calls 18817->18819 18818->18815 18819->18810 18820->18815 18822 97753b __IsNonwritableInCurrentImage 18821->18822 19492 97c46c 18822->19492 18824 977559 __initterm_e 18826 977578 __IsNonwritableInCurrentImage __initterm 18824->18826 19496 97c409 18824->19496 18826->18681 18829 97e94b 18827->18829 18828 978b6b 18828->18674 18829->18828 18830 97e95f DeleteCriticalSection 18829->18830 18831 976f24 ___endstdio 67 API calls 18829->18831 18830->18829 18831->18829 19596 9775b2 18832->19596 18834 977715 18834->18646 18836 97bde2 18835->18836 18837 978bae 18835->18837 18838 97bd52 __decode_pointer 6 API calls 18836->18838 18840 98004d 18837->18840 18839 97bded TlsSetValue 18838->18839 18839->18837 18842 980056 18840->18842 18843 978bba 18842->18843 18844 980074 Sleep 18842->18844 19619 98491c 18842->19619 18843->18659 18843->18660 18845 980089 18844->18845 18845->18842 18845->18843 18847 97bd8b GetModuleHandleW 18846->18847 18848 97bd6a 18846->18848 18850 97bda6 GetProcAddress 18847->18850 18851 97bd9b 18847->18851 18848->18847 18849 97bd74 TlsGetValue 18848->18849 18854 97bd7f 18849->18854 18853 978bd8 18850->18853 18852 97743e __crt_waiting_on_module_handle 2 API calls 18851->18852 18855 97bda1 18852->18855 18853->18669 18853->18670 18854->18847 18854->18853 18855->18850 18855->18853 19636 979ad4 18856->19636 18858 97be4a GetModuleHandleW 18859 97be60 18858->18859 18860 97be5a 18858->18860 18862 97be9c 18859->18862 18863 97be78 GetProcAddress GetProcAddress 18859->18863 18861 97743e __crt_waiting_on_module_handle 2 API calls 18860->18861 18861->18859 18864 978fdb __lock 63 API calls 18862->18864 18863->18862 18865 97bebb InterlockedIncrement 18864->18865 19637 97bf13 18865->19637 18868 978fdb __lock 63 API calls 18869 97bedc 18868->18869 18870 97f8b4 ___addlocaleref 8 API calls 18869->18870 18871 97befa 18870->18871 19640 97bf1c 18871->19640 18873 97bf07 __setmbcp 18873->18676 18876 976f30 __setmbcp 18874->18876 18875 976fa9 _realloc __setmbcp 18875->18677 18876->18875 18878 978fdb __lock 65 API calls 18876->18878 18886 976f6f 18876->18886 18877 976f84 HeapFree 18877->18875 18879 976f96 18877->18879 18883 976f47 ___sbh_find_block 18878->18883 18880 978d72 __wcsnicoll 65 API calls 18879->18880 18881 976f9b GetLastError 18880->18881 18881->18875 18882 976f61 19652 976f7a 18882->19652 18883->18882 19645 97903e 18883->19645 18886->18875 18886->18877 18888 97c0f5 18887->18888 18889 97c140 18887->18889 18892 97c0fb TlsGetValue 18888->18892 18893 97c11e 18888->18893 18890 97c153 18889->18890 18891 97c14a TlsSetValue 18889->18891 18890->18660 18891->18890 18892->18893 18894 97c10e TlsGetValue 18892->18894 18895 97bd52 __decode_pointer 6 API calls 18893->18895 18894->18893 18896 97c135 18895->18896 19660 97bfb8 18896->19660 18899 977449 Sleep GetModuleHandleW 18898->18899 18900 977467 18899->18900 18901 97746b 18899->18901 18900->18899 18900->18901 18901->18710 18923 97bd49 18902->18923 18904 977721 __init_pointers __initp_misc_winsig 18926 97c616 18904->18926 18907 97bcd7 __encode_pointer 6 API calls 18908 97775d 18907->18908 18909 97bcd7 TlsGetValue 18908->18909 18910 97bd10 GetModuleHandleW 18909->18910 18911 97bcef 18909->18911 18912 97bd20 18910->18912 18913 97bd2b GetProcAddress 18910->18913 18911->18910 18914 97bcf9 TlsGetValue 18911->18914 18915 97743e __crt_waiting_on_module_handle 2 API calls 18912->18915 18918 97bd08 18913->18918 18917 97bd04 18914->18917 18916 97bd26 18915->18916 18916->18913 18916->18918 18917->18910 18917->18918 18918->18726 18920 978e6a 18919->18920 18922 978e98 18920->18922 18929 97c9e6 18920->18929 18922->18714 18922->18734 18924 97bcd7 __encode_pointer 6 API calls 18923->18924 18925 97bd50 18924->18925 18925->18904 18927 97bcd7 __encode_pointer 6 API calls 18926->18927 18928 977753 18927->18928 18928->18907 18933 979ad4 18929->18933 18931 97c9f2 InitializeCriticalSectionAndSpinCount 18932 97ca36 __setmbcp 18931->18932 18932->18920 18933->18931 18936 980011 18934->18936 18937 980047 18936->18937 18938 980028 Sleep 18936->18938 18939 977001 18936->18939 18937->18757 18937->18763 18938->18936 18940 9770b4 18939->18940 18946 977013 18939->18946 18941 979eaf _realloc 6 API calls 18940->18941 18943 9770ba 18941->18943 18942 977024 18942->18946 18957 979e67 18942->18957 18966 979cbc 18942->18966 19000 9774c2 18942->19000 18945 978d72 __wcsnicoll 66 API calls 18943->18945 18947 9770ac 18945->18947 18946->18942 18946->18947 18950 977070 RtlAllocateHeap 18946->18950 18952 9770a0 18946->18952 18955 9770a5 18946->18955 19003 976fb2 18946->19003 19011 979eaf 18946->19011 18947->18936 18950->18946 19014 978d72 18952->19014 18956 978d72 __wcsnicoll 66 API calls 18955->18956 18956->18947 19017 980d33 18957->19017 18960 979e7b 18962 979cbc __NMSG_WRITE 67 API calls 18960->18962 18964 979e9d 18960->18964 18961 980d33 __set_error_mode 67 API calls 18961->18960 18963 979e93 18962->18963 18965 979cbc __NMSG_WRITE 67 API calls 18963->18965 18964->18942 18965->18964 18967 979cd0 18966->18967 18968 980d33 __set_error_mode 64 API calls 18967->18968 18999 979e2b 18967->18999 18969 979cf2 18968->18969 18970 979e30 GetStdHandle 18969->18970 18971 980d33 __set_error_mode 64 API calls 18969->18971 18974 979e3e _strlen 18970->18974 18970->18999 18973 979d03 18971->18973 18972 979d15 18972->18999 19026 980ccb 18972->19026 18973->18970 18973->18972 18975 979e57 WriteFile 18974->18975 18974->18999 18975->18999 18978 979d4b GetModuleFileNameA 18980 979d69 18978->18980 18985 979d8c _strlen 18978->18985 18982 980ccb _strcpy_s 64 API calls 18980->18982 18983 979d79 18982->18983 18983->18985 18986 97ad12 __invoke_watson 10 API calls 18983->18986 18984 979dcf 19051 980b0e 18984->19051 18985->18984 19042 980b82 18985->19042 18986->18985 18990 979df3 18993 980b0e _strcat_s 64 API calls 18990->18993 18992 97ad12 __invoke_watson 10 API calls 18992->18990 18994 979e07 18993->18994 18996 979e18 18994->18996 18997 97ad12 __invoke_watson 10 API calls 18994->18997 18995 97ad12 __invoke_watson 10 API calls 18995->18984 19060 9809a5 18996->19060 18997->18996 18999->18942 19098 977497 GetModuleHandleW 19000->19098 19004 976fbe __setmbcp 19003->19004 19006 976fef __setmbcp 19004->19006 19101 978fdb 19004->19101 19006->18946 19007 976fd4 19108 9797ed 19007->19108 19012 97bd52 __decode_pointer 6 API calls 19011->19012 19013 979ebf 19012->19013 19013->18946 19166 97bf25 GetLastError 19014->19166 19016 978d77 19016->18955 19018 980d42 19017->19018 19019 979e6e 19018->19019 19020 978d72 __wcsnicoll 67 API calls 19018->19020 19019->18960 19019->18961 19021 980d65 19020->19021 19023 97ae3a 19021->19023 19024 97bd52 __decode_pointer 6 API calls 19023->19024 19025 97ae4a __invoke_watson 19024->19025 19027 980cdc 19026->19027 19028 980ce3 19026->19028 19027->19028 19033 980d09 19027->19033 19029 978d72 __wcsnicoll 67 API calls 19028->19029 19030 980ce8 19029->19030 19031 97ae3a __wcsnicoll 6 API calls 19030->19031 19032 979d37 19031->19032 19032->18978 19035 97ad12 19032->19035 19033->19032 19034 978d72 __wcsnicoll 67 API calls 19033->19034 19034->19030 19087 97ed20 19035->19087 19037 97ad3f IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 19038 97ae1b GetCurrentProcess TerminateProcess 19037->19038 19040 97ae0f __invoke_watson 19037->19040 19089 97eb2e 19038->19089 19040->19038 19041 979d48 19041->18978 19046 980b94 19042->19046 19043 980b98 19044 978d72 __wcsnicoll 67 API calls 19043->19044 19045 979dbc 19043->19045 19050 980bb4 19044->19050 19045->18984 19045->18995 19046->19043 19046->19045 19048 980bde 19046->19048 19047 97ae3a __wcsnicoll 6 API calls 19047->19045 19048->19045 19049 978d72 __wcsnicoll 67 API calls 19048->19049 19049->19050 19050->19047 19052 980b26 19051->19052 19055 980b1f 19051->19055 19053 978d72 __wcsnicoll 67 API calls 19052->19053 19054 980b2b 19053->19054 19056 97ae3a __wcsnicoll 6 API calls 19054->19056 19055->19052 19057 980b5a 19055->19057 19058 979de2 19056->19058 19057->19058 19059 978d72 __wcsnicoll 67 API calls 19057->19059 19058->18990 19058->18992 19059->19054 19061 97bd49 _raise 6 API calls 19060->19061 19062 9809b5 19061->19062 19063 9809c8 LoadLibraryA 19062->19063 19064 980a50 19062->19064 19065 9809dd GetProcAddress 19063->19065 19066 980af2 19063->19066 19069 97bd52 __decode_pointer 6 API calls 19064->19069 19079 980a7a 19064->19079 19065->19066 19067 9809f3 19065->19067 19066->18999 19070 97bcd7 __encode_pointer 6 API calls 19067->19070 19068 980aa5 19071 97bd52 __decode_pointer 6 API calls 19068->19071 19073 980a6d 19069->19073 19074 9809f9 GetProcAddress 19070->19074 19071->19066 19072 97bd52 __decode_pointer 6 API calls 19081 980abd 19072->19081 19075 97bd52 __decode_pointer 6 API calls 19073->19075 19076 97bcd7 __encode_pointer 6 API calls 19074->19076 19075->19079 19077 980a0e GetProcAddress 19076->19077 19078 97bcd7 __encode_pointer 6 API calls 19077->19078 19080 980a23 GetProcAddress 19078->19080 19079->19068 19079->19072 19082 97bcd7 __encode_pointer 6 API calls 19080->19082 19081->19068 19083 97bd52 __decode_pointer 6 API calls 19081->19083 19084 980a38 19082->19084 19083->19068 19084->19064 19085 980a42 GetProcAddress 19084->19085 19086 97bcd7 __encode_pointer 6 API calls 19085->19086 19086->19064 19088 97ed2c __VEC_memzero 19087->19088 19088->19037 19090 97eb36 19089->19090 19091 97eb38 IsDebuggerPresent 19089->19091 19090->19041 19097 981065 19091->19097 19094 9829bf SetUnhandledExceptionFilter UnhandledExceptionFilter 19095 9829dc __invoke_watson 19094->19095 19096 9829e4 GetCurrentProcess TerminateProcess 19094->19096 19095->19096 19096->19041 19097->19094 19099 9774bb ExitProcess 19098->19099 19100 9774ab GetProcAddress 19098->19100 19100->19099 19102 979003 EnterCriticalSection 19101->19102 19103 978ff0 19101->19103 19102->19007 19117 978f18 19103->19117 19105 978ff6 19105->19102 19143 97746e 19105->19143 19111 97981b 19108->19111 19109 9798b4 19112 976fdf 19109->19112 19161 979404 19109->19161 19111->19109 19111->19112 19154 979354 19111->19154 19114 976ff8 19112->19114 19165 978f01 LeaveCriticalSection 19114->19165 19116 976fff 19116->19006 19118 978f24 __setmbcp 19117->19118 19119 979e67 __FF_MSGBANNER 67 API calls 19118->19119 19131 978f4a 19118->19131 19121 978f39 19119->19121 19120 980008 __malloc_crt 67 API calls 19123 978f65 19120->19123 19122 979cbc __NMSG_WRITE 67 API calls 19121->19122 19125 978f40 19122->19125 19126 978f6c 19123->19126 19127 978f7b 19123->19127 19124 978f5a __setmbcp 19124->19105 19128 9774c2 _doexit 3 API calls 19125->19128 19129 978d72 __wcsnicoll 67 API calls 19126->19129 19130 978fdb __lock 67 API calls 19127->19130 19128->19131 19129->19124 19132 978f82 19130->19132 19131->19120 19131->19124 19133 978fb6 19132->19133 19134 978f8a 19132->19134 19136 976f24 ___endstdio 67 API calls 19133->19136 19135 97c9e6 ___lock_fhandle InitializeCriticalSectionAndSpinCount 19134->19135 19137 978f95 19135->19137 19138 978fa7 19136->19138 19137->19138 19139 976f24 ___endstdio 67 API calls 19137->19139 19150 978fd2 19138->19150 19141 978fa1 19139->19141 19142 978d72 __wcsnicoll 67 API calls 19141->19142 19142->19138 19144 979e67 __FF_MSGBANNER 67 API calls 19143->19144 19145 977478 19144->19145 19146 979cbc __NMSG_WRITE 67 API calls 19145->19146 19147 977480 19146->19147 19148 97bd52 __decode_pointer 6 API calls 19147->19148 19149 97748b 19148->19149 19149->19102 19153 978f01 LeaveCriticalSection 19150->19153 19152 978fd9 19152->19124 19153->19152 19155 979367 HeapReAlloc 19154->19155 19156 97939b HeapAlloc 19154->19156 19157 979385 19155->19157 19158 979389 19155->19158 19156->19157 19159 9793be VirtualAlloc 19156->19159 19157->19109 19158->19156 19159->19157 19160 9793d8 HeapFree 19159->19160 19160->19157 19162 97941b VirtualAlloc 19161->19162 19164 979462 19162->19164 19164->19112 19165->19116 19167 97bdcd ___set_flsgetvalue 8 API calls 19166->19167 19168 97bf3c 19167->19168 19169 97bf92 SetLastError 19168->19169 19170 98004d __calloc_crt 64 API calls 19168->19170 19169->19016 19171 97bf50 19170->19171 19171->19169 19172 97bf58 19171->19172 19173 97bd52 __decode_pointer 6 API calls 19172->19173 19174 97bf6a 19173->19174 19175 97bf71 19174->19175 19176 97bf89 19174->19176 19177 97be3e __initptd 64 API calls 19175->19177 19178 976f24 ___endstdio 64 API calls 19176->19178 19179 97bf79 GetCurrentThreadId 19177->19179 19180 97bf8f 19178->19180 19179->19169 19180->19169 19181->18771 19183 97f756 19182->19183 19184 97f75d 19182->19184 19192 97f5b3 19183->19192 19184->18797 19188 980236 19186->19188 19190 9802a3 19188->19190 19486 984b08 19188->19486 19189 9803a1 19189->18802 19189->18804 19190->19189 19191 984b08 77 API calls _parse_cmdline 19190->19191 19191->19190 19193 97f5bf __setmbcp 19192->19193 19223 97bf9e 19193->19223 19197 97f5d2 19244 97f352 19197->19244 19200 980008 __malloc_crt 67 API calls 19201 97f5f3 19200->19201 19202 97f712 __setmbcp 19201->19202 19251 97f3ce 19201->19251 19202->19184 19205 97f623 InterlockedDecrement 19207 97f644 InterlockedIncrement 19205->19207 19208 97f633 19205->19208 19206 97f71f 19206->19202 19210 97f732 19206->19210 19212 976f24 ___endstdio 67 API calls 19206->19212 19207->19202 19209 97f65a 19207->19209 19208->19207 19211 976f24 ___endstdio 67 API calls 19208->19211 19209->19202 19215 978fdb __lock 67 API calls 19209->19215 19213 978d72 __wcsnicoll 67 API calls 19210->19213 19214 97f643 19211->19214 19212->19210 19213->19202 19214->19207 19217 97f66e InterlockedDecrement 19215->19217 19218 97f6fd InterlockedIncrement 19217->19218 19219 97f6ea 19217->19219 19261 97f714 19218->19261 19219->19218 19221 976f24 ___endstdio 67 API calls 19219->19221 19222 97f6fc 19221->19222 19222->19218 19224 97bf25 __getptd_noexit 67 API calls 19223->19224 19225 97bfa6 19224->19225 19226 97bfb3 19225->19226 19227 97746e __amsg_exit 67 API calls 19225->19227 19228 97f2ae 19226->19228 19227->19226 19229 97f2ba __setmbcp 19228->19229 19230 97bf9e __getptd 67 API calls 19229->19230 19231 97f2bf 19230->19231 19232 978fdb __lock 67 API calls 19231->19232 19233 97f2d1 19231->19233 19234 97f2ef 19232->19234 19236 97f2df __setmbcp 19233->19236 19240 97746e __amsg_exit 67 API calls 19233->19240 19235 97f338 19234->19235 19237 97f306 InterlockedDecrement 19234->19237 19238 97f320 InterlockedIncrement 19234->19238 19264 97f349 19235->19264 19236->19197 19237->19238 19241 97f311 19237->19241 19238->19235 19240->19236 19241->19238 19242 976f24 ___endstdio 67 API calls 19241->19242 19243 97f31f 19242->19243 19243->19238 19268 9785ed 19244->19268 19247 97f371 GetOEMCP 19250 97f381 19247->19250 19248 97f38f 19249 97f394 GetACP 19248->19249 19248->19250 19249->19250 19250->19200 19250->19202 19252 97f352 getSystemCP 79 API calls 19251->19252 19254 97f3ee 19252->19254 19253 97f3f9 setSBCS 19255 97eb2e __invoke_watson 5 API calls 19253->19255 19254->19253 19256 97f43d IsValidCodePage 19254->19256 19260 97f462 _memset __setmbcp_nolock 19254->19260 19257 97f5b1 19255->19257 19256->19253 19258 97f44f GetCPInfo 19256->19258 19257->19205 19257->19206 19258->19253 19258->19260 19359 97f11b GetCPInfo 19260->19359 19485 978f01 LeaveCriticalSection 19261->19485 19263 97f71b 19263->19202 19267 978f01 LeaveCriticalSection 19264->19267 19266 97f350 19266->19233 19267->19266 19269 978600 19268->19269 19275 97864d 19268->19275 19270 97bf9e __getptd 67 API calls 19269->19270 19271 978605 19270->19271 19272 97862d 19271->19272 19276 97fa1a 19271->19276 19274 97f2ae __setmbcp 69 API calls 19272->19274 19272->19275 19274->19275 19275->19247 19275->19248 19277 97fa26 __setmbcp 19276->19277 19278 97bf9e __getptd 67 API calls 19277->19278 19279 97fa2b 19278->19279 19280 97fa59 19279->19280 19282 97fa3d 19279->19282 19281 978fdb __lock 67 API calls 19280->19281 19283 97fa60 19281->19283 19284 97bf9e __getptd 67 API calls 19282->19284 19291 97f9dc 19283->19291 19288 97fa42 19284->19288 19287 97fa50 __setmbcp 19287->19272 19288->19287 19290 97746e __amsg_exit 67 API calls 19288->19290 19290->19287 19292 97f9e0 19291->19292 19298 97fa12 19291->19298 19292->19298 19302 97f8b4 InterlockedIncrement 19292->19302 19294 97f9f3 19294->19298 19314 97f943 19294->19314 19299 97fa84 19298->19299 19358 978f01 LeaveCriticalSection 19299->19358 19301 97fa8b 19301->19288 19303 97f8d5 19302->19303 19304 97f8d2 InterlockedIncrement 19302->19304 19305 97f8e2 19303->19305 19306 97f8df InterlockedIncrement 19303->19306 19304->19303 19307 97f8ef 19305->19307 19308 97f8ec InterlockedIncrement 19305->19308 19306->19305 19309 97f8f9 InterlockedIncrement 19307->19309 19310 97f8fc 19307->19310 19308->19307 19309->19310 19311 97f915 InterlockedIncrement 19310->19311 19312 97f925 InterlockedIncrement 19310->19312 19313 97f930 InterlockedIncrement 19310->19313 19311->19310 19312->19310 19313->19294 19315 97f9d7 19314->19315 19316 97f954 InterlockedDecrement 19314->19316 19315->19298 19328 97f76b 19315->19328 19317 97f96c 19316->19317 19318 97f969 InterlockedDecrement 19316->19318 19319 97f976 InterlockedDecrement 19317->19319 19320 97f979 19317->19320 19318->19317 19319->19320 19321 97f986 19320->19321 19322 97f983 InterlockedDecrement 19320->19322 19323 97f990 InterlockedDecrement 19321->19323 19325 97f993 19321->19325 19322->19321 19323->19325 19324 97f9ac InterlockedDecrement 19324->19325 19325->19324 19326 97f9bc InterlockedDecrement 19325->19326 19327 97f9c7 InterlockedDecrement 19325->19327 19326->19325 19327->19315 19329 97f7ef 19328->19329 19331 97f782 19328->19331 19330 976f24 ___endstdio 67 API calls 19329->19330 19332 97f83c 19329->19332 19333 97f810 19330->19333 19331->19329 19338 97f7b6 19331->19338 19341 976f24 ___endstdio 67 API calls 19331->19341 19334 982cda ___free_lc_time 67 API calls 19332->19334 19348 97f863 19332->19348 19335 976f24 ___endstdio 67 API calls 19333->19335 19336 97f85c 19334->19336 19337 97f823 19335->19337 19342 976f24 ___endstdio 67 API calls 19336->19342 19343 976f24 ___endstdio 67 API calls 19337->19343 19344 976f24 ___endstdio 67 API calls 19338->19344 19357 97f7d7 19338->19357 19339 976f24 ___endstdio 67 API calls 19345 97f7e4 19339->19345 19340 97f8a8 19346 976f24 ___endstdio 67 API calls 19340->19346 19347 97f7ab 19341->19347 19342->19348 19349 97f831 19343->19349 19350 97f7cc 19344->19350 19352 976f24 ___endstdio 67 API calls 19345->19352 19353 97f8ae 19346->19353 19354 982eb4 ___free_lconv_mon 67 API calls 19347->19354 19348->19340 19351 976f24 67 API calls ___endstdio 19348->19351 19355 976f24 ___endstdio 67 API calls 19349->19355 19356 982e6f ___free_lconv_num 67 API calls 19350->19356 19351->19348 19352->19329 19353->19298 19354->19338 19355->19332 19356->19357 19357->19339 19358->19301 19362 97f14f _memset 19359->19362 19368 97f201 19359->19368 19369 982c98 19362->19369 19364 97eb2e __invoke_watson 5 API calls 19366 97f2ac 19364->19366 19366->19260 19367 97fe55 ___crtLCMapStringA 102 API calls 19367->19368 19368->19364 19370 9785ed _LocaleUpdate::_LocaleUpdate 77 API calls 19369->19370 19371 982cab 19370->19371 19379 982ade 19371->19379 19374 97fe55 19375 9785ed _LocaleUpdate::_LocaleUpdate 77 API calls 19374->19375 19376 97fe68 19375->19376 19438 97fab0 19376->19438 19380 982b2a 19379->19380 19381 982aff GetStringTypeW 19379->19381 19383 982b17 19380->19383 19384 982c11 19380->19384 19382 982b1f GetLastError 19381->19382 19381->19383 19382->19380 19385 982b63 MultiByteToWideChar 19383->19385 19402 982c0b 19383->19402 19407 9846f0 GetLocaleInfoA 19384->19407 19390 982b90 19385->19390 19385->19402 19387 97eb2e __invoke_watson 5 API calls 19389 97f1bc 19387->19389 19389->19374 19394 982ba5 _memset __crtGetStringTypeA_stat 19390->19394 19395 977001 _malloc 67 API calls 19390->19395 19391 982c62 GetStringTypeA 19393 982c7d 19391->19393 19391->19402 19392 982bde MultiByteToWideChar 19398 982bf4 GetStringTypeW 19392->19398 19399 982c05 19392->19399 19400 976f24 ___endstdio 67 API calls 19393->19400 19394->19392 19394->19402 19395->19394 19398->19399 19403 97fa90 19399->19403 19400->19402 19402->19387 19404 97fa9c 19403->19404 19406 97faad 19403->19406 19405 976f24 ___endstdio 67 API calls 19404->19405 19404->19406 19405->19406 19406->19402 19408 98471e 19407->19408 19409 984723 19407->19409 19411 97eb2e __invoke_watson 5 API calls 19408->19411 19410 9773e9 ___ansicp 90 API calls 19409->19410 19410->19408 19412 982c35 19411->19412 19412->19391 19412->19402 19413 984739 19412->19413 19414 984803 19413->19414 19415 984779 GetCPInfo 19413->19415 19418 97eb2e __invoke_watson 5 API calls 19414->19418 19416 9847ee MultiByteToWideChar 19415->19416 19417 984790 19415->19417 19416->19414 19422 9847a9 _strlen 19416->19422 19417->19416 19419 984796 GetCPInfo 19417->19419 19420 982c56 19418->19420 19419->19416 19421 9847a3 19419->19421 19420->19391 19420->19402 19421->19416 19421->19422 19423 977001 _malloc 67 API calls 19422->19423 19426 9847db _memset __crtGetStringTypeA_stat 19422->19426 19423->19426 19424 984838 MultiByteToWideChar 19425 984850 19424->19425 19437 98486f 19424->19437 19428 984874 19425->19428 19429 984857 WideCharToMultiByte 19425->19429 19426->19414 19426->19424 19427 97fa90 __freea 67 API calls 19427->19414 19430 98487f WideCharToMultiByte 19428->19430 19431 984893 19428->19431 19429->19437 19430->19431 19430->19437 19432 98004d __calloc_crt 67 API calls 19431->19432 19433 98489b 19432->19433 19434 9848a4 WideCharToMultiByte 19433->19434 19433->19437 19435 9848b6 19434->19435 19434->19437 19436 976f24 ___endstdio 67 API calls 19435->19436 19436->19437 19437->19427 19439 97fad1 LCMapStringW 19438->19439 19442 97faec 19438->19442 19440 97faf4 GetLastError 19439->19440 19439->19442 19440->19442 19441 97fcea 19445 9846f0 ___ansicp 91 API calls 19441->19445 19442->19441 19443 97fb46 19442->19443 19444 97fb5f MultiByteToWideChar 19443->19444 19466 97fce1 19443->19466 19453 97fb8c 19444->19453 19444->19466 19447 97fd12 19445->19447 19446 97eb2e __invoke_watson 5 API calls 19448 97f1dc 19446->19448 19449 97fe06 LCMapStringA 19447->19449 19450 97fd2b 19447->19450 19447->19466 19448->19367 19463 97fd62 19449->19463 19451 984739 ___convertcp 74 API calls 19450->19451 19455 97fd3d 19451->19455 19452 97fbdd MultiByteToWideChar 19456 97fbf6 LCMapStringW 19452->19456 19480 97fcd8 19452->19480 19454 977001 _malloc 67 API calls 19453->19454 19458 97fba5 __crtGetStringTypeA_stat 19453->19458 19454->19458 19459 97fd47 LCMapStringA 19455->19459 19455->19466 19461 97fc17 19456->19461 19456->19480 19457 976f24 ___endstdio 67 API calls 19462 97fe2d 19457->19462 19458->19452 19458->19466 19459->19463 19469 97fd69 19459->19469 19460 97fa90 __freea 67 API calls 19460->19466 19464 97fc20 19461->19464 19468 97fc49 19461->19468 19465 976f24 ___endstdio 67 API calls 19462->19465 19462->19466 19463->19457 19463->19462 19467 97fc32 LCMapStringW 19464->19467 19464->19480 19465->19466 19466->19446 19467->19480 19471 97fc64 __crtGetStringTypeA_stat 19468->19471 19473 977001 _malloc 67 API calls 19468->19473 19472 97fd7a _memset __crtGetStringTypeA_stat 19469->19472 19474 977001 _malloc 67 API calls 19469->19474 19470 97fc98 LCMapStringW 19475 97fcd2 19470->19475 19476 97fcb0 WideCharToMultiByte 19470->19476 19471->19470 19471->19480 19472->19463 19478 97fdb8 LCMapStringA 19472->19478 19473->19471 19474->19472 19477 97fa90 __freea 67 API calls 19475->19477 19476->19475 19477->19480 19481 97fdd4 19478->19481 19482 97fdd8 19478->19482 19480->19460 19484 97fa90 __freea 67 API calls 19481->19484 19483 984739 ___convertcp 74 API calls 19482->19483 19483->19481 19484->19463 19485->19263 19489 984ab5 19486->19489 19490 9785ed _LocaleUpdate::_LocaleUpdate 77 API calls 19489->19490 19491 984ac8 19490->19491 19491->19188 19493 97c472 19492->19493 19494 97bcd7 __encode_pointer 6 API calls 19493->19494 19495 97c48a 19493->19495 19494->19493 19495->18824 19499 97c3cd 19496->19499 19498 97c416 19498->18826 19500 97c3d9 __setmbcp 19499->19500 19507 9774da 19500->19507 19506 97c3fa __setmbcp 19506->19498 19508 978fdb __lock 67 API calls 19507->19508 19509 9774e1 19508->19509 19510 97c2e2 19509->19510 19511 97bd52 __decode_pointer 6 API calls 19510->19511 19512 97c2f6 19511->19512 19513 97bd52 __decode_pointer 6 API calls 19512->19513 19515 97c306 19513->19515 19514 97c389 19527 97c403 19514->19527 19515->19514 19530 9810a4 19515->19530 19517 97c370 19518 97bcd7 __encode_pointer 6 API calls 19517->19518 19519 97c37e 19518->19519 19522 97bcd7 __encode_pointer 6 API calls 19519->19522 19520 97c324 19520->19517 19521 97c348 19520->19521 19543 980099 19520->19543 19521->19514 19524 980099 __realloc_crt 73 API calls 19521->19524 19525 97c35e 19521->19525 19522->19514 19524->19525 19525->19514 19526 97bcd7 __encode_pointer 6 API calls 19525->19526 19526->19517 19592 9774e3 19527->19592 19531 9810b0 __setmbcp 19530->19531 19532 9810dd 19531->19532 19533 9810c0 19531->19533 19535 98111e HeapSize 19532->19535 19537 978fdb __lock 67 API calls 19532->19537 19534 978d72 __wcsnicoll 67 API calls 19533->19534 19536 9810c5 19534->19536 19540 9810d5 __setmbcp 19535->19540 19538 97ae3a __wcsnicoll 6 API calls 19536->19538 19539 9810ed ___sbh_find_block 19537->19539 19538->19540 19548 98113e 19539->19548 19540->19520 19546 9800a2 19543->19546 19545 9800e1 19545->19521 19546->19545 19547 9800c2 Sleep 19546->19547 19552 9788c7 19546->19552 19547->19546 19551 978f01 LeaveCriticalSection 19548->19551 19550 981119 19550->19535 19550->19540 19551->19550 19553 9788d3 __setmbcp 19552->19553 19554 9788da 19553->19554 19555 9788e8 19553->19555 19556 977001 _malloc 67 API calls 19554->19556 19557 9788ef 19555->19557 19558 9788fb 19555->19558 19573 9788e2 _realloc __setmbcp 19556->19573 19559 976f24 ___endstdio 67 API calls 19557->19559 19565 978a6d 19558->19565 19586 978908 _memcpy_s ___sbh_resize_block ___sbh_find_block 19558->19586 19559->19573 19560 978aa0 19561 979eaf _realloc 6 API calls 19560->19561 19564 978aa6 19561->19564 19562 978fdb __lock 67 API calls 19562->19586 19563 978a72 HeapReAlloc 19563->19565 19563->19573 19566 978d72 __wcsnicoll 67 API calls 19564->19566 19565->19560 19565->19563 19567 978ac4 19565->19567 19568 979eaf _realloc 6 API calls 19565->19568 19571 978aba 19565->19571 19566->19573 19569 978d72 __wcsnicoll 67 API calls 19567->19569 19567->19573 19568->19565 19570 978acd GetLastError 19569->19570 19570->19573 19574 978d72 __wcsnicoll 67 API calls 19571->19574 19573->19546 19576 978a3b 19574->19576 19575 978993 HeapAlloc 19575->19586 19576->19573 19578 978a40 GetLastError 19576->19578 19577 9789e8 HeapReAlloc 19577->19586 19578->19573 19579 9797ed ___sbh_alloc_block 5 API calls 19579->19586 19580 978a53 19580->19573 19582 978d72 __wcsnicoll 67 API calls 19580->19582 19581 979eaf _realloc 6 API calls 19581->19586 19583 978a60 19582->19583 19583->19570 19583->19573 19584 978a36 19585 978d72 __wcsnicoll 67 API calls 19584->19585 19585->19576 19586->19560 19586->19562 19586->19573 19586->19575 19586->19577 19586->19579 19586->19580 19586->19581 19586->19584 19587 97903e VirtualFree VirtualFree HeapFree __VEC_memcpy ___sbh_free_block 19586->19587 19588 978a0b 19586->19588 19587->19586 19591 978f01 LeaveCriticalSection 19588->19591 19590 978a12 19590->19586 19591->19590 19595 978f01 LeaveCriticalSection 19592->19595 19594 9774ea 19594->19506 19595->19594 19597 9775be __setmbcp 19596->19597 19598 978fdb __lock 67 API calls 19597->19598 19599 9775c5 19598->19599 19602 97bd52 __decode_pointer 6 API calls 19599->19602 19606 97767e __initterm 19599->19606 19604 9775fc 19602->19604 19603 9776c6 __setmbcp 19603->18834 19604->19606 19608 97bd52 __decode_pointer 6 API calls 19604->19608 19613 9776c9 19606->19613 19607 9776bd 19609 9774c2 _doexit 3 API calls 19607->19609 19612 977611 19608->19612 19609->19603 19610 97bd52 6 API calls __decode_pointer 19610->19612 19611 97bd49 6 API calls _raise 19611->19612 19612->19606 19612->19610 19612->19611 19614 9776aa 19613->19614 19615 9776cf 19613->19615 19614->19603 19617 978f01 LeaveCriticalSection 19614->19617 19618 978f01 LeaveCriticalSection 19615->19618 19617->19607 19618->19614 19620 984928 __setmbcp 19619->19620 19621 984940 19620->19621 19629 98495f _memset 19620->19629 19622 978d72 __wcsnicoll 66 API calls 19621->19622 19623 984945 19622->19623 19624 97ae3a __wcsnicoll 6 API calls 19623->19624 19628 984955 __setmbcp 19624->19628 19625 9849d1 RtlAllocateHeap 19625->19629 19626 979eaf _realloc 6 API calls 19626->19629 19627 978fdb __lock 66 API calls 19627->19629 19628->18842 19629->19625 19629->19626 19629->19627 19629->19628 19630 9797ed ___sbh_alloc_block 5 API calls 19629->19630 19632 984a18 19629->19632 19630->19629 19635 978f01 LeaveCriticalSection 19632->19635 19634 984a1f 19634->19629 19635->19634 19636->18858 19643 978f01 LeaveCriticalSection 19637->19643 19639 97bed5 19639->18868 19644 978f01 LeaveCriticalSection 19640->19644 19642 97bf23 19642->18873 19643->19639 19644->19642 19646 97931f 19645->19646 19647 97907d 19645->19647 19646->18882 19647->19646 19648 979269 VirtualFree 19647->19648 19649 9792cd 19648->19649 19649->19646 19650 9792dc VirtualFree HeapFree 19649->19650 19655 980640 19650->19655 19659 978f01 LeaveCriticalSection 19652->19659 19654 976f81 19654->18886 19656 980658 19655->19656 19657 980687 19656->19657 19658 98067f __VEC_memcpy 19656->19658 19657->19646 19658->19657 19659->19654 19661 97bfc4 __setmbcp 19660->19661 19662 97bfdc 19661->19662 19663 976f24 ___endstdio 67 API calls 19661->19663 19665 97c0c6 __setmbcp 19661->19665 19664 97bfea 19662->19664 19666 976f24 ___endstdio 67 API calls 19662->19666 19663->19662 19667 976f24 ___endstdio 67 API calls 19664->19667 19669 97bff8 19664->19669 19665->18889 19666->19664 19667->19669 19668 97c006 19670 97c014 19668->19670 19672 976f24 ___endstdio 67 API calls 19668->19672 19669->19668 19671 976f24 ___endstdio 67 API calls 19669->19671 19673 97c022 19670->19673 19674 976f24 ___endstdio 67 API calls 19670->19674 19671->19668 19672->19670 19675 97c030 19673->19675 19676 976f24 ___endstdio 67 API calls 19673->19676 19674->19673 19677 97c041 19675->19677 19679 976f24 ___endstdio 67 API calls 19675->19679 19676->19675 19678 978fdb __lock 67 API calls 19677->19678 19680 97c049 19678->19680 19679->19677 19681 97c055 InterlockedDecrement 19680->19681 19682 97c06e 19680->19682 19681->19682 19683 97c060 19681->19683 19696 97c0d2 19682->19696 19683->19682 19686 976f24 ___endstdio 67 API calls 19683->19686 19686->19682 19687 978fdb __lock 67 API calls 19688 97c082 19687->19688 19689 97c0b3 19688->19689 19691 97f943 ___removelocaleref 8 API calls 19688->19691 19699 97c0de 19689->19699 19694 97c097 19691->19694 19693 976f24 ___endstdio 67 API calls 19693->19665 19694->19689 19695 97f76b ___freetlocinfo 67 API calls 19694->19695 19695->19689 19702 978f01 LeaveCriticalSection 19696->19702 19698 97c07b 19698->19687 19703 978f01 LeaveCriticalSection 19699->19703 19701 97c0c0 19701->19693 19702->19698 19703->19701 19705 96c501 19704->19705 19706 96c57f VirtualQuery 19704->19706 19705->19706 19707 96c52d GetCurrentProcess 19705->19707 19708 96c54a GetCurrentProcess 19705->19708 19706->18695 19709 96c547 ___DllMainCRTStartup 19707->19709 19708->19709 19709->19706 19710 96c57a 19709->19710 19710->18695 19816 966f84 19711->19816 19713 961332 ___DllMainCRTStartup 19714 977001 _malloc 67 API calls 19713->19714 19715 9613a9 ___DllMainCRTStartup 19714->19715 19823 96d265 19715->19823 19717 9613f2 19718 96d265 ___DllMainCRTStartup 72 API calls 19717->19718 19719 961404 19718->19719 19831 96355f 19719->19831 19721 96140c 19722 961410 19721->19722 19724 961415 ___DllMainCRTStartup 19721->19724 19936 96c690 19722->19936 19725 96142f 19724->19725 19726 96142a 19724->19726 19836 9635bd 19725->19836 19727 96c690 ___DllMainCRTStartup 85 API calls 19726->19727 19727->19725 19730 96143d 19842 963618 19730->19842 19731 961438 19732 96c690 ___DllMainCRTStartup 85 API calls 19731->19732 19732->19730 19735 961446 19736 96c690 ___DllMainCRTStartup 85 API calls 19735->19736 19737 96144b ___DllMainCRTStartup 19736->19737 19738 977001 _malloc 67 API calls 19737->19738 19739 961472 19738->19739 19740 961482 ___DllMainCRTStartup 19739->19740 19741 96147d 19739->19741 19743 96d265 ___DllMainCRTStartup 72 API calls 19740->19743 19742 96c690 ___DllMainCRTStartup 85 API calls 19741->19742 19742->19740 19744 961495 ___DllMainCRTStartup 19743->19744 19854 966e28 GetACP GetOEMCP 19744->19854 19746 96166d 19747 976f24 ___endstdio 67 API calls 19746->19747 19748 961676 19747->19748 19750 96c690 ___DllMainCRTStartup 85 API calls 19748->19750 19749 96b8bd 67 API calls ___DllMainCRTStartup 19759 9614a7 ___DllMainCRTStartup 19749->19759 19751 96167c 19750->19751 19751->18694 19752 977156 103 API calls __snprintf 19752->19759 19759->19746 19759->19749 19759->19752 19760 96355f ___DllMainCRTStartup GetLocalTime 19759->19760 19763 961595 19759->19763 19891 962506 19759->19891 19903 962b35 19759->19903 19910 967c7d 19759->19910 19920 96263a 19759->19920 19923 962d07 19759->19923 19926 964a81 19759->19926 19950 96a7fe 19759->19950 19968 968f03 19759->19968 19760->19759 19761 96c690 ___DllMainCRTStartup 85 API calls 19761->19759 19763->19759 19763->19761 19765 96c690 ___DllMainCRTStartup 85 API calls 19763->19765 19768 96355f ___DllMainCRTStartup GetLocalTime 19763->19768 19771 96263a ___DllMainCRTStartup 3 API calls 19763->19771 19772 962506 ___DllMainCRTStartup 8 API calls 19763->19772 19973 96453c 19763->19973 19981 966619 19763->19981 19987 965f36 19763->19987 19998 962caf 19763->19998 20001 962728 19763->20001 19765->19759 19768->19763 19771->19763 19772->19763 19775 96bebe 19774->19775 19776 96bf3a VirtualFree 19774->19776 19775->19776 19777 96bedd GetCurrentProcess 19775->19777 19779 9693c0 19776->19779 19778 96bef5 ___DllMainCRTStartup 19777->19778 19778->19776 19778->19779 19779->18705 19779->18706 19781 96c48e 19780->19781 19782 96c4e9 UnmapViewOfFile 19780->19782 19783 96c4a2 19781->19783 19784 96c4d7 GetCurrentProcess 19781->19784 19782->18706 19783->19782 19785 96c4b0 GetCurrentProcess 19783->19785 19786 96c4ce ___DllMainCRTStartup 19784->19786 19785->19786 19786->19782 19787 96c4d4 19786->19787 19787->18706 19789 966f84 ___DllMainCRTStartup 67 API calls 19788->19789 19790 96aeac _memset ___DllMainCRTStartup 19789->19790 23338 96b1ce 19790->23338 19792 96af14 19793 977001 _malloc 67 API calls 19792->19793 19794 96af1f _memset 19793->19794 19795 96d265 ___DllMainCRTStartup 72 API calls 19794->19795 19796 96af41 ___DllMainCRTStartup 19795->19796 19797 96af6c ___DllMainCRTStartup 19796->19797 19798 962c13 ___DllMainCRTStartup 72 API calls 19796->19798 19800 96afe0 ___DllMainCRTStartup 19797->19800 19801 96afbe GetComputerNameExA 19797->19801 19799 96af5b htonl 19798->19799 19799->19797 19803 96b011 ___DllMainCRTStartup 19800->19803 19804 96aff1 GetComputerNameA 19800->19804 23345 96ae3c 19801->23345 19806 96b022 GetUserNameA 19803->19806 19814 96b046 _memcpy_s ___DllMainCRTStartup 19803->19814 19805 96ae3c ___DllMainCRTStartup 102 API calls 19804->19805 19805->19803 19807 96ae3c ___DllMainCRTStartup 102 API calls 19806->19807 19807->19814 19808 96b183 19809 966fcf ___DllMainCRTStartup 67 API calls 19808->19809 19810 96b18c _memset ___DllMainCRTStartup 19809->19810 19810->18691 19811 96705b htons ___DllMainCRTStartup 19811->19814 19812 967018 ___DllMainCRTStartup htonl 19812->19814 19813 977001 _malloc 67 API calls 19813->19814 19814->19808 19814->19811 19814->19812 19814->19813 19815 96d265 ___DllMainCRTStartup 72 API calls 19814->19815 19815->19814 19817 977001 _malloc 67 API calls 19816->19817 19818 966f8f 19817->19818 19819 977001 _malloc 67 API calls 19818->19819 19822 966fac _memset ___DllMainCRTStartup 19818->19822 19820 966f9f 19819->19820 19821 976f24 ___endstdio 67 API calls 19820->19821 19820->19822 19821->19822 19822->19713 19824 96d27e 19823->19824 19830 96d291 _memset 19823->19830 19825 96d287 19824->19825 19826 96d293 19824->19826 19827 977001 _malloc 67 API calls 19825->19827 19828 9788c7 _realloc 72 API calls 19826->19828 19827->19830 19829 96d2a0 19828->19829 19829->19830 19830->19717 19832 96356d ___DllMainCRTStartup 19831->19832 19833 963573 GetLocalTime 19832->19833 19834 963571 19832->19834 19835 963585 ___DllMainCRTStartup 19833->19835 19834->19721 19835->19721 19837 9635c8 ___DllMainCRTStartup 19836->19837 19841 961434 19837->19841 20030 96ac0c 19837->20030 19839 963600 20034 96ac36 19839->20034 19841->19730 19841->19731 19843 96362f ___DllMainCRTStartup 19842->19843 19844 963671 htonl htonl 19843->19844 19846 961442 19843->19846 19845 963691 19844->19845 19844->19846 19847 977001 _malloc 67 API calls 19845->19847 19846->19735 19846->19737 19848 96369a _memcpy_s ___DllMainCRTStartup 19847->19848 19849 9636e4 _memset 19848->19849 19850 96ac0c ___DllMainCRTStartup 103 API calls 19848->19850 19852 976f24 ___endstdio 67 API calls 19849->19852 19851 9636d2 19850->19851 19853 96ac36 ___DllMainCRTStartup 103 API calls 19851->19853 19852->19846 19853->19849 20283 96d812 19854->20283 19862 966e82 __RTC_InitBase 19863 966e95 19862->19863 19864 966e9b GetCurrentProcess 19862->19864 20301 96cc7a AllocateAndInitializeSid 19863->20301 20356 96394c GetModuleHandleA GetProcAddress 19864->20356 19870 966ecb 20307 9621f7 19870->20307 19873 9621f7 ___DllMainCRTStartup htonl 19874 966ee7 19873->19874 19875 9621f7 ___DllMainCRTStartup htonl 19874->19875 19876 966ef4 19875->19876 20311 9621a8 htonl 19876->20311 19879 9621a8 ___DllMainCRTStartup 2 API calls 19880 966f09 19879->19880 20314 9621c5 htons 19880->20314 19888 966f2a _memset _memcpy_s ___DllMainCRTStartup 20349 96aa99 19888->20349 19890 966f6f _memset 19890->19759 20521 96c706 19891->20521 19893 962516 ___DllMainCRTStartup 19894 962584 InternetOpenA 19893->19894 19895 962592 InternetSetOptionA InternetSetOptionA InternetConnectA 19893->19895 19894->19895 19898 9625e5 ___DllMainCRTStartup 19895->19898 19896 96261e 20524 96c727 19896->20524 19898->19896 19900 9625fc InternetSetOptionA 19898->19900 19901 96260a ___DllMainCRTStartup 19900->19901 19902 962613 InternetSetOptionA 19901->19902 19902->19896 19904 96c706 ___DllMainCRTStartup RevertToSelf 19903->19904 19905 962b3e 19904->19905 20527 96296b 19905->20527 20571 9677f6 19910->20571 19913 967c95 20599 967b2d 19913->20599 19916 967ca4 20610 967a8f 19916->20610 19917 967c9e GetTickCount 19917->19913 19917->19916 19921 96c706 ___DllMainCRTStartup RevertToSelf 19920->19921 19922 962640 InternetCloseHandle InternetCloseHandle 19921->19922 19924 96d812 ___DllMainCRTStartup 5 API calls 19923->19924 19925 962d16 19924->19925 19925->19759 19927 964a8d ___DllMainCRTStartup 19926->19927 19928 964ad9 Sleep 19927->19928 19930 964ab1 19927->19930 20745 964afa 19927->20745 19929 964ad4 19928->19929 19929->19759 20758 964bab 19930->20758 19937 96c69b ___DllMainCRTStartup 19936->19937 19938 961a64 ___DllMainCRTStartup 10 API calls 19937->19938 19939 96c6b4 19938->19939 20969 96d356 19939->20969 19942 96c6bf 19944 96c6c3 Sleep 19942->19944 19945 96c6d0 ExitThread 19942->19945 19943 96c6d8 19946 96c6dc 19943->19946 19947 96c6fd ExitProcess 19943->19947 19944->19944 20978 96c085 19946->20978 19951 96a813 19950->19951 19952 96a81a 19950->19952 19951->19759 19953 977001 _malloc 67 API calls 19952->19953 19954 96a823 19953->19954 19955 96a838 19954->19955 19956 96fb8f ___DllMainCRTStartup 67 API calls 19954->19956 19957 976f24 ___endstdio 67 API calls 19955->19957 19961 96a853 _memcpy_s ___DllMainCRTStartup 19956->19961 19957->19951 19958 9776de ___DllMainCRTStartup 67 API calls 19958->19961 19959 96f83b ___DllMainCRTStartup 5 API calls 19959->19961 19960 967018 htonl ___DllMainCRTStartup 19960->19961 19961->19955 19961->19958 19961->19959 19961->19960 19962 96a905 19961->19962 19966 96a94c _memcpy_s ___DllMainCRTStartup 19961->19966 19963 976f24 ___endstdio 67 API calls 19962->19963 19964 96a90d 19963->19964 19967 976f24 ___endstdio 67 API calls 19966->19967 19967->19951 19969 968f12 htonl htonl 19968->19969 19971 968f46 _memset 19968->19971 19969->19971 19972 968f31 19969->19972 19971->19759 19972->19969 19972->19971 20995 9689bb 19972->20995 19974 96454e 19973->19974 19980 964591 19973->19980 19976 964565 19974->19976 23133 964457 19974->23133 19977 964593 19976->19977 19979 976f24 ___endstdio 67 API calls 19976->19979 19976->19980 19978 976f24 ___endstdio 67 API calls 19977->19978 19978->19980 19979->19976 19980->19763 19982 96662e 19981->19982 19983 966634 GetTickCount 19982->19983 19985 966669 19982->19985 19983->19982 19984 96663a GetTickCount htonl 19983->19984 19986 9612d0 ___DllMainCRTStartup 126 API calls 19984->19986 19985->19763 19986->19982 19988 965f45 19987->19988 19997 965fd1 19987->19997 19989 977001 _malloc 67 API calls 19988->19989 19994 965f51 19989->19994 19992 9612d0 ___DllMainCRTStartup 126 API calls 19992->19994 19993 965f94 WaitForSingleObject 19993->19994 19994->19992 19994->19993 19995 965fbf _memset 19994->19995 23312 965fde PeekNamedPipe 19994->23312 23318 966048 19994->23318 19996 976f24 ___endstdio 67 API calls 19995->19996 19996->19997 19997->19763 19999 9612d0 ___DllMainCRTStartup 126 API calls 19998->19999 20000 962cbf 19999->20000 20000->19763 20002 962758 _memset 20001->20002 20003 9628df 20002->20003 20004 968934 ___DllMainCRTStartup 67 API calls 20002->20004 20003->19763 20005 962792 20004->20005 20006 977156 __snprintf 103 API calls 20005->20006 20007 9627ab 20006->20007 20008 977156 __snprintf 103 API calls 20007->20008 20009 9627c7 ___DllMainCRTStartup 20008->20009 20031 96ac1d 20030->20031 20033 96ac19 ___DllMainCRTStartup 20030->20033 20042 96abab 20031->20042 20033->19839 20035 977156 __snprintf 103 API calls 20034->20035 20036 96ac7a 20035->20036 20037 977156 __snprintf 103 API calls 20036->20037 20039 96ac8c _memcpy_s ___DllMainCRTStartup 20037->20039 20041 96ad54 _strncmp 20039->20041 20276 9776de 20039->20276 20279 96f83b 20039->20279 20041->19841 20047 977156 20042->20047 20045 977156 __snprintf 103 API calls 20046 96abfe ___DllMainCRTStartup 20045->20046 20046->20033 20048 977166 20047->20048 20051 977183 20047->20051 20049 978d72 __wcsnicoll 67 API calls 20048->20049 20052 97716b 20049->20052 20050 9771af 20062 97a16b 20050->20062 20051->20050 20053 977192 20051->20053 20055 97ae3a __wcsnicoll 6 API calls 20052->20055 20056 978d72 __wcsnicoll 67 API calls 20053->20056 20060 96abc4 20055->20060 20057 977197 20056->20057 20059 97ae3a __wcsnicoll 6 API calls 20057->20059 20058 9771dd 20058->20060 20089 979fae 20058->20089 20059->20060 20060->20045 20063 9785ed _LocaleUpdate::_LocaleUpdate 77 API calls 20062->20063 20064 97a1d2 20063->20064 20065 97a1d6 20064->20065 20074 97a217 __output_l __aulldvrm _strlen 20064->20074 20110 97d95e 20064->20110 20066 978d72 __wcsnicoll 67 API calls 20065->20066 20067 97a1db 20066->20067 20069 97ae3a __wcsnicoll 6 API calls 20067->20069 20070 97a1ed 20069->20070 20071 97eb2e __invoke_watson 5 API calls 20070->20071 20072 97ace0 20071->20072 20072->20058 20074->20065 20074->20070 20075 97a112 101 API calls _write_multi_char 20074->20075 20076 97a57e 20074->20076 20077 976f24 ___endstdio 67 API calls 20074->20077 20078 97ae60 101 API calls _write_string 20074->20078 20080 980fad 79 API calls __cftof 20074->20080 20088 97a145 101 API calls _write_multi_char 20074->20088 20116 97fe9a 20074->20116 20075->20074 20081 980008 __malloc_crt 67 API calls 20076->20081 20082 97a5bb 20076->20082 20077->20074 20078->20074 20079 97bd52 __decode_pointer 6 API calls 20084 97a8b9 20079->20084 20080->20074 20081->20082 20082->20079 20083 97a8e8 20085 97a90d 20083->20085 20087 97bd52 __decode_pointer 6 API calls 20083->20087 20084->20083 20086 97bd52 __decode_pointer 6 API calls 20084->20086 20085->20058 20086->20083 20087->20085 20088->20074 20090 97d95e __fileno 67 API calls 20089->20090 20091 979fbe 20090->20091 20092 979fe0 20091->20092 20093 979fc9 20091->20093 20095 979fe4 20092->20095 20102 979ff1 __flsbuf 20092->20102 20094 978d72 __wcsnicoll 67 API calls 20093->20094 20104 979fce 20094->20104 20096 978d72 __wcsnicoll 67 API calls 20095->20096 20096->20104 20097 97a0e1 20099 97d882 __locking 101 API calls 20097->20099 20098 97a061 20100 97a078 20098->20100 20105 97a095 20098->20105 20099->20104 20131 97d882 20100->20131 20102->20104 20106 97a047 20102->20106 20109 97a052 20102->20109 20119 980dc7 20102->20119 20104->20060 20105->20104 20156 97ea15 20105->20156 20106->20109 20128 980d7e 20106->20128 20109->20097 20109->20098 20111 97d96d 20110->20111 20112 97d982 20110->20112 20113 978d72 __wcsnicoll 67 API calls 20111->20113 20112->20074 20114 97d972 20113->20114 20115 97ae3a __wcsnicoll 6 API calls 20114->20115 20115->20112 20117 9785ed _LocaleUpdate::_LocaleUpdate 77 API calls 20116->20117 20118 97fead 20117->20118 20118->20074 20120 980dd4 20119->20120 20122 980de3 20119->20122 20121 978d72 __wcsnicoll 67 API calls 20120->20121 20123 980dd9 20121->20123 20124 980e07 20122->20124 20125 978d72 __wcsnicoll 67 API calls 20122->20125 20123->20106 20124->20106 20126 980df7 20125->20126 20127 97ae3a __wcsnicoll 6 API calls 20126->20127 20127->20124 20129 980008 __malloc_crt 67 API calls 20128->20129 20130 980d93 20129->20130 20130->20109 20132 97d88e __setmbcp 20131->20132 20133 97d896 20132->20133 20134 97d8b1 20132->20134 20188 978d85 20133->20188 20136 97d8bf 20134->20136 20139 97d900 20134->20139 20138 978d85 __free_osfhnd 67 API calls 20136->20138 20141 97d8c4 20138->20141 20191 982387 20139->20191 20140 978d72 __wcsnicoll 67 API calls 20151 97d8a3 __setmbcp 20140->20151 20143 978d72 __wcsnicoll 67 API calls 20141->20143 20145 97d8cb 20143->20145 20144 97d906 20146 97d913 20144->20146 20147 97d929 20144->20147 20148 97ae3a __wcsnicoll 6 API calls 20145->20148 20201 97d14f 20146->20201 20150 978d72 __wcsnicoll 67 API calls 20147->20150 20148->20151 20153 97d92e 20150->20153 20151->20104 20152 97d921 20260 97d954 20152->20260 20154 978d85 __free_osfhnd 67 API calls 20153->20154 20154->20152 20157 97ea21 __setmbcp 20156->20157 20158 97ea32 20157->20158 20159 97ea4e 20157->20159 20160 978d85 __free_osfhnd 67 API calls 20158->20160 20161 97ea5c 20159->20161 20162 97ea7d 20159->20162 20164 97ea37 20160->20164 20163 978d85 __free_osfhnd 67 API calls 20161->20163 20166 97eac3 20162->20166 20167 97ea9d 20162->20167 20165 97ea61 20163->20165 20168 978d72 __wcsnicoll 67 API calls 20164->20168 20170 978d72 __wcsnicoll 67 API calls 20165->20170 20169 982387 ___lock_fhandle 68 API calls 20166->20169 20171 978d85 __free_osfhnd 67 API calls 20167->20171 20182 97ea3f __setmbcp 20168->20182 20172 97eac9 20169->20172 20173 97ea68 20170->20173 20174 97eaa2 20171->20174 20175 97ead6 20172->20175 20176 97eaf2 20172->20176 20177 97ae3a __wcsnicoll 6 API calls 20173->20177 20178 978d72 __wcsnicoll 67 API calls 20174->20178 20263 97e990 20175->20263 20180 978d72 __wcsnicoll 67 API calls 20176->20180 20177->20182 20181 97eaa9 20178->20181 20184 97eaf7 20180->20184 20185 97ae3a __wcsnicoll 6 API calls 20181->20185 20182->20104 20183 97eae7 20273 97eb24 20183->20273 20186 978d85 __free_osfhnd 67 API calls 20184->20186 20185->20182 20186->20183 20189 97bf25 __getptd_noexit 67 API calls 20188->20189 20190 978d8a 20189->20190 20190->20140 20192 982393 __setmbcp 20191->20192 20193 9823ee 20192->20193 20195 978fdb __lock 67 API calls 20192->20195 20194 9823f3 EnterCriticalSection 20193->20194 20197 982410 __setmbcp 20193->20197 20194->20197 20196 9823bf 20195->20196 20198 9823d6 20196->20198 20200 97c9e6 ___lock_fhandle InitializeCriticalSectionAndSpinCount 20196->20200 20197->20144 20199 98241e ___lock_fhandle LeaveCriticalSection 20198->20199 20199->20193 20200->20198 20202 97d15e __ftelli64_nolock 20201->20202 20203 97d1b7 20202->20203 20204 97d190 20202->20204 20234 97d185 20202->20234 20209 97d21f 20203->20209 20210 97d1f9 20203->20210 20206 978d85 __free_osfhnd 67 API calls 20204->20206 20205 97eb2e __invoke_watson 5 API calls 20207 97d880 20205->20207 20208 97d195 20206->20208 20207->20152 20213 978d72 __wcsnicoll 67 API calls 20208->20213 20212 97d233 20209->20212 20215 97e990 __lseeki64_nolock 69 API calls 20209->20215 20211 978d85 __free_osfhnd 67 API calls 20210->20211 20214 97d1fe 20211->20214 20217 980dc7 __flsbuf 67 API calls 20212->20217 20216 97d19c 20213->20216 20218 978d72 __wcsnicoll 67 API calls 20214->20218 20215->20212 20219 97ae3a __wcsnicoll 6 API calls 20216->20219 20220 97d23e 20217->20220 20221 97d207 20218->20221 20219->20234 20222 97d4e4 20220->20222 20226 97bf9e __getptd 67 API calls 20220->20226 20223 97ae3a __wcsnicoll 6 API calls 20221->20223 20224 97d4f4 20222->20224 20225 97d7b3 WriteFile 20222->20225 20223->20234 20230 97d5d2 20224->20230 20249 97d508 20224->20249 20228 97d7e6 GetLastError 20225->20228 20229 97d4c6 20225->20229 20227 97d259 GetConsoleMode 20226->20227 20227->20222 20231 97d284 20227->20231 20228->20229 20232 97d831 20229->20232 20229->20234 20236 97d804 20229->20236 20248 97d6b2 20230->20248 20251 97d5e1 20230->20251 20231->20222 20233 97d296 GetConsoleCP 20231->20233 20232->20234 20235 978d72 __wcsnicoll 67 API calls 20232->20235 20233->20229 20258 97d2b9 20233->20258 20234->20205 20238 97d854 20235->20238 20240 97d823 20236->20240 20241 97d80f 20236->20241 20237 97d576 WriteFile 20237->20228 20237->20249 20244 978d85 __free_osfhnd 67 API calls 20238->20244 20239 97d718 WideCharToMultiByte 20239->20228 20246 97d74f WriteFile 20239->20246 20243 978d98 __dosmaperr 67 API calls 20240->20243 20245 978d72 __wcsnicoll 67 API calls 20241->20245 20242 97d656 WriteFile 20242->20228 20242->20251 20243->20234 20244->20234 20250 97d814 20245->20250 20247 97d786 GetLastError 20246->20247 20246->20248 20247->20248 20248->20229 20248->20232 20248->20239 20248->20246 20249->20229 20249->20232 20249->20237 20253 978d85 __free_osfhnd 67 API calls 20250->20253 20251->20229 20251->20232 20251->20242 20252 97fed2 __write_nolock 77 API calls 20252->20258 20253->20234 20254 9821ef 79 API calls __fassign 20254->20258 20255 97d365 WideCharToMultiByte 20255->20229 20256 97d396 WriteFile 20255->20256 20256->20228 20256->20258 20257 982013 11 API calls __putwch_nolock 20257->20258 20258->20228 20258->20229 20258->20252 20258->20254 20258->20255 20258->20257 20259 97d3ea WriteFile 20258->20259 20259->20228 20259->20258 20261 982427 __unlock_fhandle LeaveCriticalSection 20260->20261 20262 97d95c 20261->20262 20262->20151 20264 982310 __close_nolock 67 API calls 20263->20264 20265 97e9ae 20264->20265 20266 97e9c7 SetFilePointer 20265->20266 20267 97e9b6 20265->20267 20268 97e9df GetLastError 20266->20268 20271 97e9bb 20266->20271 20269 978d72 __wcsnicoll 67 API calls 20267->20269 20270 97e9e9 20268->20270 20268->20271 20269->20271 20272 978d98 __dosmaperr 67 API calls 20270->20272 20271->20183 20272->20271 20274 982427 __unlock_fhandle LeaveCriticalSection 20273->20274 20275 97eb2c 20274->20275 20275->20182 20277 9775b2 _doexit 67 API calls 20276->20277 20278 9776ef 20277->20278 20278->20039 20282 96f865 ___DllMainCRTStartup 20279->20282 20280 97eb2e __invoke_watson 5 API calls 20281 96f955 20280->20281 20281->20039 20282->20280 20358 96d7aa CryptAcquireContextA 20283->20358 20286 966e58 20288 96aa08 20286->20288 20289 96aa1a ___DllMainCRTStartup 20288->20289 20368 96fa9b 20289->20368 20291 9776de ___DllMainCRTStartup 67 API calls 20292 96aa36 ___DllMainCRTStartup 20291->20292 20292->20291 20294 966e61 GetCurrentProcessId GetTickCount 20292->20294 20374 985b20 20292->20374 20295 97740a 20294->20295 20296 97bf9e __getptd 67 API calls 20295->20296 20297 966e7c 20296->20297 20298 961311 20297->20298 20299 962d07 ___DllMainCRTStartup 5 API calls 20298->20299 20300 961316 20299->20300 20300->19862 20302 96ccba CheckTokenMembership 20301->20302 20303 966eb5 20301->20303 20304 96cccf FreeSid 20302->20304 20305 96cccc 20302->20305 20306 962173 htonl htonl 20303->20306 20304->20303 20305->20304 20306->19870 20308 962206 _memcpy_s 20307->20308 20309 962228 20307->20309 20310 962214 htonl 20308->20310 20309->19873 20310->20309 20312 9621f7 ___DllMainCRTStartup htonl 20311->20312 20313 9621c2 GetCurrentProcessId 20312->20313 20313->19879 20315 9621f7 ___DllMainCRTStartup htonl 20314->20315 20316 9621e2 20315->20316 20317 9621e5 20316->20317 20318 9621f7 ___DllMainCRTStartup htonl 20317->20318 20319 9621f4 20318->20319 20320 966cd1 20319->20320 20321 966f84 ___DllMainCRTStartup 67 API calls 20320->20321 20322 966ce4 ___DllMainCRTStartup 20321->20322 20323 966d26 GetUserNameA GetComputerNameA 20322->20323 20428 962c08 20323->20428 20326 966d81 GetVersionExA 20327 9621e5 ___DllMainCRTStartup htonl 20326->20327 20328 966d9e 20327->20328 20330 9621e5 ___DllMainCRTStartup htonl 20328->20330 20329 966d64 _strrchr 20329->20326 20331 966da9 20330->20331 20332 9621c5 ___DllMainCRTStartup 2 API calls 20331->20332 20333 966db4 20332->20333 20334 9621a8 ___DllMainCRTStartup 2 API calls 20333->20334 20335 966dbc 20334->20335 20336 9621a8 ___DllMainCRTStartup 2 API calls 20335->20336 20337 966dc8 20336->20337 20338 9621a8 ___DllMainCRTStartup 2 API calls 20337->20338 20339 966dd4 20338->20339 20340 9621a8 ___DllMainCRTStartup 2 API calls 20339->20340 20341 966ddd 20340->20341 20342 977156 __snprintf 103 API calls 20341->20342 20343 966df5 20342->20343 20344 9621f7 ___DllMainCRTStartup htonl 20343->20344 20345 966e19 20344->20345 20431 966fcf 20345->20431 20348 962232 htonl 20348->19888 20350 96aaaa ___DllMainCRTStartup 20349->20350 20449 96f501 20350->20449 20352 96aad6 20353 9776de ___DllMainCRTStartup 67 API calls 20352->20353 20355 96ab01 20352->20355 20473 96f9d0 20352->20473 20353->20352 20355->19890 20357 96396f 20356->20357 20357->19863 20359 96d7d3 CryptAcquireContextA 20358->20359 20360 96d7ea CryptGenRandom 20358->20360 20359->20360 20361 96d7e6 20359->20361 20362 96d80e 20360->20362 20363 96d7ff CryptReleaseContext 20360->20363 20361->20286 20364 96d734 20361->20364 20362->20363 20363->20361 20366 96d74e 20364->20366 20365 96d7a2 20365->20286 20366->20365 20367 98755b GetSystemTimeAsFileTime _clock 20366->20367 20367->20366 20369 96faa6 ___DllMainCRTStartup 20368->20369 20370 977001 _malloc 67 API calls 20369->20370 20371 96faba 20369->20371 20373 96fac9 20370->20373 20371->20292 20372 976f24 ___endstdio 67 API calls 20372->20371 20373->20371 20373->20372 20375 985b44 ___DllMainCRTStartup 20374->20375 20378 986160 20375->20378 20379 9875d9 20375->20379 20377 98631f 20377->20292 20378->20292 20380 9875db 20379->20380 20381 9875dc 20379->20381 20380->20377 20384 987d4e 20381->20384 20385 987d5b 20384->20385 20386 9875f1 20385->20386 20388 987b55 20385->20388 20386->20377 20390 987b8b failwithmessage 20388->20390 20389 987ba3 MultiByteToWideChar 20391 987bdc 20389->20391 20392 987bbe MultiByteToWideChar 20389->20392 20390->20389 20409 987aa3 20391->20409 20392->20391 20394 987beb 20396 987c05 20394->20396 20413 987af3 20394->20413 20397 987d3f 20396->20397 20398 987d39 DebugBreak 20396->20398 20399 987c3c 20396->20399 20400 987c2e IsDebuggerPresent 20396->20400 20401 97eb2e __invoke_watson 5 API calls 20397->20401 20398->20397 20417 9884da VirtualQuery 20399->20417 20400->20398 20400->20399 20403 987d4c 20401->20403 20403->20386 20405 987c9d WideCharToMultiByte 20406 987cd8 WideCharToMultiByte 20405->20406 20407 987ccc 20405->20407 20408 987c72 20406->20408 20407->20406 20408->20397 20408->20398 20410 979ad4 __setmbcp 20409->20410 20411 987aaf RaiseException 20410->20411 20412 987ae2 __setmbcp 20411->20412 20412->20394 20414 979ad4 __setmbcp 20413->20414 20415 987aff RaiseException 20414->20415 20416 987b44 __setmbcp 20415->20416 20416->20396 20418 98850f GetModuleFileNameW 20417->20418 20425 987c67 20417->20425 20420 988522 20418->20420 20418->20425 20419 9885a2 GetProcAddress 20424 9885b7 20419->20424 20419->20425 20420->20419 20421 988334 GetPdbDll 13 API calls 20420->20421 20420->20425 20422 988592 20421->20422 20422->20419 20422->20425 20424->20425 20426 9886a9 GetProcessHeap HeapAlloc 20424->20426 20427 98868e GetProcessHeap HeapFree 20424->20427 20425->20405 20425->20408 20426->20425 20426->20427 20427->20425 20437 962c13 20428->20437 20432 966fdd ___DllMainCRTStartup 20431->20432 20433 976f24 ___endstdio 67 API calls 20432->20433 20434 966fe4 20433->20434 20435 976f24 ___endstdio 67 API calls 20434->20435 20436 966e22 20435->20436 20436->20348 20444 962b66 20437->20444 20439 962c2e WSASocketA 20440 962c10 GetModuleFileNameA 20439->20440 20441 962c48 WSAIoctl 20439->20441 20440->20329 20443 962c6c closesocket 20441->20443 20443->20440 20445 962b7b WSAStartup 20444->20445 20448 962b9d ___DllMainCRTStartup 20444->20448 20446 962b91 WSACleanup 20445->20446 20445->20448 20447 9776de ___DllMainCRTStartup 67 API calls 20446->20447 20447->20448 20448->20439 20477 9701c6 20449->20477 20456 96f68f 20457 976f24 ___endstdio 67 API calls 20456->20457 20458 96f697 20457->20458 20461 97069b ___DllMainCRTStartup 67 API calls 20458->20461 20460 96f60b 20494 97069b 20460->20494 20467 96f6ad 20461->20467 20463 96f676 20465 976f24 ___endstdio 67 API calls 20463->20465 20464 96f681 20466 976f24 ___endstdio 67 API calls 20464->20466 20472 96f571 ___DllMainCRTStartup 20465->20472 20466->20472 20468 96f761 20467->20468 20469 96f6ce 20467->20469 20467->20472 20470 97069b ___DllMainCRTStartup 67 API calls 20468->20470 20468->20472 20471 97069b ___DllMainCRTStartup 67 API calls 20469->20471 20469->20472 20470->20472 20471->20472 20472->20352 20474 96f9e0 ___DllMainCRTStartup 20473->20474 20476 96fa01 20474->20476 20514 97079d 20474->20514 20476->20352 20478 9701d4 20477->20478 20479 96f551 20477->20479 20478->20479 20502 972722 20478->20502 20479->20472 20481 985190 20479->20481 20482 98491c __calloc_impl 67 API calls 20481->20482 20483 9851aa 20482->20483 20484 96f568 20483->20484 20485 978d72 __wcsnicoll 67 API calls 20483->20485 20484->20472 20488 970237 20484->20488 20486 9851bd 20485->20486 20486->20484 20487 978d72 __wcsnicoll 67 API calls 20486->20487 20487->20484 20489 96f600 20488->20489 20493 97024a ___DllMainCRTStartup 20488->20493 20489->20456 20489->20460 20492 970237 ___DllMainCRTStartup 5 API calls 20492->20493 20493->20489 20493->20492 20505 971c81 20493->20505 20509 9718c5 20493->20509 20495 9706ac 20494->20495 20500 96f669 20494->20500 20496 985190 _calloc 67 API calls 20495->20496 20495->20500 20497 9706dd 20496->20497 20498 970735 20497->20498 20497->20500 20501 970237 ___DllMainCRTStartup 5 API calls 20497->20501 20499 976f24 ___endstdio 67 API calls 20498->20499 20499->20500 20500->20463 20500->20464 20501->20498 20503 977001 _malloc 67 API calls 20502->20503 20504 97272e 20503->20504 20504->20478 20508 971c9e ___DllMainCRTStartup 20505->20508 20506 97eb2e __invoke_watson 5 API calls 20507 971dec 20506->20507 20507->20493 20508->20506 20512 9718d4 20509->20512 20513 9718dc ___DllMainCRTStartup 20509->20513 20510 971c81 ___DllMainCRTStartup 5 API calls 20510->20513 20511 970237 ___DllMainCRTStartup 5 API calls 20511->20513 20512->20493 20513->20510 20513->20511 20513->20512 20515 9707aa ___DllMainCRTStartup 20514->20515 20516 9707cd _memcpy_s 20515->20516 20518 96f98d 20515->20518 20516->20476 20519 96d812 ___DllMainCRTStartup 5 API calls 20518->20519 20520 96f99b 20519->20520 20520->20516 20522 96c715 20521->20522 20523 96c70f RevertToSelf 20521->20523 20522->19893 20523->20522 20525 962623 20524->20525 20526 96c730 ImpersonateLoggedOnUser 20524->20526 20525->19759 20526->20525 20528 9629b1 _memset 20527->20528 20560 968934 20528->20560 20561 968943 20560->20561 20562 966f84 ___DllMainCRTStartup 67 API calls 20561->20562 20563 96895a ___DllMainCRTStartup 20562->20563 20572 967a80 GetTickCount 20571->20572 20590 96781f 20571->20590 20572->19913 20573 96782e htonl select 20574 9678a6 __WSAFDIsSet 20573->20574 20573->20590 20575 9678bd accept ioctlsocket 20574->20575 20574->20590 20579 967a82 closesocket 20575->20579 20596 9678e7 ___DllMainCRTStartup 20575->20596 20576 96795b __WSAFDIsSet 20580 967972 accept 20576->20580 20576->20590 20577 9679e7 __WSAFDIsSet 20582 9679f0 __WSAFDIsSet 20577->20582 20577->20590 20578 9679c0 __WSAFDIsSet 20581 9679cd __WSAFDIsSet 20578->20581 20578->20590 20579->20572 20639 966bd9 ioctlsocket 20580->20639 20584 967a51 GetTickCount 20581->20584 20581->20590 20585 967a03 __WSAFDIsSet 20582->20585 20582->20590 20584->20590 20585->20584 20586 967a16 accept 20585->20586 20591 967a30 20586->20591 20589 9612d0 ___DllMainCRTStartup 126 API calls 20589->20590 20590->20572 20590->20573 20590->20576 20590->20577 20590->20578 20590->20589 20640 9663ab 20590->20640 20593 9612d0 ___DllMainCRTStartup 126 API calls 20591->20593 20595 9616d3 htonl ___DllMainCRTStartup 20595->20596 20596->20590 20596->20595 20621 9671fc 20596->20621 20625 961683 20596->20625 20628 9612d0 20596->20628 20635 961765 20596->20635 20600 967b4c 20599->20600 20603 967b56 20599->20603 20602 977001 _malloc 67 API calls 20600->20602 20601 967c75 20601->19916 20601->19917 20602->20603 20603->20601 20604 967b7d htonl recvfrom 20603->20604 20605 967bea htonl ioctlsocket 20603->20605 20607 9612d0 126 API calls ___DllMainCRTStartup 20603->20607 20609 967c1c 20603->20609 20604->20603 20606 967bb7 WSAGetLastError 20604->20606 20605->20603 20606->20603 20607->20603 20609->20603 20740 9671b0 20609->20740 20613 967aa1 20610->20613 20620 967ac6 20610->20620 20613->20620 20620->19759 20622 977001 _malloc 67 API calls 20621->20622 20623 967208 GetTickCount 20622->20623 20626 977001 _malloc 67 API calls 20625->20626 20629 9612dd ___DllMainCRTStartup 20628->20629 20630 9612fb 20628->20630 20629->20630 20636 961778 _memset 20635->20636 20639->20590 20641 9663d1 _memset 20640->20641 20642 966433 20641->20642 20644 966424 20641->20644 20647 96642b 20641->20647 20643 96646e ___DllMainCRTStartup 20642->20643 20645 977001 _malloc 67 API calls 20642->20645 20648 9616d3 ___DllMainCRTStartup htonl 20643->20648 20724 962497 20644->20724 20645->20643 20647->20590 20649 966494 20648->20649 20727 9623a6 20724->20727 20728 961683 ___DllMainCRTStartup 67 API calls 20727->20728 20741 9671de 20740->20741 20742 9671be recv 20740->20742 20741->20609 20743 9671e4 shutdown closesocket 20742->20743 20744 9671d9 20742->20744 20743->20741 20744->20741 20744->20742 20746 964b14 htonl 20745->20746 20757 964aa8 20745->20757 20774 961b63 20746->20774 20757->19928 20757->19930 20759 964bb6 20758->20759 20767 964bf1 20758->20767 20761 977001 _malloc 67 API calls 20759->20761 20763 964bbd 20761->20763 20764 96d265 ___DllMainCRTStartup 72 API calls 20763->20764 20765 964bce ___DllMainCRTStartup 20764->20765 20928 96d40d 20767->20928 20768 391061c 20775 961b73 ___DllMainCRTStartup 20774->20775 20776 967018 ___DllMainCRTStartup htonl 20775->20776 20777 961b90 20776->20777 20778 967018 ___DllMainCRTStartup htonl 20777->20778 20933 96d41d 20928->20933 20929 964ab6 20929->20768 20930 96d44e 20932 977001 _malloc 67 API calls 20930->20932 20931 976f24 ___endstdio 67 API calls 20931->20930 20932->20929 20933->20929 20933->20930 20933->20931 20974 96d368 _memset 20969->20974 20975 96d3d2 20969->20975 20970 976f24 ___endstdio 67 API calls 20971 96d3e3 20970->20971 20972 976f24 ___endstdio 67 API calls 20971->20972 20973 96c6bb 20971->20973 20972->20973 20973->19942 20973->19943 20974->20975 20976 976f24 ___endstdio 67 API calls 20974->20976 20977 96beae ___DllMainCRTStartup 2 API calls 20974->20977 20975->20970 20975->20971 20976->20974 20977->20974 20979 96c122 20978->20979 20980 96c098 20978->20980 20981 96c131 CreateThread 20979->20981 20982 96c139 CreateRemoteThread 20979->20982 20980->20979 20983 96c0c4 ___DllMainCRTStartup 20980->20983 20984 96c0be GetCurrentProcess 20980->20984 20986 96c11c WaitForSingleObject 20981->20986 20982->20986 20983->20979 20985 96c10e 20983->20985 20984->20983 20985->20986 20988 96c01a 20985->20988 20986->19724 20989 96c07a ResumeThread 20988->20989 20990 96c027 ___DllMainCRTStartup 20988->20990 20989->20986 20990->20989 20991 96c06a 20990->20991 20991->20986 20996 9689c6 20995->20996 21107 9689d8 20995->21107 20997 968c16 20996->20997 20998 968a8b GetCurrentThread OpenThreadToken 20996->20998 20999 968a13 20996->20999 21000 968b93 20996->21000 21001 968b9f 20996->21001 21002 968d1f 20996->21002 21003 968a1c 20996->21003 21004 968c9a 20996->21004 21005 968b87 20996->21005 21006 968b05 20996->21006 21007 968d02 20996->21007 21008 968c81 20996->21008 21009 968c8d 20996->21009 21010 968bb7 20996->21010 21011 968abc 20996->21011 21012 968b3d 20996->21012 21013 968c39 20996->21013 21014 968a2f 20996->21014 21015 968aa7 20996->21015 21016 968c21 20996->21016 21017 968c2d 20996->21017 21018 968bab 20996->21018 21019 968d2b 20996->21019 21020 968ad4 20996->21020 21021 968cd2 20996->21021 21022 968c51 20996->21022 21023 968c5d 20996->21023 21024 968c45 20996->21024 21025 968bc3 20996->21025 21026 968a4d 20996->21026 21027 968ac8 20996->21027 21028 968b49 20996->21028 21029 968a75 20996->21029 21030 968aed 20996->21030 21031 968a24 20996->21031 21032 968c75 20996->21032 21033 9689ea 20996->21033 21034 968cf0 20996->21034 21035 968bfc 20996->21035 21036 9689fd 20996->21036 21037 968b7b 20996->21037 21038 968b63 20996->21038 21039 968a05 20996->21039 21040 968a57 20996->21040 21041 968ae1 20996->21041 21042 968b6f 20996->21042 21043 968cde 20996->21043 21044 968bea 20996->21044 21045 968a69 20996->21045 21046 968c69 20996->21046 21054 968b55 20996->21054 21058 9689df 20996->21058 21059 9689cd 20996->21059 21060 968b2a 20996->21060 20996->21107 21568 962cfe 20997->21568 21097 96c917 GetCurrentProcess OpenProcessToken 20998->21097 21098 96c904 20998->21098 21180 9642b4 20999->21180 21491 9645a3 21000->21491 21505 96467a 21001->21505 21775 96d1e1 21002->21775 21219 962d6c 21003->21219 21711 966c1f GetTickCount 21004->21711 21483 9646c9 21005->21483 21390 966364 21006->21390 21766 962110 21007->21766 21687 961092 21008->21687 21704 96113a 21009->21704 21536 96d657 21010->21536 21297 969031 21011->21297 21401 963290 21012->21401 21600 96816f 21013->21600 21231 9676cb htonl 21014->21231 21267 96c958 21015->21267 21576 9646fc 21016->21576 21588 964785 21017->21588 21520 963430 GetTickCount 21018->21520 21798 9632ba 21019->21798 21339 967e10 21020->21339 21727 968081 21021->21727 21623 963983 21022->21623 21644 96309f 21023->21644 21608 962dff 21024->21608 21542 963873 21025->21542 21235 96770d htonl htons htonl 21026->21235 21327 968f58 21027->21327 21405 96cbdc 21028->21405 21256 966522 21029->21256 21369 9661ea 21030->21369 21227 96b2d7 21031->21227 21676 967d4b 21032->21676 21152 962d1d 21033->21152 21753 964d5c 21034->21753 21551 9650a1 21035->21551 21158 962cc3 21036->21158 21449 96480c 21037->21449 21429 967db0 21038->21429 21162 96319e 21039->21162 21239 967317 21040->21239 21345 962efc 21041->21345 21433 963374 GetTickCount 21042->21433 21731 964e1b 21043->21731 21548 966873 21044->21548 21251 964f0d htons 21045->21251 21670 967e49 21046->21670 21418 967cda 21054->21418 21132 964c04 21058->21132 21122 964cb7 21059->21122 21396 964f5d htons 21060->21396 21097->21098 21109 96c92e 21097->21109 21802 96c86b 21098->21802 21107->19972 21111 96c936 21109->21111 21112 96c94e 21109->21112 21123 964cc5 _memset ___DllMainCRTStartup 21122->21123 21124 964cd6 GetStartupInfoA 21123->21124 21811 96b46f 21124->21811 21133 964c1c ___DllMainCRTStartup 21132->21133 21134 967018 ___DllMainCRTStartup htonl 21133->21134 21135 964c28 21134->21135 21153 962d2c ___DllMainCRTStartup 21152->21153 21154 962d52 21152->21154 21155 967018 ___DllMainCRTStartup htonl 21153->21155 21154->21107 21159 962cd4 _strncpy 21158->21159 21160 962cfc 21158->21160 21161 962ce4 SetCurrentDirectoryA 21159->21161 21160->21107 21161->21160 21163 977001 _malloc 67 API calls 21162->21163 21165 9631b1 ___DllMainCRTStartup 21163->21165 21181 966f84 ___DllMainCRTStartup 67 API calls 21180->21181 21182 9642c7 ___DllMainCRTStartup 21181->21182 21220 97ed20 _memset 21219->21220 21221 962d87 GetStartupInfoA 21220->21221 21228 96b2ee 21227->21228 21229 966f84 ___DllMainCRTStartup 67 API calls 21228->21229 21230 96b302 _memset _memcpy_s ___DllMainCRTStartup 21228->21230 21229->21230 21230->21107 21233 9676ec 21231->21233 21232 967708 21232->21107 21233->21232 22381 96752f GetTickCount 21233->22381 21238 967761 _memcpy_s 21235->21238 21236 9677ae 21236->21107 21238->21236 22389 9675f5 GetTickCount 21238->22389 21240 967018 ___DllMainCRTStartup htonl 21239->21240 21241 967328 21240->21241 21252 964cb7 ___DllMainCRTStartup 218 API calls 21251->21252 21253 964f38 htons 21252->21253 21254 9612d0 ___DllMainCRTStartup 126 API calls 21253->21254 21257 966543 htonl 21256->21257 21258 96652f ___DllMainCRTStartup 21256->21258 21264 966561 ___DllMainCRTStartup 21257->21264 21260 977001 _malloc 67 API calls 21258->21260 21259 966609 21259->21107 21261 96653d 21260->21261 21261->21257 21264->21259 21265 9612d0 ___DllMainCRTStartup 126 API calls 21264->21265 21265->21264 21268 96c974 21267->21268 21269 96c97e htonl 21267->21269 21268->21269 21279 96c9ba 21268->21279 21270 96c98d htonl 21269->21270 21271 96c998 21269->21271 21270->21271 21279->21107 21298 969057 _memset ___DllMainCRTStartup 21297->21298 21299 967018 ___DllMainCRTStartup htonl 21298->21299 21328 968f7c ___DllMainCRTStartup 21327->21328 21329 967018 ___DllMainCRTStartup htonl 21328->21329 21340 967e1c 21339->21340 21343 967e22 21339->21343 21342 976f24 ___endstdio 67 API calls 21340->21342 21341 977001 _malloc 67 API calls 21342->21343 21343->21341 21346 966f84 ___DllMainCRTStartup 67 API calls 21345->21346 21347 962f0f ___DllMainCRTStartup 21346->21347 21370 966209 _memset ___DllMainCRTStartup 21369->21370 21371 967018 ___DllMainCRTStartup htonl 21370->21371 21391 966380 ___DllMainCRTStartup 21390->21391 21392 96705b ___DllMainCRTStartup htons 21391->21392 21397 964c04 ___DllMainCRTStartup 185 API calls 21396->21397 21398 964f83 htons 21397->21398 21402 9632a5 ___DllMainCRTStartup 21401->21402 21403 967018 ___DllMainCRTStartup htonl 21402->21403 21406 966f84 ___DllMainCRTStartup 67 API calls 21405->21406 21407 96cbef ___DllMainCRTStartup 21406->21407 21419 967cf1 ___DllMainCRTStartup 21418->21419 21420 96705b ___DllMainCRTStartup htons 21419->21420 21430 967dcd ___DllMainCRTStartup 21429->21430 21431 96705b ___DllMainCRTStartup htons 21430->21431 21434 96339f ___DllMainCRTStartup 21433->21434 21435 96716e ___DllMainCRTStartup htonl 21434->21435 21450 977001 _malloc 67 API calls 21449->21450 21451 964823 _memset ___DllMainCRTStartup 21450->21451 21484 9646df ___DllMainCRTStartup 21483->21484 22561 967107 21484->22561 21492 9645b8 ___DllMainCRTStartup 21491->21492 21493 961683 ___DllMainCRTStartup 67 API calls 21492->21493 21506 964690 ___DllMainCRTStartup 21505->21506 21507 967107 ___DllMainCRTStartup 67 API calls 21506->21507 21508 96469c 21507->21508 21521 96345f ___DllMainCRTStartup 21520->21521 21522 96712a ___DllMainCRTStartup htonl 21521->21522 21537 96d66d ___DllMainCRTStartup 21536->21537 21538 96705b ___DllMainCRTStartup htons 21537->21538 21543 963885 _memcpy_s 21542->21543 21544 9638e2 21542->21544 21545 963895 CreateNamedPipeA 21543->21545 21544->21107 21545->21544 22655 966772 GetTickCount GetTickCount 21548->22655 21552 966f84 ___DllMainCRTStartup 67 API calls 21551->21552 21553 9650b1 ___DllMainCRTStartup 21552->21553 21569 987516 __setmbcp 21568->21569 21570 978fdb __lock 67 API calls 21569->21570 21577 966f84 ___DllMainCRTStartup 67 API calls 21576->21577 21578 96470f ___DllMainCRTStartup 21577->21578 21589 966f84 ___DllMainCRTStartup 67 API calls 21588->21589 21590 964798 ___DllMainCRTStartup 21589->21590 21601 968184 ___DllMainCRTStartup 21600->21601 21602 967018 ___DllMainCRTStartup htonl 21601->21602 21609 97ed20 _memset 21608->21609 21610 962e18 GetStartupInfoA 21609->21610 21624 961683 ___DllMainCRTStartup 67 API calls 21623->21624 21625 963997 21624->21625 21645 966f84 ___DllMainCRTStartup 67 API calls 21644->21645 21646 9630b2 ___DllMainCRTStartup 21645->21646 21647 96712a ___DllMainCRTStartup htonl 21646->21647 21671 967e97 21670->21671 21672 967e5b ___DllMainCRTStartup 21670->21672 21671->21107 21673 96705b ___DllMainCRTStartup htons 21672->21673 21677 967d62 ___DllMainCRTStartup 21676->21677 21678 96705b ___DllMainCRTStartup htons 21677->21678 21688 966f84 ___DllMainCRTStartup 67 API calls 21687->21688 21689 9610a5 ___DllMainCRTStartup 21688->21689 21705 977001 _malloc 67 API calls 21704->21705 21706 961154 21705->21706 21712 966c47 ___DllMainCRTStartup 21711->21712 21713 96705b ___DllMainCRTStartup htons 21712->21713 21728 968096 ___DllMainCRTStartup 21727->21728 21729 967018 ___DllMainCRTStartup htonl 21728->21729 21732 966f84 ___DllMainCRTStartup 67 API calls 21731->21732 21733 964e2e ___DllMainCRTStartup 21732->21733 21754 964d74 ___DllMainCRTStartup 21753->21754 21755 967018 ___DllMainCRTStartup htonl 21754->21755 21767 961b63 ___DllMainCRTStartup 147 API calls 21766->21767 21768 962128 21767->21768 21769 96216d 21768->21769 21770 961fa2 ___DllMainCRTStartup 129 API calls 21768->21770 21769->21107 21776 96d1f1 21775->21776 21777 96d1fb ___DllMainCRTStartup 21775->21777 23022 96cd5c 21776->23022 21779 967018 ___DllMainCRTStartup htonl 21777->21779 21799 9632d0 ___DllMainCRTStartup 21798->21799 21800 967018 ___DllMainCRTStartup htonl 21799->21800 21803 96c7aa ___DllMainCRTStartup 105 API calls 21802->21803 22656 966791 CreateFileA 22655->22656 22671 9667e0 22655->22671 22657 9667b2 GetLastError 22656->22657 22658 96680d SetNamedPipeHandleState 22656->22658 22659 9667ea GetLastError 22671->22658 22671->22659 23134 964479 htonl 23133->23134 23135 964469 23133->23135 23137 964490 23134->23137 23136 977001 _malloc 67 API calls 23135->23136 23139 964473 23136->23139 23138 9644bc 23137->23138 23145 97833c 23137->23145 23141 9612d0 ___DllMainCRTStartup 126 API calls 23138->23141 23139->23134 23142 9644d3 23141->23142 23154 9782a6 23145->23154 23155 9782b2 __setmbcp 23154->23155 23313 966003 23312->23313 23314 965ffe 23312->23314 23313->23314 23323 966883 23313->23323 23314->19994 23319 96605e PeekNamedPipe 23318->23319 23320 966074 23319->23320 23321 96606f 23319->23321 23320->23321 23322 96607d ReadFile 23320->23322 23321->19994 23322->23319 23324 966892 ReadFile 23323->23324 23326 96601c 23323->23326 23324->23326 23326->23314 23339 96b1f2 ___DllMainCRTStartup 23338->23339 23340 96705b ___DllMainCRTStartup htons 23339->23340 23344 96b217 _memcpy_s ___DllMainCRTStartup 23340->23344 23341 96b2bc _memset 23341->19792 23342 96705b htons ___DllMainCRTStartup 23342->23344 23343 967018 ___DllMainCRTStartup htonl 23343->23344 23344->23341 23344->23342 23344->23343 23346 96ae47 23345->23346 23348 96ae5c ___DllMainCRTStartup 23345->23348 23346->23348 23349 978789 23346->23349 23348->19800 23350 9787a7 23349->23350 23351 978797 23349->23351 23353 978674 23350->23353 23351->23346 23354 9785ed _LocaleUpdate::_LocaleUpdate 77 API calls 23353->23354 23355 978689 23354->23355 23356 9786e9 23355->23356 23357 978695 23355->23357 23359 97fe9a __isleadbyte_l 77 API calls 23356->23359 23361 97870e 23356->23361 23363 9786ad 23357->23363 23365 97fee5 23357->23365 23359->23361 23360 978d72 __wcsnicoll 67 API calls 23362 978714 23360->23362 23361->23360 23361->23362 23364 97fe55 ___crtLCMapStringA 102 API calls 23362->23364 23363->23351 23364->23363 23366 9785ed _LocaleUpdate::_LocaleUpdate 77 API calls 23365->23366 23367 97fef9 23366->23367 23368 97ff06 23367->23368 23369 97fe9a __isleadbyte_l 77 API calls 23367->23369 23368->23363 23370 97ff2e 23369->23370 23371 982c98 ___crtGetStringTypeA 91 API calls 23370->23371 23371->23368 23372 391047e 23373 3910438 4 API calls 23372->23373 23374 391048b 23373->23374 23375 3910401 4 API calls 23374->23375 23376 3910497 23375->23376

              Control-flow Graph

              APIs
              • _memset.LIBCMT ref: 009629AC
              • __snprintf.LIBCMT ref: 009629D3
                • Part of subcall function 009682E1: _memset.LIBCMT ref: 00968302
              • __snprintf.LIBCMT ref: 00962A1A
              • __snprintf.LIBCMT ref: 00962A31
              • HttpOpenRequestA.WININET(00000000,?,00000000,00000000,0098F540), ref: 00962A61
              • HttpSendRequestA.WININET(00000000,?,?,00962B4C,?), ref: 00962A8A
              • InternetCloseHandle.WININET(00000000), ref: 00962AA7
              • InternetQueryDataAvailable.WININET(00000000,00961544,00000000,00000000), ref: 00962AB8
              • InternetReadFile.WININET(00000000,?,00001000,?), ref: 00962AE6
              • InternetCloseHandle.WININET(00000000), ref: 00962B06
              • InternetCloseHandle.WININET(00000000), ref: 00962B27
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: Internet$CloseHandle__snprintf$HttpRequest_memset$AvailableDataFileOpenQueryReadSend
              • String ID: %s%s$*/*
              • API String ID: 2581463937-856325523
              • Opcode ID: 694fcbf1ca210630e6582c6d824939f76d1f442d900c5206ededbc3c4b34a4b2
              • Instruction ID: f68a13d289ff4bd6fb4d58e8d677d3df42af7704e28a6de3eb7dafa22e1f14a4
              • Opcode Fuzzy Hash: 694fcbf1ca210630e6582c6d824939f76d1f442d900c5206ededbc3c4b34a4b2
              • Instruction Fuzzy Hash: CE51BC72904109BFCF12AFA8EC85EFEBBBDEF45714F14446AF524A2290DA3199049B61

              Control-flow Graph

              APIs
                • Part of subcall function 00966F84: _malloc.LIBCMT ref: 00966F8A
                • Part of subcall function 00966F84: _malloc.LIBCMT ref: 00966F9A
              • GetUserNameA.ADVAPI32(?,?), ref: 00966D36
              • GetComputerNameA.KERNEL32(?,?), ref: 00966D46
              • GetModuleFileNameA.KERNEL32(00000000,?,00000100,?,?,?,?,?,?,?,?,?,00000000), ref: 00966D5A
              • _strrchr.LIBCMT ref: 00966D69
              • GetVersionExA.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,00000000), ref: 00966D84
              • __snprintf.LIBCMT ref: 00966DF0
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: Name$_malloc$ComputerFileModuleUserVersion__snprintf_strrchr
              • String ID: %s%s%s
              • API String ID: 1877169212-1891519693
              • Opcode ID: 5c738f342313c031734f86322efffb8ec162db67875274b397a26dccdac3a0f7
              • Instruction ID: 8ceb4388a18d3d090fbdd48f769a2d57e30d6e3c7e9fc8f1187e6d8ddfbddae4
              • Opcode Fuzzy Hash: 5c738f342313c031734f86322efffb8ec162db67875274b397a26dccdac3a0f7
              • Instruction Fuzzy Hash: 3D418475D08209BFDF116FA0DC4AEBEBFB9EF85350F104056F504A6292EB359A50EB60

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 495 96d7aa-96d7d1 CryptAcquireContextA 496 96d7d3-96d7e4 CryptAcquireContextA 495->496 497 96d7ea-96d7fd CryptGenRandom 495->497 496->497 498 96d7e6-96d7e9 496->498 499 96d80e-96d810 497->499 500 96d7ff-96d80c CryptReleaseContext 497->500 499->500 500->498
              APIs
              • CryptAcquireContextA.ADVAPI32(00000000,00000000,Microsoft Base Cryptographic Provider v1.0,00000001,F0000020,00000000,00000000,?,?,0096D820,?,00966E58,?,00966E58,?), ref: 0096D7CD
              • CryptAcquireContextA.ADVAPI32(00000000,00000000,Microsoft Base Cryptographic Provider v1.0,00000001,F0000028,?,?,0096D820,?,00966E58,?,00966E58,?), ref: 0096D7E0
              • CryptGenRandom.ADVAPI32(00000000,00966E58,?,?,?,0096D820,?,00966E58,?,00966E58,?), ref: 0096D7F4
              • CryptReleaseContext.ADVAPI32(00000000,00000000,?,?,0096D820,?,00966E58,?,00966E58,?), ref: 0096D804
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: Crypt$Context$Acquire$RandomRelease
              • String ID: Microsoft Base Cryptographic Provider v1.0
              • API String ID: 685801729-291530887
              • Opcode ID: 4554082547c7ff1043a8122728ce60a4b39f1db58be8dcdb7f876cd2a4b5d15e
              • Instruction ID: f53a5f8145536727e887e6ed68b4c220273c4beaed93fbd1064c8829d3079863
              • Opcode Fuzzy Hash: 4554082547c7ff1043a8122728ce60a4b39f1db58be8dcdb7f876cd2a4b5d15e
              • Instruction Fuzzy Hash: 0EF0AF76A45218F7DF208B91CD09FDF7B7DEB45751F200020FA01E2190C6719A00A7A0
              Memory Dump Source
              • Source File: 00000000.00000002.2937237770.0000000003910000.00000020.00001000.00020000.00000000.sdmp, Offset: 03910000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_3910000_loaddll32.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 76238dbd0442da84bde43e65ac94f93f3842ea98458fa3857e84c3016f132bc2
              • Instruction ID: 922ce7de32c54f9caacf08a3d62bfd2dba0eff49d37f2d81070e39fef133f8a7
              • Opcode Fuzzy Hash: 76238dbd0442da84bde43e65ac94f93f3842ea98458fa3857e84c3016f132bc2
              • Instruction Fuzzy Hash: 87E026313043085BDB45E624AC814B97389E7C0210F900068EA1557384F9735CB4F2A2

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 47 961b63-961c15 call 96ae21 call 966fff call 967018 * 2 call 9670ae * 7 70 961c17-961c2a 47->70 71 961c2c-961c30 47->71 72 961c33-961c41 70->72 71->72 73 961c52 72->73 74 961c43-961c50 72->74 75 961c54-961c5b 73->75 74->75 76 961c6c 75->76 77 961c5d-961c6a 75->77 78 961c6e-961c75 76->78 77->78 79 961c86 78->79 80 961c77-961c84 78->80 81 961c88-961c8f 79->81 80->81 82 961ca0 81->82 83 961c91-961c9e 81->83 84 961ca2-961ca9 82->84 83->84 85 961cba 84->85 86 961cab-961cb8 84->86 87 961cbc-961cc3 85->87 86->87 88 961cd4 87->88 89 961cc5-961cd2 87->89 90 961cd6-961cdf 88->90 89->90 91 961ce7-961cfc call 96ae16 90->91 92 961ce1-961ce3 90->92 96 961cfe-961d04 91->96 97 961d0a-961d1d call 961a64 91->97 92->91 94 961ce5 92->94 94->91 96->97 98 961dc9-961dcf 96->98 104 961d80-961d8e call 96ae16 call 96bd3c 97->104 105 961d1f-961d27 97->105 101 961dd1-961dd7 98->101 102 961ddd-961e1a call 97db30 call 97ed20 call 961924 98->102 101->102 127 961e5f-961e64 102->127 128 961e1c-961e4a call 97db30 call 97ed20 102->128 120 961d93-961d95 104->120 108 961d4f-961d53 105->108 109 961d29-961d32 call 96c32c 105->109 108->104 110 961d55-961d69 HeapCreate 108->110 122 961d34-961d4d call 96c3c5 call 96c2c9 109->122 123 961d9a 109->123 114 961d9c-961da3 110->114 115 961d6b-961d7e HeapAlloc 110->115 114->98 121 961da5-961dc4 GetLastError call 96247f 114->121 115->114 120->123 132 961f9e-961fa1 121->132 122->123 123->114 134 961e66-961e94 call 97db30 call 97ed20 127->134 135 961ea9-961eae 127->135 155 961e4c-961e59 128->155 156 961e5b 128->156 160 961e96-961ea3 134->160 161 961ea5 134->161 138 961ef3-961ef8 135->138 139 961eb0-961ede call 97db30 call 97ed20 135->139 142 961f3d-961f42 138->142 143 961efa-961f28 call 97db30 call 97ed20 138->143 170 961ee0-961eed 139->170 171 961eef 139->171 148 961f44-961f68 call 97ed20 142->148 149 961f6b-961f70 142->149 173 961f2a-961f37 143->173 174 961f39 143->174 148->149 158 961f72-961f98 call 97db30 call 97ed20 149->158 159 961f9b-961f9d 149->159 164 961e5d 155->164 156->164 158->159 159->132 168 961ea7 160->168 161->168 164->127 168->135 175 961ef1 170->175 171->175 177 961f3b 173->177 174->177 175->138 177->142
              APIs
                • Part of subcall function 00967018: htonl.WS2_32(89009A17), ref: 0096702E
              • GetLastError.KERNEL32(?,00000000,00000080,00964B37,009959A8,00000000), ref: 00961DA5
                • Part of subcall function 0096C3C5: GetCurrentProcess.KERNEL32(000F003F,00000000,00000000,?,00000000,00000001,00000000,DDF4A353,00000000,?,?,00961D3F,00000000,000F003F,?,00000000), ref: 0096C434
              • _memset.LIBCMT ref: 00961DF3
              • _memset.LIBCMT ref: 00961E35
              • _memset.LIBCMT ref: 00961E7F
              • _memset.LIBCMT ref: 00961EC9
              • _memset.LIBCMT ref: 00961F13
              • _memset.LIBCMT ref: 00961F63
              • _memset.LIBCMT ref: 00961F8B
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: _memset$CurrentErrorLastProcesshtonl
              • String ID:
              • API String ID: 4245727424-0
              • Opcode ID: 68c9849b0438a6520a86867794098ac258168e68de574e46daa678439c0b74aa
              • Instruction ID: c949db661059b73e5254c6fabb508e9b61a1e89a253b3e02f2f986240a9224e5
              • Opcode Fuzzy Hash: 68c9849b0438a6520a86867794098ac258168e68de574e46daa678439c0b74aa
              • Instruction Fuzzy Hash: 6BD1BFB2A107019FD7209F69DC81A2BB7F9FF883047188C3EF196C6A52E235F9559B10

              Control-flow Graph

              APIs
              • GetACP.KERNEL32(00000000,00000000,00000080,?,?,?,?,?,?,?,?,009614A7,00000000,00000000), ref: 00966E31
              • GetOEMCP.KERNEL32(?,?,?,?,?,?,?,?,009614A7,00000000,00000000), ref: 00966E3D
              • GetCurrentProcessId.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,009614A7,00000000), ref: 00966E6A
              • GetTickCount.KERNEL32 ref: 00966E6E
                • Part of subcall function 0097740A: __getptd.LIBCMT ref: 0097740F
              • GetCurrentProcess.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,009614A7,00000000), ref: 00966E9B
              • GetCurrentProcessId.KERNEL32(?,?,?,?,?,?,?,?,?,?,009614A7,00000000), ref: 00966F01
              • _memset.LIBCMT ref: 00966F38
              • _memset.LIBCMT ref: 00966F77
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: CurrentProcess$_memset$CountTick__getptd
              • String ID:
              • API String ID: 3908538216-0
              • Opcode ID: 4c64baf91e8cc2af5f4a506b5d7e77bb374641a713544ff93857d765d1c18454
              • Instruction ID: eb8bcacd473a48372a22ab798e5bcd9332923fd371b4657e60aaf138e5d4928e
              • Opcode Fuzzy Hash: 4c64baf91e8cc2af5f4a506b5d7e77bb374641a713544ff93857d765d1c18454
              • Instruction Fuzzy Hash: DE313B76C08208BADB117BB4EC4AFEE3FACDF85320F144416F504AB192DE38D944A761

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 274 96131c-96140e call 966f84 call 967086 * 2 call 96ae2c call 96ae16 call 96ae21 call 96ae2c * 2 call 977001 call 96ae21 * 3 call 96ae16 call 96b530 call 96d265 * 2 call 96355f 309 961415-961428 call 96ae21 call 9635a2 274->309 310 961410 call 96c690 274->310 316 96142f-961436 call 9635bd 309->316 317 96142a call 96c690 309->317 310->309 321 96143d-961444 call 963618 316->321 322 961438 call 96c690 316->322 317->316 326 961446 call 96c690 321->326 327 96144b-96147b call 96ae16 call 96ae21 call 977001 321->327 322->321 326->327 335 961482-9614af call 96ae21 call 96d265 call 96ae21 call 966e28 327->335 336 96147d call 96c690 327->336 346 9614b5-9614ba 335->346 347 96166d-961682 call 976f24 call 96c690 335->347 336->335 349 9614be-96154d call 96b8bd call 977156 call 96b8bd call 977156 * 2 call 962506 call 96ae21 call 962b35 346->349 369 96154f-96155f call 96a7fe 349->369 370 96157d-961582 349->370 379 961570-961575 369->379 380 961561-96156e call 968f03 369->380 371 9615e7 370->371 372 961584 call 967c7d 370->372 376 9615ef-9615fb call 96263a call 96355f 371->376 378 961589-961593 call 96ae21 372->378 390 961602-961616 call 96b8e7 376->390 391 9615fd call 96c690 376->391 388 961595-96159a 378->388 389 96159c 378->389 379->370 380->370 392 9615a1-9615b8 call 96453c call 966619 call 965f36 call 96355f 388->392 389->392 398 96161d-961625 390->398 399 961618 call 96c690 390->399 391->390 419 9615bf-9615c5 392->419 420 9615ba call 962caf 392->420 398->347 402 961627-96162e 398->402 399->398 405 961630-96163e 402->405 406 961659-96165a call 964a81 402->406 409 961640 call 962d07 405->409 410 961651 405->410 413 96165f-961667 406->413 415 961645-96164f 409->415 412 961653-961655 410->412 412->406 417 961657 412->417 413->347 418 9614bc 413->418 415->412 417->406 418->349 419->376 422 9615c7-9615e5 call 96263a call 962506 call 962728 419->422 420->419 422->376
              APIs
                • Part of subcall function 00966F84: _malloc.LIBCMT ref: 00966F8A
                • Part of subcall function 00966F84: _malloc.LIBCMT ref: 00966F9A
              • _malloc.LIBCMT ref: 009613A4
                • Part of subcall function 00977001: __FF_MSGBANNER.LIBCMT ref: 00977024
                • Part of subcall function 00977001: __NMSG_WRITE.LIBCMT ref: 0097702B
                • Part of subcall function 00977001: RtlAllocateHeap.NTDLL(00000000,-0000000F,00000001,00000000,00000000,?,00980019,00000000,00000001,00000000,?,00978F65,00000018,009916F8,0000000C,00978FF6), ref: 00977078
                • Part of subcall function 0096D265: _malloc.LIBCMT ref: 0096D28C
                • Part of subcall function 0096D265: _memset.LIBCMT ref: 0096D2BA
                • Part of subcall function 0096D265: _realloc.LIBCMT ref: 0096D29B
              • _malloc.LIBCMT ref: 0096146D
              • __snprintf.LIBCMT ref: 009614D6
              • __snprintf.LIBCMT ref: 009614F4
              • __snprintf.LIBCMT ref: 00961512
                • Part of subcall function 0096C690: Sleep.KERNEL32(000003E8,00000000,00000000,00000080,0096167C), ref: 0096C6C8
                • Part of subcall function 0096C690: ExitThread.KERNEL32 ref: 0096C6D2
                • Part of subcall function 00968F03: htonl.WS2_32(00000000), ref: 00968F1A
                • Part of subcall function 00968F03: htonl.WS2_32(?), ref: 00968F23
                • Part of subcall function 00968F03: _memset.LIBCMT ref: 00968F4C
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: _malloc$__snprintf$_memsethtonl$AllocateExitHeapSleepThread_realloc
              • String ID: /OWA/
              • API String ID: 281750196-1837399179
              • Opcode ID: 6014d88288996bb3096a70ae9efa88dbb896f32edda35917a2ca304518c8309d
              • Instruction ID: 01a35ff62a86c66fea0348c883ce804297af46a4897b37331ceebfc6165ea369
              • Opcode Fuzzy Hash: 6014d88288996bb3096a70ae9efa88dbb896f32edda35917a2ca304518c8309d
              • Instruction Fuzzy Hash: F581E1B19083016AD7217BB5DC03B2FBAE8AFC4350F14482EF5959A1D2EE76C9409B67

              Control-flow Graph

              APIs
              • InternetOpenA.WININET(0096152B,00000003,00000000,00000000,00000000), ref: 00962587
              • InternetSetOptionA.WININET(00000005,0003A980,00000004), ref: 009625A6
              • InternetSetOptionA.WININET(00000006,0003A980,00000004), ref: 009625B6
              • InternetConnectA.WININET(?,?,00000000,00000000,00000003,00000000), ref: 009625CF
              • InternetSetOptionA.WININET(00000000,0000002B,00000000,00000000), ref: 00962600
              • InternetSetOptionA.WININET(0000002C,00000000,00000000), ref: 0096261C
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: Internet$Option$ConnectOpen
              • String ID:
              • API String ID: 230958251-0
              • Opcode ID: f5ba2432ee57ae3e69dec9323644031418555aa9c7872f314f8d584b9f9ef63f
              • Instruction ID: 72b622f5b591654219b7bb3153240d2f66d6aad94c09eff00616bb3578dce029
              • Opcode Fuzzy Hash: f5ba2432ee57ae3e69dec9323644031418555aa9c7872f314f8d584b9f9ef63f
              • Instruction Fuzzy Hash: FA31B671258644B6EB357B65EC0EF7B3F2DE7D1B10F10401AF601AD0E1DAB68D40EAA5

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 464 967b2d-967b4a 465 967b5c-967b5e 464->465 466 967b4c-967b51 call 977001 464->466 467 967b64 465->467 468 967c75-967c7c 465->468 470 967b56-967b57 466->470 471 967b69-967b6d 467->471 470->465 472 967b73-967b7b 471->472 473 967c6a-967c6f 471->473 474 967b7d-967bb5 htonl recvfrom 472->474 475 967bea-967c0c htonl ioctlsocket 472->475 473->468 473->471 476 967bb7-967bc2 WSAGetLastError 474->476 477 967bce-967bd0 474->477 478 967c11-967c14 475->478 479 967c0e 475->479 476->473 480 967bc8-967bcc 476->480 477->473 481 967bd6-967be8 477->481 482 967c36-967c37 478->482 483 967c16-967c1a 478->483 479->478 484 967c38-967c4a call 9612d0 480->484 485 967c5f-967c67 call 9612d0 481->485 482->484 483->473 486 967c1c-967c34 call 9671b0 483->486 484->473 485->473 486->482 493 967c4c-967c51 486->493 493->473 494 967c53-967c59 493->494 494->485
              APIs
              • _malloc.LIBCMT ref: 00967B51
                • Part of subcall function 00977001: __FF_MSGBANNER.LIBCMT ref: 00977024
                • Part of subcall function 00977001: __NMSG_WRITE.LIBCMT ref: 0097702B
                • Part of subcall function 00977001: RtlAllocateHeap.NTDLL(00000000,-0000000F,00000001,00000000,00000000,?,00980019,00000000,00000001,00000000,?,00978F65,00000018,009916F8,0000000C,00978FF6), ref: 00977078
              • htonl.WS2_32(?), ref: 00967B7D
              • recvfrom.WS2_32(00000000,?,000FFFFC,00000000,000000FF,?), ref: 00967BAC
              • WSAGetLastError.WS2_32 ref: 00967BB7
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: AllocateErrorHeapLast_mallochtonlrecvfrom
              • String ID:
              • API String ID: 987280018-0
              • Opcode ID: 35c78945855f4a7d04d2b665ab01487bbcca7cb78ae6d6bfa35b8122b92aa427
              • Instruction ID: a93b60817bda6f6de29bfd5784fa2cda71b4228eeec4bcf809035cb5c3c1a98a
              • Opcode Fuzzy Hash: 35c78945855f4a7d04d2b665ab01487bbcca7cb78ae6d6bfa35b8122b92aa427
              • Instruction Fuzzy Hash: 3441E471818204EFDB21DFB4DD81B6EB7B8FBA4329F20462AE551A23A0E3355905AB14

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 501 962c13-962c42 call 962b66 WSASocketA 504 962c44-962c46 501->504 505 962c48-962c6a WSAIoctl 501->505 506 962caa-962cae 504->506 507 962c6c-962c76 505->507 508 962c78-962c7c 505->508 507->508 509 962ca0-962ca7 closesocket 508->509 510 962c7e 508->510 509->506 511 962c84-962c89 510->511 512 962c90-962c96 511->512 513 962c8b-962c8e 511->513 512->511 515 962c98 512->515 513->512 514 962c9a-962c9d 513->514 514->509 515->509
              APIs
                • Part of subcall function 00962B66: WSAStartup.WS2_32(00000202,?), ref: 00962B87
                • Part of subcall function 00962B66: WSACleanup.WS2_32 ref: 00962B91
              • WSASocketA.WS2_32(00000002,00000002,00000000,00000000,00000000,00000000), ref: 00962C37
              • WSAIoctl.WS2_32(00000000,4004747F,00000000,00000000,?,000005F0,?,00000000,00000000), ref: 00962C62
              • closesocket.WS2_32(00000000), ref: 00962CA1
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: CleanupIoctlSocketStartupclosesocket
              • String ID:
              • API String ID: 1100289767-0
              • Opcode ID: 5eb2382e751910c73f80fbc38864250f328728d4d320ef493893dc129938c450
              • Instruction ID: cbb5e0e054a39ec25b3129212112d39ed6a33fb726d6b9e000a142bd0dc78ceb
              • Opcode Fuzzy Hash: 5eb2382e751910c73f80fbc38864250f328728d4d320ef493893dc129938c450
              • Instruction Fuzzy Hash: 7E11C671A045287FE7208B65DC89FFF7FADEFC57B1F1080A2FA45D6181D63889418AA0

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 516 96bd3c-96bd50 517 96bd56-96bd5e 516->517 518 96bddb-96bde4 516->518 521 96bd60-96bd66 517->521 522 96bd68-96bd6b 517->522 519 96bde6-96bdec VirtualAlloc 518->519 520 96bdee-96bdf1 VirtualAllocEx 518->520 523 96bdf7-96bdfa 519->523 520->523 521->522 524 96bd75-96bd83 521->524 522->518 525 96bd6d-96bd73 522->525 526 96bd85 GetCurrentProcess 524->526 527 96bd8b-96bd94 524->527 525->518 525->524 526->527 528 96bd96-96bda6 527->528 529 96bda8-96bdcf call 976e43 527->529 533 96bdd2-96bdd4 528->533 529->533 533->518 534 96bdd6-96bdd9 533->534 534->523
              APIs
              • GetCurrentProcess.KERNEL32(00000180,?,?,?,?,00961D93,00000000,00000180,?,00000000,00000080,00964B37,009959A8,00000000), ref: 0096BD85
              • VirtualAlloc.KERNELBASE(00000000,00961D93,00003000,00000000,00000180,?,?,?,?,00961D93,00000000,00000180,?,00000000,00000080,00964B37), ref: 0096BDE6
              • VirtualAllocEx.KERNEL32(00000000,00000000,00961D93,00003000,00000000,00000180,?,?,?,?,00961D93,00000000,00000180,?,00000000,00000080), ref: 0096BDF1
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: AllocVirtual$CurrentProcess
              • String ID:
              • API String ID: 3337257186-0
              • Opcode ID: c7326c892a7c6426fb01ce7bc64155e14cb71e313dd97f75b7d57ad7ef539839
              • Instruction ID: f765f78a07db0e9b77e1932f15236088c1160da01ec792b5ada87cec94291116
              • Opcode Fuzzy Hash: c7326c892a7c6426fb01ce7bc64155e14cb71e313dd97f75b7d57ad7ef539839
              • Instruction Fuzzy Hash: FD2129B5828108FFCB25CF95DC988EA7B7CEB55350B20411AF446CA290E7309E80EB60

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 535 96bdfb-96be08 536 96be0e-96be16 535->536 537 96be8f-96be99 535->537 540 96be20-96be23 536->540 541 96be18-96be1e 536->541 538 96bea3-96bead VirtualProtectEx 537->538 539 96be9b-96bea2 VirtualProtect 537->539 540->537 543 96be25-96be2b 540->543 541->540 542 96be2d-96be3b 541->542 544 96be43-96be4c 542->544 545 96be3d GetCurrentProcess 542->545 543->537 543->542 546 96be4e-96be5d 544->546 547 96be5f-96be85 call 976e4f 544->547 545->544 551 96be88-96be8a 546->551 547->551 551->537 552 96be8c-96be8e 551->552
              APIs
              • GetCurrentProcess.KERNEL32(?,?,?,00961ADD,00000000,?,00000000,00000000,00000001,?,?,0096C6B4,00000000,00000001,00000000,00000000), ref: 0096BE3D
              • VirtualProtect.KERNELBASE(00000000,?,00000000,0096167C,?,?,?,00961ADD,00000000,?,00000000,00000000,00000001,?,?,0096C6B4), ref: 0096BE9B
              • VirtualProtectEx.KERNEL32(00000000,00000000,?,00000000,0096167C,?,?,?,00961ADD,00000000,?,00000000,00000000,00000001), ref: 0096BEA6
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: ProtectVirtual$CurrentProcess
              • String ID:
              • API String ID: 473988918-0
              • Opcode ID: d3b7863ca9a4881ad9bfdca45209ff1feafbfb6febd81362e772e76d19e4f0b7
              • Instruction ID: 6e6388174d7ba71642bb195528f854be6d51a419c55c04389710c1acad5cfa51
              • Opcode Fuzzy Hash: d3b7863ca9a4881ad9bfdca45209ff1feafbfb6febd81362e772e76d19e4f0b7
              • Instruction Fuzzy Hash: 59116D75828105EFCF2ACF54EC589FA3B7DEB25355B10441EF506C2250E7319A84EBE0

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 553 966f84-966f94 call 977001 556 966f96-966f9a call 977001 553->556 557 966fcc-966fce 553->557 559 966f9f-966fa4 556->559 560 966fa6-966faf call 976f24 559->560 561 966fb1-966fc9 call 97ed20 call 966fff 559->561 566 966fcb 560->566 561->566 566->557
              APIs
              • _malloc.LIBCMT ref: 00966F8A
                • Part of subcall function 00977001: __FF_MSGBANNER.LIBCMT ref: 00977024
                • Part of subcall function 00977001: __NMSG_WRITE.LIBCMT ref: 0097702B
                • Part of subcall function 00977001: RtlAllocateHeap.NTDLL(00000000,-0000000F,00000001,00000000,00000000,?,00980019,00000000,00000001,00000000,?,00978F65,00000018,009916F8,0000000C,00978FF6), ref: 00977078
              • _malloc.LIBCMT ref: 00966F9A
              • _memset.LIBCMT ref: 00966FB7
                • Part of subcall function 00976F24: __lock.LIBCMT ref: 00976F42
                • Part of subcall function 00976F24: ___sbh_find_block.LIBCMT ref: 00976F4D
                • Part of subcall function 00976F24: ___sbh_free_block.LIBCMT ref: 00976F5C
                • Part of subcall function 00976F24: HeapFree.KERNEL32(00000000,00000000,00991598,0000000C,0097BF8F,00000000,?,00980019,00000000,00000001,00000000,?,00978F65,00000018,009916F8,0000000C), ref: 00976F8C
                • Part of subcall function 00976F24: GetLastError.KERNEL32(?,00980019,00000000,00000001,00000000,?,00978F65,00000018,009916F8,0000000C,00978FF6,00000000,00000000,?,0097C049,0000000D), ref: 00976F9D
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: Heap_malloc$AllocateErrorFreeLast___sbh_find_block___sbh_free_block__lock_memset
              • String ID:
              • API String ID: 1561657895-0
              • Opcode ID: 61534aa85420bc20a0a0e46b7215270e67d30e662735e5fb66d2e16309e5309f
              • Instruction ID: f88b78b05c6c432d7413bbc2f46c0271f6b1fcd0dccc1f0dbf77e0a54fdfd8f3
              • Opcode Fuzzy Hash: 61534aa85420bc20a0a0e46b7215270e67d30e662735e5fb66d2e16309e5309f
              • Instruction Fuzzy Hash: 28E0923720851936CA2236A9EC02FAF7E2DCFC2BB0F154825F90C5A142EA23985192E1

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 569 964afa-964b0e 570 964b14-964b3c htonl call 961b63 569->570 571 964ba3 569->571 575 964b42-964b4c call 961fa2 570->575 576 964b3e-964b40 570->576 573 964ba6-964baa 571->573 575->576 579 964b4e-964b76 call 97ed20 call 96bdfb 575->579 576->573 583 964b7b-964b7f 579->583 584 964b81-964b8a call 964ae5 583->584 585 964b8c-964ba0 call 96d265 583->585 584->576 585->571
              APIs
              • htonl.WS2_32(?), ref: 00964B23
              • _memset.LIBCMT ref: 00964B63
                • Part of subcall function 0096D265: _malloc.LIBCMT ref: 0096D28C
                • Part of subcall function 0096D265: _memset.LIBCMT ref: 0096D2BA
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: _memset$_mallochtonl
              • String ID:
              • API String ID: 188960057-0
              • Opcode ID: c2354fe097054f125e1be6cd521020a0c67145ecc547877d88b4f201ea79028f
              • Instruction ID: a0bedc1bf37d5d8cb5dfd44c202804f7b3900d0daff0412c4c8edb410c70077a
              • Opcode Fuzzy Hash: c2354fe097054f125e1be6cd521020a0c67145ecc547877d88b4f201ea79028f
              • Instruction Fuzzy Hash: 7F115E71D05218EBCF11EBE9DD42BAEBB79EF94760F100026E904B7151E7709E11ABA0

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 590 962b66-962b79 591 962ba3-962ba7 590->591 592 962b7b-962b8f WSAStartup 590->592 595 962c05-962c07 591->595 596 962ba9-962baf 591->596 593 962b91-962b98 WSACleanup call 9776de 592->593 594 962b9d 592->594 593->594 594->591 596->595 598 962bb1-962bff call 96ae21 * 2 call 96ae2c * 4 596->598 598->595
              APIs
              • WSAStartup.WS2_32(00000202,?), ref: 00962B87
              • WSACleanup.WS2_32 ref: 00962B91
                • Part of subcall function 009776DE: _doexit.LIBCMT ref: 009776EA
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: CleanupStartup_doexit
              • String ID:
              • API String ID: 3413891862-0
              • Opcode ID: b67c7b878644146c738f5580bd5c17377736e00978854ee32328682bda2a0812
              • Instruction ID: c58307a05f07932ccd96b46ba00bec7485a02031b91562a1329b55ef8b76a729
              • Opcode Fuzzy Hash: b67c7b878644146c738f5580bd5c17377736e00978854ee32328682bda2a0812
              • Instruction Fuzzy Hash: D6012231A993149BC725BFB8FC4674A77A8EB49740F00002BF1049E1E1DAB482C0EFC1

              Control-flow Graph

              APIs
                • Part of subcall function 03910525: GetCurrentProcess.KERNEL32 ref: 0391054D
              • GetCurrentProcess.KERNEL32 ref: 0391064A
              • WaitForSingleObject.KERNEL32 ref: 03910657
                • Part of subcall function 039105A6: GetCurrentProcess.KERNEL32 ref: 039105EE
              Memory Dump Source
              • Source File: 00000000.00000002.2937237770.0000000003910000.00000020.00001000.00020000.00000000.sdmp, Offset: 03910000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_3910000_loaddll32.jbxd
              Similarity
              • API ID: CurrentProcess$ObjectSingleWait
              • String ID:
              • API String ID: 1913300457-0
              • Opcode ID: 0080f5eacbb6bedecf27aa11ed33267a077c67b7822abf9fe32e21e1ad6cf542
              • Instruction ID: 0934fb41d21e9de70d083830615d8620ed3fbf4f26711f760ea681fe37637012
              • Opcode Fuzzy Hash: 0080f5eacbb6bedecf27aa11ed33267a077c67b7822abf9fe32e21e1ad6cf542
              • Instruction Fuzzy Hash: 20F0B7B9808748ABC700BF6598C45ADBBA8EE44250F015C1DE9C6AB305D67694E0CBA2
              APIs
                • Part of subcall function 009677F6: htonl.WS2_32(?), ref: 00967830
                • Part of subcall function 009677F6: select.WS2_32(00000000,?,?,?,?), ref: 00967894
                • Part of subcall function 009677F6: __WSAFDIsSet.WS2_32(00000000,?), ref: 009678B0
                • Part of subcall function 009677F6: accept.WS2_32(00000000,00000000,00000000), ref: 009678C5
                • Part of subcall function 009677F6: ioctlsocket.WS2_32(00000000,8004667E,?), ref: 009678D8
              • GetTickCount.KERNEL32 ref: 00967C8B
                • Part of subcall function 00967B2D: _malloc.LIBCMT ref: 00967B51
                • Part of subcall function 00967B2D: htonl.WS2_32(?), ref: 00967B7D
                • Part of subcall function 00967B2D: recvfrom.WS2_32(00000000,?,000FFFFC,00000000,000000FF,?), ref: 00967BAC
                • Part of subcall function 00967B2D: WSAGetLastError.WS2_32 ref: 00967BB7
              • GetTickCount.KERNEL32 ref: 00967C9E
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: CountTickhtonl$ErrorLast_mallocacceptioctlsocketrecvfromselect
              • String ID:
              • API String ID: 597769433-0
              • Opcode ID: a6269a5a6e385f80d766dcd26c3d8eddb0ccb595484ec0589c3b02d63331af12
              • Instruction ID: 8d8d4b0ca532a5cbf125dfd3756b9cd3f145af83aeea9c3dbfc1e2ca5c7d55f8
              • Opcode Fuzzy Hash: a6269a5a6e385f80d766dcd26c3d8eddb0ccb595484ec0589c3b02d63331af12
              • Instruction Fuzzy Hash: C7D0A91261D02B02950033F8AD066BEC6898EC137A738007BE402C2212ED0898831BB2
              APIs
              • _calloc.LIBCMT ref: 0096F563
                • Part of subcall function 00985190: __calloc_impl.LIBCMT ref: 009851A5
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: __calloc_impl_calloc
              • String ID:
              • API String ID: 2108883976-0
              • Opcode ID: 9c1c7ea8d892aab153fc98ac2dbcdf52535bffec6922c39ba6fd71e86401bd6c
              • Instruction ID: b952fc25c9d9b21d60367d139f77f8b34a35ed8887e7d8dc969329b22688ae62
              • Opcode Fuzzy Hash: 9c1c7ea8d892aab153fc98ac2dbcdf52535bffec6922c39ba6fd71e86401bd6c
              • Instruction Fuzzy Hash: CFA107B5900208EFDF219F94DC45FAEBBB9FF89300F20856AF505AA260D7715951DF60
              APIs
                • Part of subcall function 0096C4F4: GetCurrentProcess.KERNEL32(?,00000000,00000000,0000001C,00000000,?,?,?,00969389,?,00000000), ref: 0096C53E
              • HeapDestroy.KERNELBASE(?), ref: 009693AD
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: CurrentDestroyHeapProcess
              • String ID:
              • API String ID: 4041245566-0
              • Opcode ID: 29bf5fc2720762008ddad70de72b1dec7b5c0ca8d194195509cdd5f9dabbe9dc
              • Instruction ID: 7348fe1a8c9aff8de0c582a02d4e79584446c2fe2ea9ecfefdcb51f685f06823
              • Opcode Fuzzy Hash: 29bf5fc2720762008ddad70de72b1dec7b5c0ca8d194195509cdd5f9dabbe9dc
              • Instruction Fuzzy Hash: 3611A532408206DBCB25AB64D886FBE736C9F91361F948027F401A63D1DF35DD81DB95
              APIs
              • _malloc.LIBCMT ref: 00964BB8
                • Part of subcall function 00977001: __FF_MSGBANNER.LIBCMT ref: 00977024
                • Part of subcall function 00977001: __NMSG_WRITE.LIBCMT ref: 0097702B
                • Part of subcall function 00977001: RtlAllocateHeap.NTDLL(00000000,-0000000F,00000001,00000000,00000000,?,00980019,00000000,00000001,00000000,?,00978F65,00000018,009916F8,0000000C,00978FF6), ref: 00977078
                • Part of subcall function 0096D265: _malloc.LIBCMT ref: 0096D28C
                • Part of subcall function 0096D265: _memset.LIBCMT ref: 0096D2BA
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: _malloc$AllocateHeap_memset
              • String ID:
              • API String ID: 3655941445-0
              • Opcode ID: 4424f32425ce63ec2858080b839c7aed4e4b483ad54078d2ab8cfe52b776740e
              • Instruction ID: be337bcc6a9b79346b65927df6022138b23f7672aa8bc4945194063560f443c9
              • Opcode Fuzzy Hash: 4424f32425ce63ec2858080b839c7aed4e4b483ad54078d2ab8cfe52b776740e
              • Instruction Fuzzy Hash: 13F0EC72E4631497D7217FF4ACC2FA67A549F66710F04001AF5186F1C2DA718C80D7A1
              APIs
              • _malloc.LIBCMT ref: 00972729
                • Part of subcall function 00977001: __FF_MSGBANNER.LIBCMT ref: 00977024
                • Part of subcall function 00977001: __NMSG_WRITE.LIBCMT ref: 0097702B
                • Part of subcall function 00977001: RtlAllocateHeap.NTDLL(00000000,-0000000F,00000001,00000000,00000000,?,00980019,00000000,00000001,00000000,?,00978F65,00000018,009916F8,0000000C,00978FF6), ref: 00977078
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: AllocateHeap_malloc
              • String ID:
              • API String ID: 501242067-0
              • Opcode ID: a4544c196cefc97ca9c1b093490c7b9f1f35aa0b32403612e36adf648e5b5200
              • Instruction ID: 3581dcfdb919b3cd34c1ff906b4bd4360db44f00ab60eceb243f5e20eb47593d
              • Opcode Fuzzy Hash: a4544c196cefc97ca9c1b093490c7b9f1f35aa0b32403612e36adf648e5b5200
              • Instruction Fuzzy Hash: F9E01A722186014FDB288F28F880A0AA7E19B84320B30CE3EE09AC7285D634A4828A04
              APIs
              • HeapCreate.KERNELBASE(00000000,00001000,00000000,?,00978AF7,00000001,?,?,?,00978C70,?,?,?,009916D8,0000000C,00978D2B), ref: 00978DD0
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: CreateHeap
              • String ID:
              • API String ID: 10892065-0
              • Opcode ID: e1294d95deca586fbf3cb9ed0f571734036946f82af2819b835b35ebb5c43b42
              • Instruction ID: 1198cf7968fed5c95f82d70e3af6b4260e2e206b49ab3bd0793642f3058e5376
              • Opcode Fuzzy Hash: e1294d95deca586fbf3cb9ed0f571734036946f82af2819b835b35ebb5c43b42
              • Instruction Fuzzy Hash: B6D05E366A83455FEB105FB86C4CB623BDCDB84795F148436B80CC6590E671C940A644
              APIs
              • Sleep.KERNEL32(?,00001388,?,0096165F,00001388), ref: 00964ADC
                • Part of subcall function 00964AFA: htonl.WS2_32(?), ref: 00964B23
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: Sleephtonl
              • String ID:
              • API String ID: 4038527953-0
              • Opcode ID: 46caafdc3a7df966654cd8bbe994ff79715ce6e792e92079249a22671e1c4ab4
              • Instruction ID: 80c1511c6c38903b3af6b54a464d9e0c11f2daa7a3ade285b98e191ad249d4ce
              • Opcode Fuzzy Hash: 46caafdc3a7df966654cd8bbe994ff79715ce6e792e92079249a22671e1c4ab4
              • Instruction Fuzzy Hash: EBF0823106D205FFDF146FE8EDA97783769FB51310F08041AE90256261EBB6C850FB25
              APIs
              • _malloc.LIBCMT ref: 0096481E
                • Part of subcall function 00977001: __FF_MSGBANNER.LIBCMT ref: 00977024
                • Part of subcall function 00977001: __NMSG_WRITE.LIBCMT ref: 0097702B
                • Part of subcall function 00977001: RtlAllocateHeap.NTDLL(00000000,-0000000F,00000001,00000000,00000000,?,00980019,00000000,00000001,00000000,?,00978F65,00000018,009916F8,0000000C,00978FF6), ref: 00977078
              • _memset.LIBCMT ref: 0096482A
                • Part of subcall function 00961683: _malloc.LIBCMT ref: 00961689
                • Part of subcall function 009616D3: htonl.WS2_32(0000001F), ref: 009616D9
              • _strncmp.LIBCMT ref: 00964879
              • GetCurrentDirectoryA.KERNEL32(00004000,00000000), ref: 00964887
                • Part of subcall function 00976F24: __lock.LIBCMT ref: 00976F42
                • Part of subcall function 00976F24: ___sbh_find_block.LIBCMT ref: 00976F4D
                • Part of subcall function 00976F24: ___sbh_free_block.LIBCMT ref: 00976F5C
                • Part of subcall function 00976F24: HeapFree.KERNEL32(00000000,00000000,00991598,0000000C,0097BF8F,00000000,?,00980019,00000000,00000001,00000000,?,00978F65,00000018,009916F8,0000000C), ref: 00976F8C
                • Part of subcall function 00976F24: GetLastError.KERNEL32(?,00980019,00000000,00000001,00000000,?,00978F65,00000018,009916F8,0000000C,00978FF6,00000000,00000000,?,0097C049,0000000D), ref: 00976F9D
              • FindFirstFileA.KERNEL32(00000000,?), ref: 009648B8
              • GetLastError.KERNEL32 ref: 009648C5
              • FileTimeToSystemTime.KERNEL32(?,?), ref: 00964911
              • SystemTimeToTzSpecificLocalTime.KERNEL32(00000000,?,00000000), ref: 00964921
              • FindNextFileA.KERNEL32(00000000,00000010), ref: 009649B4
              • FindClose.KERNEL32(00000000), ref: 009649C3
                • Part of subcall function 00961726: _vwprintf.LIBCMT ref: 00961730
                • Part of subcall function 00961726: _vswprintf_s.LIBCMT ref: 00961754
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: Time$FileFind$ErrorHeapLastSystem_malloc$AllocateCloseCurrentDirectoryFirstFreeLocalNextSpecific___sbh_find_block___sbh_free_block__lock_memset_strncmp_vswprintf_s_vwprintfhtonl
              • String ID: %s$.\*$D0%02d/%02d/%02d %02d:%02d:%02d%s$F%I64d%02d/%02d/%02d %02d:%02d:%02d%s
              • API String ID: 2804257087-1754256099
              • Opcode ID: 39033aa710bc213908743776c7858c64b0bf2e47592ee96bdcbca99273865b0b
              • Instruction ID: 2a44dc2e27599bf82541dc9bcf0530bd393cf73714345dee46a892c8370a76a6
              • Opcode Fuzzy Hash: 39033aa710bc213908743776c7858c64b0bf2e47592ee96bdcbca99273865b0b
              • Instruction Fuzzy Hash: D85120B2904129AACB10EBE5DC46FFF77BCAF88754F080426F615E1181F6789A44D771
              APIs
              • _memset.LIBCMT ref: 00969052
                • Part of subcall function 00961683: _malloc.LIBCMT ref: 00961689
              • GetCurrentProcess.KERNEL32(?,?,?,0099E6C0), ref: 0096909D
              • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 009690D1
              • Process32First.KERNEL32(00000000,?), ref: 009690F3
                • Part of subcall function 009616D3: htonl.WS2_32(0000001F), ref: 009616D9
              • Process32Next.KERNEL32(00000000,00000128), ref: 009691D5
                • Part of subcall function 00968FC4: OpenProcessToken.ADVAPI32(00000002,00000008,00000000,-00000400,?,00969161,00000000,?,00000002,00000000,?,?,?,0099E6C0), ref: 00968FD1
              • ProcessIdToSessionId.KERNEL32(?,?,00000002,00000000,?,?,?,0099E6C0), ref: 00969177
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: Process$Process32$CreateCurrentFirstNextOpenSessionSnapshotTokenToolhelp32_malloc_memsethtonl
              • String ID: %s%d%d%s%s%d$%s%d%d$x64$x86
              • API String ID: 3674674043-1833344708
              • Opcode ID: a3a890fbdff9a5b4308eb7590313322a001aa9bc0d6a063bc21024ec74933377
              • Instruction ID: e471fbaf340b937e611db96179462f6f07f59a1a9105e6dba270fd6a97168ef6
              • Opcode Fuzzy Hash: a3a890fbdff9a5b4308eb7590313322a001aa9bc0d6a063bc21024ec74933377
              • Instruction Fuzzy Hash: 47518972C0420EBAEF21BBE0DC46FEF77BC9F55354F100066F518E2182EA359A959B61
              APIs
              • _malloc.LIBCMT ref: 00969268
                • Part of subcall function 00977001: __FF_MSGBANNER.LIBCMT ref: 00977024
                • Part of subcall function 00977001: __NMSG_WRITE.LIBCMT ref: 0097702B
                • Part of subcall function 00977001: RtlAllocateHeap.NTDLL(00000000,-0000000F,00000001,00000000,00000000,?,00980019,00000000,00000001,00000000,?,00978F65,00000018,009916F8,0000000C,00978FF6), ref: 00977078
              • __snprintf.LIBCMT ref: 00969279
              • FindFirstFileA.KERNEL32(00000000,009646B0,?,0096934A,009646B0,?,00964634), ref: 00969286
                • Part of subcall function 00976F24: __lock.LIBCMT ref: 00976F42
                • Part of subcall function 00976F24: ___sbh_find_block.LIBCMT ref: 00976F4D
                • Part of subcall function 00976F24: ___sbh_free_block.LIBCMT ref: 00976F5C
                • Part of subcall function 00976F24: HeapFree.KERNEL32(00000000,00000000,00991598,0000000C,0097BF8F,00000000,?,00980019,00000000,00000001,00000000,?,00978F65,00000018,009916F8,0000000C), ref: 00976F8C
                • Part of subcall function 00976F24: GetLastError.KERNEL32(?,00980019,00000000,00000001,00000000,?,00978F65,00000018,009916F8,0000000C,00978FF6,00000000,00000000,?,0097C049,0000000D), ref: 00976F9D
              • _malloc.LIBCMT ref: 009692C5
              • __snprintf.LIBCMT ref: 009692DA
                • Part of subcall function 0096921E: _malloc.LIBCMT ref: 00969229
                • Part of subcall function 0096921E: __snprintf.LIBCMT ref: 0096923D
              • FindNextFileA.KERNEL32(000000FF,009646B0,?,?,?,?,?,?,?), ref: 00969307
              • FindClose.KERNEL32(000000FF,?,?,?,?,?,?,?), ref: 00969314
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: Find__snprintf_malloc$FileHeap$AllocateCloseErrorFirstFreeLastNext___sbh_find_block___sbh_free_block__lock
              • String ID: %s\*
              • API String ID: 1254174322-766152087
              • Opcode ID: 0ec75916b80122728e7fe6442cd790a8f0a0321da73acb0db257fe0e556abd7d
              • Instruction ID: 867c035da2aa00085073bbdf74130e2606582da53fb3eef8b532295287be25e8
              • Opcode Fuzzy Hash: 0ec75916b80122728e7fe6442cd790a8f0a0321da73acb0db257fe0e556abd7d
              • Instruction Fuzzy Hash: EC217C32504208BBDF216F65CC46FAF7F6DEF817A4F188024FD18A6292D6719D51EBA0
              APIs
              • IsDebuggerPresent.KERNEL32 ref: 009829AD
              • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 009829C2
              • UnhandledExceptionFilter.KERNEL32(00989C2C), ref: 009829CD
              • GetCurrentProcess.KERNEL32(C0000409), ref: 009829E9
              • TerminateProcess.KERNEL32(00000000), ref: 009829F0
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
              • String ID: Y4K
              • API String ID: 2579439406-3322456002
              • Opcode ID: 63dd2db33b6bd70835f0eb1675ddae4fae0a573b8c6bc3d1c1e08f8feca890e0
              • Instruction ID: 586214983849e0bdc179893fcb85a879165a354d949ef4ada8ff192fbb632d1a
              • Opcode Fuzzy Hash: 63dd2db33b6bd70835f0eb1675ddae4fae0a573b8c6bc3d1c1e08f8feca890e0
              • Instruction Fuzzy Hash: C821CBB482D200AFD720DF6DEC8A6643BA4FB49354F10501BE90987370E7B49985AF9A
              APIs
              • GetTickCount.KERNEL32 ref: 00963386
              • Sleep.KERNEL32(000003E8,?,?,?,00000001,?,00000000,?,?,00000000), ref: 009633F6
              • GetTickCount.KERNEL32 ref: 009633FC
              • Sleep.KERNEL32(000003E8,00000000,?,?,00000000,?,?,?,00000001,?,00000000,?,?,00000000), ref: 0096340F
              • closesocket.WS2_32(00000000), ref: 00963416
              • send.WS2_32(00000000,?,?,00000000), ref: 00963429
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: CountSleepTick$closesocketsend
              • String ID:
              • API String ID: 1472970430-0
              • Opcode ID: fcc3903f5f2346ede7b8b587a20bd8f6a91a1ad4d0ef17a11ed4f0bec7669242
              • Instruction ID: 38f2580792eb3ee01462b131b13bef0760d95ad28c4a7f947efc8093eb1c0910
              • Opcode Fuzzy Hash: fcc3903f5f2346ede7b8b587a20bd8f6a91a1ad4d0ef17a11ed4f0bec7669242
              • Instruction Fuzzy Hash: 6F116372D08218BBDF01BBF4DC86DDEBB78EF88324F244526F111B6191EE3596449B61
              APIs
              • htonl.WS2_32 ref: 00967392
              • htons.WS2_32(?), ref: 009673A2
              • socket.WS2_32(00000002,00000002,00000000), ref: 009673B8
              • closesocket.WS2_32(00000000), ref: 009673C5
              • bind.WS2_32(00000000,?,00000010), ref: 009673F3
              • ioctlsocket.WS2_32(00000000,8004667E,00000001), ref: 0096740A
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: bindclosesockethtonlhtonsioctlsocketsocket
              • String ID:
              • API String ID: 3910169428-0
              • Opcode ID: e757be7395f62eb8eedbb93d57406b54c6471048ec92d2d68b2ce7fbe5668c7d
              • Instruction ID: a6a466d13cdd1f7dc279a3bdc7c4ad844d38ec93b53a5ad082016faf64a1f0d7
              • Opcode Fuzzy Hash: e757be7395f62eb8eedbb93d57406b54c6471048ec92d2d68b2ce7fbe5668c7d
              • Instruction Fuzzy Hash: 58119172E042187BD710BBF89C86FAFB7ACDF44328F104626F620E72D2E67489459764
              APIs
              • socket.WS2_32(00000002,00000001,00000000), ref: 009672AB
              • htons.WS2_32(00000001), ref: 009672C7
              • ioctlsocket.WS2_32(00000000,8004667E,?), ref: 009672E0
              • closesocket.WS2_32(00000000), ref: 009672EB
              • bind.WS2_32(00000000,00967345,00000010), ref: 009672F9
              • listen.WS2_32(00000000,?), ref: 00967307
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: bindclosesockethtonsioctlsocketlistensocket
              • String ID:
              • API String ID: 1767165869-0
              • Opcode ID: f96b1fe05c2b50201352b379ee0803483e76abb543afcc676273a58f4042c7af
              • Instruction ID: 19e833e66d529322c63d9602ec5c6a52a666740fef3a4fbeca32069461c17cec
              • Opcode Fuzzy Hash: f96b1fe05c2b50201352b379ee0803483e76abb543afcc676273a58f4042c7af
              • Instruction Fuzzy Hash: 1D01B531604918BACB11BBE48C95EFEFB3DEF41714F640602F911E6291E7304A4183E5
              APIs
                • Part of subcall function 0096C760: RevertToSelf.ADVAPI32(?), ref: 0096C778
              • LogonUserA.ADVAPI32(?,?,0096CC6B,00000009,00000003,0099E6BC), ref: 0096CACA
              • GetLastError.KERNEL32(?,?,0096CC6B,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 0096CAD4
                • Part of subcall function 00966F84: _malloc.LIBCMT ref: 00966F8A
                • Part of subcall function 00966F84: _malloc.LIBCMT ref: 00966F9A
                • Part of subcall function 00962EC0: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000,009640B2,00000400,?,00963ED7,009640B2,?,00000400), ref: 00962ED6
                • Part of subcall function 00962EC0: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,009640B2,00963ED7,?,00963ED7,009640B2,?,00000400,?,?,?,?,009640B2), ref: 00962EEF
                • Part of subcall function 00961683: _malloc.LIBCMT ref: 00961689
                • Part of subcall function 00961726: _vwprintf.LIBCMT ref: 00961730
                • Part of subcall function 00961726: _vswprintf_s.LIBCMT ref: 00961754
                • Part of subcall function 00961765: _memset.LIBCMT ref: 00961773
              • ImpersonateLoggedOnUser.ADVAPI32(?,?,0096CC6B,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 0096CAEE
              • GetLastError.KERNEL32(?,?,0096CC6B,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 0096CAF8
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: _malloc$ByteCharErrorLastMultiUserWide$ImpersonateLoggedLogonRevertSelf_memset_vswprintf_s_vwprintf
              • String ID: %s\%s
              • API String ID: 744593125-4073750446
              • Opcode ID: 7a62ef717c946ca0da932b4123f6be8a98647c1e2ec7617a17f8565401c0571f
              • Instruction ID: 4f6ccd9133049c0972d23880adc25b6b581fb40a0afe64f2b3800bf315cc635e
              • Opcode Fuzzy Hash: 7a62ef717c946ca0da932b4123f6be8a98647c1e2ec7617a17f8565401c0571f
              • Instruction Fuzzy Hash: 6A3195B5918104BBDB01FFA5EC06FAA3B7DEB54744F144026FA04A11B2E6334510EBA1
              APIs
              • CreateProcessAsUserA.ADVAPI32(?,00000000,00968F3F,00000000,00000000,00000001,C4830001,00000000,00000000,006A0875,5DCFE857,?,00968F3F,00000011,0096415C,?), ref: 0096408B
              • GetLastError.KERNEL32(?,?,00967FFC,?), ref: 0096409B
              • GetLastError.KERNEL32(?,?,00967FFC,?), ref: 009640B5
                • Part of subcall function 00963E63: _memset.LIBCMT ref: 00963E91
                • Part of subcall function 00963E63: _memset.LIBCMT ref: 00963EAD
              • CreateProcessA.KERNEL32(00000000,00968F3F,00000000,00000000,00000001,C4830001,00000000,00000000,006A0875,5DCFE857,?,00968F3F,00000011,0096415C,?,006A0875), ref: 009640DA
              • GetLastError.KERNEL32(?,?,00967FFC,?), ref: 009640E4
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: ErrorLast$CreateProcess_memset$User
              • String ID:
              • API String ID: 3779600536-0
              • Opcode ID: 7799cf4236ff585bc2206674822fe8d46557fdd8442c4dea98c556c7a414861a
              • Instruction ID: cd6d39f71c051c1f459e3b92deccc4edfb6dce04466460ac77a5905b4ab23827
              • Opcode Fuzzy Hash: 7799cf4236ff585bc2206674822fe8d46557fdd8442c4dea98c556c7a414861a
              • Instruction Fuzzy Hash: 78116131158651BEDB325FE1DC48E377ABDFFC5B05B24492DFB5280460D6228490EB21
              APIs
              • socket.WS2_32(00000002,00000001,00000000), ref: 0096D5ED
              • closesocket.WS2_32(00000000), ref: 0096D5FA
              • htons.WS2_32(?), ref: 0096D60B
              • bind.WS2_32(00000000,?,00000010), ref: 0096D622
              • listen.WS2_32(00000000,00000078), ref: 0096D633
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: bindclosesockethtonslistensocket
              • String ID:
              • API String ID: 564772725-0
              • Opcode ID: 927845e3e4591a50482ff369c88ac508eb13548e5bc5458e3475998b7689e751
              • Instruction ID: 1839a44599032faa79a902b8b20416572f90dd7c988c71ff943cf1fcb5c54314
              • Opcode Fuzzy Hash: 927845e3e4591a50482ff369c88ac508eb13548e5bc5458e3475998b7689e751
              • Instruction Fuzzy Hash: 3CF0F470E5571475DA003BB49C8AFFD332C9F41334F104701F97AA91D2D7B4564497AA
              APIs
              • LookupPrivilegeValueA.ADVAPI32(00000000,?,?), ref: 0096381F
              • AdjustTokenPrivileges.ADVAPI32(?,00000000,009639EF,00000000,00000000,00000000,?,?,?,00000001), ref: 00963842
              • GetLastError.KERNEL32(?,?,?,00000001), ref: 0096384C
                • Part of subcall function 00961726: _vwprintf.LIBCMT ref: 00961730
                • Part of subcall function 00961726: _vswprintf_s.LIBCMT ref: 00961754
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: AdjustErrorLastLookupPrivilegePrivilegesTokenValue_vswprintf_s_vwprintf
              • String ID: %s
              • API String ID: 2004037343-620797490
              • Opcode ID: 216d3312369351f2fffdde007a428463157030ff066cfbf60db374b2d8232a9b
              • Instruction ID: deb5e056ea188d90d5a055aec266b9b83d01b0061d412d1eef75973779c525ee
              • Opcode Fuzzy Hash: 216d3312369351f2fffdde007a428463157030ff066cfbf60db374b2d8232a9b
              • Instruction Fuzzy Hash: B1115C72904118BAEB119FA9DD45AFFBBBCEB48344F104426F905E6150E631AF0887B1
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2937237770.0000000003910000.00000020.00001000.00020000.00000000.sdmp, Offset: 03910000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_3910000_loaddll32.jbxd
              Similarity
              • API ID: memcmp
              • String ID: l.dl$ntdl
              • API String ID: 1475443563-1236859653
              • Opcode ID: 0f5b3dc6387e30a20ae83c9fee98fb0c13c12e8ae5b52ce1f743266dc0cfa94e
              • Instruction ID: 7483b41803054f30618195645a644510abb9c3c1ce64bb4b5e24138c07d42546
              • Opcode Fuzzy Hash: 0f5b3dc6387e30a20ae83c9fee98fb0c13c12e8ae5b52ce1f743266dc0cfa94e
              • Instruction Fuzzy Hash: C6811575E003098FCB14CF99C5809AEF7F9FF88310B19856AD915AB321D736A892CF94
              APIs
              • GetTickCount.KERNEL32 ref: 00966C2E
              • Sleep.KERNEL32(000003E8), ref: 00966C7E
              • GetTickCount.KERNEL32 ref: 00966C84
              • WSAGetLastError.WS2_32 ref: 00966C8A
                • Part of subcall function 00966BD9: ioctlsocket.WS2_32(00000000,8004667E,00000000), ref: 00966BEB
                • Part of subcall function 009663AB: _memset.LIBCMT ref: 009663CC
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: CountTick$ErrorLastSleep_memsetioctlsocket
              • String ID:
              • API String ID: 3301373915-0
              • Opcode ID: c9c447822fd538f3157cbb3745d31a7d13cd95302d10d19668a972440e60c9c9
              • Instruction ID: 56d8a2a891498f50aae4971ebe5f139d0d06f68774416d480857c7558ad574b1
              • Opcode Fuzzy Hash: c9c447822fd538f3157cbb3745d31a7d13cd95302d10d19668a972440e60c9c9
              • Instruction Fuzzy Hash: F0110833C08519ABDB017BB4AC86AAE7BACDB84334F240122F641B71D1ED3569859791
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID:
              • String ID: $<$abcdefghijklmnop$abcdefghijklmnop
              • API String ID: 0-3339112986
              • Opcode ID: d1e6a2cded57178cac86d231bfa32809ffc7b7be134f286797e155ffd84a56f1
              • Instruction ID: c1ac00b4c83beac32b8f63730352dec3bfcd314db3bc5a68c43bb841cac77d7c
              • Opcode Fuzzy Hash: d1e6a2cded57178cac86d231bfa32809ffc7b7be134f286797e155ffd84a56f1
              • Instruction Fuzzy Hash: D952F475A101198FDB08CF69D491AADBBF1FF8D300F14C16AE865AB352C238E951DFA4
              APIs
              • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,74DF2E90,?,?,?,00966EB5), ref: 0096CCAD
              • CheckTokenMembership.ADVAPI32(00000000,?,00966EB5,?,?,?,00966EB5), ref: 0096CCC2
              • FreeSid.ADVAPI32(?,?,?,?,00966EB5), ref: 0096CCD2
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: AllocateCheckFreeInitializeMembershipToken
              • String ID:
              • API String ID: 3429775523-0
              • Opcode ID: 5e710e1304b68cb6bdb49a1f85a3efd9723f1a5e0e8a467b9c7de9086a680ad7
              • Instruction ID: fac1abbc38998a01e05260b5f19a8d6ddf249a06ac374d3c0c07dfe8090f3f4f
              • Opcode Fuzzy Hash: 5e710e1304b68cb6bdb49a1f85a3efd9723f1a5e0e8a467b9c7de9086a680ad7
              • Instruction Fuzzy Hash: 1F013C7294528CFFDB01DFE88C84AEDBFBCAB15204F44489AE541A3242D2709B08EB25
              Strings
              Memory Dump Source
              • Source File: 00000000.00000003.1756940749.0000000001080000.00000040.00000020.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_3_1080000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID:
              • String ID: l.dl$ntdl
              • API String ID: 0-1236859653
              • Opcode ID: eb7a861bcce37a4c8b14e75ca5a7465a8bfae540b2fdb9fa33f4e04c6bc83f0a
              • Instruction ID: 855dbde1e6c3e53e7df3bb7c22577e806a683a10eeeb3b17739cf04a18d3ae2f
              • Opcode Fuzzy Hash: eb7a861bcce37a4c8b14e75ca5a7465a8bfae540b2fdb9fa33f4e04c6bc83f0a
              • Instruction Fuzzy Hash: 6981E275E002158FDB54CF99C5C4AADBBF5FF88310F1581AAD98AAB322D734A941CF90
              Strings
              Memory Dump Source
              • Source File: 00000000.00000003.1756940749.0000000001080000.00000040.00000020.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_3_1080000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID:
              • String ID: l.dl$ntdl
              • API String ID: 0-1236859653
              • Opcode ID: 82ebefdf8aafa245ead5811a43e5d47b61fc1021544dcf684eb0a3e78f6b211d
              • Instruction ID: be5752580e51773eb3729ff88e5cde8b161ea90f28e930e240debae8a4dd57a7
              • Opcode Fuzzy Hash: 82ebefdf8aafa245ead5811a43e5d47b61fc1021544dcf684eb0a3e78f6b211d
              • Instruction Fuzzy Hash: 1DF04F34A103558FD7B0CF59C4C4F65B7E5FB59710F5981A9CA85CB713C225AD48CB90
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2937237770.0000000003910000.00000020.00001000.00020000.00000000.sdmp, Offset: 03910000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_3910000_loaddll32.jbxd
              Similarity
              • API ID: memcmp
              • String ID: l.dl$ntdl
              • API String ID: 1475443563-1236859653
              • Opcode ID: d7abb7fa61433a944f2779dc576cdb2e4f9a469f8ae612de3899614722100775
              • Instruction ID: b98ac127b153f45011a6373b024a4255f5a8f52fe3a6c345bdebc0ad7613830d
              • Opcode Fuzzy Hash: d7abb7fa61433a944f2779dc576cdb2e4f9a469f8ae612de3899614722100775
              • Instruction Fuzzy Hash: FEF0C230A003088FD770CE59C4C4F22F3E9FB59750B5984AAC9446B716C332ECA4C780
              APIs
              • CreateNamedPipeA.KERNEL32(?,00000003,00000004,00000002,00000000,00000000,00000000,00000000), ref: 009638C7
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: CreateNamedPipe
              • String ID:
              • API String ID: 2489174969-0
              • Opcode ID: f92121c9daa6c30af02b303cd5f0d250dc282b5a78e8074acaabfc5c176859f4
              • Instruction ID: f0f6c4ce11fc754f95d1c80669beb1c965746e99a84350add4aafba646144adc
              • Opcode Fuzzy Hash: f92121c9daa6c30af02b303cd5f0d250dc282b5a78e8074acaabfc5c176859f4
              • Instruction Fuzzy Hash: 92F04CF04163087FD7109F7CAC8AFA63F9CD700364F10432AB2A4D20E0D2714A449B10
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 1f9325b0469aff35141d872e8c63786a20553d81eaf4efde90ec8d76f2bad084
              • Instruction ID: 2003a99a86cdeb5a73f25738c61e82be41d36e4ebbe49c40e7ab24f598a02671
              • Opcode Fuzzy Hash: 1f9325b0469aff35141d872e8c63786a20553d81eaf4efde90ec8d76f2bad084
              • Instruction Fuzzy Hash: CD12B3319241598FDB08CF5DD8A1ABDBBF1EF49301F48816EE456AF386CA38E611DB50
              Memory Dump Source
              • Source File: 00000000.00000003.1756940749.0000000001080000.00000040.00000020.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_3_1080000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: e2ffc9e7d7ac48dbd1f10dea994cfd9f9dd5b24efee4c6583d3994a083d35383
              • Instruction ID: 5e323ca06773a6a38d688335970b05ffc895625c9dc0b0618d34ed9a24903ec7
              • Opcode Fuzzy Hash: e2ffc9e7d7ac48dbd1f10dea994cfd9f9dd5b24efee4c6583d3994a083d35383
              • Instruction Fuzzy Hash: 791251319141698FDB08CF5DC8D1ABDBBF1EF49301F54816AE456DB386CA38EA12DB50
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: b861e65eddebf31a98abeff916774899d1ee56d37ffdd3b34c8f0565c994d912
              • Instruction ID: a209b9e657414c8daef4eb121ffe812fc368c0546c681f6a0fe8091cbd922038
              • Opcode Fuzzy Hash: b861e65eddebf31a98abeff916774899d1ee56d37ffdd3b34c8f0565c994d912
              • Instruction Fuzzy Hash: 6E1280719241598FCB08CF5CE8919BDBBF1FF49300F49816EE456AB382C638EA11DB60
              Memory Dump Source
              • Source File: 00000000.00000003.1756940749.0000000001080000.00000040.00000020.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_3_1080000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 1ee21426a7293bb9793e89946cb74d85c7d078241c3289d5d319273b867ffb34
              • Instruction ID: 81ad88f3555dc7c7c660850bf852061ce6f39c2a8ea4ee89f856e131b08820ba
              • Opcode Fuzzy Hash: 1ee21426a7293bb9793e89946cb74d85c7d078241c3289d5d319273b867ffb34
              • Instruction Fuzzy Hash: E11260319141698FDB08CF9DC8D19BDBBF1EF49300F59826EE456AB382C638E652DB50
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 0666e2c6603716d584354562bcf590181c980fb8da26174d951f804026303a75
              • Instruction ID: c2554984440d7e0168b5b7f1b3e58c22139c58c1123ba4ea724644e688d242ae
              • Opcode Fuzzy Hash: 0666e2c6603716d584354562bcf590181c980fb8da26174d951f804026303a75
              • Instruction Fuzzy Hash: 3CD16D73C0E9B30A8736913D415862BEAA66FD1B5131FC7E19CE43F39AD22A5D0497D0
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: c40bcf876c129f9393d32ca3cb7471e4bcf7a4352579634fb414d11934eaa4f2
              • Instruction ID: ee0ce7e1f0d11ca550654addb7897a4ef27c7305b79e4acdb880c146c5cc8f68
              • Opcode Fuzzy Hash: c40bcf876c129f9393d32ca3cb7471e4bcf7a4352579634fb414d11934eaa4f2
              • Instruction Fuzzy Hash: B3D16D73C0E9B30A8736913D415862BEEA26FD1B4131EC7E19CD43F38AD62A5E0497D0
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 8709e21481f65d4d57cc4b3952fb3adbcebd3cc8b64ff3d20fdf858c0bfd14a0
              • Instruction ID: 42325ce4b5d0fd4b32abe367e2b80f0839a6bdff65ee155fd91b1e115df0f684
              • Opcode Fuzzy Hash: 8709e21481f65d4d57cc4b3952fb3adbcebd3cc8b64ff3d20fdf858c0bfd14a0
              • Instruction Fuzzy Hash: 72C15B73C0E9F34A8736913D416863BEAA66FD1A5031FC7A1DCD43F39A922B5E0496D0
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: a6a9d25a147ba64f4d06249d12fe21364a5b6889ab238d0ba2e949acfc497403
              • Instruction ID: afe0d8160b2139e77f2f6abba6caff363ac2c43cf7a9d9ba28ced532c300d532
              • Opcode Fuzzy Hash: a6a9d25a147ba64f4d06249d12fe21364a5b6889ab238d0ba2e949acfc497403
              • Instruction Fuzzy Hash: E8C15E73D1E9F30A8736913D415852BEEA66FD1B5032EC7E09CD42F389E62A9E0497D0
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: _malloc
              • String ID:
              • API String ID: 1579825452-0
              • Opcode ID: a7b03083a0c1943bd6bc7e53da11611cdde2c534861f86c0154113eaadc09522
              • Instruction ID: fe99357daa21e2bbc4c8b699a43e8cd97720064efbde7bee254e803ce890b892
              • Opcode Fuzzy Hash: a7b03083a0c1943bd6bc7e53da11611cdde2c534861f86c0154113eaadc09522
              • Instruction Fuzzy Hash: 67413A72E00209AFDB14DFA8C881AAEB7B5EF88310F558169E919E7342D734AE41CB50
              Memory Dump Source
              • Source File: 00000000.00000003.1756940749.0000000001080000.00000040.00000020.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_3_1080000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: _malloc
              • String ID:
              • API String ID: 1579825452-0
              • Opcode ID: e0b0735f12899f6be2682c86242398845bc4d23d28edfaa6f93b438634913bca
              • Instruction ID: 711d9d95958736d1eea23493c0a90aa7a7e3f711d26004db161e1b6e68c21faf
              • Opcode Fuzzy Hash: e0b0735f12899f6be2682c86242398845bc4d23d28edfaa6f93b438634913bca
              • Instruction Fuzzy Hash: 0F4138B6E00209AFDF14DFA8C891AEEB7F6FB48310F548069E945EB341D634EA05DB50
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 87ec4f336fdee703b08f9657c992eb6a3e27b91e8c24ebe6f9b95a7b6a8819cc
              • Instruction ID: 1c6ce8289bc30c33112eda8d04354b0679b967541f14e527b50d153585576cd1
              • Opcode Fuzzy Hash: 87ec4f336fdee703b08f9657c992eb6a3e27b91e8c24ebe6f9b95a7b6a8819cc
              • Instruction Fuzzy Hash: 034185749240688FDB48CF5DE8E08EDB7F2FB4E341B45854AE542BB396C638A910DB64
              APIs
              • htonl.WS2_32(?), ref: 00967830
              • select.WS2_32(00000000,?,?,?,?), ref: 00967894
              • __WSAFDIsSet.WS2_32(00000000,?), ref: 009678B0
              • accept.WS2_32(00000000,00000000,00000000), ref: 009678C5
              • ioctlsocket.WS2_32(00000000,8004667E,?), ref: 009678D8
                • Part of subcall function 009671FC: _malloc.LIBCMT ref: 00967203
                • Part of subcall function 009671FC: GetTickCount.KERNEL32 ref: 00967223
                • Part of subcall function 00961683: _malloc.LIBCMT ref: 00961689
                • Part of subcall function 009616D3: htonl.WS2_32(0000001F), ref: 009616D9
                • Part of subcall function 00961765: _memset.LIBCMT ref: 00961773
              • __WSAFDIsSet.WS2_32(00000000,?), ref: 00967965
              • accept.WS2_32(00000000,00000000,00000000), ref: 00967977
              • closesocket.WS2_32(?), ref: 00967A85
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: _mallocaccepthtonl$CountTick_memsetclosesocketioctlsocketselect
              • String ID: d
              • API String ID: 4083423528-2564639436
              • Opcode ID: 7ea40e89122ef197fe22bd1cd11d080a30555718dac760962811275ee50bb219
              • Instruction ID: dce7a22c93db7a65ca61d828f2dfbfda14ba8776d8808fc1a44e1eaeee86b5af
              • Opcode Fuzzy Hash: 7ea40e89122ef197fe22bd1cd11d080a30555718dac760962811275ee50bb219
              • Instruction Fuzzy Hash: A3712AB1C04608AFDB20EFE5CC85AAFFBBCAF84304F1445AAE515E2251E731AE45DB50
              APIs
              • _memset.LIBCMT ref: 00962753
              • _memset.LIBCMT ref: 00962768
              • __snprintf.LIBCMT ref: 009627A6
              • __snprintf.LIBCMT ref: 009627C2
              • __snprintf.LIBCMT ref: 00962822
              • __snprintf.LIBCMT ref: 00962839
                • Part of subcall function 00977156: __output_l.LIBCMT ref: 009771D8
              • HttpOpenRequestA.WININET(00000000,?,00000000,00000000,0098F540), ref: 00962877
              • HttpSendRequestA.WININET(00000000,?,?,?,?), ref: 009628A0
              • InternetCloseHandle.WININET(00000000), ref: 009628B2
              • Sleep.KERNEL32(000001F4), ref: 009628B9
              • InternetCloseHandle.WININET(00000000), ref: 009628CA
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: __snprintf$CloseHandleHttpInternetRequest_memset$OpenSendSleep__output_l
              • String ID: %s%s$*/*$/OWA/
              • API String ID: 894754388-1434031659
              • Opcode ID: 6e22bcd024275d8349c37789a3f8ae5100713c28da24c8732aac538968af0aab
              • Instruction ID: 097318495d677fe791945b92143228d4c1d7180c85e75075767d7a74792cba2c
              • Opcode Fuzzy Hash: 6e22bcd024275d8349c37789a3f8ae5100713c28da24c8732aac538968af0aab
              • Instruction Fuzzy Hash: 7B41BF72908118AFDB11AFA4DC85EFE7B7DEF58304F0400A6F505B7162DB369A489BA1
              APIs
              • _memset.LIBCMT ref: 00963E91
              • _memset.LIBCMT ref: 00963EAD
                • Part of subcall function 00962EC0: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000,009640B2,00000400,?,00963ED7,009640B2,?,00000400), ref: 00962ED6
                • Part of subcall function 00962EC0: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,009640B2,00963ED7,?,00963ED7,009640B2,?,00000400,?,?,?,?,009640B2), ref: 00962EEF
              • GetCurrentDirectoryW.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,009640B2,00968F3F,?,?,00967FFC,?), ref: 00963EF7
              • GetCurrentDirectoryW.KERNEL32(00000400,?,?,?,?,?,?,?,?,009640B2,00968F3F,?,?,00967FFC,?), ref: 00963F06
              • CreateProcessWithTokenW.ADVAPI32(00000002,00000000,?,C0330CC4,00000000,?,A6E8296A,83FFFFE3), ref: 00963F34
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: ByteCharCurrentDirectoryMultiWide_memset$CreateProcessTokenWith
              • String ID: sysnative$system32
              • API String ID: 2486443368-2461298002
              • Opcode ID: d9d4f8d1b41eb847d0e102f4d2f7e1e7881d0a4d750a9ed6a8f27de3ba2759ca
              • Instruction ID: 18984bbc773b9c444e13a869af4b05da066555bfe9c719b96a5709843b5f7f45
              • Opcode Fuzzy Hash: d9d4f8d1b41eb847d0e102f4d2f7e1e7881d0a4d750a9ed6a8f27de3ba2759ca
              • Instruction Fuzzy Hash: C551FB72A18215AFD7219FA4DC85FB777ACEF44310F14482AFA49C3251E731DA149B91
              APIs
              • GetTickCount.KERNEL32 ref: 00966781
              • GetTickCount.KERNEL32 ref: 0096678B
              • CreateFileA.KERNEL32(?,C0000000,00000000,00000000,00000003,00100000,00000000,?,?,?,?,00000001,?,?,00000000), ref: 009667A5
              • GetLastError.KERNEL32(?,?,?,?,00000001,?,?,00000000,?,?,00000000), ref: 009667B2
              • WaitNamedPipeA.KERNEL32(?,00002710), ref: 009667C7
                • Part of subcall function 009663AB: _memset.LIBCMT ref: 009663CC
              • Sleep.KERNEL32(000003E8,?,?,?,?,00000001,?,?,00000000,?,?,00000000), ref: 009667D4
              • GetTickCount.KERNEL32 ref: 009667DA
              • GetLastError.KERNEL32(?,?,?,?,00000001,?,?,00000000,?,?,00000000), ref: 009667F0
              • GetLastError.KERNEL32(?,?,?,?,00000001,?,?,00000000,?,?,00000000), ref: 00966800
              • SetNamedPipeHandleState.KERNEL32(?,?,00000000,00000000,?,?,?,?,00000001,?,?,00000000,?,?,00000000), ref: 0096681D
              • GetLastError.KERNEL32(?,?,?,?,00000001,?,?,00000000,?,?,00000000), ref: 00966827
              • DisconnectNamedPipe.KERNEL32(?), ref: 00966861
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: ErrorLast$CountNamedPipeTick$CreateDisconnectFileHandleSleepStateWait_memset
              • String ID:
              • API String ID: 2451114245-0
              • Opcode ID: cceea325c6d1dfd0a6943c010559a04c5ca1bd0c5b90158de64215321dadd07c
              • Instruction ID: fbe7275911bf0fa0810e690937fc0a55b63d35fb5e6a71004914665bd9a0cf58
              • Opcode Fuzzy Hash: cceea325c6d1dfd0a6943c010559a04c5ca1bd0c5b90158de64215321dadd07c
              • Instruction Fuzzy Hash: 1621D731A1C2157FEB012BB5EC8ABBD3AACAB44724F740821FA06E71D0EE659C409761
              APIs
              • GetModuleHandleA.KERNEL32(ntdll,NtQueueApcThread,00000000,00000000), ref: 00965625
              • GetProcAddress.KERNEL32(00000000), ref: 0096562C
                • Part of subcall function 0096555A: _malloc.LIBCMT ref: 00965579
                • Part of subcall function 0096555A: WriteProcessMemory.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,?,?,00000000,00000000,00000000), ref: 009655BF
              • CreateToolhelp32Snapshot.KERNEL32(00000004,00000000), ref: 0096565B
              • Thread32First.KERNEL32(00000000,0000001C), ref: 00965670
              • Thread32Next.KERNEL32(00000000,0000001C), ref: 009656B0
              • Sleep.KERNEL32(000000C8), ref: 009656C7
              • ReadProcessMemory.KERNEL32(00000000,00000000,?,00000010,00000000), ref: 009656DA
              • WriteProcessMemory.KERNEL32(00000000,00000000,?,00000010,00000010), ref: 00965703
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: MemoryProcess$Thread32Write$AddressCreateFirstHandleModuleNextProcReadSleepSnapshotToolhelp32_malloc
              • String ID: NtQueueApcThread$ntdll
              • API String ID: 346785587-1374908105
              • Opcode ID: 46e9437adab538117ee16911c170e2f19be83821c6e315c4b7b83e279abb3f43
              • Instruction ID: 3901db1f7143e4f314a414c70d146932852fc9a62744a08d7ee8e0011e7347cd
              • Opcode Fuzzy Hash: 46e9437adab538117ee16911c170e2f19be83821c6e315c4b7b83e279abb3f43
              • Instruction Fuzzy Hash: 6E31FAB2900609FFEF10EFA4DC859AEBBB9EB48344F114429FA05E7250E7719A44DB61
              APIs
              • GetTickCount.KERNEL32 ref: 00967606
              • select.WS2_32(00000000,00000000,?,?,00000000), ref: 00967651
              • __WSAFDIsSet.WS2_32(00000000,?), ref: 00967661
              • __WSAFDIsSet.WS2_32(00000000,?), ref: 00967674
              • GetTickCount.KERNEL32 ref: 0096767D
              • gethostbyname.WS2_32(009677A4), ref: 00967688
              • htons.WS2_32(?), ref: 0096769B
              • inet_addr.WS2_32(009677A4), ref: 009676A7
              • sendto.WS2_32(00000000,00000000,0000000A,00000000,?,00000010), ref: 009676C1
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: CountTick$gethostbynamehtonsinet_addrselectsendto
              • String ID: d
              • API String ID: 1257931466-2564639436
              • Opcode ID: f0bd8e55fed5d2888ddd8d877a91cbc8fa3fcc575f87a83bedd6cad5a4b36413
              • Instruction ID: d483312c54f9a9f7dc7ce2c7298b5e4d7edee1ff1918123d28a17771328a1de2
              • Opcode Fuzzy Hash: f0bd8e55fed5d2888ddd8d877a91cbc8fa3fcc575f87a83bedd6cad5a4b36413
              • Instruction Fuzzy Hash: 0621A172904209BBDF11AFE4DC45BEEBBB9EF08304F1000A6F901E62A1E775DA559F91
              APIs
              • htonl.WS2_32(?), ref: 0096C980
              • htonl.WS2_32(00000000), ref: 0096C990
              • GetLastError.KERNEL32(?,0099E6C0), ref: 0096C9AB
              • OpenProcessToken.ADVAPI32(00000000,00000000,00000008,?,0099E6C0), ref: 0096C9CF
              • GetLastError.KERNEL32 ref: 0096C9D9
              • ImpersonateLoggedOnUser.ADVAPI32(00000008), ref: 0096C9F8
              • GetLastError.KERNEL32 ref: 0096C9FE
              • DuplicateTokenEx.ADVAPI32(00000008,02000000,00000000,00000003,00000001,0099E6BC), ref: 0096CA1D
              • GetLastError.KERNEL32 ref: 0096CA27
              • ImpersonateLoggedOnUser.ADVAPI32 ref: 0096CA39
              • GetLastError.KERNEL32 ref: 0096CA3F
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: ErrorLast$ImpersonateLoggedTokenUserhtonl$DuplicateOpenProcess
              • String ID:
              • API String ID: 332438066-0
              • Opcode ID: 2c718cc79a41f3eba31a7de118d3ba921594c1fa01728959ca6844dd0ecf0523
              • Instruction ID: 6ae5c1833dc1f0c6a8164069bc51417a6bd24b4fc86978b39390fe988c81f4dc
              • Opcode Fuzzy Hash: 2c718cc79a41f3eba31a7de118d3ba921594c1fa01728959ca6844dd0ecf0523
              • Instruction Fuzzy Hash: BC31E7B1508209BFEF20ABE1DC4DFBA3B7CEF51755F184026F985A5191EB708944DB21
              APIs
              • GetTickCount.KERNEL32 ref: 00967540
              • select.WS2_32(00000000,00000000,?,?,00000000), ref: 0096758E
              • __WSAFDIsSet.WS2_32(00000000,?), ref: 0096759E
              • __WSAFDIsSet.WS2_32(00000000,?), ref: 009675B1
              • send.WS2_32(00000000,00000000,?,00000000), ref: 009675C5
              • WSAGetLastError.WS2_32(00000000,?,00000000,?,?,00000000), ref: 009675CF
              • Sleep.KERNEL32(000003E8,?,00000000), ref: 009675E1
              • GetTickCount.KERNEL32 ref: 009675E7
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: CountTick$ErrorLastSleepselectsend
              • String ID: d
              • API String ID: 2152284305-2564639436
              • Opcode ID: f6ee834c6cda99214e117496c96fb19fc753636689e989ecee1177378a2be4d9
              • Instruction ID: 4fb86be06f0484519a0852b78b9b1571195c3bb33574006748cd9216a7b95c4d
              • Opcode Fuzzy Hash: f6ee834c6cda99214e117496c96fb19fc753636689e989ecee1177378a2be4d9
              • Instruction Fuzzy Hash: 9311B27180420DABDB119FA0DC89BEDBBBCFB04304F1046A6F606E21A0D7B49E81DF90
              APIs
              • GetTickCount.KERNEL32 ref: 00963446
              • GetLastError.KERNEL32(?,?,?,?,?,00000001,?,?,?,?,?,?,?,00968BB2), ref: 009634A6
              • GetTickCount.KERNEL32 ref: 009634B1
              • Sleep.KERNEL32(000003E8,?,?,?,?,?,00000001,?,?,?,?,?,?,?,00968BB2), ref: 009634BC
              • GetLastError.KERNEL32(?,?,?,?,?,00000001,?,?,?,?,?,?,?,00968BB2), ref: 009634C8
              • WriteFile.KERNEL32(?,?,00000004,?,00000000,?,?,?,?,?,00000001), ref: 009634FA
              • WriteFile.KERNEL32(?,00000000,00000000,?,00000000,?,?,?,?,?,00000001), ref: 00963525
              • FlushFileBuffers.KERNEL32(?,?,?,?,?,?,00000001,?,?,?,?,?,?,?,00968BB2), ref: 00963539
              • DisconnectNamedPipe.KERNEL32(?,?,?,?,?,?,00000001,?,?,?,?,?,?,?,00968BB2), ref: 00963542
              • Sleep.KERNEL32(?,?,?,?,?,?,00000001,?,?,?,?,?,?,?,00968BB2), ref: 00963557
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: File$CountErrorLastSleepTickWrite$BuffersDisconnectFlushNamedPipe
              • String ID:
              • API String ID: 3101085627-0
              • Opcode ID: f2ab64f70a049f799a4dc1f23808df53fb098eb24f9705905971738a812d6bbb
              • Instruction ID: ccfc53dc538e90f0e883366ed2504e10d88ab1f3791e11c2e20f795363ce20df
              • Opcode Fuzzy Hash: f2ab64f70a049f799a4dc1f23808df53fb098eb24f9705905971738a812d6bbb
              • Instruction Fuzzy Hash: EF311E72D08219BBDB11EBE4DC89BEEB77CEB44300F144065F505A6160EB31AF44DB61
              APIs
                • Part of subcall function 00966F84: _malloc.LIBCMT ref: 00966F8A
                • Part of subcall function 00966F84: _malloc.LIBCMT ref: 00966F9A
              • _memset.LIBCMT ref: 0096AF07
                • Part of subcall function 0096B1CE: _memset.LIBCMT ref: 0096B2CA
              • _malloc.LIBCMT ref: 0096AF1A
                • Part of subcall function 00977001: __FF_MSGBANNER.LIBCMT ref: 00977024
                • Part of subcall function 00977001: __NMSG_WRITE.LIBCMT ref: 0097702B
                • Part of subcall function 00977001: RtlAllocateHeap.NTDLL(00000000,-0000000F,00000001,00000000,00000000,?,00980019,00000000,00000001,00000000,?,00978F65,00000018,009916F8,0000000C,00978FF6), ref: 00977078
              • _memset.LIBCMT ref: 0096AF2C
                • Part of subcall function 0096D265: _malloc.LIBCMT ref: 0096D28C
                • Part of subcall function 0096D265: _memset.LIBCMT ref: 0096D2BA
              • htonl.WS2_32(00000000), ref: 0096AF5D
              • GetComputerNameExA.KERNEL32(00000006,?,?), ref: 0096AFCE
              • GetComputerNameA.KERNEL32(?,?), ref: 0096AFFF
              • GetUserNameA.ADVAPI32(?,?), ref: 0096B030
                • Part of subcall function 00962C13: WSASocketA.WS2_32(00000002,00000002,00000000,00000000,00000000,00000000), ref: 00962C37
              • _malloc.LIBCMT ref: 0096B108
              • _memset.LIBCMT ref: 0096B19A
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: _malloc_memset$Name$Computer$AllocateHeapSocketUserhtonl
              • String ID:
              • API String ID: 932012179-0
              • Opcode ID: 4d0247b8d59fcab1524b45a8a367528fa38ac4a4b2e308c3212057ac9756c80a
              • Instruction ID: 2835098d68661ef80a9163a32835f9187667de54ff7bf9d884f8d81d872a388e
              • Opcode Fuzzy Hash: 4d0247b8d59fcab1524b45a8a367528fa38ac4a4b2e308c3212057ac9756c80a
              • Instruction Fuzzy Hash: 6E81287290C3006AD721AB649C82F6FB7EDEFC9754F11081EF19897282EB75D94187A2
              APIs
                • Part of subcall function 00969002: GetCurrentProcess.KERNEL32(?,00963C24,006A0875,00000000,00968F3F,00968F3F), ref: 0096900E
              • GetLastError.KERNEL32(00000000,00968F3F,00968F3F), ref: 00963C57
              • ReadProcessMemory.KERNEL32(006A0875,?,?,00000004,00000000,00000000,00968F3F,00968F3F), ref: 00963C82
              • ReadProcessMemory.KERNEL32(006A0875,?,006A0875,00000008,00000000), ref: 00963C99
              • _malloc.LIBCMT ref: 00963CBE
              • _memset.LIBCMT ref: 00963CCF
              • _memset.LIBCMT ref: 00963D00
              • WriteProcessMemory.KERNEL32(006A0875,00968F3F,00000000,?,?), ref: 00963D25
              • GetLastError.KERNEL32 ref: 00963D2F
              • _memset.LIBCMT ref: 00963D44
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: Process$Memory_memset$ErrorLastRead$CurrentWrite_malloc
              • String ID:
              • API String ID: 2732134248-0
              • Opcode ID: 8ba9e16d30f3e0d2b68f5c008e500c623a02b9af47162a133a1a8775a0cd5915
              • Instruction ID: cddd9ca5440b7e684d5ab5a591beab25181bc336e33835496e9df07c0e4b55de
              • Opcode Fuzzy Hash: 8ba9e16d30f3e0d2b68f5c008e500c623a02b9af47162a133a1a8775a0cd5915
              • Instruction Fuzzy Hash: B741E2B6A04119BEEB10ABA9DC06FBE7BBDEF44710F108051FA08E90D1EB359A50D771
              APIs
              Memory Dump Source
              • Source File: 00000000.00000003.1756940749.0000000001080000.00000040.00000020.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_3_1080000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: __encode_pointer$__decode_pointer$__calloc_crt__crt_waiting_on_module_handle__init_pointers
              • String ID:
              • API String ID: 1960427394-0
              • Opcode ID: 563c1a9acce4eacc7033eb5bdae96d7e4e55712accac0d757ccc1c5c1a0fb50b
              • Instruction ID: 501a9896b1a329c72a45e3a62ad42f2d2f1a3c509b918a2074837a18d6aa0ccc
              • Opcode Fuzzy Hash: 563c1a9acce4eacc7033eb5bdae96d7e4e55712accac0d757ccc1c5c1a0fb50b
              • Instruction Fuzzy Hash: 2731C071804331AEFF12EF78EC95A993BE4FB44661B14021AE5A4CB2B1EB75C040EF50
              APIs
              • htonl.WS2_32 ref: 00967443
              • htons.WS2_32(00000000), ref: 00967454
              • socket.WS2_32(00000002,00000001,00000000), ref: 0096748D
              • closesocket.WS2_32(00000000), ref: 0096749C
              • gethostbyname.WS2_32(00000000), ref: 009674BA
              • htons.WS2_32(?), ref: 009674E6
              • ioctlsocket.WS2_32(00000000,8004667E,?), ref: 009674F9
              • connect.WS2_32(00000000,?,00000010), ref: 0096750A
              • WSAGetLastError.WS2_32(00000000,?,00000010), ref: 00967513
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: htons$ErrorLastclosesocketconnectgethostbynamehtonlioctlsocketsocket
              • String ID:
              • API String ID: 3339321253-0
              • Opcode ID: de7fe39a6c10bdc12163bfcc3f2b0d069defeeaa95b10f22fa731d6ca332a9ca
              • Instruction ID: 8e57923c690af4ed0a554b8f27bab67a60bf79c62cb1e9a5a0da0dbe62b981fc
              • Opcode Fuzzy Hash: de7fe39a6c10bdc12163bfcc3f2b0d069defeeaa95b10f22fa731d6ca332a9ca
              • Instruction Fuzzy Hash: A83133B2D04118ABDB20BBF4DC85FBEB7ACEF84314F114166F908E7251EA348A048765
              APIs
              • GetLastError.KERNEL32 ref: 009681F9
              • UpdateProcThreadAttribute.KERNEL32(?,00000000,00020000,?,00000004,00000000,00000000), ref: 00968225
              • GetLastError.KERNEL32 ref: 0096822F
              • GetCurrentProcess.KERNEL32(00000000,00000000,?,00000000,00000001,00000003), ref: 00968264
              • DuplicateHandle.KERNEL32(00000000), ref: 0096826B
              • GetCurrentProcess.KERNEL32(00000000,?,?,00000000,00000001,00000003), ref: 00968296
              • DuplicateHandle.KERNEL32(00000000), ref: 00968299
              • GetCurrentProcess.KERNEL32(?,?,?,00000000,00000001,00000003), ref: 009682B2
              • DuplicateHandle.KERNEL32(00000000), ref: 009682B5
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: CurrentDuplicateHandleProcess$ErrorLast$AttributeProcThreadUpdate
              • String ID:
              • API String ID: 570851288-0
              • Opcode ID: c15d6073eb0620dcbd97986acd2e41ad4ae4f43244eaf355594f38ad92a33e75
              • Instruction ID: 97ca8c2ef114e0146b7011dc48248c8d585a856cd6bf42432bc7f2fc678b9d70
              • Opcode Fuzzy Hash: c15d6073eb0620dcbd97986acd2e41ad4ae4f43244eaf355594f38ad92a33e75
              • Instruction Fuzzy Hash: C121B471704609BBDB209FA1DC99F7B3B2DEB86B84F240508FA15DB280DA719D01D770
              APIs
                • Part of subcall function 00966F84: _malloc.LIBCMT ref: 00966F8A
                • Part of subcall function 00966F84: _malloc.LIBCMT ref: 00966F9A
              • _memset.LIBCMT ref: 009641C4
              • GetStartupInfoA.KERNEL32(?), ref: 009641DC
                • Part of subcall function 00962EC0: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000,009640B2,00000400,?,00963ED7,009640B2,?,00000400), ref: 00962ED6
                • Part of subcall function 00962EC0: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,009640B2,00963ED7,?,00963ED7,009640B2,?,00000400,?,?,?,?,009640B2), ref: 00962EEF
              • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00964241
              • GetCurrentDirectoryW.KERNEL32(00000400,?), ref: 0096424B
              • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000001,00000000,00000000,00000000,00000000,00000000,?,00962FC7), ref: 00964276
              • GetLastError.KERNEL32 ref: 00964285
                • Part of subcall function 009624AC: _vswprintf_s.LIBCMT ref: 009624C8
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: ByteCharCurrentDirectoryMultiWide_malloc$CreateErrorInfoLastLogonProcessStartupWith_memset_vswprintf_s
              • String ID: %s as %s\%s: %d
              • API String ID: 963358868-816037529
              • Opcode ID: b199f72ee516d4375acec84bf29dcdcaf9ec949fb94e2afb21c91e2e347783fc
              • Instruction ID: e261ee7042dcc380d6f37f50b5a23c117a43f7f593bbb4b72f65d158f6c166b3
              • Opcode Fuzzy Hash: b199f72ee516d4375acec84bf29dcdcaf9ec949fb94e2afb21c91e2e347783fc
              • Instruction Fuzzy Hash: FC416A72D04208BBDF11AFE5DC45EEFBFB9EF88354F104029F618A6161D6718950DB61
              APIs
              • _memset.LIBCMT ref: 0096C7CE
              • _memset.LIBCMT ref: 0096C7DC
              • _memset.LIBCMT ref: 0096C7EA
              • GetTokenInformation.ADVAPI32(?,00000001(TokenIntegrityLevel),?,00001000,0096C889,?,?,?,?,?,0096C889,?,?), ref: 0096C807
              • LookupAccountSidA.ADVAPI32(00000000,?,?,?,?,?,?), ref: 0096C836
              • __snprintf.LIBCMT ref: 0096C858
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: _memset$AccountInformationLookupToken__snprintf
              • String ID: %s\%s
              • API String ID: 2009363630-4073750446
              • Opcode ID: c6209a041329bc52c4ac5e2fbd2f37ff6fe56bef0edc15ca5f0289078bfdda80
              • Instruction ID: 34c6f7c02c39abad9e0638ce45d65cbd15516f267ddd5839908a435a87dc5cef
              • Opcode Fuzzy Hash: c6209a041329bc52c4ac5e2fbd2f37ff6fe56bef0edc15ca5f0289078bfdda80
              • Instruction Fuzzy Hash: 1D2103B290411CBADB11DB91DC85EFF77BCEB48748F0488BAB515E3141D670EB848B64
              APIs
              • __time64.LIBCMT ref: 0096B6BD
                • Part of subcall function 00978876: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,0096B6C2,00000000), ref: 00978881
                • Part of subcall function 00978876: __aulldiv.LIBCMT ref: 009788A1
              • _malloc.LIBCMT ref: 0096B6E6
              • _strncpy.LIBCMT ref: 0096B706
              • _strtok.LIBCMT ref: 0096B71D
              • _strtok.LIBCMT ref: 0096B73C
                • Part of subcall function 009787B5: __getptd.LIBCMT ref: 009787D3
              • __time64.LIBCMT ref: 0096B74E
              • __time64.LIBCMT ref: 0096B7DD
              • __time64.LIBCMT ref: 0096B879
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: __time64$Time_strtok$FileSystem__aulldiv__getptd_malloc_strncpy
              • String ID:
              • API String ID: 2319056096-0
              • Opcode ID: efe9588e2cc5d22cf0748f2ce85a8a8740f2ec93b9d60797b22b5b7e2b49feea
              • Instruction ID: 111e8ab3d1fcdde473c833a9ee2053bafc4354856cb775e5ef4b180a23a0bd86
              • Opcode Fuzzy Hash: efe9588e2cc5d22cf0748f2ce85a8a8740f2ec93b9d60797b22b5b7e2b49feea
              • Instruction Fuzzy Hash: 0B5139B1C2A200DFCB14DF6DEDC15697BB9F699361B50812FE509C7AA0E7308981EF50
              APIs
              Memory Dump Source
              • Source File: 00000000.00000003.1756940749.0000000001080000.00000040.00000020.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_3_1080000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: __time64$_strtok$__aulldiv__getptd_malloc_strncpy
              • String ID:
              • API String ID: 3363204686-0
              • Opcode ID: c58aef468cca0aa84ce2cb6dc5010583bf46fb866d0932612e6161389a713d57
              • Instruction ID: 7c568dd1d456a5dcda1693296d7859cb5c09e73927f7c084e7993e6f1669eb06
              • Opcode Fuzzy Hash: c58aef468cca0aa84ce2cb6dc5010583bf46fb866d0932612e6161389a713d57
              • Instruction Fuzzy Hash: EC5149B5A08269DFEB56EF29EDC14587BF2FB58310710866FE1858F662E7309940DF40
              APIs
              • _memset.LIBCMT ref: 00963726
              • GetLastError.KERNEL32 ref: 00963739
              • ConnectNamedPipe.KERNEL32(00000000), ref: 0096374D
              • ReadFile.KERNEL32(?,00000001,?,00000000), ref: 00963767
              • ImpersonateNamedPipeClient.ADVAPI32 ref: 00963777
              • GetCurrentThread.KERNEL32 ref: 0096378C
              • OpenThreadToken.ADVAPI32(00000000), ref: 00963793
              • DisconnectNamedPipe.KERNEL32(FFFFFFFF), ref: 009637A7
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: NamedPipe$Thread$ClientConnectCurrentDisconnectErrorFileImpersonateLastOpenReadToken_memset
              • String ID:
              • API String ID: 3867162830-0
              • Opcode ID: 131bf528b44a58b74c45a344ec8b1d4f7ef4538f2d48a2bcfaa2a5b27cc2ad23
              • Instruction ID: 8019221f6d5e283c05e1c0e9cd9960dcc271c636f821ab607966677acfc91e6f
              • Opcode Fuzzy Hash: 131bf528b44a58b74c45a344ec8b1d4f7ef4538f2d48a2bcfaa2a5b27cc2ad23
              • Instruction Fuzzy Hash: B6118EB161C109AFDB119FA9EC8DBBA37BCEB15744F188066F601D11A1DA319E04EBA0
              APIs
              Memory Dump Source
              • Source File: 00000000.00000003.1756940749.0000000001080000.00000040.00000020.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_3_1080000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: _memset
              • String ID:
              • API String ID: 2102423945-0
              • Opcode ID: 9434664bb32ed7c74f69a6b59b357e69d0ce2b0f3ec276019f4904d7244b1488
              • Instruction ID: 5ae4ec2283ad73765f9258e298320af49722949cd45125cda5d1b44d56cdc289
              • Opcode Fuzzy Hash: 9434664bb32ed7c74f69a6b59b357e69d0ce2b0f3ec276019f4904d7244b1488
              • Instruction Fuzzy Hash: 66D1E3B2A047029FEB60EF69CD80A9B77F5FF84204718893EE1D7C6A51E631F5568B10
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: _memset$__filbuf__fileno__getptd_noexit__read_memcpy_s
              • String ID:
              • API String ID: 3886058894-0
              • Opcode ID: 25efe052802d1f4cd78c6fd1d74d2cc46f1bf5526e6b95697180c4b228cf4b8f
              • Instruction ID: b8b75e3b878b845dff0cbc9bb494aebacb4b1569afebb0e38c062c9303e07a1b
              • Opcode Fuzzy Hash: 25efe052802d1f4cd78c6fd1d74d2cc46f1bf5526e6b95697180c4b228cf4b8f
              • Instruction Fuzzy Hash: 78519472A40605EBCB209F698C4C6AFBBB9EF81360F14C659F82D92191EB309D51CB51
              APIs
              Memory Dump Source
              • Source File: 00000000.00000003.1756940749.0000000001080000.00000040.00000020.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_3_1080000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: _memset$__filbuf__fileno__getptd_noexit__read_memcpy_s
              • String ID:
              • API String ID: 3886058894-0
              • Opcode ID: 3ab5b0b5ebffb8c1e66b6e0b352ec067f0a67d4a440487db9b8adb8c21630672
              • Instruction ID: 88b7def6ef1b30c54c0104af7d869b507e905dc3b41b96efbc1ee5d4048a7b03
              • Opcode Fuzzy Hash: 3ab5b0b5ebffb8c1e66b6e0b352ec067f0a67d4a440487db9b8adb8c21630672
              • Instruction Fuzzy Hash: 5D510672A10245EFDF608F6DCC649DEBFB5EF95320F1482A9E8A5521D0D3709A50EF90
              APIs
              • CreateProcessWithLogonW.ADVAPI32(00000002,00000000,?,C0330CC4,00000000,00963F7B,A6E8296A,83FFFFE3,009640B2,74DEE010), ref: 00963D88
              • GetLastError.KERNEL32 ref: 00963D9A
              • _memset.LIBCMT ref: 00963DE3
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: CreateErrorLastLogonProcessWith_memset
              • String ID: sysnative$system32
              • API String ID: 2584212486-2461298002
              • Opcode ID: be6d7ea16eed7aa25065563d71a85fdea04e49084662fc6edb1f79243b48d587
              • Instruction ID: 94d163d9756b43319113169e60c42cb62cd51b587275739e240d6abade53b189
              • Opcode Fuzzy Hash: be6d7ea16eed7aa25065563d71a85fdea04e49084662fc6edb1f79243b48d587
              • Instruction Fuzzy Hash: EC314877508110AFCB139F64EC19FA33BADEF58710F188461F949DB261D632D614DBA0
              APIs
              • GetLastError.KERNEL32(-00000001,00000000,00000000,00000000,?,0096CFBD,?,00000000), ref: 0096CEB5
              • OpenProcessToken.ADVAPI32(00000000,?,00000000,-00000001,00000000,00000000,00000000,?,0096CFBD,?,00000000), ref: 0096CED3
              • GetLastError.KERNEL32(?,0096CFBD,?,00000000), ref: 0096CEDD
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: ErrorLast$OpenProcessToken
              • String ID:
              • API String ID: 2009710997-0
              • Opcode ID: 44398647c0465867b0e892300965dc4810af367d5d738e55f8c687571be89bc4
              • Instruction ID: b409f35a1bee5b39e8c86e6556175db60cabdbe7ce933f58c19ffcacae1d7c25
              • Opcode Fuzzy Hash: 44398647c0465867b0e892300965dc4810af367d5d738e55f8c687571be89bc4
              • Instruction Fuzzy Hash: 7A21D3B2A18214BFEB112BE4EC0EF7E776DEB14B45F140014FA45E5191EB714E10A7A1
              APIs
              • GetTickCount.KERNEL32 ref: 00966A1E
              • ioctlsocket.WS2_32(?,8004667E,?), ref: 00966A42
              • GetTickCount.KERNEL32 ref: 00966A79
              • ioctlsocket.WS2_32(00000000,8004667E,00000000), ref: 00966A9E
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: CountTickioctlsocket
              • String ID:
              • API String ID: 3686034022-0
              • Opcode ID: 22ff7025eb816043aed7bf8c4d57b2b7462819f6e9058722cea7a9a8dfdb452b
              • Instruction ID: dccb4454198632dfebcc560083bc93720fde671250d594dc0a798f453fff7369
              • Opcode Fuzzy Hash: 22ff7025eb816043aed7bf8c4d57b2b7462819f6e9058722cea7a9a8dfdb452b
              • Instruction Fuzzy Hash: 5D117032514109BFDB109FE0CC49BED7BACEB00365F40C565F915E61A0D7B499949F51
              APIs
              • _malloc.LIBCMT ref: 0096D49E
                • Part of subcall function 00977001: __FF_MSGBANNER.LIBCMT ref: 00977024
                • Part of subcall function 00977001: __NMSG_WRITE.LIBCMT ref: 0097702B
                • Part of subcall function 00977001: RtlAllocateHeap.NTDLL(00000000,-0000000F,00000001,00000000,00000000,?,00980019,00000000,00000001,00000000,?,00978F65,00000018,009916F8,0000000C,00978FF6), ref: 00977078
              • _malloc.LIBCMT ref: 0096D4AB
              • _malloc.LIBCMT ref: 0096D4C6
              • __snprintf.LIBCMT ref: 0096D4D9
              • _malloc.LIBCMT ref: 0096D4F8
              Strings
              • HTTP/1.1 200 OKContent-Type: application/octet-streamContent-Length: %d, xrefs: 0096D4CC
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: _malloc$AllocateHeap__snprintf
              • String ID: HTTP/1.1 200 OKContent-Type: application/octet-streamContent-Length: %d
              • API String ID: 3929630252-2739389480
              • Opcode ID: c81499bd0ab89e423f97d1c97299fb0da458c6ec28ee366196657df8fd25b6be
              • Instruction ID: 3759374902622415ce0a05601f54d19e8118e44bb16324673d75827b89552f3f
              • Opcode Fuzzy Hash: c81499bd0ab89e423f97d1c97299fb0da458c6ec28ee366196657df8fd25b6be
              • Instruction Fuzzy Hash: B70162719043046FDB21AFB9C885E5ABBE8EF85764B00C829F48CC7241EA71E9448790
              APIs
              Memory Dump Source
              • Source File: 00000000.00000003.1756940749.0000000001080000.00000040.00000020.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_3_1080000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: __snprintf$_memset$__output_l
              • String ID:
              • API String ID: 1270732810-0
              • Opcode ID: 32dc780789246640bbe81e72850a7b34c70a7b048d89887567f97762967457ae
              • Instruction ID: 0062beb6e412ce01a838209b44caceeebb1ee6bd1c953be9a63f6eceb6c10210
              • Opcode Fuzzy Hash: 32dc780789246640bbe81e72850a7b34c70a7b048d89887567f97762967457ae
              • Instruction Fuzzy Hash: AD41C372804129FFEF12BFA4DC84DEE7B7DEF19204F5400A6E685A7011D7369A49CB60
              APIs
              • GetLastError.KERNEL32(?,00000000,?,?,?,00966190,009662A5,00000000,?,009662A5,?), ref: 009660D2
              • WaitNamedPipeA.KERNEL32(009662A5,00002710), ref: 009660E7
              • CreateFileA.KERNEL32(009662A5,C0000000,00000000,00000000,00000003,00000000,00000000,?,00000000,?,?,?,00966190,009662A5,00000000), ref: 009660FF
              • SetNamedPipeHandleState.KERNEL32(?,009662A5,00000000,00000000,?,00000000,?,?,?,00966190,009662A5,00000000,?,009662A5,?), ref: 00966115
              • DisconnectNamedPipe.KERNEL32(?,?,00000000,?,?,?,00966190,009662A5,00000000,?,009662A5,?), ref: 00966121
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: NamedPipe$CreateDisconnectErrorFileHandleLastStateWait
              • String ID:
              • API String ID: 927366879-0
              • Opcode ID: 5e2bcccdd0ec1ab6388db6f0b5d1959e72e7c03b80288c8a26a651917dcc4c3e
              • Instruction ID: f626612f05469acfbb43ed30aace20e0f23b1cafee9f536ad8bdd34f09b68c2f
              • Opcode Fuzzy Hash: 5e2bcccdd0ec1ab6388db6f0b5d1959e72e7c03b80288c8a26a651917dcc4c3e
              • Instruction Fuzzy Hash: 8C11A171228110BFEF015F64DC49F7B3AACEB06310F140529F906E61A0EAB08D50AB20
              APIs
              • htonl.WS2_32(00000000), ref: 00963673
              • htonl.WS2_32(?), ref: 0096367E
              • _malloc.LIBCMT ref: 00963695
                • Part of subcall function 00977001: __FF_MSGBANNER.LIBCMT ref: 00977024
                • Part of subcall function 00977001: __NMSG_WRITE.LIBCMT ref: 0097702B
                • Part of subcall function 00977001: RtlAllocateHeap.NTDLL(00000000,-0000000F,00000001,00000000,00000000,?,00980019,00000000,00000001,00000000,?,00978F65,00000018,009916F8,0000000C,00978FF6), ref: 00977078
              • _memset.LIBCMT ref: 009636EE
                • Part of subcall function 0096AC36: __snprintf.LIBCMT ref: 0096AC75
                • Part of subcall function 0096AC36: __snprintf.LIBCMT ref: 0096AC87
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: __snprintfhtonl$AllocateHeap_malloc_memset
              • String ID: zyxwvutsrqponmlk
              • API String ID: 1734027086-3884694604
              • Opcode ID: 0631e7db7e4353d3c7a422381921b7c971eefb0795e972aa109d4a0abfca4585
              • Instruction ID: dd1757878823a3570d6a47c3f58a72a29db4cb741490fd662ce67ab21e13ee1e
              • Opcode Fuzzy Hash: 0631e7db7e4353d3c7a422381921b7c971eefb0795e972aa109d4a0abfca4585
              • Instruction Fuzzy Hash: BF217FE2E0420077DB207BB59C83B5F7B9CDFC5360F208579F919F7283E6259A049661
              APIs
              • GetModuleHandleA.KERNEL32(ntdll.dll,NtMapViewOfSection,00000000,?,00000000,0096550F,00000000,00000000,00000000), ref: 0096585F
              • GetProcAddress.KERNEL32(00000000), ref: 00965866
              • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00968F3F,00000000), ref: 009658D9
                • Part of subcall function 0096C3C5: GetCurrentProcess.KERNEL32(000F003F,00000000,00000000,?,00000000,00000001,00000000,DDF4A353,00000000,?,?,00961D3F,00000000,000F003F,?,00000000), ref: 0096C434
                • Part of subcall function 0096C482: GetCurrentProcess.KERNEL32(00000080,?,00961B17,?,00000000,00000000,00000001,?,?,0096C6B4,00000000,00000001,00000000,00000000,00000080,0096167C), ref: 0096C4C2
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: CurrentProcess$AddressErrorHandleLastModuleProc
              • String ID: NtMapViewOfSection$ntdll.dll
              • API String ID: 1006775078-3170647572
              • Opcode ID: b9f80e23cf4179315aaa8c92e72813a069a011a29a0419d992c97664ae5b9e0d
              • Instruction ID: 8f3d9a63fe5120af6cde6a3ba9c07f8e1e9999a17ea0d1bee18536672957b701
              • Opcode Fuzzy Hash: b9f80e23cf4179315aaa8c92e72813a069a011a29a0419d992c97664ae5b9e0d
              • Instruction Fuzzy Hash: 3611D672904214BFDB117FF4AC4ADBE3B7CDF84760F214416F615A7192EE718900AB60
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: __snprintf$_memset
              • String ID: %s&%s=%s$?%s=%s
              • API String ID: 444161222-3403399194
              • Opcode ID: ca9b60d7797a5f1b758651952edee89ddb180ffd6b300f6576dff2d53cae2d8b
              • Instruction ID: b6c1a3c59bcbcd4fbb4ecd902ece932c3129939e0fbc191b2870a9706fa2454d
              • Opcode Fuzzy Hash: ca9b60d7797a5f1b758651952edee89ddb180ffd6b300f6576dff2d53cae2d8b
              • Instruction Fuzzy Hash: E001DCB2008200ABCB14EE00CC82F6BB778EBC5B14F918599B9055B252E635ED11D776
              APIs
                • Part of subcall function 010863CC: _malloc.LIBCMT ref: 010863D2
                • Part of subcall function 010863CC: _malloc.LIBCMT ref: 010863E2
              • _malloc.LIBCMT ref: 010807EC
                • Part of subcall function 01096449: __FF_MSGBANNER.LIBCMT ref: 0109646C
                • Part of subcall function 01096449: __NMSG_WRITE.LIBCMT ref: 01096473
              • _malloc.LIBCMT ref: 010808B5
              • __snprintf.LIBCMT ref: 0108091E
              • __snprintf.LIBCMT ref: 0108093C
              • __snprintf.LIBCMT ref: 0108095A
                • Part of subcall function 0108834B: _memset.LIBCMT ref: 01088394
              Memory Dump Source
              • Source File: 00000000.00000003.1756940749.0000000001080000.00000040.00000020.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_3_1080000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: _malloc$__snprintf$_memset
              • String ID:
              • API String ID: 3514394824-0
              • Opcode ID: 637598e0683923cfe21186cfd80eac8b08c3106bc8d65dab26c1215210a2bdf3
              • Instruction ID: f1083d86030ddd733d7cedf464395aaffabc962f544406d49ef1029116103cb6
              • Opcode Fuzzy Hash: 637598e0683923cfe21186cfd80eac8b08c3106bc8d65dab26c1215210a2bdf3
              • Instruction Fuzzy Hash: 5D81267160C312AEE760BB799C01BAFBAE5AFA4310F10492EF5C49A1D4EE72C5458B53
              APIs
                • Part of subcall function 010863CC: _malloc.LIBCMT ref: 010863D2
                • Part of subcall function 010863CC: _malloc.LIBCMT ref: 010863E2
              • _memset.LIBCMT ref: 0108A34F
                • Part of subcall function 0108A616: _memset.LIBCMT ref: 0108A712
              • _malloc.LIBCMT ref: 0108A362
                • Part of subcall function 01096449: __FF_MSGBANNER.LIBCMT ref: 0109646C
                • Part of subcall function 01096449: __NMSG_WRITE.LIBCMT ref: 01096473
              • _memset.LIBCMT ref: 0108A374
              • _malloc.LIBCMT ref: 0108A550
              • _memset.LIBCMT ref: 0108A5E2
              Memory Dump Source
              • Source File: 00000000.00000003.1756940749.0000000001080000.00000040.00000020.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_3_1080000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: _malloc_memset
              • String ID:
              • API String ID: 4137368368-0
              • Opcode ID: c7ae7c1226edfb9ec08ea79c8558e60e47f7ddc655d3b010ee65069c6fd0fc28
              • Instruction ID: 16fb5b1154bded692de047d9774c8f191a100e34e5fb5b9c1b03f8e69f15a8d4
              • Opcode Fuzzy Hash: c7ae7c1226edfb9ec08ea79c8558e60e47f7ddc655d3b010ee65069c6fd0fc28
              • Instruction Fuzzy Hash: 84813972A0C311AAD720FB689C84BEF77E9EB98721F11441FF6C89B180DF75D5418662
              APIs
              • GetTickCount.KERNEL32 ref: 00967AB4
              • GetTickCount.KERNEL32 ref: 00967ACC
              • shutdown.WS2_32(00000000,00000002), ref: 00967AE7
              • shutdown.WS2_32(00000000,00000002), ref: 00967AF4
              • closesocket.WS2_32(00000000), ref: 00967AF9
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: CountTickshutdown$closesocket
              • String ID:
              • API String ID: 3414035747-0
              • Opcode ID: 9c084b3babff95ac955199a6ff06227b829c45d07b4c284e55db09e876dc0d22
              • Instruction ID: e1318a3059779022c148a6a0785e97edba89b948839402e6127580d508fd7312
              • Opcode Fuzzy Hash: 9c084b3babff95ac955199a6ff06227b829c45d07b4c284e55db09e876dc0d22
              • Instruction Fuzzy Hash: 7511A33260CB129FDB309FF4E844A2AF3E8BF44B18B148A19D45693A50E770ED44DF50
              APIs
              • __getptd.LIBCMT ref: 0097F2BA
                • Part of subcall function 0097BF9E: __getptd_noexit.LIBCMT ref: 0097BFA1
                • Part of subcall function 0097BF9E: __amsg_exit.LIBCMT ref: 0097BFAE
              • __amsg_exit.LIBCMT ref: 0097F2DA
              • __lock.LIBCMT ref: 0097F2EA
              • InterlockedDecrement.KERNEL32(?), ref: 0097F307
              • InterlockedIncrement.KERNEL32(01401658), ref: 0097F332
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock
              • String ID:
              • API String ID: 4271482742-0
              • Opcode ID: 58f277daf77b322c402a2dbf21471c44d1624e7b6fbf7d14dd22a2880a887ed7
              • Instruction ID: 57c24301dc762dd150792d8bccfb86425dfc3192456ea4b2c8a597e803fdd619
              • Opcode Fuzzy Hash: 58f277daf77b322c402a2dbf21471c44d1624e7b6fbf7d14dd22a2880a887ed7
              • Instruction Fuzzy Hash: 6201D233A09711ABCF20AF68981A76D77A4BF40B64F14C126E81CB7291CB346E41DBD5
              APIs
              • socket.WS2_32(00000002,00000001,00000000), ref: 00963311
              • gethostbyname.WS2_32(?), ref: 00963325
              • htons.WS2_32(009633E8), ref: 0096334E
              • connect.WS2_32(00000000,?,00000010), ref: 0096335E
              • closesocket.WS2_32(00000000), ref: 00963368
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: closesocketconnectgethostbynamehtonssocket
              • String ID:
              • API String ID: 530611402-0
              • Opcode ID: d18b9462b54346d0442f078bd9357d5654dadefa3069b873150ee311385b2eef
              • Instruction ID: 7fcc255cd20f25233fea80215b1390b806c8a911cb1f114a7c8e0e7bb131c19f
              • Opcode Fuzzy Hash: d18b9462b54346d0442f078bd9357d5654dadefa3069b873150ee311385b2eef
              • Instruction Fuzzy Hash: DDF0A43591061879DE1077B48C86FFE776C9F41760F818651FD24AA3D2EAB0CA049795
              APIs
              • _malloc.LIBCMT ref: 0108C8E6
                • Part of subcall function 01096449: __FF_MSGBANNER.LIBCMT ref: 0109646C
                • Part of subcall function 01096449: __NMSG_WRITE.LIBCMT ref: 01096473
              • _malloc.LIBCMT ref: 0108C8F3
              • _malloc.LIBCMT ref: 0108C90E
              • __snprintf.LIBCMT ref: 0108C921
              • _malloc.LIBCMT ref: 0108C940
              Memory Dump Source
              • Source File: 00000000.00000003.1756940749.0000000001080000.00000040.00000020.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_3_1080000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: _malloc$__snprintf
              • String ID:
              • API String ID: 1839626857-0
              • Opcode ID: 61e7f9ff4ea398ad218335d0326020b1a9064be8001c7e5186826d589bb63fcb
              • Instruction ID: 36e4d5fe6cf01a795edc95c4c3b53ab9f8f886113ff362e15b01c20729bf527a
              • Opcode Fuzzy Hash: 61e7f9ff4ea398ad218335d0326020b1a9064be8001c7e5186826d589bb63fcb
              • Instruction Fuzzy Hash: BD016D70900305AFDF20AFBADC55AD6BBE9EF55750B00882EF4C9CB210DE31D5449BA1
              APIs
              • __lock.LIBCMT ref: 00976F42
                • Part of subcall function 00978FDB: __mtinitlocknum.LIBCMT ref: 00978FF1
                • Part of subcall function 00978FDB: __amsg_exit.LIBCMT ref: 00978FFD
                • Part of subcall function 00978FDB: EnterCriticalSection.KERNEL32(00000000,00000000,?,0097C049,0000000D,00991740,00000008,0097C140,00000000,?,00978C0D,00000000,?,?,?,00978C70), ref: 00979005
              • ___sbh_find_block.LIBCMT ref: 00976F4D
              • ___sbh_free_block.LIBCMT ref: 00976F5C
              • HeapFree.KERNEL32(00000000,00000000,00991598,0000000C,0097BF8F,00000000,?,00980019,00000000,00000001,00000000,?,00978F65,00000018,009916F8,0000000C), ref: 00976F8C
              • GetLastError.KERNEL32(?,00980019,00000000,00000001,00000000,?,00978F65,00000018,009916F8,0000000C,00978FF6,00000000,00000000,?,0097C049,0000000D), ref: 00976F9D
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: CriticalEnterErrorFreeHeapLastSection___sbh_find_block___sbh_free_block__amsg_exit__lock__mtinitlocknum
              • String ID:
              • API String ID: 2714421763-0
              • Opcode ID: f6d6722a85734e6e595d8d8af3562d5c709f370803dc63e4c51e9b0c574f4467
              • Instruction ID: 3b9ae1338a2fda932a45b772e4be21ab9afef66d7d2cc0cdc7cdeb967320c521
              • Opcode Fuzzy Hash: f6d6722a85734e6e595d8d8af3562d5c709f370803dc63e4c51e9b0c574f4467
              • Instruction Fuzzy Hash: 45016D3394D606EAEF306FB4FC0AB5E3AA8EF81764F148119F40CA61D1CB7589409B95
              APIs
              • GetTickCount.KERNEL32 ref: 0096672F
              • GetTickCount.KERNEL32 ref: 00966736
              • PeekNamedPipe.KERNEL32(?,00000000,00000000,00000000,?,00000000), ref: 00966749
              • Sleep.KERNEL32(0000000A), ref: 0096675A
              • GetTickCount.KERNEL32 ref: 00966760
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: CountTick$NamedPeekPipeSleep
              • String ID:
              • API String ID: 1593283408-0
              • Opcode ID: 95bc88ccf870969d71b99a015de8183cab1adcf113cd09e10721a05d496f2665
              • Instruction ID: 1a3b361280e3e4c0adc2ef9efef63469b49e6ea57d5bc7f5f9adc333955a6304
              • Opcode Fuzzy Hash: 95bc88ccf870969d71b99a015de8183cab1adcf113cd09e10721a05d496f2665
              • Instruction Fuzzy Hash: 46F0A77262821DBFEB016FA4DEC48BF7B9CDB44698B280436F102D2110E6709E019B71
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: __snprintf$_strncmp
              • String ID: abcdefghijklmnop
              • API String ID: 3493850238-2486878355
              • Opcode ID: a0fd90ed7f7e021b1e010d18442cd6a83999c8bebc7354fdf8f10e28d45e6cce
              • Instruction ID: 724dae9ce20af806e7dde5d5f97edb01679cdffc0bb4fd436527314a278fb278
              • Opcode Fuzzy Hash: a0fd90ed7f7e021b1e010d18442cd6a83999c8bebc7354fdf8f10e28d45e6cce
              • Instruction Fuzzy Hash: F9418F73900509BFEB01DEE8D9519EFB3BAAE88344B114531E905F7151FA71AE098BA2
              Strings
              Memory Dump Source
              • Source File: 00000000.00000003.1756940749.0000000001080000.00000040.00000020.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_3_1080000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID:
              • String ID: $2$l
              • API String ID: 0-3132104027
              • Opcode ID: f0d739d8cfcab27e5a30adc0bc973be2223b85723898f5a3eb7a7f4809bc7d15
              • Instruction ID: e6204eb3a3dcca29a2fb06116638ab2a7af09790791596c246ad57c5581d1400
              • Opcode Fuzzy Hash: f0d739d8cfcab27e5a30adc0bc973be2223b85723898f5a3eb7a7f4809bc7d15
              • Instruction Fuzzy Hash: 8241C430A06269CBEF758E1C88F83E87BE1AB05316F0441DAC1D967191CB784EC6EF41
              APIs
              • GetModuleHandleA.KERNEL32(00000000,?,00000000,?), ref: 00962092
              • LoadLibraryA.KERNEL32(00000000,?,00000000,?), ref: 0096209D
              • GetProcAddress.KERNEL32(00000000,00000000), ref: 009620A5
                • Part of subcall function 009624AC: _vswprintf_s.LIBCMT ref: 009624C8
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: AddressHandleLibraryLoadModuleProc_vswprintf_s
              • String ID: %s!%s
              • API String ID: 2092861438-2935588013
              • Opcode ID: b77ee30f6c9bf5a62e611a376f9740e94077b7e26c88a61730502368a64b2d02
              • Instruction ID: 750df7bf3c80da1b62c63e6f45d7b1dfca79ba5149988d7b47d7b35ad7636a5a
              • Opcode Fuzzy Hash: b77ee30f6c9bf5a62e611a376f9740e94077b7e26c88a61730502368a64b2d02
              • Instruction Fuzzy Hash: D241187290C4009BDF28DFA0D849ABB7769EB84720F754455EA02AF282DB75DC42D751
              Strings
              Memory Dump Source
              • Source File: 00000000.00000003.1756940749.0000000001080000.00000040.00000020.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_3_1080000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID:
              • String ID: $2$l
              • API String ID: 0-3132104027
              • Opcode ID: 2b532c40938db45bcdedad8c1537ae72f072915b5be4b2ebdb3dd94668a952ef
              • Instruction ID: 37a08849b41dd0a3d2df5600bfc4bb816f75580391abc02a8cbb309d31e5c4f5
              • Opcode Fuzzy Hash: 2b532c40938db45bcdedad8c1537ae72f072915b5be4b2ebdb3dd94668a952ef
              • Instruction Fuzzy Hash: 6941F431905269CAEFB58E6C88B83E8BBB1EB41319F1401CED1D66B191C7754AC6FF40
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: __snprintf$_memset
              • String ID: %s%s
              • API String ID: 444161222-3438391663
              • Opcode ID: 137d42bfac6379f83fdfc43dd1894ab0efd7a7f1d5a25467a16ed1053a4c6c0f
              • Instruction ID: de2999941cdf1180b3fe80e9562a8f201ef8cf160602a918791a8b1815ce5595
              • Opcode Fuzzy Hash: 137d42bfac6379f83fdfc43dd1894ab0efd7a7f1d5a25467a16ed1053a4c6c0f
              • Instruction Fuzzy Hash: 8101DE72108200EBCB01EF00C884F9BBBB9BFC9718F548A68F9448B262E735D915CB61
              APIs
              • _memset.LIBCMT ref: 0096B417
              • GetCurrentProcess.KERNEL32(0096B487), ref: 0096B431
                • Part of subcall function 0096B374: _memset.LIBCMT ref: 0096B38E
                • Part of subcall function 0096B374: __snprintf.LIBCMT ref: 0096B3ED
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: _memset$CurrentProcess__snprintf
              • String ID: system32$syswow64
              • API String ID: 3270679572-3098820961
              • Opcode ID: 18e44ccceba84e8a587ec4761d5d699feba3d1dd7694e8c797998d75ac02bfa4
              • Instruction ID: 9cba6effb049e912b6017ddfc7ddde8fd9805d1f80a59537535951868a6bd333
              • Opcode Fuzzy Hash: 18e44ccceba84e8a587ec4761d5d699feba3d1dd7694e8c797998d75ac02bfa4
              • Instruction Fuzzy Hash: E7F0E232649300AEE7042B50AC07F3A334CEF40714F044028F9088A3E2FFA1A5808659
              APIs
              • GetModuleHandleA.KERNEL32(ntdll.dll,RtlCreateUserThread,00000000,?,?,0096521C,00000000,00000000,00000000,00000000,?,0096550F,00000000,00000000,00000000), ref: 00965B2A
              • GetProcAddress.KERNEL32(00000000), ref: 00965B31
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: AddressHandleModuleProc
              • String ID: RtlCreateUserThread$ntdll.dll
              • API String ID: 1646373207-2935400652
              • Opcode ID: b68ead6ca2f726f793cc8dd6b06bac17e2c8af786c939eae1becd181bed03b7e
              • Instruction ID: c38bdc574008825b1b40b56670bef8de4bf99b2b3aceeb0fa2cd1b1d23e0b946
              • Opcode Fuzzy Hash: b68ead6ca2f726f793cc8dd6b06bac17e2c8af786c939eae1becd181bed03b7e
              • Instruction Fuzzy Hash: AFF03932919219FBCF11EFE1CD0ACEE7F69EF44B10B598954F505A2160E6748B50EB90
              APIs
              • GetModuleHandleA.KERNEL32(ntdll,NtQueueApcThread,?,00965300,00000000,00000000), ref: 00965721
              • GetProcAddress.KERNEL32(00000000), ref: 00965728
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: AddressHandleModuleProc
              • String ID: NtQueueApcThread$ntdll
              • API String ID: 1646373207-1374908105
              • Opcode ID: f7157c4bcce58aadf5e8e51747fdcf7af0bfcd84034b91b5bae127c3e0d574ad
              • Instruction ID: b36daca702388170a936bb295056e53ce5116590ec09ec3b18e1bed4345e38a4
              • Opcode Fuzzy Hash: f7157c4bcce58aadf5e8e51747fdcf7af0bfcd84034b91b5bae127c3e0d574ad
              • Instruction Fuzzy Hash: BCE0D83228C705BBDF201BB0AC0AB5A37599F40B24F108124F119D41E0FB21D5106704
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: __snprintf_memset
              • String ID: %s&%s$?%s
              • API String ID: 2657849664-1750478248
              • Opcode ID: 316b04d92b7decd40d5c91ce93e6b1f6ce194a7d10f5160e3d7199d8c561494a
              • Instruction ID: 4d4a6db50488a46b56ceb64d52b49dae7c7a39bb928770259d74bca2318f27cd
              • Opcode Fuzzy Hash: 316b04d92b7decd40d5c91ce93e6b1f6ce194a7d10f5160e3d7199d8c561494a
              • Instruction Fuzzy Hash: 87F0E5B2148204BFD710EB54CC82F6BB3BCEFC5704F909A9AF94586152EA30EA00C732
              APIs
              • GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,00966EA7), ref: 0096395E
              • GetProcAddress.KERNEL32(00000000), ref: 00963965
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: AddressHandleModuleProc
              • String ID: IsWow64Process$kernel32
              • API String ID: 1646373207-3789238822
              • Opcode ID: a72365a011c10058b98aefb516bdbcb7d346fea64c72febaaaa358281bf9769c
              • Instruction ID: 6f66666f978ae1f5471bc0670c859c993e817fc7a69ebcf32958d918c5a27e72
              • Opcode Fuzzy Hash: a72365a011c10058b98aefb516bdbcb7d346fea64c72febaaaa358281bf9769c
              • Instruction Fuzzy Hash: 53E0E670654206F7DF00DFE5DD1EAAD77BC9B8074DF245054B401E1290DBB4DB00AB50
              APIs
              • GetModuleHandleA.KERNEL32(kernel32,Wow64DisableWow64FsRedirection,?,00963154,?), ref: 00964A44
              • GetProcAddress.KERNEL32(00000000), ref: 00964A4B
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: AddressHandleModuleProc
              • String ID: Wow64DisableWow64FsRedirection$kernel32
              • API String ID: 1646373207-736604160
              • Opcode ID: 36c1b47fba4946f9d5b18cedf0b57270b345695d419f2641c79d78d03fc11a4f
              • Instruction ID: e5a30591da2873eb568f4c866359d541b5d54ddab65ff6453262d0a8be9d4cb3
              • Opcode Fuzzy Hash: 36c1b47fba4946f9d5b18cedf0b57270b345695d419f2641c79d78d03fc11a4f
              • Instruction Fuzzy Hash: 9AC08C3029C3097B8F003FF2EC0D82A3B9CEBC4B467142020B509E23A0DE71C400A764
              APIs
              • GetModuleHandleA.KERNEL32(kernel32,Wow64RevertWow64FsRedirection,?,00963173,?,00000000,00000002), ref: 00964A69
              • GetProcAddress.KERNEL32(00000000), ref: 00964A70
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: AddressHandleModuleProc
              • String ID: Wow64RevertWow64FsRedirection$kernel32
              • API String ID: 1646373207-3900151262
              • Opcode ID: 8b8409f8e88457470268d233452ee5f8861ddb13df33fdf00106b6a3ff06bd31
              • Instruction ID: fe8aa0ea44f58849a9cb9a743c2bca88b489bc979ad829d63ee581cdc58868b0
              • Opcode Fuzzy Hash: 8b8409f8e88457470268d233452ee5f8861ddb13df33fdf00106b6a3ff06bd31
              • Instruction Fuzzy Hash: F5C0123029C2097B8F003BF2AC0D82A3A1CAAD0B467141020F408E13A0DA618910A764
              APIs
              • GetCurrentThread.KERNEL32 ref: 0096C8F3
              • OpenThreadToken.ADVAPI32(00000000), ref: 0096C8FA
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: Thread$CurrentOpenToken
              • String ID:
              • API String ID: 4162712786-0
              • Opcode ID: b3a272f1ec251dc1531fa1a1b5662e48ed21178f87ef068c56a53a5ebcd0a5c9
              • Instruction ID: 73adf091067cfb4f8de7d50ca2b5132de0f3dccf00e9f9e45f1896e2851b1d44
              • Opcode Fuzzy Hash: b3a272f1ec251dc1531fa1a1b5662e48ed21178f87ef068c56a53a5ebcd0a5c9
              • Instruction Fuzzy Hash: C6911DA636D611F5D13C37B66C56FBB494CDF817A5F204F2BB247A40828C6EC540A2BB
              APIs
              Memory Dump Source
              • Source File: 00000000.00000003.1756940749.0000000001080000.00000040.00000020.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_3_1080000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: __snprintf$_memset
              • String ID:
              • API String ID: 444161222-0
              • Opcode ID: 488a0c6b5b57531908c682104d139c967d6658d41fcf70ce9851d33302e9c55b
              • Instruction ID: 88beaf5d5a7c093b8381fb9c2f9afb4e1d3bc4a62b59b27ac58187cc4e330011
              • Opcode Fuzzy Hash: 488a0c6b5b57531908c682104d139c967d6658d41fcf70ce9851d33302e9c55b
              • Instruction Fuzzy Hash: E8519A7290411ABFEF11BFA8DC84DEE7BBDEF15350F104069F694A7191DB319A068B60
              APIs
                • Part of subcall function 00966F84: _malloc.LIBCMT ref: 00966F8A
                • Part of subcall function 00966F84: _malloc.LIBCMT ref: 00966F9A
                • Part of subcall function 00977A18: __fsopen.LIBCMT ref: 00977A25
              • _fseek.LIBCMT ref: 0096432A
                • Part of subcall function 00978052: __lock_file.LIBCMT ref: 00978061
                • Part of subcall function 00978052: __ftelli64_nolock.LIBCMT ref: 0097806E
              • _fseek.LIBCMT ref: 00964343
                • Part of subcall function 009783E3: __lock_file.LIBCMT ref: 0097842E
                • Part of subcall function 009783E3: __fseek_nolock.LIBCMT ref: 0097843E
              • GetFullPathNameA.KERNEL32(0098F70C,00000800,?,00000000,?,?,?,?,?,?,?,?,?,?,?,0096156B), ref: 00964370
              • _malloc.LIBCMT ref: 0096438A
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: _malloc$__lock_file_fseek$FullNamePath__fseek_nolock__fsopen__ftelli64_nolock
              • String ID:
              • API String ID: 73014519-0
              • Opcode ID: 8b38d2bd82913d1d287940607ee8aef03cd685f6acd640004cc5a2dd6d207e65
              • Instruction ID: 93ead04d91841995254dc711c8adfa6690b51e1555148e30ef5592d7404dfa7d
              • Opcode Fuzzy Hash: 8b38d2bd82913d1d287940607ee8aef03cd685f6acd640004cc5a2dd6d207e65
              • Instruction Fuzzy Hash: C641A772C04208ABCF11BBE4DC87F9FBBFCAF88710F144526F514B62A2EA7595549B60
              APIs
              • __flush.LIBCMT ref: 00977AF3
              • __fileno.LIBCMT ref: 00977B13
              • __locking.LIBCMT ref: 00977B1A
              • __flsbuf.LIBCMT ref: 00977B45
                • Part of subcall function 00978D72: __getptd_noexit.LIBCMT ref: 00978D72
                • Part of subcall function 0097AE3A: __decode_pointer.LIBCMT ref: 0097AE45
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: __decode_pointer__fileno__flsbuf__flush__getptd_noexit__locking
              • String ID:
              • API String ID: 3240763771-0
              • Opcode ID: d5a94692dbf7c0478365355007d43b7eda750aa83342b03f2bff25de31914d1d
              • Instruction ID: a401973463f83ad2441c7cbd5df5c9cc721dad588cc4424ae2b4dfb632fbf524
              • Opcode Fuzzy Hash: d5a94692dbf7c0478365355007d43b7eda750aa83342b03f2bff25de31914d1d
              • Instruction Fuzzy Hash: FE417233A08605EBDB289FE9884569EF7BAEFC0720F24C529E41D97240E771DE518B50
              APIs
              • _memset.LIBCMT ref: 00966204
              • _memset.LIBCMT ref: 0096621C
                • Part of subcall function 0096705B: htons.WS2_32(?), ref: 00967073
                • Part of subcall function 00966147: GetLastError.KERNEL32(00000000,00000000,?,009662A5,?), ref: 00966161
              • Sleep.KERNEL32(000001F4), ref: 009662AF
              • GetLastError.KERNEL32 ref: 009662BB
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: ErrorLast_memset$Sleephtons
              • String ID:
              • API String ID: 2264653377-0
              • Opcode ID: 84c0ce47409182f44b359b881e797a11d66adcfb68f5642beda097e059a90651
              • Instruction ID: 9040260394458c4dec4bd56ea29b626af9bf057061d57728be1e2fef0f3d9c42
              • Opcode Fuzzy Hash: 84c0ce47409182f44b359b881e797a11d66adcfb68f5642beda097e059a90651
              • Instruction Fuzzy Hash: 9E31937390821DAEDF11ABE4DC42FEE77BCEF85314F140066F619E6091FA35AA488760
              APIs
              • GetLastError.KERNEL32(00000000,?,00000000,?,0096550F,00000000,00000000,00000000), ref: 00965931
              • WriteProcessMemory.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,?,0096550F,00000000,00000000,00000000), ref: 00965966
              • GetLastError.KERNEL32(00000000,?,00000000,?,0096550F,00000000,00000000,00000000), ref: 009659B5
              • GetLastError.KERNEL32(?,0096550F,00000000,00000000,00000000), ref: 009659C8
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: ErrorLast$MemoryProcessWrite
              • String ID:
              • API String ID: 3937020117-0
              • Opcode ID: 2070e15072076c763d798abe267341f48040d214b8587d82a143ffb595f55642
              • Instruction ID: bb7506c29bf06936c1817918c28b9a16251b84bc47500d5257bb77144a774662
              • Opcode Fuzzy Hash: 2070e15072076c763d798abe267341f48040d214b8587d82a143ffb595f55642
              • Instruction Fuzzy Hash: 31310B72A04615FBDF217FA59C46BAE7768EF80760FA14016FA04EB2C1DF318D409B51
              APIs
              • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 0098210C
              • __isleadbyte_l.LIBCMT ref: 00982140
              • MultiByteToWideChar.KERNEL32(488D10C4,00000009,00000000,53DC458D,0098F5C0,00000000,?,?,?,0096ABC4,00000000,0098F5C0,00000000), ref: 00982171
              • MultiByteToWideChar.KERNEL32(488D10C4,00000009,00000000,00000001,0098F5C0,00000000,?,?,?,0096ABC4,00000000,0098F5C0,00000000), ref: 009821DF
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
              • String ID:
              • API String ID: 3058430110-0
              • Opcode ID: 23e396e433474369bfc5ae919fbe4b93ba0cdc2cea73e79a91c643ab7394bb42
              • Instruction ID: 2fb27788fb796bbf4b13af348a7414bcb47452f67dcea36bc45c336a6dd6cdcc
              • Opcode Fuzzy Hash: 23e396e433474369bfc5ae919fbe4b93ba0cdc2cea73e79a91c643ab7394bb42
              • Instruction Fuzzy Hash: 62318031A0C246EFDB21EF64CC89AAE7BA9BF01310F258569E6669B291D730DD40DB50
              APIs
              • _memset.LIBCMT ref: 00965B7E
              • GetVersionExA.KERNEL32(?,?,?,00000000), ref: 00965B97
              • SetLastError.KERNEL32(00000005,?,?,00000000), ref: 00965BBC
                • Part of subcall function 0096BD3C: GetCurrentProcess.KERNEL32(00000180,?,?,?,?,00961D93,00000000,00000180,?,00000000,00000080,00964B37,009959A8,00000000), ref: 0096BD85
                • Part of subcall function 0096BD3C: VirtualAlloc.KERNELBASE(00000000,00961D93,00003000,00000000,00000180,?,?,?,?,00961D93,00000000,00000180,?,00000000,00000080,00964B37), ref: 0096BDE6
              • SetLastError.KERNEL32(00000006,?,?,00000000), ref: 00965C39
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: ErrorLast$AllocCurrentProcessVersionVirtual_memset
              • String ID:
              • API String ID: 3952774693-0
              • Opcode ID: f18e8d0b697ba737a721e40bf8e5c39030f6e9de4eea6599bd3f98e9abb3c844
              • Instruction ID: dff2256563326e6c994a115a231cf74765660d5401d6b8558c40ac37af34720f
              • Opcode Fuzzy Hash: f18e8d0b697ba737a721e40bf8e5c39030f6e9de4eea6599bd3f98e9abb3c844
              • Instruction Fuzzy Hash: 07212872A00B28AFDB309F749C42B9B77E8EB44710F260465F64EEB281D7789E418794
              APIs
              • _memset.LIBCMT ref: 00964FC1
              • CreatePipe.KERNEL32(?,00000000,?,00100000,?,00000000), ref: 00964FF8
              • GetStartupInfoA.KERNEL32(?), ref: 00965002
              • Sleep.KERNEL32(00000064,?,?,?,?,?,00000000), ref: 0096503E
                • Part of subcall function 0096619F: GetTickCount.KERNEL32 ref: 009661B1
                • Part of subcall function 0096619F: GetTickCount.KERNEL32 ref: 009661DF
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: CountTick$CreateInfoPipeSleepStartup_memset
              • String ID:
              • API String ID: 2883758626-0
              • Opcode ID: 9ba242efad53af7c7185f2e9ffb1c288ce58c13ca70210215af3aa89c08b9ed0
              • Instruction ID: 196a94928b94bfec18a38c8f28f8aa003885235e982f25788e88e9a4aba3648d
              • Opcode Fuzzy Hash: 9ba242efad53af7c7185f2e9ffb1c288ce58c13ca70210215af3aa89c08b9ed0
              • Instruction Fuzzy Hash: C531DA7280020DAFDF11EFA4DC4ABDEBBB9EF48314F140116FA05A6161EB729654DB91
              APIs
              • _memset.LIBCMT ref: 00962FF7
              • CreatePipe.KERNEL32(00000000,00000002,?,00100000,?,00000000,00002000), ref: 0096302D
              • GetStartupInfoA.KERNEL32(?), ref: 00963037
              • WaitForSingleObject.KERNEL32(?,00002710,?,?,?,?,?,?,?,00000000,00002000), ref: 0096307B
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: CreateInfoObjectPipeSingleStartupWait_memset
              • String ID:
              • API String ID: 468459245-0
              • Opcode ID: 77bd1b09a077f349d692678c9aac8d1c31d6aded205bd79a9b916619a96c5eff
              • Instruction ID: 47b7e54177d2534a35ff9025346f0509d507448c20834ce85f0f4a87b35d789a
              • Opcode Fuzzy Hash: 77bd1b09a077f349d692678c9aac8d1c31d6aded205bd79a9b916619a96c5eff
              • Instruction Fuzzy Hash: 5F210772900518BADB11DFE8CD49ADEBBBCFF48300F100056FA04E6251D7729A058BA1
              APIs
              • _malloc.LIBCMT ref: 0096114F
                • Part of subcall function 00977001: __FF_MSGBANNER.LIBCMT ref: 00977024
                • Part of subcall function 00977001: __NMSG_WRITE.LIBCMT ref: 0097702B
                • Part of subcall function 00977001: RtlAllocateHeap.NTDLL(00000000,-0000000F,00000001,00000000,00000000,?,00980019,00000000,00000001,00000000,?,00978F65,00000018,009916F8,0000000C,00978FF6), ref: 00977078
                • Part of subcall function 009649F4: ExpandEnvironmentStringsA.KERNEL32(0096B42D,00000000,00000000,00968F3F,00000100,?,0096B405,?,0096B42D,00000100,?,?,?,?,?,00968F3F), ref: 00964A06
              • _memset.LIBCMT ref: 009611A4
              • _memset.LIBCMT ref: 009611B3
              • _memset.LIBCMT ref: 009611CA
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: _memset$AllocateEnvironmentExpandHeapStrings_malloc
              • String ID:
              • API String ID: 2041733451-0
              • Opcode ID: d04a9c296981b24685af9fe9b4bf51b10b970d2b043669cf674784b3e8bb30a0
              • Instruction ID: 878f9e426f1b30c97db0658484734182a20740d75da4a963c0137e6ae85f367c
              • Opcode Fuzzy Hash: d04a9c296981b24685af9fe9b4bf51b10b970d2b043669cf674784b3e8bb30a0
              • Instruction Fuzzy Hash: BB112B726081457AD7115B748CC1FBABB7EDF57364F194994FA5893143E222AD04C7A0
              APIs
              • _malloc.LIBCMT ref: 01080597
                • Part of subcall function 01096449: __FF_MSGBANNER.LIBCMT ref: 0109646C
                • Part of subcall function 01096449: __NMSG_WRITE.LIBCMT ref: 01096473
              • _memset.LIBCMT ref: 010805EC
              • _memset.LIBCMT ref: 010805FB
              • _memset.LIBCMT ref: 01080612
              Memory Dump Source
              • Source File: 00000000.00000003.1756940749.0000000001080000.00000040.00000020.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_3_1080000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: _memset$_malloc
              • String ID:
              • API String ID: 3506388080-0
              • Opcode ID: 41aee874816658a3c121aa378c42034847776bb726cf30f16a1b2ffde5c25493
              • Instruction ID: a0262bff6d4db7926a47af9092daf5456633868921f67e949e7ebfbda7701e7a
              • Opcode Fuzzy Hash: 41aee874816658a3c121aa378c42034847776bb726cf30f16a1b2ffde5c25493
              • Instruction Fuzzy Hash: D3110B71508246BADB117B79CC91AF77BADDF53164F1000A6F9C497142E6229D08C2B0
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: _strtok$__getptd_malloc_strncpy
              • String ID:
              • API String ID: 4272429445-0
              • Opcode ID: ca57fd26f4d256e8271b79cbb2aaf059c296d87e83a431127869613520e59172
              • Instruction ID: a82c8e3904f56ba0c29061dbbb8471d55ad4e2daba842ca5fbf6329a6690ef0d
              • Opcode Fuzzy Hash: ca57fd26f4d256e8271b79cbb2aaf059c296d87e83a431127869613520e59172
              • Instruction Fuzzy Hash: 6011D6B2028205AFDB189F7CFD957B63B69F751334F10421AE44AC76A1FB329841DB80
              APIs
              Memory Dump Source
              • Source File: 00000000.00000003.1756940749.0000000001080000.00000040.00000020.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_3_1080000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: _strtok$__getptd_malloc_strncpy
              • String ID:
              • API String ID: 4272429445-0
              • Opcode ID: 7cf94bc152efbd3d71f3f56310b9ede4b0769e53a734d187919b6b8b7aefc940
              • Instruction ID: 529c246d633627cd29623633014867b1d3dbfd8f5f3147a2970b88333c0aacd9
              • Opcode Fuzzy Hash: 7cf94bc152efbd3d71f3f56310b9ede4b0769e53a734d187919b6b8b7aefc940
              • Instruction Fuzzy Hash: 0211EB71208256EFEB06BF24EDE9AB57F95EB11360F00421AE5D6CFDA3DB3294018B40
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: _memset
              • String ID:
              • API String ID: 2102423945-0
              • Opcode ID: 834b056de8ca587104025a3cbecdf85a0285ba7fc05e683cd7e84b2a21ad8485
              • Instruction ID: 73e73b4894c120c3fcfa934f151234c853b400911218c67e887c6c2d71b82f78
              • Opcode Fuzzy Hash: 834b056de8ca587104025a3cbecdf85a0285ba7fc05e683cd7e84b2a21ad8485
              • Instruction Fuzzy Hash: E201C872206108BBDF206F654C81EBF3A6CEF893A4F418425F50896142F7359880D7B1
              APIs
              Memory Dump Source
              • Source File: 00000000.00000003.1756940749.0000000001080000.00000040.00000020.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_3_1080000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: _memset
              • String ID:
              • API String ID: 2102423945-0
              • Opcode ID: 114e4abad4c11624546c29d2ca88addcdf7fe84ee9773abc521b0309d3cb51dd
              • Instruction ID: 93d920901386a42ca15360755d2741c7223b606f8d086bde9d9a0cadcdeb52fe
              • Opcode Fuzzy Hash: 114e4abad4c11624546c29d2ca88addcdf7fe84ee9773abc521b0309d3cb51dd
              • Instruction Fuzzy Hash: 8E01C4B1205215FBEB117F658CC0DEF3AADEB656A0B014022F5C99B541D6398840E6B1
              APIs
              Memory Dump Source
              • Source File: 00000000.00000003.1756940749.0000000001080000.00000040.00000020.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_3_1080000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: __lock$___addlocaleref__crt_waiting_on_module_handle
              • String ID:
              • API String ID: 1628550938-0
              • Opcode ID: 0c4c65b69fa96458f3b4f3a86092bb4a97a4495a3fdd785d27837cba3328870a
              • Instruction ID: 0964c6b68e96c00b813e7ce678759ed3ec4bca36ba5d0afa6724f713b9f997ba
              • Opcode Fuzzy Hash: 0c4c65b69fa96458f3b4f3a86092bb4a97a4495a3fdd785d27837cba3328870a
              • Instruction Fuzzy Hash: EE118C71804706EEEB21EF29A850B8ABBE0EF04320F50855EE5A9972A0CB749A41DB55
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: _clock
              • String ID:
              • API String ID: 876827150-0
              • Opcode ID: 7b603e9661d6cdae74affffe1825a31006b956bdeef00b0561502bfb61481e34
              • Instruction ID: 846137dcb74cb81df1f74ea52940001412f2c86a4bd037aeed52e388af4370ae
              • Opcode Fuzzy Hash: 7b603e9661d6cdae74affffe1825a31006b956bdeef00b0561502bfb61481e34
              • Instruction Fuzzy Hash: 150152B1E05619EFCF11EFE8D4C15AEFBB4EF40354F2044BAE425A6201D6309E44DBA2
              APIs
              Memory Dump Source
              • Source File: 00000000.00000003.1756940749.0000000001080000.00000040.00000020.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_3_1080000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: _clock
              • String ID:
              • API String ID: 876827150-0
              • Opcode ID: 7b603e9661d6cdae74affffe1825a31006b956bdeef00b0561502bfb61481e34
              • Instruction ID: e6608a4a5b2b855786099277e0519531ec9a3532a2071f572c412a8dfa737850
              • Opcode Fuzzy Hash: 7b603e9661d6cdae74affffe1825a31006b956bdeef00b0561502bfb61481e34
              • Instruction Fuzzy Hash: 9B018C70D08A19EFDF51EFE886806EDBBF8EF50290F5484AAD5C1A7201E6704A45DBA1
              APIs
              • _strtok.LIBCMT ref: 0096B55E
                • Part of subcall function 009787B5: __getptd.LIBCMT ref: 009787D3
                • Part of subcall function 00976F24: __lock.LIBCMT ref: 00976F42
                • Part of subcall function 00976F24: ___sbh_find_block.LIBCMT ref: 00976F4D
                • Part of subcall function 00976F24: ___sbh_free_block.LIBCMT ref: 00976F5C
                • Part of subcall function 00976F24: HeapFree.KERNEL32(00000000,00000000,00991598,0000000C,0097BF8F,00000000,?,00980019,00000000,00000001,00000000,?,00978F65,00000018,009916F8,0000000C), ref: 00976F8C
                • Part of subcall function 00976F24: GetLastError.KERNEL32(?,00980019,00000000,00000001,00000000,?,00978F65,00000018,009916F8,0000000C,00978FF6,00000000,00000000,?,0097C049,0000000D), ref: 00976F9D
              • _malloc.LIBCMT ref: 0096B587
              • _strncpy.LIBCMT ref: 0096B5A7
              • _strtok.LIBCMT ref: 0096B5B3
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: _strtok$ErrorFreeHeapLast___sbh_find_block___sbh_free_block__getptd__lock_malloc_strncpy
              • String ID:
              • API String ID: 1160209254-0
              • Opcode ID: 7be906e4e07ef22288bf323faab8dd6602a5cc1450aba5406f5216efa7ac9030
              • Instruction ID: ff7c71cb24a90bd862c301b92017989eae7a346fd8e9633ba42145b846f4be97
              • Opcode Fuzzy Hash: 7be906e4e07ef22288bf323faab8dd6602a5cc1450aba5406f5216efa7ac9030
              • Instruction Fuzzy Hash: E101F933118101A9CB196F6CEC5AFF63F6EDB92355B14402AF94EC7162FB329949C690
              APIs
              • _strtok.LIBCMT ref: 0108A9A6
                • Part of subcall function 01097BFD: __getptd.LIBCMT ref: 01097C1B
                • Part of subcall function 0109636C: __lock.LIBCMT ref: 0109638A
                • Part of subcall function 0109636C: ___sbh_find_block.LIBCMT ref: 01096395
                • Part of subcall function 0109636C: ___sbh_free_block.LIBCMT ref: 010963A4
              • _malloc.LIBCMT ref: 0108A9CF
              • _strncpy.LIBCMT ref: 0108A9EF
              • _strtok.LIBCMT ref: 0108A9FB
              Memory Dump Source
              • Source File: 00000000.00000003.1756940749.0000000001080000.00000040.00000020.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_3_1080000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: _strtok$___sbh_find_block___sbh_free_block__getptd__lock_malloc_strncpy
              • String ID:
              • API String ID: 4231573641-0
              • Opcode ID: 62604de10dbbf941476aa68a1f19cf44e924482cf142621a737c4c71ea1ce4ea
              • Instruction ID: 3e6870e091a15bce999e3965ae59d7f5b2241e13dbee790aa5df35e0b36b73d3
              • Opcode Fuzzy Hash: 62604de10dbbf941476aa68a1f19cf44e924482cf142621a737c4c71ea1ce4ea
              • Instruction Fuzzy Hash: 66012B36108542ADDF066F28DC6AFF67FA9EB11364B000159F5C9CB563CB339405D550
              APIs
              • Sleep.KERNEL32(000003E8,00000000,00000000,00000080,0096167C), ref: 0096C6C8
              • ExitThread.KERNEL32 ref: 0096C6D2
              • WaitForSingleObject.KERNEL32(00000000,00000000,00000080,0096167C), ref: 0096C6F3
              • ExitProcess.KERNEL32 ref: 0096C6FF
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: Exit$ObjectProcessSingleSleepThreadWait
              • String ID:
              • API String ID: 2040395460-0
              • Opcode ID: da461db129fab7a1280e3e393e11caf03da8cc54ae666bdcfe23a7c3c15a9cd0
              • Instruction ID: 84ef11f4ec78efa49f1c4572cd9d1d6bfb4afe8f165168c8cbf1ffc1ec8971cf
              • Opcode Fuzzy Hash: da461db129fab7a1280e3e393e11caf03da8cc54ae666bdcfe23a7c3c15a9cd0
              • Instruction Fuzzy Hash: E5F0BBF264C352B6EE303BA5AC8EF7A2609D785B67F140115F255292D19E620C00A569
              APIs
              • _vwprintf.LIBCMT ref: 009617BA
                • Part of subcall function 009773CD: __vscwprintf_helper.LIBCMT ref: 009773DF
              • _malloc.LIBCMT ref: 009617CD
                • Part of subcall function 00977001: __FF_MSGBANNER.LIBCMT ref: 00977024
                • Part of subcall function 00977001: __NMSG_WRITE.LIBCMT ref: 0097702B
                • Part of subcall function 00977001: RtlAllocateHeap.NTDLL(00000000,-0000000F,00000001,00000000,00000000,?,00980019,00000000,00000001,00000000,?,00978F65,00000018,009916F8,0000000C,00978FF6), ref: 00977078
              • _vswprintf_s.LIBCMT ref: 009617E1
                • Part of subcall function 00977359: __vsprintf_s_l.LIBCMT ref: 0097736C
              • _memset.LIBCMT ref: 009617F4
                • Part of subcall function 00976F24: __lock.LIBCMT ref: 00976F42
                • Part of subcall function 00976F24: ___sbh_find_block.LIBCMT ref: 00976F4D
                • Part of subcall function 00976F24: ___sbh_free_block.LIBCMT ref: 00976F5C
                • Part of subcall function 00976F24: HeapFree.KERNEL32(00000000,00000000,00991598,0000000C,0097BF8F,00000000,?,00980019,00000000,00000001,00000000,?,00978F65,00000018,009916F8,0000000C), ref: 00976F8C
                • Part of subcall function 00976F24: GetLastError.KERNEL32(?,00980019,00000000,00000001,00000000,?,00978F65,00000018,009916F8,0000000C,00978FF6,00000000,00000000,?,0097C049,0000000D), ref: 00976F9D
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: Heap$AllocateErrorFreeLast___sbh_find_block___sbh_free_block__lock__vscwprintf_helper__vsprintf_s_l_malloc_memset_vswprintf_s_vwprintf
              • String ID:
              • API String ID: 3037472818-0
              • Opcode ID: c07deb22136079b0894bf741ec6ffa137936bf91a12575e3d4cfbb5c6b995ab5
              • Instruction ID: cdc63debb70176f3e77e19dfb1651c2e4d5dcd594801dc04dcde70dde106451b
              • Opcode Fuzzy Hash: c07deb22136079b0894bf741ec6ffa137936bf91a12575e3d4cfbb5c6b995ab5
              • Instruction Fuzzy Hash: CEF0B4770041197AD7116A94EC82FFF7B5CDFC57A4F144415FD1895041E622A91092B4
              APIs
              • _vwprintf.LIBCMT ref: 01080C02
                • Part of subcall function 01096815: __vscwprintf_helper.LIBCMT ref: 01096827
              • _malloc.LIBCMT ref: 01080C15
                • Part of subcall function 01096449: __FF_MSGBANNER.LIBCMT ref: 0109646C
                • Part of subcall function 01096449: __NMSG_WRITE.LIBCMT ref: 01096473
              • _vswprintf_s.LIBCMT ref: 01080C29
                • Part of subcall function 010967A1: __vsprintf_s_l.LIBCMT ref: 010967B4
              • _memset.LIBCMT ref: 01080C3C
                • Part of subcall function 0109636C: __lock.LIBCMT ref: 0109638A
                • Part of subcall function 0109636C: ___sbh_find_block.LIBCMT ref: 01096395
                • Part of subcall function 0109636C: ___sbh_free_block.LIBCMT ref: 010963A4
              Memory Dump Source
              • Source File: 00000000.00000003.1756940749.0000000001080000.00000040.00000020.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_3_1080000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: ___sbh_find_block___sbh_free_block__lock__vscwprintf_helper__vsprintf_s_l_malloc_memset_vswprintf_s_vwprintf
              • String ID:
              • API String ID: 104857598-0
              • Opcode ID: 38fabf2f3e46de8e4b01c6dd87b6e8f155eb3598ca77ff48d252fa4aafb1d1f2
              • Instruction ID: 2d1f43a54b3cc5ebaaef1997c7d536d64c6d09214a47e604baa181a4f0bab0ef
              • Opcode Fuzzy Hash: 38fabf2f3e46de8e4b01c6dd87b6e8f155eb3598ca77ff48d252fa4aafb1d1f2
              • Instruction Fuzzy Hash: 9DF0B47740411ABEEF217EA4ECC0EFF3BACEFA1560F104119F98895040DA329915A7B1
              APIs
              • _vwprintf.LIBCMT ref: 01080C02
                • Part of subcall function 01096815: __vscwprintf_helper.LIBCMT ref: 01096827
              • _malloc.LIBCMT ref: 01080C15
                • Part of subcall function 01096449: __FF_MSGBANNER.LIBCMT ref: 0109646C
                • Part of subcall function 01096449: __NMSG_WRITE.LIBCMT ref: 01096473
              • _vswprintf_s.LIBCMT ref: 01080C29
                • Part of subcall function 010967A1: __vsprintf_s_l.LIBCMT ref: 010967B4
              • _memset.LIBCMT ref: 01080C3C
                • Part of subcall function 0109636C: __lock.LIBCMT ref: 0109638A
                • Part of subcall function 0109636C: ___sbh_find_block.LIBCMT ref: 01096395
                • Part of subcall function 0109636C: ___sbh_free_block.LIBCMT ref: 010963A4
              Memory Dump Source
              • Source File: 00000000.00000003.1756940749.0000000001080000.00000040.00000020.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_3_1080000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: ___sbh_find_block___sbh_free_block__lock__vscwprintf_helper__vsprintf_s_l_malloc_memset_vswprintf_s_vwprintf
              • String ID:
              • API String ID: 104857598-0
              • Opcode ID: bc3ec67ef03fce20e37587a3174a72625d85f4ff414d6c9b45db4c2e64d876a5
              • Instruction ID: a14dacdf2e2a3d04887f659ef59491928d8c500f7b1ad05c2b7ac9de7ff88992
              • Opcode Fuzzy Hash: bc3ec67ef03fce20e37587a3174a72625d85f4ff414d6c9b45db4c2e64d876a5
              • Instruction Fuzzy Hash: 70F0E97700421E7AEF117E95ECC0EFF3B9CEF52560F104119F98895040DA339915A3B1
              APIs
              • accept.WS2_32(?,00000000,00000000), ref: 0096D585
              • send.WS2_32(00000000,?,?,00000000), ref: 0096D5B2
              • send.WS2_32(00000000,?,?,00000000), ref: 0096D5C0
              • closesocket.WS2_32(00000000), ref: 0096D5CB
                • Part of subcall function 0096D507: closesocket.WS2_32(?), ref: 0096D509
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: closesocketsend$accept
              • String ID:
              • API String ID: 2168303407-0
              • Opcode ID: b3e3f17ae9f63458df19be4f57e633e1891455326733d366e931a6455b954a6f
              • Instruction ID: 2eee0c1a9a4348c7659adf4df60d077c30dc234854f4244665e2020d4f855974
              • Opcode Fuzzy Hash: b3e3f17ae9f63458df19be4f57e633e1891455326733d366e931a6455b954a6f
              • Instruction Fuzzy Hash: 49F0B476A01B00BBDA303BB4ECC2F5BB76CEF48724F244A06F26755996C671A4005761
              APIs
              • InitializeProcThreadAttributeList.KERNEL32(00000000,00967F62,00000000,00000000,00968F3F,?,00968F3F,?,?,00967F62,00000000,?), ref: 00967ED9
              • GetProcessHeap.KERNEL32(00000000,00000000,?,?,00967F62,00000000,?), ref: 00967EDF
              • HeapAlloc.KERNEL32(00000000,?,?,00967F62,00000000,?), ref: 00967EE6
              • InitializeProcThreadAttributeList.KERNEL32(00000000,00967F62,00000000,00000000,?,?,00967F62,00000000,?), ref: 00967EFB
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: AttributeHeapInitializeListProcThread$AllocProcess
              • String ID:
              • API String ID: 1212816094-0
              • Opcode ID: de44797b453d0f36a0c5ed352127b456ef2b6faf8bd8e3575bb3b7dc4a1363a6
              • Instruction ID: 82374ebcb68fac3e77f1e45abc9fd5b83eb3b7b1722501046f330af91c4824a3
              • Opcode Fuzzy Hash: de44797b453d0f36a0c5ed352127b456ef2b6faf8bd8e3575bb3b7dc4a1363a6
              • Instruction Fuzzy Hash: FAF05E76604108BB8B129FE5DD88CAFBEBCDB896947140065FA01D3200D6719A00EB70
              APIs
              • GetTickCount.KERNEL32 ref: 009661B1
              • PeekNamedPipe.KERNEL32(?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,009662DD,?), ref: 009661C5
              • Sleep.KERNEL32(000001F4,?,00000000,00000000,?,?,009662DD,?), ref: 009661D9
              • GetTickCount.KERNEL32 ref: 009661DF
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: CountTick$NamedPeekPipeSleep
              • String ID:
              • API String ID: 1593283408-0
              • Opcode ID: bcf26cbade13c52b498ddf78587f7513ef75c9a93e37bf7c22bc2bb91485c00c
              • Instruction ID: d81f819896d450e55de8f8f0ba93f26200d3097fd610268fc9a736d602e2fe59
              • Opcode Fuzzy Hash: bcf26cbade13c52b498ddf78587f7513ef75c9a93e37bf7c22bc2bb91485c00c
              • Instruction Fuzzy Hash: B6F030B161811DBFEB005F94DC888AFB7ADEB857A87150476F502E6111E6B1EE409B60
              APIs
              • __getptd.LIBCMT ref: 0097FA26
                • Part of subcall function 0097BF9E: __getptd_noexit.LIBCMT ref: 0097BFA1
                • Part of subcall function 0097BF9E: __amsg_exit.LIBCMT ref: 0097BFAE
              • __getptd.LIBCMT ref: 0097FA3D
              • __amsg_exit.LIBCMT ref: 0097FA4B
              • __lock.LIBCMT ref: 0097FA5B
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: __amsg_exit__getptd$__getptd_noexit__lock
              • String ID:
              • API String ID: 3521780317-0
              • Opcode ID: a6842339695342f15f75a34c4a71ba6c6a2135acb890c508a6745773a5ba292d
              • Instruction ID: 7c38d6295c4fb5d28e72b37c9a735f1ce850ad9195a551d808e2b596fbea214f
              • Opcode Fuzzy Hash: a6842339695342f15f75a34c4a71ba6c6a2135acb890c508a6745773a5ba292d
              • Instruction Fuzzy Hash: CFF090339447009EDB24FBB8981775973A0AF80B20F14C56AE44CBB2D1DB3499019B51
              APIs
              • __getptd.LIBCMT ref: 0109EE6E
                • Part of subcall function 0109B3E6: __getptd_noexit.LIBCMT ref: 0109B3E9
                • Part of subcall function 0109B3E6: __amsg_exit.LIBCMT ref: 0109B3F6
              • __getptd.LIBCMT ref: 0109EE85
              • __amsg_exit.LIBCMT ref: 0109EE93
              • __lock.LIBCMT ref: 0109EEA3
              Memory Dump Source
              • Source File: 00000000.00000003.1756940749.0000000001080000.00000040.00000020.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_3_1080000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: __amsg_exit__getptd$__getptd_noexit__lock
              • String ID:
              • API String ID: 3521780317-0
              • Opcode ID: 0e63234c195ec53b9e9f1b227147411f1af18321cc1fcdb129126502f8c210b1
              • Instruction ID: 5217fe3346fa825045af291f4555028834c1e26cf80fad268ca6d192405a1304
              • Opcode Fuzzy Hash: 0e63234c195ec53b9e9f1b227147411f1af18321cc1fcdb129126502f8c210b1
              • Instruction Fuzzy Hash: D8F06D719006068BEF21EB74C565BCD73E0AF10320F10C15AE5D06B391CB209D40EA91
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: _memset
              • String ID: l.dl$ntdl
              • API String ID: 2102423945-1236859653
              • Opcode ID: 1fa81a2a2cbbb61675b1149e2676844100b29c6b66f61cbe1bcb22762e416b2a
              • Instruction ID: e58a662ad327f793fbe971cb673a41361a05ee0b3be6cb5ebe3be6b34c942170
              • Opcode Fuzzy Hash: 1fa81a2a2cbbb61675b1149e2676844100b29c6b66f61cbe1bcb22762e416b2a
              • Instruction Fuzzy Hash: C6512875A00619DFCB24CF98C481AADB7F5FF48314F6584A9D948EB365E730AE81CB90
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000003.1756940749.0000000001080000.00000040.00000020.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_3_1080000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: _memset
              • String ID: l.dl$ntdl
              • API String ID: 2102423945-1236859653
              • Opcode ID: 66f4404577cec48e68b74343d72ba55979407611c7aca8b3784e31e81a7827e6
              • Instruction ID: dee845e0f587a369fa789513837621068023bd3cf3a191797015fbbea75a417e
              • Opcode Fuzzy Hash: 66f4404577cec48e68b74343d72ba55979407611c7aca8b3784e31e81a7827e6
              • Instruction Fuzzy Hash: AB516C75A04615DFCB60DF98C480AADBBF1FF48315F15849AE989AB752D330EE41CB90
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: __snprintf
              • String ID: %c%c%c%c
              • API String ID: 2633826957-103593547
              • Opcode ID: c6652946d95e712258dc064360c231f2c7916d938d0930cb0c126b157aef2080
              • Instruction ID: ec001da409cbe33464291d29b8009450c33340a457e17f650f93b34d572b587e
              • Opcode Fuzzy Hash: c6652946d95e712258dc064360c231f2c7916d938d0930cb0c126b157aef2080
              • Instruction Fuzzy Hash: 02F0F67180854E6DDB05EBE48C9AEFFBFFC8B04704F400191AA51D3142E525D3498B90
              APIs
              • _malloc.LIBCMT ref: 0096463F
                • Part of subcall function 00977001: __FF_MSGBANNER.LIBCMT ref: 00977024
                • Part of subcall function 00977001: __NMSG_WRITE.LIBCMT ref: 0097702B
                • Part of subcall function 00977001: RtlAllocateHeap.NTDLL(00000000,-0000000F,00000001,00000000,00000000,?,00980019,00000000,00000001,00000000,?,00978F65,00000018,009916F8,0000000C,00978FF6), ref: 00977078
              • __snprintf.LIBCMT ref: 00964653
                • Part of subcall function 0097858A: RemoveDirectoryA.KERNEL32(009646B7,?,009646B7,00000000,?,?,?,00000000), ref: 00978592
                • Part of subcall function 0097858A: GetLastError.KERNEL32(?,009646B7,00000000,?,?,?,00000000), ref: 0097859C
                • Part of subcall function 0097858A: __dosmaperr.LIBCMT ref: 009785AB
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: AllocateDirectoryErrorHeapLastRemove__dosmaperr__snprintf_malloc
              • String ID: %s\%s
              • API String ID: 47932920-4073750446
              • Opcode ID: d4378ed6b25a904f4f13356d3e17dba7a0dee8f41f96eed8c6b73876d8a5e5c4
              • Instruction ID: 542ebab682074b193ebc890cbf2cabf66d3dd28b784bd4aab24de1482815e557
              • Opcode Fuzzy Hash: d4378ed6b25a904f4f13356d3e17dba7a0dee8f41f96eed8c6b73876d8a5e5c4
              • Instruction Fuzzy Hash: D5E0DF23508114B6CA223B95EC06FAFBA6CCFC2B74F188026F90C14141AEB6191185FB
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: __snprintf_memset
              • String ID: %s%s: %s
              • API String ID: 2657849664-533130479
              • Opcode ID: 80394d2d44d6888712ce81af0b1ba960f646b0fbefa418fea08725650caee246
              • Instruction ID: 6d13b194e50954296d56722563d93ce52d92bc308d36ea8c976a7224edc5009e
              • Opcode Fuzzy Hash: 80394d2d44d6888712ce81af0b1ba960f646b0fbefa418fea08725650caee246
              • Instruction Fuzzy Hash: 6DF0ED73108208ABCF00EE50CC81F8BB7BDEFCAB14F104565FA009B251E635E912EB62
              APIs
              • _malloc.LIBCMT ref: 00969229
                • Part of subcall function 00977001: __FF_MSGBANNER.LIBCMT ref: 00977024
                • Part of subcall function 00977001: __NMSG_WRITE.LIBCMT ref: 0097702B
                • Part of subcall function 00977001: RtlAllocateHeap.NTDLL(00000000,-0000000F,00000001,00000000,00000000,?,00980019,00000000,00000001,00000000,?,00978F65,00000018,009916F8,0000000C,00978FF6), ref: 00977078
              • __snprintf.LIBCMT ref: 0096923D
                • Part of subcall function 0096925B: _malloc.LIBCMT ref: 00969268
                • Part of subcall function 0096925B: __snprintf.LIBCMT ref: 00969279
                • Part of subcall function 0096925B: FindFirstFileA.KERNEL32(00000000,009646B0,?,0096934A,009646B0,?,00964634), ref: 00969286
                • Part of subcall function 0096925B: _malloc.LIBCMT ref: 009692C5
                • Part of subcall function 0096925B: __snprintf.LIBCMT ref: 009692DA
                • Part of subcall function 0096925B: FindNextFileA.KERNEL32(000000FF,009646B0,?,?,?,?,?,?,?), ref: 00969307
                • Part of subcall function 0096925B: FindClose.KERNEL32(000000FF,?,?,?,?,?,?,?), ref: 00969314
                • Part of subcall function 00976F24: __lock.LIBCMT ref: 00976F42
                • Part of subcall function 00976F24: ___sbh_find_block.LIBCMT ref: 00976F4D
                • Part of subcall function 00976F24: ___sbh_free_block.LIBCMT ref: 00976F5C
                • Part of subcall function 00976F24: HeapFree.KERNEL32(00000000,00000000,00991598,0000000C,0097BF8F,00000000,?,00980019,00000000,00000001,00000000,?,00978F65,00000018,009916F8,0000000C), ref: 00976F8C
                • Part of subcall function 00976F24: GetLastError.KERNEL32(?,00980019,00000000,00000001,00000000,?,00978F65,00000018,009916F8,0000000C,00978FF6,00000000,00000000,?,0097C049,0000000D), ref: 00976F9D
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: Find__snprintf_malloc$FileHeap$AllocateCloseErrorFirstFreeLastNext___sbh_find_block___sbh_free_block__lock
              • String ID: %s\%s
              • API String ID: 1254174322-4073750446
              • Opcode ID: 677f6972eb88943870830cf4f6fbc36c6c539be201904ca4b2c2ac58a3eee39a
              • Instruction ID: 92a5cf60f92dd091f89d43becd54d274fb4622dc65a4af32dbbff46811a861bc
              • Opcode Fuzzy Hash: 677f6972eb88943870830cf4f6fbc36c6c539be201904ca4b2c2ac58a3eee39a
              • Instruction Fuzzy Hash: 83E08C33500018368B123F929C42EBFBF2DEFC6BA0B008025FE0C212119A364921A7A2
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: Failure
              • String ID: abcdefghijklmnop$abcdefghijklmnop
              • API String ID: 3995482717-935656707
              • Opcode ID: 4d1227ede6a145633f070787483e74cd4d58cfad1496ae03b9bb51402f780a7b
              • Instruction ID: ca3e8407c2879308df97098333b260f0967c13279b2c1f57946fe6b1decfc605
              • Opcode Fuzzy Hash: 4d1227ede6a145633f070787483e74cd4d58cfad1496ae03b9bb51402f780a7b
              • Instruction Fuzzy Hash: 72D0C97720D2083DFA20B49ABD07FB7BB9CD7C1775F70417BF9088529069026C1552B9
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2936432455.0000000000960000.00000040.00001000.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
              • Associated: 00000000.00000002.2936432455.0000000000995000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.0000000000999000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.000000000099B000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A1000.00000040.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.2936432455.00000000009A3000.00000040.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_960000_loaddll32.jbxd
              Yara matches
              Similarity
              • API ID: __snprintf_memset
              • String ID: %s%s
              • API String ID: 2657849664-3438391663
              • Opcode ID: a34729b2c9014584882a340c3c7821b0d4a8799d8db0f8fcde4283904ba14b38
              • Instruction ID: 56447522325a3420a00864c29128322a6f35cbf9ff9cffdb926d5494d5989166
              • Opcode Fuzzy Hash: a34729b2c9014584882a340c3c7821b0d4a8799d8db0f8fcde4283904ba14b38
              • Instruction Fuzzy Hash: 8FE01273108304BBCB10AE95CCC2F9BB7BCEFCAB18F408569F505C6151E631D9149722