Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
AyCnklzHb7.dll

Overview

General Information

Sample name:AyCnklzHb7.dll
(renamed file extension from exe to dll, renamed because original name is a hash value)
Original sample name:32f82fc72003ea760425630e2c6a998f5c89d85e8a4adff669c24da0ef15ef42.exe
Analysis ID:1543073
MD5:3c9121d5389ae5b87885261c3efdf6da
SHA1:0f6fb000293f957b4f0fc91540cfce6a1c07f63c
SHA256:32f82fc72003ea760425630e2c6a998f5c89d85e8a4adff669c24da0ef15ef42
Tags:exeuser-JAMESWT_MHT
Infos:

Detection

Score:9
Range:0 - 100
Whitelisted:false
Confidence:40%

Signatures

AV process strings found (often used to terminate AV products)
Binary contains a suspicious time stamp
Checks if the current process is being debugged
Contains functionality to call native functions
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found large amount of non-executed APIs
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Registers a DLL
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)

Classification

  • System is w10x64
  • loaddll64.exe (PID: 7300 cmdline: loaddll64.exe "C:\Users\user\Desktop\AyCnklzHb7.dll" MD5: 763455F9DCB24DFEECC2B9D9F8D46D52)
    • conhost.exe (PID: 7308 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7352 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\AyCnklzHb7.dll",#1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • rundll32.exe (PID: 7376 cmdline: rundll32.exe "C:\Users\user\Desktop\AyCnklzHb7.dll",#1 MD5: EF3179D498793BF4234F708D3BE28633)
    • regsvr32.exe (PID: 7360 cmdline: regsvr32.exe /s C:\Users\user\Desktop\AyCnklzHb7.dll MD5: B0C2FA35D14A9FAD919E99D9D75E1B9E)
    • rundll32.exe (PID: 7384 cmdline: rundll32.exe C:\Users\user\Desktop\AyCnklzHb7.dll,DllCanUnloadNow MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7448 cmdline: rundll32.exe C:\Users\user\Desktop\AyCnklzHb7.dll,DllGetClassObject MD5: EF3179D498793BF4234F708D3BE28633)
      • WerFault.exe (PID: 7528 cmdline: C:\Windows\system32\WerFault.exe -u -p 7448 -s 420 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
    • rundll32.exe (PID: 7608 cmdline: rundll32.exe C:\Users\user\Desktop\AyCnklzHb7.dll,DllRegisterServer MD5: EF3179D498793BF4234F708D3BE28633)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: AyCnklzHb7.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF
Source: Binary string: pnidui.pdbUGP source: rundll32.exe, 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmp, AyCnklzHb7.dll
Source: Binary string: \ICS_Release\Setup.pdb source: rundll32.exe, 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmp, AyCnklzHb7.dll
Source: Binary string: \magadan21\loader\objfre_wxp_x86\i386\Loader.pdb source: rundll32.exe, 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmp, AyCnklzHb7.dll
Source: Binary string: \work\urlgl\driver2\objfre_wxp_x86\i386\MekeAttManage.pdb source: rundll32.exe, 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmp, AyCnklzHb7.dll
Source: Binary string: 0\SearchRecover.pdb( source: rundll32.exe, 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmp, AyCnklzHb7.dll
Source: Binary string: "0\7to\apphelp\Release\injectdll.pdbR source: rundll32.exe, 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmp, AyCnklzHb7.dll
Source: Binary string: \Release\Wallpaper.pdb source: rundll32.exe, 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmp, AyCnklzHb7.dll
Source: Binary string: 0\IrCS_Release\Setup.pdb/ source: rundll32.exe, 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmp, AyCnklzHb7.dll
Source: Binary string: \SearchRecover.pdb source: rundll32.exe, 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmp, AyCnklzHb7.dll
Source: Binary string: 0\BLDService.pdb6 source: rundll32.exe, 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmp, AyCnklzHb7.dll
Source: Binary string: 0\ICS_Release\Setup.pdb9 source: rundll32.exe, 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmp, AyCnklzHb7.dll
Source: Binary string: \IrCS_Release\Setup.pdb source: rundll32.exe, 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmp, AyCnklzHb7.dll
Source: Binary string: \bbcomm.pdb source: rundll32.exe, 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmp, AyCnklzHb7.dll
Source: Binary string: 90\work\urlgl\driver2\objfre_wxp_x86\i386\MekeAttManage.pdb= source: rundll32.exe, 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmp, AyCnklzHb7.dll
Source: Binary string: 0\bbhelper.pdb$ source: rundll32.exe, 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmp, AyCnklzHb7.dll
Source: Binary string: 0\setupplugins.pdb& source: rundll32.exe, 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmp, AyCnklzHb7.dll
Source: Binary string: \bbhelper.pdb source: rundll32.exe, 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmp, AyCnklzHb7.dll
Source: Binary string: \WallpaperInstall\release\WallpaperInstall.pdb source: rundll32.exe, 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmp, AyCnklzHb7.dll
Source: Binary string: 0 \magadan21\loader\objfre_wxp_x86\i386\Loader.pdb% source: rundll32.exe, 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmp, AyCnklzHb7.dll
Source: Binary string: \Release\Wallpaper.pdbG source: rundll32.exe, 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmp, AyCnklzHb7.dll
Source: Binary string: \setupplugins.pdb source: rundll32.exe, 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmp, AyCnklzHb7.dll
Source: Binary string: 0\bbcomm.pdb2 source: rundll32.exe, 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmp, AyCnklzHb7.dll
Source: Binary string: \Release\Laban.pdb source: rundll32.exe, 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmp, AyCnklzHb7.dll
Source: Binary string: 0\weiduan.pdb+ source: rundll32.exe, 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmp, AyCnklzHb7.dll
Source: Binary string: \BLDService.pdb source: rundll32.exe, 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmp, AyCnklzHb7.dll
Source: Binary string: 0\ExtWatcher.pdbB source: rundll32.exe, 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmp, AyCnklzHb7.dll
Source: Binary string: pnidui.pdb source: rundll32.exe, 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmp, AyCnklzHb7.dll
Source: Binary string: \weiduan.pdb source: rundll32.exe, 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmp, AyCnklzHb7.dll
Source: Binary string: .0\WallpaperInstall\release\WallpaperInstall.pdbb source: rundll32.exe, 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmp, AyCnklzHb7.dll
Source: Binary string: \ExtWatcher.pdb source: rundll32.exe, 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmp, AyCnklzHb7.dll
Source: Binary string: \Release\Laban.pdb source: rundll32.exe, 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmp, AyCnklzHb7.dll
Source: Binary string: \7to\apphelp\Release\injectdll.pdb source: rundll32.exe, 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmp, AyCnklzHb7.dll
Source: unknownDNS traffic detected: query: 198.187.3.20.in-addr.arpa replaycode: Name error (3)
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: 198.187.3.20.in-addr.arpa
Source: rundll32.exe, 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmp, AyCnklzHb7.dllString found in binary or memory: http://%s/dupe.php?q=%d.%d.%d.%d.%d.%s.1.%d
Source: rundll32.exe, 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmp, AyCnklzHb7.dllString found in binary or memory: http://%s/dupe.php?q=%d.%d.%d.%d.%d.%s.1.%d#
Source: rundll32.exe, 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmp, AyCnklzHb7.dllString found in binary or memory: http://95.143.193.138/xxxx_3/
Source: rundll32.exe, 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmp, AyCnklzHb7.dllString found in binary or memory: http://95.143.193.138/xxxx_3/6
Source: AyCnklzHb7.dllString found in binary or memory: http://get.fc-gosh.biz/launch_reb.php?
Source: Amcache.hve.9.drString found in binary or memory: http://upx.sf.net
Source: rundll32.exeString found in binary or memory: http://www.msftconnecttest.com/redirect
Source: rundll32.exe, 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmp, AyCnklzHb7.dllString found in binary or memory: http://www.msftconnecttest.com/redirectSYSTEM
Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FFDFB75EA88 NtQueryWnfStateData,free,RtlSubscribeWnfStateChangeNotification,free,6_2_00007FFDFB75EA88
Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FFDFB72C020 GetCurrentProcessId,ProcessIdToSessionId,EnterCriticalSection,memset,NtQueryWnfStateData,RtlSubscribeWnfStateChangeNotification,LeaveCriticalSection,GetLastError,LeaveCriticalSection,EnterCriticalSection,CompareFileTime,CompareFileTime,LeaveCriticalSection,LeaveCriticalSection,6_2_00007FFDFB72C020
Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FFDFB75E76C NtQueryInformationToken,NtQueryInformationToken,6_2_00007FFDFB75E76C
Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FFDFB7496BC NtQueryWnfStateData,CoTaskMemAlloc,NtQueryWnfStateData,CoTaskMemFree,6_2_00007FFDFB7496BC
Source: C:\Windows\System32\rundll32.exeCode function: GetCurrentThreadId,GetTickCount,LoadLibraryExW,memset,wcstombs,GetProcAddress,GetTickCount,FreeLibrary,GetLastError,GetLastError,memset,swprintf_s,free,wcscpy_s,CreateProcessW,CloseHandle,CloseHandle,GetLastError, Shutdown6_2_00007FFDFB7289E0
Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FFDFB728BF06_2_00007FFDFB728BF0
Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FFDFB72A3F06_2_00007FFDFB72A3F0
Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FFDFB72A3706_2_00007FFDFB72A370
Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FFDFB729B206_2_00007FFDFB729B20
Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FFDFB75335C6_2_00007FFDFB75335C
Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FFDFB7242406_2_00007FFDFB724240
Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FFDFB7218F06_2_00007FFDFB7218F0
Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FFDFB7641346_2_00007FFDFB764134
Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FFDFB7257D06_2_00007FFDFB7257D0
Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FFDFB7627D06_2_00007FFDFB7627D0
Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FFDFB74C6906_2_00007FFDFB74C690
Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FFDFB762DD86_2_00007FFDFB762DD8
Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7448 -s 420
Source: AyCnklzHb7.dllStatic PE information: Resource name: RT_ICON type: COM executable for DOS
Source: AyCnklzHb7.dllBinary or memory string: OriginalFilenamePNIDUI.DLLj% vs AyCnklzHb7.dll
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\pnidui.dll
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\wbem\fastprox.dll
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\biwinrt.dllore.dllng
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\zh-CN\ntdll.dll.mui.0r
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\InputMethod\CHS\ChsPinyinDM49.lexe.lex\ChsChsPinyinHap_s.lex
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\drivers\zh-CN\ndis.sys.mui
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows.old\Windows\WinSxS\Tempe.exee1
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\CloudExperienceHostCommon.dll
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\zh-CN\crypt32.dll.mui
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\SyncCenter.dll
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\winevt\Logs\Microsoft-Windows-Dhcp-Client%4Admin.evtx
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\ProgramData\Microsoft\Windows\AppRepository\StateRepository-Machine.srd
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\stobject.dllprofile;
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\MosStorage.dllll
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\ucrtbase_clr0400.dllF-
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Program Files (x86)\Mythware\
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\ClipRenew.exe
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows.old\Windows\WinSxS\amd64_microsoft-windows-hvsi-service-shared_31bf3856ad364e35_10.0.19041.906_none_6530c5981102f17fbwere.dat
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\StateRepository.Core.dllllstem32\WindowsPowerShell\v
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\zh-CN\rundll32.exe.mui
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\icuuc.dlles
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\INF\kdnic.PNFrStore\zh-CNcat
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\NetSetupApi.dllrfaceCl
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\drivers\ClipSp.sysPCI#
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\WofUtil.dll\EdgeCorei
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\WSDApi.dllcbda2}\0004010
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\Windows.Media.Devices.dllrogramDataPublic=C:\Users\Pu
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\authui.dllllost.exetificados CGN V20P
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\drivers\zh-CN\acpi.sys.mui
Source: AyCnklzHb7.dllBinary string: S-1-5-21-582503613-890440277-4174216604-1001\Device\HarddiskVolume3\Windows\System32\GameBarPresenceWriter.exe
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\cscobj.dllxyewy3d8bbwe+
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\NetSetupApi.dll.dllA6
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\ProximityServicePal.dlla90-b076-33f57bf4eaa7}\#0}\#KBD
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\servicing\Packages\Microsoft-Windows-WinOcr-Package~31bf3856ad364e35~amd64~zh-CN~10.0.19041.1.mum35~amd64~~10.0.19041.1.mum\3\g95]_F_
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\drivers\zh-CN\processr.sys.mui
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\NcdAutoSetup.dll
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\LogFiles\WMI\IntelA
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\svchost.exeiF
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\drivers\mssecflt.sysle
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\ProgramData\Huorong\Sysdiag\wlfile.db-shm
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\D3D12.dll0c75d6}\0008
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\SysWOW64\thumbcache.dlls.dlll
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\SleepStudyScreenOn
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Users\
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\servicing\Packages\Microsoft-Windows-TFTP-Client-Package~31bf3856ad364e35~amd64~~10.0.19041.1.mummlep-UqQSqnMp-FI[1].css.pngw
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\SecureTimeAggregator.dll
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\batmeter.dlldll8f69f
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\RTWorkQ.dll3 G30N
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Program Files (x86)\Microsoft\EdgeCore\128.0.2739.79\identity_proxy\internal.identity_helper.exe.manifestD39FCE23AF8F277537F2613.scale-100_
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\fdPHost.dll
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\RTWorkQ.dllmprofile+
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\drivers\WfNicPnp64.sysnterfaceClass\{97EBAACB-95BD-11D0-A3EA-00A0C9223196}InterfaceClass\{3C4852D6-D47B-4F46-B05E-B5EDC1AA440
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\Windows.Media.Devices.dllON=a503ProgramData=C:\Progra
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\mobsync.exeWERTemp
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows.old\Windows\System32\wbemgmp
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\BitsProxy.dll.dllLL
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\drivers\IntelTA.syslas
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\SysWOW64\imageres.dlllure.dll
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\drivers\zh-CN\mssmbios.sys.mui
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\INF\rt640x64.inforezh-CNcat
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\InputMethod\CHS\ChsPinyinDM49.lex.lexcontrast-white.pngdll
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\netcenter.dllftdll
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\Microsoft\Protectui
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\appcompat\ProgramsbowsApps
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\zh-CN\cscui.dll.muiat
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\servicing\Packages\Microsoft-Windows-WinOcr-Opt-Package~31bf3856ad364e35~amd64~~10.0.19041.746.mumV\3\g
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\SecureTimeAggregator.dllD$
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\RTWorkQ.dll
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\drivers\wmilib.sysF5-6
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\drivers\pcw.sysCA-84AE
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\icu.dllup.dll
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\drivers\acpiex.sys1_V
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\dxgiadaptercache.exe
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\RuntimeBroker.exel
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\BitLockerWizardElev.exe
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\ProgramData\Microsoft\Windows\Start Menu
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\wbem\wbemess.dll
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\fontgroupsoverride.dll
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\SettingMonitor.dllll6
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\srpapi.dllSLSApps
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\AuthBroker.dll.dllb
Source: AyCnklzHb7.dllBinary string: S-1-5-19\Device\HarddiskVolume3\Windows\System32\svchost.exe
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\WinSxS\Manifests\x86_policy.8.0.microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_51704e630f46ca5c.manifest
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\AppReadinessimeBroker.exe
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\zh-CN\sxs.dll.muixeL.c
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\InputMethod\CHS\ChsPinyinDM06.lex.CBS_cw5n1h2txyewy\d2d1.dll
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\pnidui.dllkages
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\SysWOW64\wmp.dllTempgesTemp7<
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\Windows.UI.Shell.dllApplicationCA2 Root0
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\WPDShServiceObj.dll
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\cscobj.dlldllewywywyti
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\SystemApps\Microsoft.AAD.BrokerPlugin_cw5n1h2txyewy\pris\resources.zh-CN.prie7$\Default
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\crypttpmeksvc.dll5FC59
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\shdocvw.dll
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\SoftwareDistribution\PostRebootEventCache.V2e\Scheduled Start
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\InprocLogger.dlllf
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\AudioSrvPolicyManager.dll
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\DXCore.dllsicDisplay.sys
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\bitsigd.dlldll.mui
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\ProximityServicePal.dll11d2-b082-00a0c91efb8b}\#r#or
Source: AyCnklzHb7.dllBinary string: f\DEVICE\HARDDISKVOLUME3\PROGRAM FILES (X86)\MYTHWARE\
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\deviceassociation.dll
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\ProgramData\Microsoft\Windows\AppRepository
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\CloudExperienceHostCommon.dllfb-MaxSessions
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\SyncInfrastructure.dll
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\SysWOW64\dbghelp.dll
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\CloudExperienceHostCommon.dllALLUSERSPROFILE=C:\ProgramDataAPPDATA=C:\Windows\system32\config\systemprofile\AppData\RoamingCommonPr
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\AudioSrvPolicyManager.dllem32;C:\Windows;C:\Windows\Sy
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\ProximityServicePal.dll-9409-add3064c0cad}\#color##
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\SysWOW64\mlang.dll3F8646}
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\zh-CN\stobject.dll.mui
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\batmeter.dll.dll
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Program Files\desktop.inidlle.dlls%
Source: AyCnklzHb7.dllBinary string: ..\DEVICE\HARDDISKVOLUME31Y
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\drivers\SgrmAgent.sys_9BC8CompatibleId\PCI#VEN_8086&DEV_A382CompatibleId\PCI#VEN_8086&DEV_A396CompatibleId\PCI#VEN_8086&DEV_A3A1Compatiblenterface
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\dsreg.dll
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\ProgramData\Microsoft\Windows\DeviceMetadataCache\dmrccache\en-US\ec4d5fdd-aa12-400f-83e2-7b0ea6023eb7\SoftwareInfo\SoftwareInfo.xml
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\NetSetupApi.dll4B3B-B7
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\ncryptprov.dlls.dllatcho
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\RuntimeBroker.exe.dll
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\ProgramData\Microsoft\Networkte\Log9f
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\StateRepository.Core.dll
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\webservices.dll}\0004
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\wbemed.exebled.exe
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\wbem\AutoRecover\0004
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\ktmw32.dllShell.dllt
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\zh-CN\sxs.dll.muiL.0"
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Program Files (x86)\Microsoft\EdgeCore\128.0.2739.67\pwahelper.exe
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\oobe\msoobedui.dll
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\iphlpsvc.dllves.dllCS
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\srchadmin.dllwsAppse
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Program Files (x86)\Microsoft\Edge\Application\128.0.2739.79\Trust Protection Lists\Mu:$DSC:$LOGGED_UTILITY_STREAMBLE_
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\ActionCenter.dllLL
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\explorer.exeg.dlllework.dll)0
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\SystemApps\Microsoft.AAD.BrokerPlugin_cw5n1h2txyewy\pris\resources.zh-CN.prial_cw5n1h2txyewyies
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\SettingMonitor.dllt
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\mobsync.exeWER\Tempg
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\aadWamExtension.dllll
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\EdgeManager.dll.dll
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\SystemApps\Microsoft.AAD.BrokerPlugin_cw5n1h2txyewy\pris\resources.zh-CN.pri-3e7$\Default
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\SystemApps\Microsoft.AAD.BrokerPlugin_cw5n1h2txyewy\AAD.Core.dllService-0x0-3e7$\DefaultD
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\bcastdvr\KnownGameList.binllSzo
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\bcastdvrzh-HANSUI.Shell.dll
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Program Files (x86)\Huorong\Sysdiag\bin\wsctrlsvc.exe
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Vault\4BF4C442-9B8A-41A0-B380-DD4A704DDB2808e.cdf-ms9a3ceb6c.manifestt
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\wbem\wmiutils.dll008
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Program Files (x86)\Microsoft\EdgeCore\128.0.2739.79\libGLESv2.dll:WofCompressedData
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\pnidui.dllkagesR
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\ncryptsslp.dll
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\InputMethod\CHS\ChsPinyinFamilyName.lex\ChsChsPinyinHap_s.lex
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\Windows.UI.Shell.dll
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows.old\ProgramDatas (x86)ftpsl
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\Windows.Media.Devices.dllerationId
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\zh-CN\twinui.dll.mui6
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\ActionCenter.dllester0
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\SysWOW64\wscapi.dlllrt.dlll
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\aadWamExtension.dll1pn
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\SecureTimeAggregator.dllSystemRoot=C:\WindowsSystemDrive=C:WinDir=C:\WindowsCommonProgramFile
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\Logs\CBS\CBS.logSlller.exe
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\StateRepository.Core.dllem32\config\systemprofilewind
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\AudioSrvPolicyManager.dllerationId
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\msftedit.dlle\common
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Vault\4BF4C442-9B8A-41A0-B380-DD4A704DDB28\Policy.vpolSysTray
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\cscobj.dllysdiag\bin
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\icuin.dllws\wfp
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\fdWSD.dllI.dllll
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\MCCSPal.dllll.mui
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\ProgramData\Huorong\Sysdiag\db\behav.db
Source: AyCnklzHb7.dllBinary string: \Device\HarddiskVolume3\Windows\System32\zh-CN\kernel32.dll.mui
Source: rundll32.exe, 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmp, AyCnklzHb7.dllBinary or memory string: \BurnameDoxe.vbp
Source: rundll32.exe, 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmp, AyCnklzHb7.dllBinary or memory string: 0\BurnameDoxe.vbp 0\BurnameDoxe.vbp%
Source: classification engineClassification label: clean9.winDLL@15/5@1/0
Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FFDFB761A94 CoCreateInstance,6_2_00007FFDFB761A94
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7308:120:WilError_03
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7448
Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\c7f2ebc2-0365-4122-9168-4c8cc2224e09Jump to behavior
Source: AyCnklzHb7.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\loaddll64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\AyCnklzHb7.dll",#1
Source: unknownProcess created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\AyCnklzHb7.dll"
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\AyCnklzHb7.dll",#1
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\AyCnklzHb7.dll
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\AyCnklzHb7.dll",#1
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\AyCnklzHb7.dll,DllCanUnloadNow
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\AyCnklzHb7.dll,DllGetClassObject
Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7448 -s 420
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\AyCnklzHb7.dll,DllRegisterServer
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\AyCnklzHb7.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\AyCnklzHb7.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\AyCnklzHb7.dll,DllCanUnloadNowJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\AyCnklzHb7.dll,DllGetClassObjectJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\AyCnklzHb7.dll,DllRegisterServerJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\AyCnklzHb7.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: mobilenetworking.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: mobilenetworking.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: wldp.dllJump to behavior
Source: AyCnklzHb7.dllStatic PE information: Image base 0x180000000 > 0x60000000
Source: AyCnklzHb7.dllStatic file information: File size 2177024 > 1048576
Source: AyCnklzHb7.dllStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x1b5a00
Source: AyCnklzHb7.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: AyCnklzHb7.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: AyCnklzHb7.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: AyCnklzHb7.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: AyCnklzHb7.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: AyCnklzHb7.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: AyCnklzHb7.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF
Source: AyCnklzHb7.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: pnidui.pdbUGP source: rundll32.exe, 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmp, AyCnklzHb7.dll
Source: Binary string: \ICS_Release\Setup.pdb source: rundll32.exe, 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmp, AyCnklzHb7.dll
Source: Binary string: \magadan21\loader\objfre_wxp_x86\i386\Loader.pdb source: rundll32.exe, 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmp, AyCnklzHb7.dll
Source: Binary string: \work\urlgl\driver2\objfre_wxp_x86\i386\MekeAttManage.pdb source: rundll32.exe, 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmp, AyCnklzHb7.dll
Source: Binary string: 0\SearchRecover.pdb( source: rundll32.exe, 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmp, AyCnklzHb7.dll
Source: Binary string: "0\7to\apphelp\Release\injectdll.pdbR source: rundll32.exe, 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmp, AyCnklzHb7.dll
Source: Binary string: \Release\Wallpaper.pdb source: rundll32.exe, 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmp, AyCnklzHb7.dll
Source: Binary string: 0\IrCS_Release\Setup.pdb/ source: rundll32.exe, 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmp, AyCnklzHb7.dll
Source: Binary string: \SearchRecover.pdb source: rundll32.exe, 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmp, AyCnklzHb7.dll
Source: Binary string: 0\BLDService.pdb6 source: rundll32.exe, 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmp, AyCnklzHb7.dll
Source: Binary string: 0\ICS_Release\Setup.pdb9 source: rundll32.exe, 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmp, AyCnklzHb7.dll
Source: Binary string: \IrCS_Release\Setup.pdb source: rundll32.exe, 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmp, AyCnklzHb7.dll
Source: Binary string: \bbcomm.pdb source: rundll32.exe, 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmp, AyCnklzHb7.dll
Source: Binary string: 90\work\urlgl\driver2\objfre_wxp_x86\i386\MekeAttManage.pdb= source: rundll32.exe, 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmp, AyCnklzHb7.dll
Source: Binary string: 0\bbhelper.pdb$ source: rundll32.exe, 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmp, AyCnklzHb7.dll
Source: Binary string: 0\setupplugins.pdb& source: rundll32.exe, 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmp, AyCnklzHb7.dll
Source: Binary string: \bbhelper.pdb source: rundll32.exe, 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmp, AyCnklzHb7.dll
Source: Binary string: \WallpaperInstall\release\WallpaperInstall.pdb source: rundll32.exe, 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmp, AyCnklzHb7.dll
Source: Binary string: 0 \magadan21\loader\objfre_wxp_x86\i386\Loader.pdb% source: rundll32.exe, 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmp, AyCnklzHb7.dll
Source: Binary string: \Release\Wallpaper.pdbG source: rundll32.exe, 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmp, AyCnklzHb7.dll
Source: Binary string: \setupplugins.pdb source: rundll32.exe, 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmp, AyCnklzHb7.dll
Source: Binary string: 0\bbcomm.pdb2 source: rundll32.exe, 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmp, AyCnklzHb7.dll
Source: Binary string: \Release\Laban.pdb source: rundll32.exe, 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmp, AyCnklzHb7.dll
Source: Binary string: 0\weiduan.pdb+ source: rundll32.exe, 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmp, AyCnklzHb7.dll
Source: Binary string: \BLDService.pdb source: rundll32.exe, 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmp, AyCnklzHb7.dll
Source: Binary string: 0\ExtWatcher.pdbB source: rundll32.exe, 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmp, AyCnklzHb7.dll
Source: Binary string: pnidui.pdb source: rundll32.exe, 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmp, AyCnklzHb7.dll
Source: Binary string: \weiduan.pdb source: rundll32.exe, 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmp, AyCnklzHb7.dll
Source: Binary string: .0\WallpaperInstall\release\WallpaperInstall.pdbb source: rundll32.exe, 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmp, AyCnklzHb7.dll
Source: Binary string: \ExtWatcher.pdb source: rundll32.exe, 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmp, AyCnklzHb7.dll
Source: Binary string: \Release\Laban.pdb source: rundll32.exe, 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmp, AyCnklzHb7.dll
Source: Binary string: \7to\apphelp\Release\injectdll.pdb source: rundll32.exe, 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmp, AyCnklzHb7.dll
Source: AyCnklzHb7.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: AyCnklzHb7.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: AyCnklzHb7.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: AyCnklzHb7.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: AyCnklzHb7.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: AyCnklzHb7.dllStatic PE information: 0xF8230CE3 [Sat Dec 3 09:50:27 2101 UTC]
Source: AyCnklzHb7.dllStatic PE information: real checksum: 0x220b18 should be: 0x218b28
Source: AyCnklzHb7.dllStatic PE information: section name: .didat
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\AyCnklzHb7.dll
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeAPI coverage: 0.0 %
Source: C:\Windows\System32\loaddll64.exe TID: 7304Thread sleep time: -120000s >= -30000sJump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\loaddll64.exeThread delayed: delay time: 120000Jump to behavior
Source: Amcache.hve.9.drBinary or memory string: VMware
Source: Amcache.hve.9.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.9.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.9.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.9.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.9.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.9.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.9.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.9.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.9.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.9.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.9.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.9.drBinary or memory string: vmci.sys
Source: Amcache.hve.9.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
Source: Amcache.hve.9.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.9.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.9.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.9.drBinary or memory string: VMware20,1
Source: Amcache.hve.9.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.9.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.9.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.9.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.9.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.9.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.9.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.9.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.9.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.9.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.9.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FFDFB7217E0 ActivateActCtx,GetClassInfoExW,GetLastError,DeactivateActCtx,SetLastError,OutputDebugStringA,GetLastError,6_2_00007FFDFB7217E0
Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FFDFB72A3F0 memset,GetProcAddress,GetProcessHeap,HeapFree,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapFree,6_2_00007FFDFB72A3F0
Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FFDFB72E144 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,6_2_00007FFDFB72E144
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\AyCnklzHb7.dll",#1Jump to behavior
Source: rundll32.exeBinary or memory string: Shell_TrayWnd
Source: rundll32.exe, 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmp, AyCnklzHb7.dllBinary or memory string: \Comctl32.dllShell_TrayWndNetwork FlyoutAtlThunk_FreeDataAtlThunk_DataToCodeAtlThunk_InitDataAtlThunk_AllocateDataatlthunk.dllWilStaging_02
Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FFDFB724240 EnterCriticalSection,EnterCriticalSection,ConvertInterfaceGuidToLuid,GetIfEntry2Ex,LeaveCriticalSection,LeaveCriticalSection,OpenSCManagerW,OpenServiceW,CloseServiceHandle,QueryServiceStatus,SubscribeServiceChangeNotifications,EnterCriticalSection,LeaveCriticalSection,EnterCriticalSection,ConvertInterfaceGuidToLuid,GetIfEntry2Ex,LeaveCriticalSection,CreateThreadpoolTimer,GetSystemTimeAsFileTime,SetThreadpoolTimer,GetLastError,GetLastError,GetLastError,CloseServiceHandle,PostMessageW,GetLastError,6_2_00007FFDFB724240
Source: rundll32.exe, 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: KSafeTray.exe
Source: Amcache.hve.9.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.9.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.9.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.9.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
12
Process Injection
21
Virtualization/Sandbox Evasion
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network Medium1
System Shutdown/Reboot
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
12
Process Injection
LSASS Memory41
Security Software Discovery
Remote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Regsvr32
Security Account Manager1
Process Discovery
SMB/Windows Admin SharesData from Network Shared Drive1
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Rundll32
NTDS21
Virtualization/Sandbox Evasion
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Timestomp
LSA Secrets2
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
DLL Side-Loading
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1543073 Sample: AyCnklzHb7.exe Startdate: 27/10/2024 Architecture: WINDOWS Score: 9 21 198.187.3.20.in-addr.arpa 2->21 7 loaddll64.exe 1 2->7         started        process3 process4 9 rundll32.exe 7->9         started        11 cmd.exe 1 7->11         started        13 rundll32.exe 7->13         started        15 3 other processes 7->15 process5 17 WerFault.exe 20 16 9->17         started        19 rundll32.exe 11->19         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
AyCnklzHb7.dll5%ReversingLabsWin64.Packed.Generic
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://upx.sf.net0%URL Reputationsafe
NameIPActiveMaliciousAntivirus DetectionReputation
198.187.3.20.in-addr.arpa
unknown
unknownfalse
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://95.143.193.138/xxxx_3/6rundll32.exe, 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmp, AyCnklzHb7.dllfalse
      unknown
      http://upx.sf.netAmcache.hve.9.drfalse
      • URL Reputation: safe
      unknown
      http://95.143.193.138/xxxx_3/rundll32.exe, 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmp, AyCnklzHb7.dllfalse
        unknown
        http://get.fc-gosh.biz/launch_reb.php?AyCnklzHb7.dllfalse
          unknown
          http://%s/dupe.php?q=%d.%d.%d.%d.%d.%s.1.%drundll32.exe, 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmp, AyCnklzHb7.dllfalse
            unknown
            http://%s/dupe.php?q=%d.%d.%d.%d.%d.%s.1.%d#rundll32.exe, 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmp, AyCnklzHb7.dllfalse
              unknown
              No contacted IP infos
              Joe Sandbox version:41.0.0 Charoite
              Analysis ID:1543073
              Start date and time:2024-10-27 07:55:09 +01:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 4m 28s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:15
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:AyCnklzHb7.dll
              (renamed file extension from exe to dll, renamed because original name is a hash value)
              Original Sample Name:32f82fc72003ea760425630e2c6a998f5c89d85e8a4adff669c24da0ef15ef42.exe
              Detection:CLEAN
              Classification:clean9.winDLL@15/5@1/0
              EGA Information:
              • Successful, ratio: 100%
              HCA Information:
              • Successful, ratio: 100%
              • Number of executed functions: 1
              • Number of non-executed functions: 139
              • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
              • Excluded IPs from analysis (whitelisted): 20.42.65.92, 52.168.117.173
              • Excluded domains from analysis (whitelisted): onedsblobprdeus16.eastus.cloudapp.azure.com, onedsblobprdeus17.eastus.cloudapp.azure.com, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
              • Not all processes where analyzed, report is missing behavior information
              • VT rate limit hit for: AyCnklzHb7.dll
              TimeTypeDescription
              02:56:09API Interceptor1x Sleep call for process: loaddll64.exe modified
              02:56:18API Interceptor1x Sleep call for process: WerFault.exe modified
              No context
              No context
              No context
              No context
              No context
              Process:C:\Windows\System32\WerFault.exe
              File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
              Category:dropped
              Size (bytes):65536
              Entropy (8bit):0.7859978818662794
              Encrypted:false
              SSDEEP:96:9FkA6F2Si4yKy6ssjV4RvuP7fOQXIDcQpc6TcEkcw3vXaXz+HbHgSQgJjS+UaVx+:OZi4y6sI0nX+Lj7GzuiFHZ24lO8f
              MD5:D9A313D0A1B345A36E56EA85BE85573A
              SHA1:7C4543A9EFF6F186677175E5ACBB85607D61A65B
              SHA-256:3DCF0312F85BAA7ADE6C1D08D185A697604B7E3F2EF403AED42143F3E302FEBD
              SHA-512:18CAE64293C1B9604D27E6EA46D2190641E31AE9573C03C5CF17CBFD7BB2A7ABF6FD8C39AC6615C56110D7283CDE7A8AEB859663F6D7AE92E533AF3764062076
              Malicious:false
              Reputation:low
              Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.4.4.8.5.7.6.4.2.6.4.0.3.0.1.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.4.4.8.5.7.6.4.7.6.4.0.3.1.3.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.4.4.3.d.4.9.9.-.6.3.0.d.-.4.9.f.a.-.b.1.4.c.-.9.e.2.e.b.4.5.e.f.9.9.6.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.1.9.8.8.8.b.5.-.7.b.e.d.-.4.2.3.d.-.a.1.c.8.-.7.d.f.9.7.d.e.0.6.d.3.0.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e._.A.y.C.n.k.l.z.H.b.7...d.l.l.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.d.1.8.-.0.0.0.1.-.0.0.1.4.-.4.7.8.f.-.1.d.4.a.3.d.2.8.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.d.d.3.9.9.a.e.4.6.3.0.3.3.4.3.f.9.f.0.d.a.1.8.9.a.e.e.1.1.c.6.7.b.d.8.6.8.2.
              Process:C:\Windows\System32\WerFault.exe
              File Type:Mini DuMP crash report, 14 streams, Sun Oct 27 06:56:04 2024, 0x1205a4 type
              Category:dropped
              Size (bytes):57860
              Entropy (8bit):1.696593469961296
              Encrypted:false
              SSDEEP:192:mIbARDXOMD1gr2uSn83Zn/InTMwUIEtAkLVfg+BS6iaijA:mSggr2x8pAnTKAkLVfg+BdJ
              MD5:2678ABAAAC55743FA3FFFD63A2766C14
              SHA1:6A740E2DD9A3C755022D0D2E2C287B95AD1489D9
              SHA-256:187F689F357D6FF85318B232D7038456477FA66457A9C3E65A8299C4D11F7121
              SHA-512:1AF56146213AA8345E23C3433E70AC47006DE266C3387F71CA9CEA972D5EFD9DC46B8F22D297B05429287A561CE7A0E90D24936BCE7541C73DA5D6FD4CEE15FF
              Malicious:false
              Reputation:low
              Preview:MDMP..a..... ..........g.........................................*..........T.......8...........T...........................,...........................................................................................eJ..............Lw......................T..............g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Windows\System32\WerFault.exe
              File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
              Category:dropped
              Size (bytes):8526
              Entropy (8bit):3.703396088364154
              Encrypted:false
              SSDEEP:192:R6l7wVeJSl3tF6YNWL0LgmfDnsbprt89brsqfT5m:R6lXJwP6Y8UgmfDns8rZfw
              MD5:A6032999284785CE67CFBD06A0238765
              SHA1:2058AB92C1D9DAEA10731D77C074A51C861F174B
              SHA-256:51193FEF2AAE8BFE1193AC7BF9B7624615A3320F1B19F0F66D4322FB4FE23B86
              SHA-512:299290C876B558489D635ADF07CE90AAD7E4AB5D5DC09E719A1804F0E23880B0B52A66F0F1A29C30291A1662173BDEDF67E139EE4504E9D674CDC63B12C8189A
              Malicious:false
              Reputation:low
              Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.4.4.8.<./.P.i.
              Process:C:\Windows\System32\WerFault.exe
              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):4769
              Entropy (8bit):4.500239391745318
              Encrypted:false
              SSDEEP:48:cvIwWl8zs9NJg771I9ETrWpW8VYhYm8M4JCYCWc7FWNoyq85mvN0ptSTSyd:uIjf9nI73G7VJJlNoQpoOyd
              MD5:0042D20DA00193ED83C8D6912A5AD90C
              SHA1:5AAE514A779BF492A5DC2442C265365F6DB9065C
              SHA-256:F05970B65C69ADF4952330E9CCA13DB1A4DFBBA0CB61B72CE6D4D4A8B936D852
              SHA-512:D4ADEB4F78C407A1E1AC43E9CE845FB2DB828684A612D034ED598EDA045DF322F4861D4799F7733305FD0ACC72CA069A2DFDFBC0EA76BF69F6E1ADD5F939D1E5
              Malicious:false
              Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="561478" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
              Process:C:\Windows\System32\WerFault.exe
              File Type:MS Windows registry file, NT/2000 or above
              Category:dropped
              Size (bytes):1835008
              Entropy (8bit):4.466386386299952
              Encrypted:false
              SSDEEP:6144:dIXfpi67eLPU9skLmb0b4zWSPKaJG8nAgejZMMhA2gX4WABl0uNcdwBCswSb9:OXD94zWlLZMM6YFHa+9
              MD5:402853D64114B62016E9EB9CC19FCE6D
              SHA1:FC5D4A124B60893F0E25976844164161927CE9CA
              SHA-256:089101A59A7FD47E70F95ABD5D766A065697C019431FB273C806C3BFB4046C60
              SHA-512:A58A3590439296173FFA97230D86C1E43698F7E46AB9867DB40B9C16D75286BC38CF8AC55C02DDAC2D78CDC0132A9F7533204F99AF63E8EBCB691D4F7CB14E5B
              Malicious:false
              Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm..EJ=(...............................................................................................................................................................................................................................................................................................................................................JR~........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              File type:PE32+ executable (DLL) (console) x86-64, for MS Windows
              Entropy (8bit):3.9317477899410718
              TrID:
              • Win64 Dynamic Link Library (generic) (102004/3) 86.43%
              • Win64 Executable (generic) (12005/4) 10.17%
              • Generic Win/DOS Executable (2004/3) 1.70%
              • DOS Executable Generic (2002/1) 1.70%
              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.01%
              File name:AyCnklzHb7.dll
              File size:2'177'024 bytes
              MD5:3c9121d5389ae5b87885261c3efdf6da
              SHA1:0f6fb000293f957b4f0fc91540cfce6a1c07f63c
              SHA256:32f82fc72003ea760425630e2c6a998f5c89d85e8a4adff669c24da0ef15ef42
              SHA512:52e9fc1a602d625ad19d8c7e1c9f17b885688eb37e1ec74b7025c5e331d8a300d658498140ea325cad1d7d7965c51c179c1ebd3ec4fccd85a0f7a35d4d4fa7e1
              SSDEEP:49152:6NqqCsmn766u55AJ1tEZV4+L1OPNKgB7dsv1pag+1P30VhftWmA/fH9jy3iJ4uCM:Mr6u55AJ1tEZV4+L1Pv1pag+1P30Vhf2
              TLSH:EBA52915F798C459F12746308BE6CB61A6357CA92BB283DB3190733F6D72AD49D32A03
              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........$.x.E.+.E.+.E.+.=i+.E.+...*.E.+...*.E.+.E.+mD.+...*.E.+...*.E.+...*.E.+...*.E.+...+.E.+...*.E.+Rich.E.+.......................
              Icon Hash:7ae282899bbab082
              Entrypoint:0x18000de70
              Entrypoint Section:.text
              Digitally signed:false
              Imagebase:0x180000000
              Subsystem:windows cui
              Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, DLL
              DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF
              Time Stamp:0xF8230CE3 [Sat Dec 3 09:50:27 2101 UTC]
              TLS Callbacks:
              CLR (.Net) Version:
              OS Version Major:10
              OS Version Minor:0
              File Version Major:10
              File Version Minor:0
              Subsystem Version Major:10
              Subsystem Version Minor:0
              Import Hash:1044c2f84c96d60cf6dd5546b851528d
              Instruction
              dec eax
              mov dword ptr [esp+08h], ebx
              dec eax
              mov dword ptr [esp+10h], esi
              push edi
              dec eax
              sub esp, 20h
              dec ecx
              mov edi, eax
              mov ebx, edx
              dec eax
              mov esi, ecx
              cmp edx, 01h
              jne 00007F8430CC22E7h
              call 00007F8430CC2D48h
              dec esp
              mov eax, edi
              mov edx, ebx
              dec eax
              mov ecx, esi
              dec eax
              mov ebx, dword ptr [esp+30h]
              dec eax
              mov esi, dword ptr [esp+38h]
              dec eax
              add esp, 20h
              pop edi
              jmp 00007F8430CC22ECh
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              dec eax
              mov eax, esp
              dec eax
              mov dword ptr [eax+20h], ebx
              dec esp
              mov dword ptr [eax+18h], eax
              mov dword ptr [eax+10h], edx
              dec eax
              mov dword ptr [eax+08h], ecx
              push esi
              push edi
              inc ecx
              push esi
              dec eax
              sub esp, 00000150h
              mov edi, edx
              dec esp
              mov esi, ecx
              mov esi, 00000001h
              mov ebx, esi
              mov dword ptr [esp+20h], ebx
              cmp edx, esi
              jnbe 00007F8430CC22E8h
              mov dword ptr [0004D595h], edx
              test edx, edx
              jne 00007F8430CC22F5h
              cmp dword ptr [0004D5EBh], edx
              jne 00007F8430CC22EDh
              xor ebx, ebx
              mov dword ptr [esp+20h], ebx
              jmp 00007F8430CC24BFh
              lea eax, dword ptr [edx-01h]
              cmp eax, esi
              ja 00007F8430CC2376h
              dec esp
              mov ecx, dword ptr [0004DBCCh]
              dec ebp
              test ecx, ecx
              je 00007F8430CC2324h
              mov eax, dword ptr [0004D5C5h]
              cmp edx, esi
              cmove eax, esi
              mov dword ptr [0004D5BAh], eax
              dec esp
              mov eax, dword ptr [esp+00000180h]
              dec ecx
              mov eax, ecx
              call dword ptr [000000F5h]
              Programming Language:
              • [IMP] VS2008 SP1 build 30729
              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x579600xa4.rdata
              IMAGE_DIRECTORY_ENTRY_IMPORT0x57a040x460.rdata
              IMAGE_DIRECTORY_ENTRY_RESOURCE0x620000x1b5998.rsrc
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x5d0000x3db0.pdata
              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0x2180000x494.reloc
              IMAGE_DIRECTORY_ENTRY_DEBUG0x4ccd00x70.rdata
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x478100x118.rdata
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0x483280xc00.rdata
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x573100x180.rdata
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .text0x10000x453900x454008f3d183b0ffea9c1bc166950c6e457b1False0.49611137748194944data6.259637261932694IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              .rdata0x470000x139820x13a005b8ddd8aa65f7b8ba373a329af76ee0fFalse0.3753607683121019data4.939521856889639IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .data0x5b0000x14640x600f9a9e06e2f8485183a4abc62e080a07dFalse0.181640625data1.9239565347029988IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .pdata0x5d0000x3db00x3e0003c051ce5f3fd260b3b16544c30ab81cFalse0.5072454637096774data5.662030573096473IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .didat0x610000x1500x2008a5074ef5aedeeb1e9de64b05f49ba47False0.234375data1.7476356122505157IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .rsrc0x620000x1b59980x1b5a00db50cd70fb06a5e8406173c4aa17c695False0.17802168130534132data3.2541997224945005IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .reloc0x2180000x4940x60002a0f225871ae315990988c9d5a7de05False0.52734375data4.753045770171859IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              NameRVASizeTypeLanguageCountryZLIB Complexity
              MUI0x2178980x100dataEnglishUnited States0.56640625
              WEVT_TEMPLATE0x665f80x1826dataEnglishUnited States0.2968295050145584
              RT_ICON0x67e200x4228dataEnglishUnited States0.27633443552196507
              RT_ICON0x6c0480x25a8dataEnglishUnited States0.01784232365145228
              RT_ICON0x6e5f00x1a68dataEnglishUnited States0.03476331360946745
              RT_ICON0x700580x10a8dataEnglishUnited States0.06707317073170732
              RT_ICON0x711000xcd8dataEnglishUnited States0.10279805352798053
              RT_ICON0x71dd80x988dataEnglishUnited States0.2700819672131147
              RT_ICON0x727600x6b8dataEnglishUnited States0.022674418604651164
              RT_ICON0x72e180x468dataEnglishUnited States0.015957446808510637
              RT_ICON0x732f80x4228dataEnglishUnited States0.3620099196976854
              RT_ICON0x775200x25a8dataEnglishUnited States0.018775933609958505
              RT_ICON0x79ac80x1a68Device independent bitmap graphic, 40 x 80 x 32, image size 0EnglishUnited States0.024556213017751478
              RT_ICON0x7b5300x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishUnited States0.02978424015009381
              RT_ICON0x7c5d80xcd8Device independent bitmap graphic, 28 x 56 x 32, image size 0EnglishUnited States0.035888077858880776
              RT_ICON0x7d2b00x988Device independent bitmap graphic, 24 x 48 x 32, image size 0EnglishUnited States0.047540983606557376
              RT_ICON0x7dc380x6b8Device independent bitmap graphic, 20 x 40 x 32, image size 0EnglishUnited States0.06453488372093023
              RT_ICON0x7e2f00x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishUnited States0.09042553191489362
              RT_ICON0x7e7d00x4228Device independent bitmap graphic, 64 x 128 x 32, image size 0EnglishUnited States0.03129428436466698
              RT_ICON0x829f80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishUnited States0.04730290456431535
              RT_ICON0x84fa00x1a68Device independent bitmap graphic, 40 x 80 x 32, image size 0EnglishUnited States0.051775147928994084
              RT_ICON0x86a080x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishUnited States0.05651969981238274
              RT_ICON0x87ab00xcd8dataEnglishUnited States0.007907542579075427
              RT_ICON0x887880x988dataEnglishUnited States0.010245901639344262
              RT_ICON0x891100x6b8dataEnglishUnited States0.012790697674418604
              RT_ICON0x897c80x468dataEnglishUnited States0.015957446808510637
              RT_ICON0x89ca80x4228dataEnglishUnited States0.051901275389702406
              RT_ICON0x8ded00x25a8dataEnglishUnited States0.0033195020746887966
              RT_ICON0x904780x1a68dataEnglishUnited States0.12174556213017751
              RT_ICON0x91ee00x10a8dataEnglishUnited States0.006332082551594747
              RT_ICON0x92f880xcd8dataEnglishUnited States0.007907542579075427
              RT_ICON0x93c600x988dataEnglishUnited States0.010245901639344262
              RT_ICON0x945e80x6b8dataEnglishUnited States0.12732558139534883
              RT_ICON0x94ca00x468Matlab v4 mat-file (little endian) MSeg, numeric, rows 0, columns 0EnglishUnited States0.2721631205673759
              RT_ICON0x951800x4228dataEnglishUnited States0.02338214454416627
              RT_ICON0x993a80x25a8dataEnglishUnited States0.0033195020746887966
              RT_ICON0x9b9500x1a68dataEnglishUnited States0.09511834319526627
              RT_ICON0x9d3b80x10a8dataEnglishUnited States0.08395872420262664
              RT_ICON0x9e4600x988dataEnglishUnited States0.18114754098360655
              RT_ICON0x9ede80x6b8dataEnglishUnited States0.2436046511627907
              RT_ICON0x9f4a00x468dataEnglishUnited States0.2978723404255319
              RT_ICON0x9f9700x4228dataEnglishUnited States0.12039442607463391
              RT_ICON0xa3b980x25a8dataEnglishUnited States0.37572614107883817
              RT_ICON0xa61400x1a68dataEnglishUnited States0.3886094674556213
              RT_ICON0xa7ba80x10a8dataEnglishUnited States0.41674484052532834
              RT_ICON0xa8c500xcd8dataEnglishUnited States0.41058394160583944
              RT_ICON0xa99280x988dataEnglishUnited States0.010245901639344262
              RT_ICON0xaa2b00x6b8dataEnglishUnited States0.1511627906976744
              RT_ICON0xaa9680x468dataEnglishUnited States0.3820921985815603
              RT_ICON0xaae480x10a8dataEnglishUnited States0.44394934333958724
              RT_ICON0xabef00x1a68dataEnglishUnited States0.4760355029585799
              RT_ICON0xad9580x25a8COM executable for DOSEnglishUnited States0.29512448132780084
              RT_ICON0xaff000x4228dataEnglishUnited States0.47679499291450167
              RT_ICON0xb41280x468dataEnglishUnited States0.23049645390070922
              RT_ICON0xb45900x6b8dataEnglishUnited States0.36453488372093024
              RT_ICON0xb4c480x988Matlab v4 mat-file (little endian) \207\322\377\377\001, numeric, rows 0, columns 0EnglishUnited States0.3139344262295082
              RT_ICON0xb55d00xcd8dataEnglishUnited States0.2150243309002433
              RT_ICON0xb63200x4228Matlab v4 mat-file (little endian) -, numeric, rows 0, columns 0EnglishUnited States0.3012517713745867
              RT_ICON0xba5480x25a8dataEnglishUnited States0.416597510373444
              RT_ICON0xbcaf00x1a68dataEnglishUnited States0.5235207100591716
              RT_ICON0xbe5580x10a8dataEnglishUnited States0.09920262664165103
              RT_ICON0xbf6000xcd8dataEnglishUnited States0.007907542579075427
              RT_ICON0xc02d80x988dataEnglishUnited States0.010245901639344262
              RT_ICON0xc0c600x6b8dataEnglishUnited States0.012790697674418604
              RT_ICON0xc13180x468dataEnglishUnited States0.015957446808510637
              RT_ICON0xc17f80x4228dataEnglishUnited States0.002302786962683042
              RT_ICON0xc5a200x25a8dataEnglishUnited States0.0033195020746887966
              RT_ICON0xc7fc80x1a68dataEnglishUnited States0.004289940828402367
              RT_ICON0xc9a300x10a8dataEnglishUnited States0.006332082551594747
              RT_ICON0xcaad80xcd8dataEnglishUnited States0.007907542579075427
              RT_ICON0xcb7b00x988dataEnglishUnited States0.010245901639344262
              RT_ICON0xcc1380x6b8dataEnglishUnited States0.012790697674418604
              RT_ICON0xcc7f00x468dataEnglishUnited States0.015957446808510637
              RT_ICON0xcccd00x4228dataEnglishUnited States0.04209966934341049
              RT_ICON0xd0ef80x25a8dataEnglishUnited States0.15466804979253113
              RT_ICON0xd34a00x1a68dataEnglishUnited States0.2334319526627219
              RT_ICON0xd4f080x10a8dataEnglishUnited States0.1805816135084428
              RT_ICON0xd5fb00xcd8dataEnglishUnited States0.17791970802919707
              RT_ICON0xd6c880x988dataEnglishUnited States0.14959016393442623
              RT_ICON0xd76100x6b8dataEnglishUnited States0.31569767441860463
              RT_ICON0xd7cc80x468dataEnglishUnited States0.3945035460992908
              RT_ICON0xd81a80x4228dataEnglishUnited States0.05278696268304204
              RT_ICON0xdc3d00x25a8dataEnglishUnited States0.0033195020746887966
              RT_ICON0xde9780x1a68dataEnglishUnited States0.004289940828402367
              RT_ICON0xe03e00x10a8dataEnglishUnited States0.006332082551594747
              RT_ICON0xe14880xcd8dataEnglishUnited States0.007907542579075427
              RT_ICON0xe21600x988dataEnglishUnited States0.010245901639344262
              RT_ICON0xe2ae80x6b8dataEnglishUnited States0.012790697674418604
              RT_ICON0xe31a00x468dataEnglishUnited States0.015957446808510637
              RT_ICON0xe36800x4228dataEnglishUnited States0.002302786962683042
              RT_ICON0xe78a80x25a8dataEnglishUnited States0.0033195020746887966
              RT_ICON0xe9e500x1a68dataEnglishUnited States0.004289940828402367
              RT_ICON0xeb8b80x10a8dataEnglishUnited States0.006332082551594747
              RT_ICON0xec9600xcd8dataEnglishUnited States0.007907542579075427
              RT_ICON0xed6380x988dataEnglishUnited States0.010245901639344262
              RT_ICON0xedfc00x6b8dataEnglishUnited States0.012790697674418604
              RT_ICON0xee6780x468dataEnglishUnited States0.015957446808510637
              RT_ICON0xeeb580x4228dataEnglishUnited States0.002302786962683042
              RT_ICON0xf2d800x25a8dataEnglishUnited States0.0033195020746887966
              RT_ICON0xf53280x1a68dataEnglishUnited States0.01272189349112426
              RT_ICON0xf6d900x10a8dataEnglishUnited States0.006332082551594747
              RT_ICON0xf7e380xcd8dataEnglishUnited States0.007907542579075427
              RT_ICON0xf8b100x988dataEnglishUnited States0.010245901639344262
              RT_ICON0xf94980x6b8dataEnglishUnited States0.012790697674418604
              RT_ICON0xf9b500x468dataEnglishUnited States0.015957446808510637
              RT_ICON0xfa0300x4228dataEnglishUnited States0.010510155880963629
              RT_ICON0xfe2580x25a8dataEnglishUnited States0.0033195020746887966
              RT_ICON0x1008000x1a68dataEnglishUnited States0.004289940828402367
              RT_ICON0x1022680x10a8dataEnglishUnited States0.006332082551594747
              RT_ICON0x1033100xcd8dataEnglishUnited States0.007907542579075427
              RT_ICON0x103fe80x988dataEnglishUnited States0.010245901639344262
              RT_ICON0x1049700x6b8dataEnglishUnited States0.012790697674418604
              RT_ICON0x1050280x468dataEnglishUnited States0.015957446808510637
              RT_ICON0x1055080x4228dataEnglishUnited States0.002302786962683042
              RT_ICON0x1097300x25a8dataEnglishUnited States0.03443983402489627
              RT_ICON0x10bcd80x1a68dataEnglishUnited States0.004289940828402367
              RT_ICON0x10d7400x10a8dataEnglishUnited States0.006332082551594747
              RT_ICON0x10e7e80xcd8dataEnglishUnited States0.007907542579075427
              RT_ICON0x10f4c00x988dataEnglishUnited States0.010245901639344262
              RT_ICON0x10fe480x6b8dataEnglishUnited States0.012790697674418604
              RT_ICON0x1105000x468dataEnglishUnited States0.015957446808510637
              RT_ICON0x1109e00x4228dataEnglishUnited States0.002302786962683042
              RT_ICON0x114c080x25a8dataEnglishUnited States0.0033195020746887966
              RT_ICON0x1171b00x1a68dataEnglishUnited States0.004289940828402367
              RT_ICON0x118c180x10a8dataEnglishUnited States0.006332082551594747
              RT_ICON0x119cc00x988dataEnglishUnited States0.010245901639344262
              RT_ICON0x11a6480x6b8dataEnglishUnited States0.012790697674418604
              RT_ICON0x11ad000x468dataEnglishUnited States0.015957446808510637
              RT_ICON0x11b1d00x4228dataEnglishUnited States0.002302786962683042
              RT_ICON0x11f3f80x25a8dataEnglishUnited States0.0033195020746887966
              RT_ICON0x1219a00x1a68dataEnglishUnited States0.004289940828402367
              RT_ICON0x1234080x10a8dataEnglishUnited States0.006332082551594747
              RT_ICON0x1244b00x988dataEnglishUnited States0.010245901639344262
              RT_ICON0x124e380x6b8dataEnglishUnited States0.012790697674418604
              RT_ICON0x1254f00x468dataEnglishUnited States0.015957446808510637
              RT_ICON0x1259c00x4228dataEnglishUnited States0.002302786962683042
              RT_ICON0x129be80x25a8dataEnglishUnited States0.0033195020746887966
              RT_ICON0x12c1900x1a68dataEnglishUnited States0.11701183431952662
              RT_ICON0x12dbf80x10a8dataEnglishUnited States0.006332082551594747
              RT_ICON0x12eca00x988dataEnglishUnited States0.010245901639344262
              RT_ICON0x12f6280x6b8dataEnglishUnited States0.13372093023255813
              RT_ICON0x12fce00x468Matlab v4 mat-file (little endian) \207\322\377\377, numeric, rows 0, columns 0EnglishUnited States0.3803191489361702
              RT_ICON0x1301b00x4228dataEnglishUnited States0.12370099196976854
              RT_ICON0x1343d80x25a8dataEnglishUnited States0.15829875518672198
              RT_ICON0x1369800x1a68dataEnglishUnited States0.178698224852071
              RT_ICON0x1383e80x10a8dataEnglishUnited States0.28095684803001875
              RT_ICON0x1394900x988dataEnglishUnited States0.2569672131147541
              RT_ICON0x139e180x6b8dataEnglishUnited States0.3505813953488372
              RT_ICON0x13a4d00x468dataEnglishUnited States0.46897163120567376
              RT_ICON0x13a9a00x4228dataEnglishUnited States0.19296173830892774
              RT_ICON0x13ebc80x25a8dataEnglishUnited States0.23464730290456431
              RT_ICON0x1411700x1a68dataEnglishUnited States0.1742603550295858
              RT_ICON0x142bd80x10a8dataEnglishUnited States0.3295028142589118
              RT_ICON0x143c800x988dataEnglishUnited States0.1627049180327869
              RT_ICON0x1446080x6b8dataEnglishUnited States0.1447674418604651
              RT_ICON0x144cc00x468dataEnglishUnited States0.20124113475177305
              RT_ICON0x1451900x4228dataEnglishUnited States0.3512045347189419
              RT_ICON0x1493b80x25a8dataEnglishUnited States0.5894190871369295
              RT_ICON0x14b9600x1a68dataEnglishUnited States0.45724852071005917
              RT_ICON0x14d3c80x10a8dataEnglishUnited States0.4348030018761726
              RT_ICON0x14e4700x988dataEnglishUnited States0.24098360655737705
              RT_ICON0x14edf80x6b8dataEnglishUnited States0.08023255813953488
              RT_ICON0x14f4b00x468dataEnglishUnited States0.14450354609929078
              RT_ICON0x14f9800x4228dataEnglishUnited States0.08449456778460085
              RT_ICON0x153ba80x25a8dataEnglishUnited States0.18506224066390042
              RT_ICON0x1561500x1a68dataEnglishUnited States0.21242603550295858
              RT_ICON0x157bb80x10a8dataEnglishUnited States0.41181988742964354
              RT_ICON0x158c600x988dataEnglishUnited States0.2594262295081967
              RT_ICON0x1595e80x6b8dataEnglishUnited States0.3686046511627907
              RT_ICON0x159ca00x468dataEnglishUnited States0.17375886524822695
              RT_ICON0x15a1700x4228dataEnglishUnited States0.6463745866792631
              RT_ICON0x15e3980x25a8dataEnglishUnited States0.6343360995850622
              RT_ICON0x1609400x1a68dataEnglishUnited States0.6627218934911243
              RT_ICON0x1623a80x10a8dataEnglishUnited States0.5724671669793621
              RT_ICON0x1634500x988dataEnglishUnited States0.18278688524590164
              RT_ICON0x163dd80x6b8dataEnglishUnited States0.056976744186046514
              RT_ICON0x1644900x468dataEnglishUnited States0.44769503546099293
              RT_ICON0x1649600x4228dataEnglishUnited States0.30562116202172884
              RT_ICON0x168b880x25a8Matlab v4 mat-file (little endian) \207\322\377\377\267%\221Zg\363$I\254\342\010\003\244\243\244q\002, numeric, rows 0, columns 7, imaginaryEnglishUnited States0.4367219917012448
              RT_ICON0x16b1300x1a68Matlab v4 mat-file (little endian) \330\352\377\377, numeric, rows 0, columns 0EnglishUnited States0.2541420118343195
              RT_ICON0x16cb980x10a8OpenPGP Public KeyEnglishUnited States0.26055347091932457
              RT_ICON0x16dc400x988dataEnglishUnited States0.27295081967213114
              RT_ICON0x16e5c80x6b8dataEnglishUnited States0.29534883720930233
              RT_ICON0x16ec800x468dataEnglishUnited States0.3528368794326241
              RT_ICON0x16f1500x4228dataEnglishUnited States0.2543103448275862
              RT_ICON0x1733780x25a8dataEnglishUnited States0.22614107883817428
              RT_ICON0x1759200x1a68dataEnglishUnited States0.33550295857988166
              RT_ICON0x1773880x10a8dataEnglishUnited States0.14188555347091933
              RT_ICON0x1784300x988dataEnglishUnited States0.2774590163934426
              RT_ICON0x178db80x6b8dataEnglishUnited States0.42034883720930233
              RT_ICON0x1794700x468dataEnglishUnited States0.2987588652482269
              RT_ICON0x1799400x4228dataEnglishUnited States0.1716461974492206
              RT_ICON0x17db680x25a8dataEnglishUnited States0.28827800829875516
              RT_ICON0x1801100x1a68Matlab v4 mat-file (little endian) CMNb{C=#\237\027n\242\001, numeric, rows 0, columns 4915280, imaginaryEnglishUnited States0.3890532544378698
              RT_ICON0x181b780x10a8dataEnglishUnited States0.3719512195121951
              RT_ICON0x182c200x988dataEnglishUnited States0.4627049180327869
              RT_ICON0x1835a80x6b8dataEnglishUnited States0.42965116279069765
              RT_ICON0x183c600x468dataEnglishUnited States0.3900709219858156
              RT_ICON0x1841300x4228dataEnglishUnited States0.40983703353802553
              RT_ICON0x1883580x25a8dataEnglishUnited States0.3329875518672199
              RT_ICON0x18a9000x1a68dataEnglishUnited States0.23254437869822486
              RT_ICON0x18c3680x10a8dataEnglishUnited States0.27861163227016883
              RT_ICON0x18d4100x988dataEnglishUnited States0.3319672131147541
              RT_ICON0x18dd980x6b8dataEnglishUnited States0.3075581395348837
              RT_ICON0x18e4500x468dataEnglishUnited States0.449468085106383
              RT_ICON0x18e9200x4228dataEnglishUnited States0.5378483703353802
              RT_ICON0x192b480x25a8dataEnglishUnited States0.22738589211618257
              RT_ICON0x1950f00x1a68dBase III DBT, version number 0, next free block index 3753, 1st item "b\253\027l\207\322\377\377$"EnglishUnited States0.27307692307692305
              RT_ICON0x196b580x10a8dataEnglishUnited States0.2790806754221388
              RT_ICON0x197c000x988dataEnglishUnited States0.23647540983606558
              RT_ICON0x1985880x6b8dataEnglishUnited States0.37209302325581395
              RT_ICON0x198c400x468dataEnglishUnited States0.4778368794326241
              RT_ICON0x1991100x4228dataEnglishUnited States0.32510628247520074
              RT_ICON0x19d3380x25a8dataEnglishUnited States0.308298755186722
              RT_ICON0x19f8e00x1a68Matlab v4 mat-file (little endian) \207\322\377\377\0113\206k\207\322\377\377, numeric, rows 480, columns 0EnglishUnited States0.17736686390532544
              RT_ICON0x1a13480x10a8dataEnglishUnited States0.20309568480300189
              RT_ICON0x1a23f00x988dataEnglishUnited States0.4024590163934426
              RT_ICON0x1a2d780x6b8dataEnglishUnited States0.43953488372093025
              RT_ICON0x1a34300x468dataEnglishUnited States0.4583333333333333
              RT_ICON0x1a39000x4228dataEnglishUnited States0.05083845063769485
              RT_ICON0x1a7b280x25a8dataEnglishUnited States0.06514522821576764
              RT_ICON0x1aa0d00x1a68Matlab v4 mat-file (little endian) \207\322\377\3772, numeric, rows 0, columns 2228258EnglishUnited States0.2650887573964497
              RT_ICON0x1abb380x10a8dataEnglishUnited States0.3482645403377111
              RT_ICON0x1acbe00x988dataEnglishUnited States0.3094262295081967
              RT_ICON0x1ad5680x6b8dataEnglishUnited States0.3127906976744186
              RT_ICON0x1adc200x468dataEnglishUnited States0.37056737588652483
              RT_ICON0x1ae0f00x4228dataEnglishUnited States0.5901039206424186
              RT_ICON0x1b23180x25a8dataEnglishUnited States0.21452282157676347
              RT_ICON0x1b48c00x1a68dataEnglishUnited States0.16538461538461538
              RT_ICON0x1b63280x10a8dataEnglishUnited States0.19418386491557224
              RT_ICON0x1b73d00x988Matlab v4 mat-file (little endian) \207\322\377\377, numeric, rows 0, columns 0EnglishUnited States0.2774590163934426
              RT_ICON0x1b7d580x6b8dataEnglishUnited States0.3447674418604651
              RT_ICON0x1b84100x468dataEnglishUnited States0.5425531914893617
              RT_ICON0x1b88e00x4228dataEnglishUnited States0.319674067076051
              RT_ICON0x1bcb080x25a8dataEnglishUnited States0.35394190871369297
              RT_ICON0x1bf0b00x1a68dataEnglishUnited States0.32292899408284026
              RT_ICON0x1c0b180x10a8dataEnglishUnited States0.32387429643527205
              RT_ICON0x1c1bc00x988dataEnglishUnited States0.26885245901639343
              RT_ICON0x1c25480x6b8dataEnglishUnited States0.2936046511627907
              RT_ICON0x1c2c000x468dataEnglishUnited States0.32890070921985815
              RT_ICON0x1c30d00x4228dataEnglishUnited States0.2771020311761927
              RT_ICON0x1c72f80x25a8dataEnglishUnited States0.19491701244813278
              RT_ICON0x1c98a00x1a68dataEnglishUnited States0.06183431952662722
              RT_ICON0x1cb3080x10a8dataEnglishUnited States0.05276735459662289
              RT_ICON0x1cc3b00x988dataEnglishUnited States0.20245901639344263
              RT_ICON0x1ccd380x6b8dataEnglishUnited States0.3563953488372093
              RT_ICON0x1cd3f00x468dataEnglishUnited States0.2641843971631206
              RT_ICON0x1cd8c00x4228dataEnglishUnited States0.38787198866320266
              RT_ICON0x1d1ae80x25a8dataEnglishUnited States0.5092323651452282
              RT_ICON0x1d40900x1a68dataEnglishUnited States0.47810650887573963
              RT_ICON0x1d5af80x10a8dataEnglishUnited States0.17706378986866791
              RT_ICON0x1d6ba00x988dataEnglishUnited States0.714344262295082
              RT_ICON0x1d75280x6b8dataEnglishUnited States0.5494186046511628
              RT_ICON0x1d7be00x468dataEnglishUnited States0.19326241134751773
              RT_ICON0x1d80b00x4228dataEnglishUnited States0.09772083136513934
              RT_ICON0x1dc2d80x25a8dataEnglishUnited States0.22188796680497924
              RT_ICON0x1de8800x1a68dataEnglishUnited States0.07647928994082841
              RT_ICON0x1e02e80x10a8dataEnglishUnited States0.07903377110694183
              RT_ICON0x1e13900x988dataEnglishUnited States0.07418032786885245
              RT_ICON0x1e1d180x6b8PDP-11 UNIX/RT ldpEnglishUnited States0.11162790697674418
              RT_ICON0x1e23d00x468dataEnglishUnited States0.17287234042553193
              RT_ICON0x1e28a00x4228dataEnglishUnited States0.06831601322626359
              RT_ICON0x1e6ae00x4228dataEnglishUnited States0.002302786962683042
              RT_ICON0x1ead200x4228dataEnglishUnited States0.16089985829003306
              RT_ICON0x1eef600x4228dataEnglishUnited States0.2656471421823335
              RT_ICON0x1f31a00x4228dataEnglishUnited States0.2713155408597071
              RT_ICON0x1f73e00x4228dataEnglishUnited States0.34559518186112426
              RT_ICON0x1fb6080x25a8dataEnglishUnited States0.21887966804979253
              RT_ICON0x1fdbb00x1a68dataEnglishUnited States0.5366863905325444
              RT_ICON0x1ff6180x10a8dataEnglishUnited States0.11796435272045028
              RT_ICON0x2006c00x988dataEnglishUnited States0.010245901639344262
              RT_ICON0x2010480x6b8dataEnglishUnited States0.012790697674418604
              RT_ICON0x2017000x468dataEnglishUnited States0.015957446808510637
              RT_ICON0x201bd00x4228dataEnglishUnited States0.19662257912139822
              RT_ICON0x205df80x25a8SysEx File -EnglishUnited States0.35466804979253114
              RT_ICON0x2083a00x1a68OpenPGP Public KeyEnglishUnited States0.38284023668639056
              RT_ICON0x209e080x10a8dataEnglishUnited States0.009146341463414634
              RT_ICON0x20aeb00x988dataEnglishUnited States0.029918032786885245
              RT_ICON0x20b8380x6b8dataEnglishUnited States0.3569767441860465
              RT_ICON0x20bef00x468dataEnglishUnited States0.3537234042553192
              RT_ICON0x20c3c00x4228dataEnglishUnited States0.17099669343410487
              RT_ICON0x2105e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishUnited States0.12603734439834025
              RT_ICON0x212b900x1a68Device independent bitmap graphic, 40 x 80 x 32, image size 0EnglishUnited States0.14142011834319526
              RT_ICON0x2145f80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishUnited States0.17589118198874296
              RT_ICON0x2156a00xcd8Device independent bitmap graphic, 28 x 56 x 32, image size 0EnglishUnited States0.17062043795620438
              RT_ICON0x2163780x988Device independent bitmap graphic, 24 x 48 x 32, image size 0EnglishUnited States0.20204918032786887
              RT_ICON0x216d000x6b8Device independent bitmap graphic, 20 x 40 x 32, image size 0EnglishUnited States0.2505813953488372
              RT_ICON0x2173b80x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishUnited States0.30851063829787234
              RT_GROUP_ICON0x732800x76dataEnglishUnited States0.1016949152542373
              RT_GROUP_ICON0xaadd00x76Matlab v4 mat-file (little endian) `\373\033\010!, numeric, rows 0, columns 0EnglishUnited States0.635593220338983
              RT_GROUP_ICON0xb62a80x76dataEnglishUnited States0.1016949152542373
              RT_GROUP_ICON0xc17800x76dataEnglishUnited States0.1016949152542373
              RT_GROUP_ICON0xccc580x76dataEnglishUnited States0.1016949152542373
              RT_GROUP_ICON0xd81300x76dataEnglishUnited States0.7711864406779662
              RT_GROUP_ICON0xe36080x76dataEnglishUnited States0.1016949152542373
              RT_GROUP_ICON0xeeae00x76dataEnglishUnited States0.1016949152542373
              RT_GROUP_ICON0xf9fb80x76dataEnglishUnited States0.1016949152542373
              RT_GROUP_ICON0x1054900x76dataEnglishUnited States0.1016949152542373
              RT_GROUP_ICON0x1109680x76dataEnglishUnited States0.1016949152542373
              RT_GROUP_ICON0x11b1680x68dataEnglishUnited States0.11538461538461539
              RT_GROUP_ICON0x7e7580x76dataEnglishUnited States0.7542372881355932
              RT_GROUP_ICON0x89c300x76dataEnglishUnited States0.1016949152542373
              RT_GROUP_ICON0x951080x76Matlab v4 mat-file (little endian) \377\377\377\377@\362\031=\004\301\377\377, numeric, rows 0, columns 0EnglishUnited States0.3983050847457627
              RT_GROUP_ICON0x2178200x76dataEnglishUnited States0.7711864406779662
              RT_GROUP_ICON0x1259580x68dataEnglishUnited States0.11538461538461539
              RT_GROUP_ICON0x1301480x68dataEnglishUnited States0.11538461538461539
              RT_GROUP_ICON0x13a9380x68dataEnglishUnited States0.75
              RT_GROUP_ICON0x1451280x68dataEnglishUnited States0.11538461538461539
              RT_GROUP_ICON0x14f9180x68dataEnglishUnited States0.28846153846153844
              RT_GROUP_ICON0x15a1080x68dataEnglishUnited States0.375
              RT_GROUP_ICON0x1648f80x68Non-ISO extended-ASCII text, with no line terminatorsEnglishUnited States0.8365384615384616
              RT_GROUP_ICON0x16f0e80x68dataEnglishUnited States0.17307692307692307
              RT_GROUP_ICON0x1798d80x68dataEnglishUnited States0.16346153846153846
              RT_GROUP_ICON0x1840c80x68dataEnglishUnited States0.7307692307692307
              RT_GROUP_ICON0x18e8b80x68dataEnglishUnited States1.1057692307692308
              RT_GROUP_ICON0x1990a80x68dataEnglishUnited States0.8557692307692307
              RT_GROUP_ICON0x1a38980x68dataEnglishUnited States0.11538461538461539
              RT_GROUP_ICON0x1ae0880x68dataEnglishUnited States0.5384615384615384
              RT_GROUP_ICON0x1b88780x68dataEnglishUnited States0.7596153846153846
              RT_GROUP_ICON0x1c30680x68dataEnglishUnited States0.47115384615384615
              RT_GROUP_ICON0x1cd8580x68dataEnglishUnited States0.7115384615384616
              RT_GROUP_ICON0x1d80480x68dataEnglishUnited States0.3173076923076923
              RT_GROUP_ICON0x1e28380x68dataEnglishUnited States0.3942307692307692
              RT_GROUP_ICON0x1e6ac80x14dataEnglishUnited States0.55
              RT_GROUP_ICON0x1ead080x14dataEnglishUnited States0.55
              RT_GROUP_ICON0x1eef480x14dataEnglishUnited States1.35
              RT_GROUP_ICON0x1f31880x14dataEnglishUnited States0.85
              RT_GROUP_ICON0x1f73c80x14dataEnglishUnited States1.15
              RT_GROUP_ICON0x201b680x68dataEnglishUnited States0.11538461538461539
              RT_GROUP_ICON0x20c3580x68dataEnglishUnited States0.6153846153846154
              RT_GROUP_ICON0x9f9080x68dataEnglishUnited States0.11538461538461539
              RT_VERSION0x662400x3b4dataEnglishUnited States0.4578059071729958
              RT_MANIFEST0x65f400x2faXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.479002624671916
              DLLImport
              msvcrt.dllwcschr, wcsncmp, __CxxFrameHandler3, floorf, memcmp, wcstombs, _wcsnicmp, toupper, iswspace, _wtoi, memmove, _errno, ??1type_info@@UEAA@XZ, _onexit, __dllonexit, _unlock, _lock, ?terminate@@YAXXZ, _initterm, _amsg_exit, _XcptFilter, _CxxThrowException, _callnewh, ??0exception@@QEAA@AEBQEBDH@Z, wcsstr, realloc, calloc, _get_errno, _set_errno, ??0exception@@QEAA@AEBQEBD@Z, ?what@exception@@UEBAPEBDXZ, memmove_s, swprintf_s, _purecall, wcscat_s, wcscpy_s, free, malloc, wcsncpy_s, __C_specific_handler, _vsnprintf_s, ??0exception@@QEAA@AEBV0@@Z, ??0exception@@QEAA@XZ, ??1exception@@UEAA@XZ, memcpy_s, _vsnwprintf, memset
              api-ms-win-core-libraryloader-l1-2-0.dllLoadLibraryExW, FreeLibrary, LoadLibraryExA, LoadResource, SizeofResource, GetProcAddress, GetModuleFileNameA, LoadStringW, GetModuleHandleW, GetModuleHandleExW, GetModuleFileNameW, FindResourceExW
              api-ms-win-core-synch-l1-1-0.dllCreateMutexExW, OpenSemaphoreW, InitializeCriticalSection, WaitForSingleObjectEx, ReleaseSRWLockExclusive, AcquireSRWLockExclusive, InitializeCriticalSectionEx, DeleteCriticalSection, ReleaseMutex, WaitForSingleObject, CreateEventW, LeaveCriticalSection, ReleaseSemaphore, AcquireSRWLockShared, CreateEventExW, SetEvent, InitializeSRWLock, EnterCriticalSection, CreateSemaphoreExW, ReleaseSRWLockShared
              api-ms-win-core-heap-l1-1-0.dllHeapAlloc, GetProcessHeap, HeapFree
              api-ms-win-core-errorhandling-l1-1-0.dllSetUnhandledExceptionFilter, UnhandledExceptionFilter, SetLastError, GetLastError, RaiseException
              api-ms-win-core-processthreads-l1-1-0.dllOpenProcessToken, GetCurrentProcess, TerminateProcess, GetCurrentProcessId, CreateProcessW, GetCurrentThreadId, ProcessIdToSessionId
              api-ms-win-core-localization-l1-2-0.dllGetLocaleInfoW, FormatMessageW
              api-ms-win-core-debug-l1-1-0.dllIsDebuggerPresent, DebugBreak, OutputDebugStringW, OutputDebugStringA
              api-ms-win-core-handle-l1-1-0.dllCloseHandle
              OLEAUT32.dllVarBstrCmp, SysAllocStringLen, SysAllocString, SysStringLen, VarBstrCat, VariantClear, VariantInit, SysStringByteLen, SysAllocStringByteLen, VarUI4FromStr, SysFreeString
              api-ms-win-eventing-classicprovider-l1-1-0.dllRegisterTraceGuidsW, GetTraceLoggerHandle, TraceMessage, UnregisterTraceGuids, GetTraceEnableFlags, GetTraceEnableLevel
              api-ms-win-core-com-l1-1-0.dllCoTaskMemFree, CoGetMalloc, CoSetProxyBlanket, CoTaskMemAlloc, CoCreateInstance, IIDFromString, StringFromIID, CoRegisterClassObject, CoRevokeClassObject, CoTaskMemRealloc, CoUninitialize, CoInitializeEx, CoWaitForMultipleHandles, StringFromGUID2, CoGetApartmentType
              api-ms-win-core-string-l2-1-0.dllCharNextW, CharUpperBuffW
              api-ms-win-core-libraryloader-l1-2-1.dllLoadLibraryW
              api-ms-win-core-registry-l1-1-0.dllRegOpenKeyExW, RegGetValueW, RegQueryValueExW, RegSetValueExW, RegCreateKeyExW, RegEnumKeyExW, RegDeleteValueW, RegQueryInfoKeyW, RegCloseKey
              api-ms-win-core-string-l1-1-0.dllCompareStringOrdinal, CompareStringW, MultiByteToWideChar
              api-ms-win-eventing-provider-l1-1-0.dllEventActivityIdControl, EventProviderEnabled, EventRegister, EventSetInformation, EventWriteTransfer, EventUnregister, EventEnabled
              api-ms-win-core-sysinfo-l1-1-0.dllGetWindowsDirectoryW, GetSystemTimeAsFileTime, GetTickCount
              api-ms-win-core-heap-l2-1-0.dllLocalFree, LocalAlloc
              api-ms-win-core-threadpool-l1-2-0.dllWaitForThreadpoolTimerCallbacks, CloseThreadpoolTimer, CreateThreadpoolTimer, SetThreadpoolTimer
              api-ms-win-core-profile-l1-1-0.dllQueryPerformanceCounter, QueryPerformanceFrequency
              api-ms-win-core-winrt-error-l1-1-0.dllRoTransformError, RoOriginateError
              api-ms-win-core-synch-l1-2-0.dllSleep, InitOnceBeginInitialize, InitOnceExecuteOnce, InitOnceComplete
              api-ms-win-service-management-l1-1-0.dllCloseServiceHandle, OpenServiceW, OpenSCManagerW
              api-ms-win-service-winsvc-l1-1-0.dllQueryServiceStatus
              IPHLPAPI.DLLConvertInterfaceLuidToGuid, ConvertInterfaceIndexToLuid, ConvertInterfaceLuidToIndex, FreeMibTable, ConvertInterfaceGuidToLuid, GetIfStackTable, GetIfEntry2Ex
              api-ms-win-core-winrt-string-l1-1-0.dllWindowsDeleteString, WindowsCreateStringReference, WindowsGetStringRawBuffer, WindowsCreateString, WindowsConcatString
              api-ms-win-security-sddl-l1-1-0.dllConvertStringSidToSidW
              api-ms-win-core-registry-l1-1-1.dllRegSetKeyValueW
              api-ms-win-core-winrt-l1-1-0.dllRoGetActivationFactory, RoActivateInstance
              api-ms-win-security-base-l1-1-0.dllDuplicateToken, GetTokenInformation, CreateWellKnownSid, CheckTokenMembership
              api-ms-win-core-processenvironment-l1-1-0.dllExpandEnvironmentStringsW
              api-ms-win-core-memory-l1-1-0.dllVirtualFree, VirtualAlloc
              api-ms-win-core-util-l1-1-0.dllEncodePointer, DecodePointer
              api-ms-win-core-processthreads-l1-1-1.dllFlushInstructionCache
              api-ms-win-core-interlocked-l1-1-0.dllInterlockedPopEntrySList, InterlockedPushEntrySList
              api-ms-win-core-rtlsupport-l1-1-0.dllRtlLookupFunctionEntry, RtlVirtualUnwind, RtlCaptureContext
              api-ms-win-core-threadpool-legacy-l1-1-0.dllQueueUserWorkItem
              api-ms-win-security-provider-l1-1-0.dllSetNamedSecurityInfoW, GetNamedSecurityInfoW, SetEntriesInAclW
              api-ms-win-core-kernel32-legacy-l1-1-0.dllMulDiv
              api-ms-win-core-string-obsolete-l1-1-0.dlllstrcmpiW, lstrlenW, lstrcmpW
              api-ms-win-core-shlwapi-obsolete-l1-1-0.dllQISearch
              api-ms-win-core-localization-obsolete-l1-2-0.dllGetUserDefaultUILanguage
              api-ms-win-core-sidebyside-l1-1-0.dllActivateActCtx, QueryActCtxW, CreateActCtxW, FindActCtxSectionStringW, DeactivateActCtx
              api-ms-win-service-private-l1-1-0.dllUnsubscribeServiceChangeNotifications, SubscribeServiceChangeNotifications
              ntdll.dllRtlUnsubscribeWnfStateChangeNotification, NtQueryInformationToken, WinSqmEndSession, WinSqmSetDWORD, WinSqmStartSession, WinSqmAddToStreamEx, NtQueryWnfStateData, RtlSubscribeWnfStateChangeNotification, WinSqmAddToStream, WinSqmIncrementDWORD, RtlUnsubscribeWnfNotificationWaitForCompletion
              GDI32.dllSetStretchBltMode, DeleteObject, CreateFontIndirectW, ExcludeClipRect, GetObjectW, SetBkMode, SetTextColor, DeleteDC, GetDeviceCaps, StretchBlt, GdiAlphaBlend, CreateCompatibleDC, CreateDIBSection, GetCurrentObject, CreateSolidBrush, BitBlt, SelectObject
              USER32.dllUpdateWindow, DestroyWindow, PostQuitMessage, LoadCursorW, DefWindowProcW, GetClassInfoExW, SetWindowLongPtrW, DestroyMenu, SetTimer, GetDpiForWindow, KillTimer, AreDpiAwarenessContextsEqual, RegisterPowerSettingNotification, UnregisterPowerSettingNotification, MonitorFromPoint, GetMonitorInfoW, GetMenuItemCount, GetMenuItemInfoW, DeleteMenu, LoadMenuW, GetSubMenu, SendNotifyMessageW, SetForegroundWindow, TrackPopupMenu, ShowWindow, CallWindowProcW, IsWindow, DrawTextExW, FindWindowW, GetWindowDpiAwarenessContext, RegisterWindowMessageW, GetDpiForSystem, PostMessageW, GetMessageExtraInfo, SetMessageExtraInfo, GetPropW, GetCurrentInputMessageSource, RemovePropW, SetMenuItemInfoW, DestroyIcon, SetMenuInfo, SetPropW, GetMenuInfo, GetIconInfoExW, UnregisterClassA, GetParent, SendInput, GetSystemMetricsForDpi, LoadImageW, ReleaseDC, SystemParametersInfoW, CreateWindowExW, DrawIconEx, GetWindowLongPtrW, RegisterClassExW, GetWindowLongW, DrawTextW, SetWindowLongW, GetClassNameW, WindowFromPoint, MonitorFromWindow, GetDC
              SHELL32.dllSHGetStockIconInfo, ShellExecuteExW, Shell_NotifyIconW
              MobileNetworking.dllGetPersistentRegPath
              SHCORE.dllIUnknown_QueryService
              api-ms-win-core-file-l1-1-0.dllCompareFileTime
              api-ms-win-core-delayload-l1-1-1.dllResolveDelayLoadedAPI
              api-ms-win-core-delayload-l1-1-0.dllDelayLoadFailureHook
              UxTheme.dllGetThemeColor, CloseThemeData, DrawThemeTextEx, GetThemeFont, OpenThemeData, DrawThemeBackground
              NameOrdinalAddress
              DllCanUnloadNow10x180001270
              DllGetClassObject20x1800031f0
              DllRegisterServer30x18001d1d0
              DllUnregisterServer40x18001d240
              Language of compilation systemCountry where language is spokenMap
              EnglishUnited States
              TimestampSource PortDest PortSource IPDest IP
              Oct 27, 2024 07:56:31.551817894 CET5356443162.159.36.2192.168.2.4
              Oct 27, 2024 07:56:32.406415939 CET6521053192.168.2.41.1.1.1
              Oct 27, 2024 07:56:32.414680004 CET53652101.1.1.1192.168.2.4
              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
              Oct 27, 2024 07:56:32.406415939 CET192.168.2.41.1.1.10x478cStandard query (0)198.187.3.20.in-addr.arpaPTR (Pointer record)IN (0x0001)false
              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
              Oct 27, 2024 07:56:32.414680004 CET1.1.1.1192.168.2.40x478cName error (3)198.187.3.20.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false

              Click to jump to process

              Click to jump to process

              Click to dive into process behavior distribution

              Click to jump to process

              Target ID:0
              Start time:02:56:00
              Start date:27/10/2024
              Path:C:\Windows\System32\loaddll64.exe
              Wow64 process (32bit):false
              Commandline:loaddll64.exe "C:\Users\user\Desktop\AyCnklzHb7.dll"
              Imagebase:0x7ff6112c0000
              File size:165'888 bytes
              MD5 hash:763455F9DCB24DFEECC2B9D9F8D46D52
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Target ID:1
              Start time:02:56:00
              Start date:27/10/2024
              Path:C:\Windows\System32\conhost.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Imagebase:0x7ff7699e0000
              File size:862'208 bytes
              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Target ID:2
              Start time:02:56:00
              Start date:27/10/2024
              Path:C:\Windows\System32\cmd.exe
              Wow64 process (32bit):false
              Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\AyCnklzHb7.dll",#1
              Imagebase:0x7ff63f0e0000
              File size:289'792 bytes
              MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Target ID:3
              Start time:02:56:00
              Start date:27/10/2024
              Path:C:\Windows\System32\regsvr32.exe
              Wow64 process (32bit):false
              Commandline:regsvr32.exe /s C:\Users\user\Desktop\AyCnklzHb7.dll
              Imagebase:0x7ff611320000
              File size:25'088 bytes
              MD5 hash:B0C2FA35D14A9FAD919E99D9D75E1B9E
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Target ID:4
              Start time:02:56:00
              Start date:27/10/2024
              Path:C:\Windows\System32\rundll32.exe
              Wow64 process (32bit):false
              Commandline:rundll32.exe "C:\Users\user\Desktop\AyCnklzHb7.dll",#1
              Imagebase:0x7ff6f1ab0000
              File size:71'680 bytes
              MD5 hash:EF3179D498793BF4234F708D3BE28633
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Target ID:5
              Start time:02:56:00
              Start date:27/10/2024
              Path:C:\Windows\System32\rundll32.exe
              Wow64 process (32bit):false
              Commandline:rundll32.exe C:\Users\user\Desktop\AyCnklzHb7.dll,DllCanUnloadNow
              Imagebase:0x7ff6f1ab0000
              File size:71'680 bytes
              MD5 hash:EF3179D498793BF4234F708D3BE28633
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Target ID:6
              Start time:02:56:03
              Start date:27/10/2024
              Path:C:\Windows\System32\rundll32.exe
              Wow64 process (32bit):false
              Commandline:rundll32.exe C:\Users\user\Desktop\AyCnklzHb7.dll,DllGetClassObject
              Imagebase:0x7ff6f1ab0000
              File size:71'680 bytes
              MD5 hash:EF3179D498793BF4234F708D3BE28633
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Target ID:9
              Start time:02:56:04
              Start date:27/10/2024
              Path:C:\Windows\System32\WerFault.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\WerFault.exe -u -p 7448 -s 420
              Imagebase:0x7ff6692c0000
              File size:570'736 bytes
              MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Target ID:10
              Start time:02:56:06
              Start date:27/10/2024
              Path:C:\Windows\System32\rundll32.exe
              Wow64 process (32bit):false
              Commandline:rundll32.exe C:\Users\user\Desktop\AyCnklzHb7.dll,DllRegisterServer
              Imagebase:0x7ff6f1ab0000
              File size:71'680 bytes
              MD5 hash:EF3179D498793BF4234F708D3BE28633
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Reset < >

                Execution Graph

                Execution Coverage:0.1%
                Dynamic/Decrypted Code Coverage:0%
                Signature Coverage:0%
                Total number of Nodes:13
                Total number of Limit Nodes:1
                execution_graph 12017 7ffdfb7231f0 12019 7ffdfb72320c 12017->12019 12018 7ffdfb7232a3 12020 7ffdfb7232d4 12018->12020 12025 7ffdfb73aa00 12018->12025 12019->12018 12022 7ffdfb72325c EnterCriticalSection 12019->12022 12023 7ffdfb723290 LeaveCriticalSection 12022->12023 12024 7ffdfb723275 12022->12024 12023->12018 12024->12023 12026 7ffdfb73aa2b 12025->12026 12027 7ffdfb73aa35 12025->12027 12026->12020 12027->12026 12028 7ffdfb73aa8b EnterCriticalSection 12027->12028 12029 7ffdfb73aabd LeaveCriticalSection 12028->12029 12030 7ffdfb73aaa3 12028->12030 12029->12026 12030->12029

                Control-flow Graph

                APIs
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: CriticalSection$EnterLeave
                • String ID:
                • API String ID: 3168844106-0
                • Opcode ID: 30359a2fbf865d7357c24ce6ae96d5d75003d90b4bfe6daeb817649b1c14a4ba
                • Instruction ID: ee081b0a470a90e73525f1918b60dc23bbc585bea9e6aa392b4200a05fce9811
                • Opcode Fuzzy Hash: 30359a2fbf865d7357c24ce6ae96d5d75003d90b4bfe6daeb817649b1c14a4ba
                • Instruction Fuzzy Hash: 64311C62B0AB438AEB158B66D860A7973E5FB45BC4F2A4432CE6D476BCDF38D5418700

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 24 7ffdfb7218f0-7ffdfb72193d 25 7ffdfb72193f-7ffdfb721943 24->25 26 7ffdfb72195a-7ffdfb721983 EnterCriticalSection 24->26 25->26 27 7ffdfb721945-7ffdfb721955 call 7ffdfb727fb0 25->27 28 7ffdfb731176-7ffdfb731180 26->28 29 7ffdfb721989-7ffdfb721a88 LoadCursorW call 7ffdfb722000 call 7ffdfb721e90 26->29 27->26 31 7ffdfb73119d 28->31 32 7ffdfb731182-7ffdfb731186 28->32 41 7ffdfb721a8e-7ffdfb721ac2 ShowWindow 29->41 42 7ffdfb731329-7ffdfb73133a 29->42 38 7ffdfb7311a4-7ffdfb7311b7 DecodePointer 31->38 32->31 34 7ffdfb731188-7ffdfb731198 call 7ffdfb727fb0 32->34 34->31 40 7ffdfb7311bd-7ffdfb7311c8 call 7ffdfb751138 38->40 60 7ffdfb7311d2-7ffdfb7311ed GetProcessHeap HeapFree 40->60 46 7ffdfb721ac4 41->46 47 7ffdfb721acb-7ffdfb721ae6 call 7ffdfb7215d0 41->47 44 7ffdfb731340-7ffdfb731344 42->44 45 7ffdfb721e41-7ffdfb721e85 LeaveCriticalSection call 7ffdfb72e120 42->45 50 7ffdfb721e1e-7ffdfb721e21 44->50 51 7ffdfb73134a-7ffdfb731365 call 7ffdfb723a90 44->51 46->47 57 7ffdfb721c6f-7ffdfb721c76 47->57 58 7ffdfb721aec-7ffdfb721b14 GetProcessHeap HeapAlloc 47->58 50->45 54 7ffdfb721e23-7ffdfb721e27 50->54 54->45 59 7ffdfb721e29-7ffdfb721e3c call 7ffdfb723a90 54->59 65 7ffdfb721cb3-7ffdfb721cb7 57->65 66 7ffdfb721c78-7ffdfb721c7a 57->66 62 7ffdfb7311f2 58->62 63 7ffdfb721b1a-7ffdfb721b20 58->63 59->45 60->62 77 7ffdfb7311fa-7ffdfb73120c SetLastError 62->77 63->38 69 7ffdfb721b26-7ffdfb721b47 LoadLibraryExA 63->69 70 7ffdfb721cbd-7ffdfb721cc4 65->70 71 7ffdfb721d8a-7ffdfb721d94 65->71 67 7ffdfb721c80-7ffdfb721c86 66->67 68 7ffdfb731211-7ffdfb73121c call 7ffdfb7510d4 66->68 72 7ffdfb731221-7ffdfb731242 LoadLibraryExA 67->72 73 7ffdfb721c8c-7ffdfb721ca2 DecodePointer 67->73 68->65 69->40 74 7ffdfb721b4d-7ffdfb721b66 GetProcAddress 69->74 75 7ffdfb7312e2-7ffdfb7312ec call 7ffdfb73d124 70->75 76 7ffdfb721cca-7ffdfb721ccd 70->76 79 7ffdfb7312ed-7ffdfb7312fe 71->79 80 7ffdfb721d9a-7ffdfb721dc9 ShowWindow UpdateWindow call 7ffdfb726c60 71->80 85 7ffdfb7312d8-7ffdfb7312dd 72->85 86 7ffdfb731248-7ffdfb731260 call 7ffdfb751098 72->86 73->65 81 7ffdfb721ca4-7ffdfb721ca9 73->81 74->40 82 7ffdfb721b6c-7ffdfb721b9b EncodePointer GetProcAddress 74->82 75->79 76->75 83 7ffdfb721cd3-7ffdfb721d87 GetCurrentThreadId EnterCriticalSection LeaveCriticalSection call 7ffdfb721e90 76->83 77->71 79->45 89 7ffdfb731304-7ffdfb731308 79->89 100 7ffdfb721e10-7ffdfb721e17 80->100 101 7ffdfb721dcb-7ffdfb721df1 FindWindowW 80->101 81->65 82->40 91 7ffdfb721ba1-7ffdfb721bd0 EncodePointer GetProcAddress 82->91 83->71 85->65 86->85 104 7ffdfb731262-7ffdfb73127a call 7ffdfb751098 86->104 89->50 90 7ffdfb73130e-7ffdfb731324 call 7ffdfb727fb0 89->90 91->40 97 7ffdfb721bd6-7ffdfb721c05 EncodePointer GetProcAddress 91->97 97->40 103 7ffdfb721c0b-7ffdfb721c47 EncodePointer DecodePointer 97->103 100->50 101->100 105 7ffdfb721df3-7ffdfb721e0b SendNotifyMessageW 101->105 103->40 107 7ffdfb721c4d-7ffdfb721c5c 103->107 104->85 109 7ffdfb73127c-7ffdfb731294 call 7ffdfb751098 104->109 105->100 107->60 112 7ffdfb721c62-7ffdfb721c69 107->112 109->85 114 7ffdfb731296-7ffdfb7312ae call 7ffdfb751098 109->114 112->57 112->77 114->85 117 7ffdfb7312b0-7ffdfb7312ce DecodePointer 114->117 117->85
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: Pointer$Window$AddressCriticalEncodeProcSection$DecodeEnterHeapLeaveLoadMessageShow$ActivateAllocCreateCurrentCursorDeactivateFindLibraryNotifyProcessSendThreadTraceUpdate
                • String ID: AtlThunk_AllocateData$AtlThunk_DataToCode$AtlThunk_FreeData$AtlThunk_InitData$Network Flyout$P$Shell_TrayWnd$atlthunk.dll
                • API String ID: 2554326411-3218521056
                • Opcode ID: dfa3455f24e70595d0381f225aa8bea9d95dd61a256da8951bb2dcd42a57dc93
                • Instruction ID: 723ee6214a2d13ce6c3211a0a6e679b7ee305566e5b3ca7150a4552f5d824fdc
                • Opcode Fuzzy Hash: dfa3455f24e70595d0381f225aa8bea9d95dd61a256da8951bb2dcd42a57dc93
                • Instruction Fuzzy Hash: 6C123E35B0AB8786E7548B11E860AB9B7A1FB89B44F548135CA6D43BF8DF3CE445CB00
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: CriticalSectionService$EnterLeaveOpen$ChangeCloseConvertEntry2GuidHandleInterfaceLuidManagerMessageNotificationsQueryStatusSubscribeTrace
                • String ID: ServicesActive
                • API String ID: 3969580514-3071072050
                • Opcode ID: c28ac43b69d4244a31fe12d4c2367a80fbc799a753e6cf485316f07d6be99a22
                • Instruction ID: 44132fcc69aa89d0965eea2848d9b0b15b866d81f87ff6e4a2cd16f0184b8c45
                • Opcode Fuzzy Hash: c28ac43b69d4244a31fe12d4c2367a80fbc799a753e6cf485316f07d6be99a22
                • Instruction Fuzzy Hash: 37722B32B0A78386EB509B26E460AB977A1FB85B44F544036DE6D476F8DF7CE445CB00

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 446 7ffdfb762dd8-7ffdfb762e29 call 7ffdfb7646a8 449 7ffdfb7637ee-7ffdfb763819 call 7ffdfb72e120 446->449 450 7ffdfb762e2f-7ffdfb762e45 MonitorFromWindow 446->450 450->449 452 7ffdfb762e4b-7ffdfb762e62 call 7ffdfb7810a0 450->452 452->449 456 7ffdfb762e68-7ffdfb762e6c 452->456 457 7ffdfb762e6e-7ffdfb762e75 456->457 458 7ffdfb762e77-7ffdfb762e89 456->458 459 7ffdfb762e8d-7ffdfb762ea3 OpenThemeData 457->459 458->459 459->449 460 7ffdfb762ea9-7ffdfb762ec0 459->460 461 7ffdfb762ec2-7ffdfb762ec6 460->461 462 7ffdfb762eea-7ffdfb762ef1 460->462 463 7ffdfb762ed0 461->463 464 7ffdfb762ec8-7ffdfb762ece 461->464 465 7ffdfb762ef3-7ffdfb762ef7 462->465 466 7ffdfb762f1b-7ffdfb762f23 462->466 469 7ffdfb762ed2-7ffdfb762ee6 call 7ffdfb765dd8 463->469 464->463 464->469 470 7ffdfb762f00-7ffdfb762f16 call 7ffdfb765dd8 465->470 471 7ffdfb762ef9-7ffdfb762efc 465->471 467 7ffdfb762f42-7ffdfb762f44 466->467 468 7ffdfb762f25-7ffdfb762f27 466->468 475 7ffdfb762f56 467->475 476 7ffdfb762f46-7ffdfb762f4c 467->476 473 7ffdfb762f29-7ffdfb762f2f 468->473 474 7ffdfb762f3b-7ffdfb762f40 468->474 469->462 470->466 471->470 478 7ffdfb762efe 471->478 473->474 480 7ffdfb762f31-7ffdfb762f35 473->480 481 7ffdfb762f5b-7ffdfb762f93 DrawThemeBackground 474->481 475->481 476->475 482 7ffdfb762f4e-7ffdfb762f54 476->482 478->470 480->474 484 7ffdfb762f37-7ffdfb762f39 480->484 485 7ffdfb7637bd-7ffdfb7637e9 ExcludeClipRect CloseThemeData 481->485 486 7ffdfb762f99-7ffdfb762fa4 481->486 482->475 482->481 484->481 485->449 487 7ffdfb7636e0-7ffdfb7636e6 486->487 488 7ffdfb762faa-7ffdfb762fad 486->488 487->485 490 7ffdfb7636ec-7ffdfb763735 call 7ffdfb765dd8 487->490 488->487 489 7ffdfb762fb3-7ffdfb762fb9 488->489 489->490 491 7ffdfb762fbf-7ffdfb763036 call 7ffdfb765dd8 * 2 call 7ffdfb7627d0 489->491 496 7ffdfb763743 490->496 497 7ffdfb763737-7ffdfb763741 490->497 505 7ffdfb7637b4 491->505 506 7ffdfb76303c-7ffdfb763055 491->506 499 7ffdfb763748-7ffdfb7637b2 call 7ffdfb765dd8 floorf DrawThemeBackground 496->499 497->496 497->499 499->485 509 7ffdfb7637b9 505->509 507 7ffdfb7631ad-7ffdfb7631b2 506->507 508 7ffdfb76305b-7ffdfb76305f 506->508 511 7ffdfb763328-7ffdfb76332f 507->511 512 7ffdfb7631b8-7ffdfb7631d1 507->512 508->507 510 7ffdfb763065-7ffdfb76307e 508->510 509->485 515 7ffdfb763080-7ffdfb763087 510->515 516 7ffdfb763089-7ffdfb76308c 510->516 513 7ffdfb763331-7ffdfb763333 511->513 514 7ffdfb76334b-7ffdfb76336a GetObjectW 511->514 517 7ffdfb7631d3-7ffdfb7631da 512->517 518 7ffdfb7631dc-7ffdfb7631df 512->518 519 7ffdfb76333e-7ffdfb763345 513->519 520 7ffdfb763335-7ffdfb76333c 513->520 514->505 521 7ffdfb763370-7ffdfb76338a call 7ffdfb761fa8 call 7ffdfb76204c 514->521 522 7ffdfb763090-7ffdfb763145 call 7ffdfb762288 call 7ffdfb765dd8 call 7ffdfb7624ac 515->522 516->522 523 7ffdfb7631e3-7ffdfb763250 call 7ffdfb762288 call 7ffdfb765dd8 517->523 518->523 519->514 525 7ffdfb763147 519->525 520->514 520->519 544 7ffdfb763390-7ffdfb7633b2 call 7ffdfb765dd8 521->544 545 7ffdfb763616 521->545 522->525 541 7ffdfb763252-7ffdfb76327c call 7ffdfb765dd8 523->541 542 7ffdfb76327e-7ffdfb763284 523->542 529 7ffdfb76314a-7ffdfb76314c 525->529 529->509 534 7ffdfb763152-7ffdfb763157 529->534 534->509 538 7ffdfb76315d-7ffdfb763198 call 7ffdfb765dd8 534->538 556 7ffdfb76319e-7ffdfb7631a8 538->556 557 7ffdfb763627-7ffdfb76362b 538->557 549 7ffdfb76328b-7ffdfb7632cc memset SHGetStockIconInfo 541->549 542->549 563 7ffdfb7633b4-7ffdfb7633b6 544->563 564 7ffdfb7633b8-7ffdfb7633d5 call 7ffdfb76234c 544->564 547 7ffdfb763619-7ffdfb763622 call 7ffdfb762018 545->547 547->557 554 7ffdfb76331e-7ffdfb763323 549->554 555 7ffdfb7632ce-7ffdfb763309 DrawIconEx 549->555 554->529 561 7ffdfb76330b-7ffdfb763312 555->561 562 7ffdfb763317-7ffdfb76331c call 7ffdfb747650 555->562 560 7ffdfb763631-7ffdfb7636db call 7ffdfb762288 call 7ffdfb765dd8 call 7ffdfb7624ac 556->560 557->560 560->509 561->534 562->554 563->564 567 7ffdfb76340c-7ffdfb763435 call 7ffdfb765dd8 563->567 564->567 573 7ffdfb7633d7-7ffdfb76340a MulDiv * 2 564->573 576 7ffdfb763442-7ffdfb7634dd GetThemeColor SelectObject GetObjectW 567->576 577 7ffdfb763437-7ffdfb76343f 567->577 573->567 579 7ffdfb76354e-7ffdfb76355e 576->579 580 7ffdfb7634df-7ffdfb7634eb 576->580 577->576 583 7ffdfb763560-7ffdfb7635b6 SetStretchBltMode StretchBlt 579->583 584 7ffdfb7635b8-7ffdfb7635e6 BitBlt 579->584 580->579 582 7ffdfb7634ed-7ffdfb7634f5 580->582 582->579 586 7ffdfb7634f7-7ffdfb763549 GdiAlphaBlend 582->586 587 7ffdfb7635eb 583->587 584->587 588 7ffdfb7635ed-7ffdfb7635ef 586->588 587->588 589 7ffdfb7635f1-7ffdfb7635f3 588->589 590 7ffdfb7635f5-7ffdfb7635fa call 7ffdfb747650 588->590 592 7ffdfb7635fc-7ffdfb763614 SelectObject 589->592 590->592 592->547
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: Theme$Object$Draw$BackgroundDataIconSelectStretch$AlphaBlendClipCloseColorCreateErrorExcludeFromInfoLastModeMonitorOpenPropRectSectionStockWindow_cwprintf_s_lfloorfmemset
                • String ID: $ $DarkMode_ImmersiveStart::Menu$ImmersiveStart::Menu$LightMode_ImmersiveStart::Menu
                • API String ID: 311497863-1355332715
                • Opcode ID: bd85be98e764268484eae91222140ba6597c2ebdafd77c3775143cfce6fa20c5
                • Instruction ID: d6f8474b6879088bd7d98c2e790d40df587f83a8ea220d150f0284d3a769a34b
                • Opcode Fuzzy Hash: bd85be98e764268484eae91222140ba6597c2ebdafd77c3775143cfce6fa20c5
                • Instruction Fuzzy Hash: 4E628F32B057828FE760CF29D494EAD7BA6FB48744F124135DE5997BA8DB38E941CB00

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 594 7ffdfb7289e0-7ffdfb728a2e 595 7ffdfb734914-7ffdfb73491b 594->595 596 7ffdfb728a34-7ffdfb728a4d 594->596 597 7ffdfb734923-7ffdfb734938 595->597 596->597 598 7ffdfb728a53-7ffdfb728a5a 596->598 601 7ffdfb734964 597->601 602 7ffdfb73493a-7ffdfb73495a 597->602 599 7ffdfb728a68-7ffdfb728aa1 GetCurrentThreadId GetTickCount 598->599 600 7ffdfb728a5c-7ffdfb728a62 598->600 603 7ffdfb7349c3-7ffdfb7349ec memset 599->603 604 7ffdfb728aa7-7ffdfb728aae 599->604 600->599 600->601 605 7ffdfb73496e-7ffdfb73497e GetLastError 601->605 602->601 606 7ffdfb7349f4-7ffdfb7349fb 603->606 607 7ffdfb728ae0-7ffdfb728ae7 604->607 608 7ffdfb728ab0-7ffdfb728ad6 LoadLibraryExW 604->608 609 7ffdfb734980-7ffdfb734983 605->609 610 7ffdfb734989-7ffdfb73498d 605->610 606->606 611 7ffdfb7349fd-7ffdfb734a09 606->611 613 7ffdfb728b63-7ffdfb728b85 GetTickCount 607->613 614 7ffdfb728ae9-7ffdfb728b44 memset wcstombs GetProcAddress 607->614 608->605 612 7ffdfb728adc 608->612 609->610 610->607 619 7ffdfb734a0b 611->619 620 7ffdfb734a19-7ffdfb734a3c call 7ffdfb72e6a4 611->620 612->607 617 7ffdfb728b87-7ffdfb728b9e FreeLibrary 613->617 618 7ffdfb728ba5-7ffdfb728baf 613->618 615 7ffdfb734992-7ffdfb7349a2 GetLastError 614->615 616 7ffdfb728b4a-7ffdfb728b5d 614->616 621 7ffdfb7349ad 615->621 622 7ffdfb7349a4-7ffdfb7349a7 615->622 616->613 634 7ffdfb7349b8-7ffdfb7349be 616->634 617->618 623 7ffdfb734b32-7ffdfb734b39 618->623 624 7ffdfb728bb5-7ffdfb728bda call 7ffdfb72e120 618->624 625 7ffdfb734a0e-7ffdfb734a15 619->625 632 7ffdfb734a3e-7ffdfb734a54 620->632 633 7ffdfb734a76 620->633 621->634 622->621 623->624 630 7ffdfb734b3f-7ffdfb734b5b 623->630 625->625 631 7ffdfb734a17 625->631 630->624 631->620 636 7ffdfb734a8e-7ffdfb734a9c wcscpy_s 632->636 637 7ffdfb734a56-7ffdfb734a74 swprintf_s 632->637 638 7ffdfb734a79-7ffdfb734a81 free 633->638 634->613 636->633 639 7ffdfb734a9e-7ffdfb734ae2 CreateProcessW 636->639 637->633 637->639 638->636 640 7ffdfb734b0e-7ffdfb734b1e GetLastError 639->640 641 7ffdfb734ae4-7ffdfb734b09 CloseHandle * 2 639->641 642 7ffdfb734b20-7ffdfb734b23 640->642 643 7ffdfb734b29-7ffdfb734b2d 640->643 641->638 642->643 643->638
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: CountLibraryTick$AddressCurrentFreeLoadProcThreadmemsetwcstombs
                • String ID: $%s %s$Shutdown$h
                • API String ID: 1596487305-3695048113
                • Opcode ID: cddab9cfd2f6982635d7e2dc380e06036a46acf3d830ec6df45b0b64d0823aaa
                • Instruction ID: c5e261c7fb764473ec288a96342571f2eca98ae909839658264b04308d915f3f
                • Opcode Fuzzy Hash: cddab9cfd2f6982635d7e2dc380e06036a46acf3d830ec6df45b0b64d0823aaa
                • Instruction Fuzzy Hash: B6B18032A0AB83CAEB248F65D4607B9B7A0FB49B54F184135CE5E577B8DF38D4858B10

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 644 7ffdfb7257d0-7ffdfb72582f 645 7ffdfb725851-7ffdfb725858 644->645 646 7ffdfb725831-7ffdfb725835 644->646 647 7ffdfb72585e-7ffdfb725865 645->647 648 7ffdfb73322a-7ffdfb733231 645->648 646->645 649 7ffdfb725837-7ffdfb72584a call 7ffdfb727fb0 646->649 652 7ffdfb725beb-7ffdfb725bee 647->652 653 7ffdfb72586b-7ffdfb725896 EnterCriticalSection 647->653 650 7ffdfb733233-7ffdfb733260 RegisterWindowMessageW call 7ffdfb74f8a0 648->650 651 7ffdfb733262-7ffdfb733265 call 7ffdfb750158 648->651 649->645 665 7ffdfb73326a-7ffdfb733275 650->665 651->665 660 7ffdfb725c0e-7ffdfb725c39 call 7ffdfb72e120 652->660 661 7ffdfb725bf0-7ffdfb725bf4 652->661 657 7ffdfb73327c 653->657 658 7ffdfb72589c-7ffdfb7258ab 653->658 663 7ffdfb733284 657->663 658->663 664 7ffdfb7258b1-7ffdfb7258d3 658->664 661->660 666 7ffdfb725bf6-7ffdfb725c09 call 7ffdfb723a90 661->666 674 7ffdfb73328c-7ffdfb7332a9 663->674 669 7ffdfb7258f0-7ffdfb725952 RegGetValueW 664->669 670 7ffdfb7258d5-7ffdfb7258d9 664->670 665->657 666->660 673 7ffdfb725958 669->673 669->674 670->669 672 7ffdfb7258db-7ffdfb7258eb call 7ffdfb727fb0 670->672 672->669 676 7ffdfb72595f-7ffdfb725969 673->676 677 7ffdfb7332af-7ffdfb7332b3 674->677 678 7ffdfb72598d-7ffdfb725990 674->678 676->678 681 7ffdfb72596b-7ffdfb72596f 676->681 677->676 682 7ffdfb7332b9-7ffdfb7332ce call 7ffdfb723a90 677->682 679 7ffdfb725992-7ffdfb725995 678->679 680 7ffdfb72599b-7ffdfb7259a3 678->680 679->680 684 7ffdfb7332d4-7ffdfb7332d7 679->684 685 7ffdfb7333de-7ffdfb7333e1 680->685 686 7ffdfb7259a9-7ffdfb7259b3 680->686 681->678 687 7ffdfb725971-7ffdfb725986 call 7ffdfb727fb0 681->687 682->684 684->680 689 7ffdfb7332dd-7ffdfb7332e5 684->689 692 7ffdfb73344e-7ffdfb733450 685->692 693 7ffdfb7333e3-7ffdfb7333ed 685->693 690 7ffdfb7259d0-7ffdfb7259e8 call 7ffdfb7278b0 686->690 691 7ffdfb7259b5-7ffdfb7259b9 686->691 687->678 696 7ffdfb73336b-7ffdfb73336f 689->696 697 7ffdfb7332eb-7ffdfb73330e CreateThreadpoolTimer 689->697 715 7ffdfb725a05-7ffdfb725a3b memset 690->715 716 7ffdfb7259ea-7ffdfb7259ee 690->716 691->690 698 7ffdfb7259bb-7ffdfb7259cb call 7ffdfb727fb0 691->698 692->686 695 7ffdfb733456-7ffdfb73345d 692->695 700 7ffdfb7333ef-7ffdfb7333f3 693->700 701 7ffdfb73340a-7ffdfb733449 SetThreadpoolTimer call 7ffdfb7278b0 call 7ffdfb74fb88 693->701 703 7ffdfb725bd1 695->703 710 7ffdfb733376-7ffdfb733378 696->710 704 7ffdfb733310-7ffdfb733320 GetLastError 697->704 705 7ffdfb73332d 697->705 698->690 700->701 708 7ffdfb7333f5-7ffdfb733405 call 7ffdfb727fb0 700->708 701->703 712 7ffdfb725bd5-7ffdfb725be4 LeaveCriticalSection 703->712 713 7ffdfb733331-7ffdfb733342 704->713 714 7ffdfb733322-7ffdfb73332b 704->714 705->713 708->701 711 7ffdfb73337e-7ffdfb733388 710->711 710->712 711->712 719 7ffdfb73338e-7ffdfb733391 711->719 712->652 713->710 720 7ffdfb733344-7ffdfb733348 713->720 714->713 722 7ffdfb725a3d-7ffdfb725a41 715->722 723 7ffdfb725a57-7ffdfb725a62 715->723 716->715 721 7ffdfb7259f0-7ffdfb725a00 call 7ffdfb727fb0 716->721 726 7ffdfb733393-7ffdfb733397 719->726 727 7ffdfb7333b5-7ffdfb7333d9 SetThreadpoolTimer 719->727 720->710 730 7ffdfb73334a-7ffdfb733369 call 7ffdfb723a90 720->730 721->715 722->723 732 7ffdfb725a43-7ffdfb725a52 call 7ffdfb727fb0 722->732 728 7ffdfb733462-7ffdfb733469 723->728 729 7ffdfb725a68-7ffdfb725a72 723->729 726->727 734 7ffdfb733399-7ffdfb7333ae call 7ffdfb727fb0 726->734 727->712 737 7ffdfb73349d-7ffdfb7334b0 call 7ffdfb72afb0 728->737 738 7ffdfb73346b-7ffdfb73347c 728->738 735 7ffdfb7334b5-7ffdfb7334c7 call 7ffdfb73926c 729->735 736 7ffdfb725a78-7ffdfb725a82 729->736 730->710 732->723 734->727 753 7ffdfb7334cd-7ffdfb7334d7 735->753 741 7ffdfb725a84-7ffdfb725a88 736->741 742 7ffdfb725aa7-7ffdfb725ab0 736->742 738->737 741->742 747 7ffdfb725a8a-7ffdfb725aa2 call 7ffdfb7288b0 741->747 748 7ffdfb725ab2-7ffdfb725ae2 memset GetIconInfoExW 742->748 749 7ffdfb725b18-7ffdfb725b41 Shell_NotifyIconW 742->749 747->742 748->753 754 7ffdfb725ae8-7ffdfb725af4 748->754 756 7ffdfb725b43-7ffdfb725b47 749->756 757 7ffdfb725b65-7ffdfb725b8b 749->757 753->749 762 7ffdfb7334dd-7ffdfb7334e1 753->762 760 7ffdfb725b02-7ffdfb725b0a 754->760 761 7ffdfb725af6-7ffdfb725afd DeleteObject 754->761 756->757 763 7ffdfb725b49-7ffdfb725b60 call 7ffdfb728090 756->763 758 7ffdfb725b91-7ffdfb725bb1 call 7ffdfb72b4c0 757->758 759 7ffdfb733511-7ffdfb733515 757->759 758->703 773 7ffdfb725bb3-7ffdfb725bb7 758->773 767 7ffdfb73357f 759->767 768 7ffdfb733517-7ffdfb73352e 759->768 760->749 769 7ffdfb725b0c-7ffdfb725b13 DeleteObject 760->769 761->760 762->749 764 7ffdfb7334e7-7ffdfb73350c call 7ffdfb747650 call 7ffdfb72128c 762->764 763->757 764->749 768->767 769->749 773->703 775 7ffdfb725bb9-7ffdfb725bcc call 7ffdfb723a90 773->775 775->703
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: CriticalDeleteIconMessageObjectSectionTracememset$EnterInfoLeaveNotifyShell_Value
                • String ID: AlwaysConnectedSysTrayExperience$PNITooltip$Software\Microsoft\Windows\CurrentVersion\Control Panel\Settings\Network$Unknown$WiredInternet
                • API String ID: 3642999708-152031034
                • Opcode ID: 97d760b099fc2e40497d2b4bdb385100085f900e05abea501b7e3064e67c9de0
                • Instruction ID: 841d9e5cc3d41aad668777d5ac10732866edb31762b42d61858dd38b3914b90f
                • Opcode Fuzzy Hash: 97d760b099fc2e40497d2b4bdb385100085f900e05abea501b7e3064e67c9de0
                • Instruction Fuzzy Hash: 2E129C21B0A78786EB608B11E460BB977A1FB85B48F644036DE2E476F8DF7CE545CB40

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 969 7ffdfb728bf0-7ffdfb728c2f 970 7ffdfb729040-7ffdfb729042 969->970 971 7ffdfb728c35-7ffdfb728c44 969->971 974 7ffdfb729012-7ffdfb72903e call 7ffdfb72e120 970->974 972 7ffdfb734b60-7ffdfb734b65 971->972 973 7ffdfb728c4a-7ffdfb728cd4 call 7ffdfb729ae0 call 7ffdfb729aa0 swprintf_s 971->973 972->974 981 7ffdfb734d19 973->981 982 7ffdfb728cda-7ffdfb728d0a RegOpenKeyExW 973->982 985 7ffdfb734d21-7ffdfb734d4a call 7ffdfb752a04 call 7ffdfb7526a4 free 981->985 982->981 983 7ffdfb728d10 982->983 984 7ffdfb728d13-7ffdfb728d53 RegEnumKeyExW 983->984 986 7ffdfb728dc7-7ffdfb728dcb 984->986 987 7ffdfb728d55-7ffdfb728d83 RegOpenKeyExW 984->987 999 7ffdfb734d4c 985->999 986->984 990 7ffdfb728dd1-7ffdfb728de5 RegCloseKey 986->990 987->986 989 7ffdfb728d85-7ffdfb728dbf call 7ffdfb729140 RegCloseKey 987->989 989->986 990->981 993 7ffdfb728deb-7ffdfb728dfe 990->993 996 7ffdfb728e01 call 7ffdfb72dad0 993->996 998 7ffdfb728e06-7ffdfb728e0c 996->998 1000 7ffdfb734d0e 998->1000 1001 7ffdfb728e12 998->1001 999->999 1000->981 1002 7ffdfb728e15-7ffdfb728e18 1001->1002 1003 7ffdfb728e31 1002->1003 1004 7ffdfb728e1a-7ffdfb728e2f 1002->1004 1005 7ffdfb728e34-7ffdfb728e42 1003->1005 1004->1002 1006 7ffdfb728f97-7ffdfb728fac 1005->1006 1007 7ffdfb728e48-7ffdfb728e7c 1005->1007 1006->985 1009 7ffdfb728fb2-7ffdfb728ff4 free 1006->1009 1008 7ffdfb728e80-7ffdfb728e88 1007->1008 1008->1008 1010 7ffdfb728e8a-7ffdfb728e8d 1008->1010 1011 7ffdfb729006-7ffdfb72900f free 1009->1011 1012 7ffdfb728ff6-7ffdfb729004 free 1009->1012 1013 7ffdfb728e93-7ffdfb728e96 1010->1013 1014 7ffdfb734b6a-7ffdfb734b78 call 7ffdfb72db30 1010->1014 1011->974 1012->1011 1012->1012 1016 7ffdfb734b85-7ffdfb734b88 1013->1016 1017 7ffdfb728e9c-7ffdfb728ebf call 7ffdfb729060 1013->1017 1014->1016 1019 7ffdfb734b8e-7ffdfb734baf 1016->1019 1020 7ffdfb728ec1-7ffdfb728ec5 1016->1020 1017->1020 1027 7ffdfb728f24-7ffdfb728f2d 1017->1027 1023 7ffdfb728f14-7ffdfb728f1c 1019->1023 1025 7ffdfb734bb4 1020->1025 1026 7ffdfb728ecb-7ffdfb728f01 memcpy_s 1020->1026 1023->1027 1028 7ffdfb734bc1 1025->1028 1026->1028 1029 7ffdfb728f07-7ffdfb728f0f 1026->1029 1030 7ffdfb728f35-7ffdfb728f39 1027->1030 1031 7ffdfb734bce-7ffdfb734bf5 1028->1031 1029->1023 1030->1031 1032 7ffdfb728f3f-7ffdfb728f44 1030->1032 1033 7ffdfb734bf7 1031->1033 1034 7ffdfb734bfa-7ffdfb734bfd 1031->1034 1035 7ffdfb734c5d-7ffdfb734c6a 1032->1035 1036 7ffdfb728f4a 1032->1036 1033->1034 1039 7ffdfb734bff 1034->1039 1040 7ffdfb734c17-7ffdfb734c1a 1034->1040 1037 7ffdfb734c6f-7ffdfb734c8c 1035->1037 1038 7ffdfb734c6c 1035->1038 1041 7ffdfb728f4d 1036->1041 1042 7ffdfb734c8e 1037->1042 1043 7ffdfb734ca5-7ffdfb734cab 1037->1043 1038->1037 1044 7ffdfb734c02-7ffdfb734c0b 1039->1044 1045 7ffdfb734c36-7ffdfb734c3c 1040->1045 1046 7ffdfb734c1c-7ffdfb734c22 1040->1046 1047 7ffdfb728f52-7ffdfb728f56 1041->1047 1051 7ffdfb734c91-7ffdfb734c99 1042->1051 1052 7ffdfb734cad-7ffdfb734cb1 1043->1052 1053 7ffdfb734cc7-7ffdfb734ccd 1043->1053 1054 7ffdfb734c0d-7ffdfb734c15 1044->1054 1055 7ffdfb734c24-7ffdfb734c34 1044->1055 1050 7ffdfb734c40-7ffdfb734c47 1045->1050 1046->1050 1048 7ffdfb728f60-7ffdfb728f82 1047->1048 1049 7ffdfb728f58-7ffdfb728f5b free 1047->1049 1056 7ffdfb734ce0-7ffdfb734ce9 1048->1056 1057 7ffdfb728f88-7ffdfb728f92 1048->1057 1049->1048 1058 7ffdfb734c52-7ffdfb734c58 1050->1058 1059 7ffdfb734c49-7ffdfb734c4d 1050->1059 1060 7ffdfb734cb3-7ffdfb734cc5 1051->1060 1061 7ffdfb734c9b-7ffdfb734ca3 1051->1061 1062 7ffdfb734cd0-7ffdfb734cd5 1052->1062 1053->1062 1054->1040 1054->1044 1055->1050 1063 7ffdfb734cee-7ffdfb734d02 call 7ffdfb7528d4 1056->1063 1064 7ffdfb734ceb 1056->1064 1057->1005 1058->1030 1059->1030 1060->1062 1061->1043 1061->1051 1062->1041 1065 7ffdfb734cdb 1062->1065 1063->1000 1064->1063 1065->1047
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: free$CloseOpen$Enummemcpy_sswprintf_s
                • String ID: %s\%s$($SYSTEM\CurrentControlSet\Control\Network\LightweightCallHandlers$Shutdown
                • API String ID: 3091033584-2580956259
                • Opcode ID: 1821c573a3ce5f64da93654990f9858465f1dcc108f3a47cf7a1210f3d71e64f
                • Instruction ID: 62ea5170a973a9d1341529a3c2464d5af35fc411dbdd54904dc3df6c5af74567
                • Opcode Fuzzy Hash: 1821c573a3ce5f64da93654990f9858465f1dcc108f3a47cf7a1210f3d71e64f
                • Instruction Fuzzy Hash: 5EF1813270AB8285EB648B16E460BAAB761FB84B94F544135DEAD43BF8DF7CD444CB00

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 1155 7ffdfb729b20-7ffdfb729b79 1156 7ffdfb729b7f-7ffdfb729bac 1155->1156 1157 7ffdfb7352f4 1155->1157 1158 7ffdfb7352fd-7ffdfb7352ff 1156->1158 1159 7ffdfb729bb2-7ffdfb729bc4 1156->1159 1157->1158 1160 7ffdfb735305-7ffdfb735324 call 7ffdfb74e2b8 1158->1160 1161 7ffdfb729e8a-7ffdfb729eb7 1158->1161 1162 7ffdfb73532f-7ffdfb73533f call 7ffdfb729f00 1159->1162 1163 7ffdfb729bca-7ffdfb729bf5 1159->1163 1176 7ffdfb729edc-7ffdfb729ee0 1160->1176 1177 7ffdfb73532a 1160->1177 1167 7ffdfb729ee2-7ffdfb729ee6 1161->1167 1168 7ffdfb729eb9-7ffdfb729ebe 1161->1168 1171 7ffdfb735347-7ffdfb73535a GetModuleHandleW 1162->1171 1164 7ffdfb729c31-7ffdfb729c44 1163->1164 1165 7ffdfb729bf7-7ffdfb729c01 1163->1165 1182 7ffdfb735366-7ffdfb7353aa 1164->1182 1183 7ffdfb729c4a-7ffdfb729c4f 1164->1183 1165->1171 1172 7ffdfb729c07-7ffdfb729c27 GetProcAddress 1165->1172 1167->1168 1174 7ffdfb729ec0-7ffdfb729eda call 7ffdfb72e120 1168->1174 1175 7ffdfb729ee8-7ffdfb729eeb 1168->1175 1171->1182 1178 7ffdfb729c2d 1172->1178 1179 7ffdfb7353b8 1172->1179 1175->1174 1176->1161 1177->1161 1178->1164 1187 7ffdfb7353bf-7ffdfb7353c3 1179->1187 1182->1179 1185 7ffdfb729c55-7ffdfb729c5a 1183->1185 1186 7ffdfb7353ac-7ffdfb7353b4 1183->1186 1185->1179 1188 7ffdfb729c60-7ffdfb729c69 1185->1188 1186->1179 1189 7ffdfb7353c6-7ffdfb7353d8 call 7ffdfb74e730 1187->1189 1190 7ffdfb729c6f-7ffdfb729c85 call 7ffdfb72a3f0 1188->1190 1191 7ffdfb735445-7ffdfb735448 1188->1191 1195 7ffdfb735406-7ffdfb735410 1189->1195 1196 7ffdfb7353da-7ffdfb7353de 1189->1196 1202 7ffdfb729c87-7ffdfb729cb2 call 7ffdfb72a370 1190->1202 1203 7ffdfb729cd8-7ffdfb729cef 1190->1203 1198 7ffdfb735450-7ffdfb735470 GetProcessHeap HeapFree 1191->1198 1195->1189 1201 7ffdfb735412 1195->1201 1199 7ffdfb7353e4 1196->1199 1200 7ffdfb729cc1-7ffdfb729cc6 1196->1200 1210 7ffdfb735476 1198->1210 1204 7ffdfb7353e6-7ffdfb7353e9 1199->1204 1205 7ffdfb735417-7ffdfb73543c GetProcessHeap HeapFree 1200->1205 1206 7ffdfb729ccc-7ffdfb729cd2 1200->1206 1201->1205 1202->1187 1218 7ffdfb729cb8-7ffdfb729cbd 1202->1218 1207 7ffdfb729e7d-7ffdfb729e88 1203->1207 1208 7ffdfb729cf5-7ffdfb729cf7 1203->1208 1211 7ffdfb7353eb-7ffdfb7353f8 1204->1211 1212 7ffdfb7353fa-7ffdfb7353ff 1204->1212 1205->1191 1206->1191 1206->1203 1207->1161 1207->1176 1208->1207 1213 7ffdfb729cfd-7ffdfb729d04 1208->1213 1215 7ffdfb73547e 1210->1215 1211->1195 1211->1212 1212->1204 1216 7ffdfb735401 1212->1216 1213->1207 1217 7ffdfb729d0a-7ffdfb729d26 AcquireSRWLockExclusive 1213->1217 1216->1200 1217->1215 1220 7ffdfb729d2c-7ffdfb729d2f 1217->1220 1218->1200 1219 7ffdfb729cbf 1218->1219 1219->1200 1220->1215 1221 7ffdfb729d35-7ffdfb729d67 1220->1221 1222 7ffdfb729d6d-7ffdfb729d80 1221->1222 1223 7ffdfb729e3c-7ffdfb729e3f 1221->1223 1222->1223 1225 7ffdfb729d86-7ffdfb729db8 GetProcessHeap HeapAlloc 1222->1225 1223->1210 1224 7ffdfb729e45-7ffdfb729e78 memcpy_s ReleaseSRWLockExclusive 1223->1224 1224->1207 1226 7ffdfb729dd9-7ffdfb729ddc 1225->1226 1227 7ffdfb729dba-7ffdfb729dcc GetProcessHeap 1225->1227 1226->1215 1228 7ffdfb729de2-7ffdfb729e19 memcpy_s 1226->1228 1227->1226 1228->1198 1229 7ffdfb729e1f-7ffdfb729e35 1228->1229 1229->1223
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: Heap$Process$ExclusiveLockmemcpy_s$AcquireAddressAllocFreeHandleModuleProcRelease
                • String ID: RtlQueryFeatureConfiguration$ntdll.dll
                • API String ID: 2568385249-4111156962
                • Opcode ID: 9eadd721f4a1d6e8bbc2233d7c4336f87c2fabc0a7d0cce8f37da03d273523d6
                • Instruction ID: 38dcfccd0b7aff9170f4754a90bb9d9ac751439abcdf793a31a609aac366f31d
                • Opcode Fuzzy Hash: 9eadd721f4a1d6e8bbc2233d7c4336f87c2fabc0a7d0cce8f37da03d273523d6
                • Instruction Fuzzy Hash: 1AE19136B1AB438AE7548B25E460A7977A1FB49B84F684135CE6E437F8DF7CE4408B40
                APIs
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: CriticalSection$Leave$CompareEnterFileProcessStateTime$ChangeCurrentDataErrorLastNotificationQuerySessionSubscribememset
                • String ID:
                • API String ID: 3793839815-0
                • Opcode ID: 54aba9d84cf8b700c9a0912d01b800fdcdf0dd5c1b5fa80f9c78c7c2414ea6d8
                • Instruction ID: da2c08823564538e73fadef3e619ec09f173aa1a022e2d309c569090e8f66c9b
                • Opcode Fuzzy Hash: 54aba9d84cf8b700c9a0912d01b800fdcdf0dd5c1b5fa80f9c78c7c2414ea6d8
                • Instruction Fuzzy Hash: 2E815E32B0DB8286E7108F25E86097AB7A4FB49B90F594135DEAD437B8DF38E491C700
                APIs
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: Object$Select$Create$ErrorFontLastmemset$AlphaBlendCompatibleDeleteIndirectInfoParametersSectionSystemTheme
                • String ID:
                • API String ID: 4123986876-0
                • Opcode ID: d6b4fa5c4776e3af7d46fb049869b00cc0677fa2d8b3738f13a4da4d77841f00
                • Instruction ID: 848571a577ba263310cabfce216647e858d8456e5c78cefa947aa8d9cd6ebad4
                • Opcode Fuzzy Hash: d6b4fa5c4776e3af7d46fb049869b00cc0677fa2d8b3738f13a4da4d77841f00
                • Instruction Fuzzy Hash: 18F17A32A05B828EE760DF65E8506ED7BB1FB88788F104125EE5D57BA8EF38D545CB00
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: Info$memset$ItemMenu$Message$CurrentCurrent_exceptionExtraInputParametersSourceSystemstd::exception_ptr::_
                • String ID: P
                • API String ID: 590821465-3110715001
                • Opcode ID: f8da3831e86d89e548f43d196414c204323a877b5fb10db37e27bea6c462af61
                • Instruction ID: e19f01c1e2b469d26c332aed6e28f9b830d095877728521b8d959b945db3a917
                • Opcode Fuzzy Hash: f8da3831e86d89e548f43d196414c204323a877b5fb10db37e27bea6c462af61
                • Instruction Fuzzy Hash: 2EB1BF32B097838EF7118B66E461BAA7BA2FB45788F104135DE5957AF8DF3CE4458B00
                APIs
                • memset.MSVCRT ref: 00007FFDFB72A426
                • GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(?,?,?,?,?,?,?,?,00000000,?,00000000,?,?,00007FFDFB74E516), ref: 00007FFDFB7356DB
                • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,?,?,?,?,?,00000000,?,00000000,?,?,00007FFDFB74E516), ref: 00007FFDFB735733
                • HeapFree.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,?,?,?,?,?,00000000,?,00000000,?,?,00007FFDFB74E516), ref: 00007FFDFB735747
                • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,?,?,?,?,?,00000000,?,00000000,?,?,00007FFDFB74E516), ref: 00007FFDFB735753
                • HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,?,?,?,?,?,00000000,?,00000000,?,?,00007FFDFB74E516), ref: 00007FFDFB735767
                • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,?,?,?,?,?,00000000,?,00000000,?,?,00007FFDFB74E516), ref: 00007FFDFB7357C0
                • HeapFree.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,?,?,?,?,?,00000000,?,00000000,?,?,00007FFDFB74E516), ref: 00007FFDFB7357D4
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: Heap$Process$Free$AddressAllocProcmemset
                • String ID: NtQueryWnfStateData
                • API String ID: 2515388404-3685890079
                • Opcode ID: eb924088731ec31bdfab8afe444fd1265f1e1db68a0cf88f63bbfff1f2c27592
                • Instruction ID: e8252850e761201e56c99bb53042e4136e3be08753f73fcab3f61c631c818639
                • Opcode Fuzzy Hash: eb924088731ec31bdfab8afe444fd1265f1e1db68a0cf88f63bbfff1f2c27592
                • Instruction Fuzzy Hash: 60916F32B0AB92CAEB148F16E414979B7A1FB89B44F584135DA5D477B8EF3CE494CB00
                APIs
                Strings
                • IsolationAware function called after IsolationAwareCleanup, xrefs: 00007FFDFB731104
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: ErrorLast$ActivateClassDeactivateDebugInfoOutputString
                • String ID: IsolationAware function called after IsolationAwareCleanup
                • API String ID: 2706167345-2690750368
                • Opcode ID: 47e8a5f8e73670736668a9d19069b748d7b85cc41c4f92acc9e04f231f677fa1
                • Instruction ID: e6275241a6816113aa7465f288ff25510f630a71b675a860a3d43484fe695067
                • Opcode Fuzzy Hash: 47e8a5f8e73670736668a9d19069b748d7b85cc41c4f92acc9e04f231f677fa1
                • Instruction Fuzzy Hash: 3B411D31F0A74386E7604B15E9A0979BBA1FB49751F694135DD2D93BF8CF7CE4808A00
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: CreateInstance
                • String ID: Mini flyout$Windows.Internal.ShellExperience.NetworkFlyout$net\config\shell\pnidui\maindlg.cpp
                • API String ID: 542301482-1764596035
                • Opcode ID: 1b33cd7405e2b11ba94190f76a4cd7e79f3009f344b0c478b26fafbbd8c23073
                • Instruction ID: 722f52ab031183050cf4d3644608d0d972438ca015f8a1f08ff42275022ce2cf
                • Opcode Fuzzy Hash: 1b33cd7405e2b11ba94190f76a4cd7e79f3009f344b0c478b26fafbbd8c23073
                • Instruction Fuzzy Hash: CD813722B1AB47DAE7109B71C460AEC3361EB98798F505132DA1DA7AF9DF38E6458340
                APIs
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: Statefree$ChangeDataNotificationQuerySubscribememcmp
                • String ID:
                • API String ID: 2518213733-0
                • Opcode ID: 6c584bae5547c31eaee2981ffa29603ac82593797c92365baf2ecb6045d0d418
                • Instruction ID: 12d831a2543544461f569eaebc2a7e70909e65a487c17142a1165a7a7314ae53
                • Opcode Fuzzy Hash: 6c584bae5547c31eaee2981ffa29603ac82593797c92365baf2ecb6045d0d418
                • Instruction Fuzzy Hash: D7411E3270D75286E7208F15E5A0A6EB7B0FB89790F540135EAAD87AB8DF3DD446CB00
                APIs
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: DataQueryStateTask$AllocFreeMessageTrace
                • String ID:
                • API String ID: 2005818475-0
                • Opcode ID: ede1aeb6b9f955d287ea206b41c2cc623a879cb36881d0e24e93f7e53bbcc61f
                • Instruction ID: 9017115ae0d0b6952ca850d6d2288367620c32fa12ba1bd01c96b1e3a6e339e2
                • Opcode Fuzzy Hash: ede1aeb6b9f955d287ea206b41c2cc623a879cb36881d0e24e93f7e53bbcc61f
                • Instruction Fuzzy Hash: F8314736B0AB42CAEB10CB59E464AB977A1FB88790F954132DA2E027F8DF7CD545C700
                APIs
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: InformationQueryToken
                • String ID:
                • API String ID: 4239771691-0
                • Opcode ID: faae0401d9443d0c76534477f59804ba8cb4911881e75e9365e53b36610346e3
                • Instruction ID: ed1cfc68844ca233746f48f431a1b1bc87b4d9b55ff8825da507968d04a4e0b9
                • Opcode Fuzzy Hash: faae0401d9443d0c76534477f59804ba8cb4911881e75e9365e53b36610346e3
                • Instruction Fuzzy Hash: 2E115EB2718781CBE7118F01E5047EABBA5FB85795F444131DB5802AB8DBBDE58ACB00
                APIs
                • CoCreateInstance.API-MS-WIN-CORE-COM-L1-1-0 ref: 00007FFDFB761B14
                  • Part of subcall function 00007FFDFB727FB0: TraceMessage.API-MS-WIN-EVENTING-CLASSICPROVIDER-L1-1-0 ref: 00007FFDFB727FC6
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: CreateInstanceMessageTrace
                • String ID:
                • API String ID: 365332588-0
                • Opcode ID: 542587e3073d0c31f9aaa796474cbfe02f54dcdd9c170d5d3d73bd1c2d639fcb
                • Instruction ID: 0daaa00dbefb2c6e4303c043086d7a31a5565de8e094f79a093317e91abf4165
                • Opcode Fuzzy Hash: 542587e3073d0c31f9aaa796474cbfe02f54dcdd9c170d5d3d73bd1c2d639fcb
                • Instruction Fuzzy Hash: 94317C31B0AB4B89EB048B05E4689753362FB84B48F245032DA6D53BF9DF7CE552C740
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 92b41f523dc380b077e2db15d3befdeac64ee7f7aec847d33dda1614c678935f
                • Instruction ID: 1405b9b32ad2c6c5dcc8e832f9a6391486902541ec7fdeadde7ddc33ab3d3671
                • Opcode Fuzzy Hash: 92b41f523dc380b077e2db15d3befdeac64ee7f7aec847d33dda1614c678935f
                • Instruction Fuzzy Hash: D5E1A122B2AB4381EFA18A258468A7933A1FB50B94F524535DA6F877F8DF3CD457C300
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 3c69e859d44743b681e04d816f4578077f26d6f494cfe6cc2904fee74d4fe367
                • Instruction ID: 9d15104078423b8e52ca7324d0d36faab812f7973d963f754a175bc0f4778856
                • Opcode Fuzzy Hash: 3c69e859d44743b681e04d816f4578077f26d6f494cfe6cc2904fee74d4fe367
                • Instruction Fuzzy Hash: 0E51C373B1974286E7608F18E010A2D77A5FB59758F284235DA6D47AF8DB3DE881CB00

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 336 7ffdfb726973-7ffdfb7269ab 338 7ffdfb733ece-7ffdfb733ed8 336->338 339 7ffdfb7269b1-7ffdfb7269b4 336->339 340 7ffdfb733ef6 338->340 341 7ffdfb733eda-7ffdfb733edf 338->341 339->338 342 7ffdfb7269ba-7ffdfb7269d8 339->342 345 7ffdfb733f02-7ffdfb733f09 340->345 341->340 343 7ffdfb733ee1-7ffdfb733ef1 call 7ffdfb723d80 341->343 347 7ffdfb7269de-7ffdfb7269e9 342->347 348 7ffdfb726af0-7ffdfb726af7 342->348 343->340 351 7ffdfb7269ec-7ffdfb7269f3 347->351 349 7ffdfb726b0a-7ffdfb726b2d LeaveCriticalSection 348->349 350 7ffdfb726af9-7ffdfb726b00 348->350 352 7ffdfb726b33-7ffdfb726b36 349->352 353 7ffdfb726c36-7ffdfb726c44 349->353 350->349 354 7ffdfb733e5f-7ffdfb733e71 351->354 355 7ffdfb7269f9-7ffdfb726a19 351->355 352->345 357 7ffdfb726b3c-7ffdfb726b4d LeaveCriticalSection 352->357 353->352 356 7ffdfb726c4a 353->356 371 7ffdfb733e77-7ffdfb733e7a 354->371 362 7ffdfb726ae0-7ffdfb726aea 355->362 363 7ffdfb726a1f-7ffdfb726a23 355->363 356->345 360 7ffdfb726b4f-7ffdfb726b54 357->360 361 7ffdfb726b7b-7ffdfb726bc7 RegGetValueW 357->361 360->361 364 7ffdfb726b56-7ffdfb726b75 PostMessageW 360->364 365 7ffdfb726bcd-7ffdfb726bd2 361->365 366 7ffdfb733f59-7ffdfb733f9f GetNamedSecurityInfoW 361->366 362->348 369 7ffdfb733eb6-7ffdfb733ec9 362->369 363->362 370 7ffdfb726a29-7ffdfb726a4b 363->370 364->361 372 7ffdfb733f0e-7ffdfb733f18 364->372 365->366 373 7ffdfb726bd8-7ffdfb726be2 365->373 367 7ffdfb733fa1-7ffdfb733fbd call 7ffdfb747720 366->367 368 7ffdfb733fc8-7ffdfb733fe7 ConvertStringSidToSidW 366->368 367->373 395 7ffdfb733fc3 367->395 375 7ffdfb733fe9-7ffdfb734009 call 7ffdfb738ca4 368->375 376 7ffdfb73402a-7ffdfb734049 ConvertStringSidToSidW 368->376 369->348 398 7ffdfb726a4d-7ffdfb726a53 370->398 399 7ffdfb726ab6-7ffdfb726abe 370->399 377 7ffdfb733e9b-7ffdfb733ea6 call 7ffdfb73e638 371->377 378 7ffdfb733e7c-7ffdfb733e81 371->378 372->361 379 7ffdfb733f1e-7ffdfb733f22 372->379 380 7ffdfb726c02-7ffdfb726c34 call 7ffdfb72e120 373->380 381 7ffdfb726be4-7ffdfb726be8 373->381 409 7ffdfb734017-7ffdfb73401f 375->409 410 7ffdfb73400b-7ffdfb734012 LocalFree 375->410 389 7ffdfb734085-7ffdfb734119 memset SetEntriesInAclW 376->389 390 7ffdfb73404b-7ffdfb73406b call 7ffdfb738ca4 376->390 377->399 405 7ffdfb733eac-7ffdfb733eb1 377->405 387 7ffdfb733e83-7ffdfb733e8b 378->387 388 7ffdfb733e91-7ffdfb733e96 378->388 379->361 391 7ffdfb733f28-7ffdfb733f54 GetLastError call 7ffdfb723a90 379->391 381->380 393 7ffdfb726bea-7ffdfb726bfd call 7ffdfb723a90 381->393 387->388 387->399 388->399 396 7ffdfb734157-7ffdfb73418a SetNamedSecurityInfoW 389->396 397 7ffdfb73411b-7ffdfb734136 call 7ffdfb747720 389->397 416 7ffdfb73406d-7ffdfb734074 LocalFree 390->416 417 7ffdfb734079-7ffdfb734081 390->417 391->361 393->380 406 7ffdfb734274-7ffdfb734281 LocalFree 395->406 411 7ffdfb7341b2-7ffdfb7341fc RegSetKeyValueW 396->411 412 7ffdfb73418c-7ffdfb734191 396->412 427 7ffdfb734144-7ffdfb73414c 397->427 428 7ffdfb734138-7ffdfb73413f LocalFree 397->428 398->399 408 7ffdfb726a55-7ffdfb726a6b 398->408 399->351 413 7ffdfb726ac4-7ffdfb726adb 399->413 405->399 406->373 408->399 435 7ffdfb726a6d-7ffdfb726a86 ConvertInterfaceGuidToLuid 408->435 409->373 421 7ffdfb734025 409->421 410->409 418 7ffdfb7341fe-7ffdfb734208 411->418 419 7ffdfb734193 411->419 422 7ffdfb734198-7ffdfb7341ae call 7ffdfb747720 412->422 413->351 416->417 417->409 424 7ffdfb734083 417->424 425 7ffdfb734225-7ffdfb73422c 418->425 426 7ffdfb73420a-7ffdfb73420e 418->426 419->422 421->406 422->427 437 7ffdfb7341b0 422->437 424->410 432 7ffdfb73422e-7ffdfb734235 LocalFree 425->432 433 7ffdfb73423a-7ffdfb734242 425->433 426->425 431 7ffdfb734210-7ffdfb734220 call 7ffdfb727fb0 426->431 427->417 434 7ffdfb734152 427->434 428->427 431->425 432->433 439 7ffdfb734250-7ffdfb734258 433->439 440 7ffdfb734244-7ffdfb73424b LocalFree 433->440 434->416 435->399 441 7ffdfb726a88-7ffdfb726aa0 GetIfEntry2Ex 435->441 437->428 442 7ffdfb734266-7ffdfb73426e 439->442 443 7ffdfb73425a-7ffdfb734261 LocalFree 439->443 440->439 441->399 444 7ffdfb726aa2-7ffdfb726aab 441->444 442->373 442->406 443->442 444->371 445 7ffdfb726ab1 444->445 445->399
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: CriticalLeaveSection$ConvertEntry2GuidInterfaceLuidMessagePostValue
                • String ID: CURRENT_USER\Software\Microsoft\WcmSvc\Tethering\Roaming$PermissionsSet$S-1-15-2-1$S-1-5-80-4155767994-3874329934-3800885181-2130851812-726865888$Software\Microsoft\WcmSvc\Tethering\Roaming$net\config\shell\pnidui\maindlg.cpp
                • API String ID: 3710969772-2926663214
                • Opcode ID: d11be66b471c78f685c9be8827b8848e9e1325b36996bfcb5013c487c65cfe1b
                • Instruction ID: 17253e89d84e977da2eb4239e4f45475fd655fde6ba063bbd2457389953e5966
                • Opcode Fuzzy Hash: d11be66b471c78f685c9be8827b8848e9e1325b36996bfcb5013c487c65cfe1b
                • Instruction Fuzzy Hash: C4122A32B0AB438AEB148F55E8606B97BA1FB85B44F544136DA6D47AF8DF3CE444CB40

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 778 7ffdfb763824-7ffdfb763879 call 7ffdfb7646a8 781 7ffdfb76387f-7ffdfb763882 778->781 782 7ffdfb763c25-7ffdfb763c50 call 7ffdfb72e120 778->782 784 7ffdfb763884-7ffdfb76388b 781->784 785 7ffdfb76388d-7ffdfb76389f 781->785 786 7ffdfb7638a3-7ffdfb7638bc OpenThemeData 784->786 785->786 786->782 788 7ffdfb7638c2-7ffdfb7638dd MonitorFromWindow 786->788 789 7ffdfb7638e3-7ffdfb7638eb 788->789 790 7ffdfb763c16-7ffdfb763c20 CloseThemeData 788->790 791 7ffdfb7638ed-7ffdfb7638f1 789->791 792 7ffdfb76391c-7ffdfb763937 FindWindowW 789->792 790->782 793 7ffdfb7638f3-7ffdfb7638fc 791->793 794 7ffdfb7638fe 791->794 795 7ffdfb76393d-7ffdfb763956 GetWindowLongW 792->795 796 7ffdfb763bb7-7ffdfb763bc2 792->796 793->794 799 7ffdfb763903-7ffdfb763917 call 7ffdfb765dd8 793->799 794->799 800 7ffdfb76397a-7ffdfb763993 call 7ffdfb761f68 795->800 801 7ffdfb763958-7ffdfb76395f 795->801 797 7ffdfb763bc4-7ffdfb763bc9 796->797 798 7ffdfb763bec-7ffdfb763bef 796->798 802 7ffdfb763bd2 797->802 803 7ffdfb763bcb-7ffdfb763bd0 797->803 798->790 805 7ffdfb763bf1-7ffdfb763bf6 798->805 799->790 813 7ffdfb763bae-7ffdfb763bb2 call 7ffdfb761fe4 800->813 814 7ffdfb763999-7ffdfb7639cb memset SystemParametersInfoW 800->814 801->800 806 7ffdfb763961-7ffdfb763975 SetWindowLongW 801->806 808 7ffdfb763bd4-7ffdfb763be8 call 7ffdfb765dd8 802->808 803->802 803->808 810 7ffdfb763bfc 805->810 811 7ffdfb763bf8-7ffdfb763bfa 805->811 806->800 808->798 816 7ffdfb763bff-7ffdfb763c12 call 7ffdfb765dd8 810->816 811->810 811->816 813->796 817 7ffdfb7639cd-7ffdfb7639d6 call 7ffdfb747650 814->817 818 7ffdfb7639dc-7ffdfb763a07 GetThemeFont 814->818 816->790 817->813 817->818 823 7ffdfb763a24-7ffdfb763a6e 818->823 824 7ffdfb763a09-7ffdfb763a11 818->824 829 7ffdfb763a71-7ffdfb763a87 CreateFontIndirectW 823->829 827 7ffdfb763a13-7ffdfb763a16 824->827 828 7ffdfb763a1a-7ffdfb763a1d 824->828 827->829 830 7ffdfb763a18 827->830 828->829 831 7ffdfb763a1f-7ffdfb763a22 828->831 832 7ffdfb763a93-7ffdfb763b33 SelectObject call 7ffdfb749d50 call 7ffdfb765b74 SelectObject DeleteObject 829->832 833 7ffdfb763a89-7ffdfb763a8e 829->833 830->831 831->829 838 7ffdfb763ba9 832->838 839 7ffdfb763b35-7ffdfb763b6d call 7ffdfb765dd8 832->839 833->813 838->813 842 7ffdfb763b6f-7ffdfb763b74 839->842 843 7ffdfb763b76-7ffdfb763b7b 839->843 844 7ffdfb763b93-7ffdfb763ba5 call 7ffdfb765dd8 842->844 845 7ffdfb763b7d-7ffdfb763b85 843->845 846 7ffdfb763b87 843->846 844->838 847 7ffdfb763b8f 845->847 846->847 847->844
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: Window$ObjectTheme$DataFontLongSelect$CloseCreateDeleteFindFromIndirectInfoMonitorOpenParametersPropSystem_cwprintf_s_lmemset
                • String ID: #32768$$$DarkMode_ImmersiveStart::Menu$ImmersiveStart::Menu$LightMode_ImmersiveStart::Menu
                • API String ID: 320213981-2515996717
                • Opcode ID: b6d46d4ac7be8e67b2bc46c7c377a0d7ba41b60ba344a62f05c333e7a58d3083
                • Instruction ID: 7b64938ccb39a4b21893c6e62ca8bc9983d88df36c40e0a08ae5e68d9d8d1e1e
                • Opcode Fuzzy Hash: b6d46d4ac7be8e67b2bc46c7c377a0d7ba41b60ba344a62f05c333e7a58d3083
                • Instruction Fuzzy Hash: E7C19C32B0A7828EE711CB29E864AA97BA2FB49748F055135DE1D577F9DF38E444C700

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 850 7ffdfb725530-7ffdfb725566 851 7ffdfb725586-7ffdfb72559b 850->851 852 7ffdfb725568-7ffdfb72556c 850->852 853 7ffdfb7255a1-7ffdfb7255b9 lstrlenW 851->853 854 7ffdfb732f68 851->854 852->851 855 7ffdfb72556e-7ffdfb725581 call 7ffdfb723640 852->855 857 7ffdfb7255c1-7ffdfb7255cb 853->857 858 7ffdfb7255bb-7ffdfb7255bf 853->858 860 7ffdfb732f70-7ffdfb732f7c 854->860 855->851 857->860 861 7ffdfb7255d1-7ffdfb7255e4 call 7ffdfb728780 857->861 858->857 859 7ffdfb7255e6-7ffdfb72560d memcpy_s 858->859 863 7ffdfb732f94-7ffdfb732f97 859->863 864 7ffdfb725613-7ffdfb725617 859->864 865 7ffdfb732f7e free 860->865 866 7ffdfb732f83-7ffdfb732f8a 860->866 861->859 868 7ffdfb72561c-7ffdfb725634 lstrlenW 861->868 869 7ffdfb732fc0-7ffdfb732fc5 call 7ffdfb73af4c 863->869 870 7ffdfb732f99-7ffdfb732f9c 863->870 864->868 865->866 866->863 874 7ffdfb725636-7ffdfb72565e lstrlenW 868->874 875 7ffdfb7256a7-7ffdfb7256d2 868->875 880 7ffdfb732fca-7ffdfb732fd0 869->880 871 7ffdfb732f9e-7ffdfb732fa1 870->871 872 7ffdfb732fb6-7ffdfb732fbb call 7ffdfb73af4c 870->872 871->872 876 7ffdfb732fa3-7ffdfb732fa6 871->876 872->869 881 7ffdfb725660-7ffdfb725679 wcsstr 874->881 882 7ffdfb7256a4 874->882 877 7ffdfb7256d8-7ffdfb7256de 875->877 878 7ffdfb7331fb-7ffdfb733206 call 7ffdfb73926c 875->878 876->864 883 7ffdfb732fac-7ffdfb732fb1 call 7ffdfb73af4c 876->883 884 7ffdfb7256e1-7ffdfb7256eb 877->884 901 7ffdfb733213 878->901 886 7ffdfb732fd8-7ffdfb733000 wcsstr 880->886 881->880 887 7ffdfb72567f-7ffdfb725699 lstrlenW 881->887 882->875 883->872 889 7ffdfb7256ed-7ffdfb7256f5 884->889 890 7ffdfb725709-7ffdfb72570c 884->890 886->886 892 7ffdfb733002 886->892 887->881 893 7ffdfb72569b-7ffdfb72569e 887->893 889->890 894 7ffdfb7256f7-7ffdfb725702 889->894 895 7ffdfb725712-7ffdfb725719 890->895 896 7ffdfb7331ec-7ffdfb7331f6 890->896 893->882 897 7ffdfb733007-7ffdfb733038 call 7ffdfb74f834 893->897 894->884 898 7ffdfb725704 894->898 899 7ffdfb725775 895->899 900 7ffdfb72571b-7ffdfb725720 895->900 910 7ffdfb733041-7ffdfb733053 call 7ffdfb728780 897->910 911 7ffdfb73303a-7ffdfb73303f 897->911 898->896 905 7ffdfb72577c-7ffdfb72577f 899->905 900->901 903 7ffdfb725726-7ffdfb725745 Shell_NotifyIconW 900->903 908 7ffdfb73321d 901->908 903->908 909 7ffdfb72574b-7ffdfb725755 903->909 906 7ffdfb72579d-7ffdfb7257a4 905->906 907 7ffdfb725781-7ffdfb725785 905->907 914 7ffdfb7257b4-7ffdfb7257c3 906->914 915 7ffdfb7257a6-7ffdfb7257ad 906->915 907->906 913 7ffdfb725787-7ffdfb72579c call 7ffdfb727fb0 907->913 909->906 916 7ffdfb725757-7ffdfb72575b 909->916 923 7ffdfb7331c5-7ffdfb7331ca 910->923 924 7ffdfb733059-7ffdfb733092 memcpy_s call 7ffdfb73ab20 910->924 911->910 917 7ffdfb7330b1-7ffdfb7330bc 911->917 913->906 915->914 920 7ffdfb7257af free 915->920 916->905 922 7ffdfb72575d-7ffdfb725770 call 7ffdfb723a90 916->922 921 7ffdfb7330c1-7ffdfb7330c4 917->921 920->914 926 7ffdfb7330cf-7ffdfb7330f0 wcsstr 921->926 927 7ffdfb7330c6-7ffdfb7330ca 921->927 922->899 923->882 924->917 934 7ffdfb733094-7ffdfb7330a2 924->934 930 7ffdfb7331a4-7ffdfb7331c0 lstrlenW 926->930 931 7ffdfb7330f6-7ffdfb73319f memmove_s call 7ffdfb73ab20 memcpy_s call 7ffdfb73ab20 926->931 927->882 930->921 931->926 936 7ffdfb7330a4-7ffdfb7330a7 free 934->936 937 7ffdfb7330ac 934->937 936->937 937->917
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: lstrlen$IconMessageNotifyShell_Tracefreememcpy_swcsstr
                • String ID: &&&
                • API String ID: 3522305210-3528648089
                • Opcode ID: e28112e3770b45316117607a19b499ec42ff4acab39bbf377f431a194fd86084
                • Instruction ID: 1315d692b03d793f35c33e2c62233ed4e4454d707cda7644a0efa196984b158e
                • Opcode Fuzzy Hash: e28112e3770b45316117607a19b499ec42ff4acab39bbf377f431a194fd86084
                • Instruction Fuzzy Hash: FFE17B22B0A74386EB208B24A464A7977A1FB49B94F694131DE6E477F8DF3CE545C700

                Control-flow Graph

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: Color$ObjectText$ModeSelectTheme$CreateDeleteDrawErrorFontIndirectInfoLastLongParametersSystemWindowmemset
                • String ID: Segoe MDL2 Assets$k$l
                • API String ID: 3686259064-988316403
                • Opcode ID: d0cc71d07375e060ba33981ab051d97f689cbad0fdc3bd99a37c6bcd6f6e735f
                • Instruction ID: 0eacf98d180b38c60ee96896b80ab84933579a2f310c5705cd83073a991febb7
                • Opcode Fuzzy Hash: d0cc71d07375e060ba33981ab051d97f689cbad0fdc3bd99a37c6bcd6f6e735f
                • Instruction Fuzzy Hash: 84818432719B428FE7509F21E820AADBBA1FB99B54F444535DE1A47BA8DF3CD405CB00

                Control-flow Graph

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: MessageRegisterWindow$memset$CountCriticalInitializeSectionTick
                • String ID: Microsoft.Windows.PNI$Microsoft.Windows.PNI.TrayIcon$NetworkStatusChange$PNILaunchNetworkUI$PNITooltip$TaskbarCreated$netprofm
                • API String ID: 1048345926-1792452816
                • Opcode ID: a40afbd40b4bf7e7660a32de9517d33a472829e8677338b72493795c139ac11e
                • Instruction ID: f4293d4c8fc25e6821d9486b6594885aa920ae2323f49a6f6e9f59eeca84f8f2
                • Opcode Fuzzy Hash: a40afbd40b4bf7e7660a32de9517d33a472829e8677338b72493795c139ac11e
                • Instruction Fuzzy Hash: 41E10932605B82CAE3558F24E45039AB7E4F744B04F988229CBED437A5EF79E1A5C744

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 1111 7ffdfb72ab60-7ffdfb72ab8e 1112 7ffdfb72ab90-7ffdfb72ab9e 1111->1112 1113 7ffdfb72ac0b-7ffdfb72ac1b 1111->1113 1116 7ffdfb72aba0-7ffdfb72abaa 1112->1116 1117 7ffdfb72abec-7ffdfb72ac05 1112->1117 1114 7ffdfb72ac21-7ffdfb72ac35 1113->1114 1115 7ffdfb72ad68-7ffdfb72ad78 1113->1115 1120 7ffdfb72ac7f-7ffdfb72ac9b 1114->1120 1121 7ffdfb72ac37-7ffdfb72ac41 1114->1121 1122 7ffdfb72ae7f 1115->1122 1123 7ffdfb72ad7e-7ffdfb72ad92 1115->1123 1118 7ffdfb72abc6-7ffdfb72abe6 GetProcAddress 1116->1118 1119 7ffdfb72abac-7ffdfb72abbf GetModuleHandleW 1116->1119 1117->1113 1124 7ffdfb72ae7b-7ffdfb72ae7d 1117->1124 1118->1117 1118->1124 1119->1118 1131 7ffdfb72aca3-7ffdfb72acaa 1120->1131 1126 7ffdfb72ac5d-7ffdfb72ac7d GetProcAddress 1121->1126 1127 7ffdfb72ac43-7ffdfb72ac56 GetModuleHandleW 1121->1127 1130 7ffdfb72ae81-7ffdfb72aea5 call 7ffdfb72e120 1122->1130 1128 7ffdfb72ad94-7ffdfb72adb9 call 7ffdfb739988 GetProcAddress 1123->1128 1129 7ffdfb72adbb-7ffdfb72add7 1123->1129 1124->1130 1126->1120 1126->1131 1127->1126 1128->1129 1138 7ffdfb72addf-7ffdfb72ade6 1128->1138 1129->1138 1135 7ffdfb72acd0-7ffdfb72ace7 1131->1135 1136 7ffdfb72acac-7ffdfb72accb GetLastError call 7ffdfb748ea0 SetLastError 1131->1136 1139 7ffdfb72ad35-7ffdfb72ad62 1135->1139 1140 7ffdfb72ace9-7ffdfb72acf3 1135->1140 1136->1135 1142 7ffdfb72ade8-7ffdfb72ae07 GetLastError call 7ffdfb748ea0 SetLastError 1138->1142 1143 7ffdfb72ae0c-7ffdfb72ae23 1138->1143 1139->1115 1139->1124 1145 7ffdfb72ad0f-7ffdfb72ad2f GetProcAddress 1140->1145 1146 7ffdfb72acf5-7ffdfb72ad08 GetModuleHandleW 1140->1146 1142->1143 1147 7ffdfb72ae25-7ffdfb72ae4a call 7ffdfb739988 GetProcAddress 1143->1147 1148 7ffdfb72ae4c-7ffdfb72ae79 1143->1148 1145->1124 1145->1139 1146->1145 1147->1124 1147->1148 1148->1122 1148->1124
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: AddressProc$ErrorLast$HandleModule
                • String ID: NtQueryWnfStateData$RtlRegisterFeatureConfigurationChangeNotification$RtlSubscribeWnfStateChangeNotification$ntdll.dll
                • API String ID: 730103829-2606944309
                • Opcode ID: 2d8d63823dc5acd78a16314bb47783a5e97c9f7645e1f35e60f3b5d7ec233c0b
                • Instruction ID: 17765d706f6253834a045b3bda67e716455dcebdc1e3001e157174df795e2520
                • Opcode Fuzzy Hash: 2d8d63823dc5acd78a16314bb47783a5e97c9f7645e1f35e60f3b5d7ec233c0b
                • Instruction Fuzzy Hash: D3910335B1AB478AEB109F11E860969B7A1FB88B40F544536DE6E127B8DF7CE4458B00

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 1230 7ffdfb765fdc-7ffdfb76603c AcquireSRWLockExclusive 1231 7ffdfb766051-7ffdfb76606b LocalAlloc 1230->1231 1232 7ffdfb76603e-7ffdfb766041 1230->1232 1235 7ffdfb766071-7ffdfb766097 GetTickCount 1231->1235 1236 7ffdfb76633f-7ffdfb766381 ReleaseSRWLockExclusive call 7ffdfb72e120 1231->1236 1233 7ffdfb766043-7ffdfb76604a 1232->1233 1234 7ffdfb76604c-7ffdfb76604f 1232->1234 1233->1232 1233->1234 1234->1231 1238 7ffdfb76609e-7ffdfb7660b8 GetTickCount 1234->1238 1235->1238 1238->1236 1239 7ffdfb7660be-7ffdfb7660ee GetTickCount call 7ffdfb765f14 1238->1239 1243 7ffdfb766111 1239->1243 1244 7ffdfb7660f0-7ffdfb7660fa 1239->1244 1246 7ffdfb766114-7ffdfb766118 1243->1246 1244->1243 1245 7ffdfb7660fc-7ffdfb766106 1244->1245 1245->1243 1247 7ffdfb766108-7ffdfb76610b 1245->1247 1248 7ffdfb76611e-7ffdfb76612c call 7ffdfb74ec80 1246->1248 1249 7ffdfb76620f-7ffdfb76621d call 7ffdfb74ec80 1246->1249 1247->1243 1251 7ffdfb76610d-7ffdfb76610f 1247->1251 1248->1249 1257 7ffdfb766132-7ffdfb766139 1248->1257 1255 7ffdfb766321-7ffdfb766324 1249->1255 1256 7ffdfb766223-7ffdfb76622a 1249->1256 1251->1246 1262 7ffdfb76633b 1255->1262 1263 7ffdfb766326-7ffdfb766328 1255->1263 1258 7ffdfb766300-7ffdfb76631c EventUnregister 1256->1258 1259 7ffdfb766230-7ffdfb766248 call 7ffdfb74efd0 1256->1259 1260 7ffdfb7661ee-7ffdfb76620a EventUnregister 1257->1260 1261 7ffdfb76613f-7ffdfb766169 1257->1261 1258->1255 1259->1258 1272 7ffdfb76624e-7ffdfb7662fb call 7ffdfb765e00 1259->1272 1260->1249 1266 7ffdfb7661b4-7ffdfb7661c8 EventRegister 1261->1266 1267 7ffdfb76616b-7ffdfb76616e 1261->1267 1262->1236 1263->1262 1264 7ffdfb76632a-7ffdfb766336 Sleep 1263->1264 1264->1262 1266->1260 1268 7ffdfb7661ca-7ffdfb7661e9 EventProviderEnabled EventUnregister 1266->1268 1270 7ffdfb766172-7ffdfb7661aa toupper 1267->1270 1268->1260 1270->1270 1271 7ffdfb7661ac-7ffdfb7661b1 1270->1271 1271->1266 1272->1258
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: Event$CountTickUnregister$ExclusiveLock$AcquireAllocEnabledLocalProviderRegisterReleaseSleeptoupper
                • String ID: <unknown>$Settings
                • API String ID: 758907732-4053243128
                • Opcode ID: 14b1d0c9fbeb32671ae2427f5b40aadb25e31ba102198fb53decf427497fde32
                • Instruction ID: 60ea049406485db46213cbfefb90922cce8af7adc17554f90105f543af19b6d4
                • Opcode Fuzzy Hash: 14b1d0c9fbeb32671ae2427f5b40aadb25e31ba102198fb53decf427497fde32
                • Instruction Fuzzy Hash: 89B15E36B0AB428AE7048F25E860AA97BA5FB44B48F944135CE5D177B8DF38E545CB40

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 1274 7ffdfb723810-7ffdfb72383c 1275 7ffdfb72383e-7ffdfb723842 1274->1275 1276 7ffdfb723859-7ffdfb72386f IsWindow 1274->1276 1275->1276 1277 7ffdfb723844-7ffdfb723854 call 7ffdfb727fb0 1275->1277 1278 7ffdfb723a4e-7ffdfb723a58 1276->1278 1279 7ffdfb723875-7ffdfb7238b2 RegOpenKeyExW 1276->1279 1277->1276 1283 7ffdfb723a78-7ffdfb723a88 1278->1283 1284 7ffdfb723a5a-7ffdfb723a5e 1278->1284 1281 7ffdfb7238b8-7ffdfb7238cc RegCloseKey 1279->1281 1282 7ffdfb7317d6-7ffdfb7317e3 call 7ffdfb753c6c 1279->1282 1285 7ffdfb7238d1-7ffdfb723910 CoCreateInstance 1281->1285 1282->1285 1292 7ffdfb7317e9 1282->1292 1284->1283 1286 7ffdfb723a60-7ffdfb723a73 call 7ffdfb723a90 1284->1286 1289 7ffdfb723a34-7ffdfb723a3f 1285->1289 1290 7ffdfb723916-7ffdfb72395a CoSetProxyBlanket 1285->1290 1286->1283 1289->1278 1293 7ffdfb723a41-7ffdfb723a44 1289->1293 1294 7ffdfb72395c-7ffdfb72397b 1290->1294 1295 7ffdfb7239cb-7ffdfb7239d5 1290->1295 1299 7ffdfb7317ee-7ffdfb7317f7 1292->1299 1293->1278 1294->1295 1304 7ffdfb72397d-7ffdfb7239c1 CoSetProxyBlanket 1294->1304 1296 7ffdfb7239f5-7ffdfb723a2e 1295->1296 1297 7ffdfb7239d7-7ffdfb7239db 1295->1297 1296->1289 1296->1299 1297->1296 1298 7ffdfb7239dd-7ffdfb7239f0 call 7ffdfb723a90 1297->1298 1298->1296 1299->1289 1302 7ffdfb7317fd-7ffdfb731808 1299->1302 1305 7ffdfb73180e-7ffdfb731828 1302->1305 1306 7ffdfb7318d2-7ffdfb7318e7 CoTaskMemFree 1302->1306 1304->1295 1307 7ffdfb7318ae-7ffdfb7318b1 1305->1307 1308 7ffdfb73182e-7ffdfb731852 call 7ffdfb74f098 CoTaskMemAlloc 1305->1308 1306->1289 1310 7ffdfb7318c3-7ffdfb7318cc 1307->1310 1311 7ffdfb7318b3-7ffdfb7318b9 1307->1311 1313 7ffdfb73189e-7ffdfb7318ad CoTaskMemFree 1308->1313 1314 7ffdfb731854-7ffdfb731869 1308->1314 1310->1305 1310->1306 1311->1310 1313->1307 1314->1313 1316 7ffdfb73186b-7ffdfb73189a RegisterWindowMessageW PostMessageW 1314->1316 1316->1313
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: BlanketProxy$CloseCreateInstanceMessageOpenTraceWindow
                • String ID: $Microsoft.Windows.PNI$System\CurrentControlSet\Control\Network\NewNetworkWindowOff
                • API String ID: 2406210883-1576512596
                • Opcode ID: 6d9b4a5cbacce884a8fa6f9e097dc8c7c9a7078d0da5415f27ea3c680cbd6bba
                • Instruction ID: 02a427fd9b7c8e5ded3056258b6c89cc4d2c85c79f03f6dc6d5b897163a4eb15
                • Opcode Fuzzy Hash: 6d9b4a5cbacce884a8fa6f9e097dc8c7c9a7078d0da5415f27ea3c680cbd6bba
                • Instruction Fuzzy Hash: 5B913E22719B838AE7608B15E860AB977A1FB89B94F544231DE6D477F8DF3CD445CB00
                APIs
                • WindowsDeleteString.API-MS-WIN-CORE-WINRT-STRING-L1-1-0 ref: 00007FFDFB74A892
                • WindowsDeleteString.API-MS-WIN-CORE-WINRT-STRING-L1-1-0 ref: 00007FFDFB74A8E7
                • WindowsConcatString.API-MS-WIN-CORE-WINRT-STRING-L1-1-0 ref: 00007FFDFB74A8FF
                • WindowsGetStringRawBuffer.API-MS-WIN-CORE-WINRT-STRING-L1-1-0 ref: 00007FFDFB74A917
                • WindowsGetStringRawBuffer.API-MS-WIN-CORE-WINRT-STRING-L1-1-0 ref: 00007FFDFB74A948
                • WindowsDeleteString.API-MS-WIN-CORE-WINRT-STRING-L1-1-0(00000000), ref: 00007FFDFB74A979
                • WindowsDeleteString.API-MS-WIN-CORE-WINRT-STRING-L1-1-0 ref: 00007FFDFB74A993
                  • Part of subcall function 00007FFDFB727FB0: TraceMessage.API-MS-WIN-EVENTING-CLASSICPROVIDER-L1-1-0 ref: 00007FFDFB727FC6
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: StringWindows$Delete$Buffer$ConcatMessageTrace
                • String ID: DataMarketplaceRoamingUIEnabled$PaidCell$Software\Microsoft\Windows\CurrentVersion\Control Panel\Settings\Network$Software\Microsoft\Windows\CurrentVersion\Control Panel\Settings\Network\DataMarketplace\PerSimSettings\$SupportDataMarketplace$false$true
                • API String ID: 2440537485-1080471717
                • Opcode ID: 64b24da4fad30fc72fb76822c070deb7f757c2ebd8593ec75438a8781f801b36
                • Instruction ID: e3536ecb365cd9fe4482851bfb9f86a8d1917f72b90734961effdba962add14a
                • Opcode Fuzzy Hash: 64b24da4fad30fc72fb76822c070deb7f757c2ebd8593ec75438a8781f801b36
                • Instruction Fuzzy Hash: 7C813722B06B47C9FB008B65D860BAC3BA1BB48B49F554136DE2D576F8DF79D54AC300
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: CriticalDecodePointerSection$CurrentEnterLeaveLongThreadWindow
                • String ID: AtlThunk_AllocateData$AtlThunk_DataToCode$AtlThunk_FreeData$AtlThunk_InitData$atlthunk.dll
                • API String ID: 1214495839-1745123996
                • Opcode ID: c4c8c9ff23b15c1708d22aa408f8b0edcf83b9c25e543b03462ad14f1d2d0a50
                • Instruction ID: 3f9b3374a903c9000140ba9b77932fe075cab76ee78029721ee323102b5d8472
                • Opcode Fuzzy Hash: c4c8c9ff23b15c1708d22aa408f8b0edcf83b9c25e543b03462ad14f1d2d0a50
                • Instruction Fuzzy Hash: CC812525B0EB4386EB408B21E830AB976A1AF99B80F584436CD2D07BF9DF7CE545C641
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: String$Free$MessageTrace
                • String ID: DevId=$IccId=$SubId=
                • API String ID: 918860529-897509198
                • Opcode ID: 5b9ad9ea21663978923be6c7e4706af67a6b4ad0bd109c7922417113485646bf
                • Instruction ID: 85e85b96b7bb8bba585ad35c1789f8d57e64c2561c11a6fc2fb13c8e69570b0f
                • Opcode Fuzzy Hash: 5b9ad9ea21663978923be6c7e4706af67a6b4ad0bd109c7922417113485646bf
                • Instruction Fuzzy Hash: 24513B32719B8786EB009B12E464AB9BB62FB85B44F445132DA6E472FDDF3CE546C700
                APIs
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: Heap$ExclusiveLock$Process$AcquireReleaseThreadpoolTimermemcpy_s$AllocCreateFree
                • String ID:
                • API String ID: 3213073285-0
                • Opcode ID: 0631b123a1a35fc98b8224a42f54526f0016696506916ad42b83974ff08c6314
                • Instruction ID: 8db6061bb15ba202a3ee6643ebfdfe36f5abbdc8e85c48446309f0391e85c093
                • Opcode Fuzzy Hash: 0631b123a1a35fc98b8224a42f54526f0016696506916ad42b83974ff08c6314
                • Instruction Fuzzy Hash: E0A11B39B1AB478AEB108B15F424A78B7A1FF49B91F585135CA6D027F9DFBCA4448700
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: ClearFreeFromStringTaskVariantmemcmp$ConvertCriticalGuidInterfaceLeaveLuidSection
                • String ID: false$true
                • API String ID: 2354851987-2658103896
                • Opcode ID: 9dc3950a3993dce3fbb31cc03398bbf46d7f08feef031adc7fb5412d506a5d78
                • Instruction ID: 626c08251960b680ef8554c46809edc0dddf21bce6ae3b5ae6b635c67cd6eef3
                • Opcode Fuzzy Hash: 9dc3950a3993dce3fbb31cc03398bbf46d7f08feef031adc7fb5412d506a5d78
                • Instruction Fuzzy Hash: 41F15E22B0AB8785EB209B15E460BB9B761FB85B84F544032DE6E436F9DF7CE545CB00
                APIs
                  • Part of subcall function 00007FFDFB7423A0: WindowsCreateStringReference.API-MS-WIN-CORE-WINRT-STRING-L1-1-0(?,?,?,?,00007FFDFB75213D), ref: 00007FFDFB7423BF
                • RoGetActivationFactory.API-MS-WIN-CORE-WINRT-L1-1-0 ref: 00007FFDFB752158
                • RoGetActivationFactory.API-MS-WIN-CORE-WINRT-L1-1-0 ref: 00007FFDFB7521FA
                • CreateEventExW.API-MS-WIN-CORE-SYNCH-L1-1-0 ref: 00007FFDFB752282
                • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FFDFB752297
                • new.LIBCMT ref: 00007FFDFB7522CE
                  • Part of subcall function 00007FFDFB75243C: WindowsDeleteString.API-MS-WIN-CORE-WINRT-STRING-L1-1-0(?,?,00000000,00007FFDFB752185), ref: 00007FFDFB752457
                • CoWaitForMultipleHandles.API-MS-WIN-CORE-COM-L1-1-0 ref: 00007FFDFB752334
                • CloseHandle.API-MS-WIN-CORE-HANDLE-L1-1-0 ref: 00007FFDFB75234E
                • WindowsDeleteString.API-MS-WIN-CORE-WINRT-STRING-L1-1-0 ref: 00007FFDFB752387
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: StringWindows$ActivationCreateDeleteFactory$CloseErrorEventHandleHandlesLastMultipleReferenceWait
                • String ID: Settings$Windows.Foundation.Uri$Windows.System.Launcher$ms-settings:network
                • API String ID: 3412455853-787880240
                • Opcode ID: 36fb662b4b1bf84e8ad04ce9255d277bcff71425fff95c99945188113f36a6eb
                • Instruction ID: 6970f48ce3d6be0a40774f09e1bf44452b416766e5e08104fe5c262e4d06a670
                • Opcode Fuzzy Hash: 36fb662b4b1bf84e8ad04ce9255d277bcff71425fff95c99945188113f36a6eb
                • Instruction Fuzzy Hash: B991F636B16B479AEB009F61D860BEC7761EB88B88F854036DA1D57BB8DF39D605C340
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: swprintf_s$OpenPathPersistent
                • String ID: %s%s$%s%s\%s$\CellUX$\DeviceSpecific$\ICCIDSpecific$\IMSISpecific$\IMSISpecific\Default
                • API String ID: 3700984595-1352065061
                • Opcode ID: cdca07b66b72d20378de648f12a1f3515123c009a8dccd6a035e210b6845c8a1
                • Instruction ID: 7b38d1eb2f005e792bfdd0f2feea3564995d5fc9be5cb4240267628cb74a5013
                • Opcode Fuzzy Hash: cdca07b66b72d20378de648f12a1f3515123c009a8dccd6a035e210b6845c8a1
                • Instruction Fuzzy Hash: 13516F32B0AB8389EB108B11E8659B973A6FB48744F545132EA6D07BF8DF3DE545C740
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: Module$ActivateCreateDeactivateErrorFileFindHandleLastLibraryLoadNameQuerySectionString
                • String ID: Comctl32.dll$p
                • API String ID: 1565696348-195350848
                • Opcode ID: ba36897773c87fc2fce708b76ce7c34f5e1c37495266b4a8ab97895ec4626c2e
                • Instruction ID: f0fecb29b77a8cf7374f03b216a011149bf3d964f644b666b7ecb6b4853e68f1
                • Opcode Fuzzy Hash: ba36897773c87fc2fce708b76ce7c34f5e1c37495266b4a8ab97895ec4626c2e
                • Instruction Fuzzy Hash: 7751183270AB8786E7109B10E864B79B7A1FB89755F545235DAAE427F8DF7CE048CB00
                APIs
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: ThreadpoolTimer$CriticalDeleteSection$CallbacksCloseWaitfree
                • String ID:
                • API String ID: 2113641861-0
                • Opcode ID: d1ed68181b4573e8d6168605bdf05adb06bf5be316c2a7f384e496a5e8dba9a9
                • Instruction ID: 563003d497994012058a63e9af53a9d5526e3eede4e2dab2ecfeef9be95b2885
                • Opcode Fuzzy Hash: d1ed68181b4573e8d6168605bdf05adb06bf5be316c2a7f384e496a5e8dba9a9
                • Instruction Fuzzy Hash: 4AA13932716B47DAEB089B65D460BB9B761FB86B91F445132CA2E437B8CF38E555C300
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: FreeString$MessageTrace$FromTaskswprintf_s
                • String ID: FALSE$TRUE
                • API String ID: 770768536-1412513891
                • Opcode ID: c265ae50c10dbd0dcda428474d33681d1b2f3dd7e9f92087f235dff5e458fc09
                • Instruction ID: 0ba2c011bb889340324662349fd0b4d8557e1d5e542828a315b40980b27092de
                • Opcode Fuzzy Hash: c265ae50c10dbd0dcda428474d33681d1b2f3dd7e9f92087f235dff5e458fc09
                • Instruction Fuzzy Hash: 89229F31B1A7478AEB158B15E8B4AB97762FB80B48F140032DA2D076F9DFBCE546C740
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: Event$InitOnce$BeginCompleteInformationInitializeRegisterTransferWritememcpy_s
                • String ID: Other$t
                • API String ID: 1639103230-3956491833
                • Opcode ID: f8346db3e6e4f1cfad18338b6f0ab385301688041af79323cdd83b17bc048ac2
                • Instruction ID: 56f5c53b19fe03c284ece1de0c051474deddc46062f00d5d49dcce906428831b
                • Opcode Fuzzy Hash: f8346db3e6e4f1cfad18338b6f0ab385301688041af79323cdd83b17bc048ac2
                • Instruction Fuzzy Hash: D0C15E36A0AB82C6E7208B10F464BAAB7A5FB85744F545136DAAD43BF8DF7CD154CB00
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: CloseOpen$Enum
                • String ID: ($Conditions
                • API String ID: 2405484398-186447155
                • Opcode ID: c2930f3d94a8139c0361de20dd76b585dbb557336e0739b5846d67a88e38bcfc
                • Instruction ID: 49f8d03d8f1e236de6a6321f7eb2bd965fcbf974e919882930caba7e846afc99
                • Opcode Fuzzy Hash: c2930f3d94a8139c0361de20dd76b585dbb557336e0739b5846d67a88e38bcfc
                • Instruction Fuzzy Hash: D5615F3270AB8286E7648F51F46076AB7A0FB88B94F144135DAAD57BF9DF3CD4458B00
                APIs
                • Shell_NotifyIconW.SHELL32 ref: 00007FFDFB74FC1D
                  • Part of subcall function 00007FFDFB727FB0: TraceMessage.API-MS-WIN-EVENTING-CLASSICPROVIDER-L1-1-0 ref: 00007FFDFB727FC6
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: IconMessageNotifyShell_Trace
                • String ID: AirplaneMode$CellularInternet$CellularRoamingInternet$CellularSharedInternet$Disconnected$Unknown$WiFiInternet$WiredInternet
                • API String ID: 2287991058-2713722250
                • Opcode ID: 9cc7f9d317cae937cc7a7eece96ee2cce7a592dc9a91efc6f3fe3462ed4f6c98
                • Instruction ID: f1fd3c44463c552fa1291ee0df2c32436d6ccc390ba8ca18c50eaa93009a7d10
                • Opcode Fuzzy Hash: 9cc7f9d317cae937cc7a7eece96ee2cce7a592dc9a91efc6f3fe3462ed4f6c98
                • Instruction Fuzzy Hash: 2E516B21B1E783C6FB648B04E4B0A7A72A1BB84785F605032DD2D4AAF9DF6DE645C700
                APIs
                • WaitForSingleObject.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,00000000,00007FFDFB72A874), ref: 00007FFDFB72A9A2
                • ReleaseSemaphore.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,00000000,00007FFDFB72A874), ref: 00007FFDFB72A9DB
                • ReleaseSemaphore.API-MS-WIN-CORE-SYNCH-L1-1-0 ref: 00007FFDFB72A9FD
                • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FFDFB72AA11
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: ReleaseSemaphore$ErrorLastObjectSingleWait
                • String ID: wil
                • API String ID: 3433052774-1589926490
                • Opcode ID: 4e00157d9e6f1a707b1938aef4ab5b8cc29706705db3c26b164a65e2c90b34cf
                • Instruction ID: 462e4e45de55f5772720b782fba60f1eeb77e63c834c7efbcbff6163b4043095
                • Opcode Fuzzy Hash: 4e00157d9e6f1a707b1938aef4ab5b8cc29706705db3c26b164a65e2c90b34cf
                • Instruction Fuzzy Hash: 93415431B0E74386F7608B11E460ABAB671EF85740F689132D96E866FDDF3CD5858B01
                APIs
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: Menu$Item$Session$CountDeleteErrorLast$Current_exceptionDestroyEventForegroundInfoLoadPopupQueueTrackTransferUserWindowWorkWritememsetstd::exception_ptr::_
                • String ID:
                • API String ID: 1589568937-0
                • Opcode ID: 00b3b37297cace69da4217301fdc5df649a6e40a5e4ad6f8bcdd5e931e0e3ac3
                • Instruction ID: 7951c2e13442682d0f8e47ccc95b90d9b369ed63b4415e19442c7d834a50a87e
                • Opcode Fuzzy Hash: 00b3b37297cace69da4217301fdc5df649a6e40a5e4ad6f8bcdd5e931e0e3ac3
                • Instruction Fuzzy Hash: 55813821B0AB43C9EB148B25E864BB97BA1FB89B85F544535C96E027F9DF3CE605C700
                APIs
                Strings
                • IsolationAware function called after IsolationAwareCleanup, xrefs: 00007FFDFB73136C
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: ActivateCreateDeactivateDebugErrorLastOutputStringWindow
                • String ID: IsolationAware function called after IsolationAwareCleanup
                • API String ID: 237755043-2690750368
                • Opcode ID: 3eaf42f3b8dffa805c6e2c2ed62d7ed1a89fdbcc483a9452e87a93345d178e00
                • Instruction ID: 48fc0137cb15292885f645069611095a688a13fde1d53a1f19762111b216f89c
                • Opcode Fuzzy Hash: 3eaf42f3b8dffa805c6e2c2ed62d7ed1a89fdbcc483a9452e87a93345d178e00
                • Instruction Fuzzy Hash: CD510D31B0A7838AE7608B15E860A7977A5FB58791F245135DD6D83FB8DF7CE8818B00
                APIs
                • ActivateActCtx.API-MS-WIN-CORE-SIDEBYSIDE-L1-1-0(?,?,?,?,?,00007FFDFB7216FA), ref: 00007FFDFB72205F
                • RegisterClassExW.USER32 ref: 00007FFDFB72207B
                • DeactivateActCtx.API-MS-WIN-CORE-SIDEBYSIDE-L1-1-0(?,?,?,?,?,00007FFDFB7216FA), ref: 00007FFDFB7220B2
                • OutputDebugStringA.API-MS-WIN-CORE-DEBUG-L1-1-0(?,?,?,?,?,00007FFDFB7216FA), ref: 00007FFDFB73140B
                • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,?,?,00007FFDFB7216FA), ref: 00007FFDFB731428
                Strings
                • IsolationAware function called after IsolationAwareCleanup, xrefs: 00007FFDFB731404
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: ActivateClassDeactivateDebugErrorLastOutputRegisterString
                • String ID: IsolationAware function called after IsolationAwareCleanup
                • API String ID: 4001279259-2690750368
                • Opcode ID: 97d429d92a168d73ce5815e05533f6846979be99e95e355641da412381cbd5d1
                • Instruction ID: 1f9e49b2bfcea4ae61f59987c343ea7b027d2f42c1373888a8dcd3946a5a30c5
                • Opcode Fuzzy Hash: 97d429d92a168d73ce5815e05533f6846979be99e95e355641da412381cbd5d1
                • Instruction Fuzzy Hash: 28413731B0E74386F7645F10A460A39B7A1EF99B41F688135DD2E466FCDE7CE8818A00
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: ExclusiveLockMutexRelease$AcquireCreateCurrentObjectProcessSingleWait_vsnwprintf
                • String ID: Local\SM0:%d:%d:%hs$wil
                • API String ID: 824798051-2303653343
                • Opcode ID: d3d08922e8546558d5d0967c799a4a7245c54e4f65bb916909a01b674b505986
                • Instruction ID: f91f98ff02096572e97483c0d42d838cbd3c60c679ae89d733cfb95516777bcd
                • Opcode Fuzzy Hash: d3d08922e8546558d5d0967c799a4a7245c54e4f65bb916909a01b674b505986
                • Instruction Fuzzy Hash: 74617D25B0AB8385EB509B21E160AB977A1FB84B94F541132DD6E43BFDDF3CE4428B40
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: CriticalSection$Leave$CursorEnterLoadswprintf_s
                • String ID: ATL:%p$P
                • API String ID: 1089554133-2635742592
                • Opcode ID: 9c970a8f284bb42224f97400bb3f4bd93f0491cbdc31753eaaeff703433b7704
                • Instruction ID: 21ca26c9e45f0cdd5cfe9f059edd611f281662dcae5af03c02b091de57c210de
                • Opcode Fuzzy Hash: 9c970a8f284bb42224f97400bb3f4bd93f0491cbdc31753eaaeff703433b7704
                • Instruction Fuzzy Hash: 19714036A09B8382E7118F24E420AB973A1FF98B88F149135CE5D477B9DF38E585CB00
                APIs
                • SetTimer.USER32 ref: 00007FFDFB74C632
                  • Part of subcall function 00007FFDFB727FB0: TraceMessage.API-MS-WIN-EVENTING-CLASSICPROVIDER-L1-1-0 ref: 00007FFDFB727FC6
                  • Part of subcall function 00007FFDFB7520F4: RoGetActivationFactory.API-MS-WIN-CORE-WINRT-L1-1-0 ref: 00007FFDFB752158
                  • Part of subcall function 00007FFDFB7520F4: RoGetActivationFactory.API-MS-WIN-CORE-WINRT-L1-1-0 ref: 00007FFDFB7521FA
                  • Part of subcall function 00007FFDFB7520F4: CreateEventExW.API-MS-WIN-CORE-SYNCH-L1-1-0 ref: 00007FFDFB752282
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: ActivationFactory$CreateEventMessageTimerTrace
                • String ID: Mini flyout$ReplaceVan$SOFTWARE\Microsoft\Windows\CurrentVersion\Control Panel\Settings\Network$Settings$VAN$VANFromPCSettings
                • API String ID: 4204754865-3100409106
                • Opcode ID: 02dff65031c2eb9ea17d3138017a4dce361186ee6b41a2e04fecf94989fb6f37
                • Instruction ID: 213fd8691c44b4d6bf8fdcd4ecad7a9f3a22aad6e7da9c5cb725c781dd6dca04
                • Opcode Fuzzy Hash: 02dff65031c2eb9ea17d3138017a4dce361186ee6b41a2e04fecf94989fb6f37
                • Instruction Fuzzy Hash: 12518C22B0AB87C9E750DB24E460AB97BA1FB84748F544032D96E42AFDDF7CE645C710
                APIs
                • EnterCriticalSection.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FFDFB741CFF), ref: 00007FFDFB75F008
                • LeaveCriticalSection.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FFDFB741CFF), ref: 00007FFDFB75F0D0
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: CriticalSection$EnterLeave
                • String ID:
                • API String ID: 3168844106-0
                • Opcode ID: 0783afafc30a88d4f4c835b59bd0510c0e9e41fef92d9b60cceca4b9b8ec0528
                • Instruction ID: 5d917347da759352ec45ee007f6059fb664c32cd89a271b66bc62f1eaefb3b64
                • Opcode Fuzzy Hash: 0783afafc30a88d4f4c835b59bd0510c0e9e41fef92d9b60cceca4b9b8ec0528
                • Instruction Fuzzy Hash: 44311B36649B828AD7209F15B4204BABB61FB8AB51B484235CAAE077B4CF3CE0418750
                APIs
                • GetCurrentProcess.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0(?,?,?,00000000,00000001,00007FFDFB75E6C6,00000000,?,00000000,?,?,00007FFDFB74945F), ref: 00007FFDFB75E825
                • OpenProcessToken.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0(?,?,?,00000000,00000001,00007FFDFB75E6C6,00000000,?,00000000,?,?,00007FFDFB74945F), ref: 00007FFDFB75E83D
                • CloseHandle.API-MS-WIN-CORE-HANDLE-L1-1-0 ref: 00007FFDFB75E8B1
                • GetTokenInformation.API-MS-WIN-SECURITY-BASE-L1-1-0 ref: 00007FFDFB75E88D
                  • Part of subcall function 00007FFDFB75E5D0: DuplicateToken.API-MS-WIN-SECURITY-BASE-L1-1-0 ref: 00007FFDFB75E5F8
                  • Part of subcall function 00007FFDFB75E5D0: CreateWellKnownSid.API-MS-WIN-SECURITY-BASE-L1-1-0 ref: 00007FFDFB75E61F
                  • Part of subcall function 00007FFDFB75E5D0: CheckTokenMembership.API-MS-WIN-SECURITY-BASE-L1-1-0 ref: 00007FFDFB75E637
                  • Part of subcall function 00007FFDFB75E5D0: CloseHandle.API-MS-WIN-CORE-HANDLE-L1-1-0 ref: 00007FFDFB75E641
                • CloseHandle.API-MS-WIN-CORE-HANDLE-L1-1-0(?,?,?,00000000,00000001,00007FFDFB75E6C6,00000000,?,00000000,?,?,00007FFDFB74945F), ref: 00007FFDFB75E8CA
                • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,00000000,00000001,00007FFDFB75E6C6,00000000,?,00000000,?,?,00007FFDFB74945F), ref: 00007FFDFB75E8D8
                • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,00000000,00000001,00007FFDFB75E6C6,00000000,?,00000000,?,?,00007FFDFB74945F), ref: 00007FFDFB75E8E8
                  • Part of subcall function 00007FFDFB75E76C: NtQueryInformationToken.NTDLL ref: 00007FFDFB75E7A8
                  • Part of subcall function 00007FFDFB75E76C: NtQueryInformationToken.NTDLL ref: 00007FFDFB75E7E5
                • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,00000000,00000001,00007FFDFB75E6C6,00000000,?,00000000,?,?,00007FFDFB74945F), ref: 00007FFDFB75E8F8
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: Token$CloseErrorHandleInformationLast$ProcessQuery$CheckCreateCurrentDuplicateKnownMembershipOpenWell
                • String ID:
                • API String ID: 802450623-0
                • Opcode ID: f01f614649a3ca8937e445d34cf436255a8a61d074effba9fbab5fda97014279
                • Instruction ID: d7620e8c63b7492a3d86bd27b71621818553dde5167c78beed6212457c63fabc
                • Opcode Fuzzy Hash: f01f614649a3ca8937e445d34cf436255a8a61d074effba9fbab5fda97014279
                • Instruction Fuzzy Hash: CC313A32B06B83CFE7505F60D920AB8BBA1FB49B59F459131DA1E466B8DF38E4468740
                APIs
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: String$Free$AllocMessageTrace
                • String ID:
                • API String ID: 3845034887-0
                • Opcode ID: a546f892ca784f6930762a52ea3dce751a38565891ce681be53418e88c06c06a
                • Instruction ID: c8adcc0c9ce1f3d6a3079ee56eabc76f61207eb60442f4b7b363d3774ef41fb9
                • Opcode Fuzzy Hash: a546f892ca784f6930762a52ea3dce751a38565891ce681be53418e88c06c06a
                • Instruction Fuzzy Hash: 12D12E26B1AB0789FB048B65D4A4A793762FB84B58F244032CE2E577F9CF7CE8558740
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: CreateFreeFromInstanceMessageStringTaskTrace
                • String ID: false$true
                • API String ID: 3902204450-2658103896
                • Opcode ID: c4ab3e09b0aa2fe0e525a163f9028a69491d2c89a82a1a73193614c9848ba4af
                • Instruction ID: 5a92d62f5c8a4436cc987a0db6b66ca04c21b7c60c5a45b718ee24128085fcb6
                • Opcode Fuzzy Hash: c4ab3e09b0aa2fe0e525a163f9028a69491d2c89a82a1a73193614c9848ba4af
                • Instruction Fuzzy Hash: 39813625B0AB47C5EB449B26D860BB936A1BB48B88F144031DE2E577F9DF3CE946C340
                APIs
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: Heap$Processmemcpy_s$Alloc
                • String ID:
                • API String ID: 1246213345-0
                • Opcode ID: 41d972ee57f84275b01db586cefed64bdb125001a10459de69419efa13cff0b7
                • Instruction ID: 3fb26448910e256d3cdbe48e9595ce1e0db2d62499ace18a8aa9c133ab51882c
                • Opcode Fuzzy Hash: 41d972ee57f84275b01db586cefed64bdb125001a10459de69419efa13cff0b7
                • Instruction Fuzzy Hash: 0F518932719B868BDB108F56F414569B7A5FB49B90B088235CEAE03BB8DF3CE144C700
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: Window$Long$CallProc
                • String ID: 8
                • API String ID: 513923721-4194326291
                • Opcode ID: 3b34e0573ef0aa2c992f965ff573e0c3f8babd2eeb09b1203b405283773aa905
                • Instruction ID: 35d5deb061d62a740f86bfd8e09984308976b56376367479fed6728a96ffe801
                • Opcode Fuzzy Hash: 3b34e0573ef0aa2c992f965ff573e0c3f8babd2eeb09b1203b405283773aa905
                • Instruction Fuzzy Hash: 4B414732709B418AD7508F26E45466D77A5F789F94F198235DEAD437B8CF39C881C740
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: FreeTask$ConvertFromGuidInterfaceLuidString
                • String ID: false$true
                • API String ID: 542903992-2658103896
                • Opcode ID: 8eaf8cb2c82e1acf46f987def9619f45da385c79af0f27c2fd8d629973044522
                • Instruction ID: bba4d329417650eaa8a302115433b2c68d5c5b4d439a9ff315a3b1fe91f2c47c
                • Opcode Fuzzy Hash: 8eaf8cb2c82e1acf46f987def9619f45da385c79af0f27c2fd8d629973044522
                • Instruction Fuzzy Hash: 27414F62B09B478AEB508B15E4A0AB97771FB84B95F515032EE6E427F8DF3CE445CB00
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: InitVariant
                • String ID: NA_CategoryReadOnly$NA_CategorySetByPolicy$NA_DomainAuthenticationFailed
                • API String ID: 1927566239-2229626304
                • Opcode ID: 0b67cf7f1b37044d2d6de5ae881c26726e6249c0c7b7a80069f20b5273bb5b6b
                • Instruction ID: 2336a5fffb64541b6f5fe84579c1f52e4b21a46d524ec2c5fa37522317069374
                • Opcode Fuzzy Hash: 0b67cf7f1b37044d2d6de5ae881c26726e6249c0c7b7a80069f20b5273bb5b6b
                • Instruction Fuzzy Hash: 32310A36B05B47CAEB108F26E8609A87771FB98B89F404432CA2D537B8DF78D945C340
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: InfoMenu$Itemmemset$DeleteObjectPropRemove_cwprintf_s_l
                • String ID: ImmersiveContextMenuArray_%lu
                • API String ID: 3140472605-919551790
                • Opcode ID: b44de8083e2febeb610fc45a5d00fd84892758f30fd04d6fcc1de4356da3e0b2
                • Instruction ID: b3ce532db3ec6cc46d1438d61c46f2e670e7f9114356cee1abd2954d72ec101d
                • Opcode Fuzzy Hash: b44de8083e2febeb610fc45a5d00fd84892758f30fd04d6fcc1de4356da3e0b2
                • Instruction Fuzzy Hash: 26219A32F11B42CAF700CB61D8517BC7B71FB89B88F685225DE1956AA9DF38D144C740
                APIs
                • LoadLibraryExA.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(?,?,?,00007FFDFB75137D), ref: 00007FFDFB750FFA
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: LibraryLoad
                • String ID: AtlThunk_AllocateData$AtlThunk_DataToCode$AtlThunk_FreeData$AtlThunk_InitData$atlthunk.dll
                • API String ID: 1029625771-1745123996
                • Opcode ID: a8a93f02d1c6dc782b1c7d9841afbf4e5819059e68b5bb117c4d741fc25dd54f
                • Instruction ID: 1500e3294cbb12d9917003168f75789a989f43b112623f1d062158bc54abc7bb
                • Opcode Fuzzy Hash: a8a93f02d1c6dc782b1c7d9841afbf4e5819059e68b5bb117c4d741fc25dd54f
                • Instruction Fuzzy Hash: D4111964B0E78395FB559B24E871EF433A1EF89781F480036C82D167FDDE6CA58AC660
                APIs
                • LoadLibraryExA.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(?,?,00000000,00007FFDFB7512EF,?,?,?,00007FFDFB7362B4), ref: 00007FFDFB750F26
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: LibraryLoad
                • String ID: AtlThunk_AllocateData$AtlThunk_DataToCode$AtlThunk_FreeData$AtlThunk_InitData$atlthunk.dll
                • API String ID: 1029625771-1745123996
                • Opcode ID: 53f2d91eea63721ee29455f35d7873539e5cd10809de166bf15be53965277277
                • Instruction ID: a3b8e769ab67e228f3563b7b9bc9ccd5ac232c6117ccc8b9939256e8831be8ed
                • Opcode Fuzzy Hash: 53f2d91eea63721ee29455f35d7873539e5cd10809de166bf15be53965277277
                • Instruction Fuzzy Hash: 7A110764B0A74785FB559B64E871EF473A1AF89741F540036C82D063FDDE6CB98ACA40
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: DataOpenTheme$Parent
                • String ID: DarkMode_ImmersiveStart::Menu$ImmersiveStart::Menu$LightMode_ImmersiveStart::Menu
                • API String ID: 3273629984-1060545678
                • Opcode ID: 26217d3996aec12530f7d4caad1fa9f8689139d8517793d06c188339b0768d2f
                • Instruction ID: b931d3f4753d17d58da91aae736bc48910ad053d3364c5bbcfb1f983d0833da6
                • Opcode Fuzzy Hash: 26217d3996aec12530f7d4caad1fa9f8689139d8517793d06c188339b0768d2f
                • Instruction Fuzzy Hash: B8015E21B0AB878AEB408B01B550679BB62FB49BD4B989031DA5E0777DDF3CD045C700
                APIs
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: free
                • String ID:
                • API String ID: 1294909896-0
                • Opcode ID: 5a02711997de77c2568891e0e70322f4371beb877e408482481c23fb00cbe0cf
                • Instruction ID: 37b087fbbc1c65c7d37ee852c1d79152b6ed51f6c7b35cacb5b654bf35790d9b
                • Opcode Fuzzy Hash: 5a02711997de77c2568891e0e70322f4371beb877e408482481c23fb00cbe0cf
                • Instruction Fuzzy Hash: EE213A23B19BC286E740AE21E0747AD7360FB84B88F144131DE5D1A2BEDF38E4418720
                APIs
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: FreeString$wcschr$MessageTrace
                • String ID:
                • API String ID: 3085190638-0
                • Opcode ID: b7ec97e6742f8905b18743098584eb55535c671f7ddc38c2bb9d2adec48f468e
                • Instruction ID: c01c0212f3718d5430b720d6a2dfbbc5280960adc44d154e9d9c688ad33534ad
                • Opcode Fuzzy Hash: b7ec97e6742f8905b18743098584eb55535c671f7ddc38c2bb9d2adec48f468e
                • Instruction Fuzzy Hash: 8C818A31B0A74781EB109B06E464ABA77A1FB84B94F640132DA2E172FDDE3CE587C740
                APIs
                • EnterCriticalSection.API-MS-WIN-CORE-SYNCH-L1-1-0 ref: 00007FFDFB724199
                • LeaveCriticalSection.API-MS-WIN-CORE-SYNCH-L1-1-0 ref: 00007FFDFB724205
                  • Part of subcall function 00007FFDFB727FB0: TraceMessage.API-MS-WIN-EVENTING-CLASSICPROVIDER-L1-1-0 ref: 00007FFDFB727FC6
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: CriticalSection$EnterLeaveMessageTrace
                • String ID:
                • API String ID: 2067524592-0
                • Opcode ID: ddcd3475e6082288d2d65618228b710db9f1532863d06d0aebe0e8d38b4ea4a3
                • Instruction ID: 4b407b13ac6cbc51d4035e45bc67d9655b07766a5da7fd8fad47c287b2833b49
                • Opcode Fuzzy Hash: ddcd3475e6082288d2d65618228b710db9f1532863d06d0aebe0e8d38b4ea4a3
                • Instruction Fuzzy Hash: 74812E21B0A7878AEB508B26E470AB837A1FB45B44F544032DE6D477F9DE3DE546CB40
                APIs
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: Sleep_amsg_exit$CurrentImageNonwritablefree
                • String ID:
                • API String ID: 1386524500-0
                • Opcode ID: 82451929dc042798650e81a981a699dc30068bce45fc73eea81288e1501549db
                • Instruction ID: 16e6881c335936e991ac71a9350e2d5a4b94f5d212ee3b3eb994f2ff07b617bb
                • Opcode Fuzzy Hash: 82451929dc042798650e81a981a699dc30068bce45fc73eea81288e1501549db
                • Instruction Fuzzy Hash: 4F51F624B0EB1789FB60AB15E874A7572A1EF54B80F544436DD2E867FCDEBCA8418B10
                APIs
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: Menu$Item$CountDelete$Infomemset
                • String ID:
                • API String ID: 453130535-0
                • Opcode ID: 3ec2c1b1d0e6b205989c9a8fabfcc61fea11af6ab804a5bc1aea8a82f05182a1
                • Instruction ID: c6f16f735237b642cd1e11429133d4438aed8055c684fc3863bf795259460252
                • Opcode Fuzzy Hash: 3ec2c1b1d0e6b205989c9a8fabfcc61fea11af6ab804a5bc1aea8a82f05182a1
                • Instruction Fuzzy Hash: 0D317532B09703CAE7105F259024A79BA91FB89B85F558036CE6E837B9DF3DE6458740
                APIs
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: String$memcpy_s$AllocFree
                • String ID:
                • API String ID: 3865269606-0
                • Opcode ID: a778cd19d889262c72299c7bfbf1e26be05d1cc18587996bba803b2a9692fb92
                • Instruction ID: 1efc8cbc553a4a2a8d57f0914bb0816f5ae5c9d3836c556846f0d05e24e855ab
                • Opcode Fuzzy Hash: a778cd19d889262c72299c7bfbf1e26be05d1cc18587996bba803b2a9692fb92
                • Instruction Fuzzy Hash: 0D216F32706B428ADB148B62E42497DBAA1FF89FC1B198536CE5E477B8DF3CD4458300
                APIs
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: CountCurrentTickTime$CounterFilePerformanceProcessQuerySystemThread
                • String ID:
                • API String ID: 4104442557-0
                • Opcode ID: ca60ca20652e5b512e5bdda7c1a0a2ce4356c8090f7c3ee2038baed05bdc6859
                • Instruction ID: ad822690c15786897dd18d4d0356dd6379cf5724a1a7f7a9a46e6d1dc0daf2cb
                • Opcode Fuzzy Hash: ca60ca20652e5b512e5bdda7c1a0a2ce4356c8090f7c3ee2038baed05bdc6859
                • Instruction Fuzzy Hash: 4D111F36706B428AEB00DF71E86556833A4FB49758F400A36EAAD477B8DF7CD5A58340
                APIs
                • OpenSemaphoreW.API-MS-WIN-CORE-SYNCH-L1-1-0 ref: 00007FFDFB72A847
                  • Part of subcall function 00007FFDFB72A990: WaitForSingleObject.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,00000000,00007FFDFB72A874), ref: 00007FFDFB72A9A2
                  • Part of subcall function 00007FFDFB72A990: ReleaseSemaphore.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,00000000,00007FFDFB72A874), ref: 00007FFDFB72A9DB
                  • Part of subcall function 00007FFDFB72A990: ReleaseSemaphore.API-MS-WIN-CORE-SYNCH-L1-1-0 ref: 00007FFDFB72A9FD
                  • Part of subcall function 00007FFDFB72A990: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FFDFB72AA11
                • OpenSemaphoreW.API-MS-WIN-CORE-SYNCH-L1-1-0 ref: 00007FFDFB72A8EE
                • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FFDFB735A00
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: Semaphore$ErrorLastOpenRelease$ObjectSingleWait
                • String ID: _p0$wil
                • API String ID: 708575728-1814513734
                • Opcode ID: b3bd5fa20e281f3322f12856fe23a30e9c4c88bd7c312ab4641c718e2038985d
                • Instruction ID: 1607561980ece37b6e4194515abfef73fada8cc40dfa91d53368e09e44a7274a
                • Opcode Fuzzy Hash: b3bd5fa20e281f3322f12856fe23a30e9c4c88bd7c312ab4641c718e2038985d
                • Instruction Fuzzy Hash: 1B718D61B1E78386EB618B619034AB973A1FF84B40F544132DE6E17BF9EE3CE5458B00
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID:
                • String ID: Keyboard$Mouse
                • API String ID: 0-3006158303
                • Opcode ID: d4e1811c8edbab2b6fb35fb20db9463ced812283e08e50415f522fa51c8cd959
                • Instruction ID: b8b50772b710d915baaff209213926c611c68dff227f8e74e66f35bf93431924
                • Opcode Fuzzy Hash: d4e1811c8edbab2b6fb35fb20db9463ced812283e08e50415f522fa51c8cd959
                • Instruction Fuzzy Hash: 10516B21B0E787C5EB148B18D060AB87792FB85B4AF544432DA6E476FCDE7CE606C750
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: Info$ExtraMessage$ItemMenumemset
                • String ID: P
                • API String ID: 842442315-3110715001
                • Opcode ID: 4d0e004271c1fb0424095dfd3d5481a7442c97678e057b6429daa1344b809c28
                • Instruction ID: 3c5940ee10a994e7241b498345be1caa78f262e9bc7ad859ec89c78ea5ad73fb
                • Opcode Fuzzy Hash: 4d0e004271c1fb0424095dfd3d5481a7442c97678e057b6429daa1344b809c28
                • Instruction Fuzzy Hash: 2441A122B1A7438AFB658A1394A4B7A76A2FF84B84F545035DE6D037F8DF3DE8058700
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: Notification$CompletionPowerSettingUnregisterUnsubscribeWait
                • String ID: Shutdown
                • API String ID: 2257264734-1825881236
                • Opcode ID: 8dcaf777d5d265dcd42d25c70f5cc6ad0115e4986f8c2e6d28e5be055e4d3fa6
                • Instruction ID: 84bcafc64cf624618a2b1b4d17a24aea43d48b6fe53c5e2728e0d470b09fa2e5
                • Opcode Fuzzy Hash: 8dcaf777d5d265dcd42d25c70f5cc6ad0115e4986f8c2e6d28e5be055e4d3fa6
                • Instruction Fuzzy Hash: EB31D726B1BB83C9EB05AB61D475BB87760FF85B46F484131C92E0A6FACF7CA1448350
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: Theme$Data$Open$BrushCloseColorCreateInfoMenuParentSolid
                • String ID: (
                • API String ID: 3676491578-3887548279
                • Opcode ID: e3a320bc293bac858c88161a4d8aec057999e43c75a525eacff6fcc29c3c3861
                • Instruction ID: 01358d1d7297a86ddbde5ce767014c2c54531170f178568bdfd7c1f6f1397072
                • Opcode Fuzzy Hash: e3a320bc293bac858c88161a4d8aec057999e43c75a525eacff6fcc29c3c3861
                • Instruction Fuzzy Hash: 4D118432B19B82CBE7508B26F450579B6A1FB89B80F549235EA9D43BA9DF3CD444CB00
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: CaptureContextDebugEntryFunctionLookupOutputStringUnwindVirtual
                • String ID: Invalid parameter passed to C runtime function.
                • API String ID: 711593133-455672764
                • Opcode ID: d59fb3a93b54dab40693933dc69d58620f2bd570f80b63e1f00d85e236449d9c
                • Instruction ID: a259f7c4592b72c03e4c921019033c488aa8f941936a409449de86df96050d39
                • Opcode Fuzzy Hash: d59fb3a93b54dab40693933dc69d58620f2bd570f80b63e1f00d85e236449d9c
                • Instruction Fuzzy Hash: CC11EF3661DF8282DB608B11F8647AAB361FB84745F501136DA9E42BB8DF3CD144CF00
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: CloseOpenQueryValue
                • String ID: Show$Software\Microsoft\Windows NT\CurrentVersion\Network\NwCategoryWizard
                • API String ID: 3677997916-4226369804
                • Opcode ID: 8735f647035f740ca9db86f7e6c157f387f26cafb1810ef5ec44c4c9d585c620
                • Instruction ID: 379a3918fba6677a6ee5bf9292861bc3ecdc4565cd3414f1043346b3c815f65d
                • Opcode Fuzzy Hash: 8735f647035f740ca9db86f7e6c157f387f26cafb1810ef5ec44c4c9d585c620
                • Instruction Fuzzy Hash: 18111572619B828BD7108F14E45066ABFB0FB89B94F815222EA9D43B78DF78C144CB00
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: Token$CheckCloseCreateDuplicateHandleKnownMembershipWell
                • String ID: D
                • API String ID: 2196538793-2746444292
                • Opcode ID: c4961c8796fb0fdad35307dae4d677b6e3cb150817bf92d265f5e95a61c4c9c2
                • Instruction ID: 84828a8af313d55e7e54dec3bfde8eb2d524600ed46b5d2c136bbf669adeea78
                • Opcode Fuzzy Hash: c4961c8796fb0fdad35307dae4d677b6e3cb150817bf92d265f5e95a61c4c9c2
                • Instruction Fuzzy Hash: 3E014072A19A87C6E7609F11E4207AAB7A0FB88748F845135EA9D436B9DF3CD109CF00
                APIs
                • StringFromIID.API-MS-WIN-CORE-COM-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00007FFDFB754F98
                • CoCreateInstance.API-MS-WIN-CORE-COM-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00007FFDFB755086
                • CoTaskMemFree.API-MS-WIN-CORE-COM-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00007FFDFB755298
                  • Part of subcall function 00007FFDFB723A90: TraceMessage.API-MS-WIN-EVENTING-CLASSICPROVIDER-L1-1-0 ref: 00007FFDFB723ABE
                • CoTaskMemFree.API-MS-WIN-CORE-COM-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00007FFDFB7552AD
                  • Part of subcall function 00007FFDFB727FB0: TraceMessage.API-MS-WIN-EVENTING-CLASSICPROVIDER-L1-1-0 ref: 00007FFDFB727FC6
                • CoTaskMemFree.API-MS-WIN-CORE-COM-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00007FFDFB75534E
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: FreeTask$MessageTrace$CreateFromInstanceString
                • String ID:
                • API String ID: 1813387934-0
                • Opcode ID: a4502f406a865198352991347b33f1b8131a150b80cee14ea91a79b97b8a73a8
                • Instruction ID: 6fe448198c95a75cf71f6196260a61b67cf028f6af568fb98558687f7c649d3a
                • Opcode Fuzzy Hash: a4502f406a865198352991347b33f1b8131a150b80cee14ea91a79b97b8a73a8
                • Instruction Fuzzy Hash: 2BE12C66B1AB4B89EB048B25D864BB93761FB84B48F100532DA2D477F8DF7CE546C340
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: CriticalSectionmemset$EnterLeaveMessageTrace
                • String ID: 0
                • API String ID: 174006268-4108050209
                • Opcode ID: a1bda7b31c7588a22669211c7f2c56df780d3a12355d975637ec7539e14091b9
                • Instruction ID: 9ef6ffcdd5593387ddae6f10bb994bc778d023b2ac218da38d1aa8eb376894c2
                • Opcode Fuzzy Hash: a1bda7b31c7588a22669211c7f2c56df780d3a12355d975637ec7539e14091b9
                • Instruction Fuzzy Hash: B9C1A122B1A78386EB108B24D420AB937A4FF44B88F584132DE6D47AF8DF7DE945C740
                APIs
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: memcmp
                • String ID:
                • API String ID: 1475443563-0
                • Opcode ID: 7a707ca650516ee599edca4087ef219ea392534da90d56b45aed6f2dec0eefb3
                • Instruction ID: 6f4f2195999dac6e1d83e13da23813abce99bc2ad7449a10644a2be71ebe78a0
                • Opcode Fuzzy Hash: 7a707ca650516ee599edca4087ef219ea392534da90d56b45aed6f2dec0eefb3
                • Instruction Fuzzy Hash: F6817262F1DBA6C5F7208B65C9108BC3360F759B88B045532EEAD57BA9DF38E691C340
                APIs
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: memcmp
                • String ID:
                • API String ID: 1475443563-0
                • Opcode ID: d2f9cd20405cd0af263e2382b0d4828e5ae88956ed197899e8bf4e5086ee2c98
                • Instruction ID: 29d3e0ebeae69fe7d7620db2fffa3af79c34a794c0efdf11f460dec3bf6f7349
                • Opcode Fuzzy Hash: d2f9cd20405cd0af263e2382b0d4828e5ae88956ed197899e8bf4e5086ee2c98
                • Instruction Fuzzy Hash: 97618D62B0E7C392EB608B26952097976A1FB55BC4F584431DEAD4BBF8DF38E4528700
                APIs
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: ErrorOriginatememmove_s
                • String ID:
                • API String ID: 3822173579-0
                • Opcode ID: 4c3743f01e13ef354bf6457d2d2dbcad23d9c5b7b9a67cd3bd1b1cc1c5a2a0d9
                • Instruction ID: dad0edd2fca70545e83c772c00c64ecde8effce3265cdf474284b102c1010666
                • Opcode Fuzzy Hash: 4c3743f01e13ef354bf6457d2d2dbcad23d9c5b7b9a67cd3bd1b1cc1c5a2a0d9
                • Instruction Fuzzy Hash: CF51D273B09653CAEB148B24D460ABDB7A2EB85B55B598031DA2D033B8DE39EA45C740
                APIs
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: QueryValue$EnvironmentExpandStringsfreememset
                • String ID:
                • API String ID: 4236772811-0
                • Opcode ID: cf91f01168601abc0213f5d5c3ba13d7898d2f695e57c059df432bd558f60a94
                • Instruction ID: c68ae2448acee8f4244d49bd0f9cb074d4d1e00d37d359766c6626503e443780
                • Opcode Fuzzy Hash: cf91f01168601abc0213f5d5c3ba13d7898d2f695e57c059df432bd558f60a94
                • Instruction Fuzzy Hash: E741923272AB4386E7208B15E4A0AAA73A0FB89754F415535EFAE477F8DF3CD4158B00
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: MessageTracememset
                • String ID: $!$"$0
                • API String ID: 1506953324-4058373275
                • Opcode ID: e536c67553402da7ecab4f4798e7c6b9686be1955da8f0808ed8c093f3441e94
                • Instruction ID: ea5af5fb25b691240cc8bc34d0cac2ea503e18b6e904abc0df49fb21f16b312c
                • Opcode Fuzzy Hash: e536c67553402da7ecab4f4798e7c6b9686be1955da8f0808ed8c093f3441e94
                • Instruction Fuzzy Hash: 6E416D21B1A78781FB648611A4B4FB9B290FB84784F644032D96D47AF9CF3EE9438751
                APIs
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: ImageLoad$MetricsSystem
                • String ID:
                • API String ID: 1504610575-0
                • Opcode ID: 64876c564a22756fe17c2110cc1e00fb356039a489f06a402dfe862d8247ebba
                • Instruction ID: 9082c3639a9ac84148a653fef2bcf8d66fca1fdd6c2a3daed20c9434bc162096
                • Opcode Fuzzy Hash: 64876c564a22756fe17c2110cc1e00fb356039a489f06a402dfe862d8247ebba
                • Instruction Fuzzy Hash: DF315272B097818BE7108F15E824A6ABBA1F789B84F644135DE8A03BB9DF7DD545CF00
                APIs
                • AcquireSRWLockExclusive.API-MS-WIN-CORE-SYNCH-L1-1-0 ref: 00007FFDFB72A0A0
                • ReleaseSRWLockExclusive.API-MS-WIN-CORE-SYNCH-L1-1-0 ref: 00007FFDFB72A105
                • AcquireSRWLockExclusive.API-MS-WIN-CORE-SYNCH-L1-1-0 ref: 00007FFDFB72A0D0
                  • Part of subcall function 00007FFDFB72A1B0: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FFDFB72A232
                  • Part of subcall function 00007FFDFB72A1B0: HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FFDFB72A246
                  • Part of subcall function 00007FFDFB72A1B0: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FFDFB72A25E
                  • Part of subcall function 00007FFDFB72A1B0: memcpy_s.MSVCRT ref: 00007FFDFB72A2A4
                  • Part of subcall function 00007FFDFB72A1B0: memcpy_s.MSVCRT ref: 00007FFDFB72A2FF
                • ReleaseSRWLockExclusive.API-MS-WIN-CORE-SYNCH-L1-1-0 ref: 00007FFDFB72A13C
                • AcquireSRWLockExclusive.API-MS-WIN-CORE-SYNCH-L1-1-0 ref: 00007FFDFB72A16F
                  • Part of subcall function 00007FFDFB72A560: GetCurrentProcessId.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0 ref: 00007FFDFB72A5AC
                  • Part of subcall function 00007FFDFB72A560: CreateMutexExW.API-MS-WIN-CORE-SYNCH-L1-1-0 ref: 00007FFDFB72A5EE
                  • Part of subcall function 00007FFDFB72A560: WaitForSingleObjectEx.API-MS-WIN-CORE-SYNCH-L1-1-0 ref: 00007FFDFB72A616
                  • Part of subcall function 00007FFDFB72A560: AcquireSRWLockExclusive.API-MS-WIN-CORE-SYNCH-L1-1-0 ref: 00007FFDFB72A6B7
                  • Part of subcall function 00007FFDFB72A560: ReleaseSRWLockExclusive.API-MS-WIN-CORE-SYNCH-L1-1-0 ref: 00007FFDFB72A6DB
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: ExclusiveLock$Acquire$HeapProcessRelease$memcpy_s$AllocCreateCurrentMutexObjectSingleWait
                • String ID:
                • API String ID: 1277259480-0
                • Opcode ID: c38842d774aef9658f10d8ec4bb2b1aefe100bc1343fdc6ce5b55d1b86e6860c
                • Instruction ID: 0b26ffb53f6bc9533db1dbbeb70bc87c1a77caeec7944abfb8e5aae0a850e77b
                • Opcode Fuzzy Hash: c38842d774aef9658f10d8ec4bb2b1aefe100bc1343fdc6ce5b55d1b86e6860c
                • Instruction Fuzzy Hash: 60310235B0AB8B8AEB409B11B9309B5B761EF45BA4F544235DE2D037F9DF7CA4068700
                APIs
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: ExceptionThrowfree
                • String ID:
                • API String ID: 2053033275-0
                • Opcode ID: f929982556b87a0f42150aeb154d83ce3a47bb6e1ccf65c18678d7e9be3beb7d
                • Instruction ID: 4568b01bd9ffe75f1d779dd7198eb0cc48d2423b354c60fffac35c8f5f66be37
                • Opcode Fuzzy Hash: f929982556b87a0f42150aeb154d83ce3a47bb6e1ccf65c18678d7e9be3beb7d
                • Instruction Fuzzy Hash: 2EF09C55B19742C6D31CFA3298324BA2221FFC4340F149435FD6E4B5FEDE24D4214640
                APIs
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: ErrorLast$DeactivateExceptionThrowfree
                • String ID:
                • API String ID: 564149058-0
                • Opcode ID: 45c65efb2dab07c626524989aeb257e2fa50df9931fa76c318657804a8360d53
                • Instruction ID: b586b67ddc718c6a2912fed0f3dce013c04a278eb04475e2b6bddb39799092e2
                • Opcode Fuzzy Hash: 45c65efb2dab07c626524989aeb257e2fa50df9931fa76c318657804a8360d53
                • Instruction Fuzzy Hash: A001D232F0A783CFE7185F71A86457976A1EF48B45F089039DE2E092F9CF3C94858A00
                APIs
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: CloseCriticalHandleSection$EnterEventLeaveObjectSingleWait
                • String ID:
                • API String ID: 3326452711-0
                • Opcode ID: d064b086edd4d9094e167867d2d2ed983e5a6ee41f4ff45ee88c60ef46620f53
                • Instruction ID: 58165b0d8ca3fd221baa0dcade06749de2b1fa781a20e09ddb1aaf2747383be2
                • Opcode Fuzzy Hash: d064b086edd4d9094e167867d2d2ed983e5a6ee41f4ff45ee88c60ef46620f53
                • Instruction Fuzzy Hash: AF311C3270AB8785EB559B20D8647B977A1EB89B09F6C4131C96E0A6F9CF3DD4C5C320
                APIs
                • InterlockedPopEntrySList.API-MS-WIN-CORE-INTERLOCKED-L1-1-0 ref: 00007FFDFB75115E
                  • Part of subcall function 00007FFDFB751220: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FFDFB751153), ref: 00007FFDFB75123C
                  • Part of subcall function 00007FFDFB751220: HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FFDFB751153), ref: 00007FFDFB751254
                  • Part of subcall function 00007FFDFB751220: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FFDFB751153), ref: 00007FFDFB751272
                  • Part of subcall function 00007FFDFB751220: HeapFree.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FFDFB751153), ref: 00007FFDFB751286
                • VirtualAlloc.API-MS-WIN-CORE-MEMORY-L1-1-0 ref: 00007FFDFB751191
                • InterlockedPopEntrySList.API-MS-WIN-CORE-INTERLOCKED-L1-1-0 ref: 00007FFDFB7511B2
                • VirtualFree.API-MS-WIN-CORE-MEMORY-L1-1-0 ref: 00007FFDFB7511D1
                • InterlockedPushEntrySList.API-MS-WIN-CORE-INTERLOCKED-L1-1-0 ref: 00007FFDFB7511F3
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: Heap$EntryInterlockedList$AllocFreeProcessVirtual$Push
                • String ID:
                • API String ID: 2531268086-0
                • Opcode ID: 54db70fdfbac7a9d299e1b19915eef870a9c16ef599500f8cde180d72218007a
                • Instruction ID: b08ac704f062615523ef8bcafb053015941189fe2c6043810d08bf1160b23b2b
                • Opcode Fuzzy Hash: 54db70fdfbac7a9d299e1b19915eef870a9c16ef599500f8cde180d72218007a
                • Instruction Fuzzy Hash: F3214421B1AB4786EB154B55E470978BA91FF8DB81F449135C92E477BCDE3CE1418740
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: ExceptionThrowfreestd::bad_exception::bad_exception
                • String ID: invalid map/set<T> iterator
                • API String ID: 2209577848-152884079
                • Opcode ID: 2d97fd9525572e8972efce6cb702154dc0c66a2f5bc78b491f5a62f3037f7174
                • Instruction ID: 88767acf21342fafb08abb95d2c9396a9c1b910add3367bd743e70abd0f3709d
                • Opcode Fuzzy Hash: 2d97fd9525572e8972efce6cb702154dc0c66a2f5bc78b491f5a62f3037f7174
                • Instruction Fuzzy Hash: 28B184A3B0E786C5EB618B26D06097C3BA4E755B85B588536CBAE073F9CF38D950C701
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: CreateSemaphore
                • String ID: _p0$wil
                • API String ID: 1078844751-1814513734
                • Opcode ID: 20aa24c0ab1dbb927326c30937100d7dac634ed9cf95e5f2bb83b11db6424e04
                • Instruction ID: 17453d111e73d04310d70fe58f8401a0ebad6454974eb7071b65ee0645e32d6a
                • Opcode Fuzzy Hash: 20aa24c0ab1dbb927326c30937100d7dac634ed9cf95e5f2bb83b11db6424e04
                • Instruction Fuzzy Hash: 1E51D561B1B74386EF658F289074EB97291AF84B80F684435DA6E077F9DF3CE4848300
                APIs
                  • Part of subcall function 00007FFDFB73D650: EnterCriticalSection.API-MS-WIN-CORE-SYNCH-L1-1-0 ref: 00007FFDFB73D663
                • LeaveCriticalSection.API-MS-WIN-CORE-SYNCH-L1-1-0 ref: 00007FFDFB744841
                • PostMessageW.USER32 ref: 00007FFDFB744867
                • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FFDFB744889
                  • Part of subcall function 00007FFDFB723A90: TraceMessage.API-MS-WIN-EVENTING-CLASSICPROVIDER-L1-1-0 ref: 00007FFDFB723ABE
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: CriticalMessageSection$EnterErrorLastLeavePostTrace
                • String ID: "
                • API String ID: 4217609029-123907689
                • Opcode ID: 9776b688d99e38d592ac32283b61dc4e699151bb67a9d59fb77dae3c274c1eee
                • Instruction ID: 90ace0a13e311c1f78a9b8b6fae3d7caa255075db67658af729c2e81f4f250dc
                • Opcode Fuzzy Hash: 9776b688d99e38d592ac32283b61dc4e699151bb67a9d59fb77dae3c274c1eee
                • Instruction Fuzzy Hash: 11514B32B0A783C6EB109B26E460AB937A4FB84B85F144132DA2D572F9DF39D942C740
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: Close$PathPersistentQueryValue
                • String ID: UseBrandingNameOnRoaming
                • API String ID: 2205690383-1302254536
                • Opcode ID: f34513b6d1cfb98aa38c679ad5dcb148d6712fee7d6360d823516bea625462b7
                • Instruction ID: 7be742e93cd0f22a7c89426579a8435d3f0fcd701afecd26d063250b63923fc1
                • Opcode Fuzzy Hash: f34513b6d1cfb98aa38c679ad5dcb148d6712fee7d6360d823516bea625462b7
                • Instruction Fuzzy Hash: EB41A072B0A7838AFB208F14E4A4EB9B691FB84754F544135DA6D466F9DF3CE445CB00
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: Close$PathPersistentQueryValue
                • String ID: BrandingName
                • API String ID: 2205690383-661740910
                • Opcode ID: 96faf96021dfc57cead4bed4e63d731d5d1d1582b28077ae35916a7560beac2e
                • Instruction ID: 291a73c188d421a8e0994513a7434dbf1916dfd38a0e2b5c815840375672ed48
                • Opcode Fuzzy Hash: 96faf96021dfc57cead4bed4e63d731d5d1d1582b28077ae35916a7560beac2e
                • Instruction Fuzzy Hash: D4418322B0A7838EFB24CB55A4A4BB576A2FB84748F145135DE6D46AF8CF3CD545CB00
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: CheckCreateKnownMembershipMessageTokenTraceWellmemset
                • String ID: D
                • API String ID: 370548498-2746444292
                • Opcode ID: 47dbab31edaa5bc712caadbb287e23633c77a51c5d5734c2a29828555efd04ca
                • Instruction ID: 501f2ed1c20c92885e53ec24551ad7814a26cbc77f595eff0443dec9400d66c6
                • Opcode Fuzzy Hash: 47dbab31edaa5bc712caadbb287e23633c77a51c5d5734c2a29828555efd04ca
                • Instruction Fuzzy Hash: AD311821B0A78786EB54CB21E460BA973A1FB88B48F544076DA6D43AFDDF3CD506CB40
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: EventSessionTransferWrite_cwprintf_s_l
                • String ID: @%s,-%d$dot3mm.dll
                • API String ID: 2706308623-1210809606
                • Opcode ID: b8a6dcd9e8ceb728b61aeb3ed0a4a3a5c72cc1dab4ef17f666a14faf4fc04a17
                • Instruction ID: 5bbf937ec41224e0c488da625228d7cdab2bed7d1df58d07181ea1102bf65362
                • Opcode Fuzzy Hash: b8a6dcd9e8ceb728b61aeb3ed0a4a3a5c72cc1dab4ef17f666a14faf4fc04a17
                • Instruction Fuzzy Hash: 82314B22B1AB47C6EB008B24E460BBA7361FB89749F500536DA6D06AFDDF7CE509C700
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: ExceptionThrowmallocstd::bad_exception::bad_exception
                • String ID: invalid string position
                • API String ID: 2575240680-1799206989
                • Opcode ID: e74a6710be736b20ce9bee850a77266f656f27d82d25afb781afd5f61ea51532
                • Instruction ID: 7a341e88e4e66feb00db60eb8bead8b43507e5a6480c05026d532f00f9d7b701
                • Opcode Fuzzy Hash: e74a6710be736b20ce9bee850a77266f656f27d82d25afb781afd5f61ea51532
                • Instruction Fuzzy Hash: 62011A31B1EB07C1EB209B24E8617A57360FB84324F901235D5BD467F8DEACE5558B00
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: ClassCompareFromNameOrdinalPointStringWindow
                • String ID: #32768
                • API String ID: 517833829-207879865
                • Opcode ID: 293e7aa6a67ad7470b1d46c906cd305e1512a8dc1589c4757cac4da0622754ec
                • Instruction ID: f1b266b9d9f605da73de6628f5601f1eba0956c0a8b2498a6d0310fb30f9b03e
                • Opcode Fuzzy Hash: 293e7aa6a67ad7470b1d46c906cd305e1512a8dc1589c4757cac4da0622754ec
                • Instruction Fuzzy Hash: AB01887271AB828AEB109B20E8647B97B51FB99B45F445131C95E473F9DF3CD048C740
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: AddressProc
                • String ID: RtlDisownModuleHeapAllocation$ntdll.dll
                • API String ID: 190572456-704576883
                • Opcode ID: 0b5e80733dbb8ffab5c5b879942910f7fd40a7f10258ec86286d861d788ab677
                • Instruction ID: da127c779ad46fdfdf7906424b9cf451b5bbf68914f0159b27f023da1eb3cb9d
                • Opcode Fuzzy Hash: 0b5e80733dbb8ffab5c5b879942910f7fd40a7f10258ec86286d861d788ab677
                • Instruction Fuzzy Hash: A901E424B1BB4785EF048B25F974878B6A1EF59B80B689035CD6E027FCEF3CE4848600
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: AddressHandleModuleProc
                • String ID: RtlDllShutdownInProgress$ntdll.dll
                • API String ID: 1646373207-582119455
                • Opcode ID: cd20572c8f1bb05b0ca35a68f8dc3dd44d82c303cc387b520899c8841c0453ad
                • Instruction ID: 02230b8ba8f7fc1054a4170186c20fc640338758fd29b70daa212eb2c0b771ec
                • Opcode Fuzzy Hash: cd20572c8f1bb05b0ca35a68f8dc3dd44d82c303cc387b520899c8841c0453ad
                • Instruction Fuzzy Hash: BDF0ED28B1BB079AEB158B54A8748B476A1FF59701B586435CC2E023F8EE6CE4888620
                APIs
                • EnterCriticalSection.API-MS-WIN-CORE-SYNCH-L1-1-0 ref: 00007FFDFB725CD1
                • LeaveCriticalSection.API-MS-WIN-CORE-SYNCH-L1-1-0 ref: 00007FFDFB725EAB
                  • Part of subcall function 00007FFDFB727FB0: TraceMessage.API-MS-WIN-EVENTING-CLASSICPROVIDER-L1-1-0 ref: 00007FFDFB727FC6
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: CriticalSection$EnterLeaveMessageTrace
                • String ID: @$yes
                • API String ID: 2067524592-992443270
                • Opcode ID: ce57a078f34fe898b716455512bdc8fdcd3e4f6112672213544e9b30ee54c958
                • Instruction ID: e49e99c8fed1e6e90d83bde9d38ff08f4237f172426310da1076650c52896dc6
                • Opcode Fuzzy Hash: ce57a078f34fe898b716455512bdc8fdcd3e4f6112672213544e9b30ee54c958
                • Instruction Fuzzy Hash: FF024D61B0A74389F7608B25D460BB937A1FB84B48F284136CE6D566F8DF7CE586C740
                APIs
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: EventInitOnce$BeginCompleteInformationInitializeRegister
                • String ID:
                • API String ID: 3136474517-0
                • Opcode ID: ec6d5c6911c0da270c98e73c9946d5773698dd33bfa72fba721bb97a81a57714
                • Instruction ID: b365136abd59ed876d3153b7ffad07350ff13cff242fe14aef3bd1610d711df9
                • Opcode Fuzzy Hash: ec6d5c6911c0da270c98e73c9946d5773698dd33bfa72fba721bb97a81a57714
                • Instruction Fuzzy Hash: 24023732B0AB42C9E7108F65E4505AD77B8FB48748B604236EEAD17BB8EF38D554CB40
                APIs
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: CreateCriticalInstanceSection$EnterLeave
                • String ID:
                • API String ID: 1614763547-0
                • Opcode ID: 6b84bb6e75c2817ef77435bb88f9a52920b82db3440772bd2a3a25f613545281
                • Instruction ID: ebbfb3e90fe1d5f735d6675e90433d318590f9004ac71a60d4f71666efd6f941
                • Opcode Fuzzy Hash: 6b84bb6e75c2817ef77435bb88f9a52920b82db3440772bd2a3a25f613545281
                • Instruction Fuzzy Hash: 30813D22B0AB47DAE7009B75D860BAC33A1FB84748F594132DA2D53BF9DE79E645C340
                APIs
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: Free$CriticalSectionTask$EnterLeaveMessageStringTrace
                • String ID:
                • API String ID: 4219247863-0
                • Opcode ID: 2947722bf185f20f8ec9bea274f1a54f85b9fdc5c5f99de839ca474f7c6f3160
                • Instruction ID: fb5dceb5b72e6429b2793f636730a2a854c86789234f3a13167c3a81001bcabe
                • Opcode Fuzzy Hash: 2947722bf185f20f8ec9bea274f1a54f85b9fdc5c5f99de839ca474f7c6f3160
                • Instruction Fuzzy Hash: F0714762B0AB47C9EB108B65D460BB937A1FB49B89F144132DE2D17AF9DF38E645C340
                APIs
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: EventInitOnce$BeginCompleteInformationInitializeRegister
                • String ID:
                • API String ID: 3136474517-0
                • Opcode ID: 34f1d94cc31a56f78b54de444b3a1f12349b53f456c44189566b2c83814873bf
                • Instruction ID: d84cd6643acbdfc2166b715455a6e7423de9a73f17a6696779686940edb0724e
                • Opcode Fuzzy Hash: 34f1d94cc31a56f78b54de444b3a1f12349b53f456c44189566b2c83814873bf
                • Instruction Fuzzy Hash: 3F512B76B0AB828AE7108F24F4506A9B7A4FB48B40F544136DAAC43BB8DF7CE155CB40
                APIs
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: InfoItemMenumemset
                • String ID:
                • API String ID: 3858859670-0
                • Opcode ID: 637ad80f38c16335eb6a4a431d0b3b3a1cbf29cbe9b185d9ea8042b6af742b0b
                • Instruction ID: 31255f9a9dfb95102a65fb4e4ed70f89bd07c2a7f6dcd93a077664376cd21afd
                • Opcode Fuzzy Hash: 637ad80f38c16335eb6a4a431d0b3b3a1cbf29cbe9b185d9ea8042b6af742b0b
                • Instruction Fuzzy Hash: 0431AE36B16B028EF7148BA2C410BAD37B2FB49B88F458535CE1D177A8DF78D5058740
                APIs
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: CaptureContextEntryFunctionLookupUnwindVirtual__raise_securityfailure
                • String ID:
                • API String ID: 140117192-0
                • Opcode ID: 868a6da404d5b864c666a88854808e08c179270f2f5571870445e3160d360b38
                • Instruction ID: 24271999e52a31259b6a61005a1cd68d3089b87b0de1e3d17bc1d9c6f30594f1
                • Opcode Fuzzy Hash: 868a6da404d5b864c666a88854808e08c179270f2f5571870445e3160d360b38
                • Instruction Fuzzy Hash: 0141B539B0AB0685EB508B19F874B6573A4FB88744F644536DAAD837B8EFBCE544C700
                APIs
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: CloseCreateCriticalEventHandleItemLeaveMessageQueueSectionTraceUserWork
                • String ID:
                • API String ID: 2150000617-0
                • Opcode ID: a71a2186ebd956a78149c84c9e2c850d289acddfadcb5418360354572d2b2af3
                • Instruction ID: 288a6062f7a5ef44eebd318efc97e9623b2e201df6f6e441715a605c12c9a803
                • Opcode Fuzzy Hash: a71a2186ebd956a78149c84c9e2c850d289acddfadcb5418360354572d2b2af3
                • Instruction Fuzzy Hash: AE313B3270EB8685EB508F50E464BB877A0EB89B54F684535CA6E0A7F8DF38D494C700
                APIs
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: calloc$freememmove_s
                • String ID:
                • API String ID: 3942310398-0
                • Opcode ID: 115d3ed95cdd97c390bcb0efdb685ed300a3ee6085e65316fbd4433646e034ec
                • Instruction ID: 7aea30d7bb264452bcf4b84ae4edfdf23e8018ceab64880c593e1b4ae182a2c6
                • Opcode Fuzzy Hash: 115d3ed95cdd97c390bcb0efdb685ed300a3ee6085e65316fbd4433646e034ec
                • Instruction Fuzzy Hash: BC21393270AB42C6EF548B15E660679B7A2EB59FC5F149032DA6E03BB8DE3CD5418200
                APIs
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: DeleteObject$IconInfomemset
                • String ID:
                • API String ID: 1908085422-0
                • Opcode ID: 84369dff8c71c924dc7650fdfaa2266940b8fb4b14ef30826ed31b8506cec568
                • Instruction ID: 1038093866632a764d33b81e4016bdda75bbd646344be73cefd4bfff1e8a20a6
                • Opcode Fuzzy Hash: 84369dff8c71c924dc7650fdfaa2266940b8fb4b14ef30826ed31b8506cec568
                • Instruction Fuzzy Hash: 2A21292670AB87C5EB608B15E460A7977A0FB89B84F544531DAAD47BB8DF2CD501CB00
                APIs
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: ??0exception@@ExceptionThrowfreemallocmemcpy_s
                • String ID:
                • API String ID: 570582955-0
                • Opcode ID: 42840411fef01bfb470fcbd911f6f63f136c3a25cef0f8cd133c5691d857cbdf
                • Instruction ID: a230afb56bc6109ad336aebb0f870388d7b4a851668584469a56528b3670c3f0
                • Opcode Fuzzy Hash: 42840411fef01bfb470fcbd911f6f63f136c3a25cef0f8cd133c5691d857cbdf
                • Instruction Fuzzy Hash: 9321B032719B8392EB248B11E4645AD7360FB457A0F545232DE7E03AF8DF38E1A5C740
                APIs
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: DeleteObject$IconInfomemset
                • String ID:
                • API String ID: 1908085422-0
                • Opcode ID: 3567d7d5ffbcc4ffd23fdd426752053b560fce63d43e5693bd8cc5ac984b632c
                • Instruction ID: f2fe50ed301f074d7f7f770190ac78e551da5ab3d34eb644fe1c799f2a3d009c
                • Opcode Fuzzy Hash: 3567d7d5ffbcc4ffd23fdd426752053b560fce63d43e5693bd8cc5ac984b632c
                • Instruction Fuzzy Hash: F9212C71B0A78786EB548B51E860B79B661FF89784F549031DE6E467F9DF2CE4008B00
                APIs
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 3d72d404aea7797768d8f124075b7dbbc94456b156591b29b66e2452a1865016
                • Instruction ID: bb8dd980b68109e71ff44334a3356d4b55f99b2e78f9c2e438f71c92a13fc375
                • Opcode Fuzzy Hash: 3d72d404aea7797768d8f124075b7dbbc94456b156591b29b66e2452a1865016
                • Instruction Fuzzy Hash: 9A110636720BA18BC7008F56E848829FBA5F78DFD0B56902ADE5953728DB38E841CB04
                APIs
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: CaptureContextEntryFunctionLookupUnwindVirtual__raise_securityfailure
                • String ID:
                • API String ID: 140117192-0
                • Opcode ID: 91b3b45c9acead05d1413a745e915e80743e252c1f0a1dbb0be536276360cf9b
                • Instruction ID: fbb7855f7616a2a6f647d5c7d49d160ca91e98ac3f5a35f82aef8d8a2c95b5c5
                • Opcode Fuzzy Hash: 91b3b45c9acead05d1413a745e915e80743e252c1f0a1dbb0be536276360cf9b
                • Instruction Fuzzy Hash: 1D21B739A0AB4685E700CB05F864B6977A4FB89754F600036DA9D837B8EFBDE144CB00
                APIs
                • EnterCriticalSection.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,00007FFDFB748E94,?,?,?,?,?,?,?,?,00007FFDFB72DA8D), ref: 00007FFDFB748DF1
                • AcquireSRWLockExclusive.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,00007FFDFB748E94,?,?,?,?,?,?,?,?,00007FFDFB72DA8D), ref: 00007FFDFB748E00
                • ReleaseSRWLockExclusive.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,00007FFDFB748E94,?,?,?,?,?,?,?,?,00007FFDFB72DA8D), ref: 00007FFDFB748E37
                • LeaveCriticalSection.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,00007FFDFB748E94,?,?,?,?,?,?,?,?,00007FFDFB72DA8D), ref: 00007FFDFB748E4B
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: CriticalExclusiveLockSection$AcquireEnterLeaveRelease
                • String ID:
                • API String ID: 1115728412-0
                • Opcode ID: 11e39349885d8ac39c58ec7fdb31d6663da80208b7b6b8b7831f35138cce8ca2
                • Instruction ID: 49034e3fc185c48de793f8b85c2b8051c038a22deee24bac3d78e67934773434
                • Opcode Fuzzy Hash: 11e39349885d8ac39c58ec7fdb31d6663da80208b7b6b8b7831f35138cce8ca2
                • Instruction Fuzzy Hash: 26018022B19B87C6DB148B11A664538F761FB89FC1B089231CE5E03778DF3CD1808300
                APIs
                • EnterCriticalSection.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,?,?,00007FFDFB741D19), ref: 00007FFDFB75E944
                • LeaveCriticalSection.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,?,?,00007FFDFB741D19), ref: 00007FFDFB75E954
                • DeleteCriticalSection.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,?,?,00007FFDFB741D19), ref: 00007FFDFB75E964
                • free.MSVCRT ref: 00007FFDFB75E98E
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: CriticalSection$DeleteEnterLeavefree
                • String ID:
                • API String ID: 682159224-0
                • Opcode ID: 17d9cd2f789f37edc1da884b9dff5d1bd6031f2b449339cbe17bb3102176f36d
                • Instruction ID: a5075010b63d3ab45986433e7d2a02b49f9d576ddcfbca8e390f9640fdc0e69c
                • Opcode Fuzzy Hash: 17d9cd2f789f37edc1da884b9dff5d1bd6031f2b449339cbe17bb3102176f36d
                • Instruction Fuzzy Hash: 88015A32645B4297D7009B21E5247A9B720FB8BBA5F545731CB6E036F9CF38D065C700
                APIs
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: CapsDevice$Release
                • String ID:
                • API String ID: 1035833867-0
                • Opcode ID: d572a5c58beb939e634c482cf87b0d9157cdfddff7a2034a817eda6445df6460
                • Instruction ID: 1e2e3661ee237fe32fde4cf394be9e252548bf1a39f7bbc93fee43d9e7a6224c
                • Opcode Fuzzy Hash: d572a5c58beb939e634c482cf87b0d9157cdfddff7a2034a817eda6445df6460
                • Instruction Fuzzy Hash: 82011A32A0AB42CBDB444F25B41412ABAA2FB4DB81F49C034DA5E477A8DF3DD4908B00
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: ExceptionThrowstd::bad_exception::bad_exception
                • String ID: map/set<T> too long
                • API String ID: 1480402491-1285458680
                • Opcode ID: 2312452f07875b0fab671b09942885b3c2f4135b022df159eac2a4d2a3c7627c
                • Instruction ID: e44663722113571c6ff6053a3badd400826d04e14f0883d3395f7923eb6bd0d9
                • Opcode Fuzzy Hash: 2312452f07875b0fab671b09942885b3c2f4135b022df159eac2a4d2a3c7627c
                • Instruction Fuzzy Hash: 81516B6270AB86C1DB60CB2AD46066D7BA0E788F94F548136DEAD073B9CF78D991C700
                APIs
                  • Part of subcall function 00007FFDFB747B54: EventActivityIdControl.API-MS-WIN-EVENTING-PROVIDER-L1-1-0 ref: 00007FFDFB747BBA
                  • Part of subcall function 00007FFDFB747B54: ReleaseSRWLockExclusive.API-MS-WIN-CORE-SYNCH-L1-1-0 ref: 00007FFDFB747BDE
                  • Part of subcall function 00007FFDFB747B54: GetCurrentThreadId.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0 ref: 00007FFDFB747C19
                • ReleaseSRWLockExclusive.API-MS-WIN-CORE-SYNCH-L1-1-0 ref: 00007FFDFB74B66B
                  • Part of subcall function 00007FFDFB723A90: TraceMessage.API-MS-WIN-EVENTING-CLASSICPROVIDER-L1-1-0 ref: 00007FFDFB723ABE
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: ExclusiveLockReleasememset$#162ActivityControlCurrentEventMessageThreadTrace
                • String ID: PNILaunchBowser$http://www.msftconnecttest.com/redirect
                • API String ID: 3778070538-3197084993
                • Opcode ID: d2b51af5db7bf57eb47152bd8c7732ae004fb8cf0f2cf44e7b7f1b437c1a5ab0
                • Instruction ID: 9123eabc183b1cc5fd89a98fd306c6f8aefb1fcf160f8d8a8b44d9db8fbaf52f
                • Opcode Fuzzy Hash: d2b51af5db7bf57eb47152bd8c7732ae004fb8cf0f2cf44e7b7f1b437c1a5ab0
                • Instruction Fuzzy Hash: 0831913671AB82C5E710DB25E860AA9B3A0FB85754F401232EAAD437F9DF7CD605CB40
                APIs
                • CoSetProxyBlanket.API-MS-WIN-CORE-COM-L1-1-0 ref: 00007FFDFB753D97
                • CoSetProxyBlanket.API-MS-WIN-CORE-COM-L1-1-0 ref: 00007FFDFB753DFE
                  • Part of subcall function 00007FFDFB727FB0: TraceMessage.API-MS-WIN-EVENTING-CLASSICPROVIDER-L1-1-0 ref: 00007FFDFB727FC6
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: BlanketProxy$MessageTrace
                • String ID:
                • API String ID: 381658971-3916222277
                • Opcode ID: 1398ed6ea06c746321b4c39894eb689f785f72b7d7efbbbaa6a1a957d0d11635
                • Instruction ID: 731d5872143a8e0bb50558f2534195b9942ccb6b156092d336cf175984b47770
                • Opcode Fuzzy Hash: 1398ed6ea06c746321b4c39894eb689f785f72b7d7efbbbaa6a1a957d0d11635
                • Instruction Fuzzy Hash: 39414F36729B4786EB108B19E46466977A1FB84BA4F100326EA7E437F8CF7CD446CB40
                APIs
                • CoTaskMemAlloc.API-MS-WIN-CORE-COM-L1-1-0(ImmersiveContextMenuArray_%lu-%lu,?,?,00007FFDFB740230,?,?,00000001,00007FFDFB743470,?,?,?,?,00007FFDFB7646DB), ref: 00007FFDFB749CA9
                • CoTaskMemRealloc.API-MS-WIN-CORE-COM-L1-1-0(ImmersiveContextMenuArray_%lu-%lu,?,?,00007FFDFB740230,?,?,00000001,00007FFDFB743470,?,?,?,?,00007FFDFB7646DB), ref: 00007FFDFB749D13
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: Task$AllocRealloc
                • String ID: ImmersiveContextMenuArray_%lu-%lu
                • API String ID: 1769333971-1220520276
                • Opcode ID: 5aca1ed25ac4cfa2b56f67574789a59c355bf6013b00d442575131325a4c1176
                • Instruction ID: 2c497fbd7ef7f11d2faabda35139fc88c50f89177361b4350f11cc04c8ee6bfc
                • Opcode Fuzzy Hash: 5aca1ed25ac4cfa2b56f67574789a59c355bf6013b00d442575131325a4c1176
                • Instruction Fuzzy Hash: 5A31AF32B0AB43CAE7108F11E020AA976A0FB49B96F544631DB6D177F9CF3DE6528700
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: Variant$ClearInitMessageTrace
                • String ID: NA_NetworkClass
                • API String ID: 1865639329-1795230796
                • Opcode ID: 7fab68b17ea7da11521a03c840233657de6a3aedfa1b0d800f89e99fb731b460
                • Instruction ID: 8644c2aefccf5cd585be1dec7b7b0ce87e462a06de1a09e2615b6970e031941a
                • Opcode Fuzzy Hash: 7fab68b17ea7da11521a03c840233657de6a3aedfa1b0d800f89e99fb731b460
                • Instruction Fuzzy Hash: 75313032B1AB4786EB009B15E464A697761FB88B84F544032DA6E43BFDDF3CE506CB40
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: Window$ClassCompareFromLongMessageNameOrdinalPointRegisterString
                • String ID: TileContextMenuWindowMessage
                • API String ID: 149515259-1060233165
                • Opcode ID: 39544ab28377436d57dc2c924ec54b2e3117ebeaee9c8e6a5b0d14a8734c61aa
                • Instruction ID: 724f5fbc76f3c270878fb98db6ee038aacceb0a7e40b4720be80ff67c2cd5249
                • Opcode Fuzzy Hash: 39544ab28377436d57dc2c924ec54b2e3117ebeaee9c8e6a5b0d14a8734c61aa
                • Instruction Fuzzy Hash: F721F821B0E3834AE754AB2AA4609B97E92EB49BC0F154035E96DD36F9DE3CDC418350
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: BlanketProxy
                • String ID:
                • API String ID: 3890896728-3916222277
                • Opcode ID: 6505b2a2af68afdae4203463d0cdbe94dbc2ae80536dff4c2a698d80f194e834
                • Instruction ID: 8e882879fee28566d3edc050db7b6eaf37c29a32eff3aecc197cb5f96ae8b25d
                • Opcode Fuzzy Hash: 6505b2a2af68afdae4203463d0cdbe94dbc2ae80536dff4c2a698d80f194e834
                • Instruction Fuzzy Hash: FB212B36719B4786E7008B25E46876977A1FB89BA5F104322DA3D077F8DFBCD5058B00
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: Value
                • String ID: SOFTWARE\Microsoft\Windows\CurrentVersion\Themes\Personalize$SystemUsesLightTheme
                • API String ID: 3702945584-3753107525
                • Opcode ID: ce6bd17d80b471bb324bb06dcdc80a4564c576c0c9f16a804c7c76d14bb6746d
                • Instruction ID: 3811e4052ecffa7cdb2927795a7b550f43f4e765ff09f03d4a9aa2be394e4352
                • Opcode Fuzzy Hash: ce6bd17d80b471bb324bb06dcdc80a4564c576c0c9f16a804c7c76d14bb6746d
                • Instruction Fuzzy Hash: 0B21B072B097438EEB048B11D06466E77E6F744790FA1013AD6A9427F8DB39DA45CB40
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: InfoItemMenumemset
                • String ID: P
                • API String ID: 3858859670-3110715001
                • Opcode ID: 32930ff52c6aee03d752fe585073e727d4777b21ab89a3205d65ebf798fb46ce
                • Instruction ID: 6f7baf8f7d3bd1267c03830330e0bae9c1112d4e884c060c12fea1b37cd44be1
                • Opcode Fuzzy Hash: 32930ff52c6aee03d752fe585073e727d4777b21ab89a3205d65ebf798fb46ce
                • Instruction Fuzzy Hash: A81193327097438AE7208E12A01096A73A2FB88B84F584034EE6D437BACF3DE9418B00
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: DrawTextThemememset
                • String ID: H
                • API String ID: 340441712-2852464175
                • Opcode ID: b92c910a3dec61bad9395927be7c3c611ce98f5fb4650a9d9e34526c230a28f2
                • Instruction ID: b46846ff2f3f2614abb8fe57a57764b9e1c667b6845ba6b6f33880979857caab
                • Opcode Fuzzy Hash: b92c910a3dec61bad9395927be7c3c611ce98f5fb4650a9d9e34526c230a28f2
                • Instruction Fuzzy Hash: 3A111332709BC58AD7A0CB05F48079AB7A4F388BD4F448026EA8D53B28DB79C549CB40
                APIs
                • InitializeCriticalSectionEx.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,?,00007FFDFB721129), ref: 00007FFDFB72238B
                • InitializeCriticalSectionEx.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,?,00007FFDFB721129), ref: 00007FFDFB7223B9
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: CriticalInitializeSection
                • String ID: WilStaging_02
                • API String ID: 32694325-3875344107
                • Opcode ID: ef67f4bf8392adc9b36706c0273052467a2fab3657c3b28e5fb23dde4103985f
                • Instruction ID: ffbe9171d2d4a0466a483197fedf8d6ecf3cd69f14affbc8701addfa8ca62d22
                • Opcode Fuzzy Hash: ef67f4bf8392adc9b36706c0273052467a2fab3657c3b28e5fb23dde4103985f
                • Instruction Fuzzy Hash: 77119766E2AB8789E300C721AC75D717361EFEA340F745335D9A8103BAEFEC21849240
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: Prop_cwprintf_s_l
                • String ID: ImmersiveContextMenuArray_%lu-%lu
                • API String ID: 2277916533-1220520276
                • Opcode ID: bcdb2acf7d50a9d4ee72ba723086c6edb9cf054159d6f6cd2ea55da9699e0231
                • Instruction ID: 3c99f13927a8093ae3a57c5ccd74136536edfdd10de6040c851b5ee6fc7973a8
                • Opcode Fuzzy Hash: bcdb2acf7d50a9d4ee72ba723086c6edb9cf054159d6f6cd2ea55da9699e0231
                • Instruction Fuzzy Hash: AB01AD66B14B9682EB008B16E8947ADBB60FB88FD4F504235DB1C477B9CF78DA45C700
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: Prop_cwprintf_s_l
                • String ID: ImmersiveContextMenuArray_%lu
                • API String ID: 2277916533-919551790
                • Opcode ID: b7edfb71d049743d0b7c9dc4888a962e79c0a966ae24ad90624510ce85ce8e4b
                • Instruction ID: 0d31a7684a5ededefa27623c3364f91b753397421e6ff84fb9d8b076347b34e6
                • Opcode Fuzzy Hash: b7edfb71d049743d0b7c9dc4888a962e79c0a966ae24ad90624510ce85ce8e4b
                • Instruction Fuzzy Hash: 9F018B66714B9282E7008B15E4953ADB760F789BE4F544231DB2C477A9CF7CD649C700
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: MessageTrace
                • String ID: BrandingName$NULL
                • API String ID: 471583391-1357520495
                • Opcode ID: 890ccf2b98fdb7baf1f4029b5461cb4353ea6bafeb1c3e0331ba9ad35d44f6e5
                • Instruction ID: 80b6b5decf548661fc89435dbf81e59b3feca141389ab8bad1bfe899d4620fb4
                • Opcode Fuzzy Hash: 890ccf2b98fdb7baf1f4029b5461cb4353ea6bafeb1c3e0331ba9ad35d44f6e5
                • Instruction Fuzzy Hash: 2F018471609B82C9E7248B10F454B5AB7B6FB95360F945325D6AD07BF8DF3DC1548700
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: ExceptionThrowstd::bad_exception::bad_exception
                • String ID: list<T> too long
                • API String ID: 1480402491-4027344264
                • Opcode ID: 990c71be13667554f5047bbc5bcab6a659fefdf2e1dc959b18bea381f7467d61
                • Instruction ID: 8a5e4d0b16673775f322fbdb4bed6067c31d6458c41b6582df9cf1f83a116a0e
                • Opcode Fuzzy Hash: 990c71be13667554f5047bbc5bcab6a659fefdf2e1dc959b18bea381f7467d61
                • Instruction Fuzzy Hash: E9014F61719B4391DF209B14E8617A97321FB85774F901335D5BD467F9DE6CE206C700
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: Prop_cwprintf_s_l
                • String ID: ImmersiveContextMenuArray_%lu-%lu
                • API String ID: 2277916533-1220520276
                • Opcode ID: 25537ed9547c4d0ddf0b95a2dcea5fcf1e8d18d6970cb8a3b3f4e2794ba2dd0e
                • Instruction ID: 5add60ff5b5ce204692bdf48dc7d123d8656f20473e2514f79adb8f9bd3f22ff
                • Opcode Fuzzy Hash: 25537ed9547c4d0ddf0b95a2dcea5fcf1e8d18d6970cb8a3b3f4e2794ba2dd0e
                • Instruction Fuzzy Hash: 27F06D26715B4282DB009B1AEA514BDB660BB88BC0B584031DF5D4337AEE38D5418700
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: Prop_cwprintf_s_l
                • String ID: ImmersiveContextMenuArray_%lu
                • API String ID: 2277916533-919551790
                • Opcode ID: 0e3b56e0b4e28b4dac1833065aeb1e509c87028adf1f560becddb33e0db3cd61
                • Instruction ID: 224332dfa57194695f1169e1a843c57fc972d7b944ba7339554f70bcf53644c6
                • Opcode Fuzzy Hash: 0e3b56e0b4e28b4dac1833065aeb1e509c87028adf1f560becddb33e0db3cd61
                • Instruction Fuzzy Hash: 89F09026715B46C2DB009F19E5600BDB3B0FB89BE0B544231DF6D433B9DE78D5458700
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: ExceptionThrowstd::bad_exception::bad_exception
                • String ID: string too long
                • API String ID: 1480402491-2556327735
                • Opcode ID: 0e49b01fbbc2285476d99624efe12cc0d24c857b6a7d3a36ae7371f6df7598ef
                • Instruction ID: b935f4adf7961cb1eaa8519a8349b43aa219dc135d4f88e8829b357f33bcff2f
                • Opcode Fuzzy Hash: 0e49b01fbbc2285476d99624efe12cc0d24c857b6a7d3a36ae7371f6df7598ef
                • Instruction Fuzzy Hash: 55E0AC2171AB47D1DB209B14E8616A97321FBC5368F901335E1BD46AFDDEACE609CB40
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: PropRemove_cwprintf_s_l
                • String ID: ImmersiveContextMenuArray_%lu-%lu
                • API String ID: 542518557-1220520276
                • Opcode ID: b8acbdf66bb2264c295643801edda4406b41c2c12fbe1bcd952d69b680a4c099
                • Instruction ID: a349a81f24d1e87016c09fdece3d9c8c9e7a8b1e34205441a57eb127dfee62f7
                • Opcode Fuzzy Hash: b8acbdf66bb2264c295643801edda4406b41c2c12fbe1bcd952d69b680a4c099
                • Instruction Fuzzy Hash: D5F082A6B26706C2EB009B12D4657B97630FB99B98F500131CB1D473B5DF3CD6498750
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: CreateExceptionRaiseReferenceStringWindows
                • String ID: Windows.Networking.UX.UXManager
                • API String ID: 289596593-1327396333
                • Opcode ID: 20751556a6f31273929ebdaeb119d44cd7250742e440dd954ca660baf16cb176
                • Instruction ID: daf86bce56ee967642a1cab4d82241690b43d552f7df5f5ea36663f67709c252
                • Opcode Fuzzy Hash: 20751556a6f31273929ebdaeb119d44cd7250742e440dd954ca660baf16cb176
                • Instruction Fuzzy Hash: 7FE0923171574287E7004B91E820EB57622EB9DB81F489031CD2D437B4DB3DA485C700
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: ExceptionThrowstd::bad_exception::bad_exception
                • String ID: vector<T> too long
                • API String ID: 1480402491-3788999226
                • Opcode ID: 4262a0f11455157c34321016469b219dd9adeec3968d0e6fde21532726b99c82
                • Instruction ID: ee1e1f921a31cf61b3172f52ccb6636d9887b4ff34ec1c21a9b32a63db374fbf
                • Opcode Fuzzy Hash: 4262a0f11455157c34321016469b219dd9adeec3968d0e6fde21532726b99c82
                • Instruction Fuzzy Hash: F4F0FE2171AB47D1EB209B14E865AA97320FBC4364F901331E1BD469FDDF6CE649C700
                APIs
                • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000028,00007FFDFB737097), ref: 00007FFDFB7373D9
                • HeapFree.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000028,00007FFDFB737097), ref: 00007FFDFB7373ED
                • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000028,00007FFDFB737097), ref: 00007FFDFB737411
                • HeapFree.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000028,00007FFDFB737097), ref: 00007FFDFB737425
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: Heap$FreeProcess
                • String ID:
                • API String ID: 3859560861-0
                • Opcode ID: 79acea38b854077905d6fbd763960d3110907110a8847787728385c86202c091
                • Instruction ID: 04c20033109862babb12238d366235a104111203fc90a4ba99b15f1e582d2746
                • Opcode Fuzzy Hash: 79acea38b854077905d6fbd763960d3110907110a8847787728385c86202c091
                • Instruction Fuzzy Hash: 8C114C32A05B52CAD7048F56F4400ACBBB1F749F80B5D8126DB5E03768DF38E492C744
                APIs
                • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FFDFB7362B4), ref: 00007FFDFB7512BA
                • HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FFDFB7362B4), ref: 00007FFDFB7512D2
                • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FFDFB7362B4), ref: 00007FFDFB751314
                • HeapFree.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FFDFB7362B4), ref: 00007FFDFB751328
                  • Part of subcall function 00007FFDFB751138: InterlockedPopEntrySList.API-MS-WIN-CORE-INTERLOCKED-L1-1-0 ref: 00007FFDFB75115E
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: Heap$Process$AllocEntryFreeInterlockedList
                • String ID:
                • API String ID: 3120275070-0
                • Opcode ID: 9fb0dca6a41c190a57b94eb7892fd193b77b9b22abef408b87e5ee2a71f846a9
                • Instruction ID: d3f168d60a39d601bfdd87dcd67f4634abb95404adc63eeee4bcdc672649cd53
                • Opcode Fuzzy Hash: 9fb0dca6a41c190a57b94eb7892fd193b77b9b22abef408b87e5ee2a71f846a9
                • Instruction Fuzzy Hash: 1D012131B0BB07CAEB195BA29434578BAA1EF49B42F488135C92E01BFCEF3C6446C610
                APIs
                • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FFDFB751153), ref: 00007FFDFB75123C
                • HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FFDFB751153), ref: 00007FFDFB751254
                • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FFDFB751153), ref: 00007FFDFB751272
                • HeapFree.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FFDFB751153), ref: 00007FFDFB751286
                Memory Dump Source
                • Source File: 00000006.00000002.1854185345.00007FFDFB721000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB720000, based on PE: true
                • Associated: 00000006.00000002.1854166208.00007FFDFB720000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854222306.00007FFDFB767000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854245937.00007FFDFB77B000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB77D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB78F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB799000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB79D000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7C1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB7EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB82A000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84C000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB84F000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB874000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8C9000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB8FC000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB90B000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB923000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000006.00000002.1854261533.00007FFDFB92B000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_7ffdfb720000_rundll32.jbxd
                Similarity
                • API ID: Heap$Process$AllocFree
                • String ID:
                • API String ID: 756756679-0
                • Opcode ID: 5eeaca8e623249c34f1dd72540b95062153ddbb1bc2a30ca12e92c3fd5e611c1
                • Instruction ID: 20a4d971c4c0b9f1b356b5fc8ac0482ec57198c56ea9e9fde70e099559887dd1
                • Opcode Fuzzy Hash: 5eeaca8e623249c34f1dd72540b95062153ddbb1bc2a30ca12e92c3fd5e611c1
                • Instruction Fuzzy Hash: A3012C31706B46CAEB148B56E414679BBA1FB4EB81F489135CE1D437B8EF39D4858700