Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
n57kYr8YQW.dll

Overview

General Information

Sample name:n57kYr8YQW.dll
renamed because original name is a hash value
Original sample name:4f564b754fe1a4a200d38c9a2d928d44bf93be1def0e9f4f855ffa6d73eba293.dll
Analysis ID:1544804
MD5:6588f55041b412cef3cab456de2032d8
SHA1:702b4ab077d8a46217e241d5dc7f5a295552983d
SHA256:4f564b754fe1a4a200d38c9a2d928d44bf93be1def0e9f4f855ffa6d73eba293
Tags:2024bankerdllgolangloadermekotiouser-johnk3r
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
AI detected suspicious sample
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found large amount of non-executed APIs
One or more processes crash
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Sample execution stops while process was sleeping (likely an evasion)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • loaddll32.exe (PID: 6560 cmdline: loaddll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 1748 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 2832 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 5212 cmdline: rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
        • WerFault.exe (PID: 5588 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5212 -s 648 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • rundll32.exe (PID: 2700 cmdline: rundll32.exe C:\Users\user\Desktop\n57kYr8YQW.dll,BarCreate MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 2300 cmdline: rundll32.exe C:\Users\user\Desktop\n57kYr8YQW.dll,BarDestroy MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 4136 cmdline: rundll32.exe C:\Users\user\Desktop\n57kYr8YQW.dll,BarFreeRec MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 6736 cmdline: rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",BarCreate MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 5924 cmdline: rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",BarDestroy MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 1888 cmdline: rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",BarFreeRec MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 5904 cmdline: rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeSetFocus MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 5624 cmdline: rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeSetDirty MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 4620 cmdline: rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeResize MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 1496 cmdline: rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkePaint2 MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 6552 cmdline: rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeKillFocus MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 5940 cmdline: rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeIsDirty MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 1092 cmdline: rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeInitialize MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 5912 cmdline: rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeGetCaretRect MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 2648 cmdline: rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeFireMouseWheelEvent MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 4568 cmdline: rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeFireMouseEvent MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 4068 cmdline: rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeFireKeyUpEvent MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 568 cmdline: rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeFireKeyPressEvent MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 5480 cmdline: rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeFireKeyDownEvent MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 4472 cmdline: rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeFireContextMenuEvent MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 6036 cmdline: rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeFinalize MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7016 cmdline: rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeDestroyWebView MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7124 cmdline: rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeCreateWebView MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 3488 cmdline: rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",dbkFCallWrapperAddr MD5: 889B99C52A60DD49227C5E485A016679)
      • WerFault.exe (PID: 636 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 3488 -s 640 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • rundll32.exe (PID: 4932 cmdline: rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",__dbk_fcall_wrapper MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 828 cmdline: rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",TMethodImplementationIntercept MD5: 889B99C52A60DD49227C5E485A016679)
      • WerFault.exe (PID: 3580 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 828 -s 640 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • rundll32.exe (PID: 3848 cmdline: rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",BarRecognize MD5: 889B99C52A60DD49227C5E485A016679)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: n57kYr8YQW.dllAvira: detected
Source: n57kYr8YQW.dllReversingLabs: Detection: 47%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 97.0% probability
Source: n57kYr8YQW.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, DLL, BYTES_REVERSED_HI
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_0040D1C4 FindFirstFileW,FindClose,4_2_0040D1C4
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_0040CBF8 GetModuleHandleW,GetProcAddress,FindFirstFileW,FindClose,lstrlenW,lstrlenW,4_2_0040CBF8
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 32_2_02B6D1C4 FindFirstFileW,FindClose,32_2_02B6D1C4
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 32_2_02B6CBF8 GetModuleHandleW,GetProcAddress,FindFirstFileW,FindClose,lstrlenW,lstrlenW,32_2_02B6CBF8
Source: Amcache.hve.8.drString found in binary or memory: http://upx.sf.net
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_004EA1D8 GetClipboardData,CopyEnhMetaFileW,GetEnhMetaFileHeader,4_2_004EA1D8
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_004EAA7C GetObjectW,GetDC,CreateCompatibleDC,CreateBitmap,CreateCompatibleBitmap,GetDeviceCaps,GetDeviceCaps,SelectObject,GetDIBColorTable,GetDIBits,SelectObject,CreateDIBSection,GetDIBits,SelectObject,SelectPalette,RealizePalette,FillRect,SetTextColor,SetBkColor,SetDIBColorTable,PatBlt,CreateCompatibleDC,SelectObject,SelectPalette,RealizePalette,SetTextColor,SetBkColor,BitBlt,SelectPalette,SelectObject,DeleteDC,SelectPalette,4_2_004EAA7C
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_004F64444_2_004F6444
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_004F67044_2_004F6704
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_004E69184_2_004E6918
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_004B0F644_2_004B0F64
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_004B10A84_2_004B10A8
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_0043B4C44_2_0043B4C4
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_004FFD004_2_004FFD00
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_004EFE804_2_004EFE80
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_004F1FC44_2_004F1FC4
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_004F5F804_2_004F5F80
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 32_2_02C5670432_2_02C56704
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 32_2_02C5644432_2_02C56444
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 32_2_02C4691832_2_02C46918
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 32_2_02C10F6432_2_02C10F64
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 32_2_02C110A832_2_02C110A8
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 32_2_02B9B4C432_2_02B9B4C4
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 32_2_02C4FE8032_2_02C4FE80
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 32_2_02C51FC432_2_02C51FC4
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 32_2_02C55F8032_2_02C55F80
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 32_2_02C5FD0032_2_02C5FD00
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5212 -s 648
Source: n57kYr8YQW.dllStatic PE information: Resource name: RT_STRING type: DOS executable (COM, 0x8C-variant)
Source: n57kYr8YQW.dllStatic PE information: Resource name: RT_VERSION type: Intel ia64 COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
Source: n57kYr8YQW.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, DLL, BYTES_REVERSED_HI
Source: classification engineClassification label: mal60.winDLL@63/13@0/0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_004E5AA0 GetLastError,FormatMessageW,4_2_004E5AA0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_004219D8 GetDiskFreeSpaceW,4_2_004219D8
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_004AA910 FindResourceW,LoadResource,SizeofResource,LockResource,4_2_004AA910
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5212
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1748:120:WilError_03
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess3488
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess828
Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\c897ea08-804a-4af1-b9ce-984e432d94ccJump to behavior
Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\n57kYr8YQW.dll,BarCreate
Source: n57kYr8YQW.dllReversingLabs: Detection: 47%
Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll"
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",#1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\n57kYr8YQW.dll,BarCreate
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",#1
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5212 -s 648
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\n57kYr8YQW.dll,BarDestroy
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\n57kYr8YQW.dll,BarFreeRec
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",BarCreate
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",BarDestroy
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",BarFreeRec
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeSetFocus
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeSetDirty
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeResize
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkePaint2
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeKillFocus
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeIsDirty
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeInitialize
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeGetCaretRect
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeFireMouseWheelEvent
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeFireMouseEvent
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeFireKeyUpEvent
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeFireKeyPressEvent
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeFireKeyDownEvent
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeFireContextMenuEvent
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeFinalize
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeDestroyWebView
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeCreateWebView
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",dbkFCallWrapperAddr
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",__dbk_fcall_wrapper
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",TMethodImplementationIntercept
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",BarRecognize
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 3488 -s 640
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 828 -s 640
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\n57kYr8YQW.dll,BarCreateJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\n57kYr8YQW.dll,BarDestroyJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\n57kYr8YQW.dll,BarFreeRecJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",BarCreateJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",BarDestroyJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",BarFreeRecJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeSetFocusJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeSetDirtyJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeResizeJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkePaint2Jump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeKillFocusJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeIsDirtyJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeInitializeJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeGetCaretRectJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeFireMouseWheelEventJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeFireMouseEventJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeFireKeyUpEventJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeFireKeyPressEventJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeFireKeyDownEventJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeFireContextMenuEventJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeFinalizeJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeDestroyWebViewJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeCreateWebViewJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",dbkFCallWrapperAddrJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",__dbk_fcall_wrapperJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",TMethodImplementationInterceptJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",BarRecognizeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: n57kYr8YQW.dllStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: n57kYr8YQW.dllStatic file information: File size 1270272 > 1048576
Source: n57kYr8YQW.dllStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x10ca00
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_00509F0C LoadLibraryW,GetProcAddress,GetProcAddress,IsBadReadPtr,4_2_00509F0C
Source: n57kYr8YQW.dllStatic PE information: section name: .didata
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_0050E000 push 0050E0DEh; ret 4_2_0050E0D6
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_0050E47C push 0050E519h; ret 4_2_0050E511
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_00460068 push ecx; mov dword ptr [esp], edx4_2_00460069
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_00504014 push 0050403Ah; ret 4_2_00504032
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_004380A4 push ecx; mov dword ptr [esp], eax4_2_004380A5
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_005041A4 push 005041CAh; ret 4_2_005041C2
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_00466248 push ecx; mov dword ptr [esp], ecx4_2_0046624C
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_00464264 push ecx; mov dword ptr [esp], ecx4_2_00464268
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_004BE2E4 push ecx; mov dword ptr [esp], edx4_2_004BE2E5
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_004BA2F8 push ecx; mov dword ptr [esp], edx4_2_004BA2FB
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_004C42F4 push ecx; mov dword ptr [esp], edx4_2_004C42F5
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_004682FC push ecx; mov dword ptr [esp], ecx4_2_00468300
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_0050A2A4 push 0050A2F0h; ret 4_2_0050A2E8
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_004C0340 push ecx; mov dword ptr [esp], edx4_2_004C0341
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_00502340 push 00502398h; ret 4_2_00502390
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_0043A3D0 push ecx; mov dword ptr [esp], eax4_2_0043A3D1
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_0050239C push ecx; mov dword ptr [esp], ecx4_2_005023A1
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_00464450 push ecx; mov dword ptr [esp], ecx4_2_00464454
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_0050E540 push 0050E5F6h; ret 4_2_0050E5EE
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_004C460C push ecx; mov dword ptr [esp], edx4_2_004C460D
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_0050E610 push 0050E671h; ret 4_2_0050E669
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_0050E740 push 0050E7DCh; ret 4_2_0050E7D4
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_0046670C push ecx; mov dword ptr [esp], edx4_2_0046670D
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_0046671C push ecx; mov dword ptr [esp], edx4_2_0046671D
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_004827C4 push 00482826h; ret 4_2_0048281E
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_004648E4 push ecx; mov dword ptr [esp], eax4_2_004648E6
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_0042E970 push 0042EA60h; ret 4_2_0042EA58
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_004C2A30 push ecx; mov dword ptr [esp], edx4_2_004C2A31
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_00468B60 push ecx; mov dword ptr [esp], edx4_2_00468B61
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_00508B14 push 00508B6Ah; ret 4_2_00508B62
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_00462CE0 push ecx; mov dword ptr [esp], ecx4_2_00462CE4
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeAPI coverage: 4.5 %
Source: C:\Windows\SysWOW64\rundll32.exeAPI coverage: 4.6 %
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_0040D1C4 FindFirstFileW,FindClose,4_2_0040D1C4
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_0040CBF8 GetModuleHandleW,GetProcAddress,FindFirstFileW,FindClose,lstrlenW,lstrlenW,4_2_0040CBF8
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 32_2_02B6D1C4 FindFirstFileW,FindClose,32_2_02B6D1C4
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 32_2_02B6CBF8 GetModuleHandleW,GetProcAddress,FindFirstFileW,FindClose,lstrlenW,lstrlenW,32_2_02B6CBF8
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_0040EE84 GetSystemInfo,4_2_0040EE84
Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
Source: Amcache.hve.8.drBinary or memory string: VMware
Source: Amcache.hve.8.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.8.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.8.drBinary or memory string: VMware-42 27 c5 9a 47 85 d6 84-53 49 ec ec 87 a6 6d 67
Source: Amcache.hve.8.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.8.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.8.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.8.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.8.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.8.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.8.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.8.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.8.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.8.drBinary or memory string: vmci.sys
Source: Amcache.hve.8.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.8.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.8.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.8.drBinary or memory string: VMware20,1
Source: Amcache.hve.8.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.8.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.8.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.8.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.8.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.8.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.8.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.8.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.8.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.8.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.8.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Windows\SysWOW64\rundll32.exeAPI call chain: ExitProcess graph end nodegraph_4-48314
Source: C:\Windows\SysWOW64\rundll32.exeAPI call chain: ExitProcess graph end nodegraph_32-47332
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPort
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPort
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPort
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPort
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_004B8000 IsDebuggerPresent,RaiseException,4_2_004B8000
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_00509F0C LoadLibraryW,GetProcAddress,GetProcAddress,IsBadReadPtr,4_2_00509F0C
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_00508F54 FreeLibrary,VirtualFree,GetProcessHeap,HeapFree,VirtualFree,4_2_00508F54
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",#1Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_004079E8 cpuid 4_2_004079E8
Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetUserDefaultUILanguage,GetLocaleInfoW,4_2_0040D2FC
Source: C:\Windows\SysWOW64\rundll32.exeCode function: IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,4_2_0040C79C
Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoW,4_2_00428FD0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: EnumSystemLocalesW,4_2_0042920C
Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoW,4_2_00425334
Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoW,4_2_00425380
Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetUserDefaultUILanguage,GetLocaleInfoW,32_2_02B6D2FC
Source: C:\Windows\SysWOW64\rundll32.exeCode function: IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,32_2_02B6C79C
Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoW,32_2_02B88FD0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: EnumSystemLocalesW,32_2_02B8920C
Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoW,32_2_02B85380
Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoW,32_2_02B85334
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_00423868 GetLocalTime,4_2_00423868
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_0040C520 InitializeCriticalSection,GetVersion,GetModuleHandleW,GetProcAddress,GetModuleHandleW,GetProcAddress,GetModuleHandleW,GetProcAddress,4_2_0040C520
Source: Amcache.hve.8.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.8.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.8.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.8.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
Source: Amcache.hve.8.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Native API
1
DLL Side-Loading
11
Process Injection
11
Virtualization/Sandbox Evasion
OS Credential Dumping1
System Time Discovery
Remote Services1
Screen Capture
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
11
Process Injection
LSASS Memory41
Security Software Discovery
Remote Desktop Protocol1
Archive Collected Data
Junk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Obfuscated Files or Information
Security Account Manager11
Virtualization/Sandbox Evasion
SMB/Windows Admin Shares1
Clipboard Data
SteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Rundll32
NTDS1
File and Directory Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA Secrets25
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1544804 Sample: n57kYr8YQW.dll Startdate: 29/10/2024 Architecture: WINDOWS Score: 60 26 Antivirus / Scanner detection for submitted sample 2->26 28 Multi AV Scanner detection for submitted file 2->28 30 AI detected suspicious sample 2->30 8 loaddll32.exe 1 2->8         started        process3 process4 10 cmd.exe 1 8->10         started        12 rundll32.exe 8->12         started        14 rundll32.exe 8->14         started        16 26 other processes 8->16 process5 18 rundll32.exe 10->18         started        20 WerFault.exe 12->20         started        22 WerFault.exe 14->22         started        process6 24 WerFault.exe 20 16 18->24         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
n57kYr8YQW.dll47%ReversingLabsWin32.Trojan.Midie
n57kYr8YQW.dll100%AviraTR/Redcap.rgkfk
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://upx.sf.net0%URL Reputationsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://upx.sf.netAmcache.hve.8.drfalse
  • URL Reputation: safe
unknown
No contacted IP infos
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1544804
Start date and time:2024-10-29 19:09:54 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 7m 26s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:43
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:n57kYr8YQW.dll
renamed because original name is a hash value
Original Sample Name:4f564b754fe1a4a200d38c9a2d928d44bf93be1def0e9f4f855ffa6d73eba293.dll
Detection:MAL
Classification:mal60.winDLL@63/13@0/0
EGA Information:
  • Successful, ratio: 66.7%
HCA Information:
  • Successful, ratio: 91%
  • Number of executed functions: 34
  • Number of non-executed functions: 144
Cookbook Comments:
  • Found application associated with file extension: .dll
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, SIHClient.exe, conhost.exe, svchost.exe
  • Excluded IPs from analysis (whitelisted): 20.189.173.22, 52.168.117.173
  • Excluded domains from analysis (whitelisted): onedsblobprdeus16.eastus.cloudapp.azure.com, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, onedsblobprdwus17.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
  • Execution Graph export aborted for target rundll32.exe, PID 828 because there are no executed function
  • Not all processes where analyzed, report is missing behavior information
  • Report size exceeded maximum capacity and may have missing behavior information.
  • VT rate limit hit for: n57kYr8YQW.dll
TimeTypeDescription
14:11:01API Interceptor3x Sleep call for process: WerFault.exe modified
14:11:04API Interceptor1x Sleep call for process: loaddll32.exe modified
No context
No context
No context
No context
No context
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):65536
Entropy (8bit):0.8644955942868999
Encrypted:false
SSDEEP:192:WvibXOXYAU0BU/wjeT+AzuiFuZ24IO8dci:+ib+XYAPBU/wjeaAzuiFuY4IO8dci
MD5:45F720F055DD8E94F771207ACBA2A3E3
SHA1:153F3954D3DB26E7E439C5F0B7AFB819BFA346CB
SHA-256:B0A27A40F8C1C6E468606F9179EBA5152D3BC9358D5F53185404A03CEFBCCC33
SHA-512:D78DE0CC1E5DACBDF7767B80628DB78F6A49D9411C87DBEA181A49140EF127399CB5B05605F8BD48A70318EA024176D6CD33FB853AFDB72DC1BCBED735DF42E2
Malicious:false
Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.4.6.9.9.0.6.5.5.8.6.4.2.1.6.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.4.6.9.9.0.6.6.4.6.1.4.1.7.6.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.2.3.f.2.f.f.1.-.0.f.9.d.-.4.7.c.7.-.a.7.f.5.-.5.0.d.8.a.8.3.2.8.f.c.2.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.f.5.3.c.2.4.e.-.a.5.d.8.-.4.b.0.c.-.b.6.0.a.-.0.4.e.1.3.a.6.8.c.f.0.5.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.3.3.c.-.0.0.0.1.-.0.0.1.4.-.3.9.6.3.-.1.0.e.b.2.d.2.a.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.8.f.a.8.8.9.e.4.5.6.a.a.6.4.6.a.4.d.0.a.4.3.4.9.9.7.7.4.3.0.c.e.5.f.a.5.e.
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):65536
Entropy (8bit):0.8699510467248083
Encrypted:false
SSDEEP:192:GNopi7OWYA70BU/wjeT+AzuiFuZ24IO84ci:KqiCWYAIBU/wjeaAzuiFuY4IO84ci
MD5:C5E5E45F63A9113669859B27AA10A874
SHA1:90F108890855AD01A489ACDBBF9144B166A84686
SHA-256:D902FBB5B02C6D6A163E23DD2AE94C85E14BC140E4B9246EBB7ED5602E4CE1FF
SHA-512:D43C666AF0480F7D612A4AA690714351AB5FB497557B9B7336E2D8548AD9AF37928E3AB30D31DDE63488EA7F05D895A5BDEDCC9A592C5BB4EF87C4E0B90F8677
Malicious:false
Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.4.6.9.9.0.6.5.1.8.6.8.8.3.8.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.4.6.9.9.0.6.6.4.0.5.6.2.8.1.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.1.f.7.a.9.c.7.-.1.8.2.3.-.4.e.3.8.-.9.4.9.1.-.9.9.9.2.1.6.9.5.0.c.b.2.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.b.4.8.4.5.0.a.e.-.d.a.2.f.-.4.6.4.b.-.b.b.3.4.-.a.e.1.2.5.2.e.e.1.6.f.1.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.d.a.0.-.0.0.0.1.-.0.0.1.4.-.d.2.0.6.-.0.0.e.b.2.d.2.a.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.8.f.a.8.8.9.e.4.5.6.a.a.6.4.6.a.4.d.0.a.4.3.4.9.9.7.7.4.3.0.c.e.5.f.a.5.e.2.d.7.!.r.
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):65536
Entropy (8bit):0.8700783746862466
Encrypted:false
SSDEEP:192:AGizOvYA70BU/wjeT+AzuiFuZ24IO84ci:di6vYAIBU/wjeaAzuiFuY4IO84ci
MD5:794218579D122A4CD21694E726A38722
SHA1:36FD4819E35D1E3302D78D83076221D6101F4354
SHA-256:730A4F92404A2B2AF73749240EFED948382C0D299951667CE610538662251C65
SHA-512:7C064A05942A7669BBBAEFD5A9017913A9449DDBA4DB2E414028CC25A4D2637942ABABAD5F139E8041AC78581ABC465CA11D63606DFCD6953D0B8C8946479A4C
Malicious:false
Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.4.6.9.9.0.5.5.1.3.3.6.7.0.1.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.4.6.9.9.0.5.5.5.0.8.6.5.1.7.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.9.5.7.3.f.0.f.9.-.e.b.1.a.-.4.0.1.9.-.8.6.2.f.-.b.3.1.3.d.4.e.d.f.9.0.2.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.2.1.e.0.8.f.7.b.-.6.3.f.c.-.4.6.a.4.-.a.8.4.8.-.1.4.3.d.0.3.d.f.8.d.d.1.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.4.5.c.-.0.0.0.1.-.0.0.1.4.-.2.4.5.7.-.4.9.e.5.2.d.2.a.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.8.f.a.8.8.9.e.4.5.6.a.a.6.4.6.a.4.d.0.a.4.3.4.9.9.7.7.4.3.0.c.e.5.f.a.5.e.2.d.7.!.r.
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:Mini DuMP crash report, 14 streams, Tue Oct 29 18:10:55 2024, 0x1205a4 type
Category:dropped
Size (bytes):43932
Entropy (8bit):1.9337176889572314
Encrypted:false
SSDEEP:96:538G3DQOZQZJENfWMZutTgz8UXkiyRGe/oi75I4v4I/rellE8lll1tVs+LGLDWIr:qWianXwAO5H4IwJiosF31mttLvn
MD5:CC945D90DBA8298EF8BBF3A648AFC345
SHA1:DF74BCB7272E99DB0DD47FD9CB2830187F662560
SHA-256:DAD43AC463F0F5FFB44A47DB8D9551A5CA5B91049B8B67EDDE1167955CA17395
SHA-512:6CE81C4B1F2EE7DB40A64A3BCA8990DF45752FED69EB4BED42519A15F7ADFD302238FE496A7B4AC6ED0514551D24B28AE8CD9B9503DBBBD0B3574012681CF24B
Malicious:false
Preview:MDMP..a..... ......./%!g.........................................)..........T.......8...........T......................................................................................................................eJ......,.......GenuineIntel............T.......\....%!g.............................0..1...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):8318
Entropy (8bit):3.691216739980636
Encrypted:false
SSDEEP:192:R6l7wVeJJS6IU49I6YoS6qgmf8i9HCCypr/89b0tsfy8m:R6lXJc6IUV6Y16qgmf8i9HCCX0mf4
MD5:81910F1129FF6AB81EC602639FE8F2F6
SHA1:35871BCC88EC63B8E83B354BC491D57466602CFF
SHA-256:E157A1CCE6CA52B430F6A11B062B528389DB891AFECB3194C590A31FBABFF893
SHA-512:72E1EE794CAB1A2F21C130F929CBE8C41C03B1D5A545FB56E21AD3DAAB82B773B9B60FDAB31BA3424FF162FD3CC7B36587A19C5BE76106929074E187C01F4412
Malicious:false
Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.2.1.2.<./.P.i.
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:XML 1.0 document, ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):4751
Entropy (8bit):4.457616218182642
Encrypted:false
SSDEEP:48:cvIwWl8zsyJg77aI95OWpW8VY8Ym8M4JCdPi9nFLI+q8vjPi9U3c/GScSMd:uIjfAI7vv7VMJrKKwFJ3Md
MD5:89D419DC1FC02AC041220E3B35DEC72C
SHA1:40B0863B999F2F81F84FC3FFB275F84756103313
SHA-256:A9768B94580CD654435B0F58C91AA58462D2AFBACC94681A404B212D141988FF
SHA-512:531C5EE2E3A6295D54882BB2663614DF949305DB94C8B5B0BABEE20D351B57B1FD9C69A99E1798883DE8E5C17B548A54FA8E6B63D12C7B0242F26B9FE413CFFC
Malicious:false
Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="565033" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:Mini DuMP crash report, 14 streams, Tue Oct 29 18:11:05 2024, 0x1205a4 type
Category:dropped
Size (bytes):42852
Entropy (8bit):1.9578920720877546
Encrypted:false
SSDEEP:192:I1itPX/O5H4ILlKsBuHjBjKKoufAog4Vmm:JM5HVLYqstjKKosBm
MD5:1B5E931DA57C8A5FD49D90A4B944E6B1
SHA1:06DAB15DEE73874B019CD1B335C1EDE0579C7703
SHA-256:EDDAD3B5D71698E361BB4A4CC6034C8D7DA24A0E7F361B55B62BA98EC9F6D93E
SHA-512:29DEF64FCEA252740BC20BE0CAE49F83370508CA797867B7E04638B0431125BE8162A205746553B25AE5120B539AFB9EE66266D0DA87BB7B7B5E90E2A625B39E
Malicious:false
Preview:MDMP..a..... .......9%!g.........................................)..........T.......8...........T......................................................................................................................eJ......,.......GenuineIntel............T...........8%!g.............................0..1...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):8344
Entropy (8bit):3.693425366097748
Encrypted:false
SSDEEP:192:R6l7wVeJ6l6IUDj6YPDE6Kgmf8i9HCCyprr89bwEsfEtQm:R6lXJo6IUn6Y7E6Kgmf8i9HCCLw3fEP
MD5:4B83DD383B579E4F8F346615E73A98B9
SHA1:F10EC94EBAB2F9BFB0E70C1F03C5DA9440EA441F
SHA-256:8E597645D4CC6FCFDA0FB91B6618D12C5706D697C1EBE41647CAAB12859269FD
SHA-512:9E08A5B0431AF06D979A05B13AF33EF89321EC6745E2C31AA86B120DF39EE979F41731CC59F147EC4030F427EB6ABB463210A72994D0058536E4F8EFB9C0E52A
Malicious:false
Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.3.4.8.8.<./.P.i.
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:XML 1.0 document, ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):4751
Entropy (8bit):4.453397294302514
Encrypted:false
SSDEEP:48:cvIwWl8zsyJg77aI95OWpW8VYKYm8M4JCdPi9nFi+q8vjPi9NfGScSQd:uIjfAI7vv7VuJr4KwNfJ3Qd
MD5:BBA8AD90EF50E4E9EB32FB40B9BC5FBB
SHA1:053FE939B92CCD857B391EC24F44D8C9C33D28FC
SHA-256:5AEB31E25DC6329D867CB9E1A4DB82FFB9A90CEAF619D41CD1DA57A36D56CA58
SHA-512:44A9919658CC6A3DBE3B41879AE345F56B4D8ED11B98CFCCE9D32288BA2F624D36D70C66AAB73C529E773E27B04EC820B8CC2683644A90A9864FA4FAC9D7E90E
Malicious:false
Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="565033" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:Mini DuMP crash report, 14 streams, Tue Oct 29 18:11:06 2024, 0x1205a4 type
Category:dropped
Size (bytes):42448
Entropy (8bit):2.0246217217068994
Encrypted:false
SSDEEP:192:vLiqJnXWO5H4I1xhTHtp+UquuTut/ZgZY0KvN7:uqr5HVfhLttCut/v
MD5:6CE2CFB81B5D886351A2D3B75A0C744C
SHA1:C3196C19BA340B2F6E6DF075E7CAC74D9669F559
SHA-256:1001B9DD86D4CFDCDF4B17C5DAF4468AAA77DEA37B5DCCD42F72354D7FC536A2
SHA-512:5AB3518880B36E67E263286E91E75A33CB0406080E715740E6CC51E0717CDEF84C0CB37AC34CEF58FEAF7650A159C80E02E2FC2CAAFBE0F5681F1C3E3F2DC0E2
Malicious:false
Preview:MDMP..a..... .......:%!g.........................................)..........T.......8...........T...............H.......................................................................................................eJ......,.......GenuineIntel............T.......<...8%!g.............................0..1...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):8278
Entropy (8bit):3.694821928508156
Encrypted:false
SSDEEP:192:R6l7wVeJX96Idb6YPK64XgmfTipHCCypr389brvsfd5m:R6lXJt6Idb6YC6QgmfTipHCCvrUfK
MD5:7F730F0F09D44993F4FA16B8BE77F279
SHA1:5C0AF0DA87D7CCDC710AA250B88810D91FA9D359
SHA-256:A704E02F4656674B0F685FC50B52EB9E5F8A60630C1910E9750FF75E32657E73
SHA-512:9471BBA00877D3F4BF5EF0C6958CDB8341AF399DD15441F71792E51BB1EBDC228BCF3962F70DB4F600E818F7DD4F7AA8AC5B95424B9DB0D3FC6F61442B3E64AF
Malicious:false
Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.8.2.8.<./.P.i.d.
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:XML 1.0 document, ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):4650
Entropy (8bit):4.469865211295629
Encrypted:false
SSDEEP:48:cvIwWl8zsyJg77aI95OWpW8VYoYm8M4JCdPimFY+q8/oSLGScSSd:uIjfAI7vv7V8JtQJ3Sd
MD5:29366811C2498BF9AAE6DDBC682904F0
SHA1:001C36D83C211943E7DFA5A7A80A5781F25EA01B
SHA-256:7B057A696E2EB5F000790B6DE75D329D3457855F593A6DB40F61693B9AE49014
SHA-512:93D69A13A711017AD58E0AF021B0570091F79CBAA9B6B44D14FB4D94A06D184C654B29CCFFBA7B91051D4B00E95FA20A5C8FC61FA9948D84255D8C87169A214D
Malicious:false
Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="565033" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:MS Windows registry file, NT/2000 or above
Category:dropped
Size (bytes):1835008
Entropy (8bit):4.372878769680913
Encrypted:false
SSDEEP:6144:rFVfpi6ceLP/9skLmb0ayWWSPtaJG8nAge35OlMMhA2AX4WABlguNEiL:RV1QyWWI/glMM6kF7Kq
MD5:647CA0E40982722588FE11C977C83C2D
SHA1:90844771D5913EB20572F70187CB59DD39AC7429
SHA-256:B10A46049090EAAF58B460C85AB4C9511CBC2B953D9C9BF91B231BDF84A55B83
SHA-512:B896FCE272F872504EEE19EAEE575B2F43AE19D2CD739B8866DAA979018018393AC455FC53290BCC6234726ECC254A634383A43123AC579CEFF1AF7C764E75C4
Malicious:false
Preview:regfD...D....\.Z.................... ....0......\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm...-*..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
Entropy (8bit):6.649618898289129
TrID:
  • Win32 Dynamic Link Library (generic) (1002004/3) 95.46%
  • Win32 EXE PECompact compressed (generic) (41571/9) 3.96%
  • Win16/32 Executable Delphi generic (2074/23) 0.20%
  • Generic Win/DOS Executable (2004/3) 0.19%
  • DOS Executable Generic (2002/1) 0.19%
File name:n57kYr8YQW.dll
File size:1'270'272 bytes
MD5:6588f55041b412cef3cab456de2032d8
SHA1:702b4ab077d8a46217e241d5dc7f5a295552983d
SHA256:4f564b754fe1a4a200d38c9a2d928d44bf93be1def0e9f4f855ffa6d73eba293
SHA512:187f2c6ace7a92ef7bc78074bac581dcec1fb47cda3f59c075fb77c19c1b3cde3d110d103942c3f21339256670ab7bc0297d1d32456bf045ae966a271739c57e
SSDEEP:24576:rG6z8NUN+VGUAaY1zG+0VwpDzPYTFVKhb:rUrVYxR00DzwTFVKV
TLSH:52455C62F245643EC4AA0A364977AD50583FB7A2755AEC1E57F4088CCE3A5802F3E74F
File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
Icon Hash:7ae282899bbab082
Entrypoint:0x50eee8
Entrypoint Section:.itext
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, DLL, BYTES_REVERSED_HI
DLL Characteristics:
Time Stamp:0x66F43F6A [Wed Sep 25 16:50:50 2024 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:5
OS Version Minor:0
File Version Major:5
File Version Minor:0
Subsystem Version Major:5
Subsystem Version Minor:0
Import Hash:6327992c879b906e750778c69d550fed
Instruction
push ebp
mov ebp, esp
add esp, FFFFFFC0h
mov eax, 0050A350h
call 00007F31B8A10025h
call 00007F31B8A09440h
lea eax, dword ptr [eax+00h]
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x1220000x2a7.edata
IMAGE_DIRECTORY_ENTRY_IMPORT0x11f0000x1c46.idata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x13d0000x4600.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x1240000x18520.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x11f5a40x464.idata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x1210000x366.didata
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x10c96c0x10ca00bab5883e57c2665048c12ed24d617172False0.3668584952303397data6.493236324591389IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.itext0x10e0000xf000x1000b5a729ba5800754ca9d74239ee07b46eFalse0.535400390625data6.096583269221522IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.data0x10f0000x8f740x90005a16079859930cf800d885ee61f97600False0.6360677083333334data6.623184293813076IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.bss0x1180000x62fc0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.idata0x11f0000x1c460x1e00bd166391d3b2991897d3f90ec0b419cbFalse0.32083333333333336data4.974350011480841IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.didata0x1210000x3660x4009c7b1e6fd492c18332b403fa3ad29c2eFalse0.3544921875data3.0967012674854977IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.edata0x1220000x2a70x400f736b3a419381b0edad1fce1e31db573False0.4072265625data4.002875385807582IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.rdata0x1230000x440x200c9f8bfa36b2dc5163b75d3196d251b45False0.15625data1.1660636886017055IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x1240000x185200x186004b8f89f109ae05974f7618da9030cbaeFalse0.5803485576923076data6.710755177482659IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
.rsrc0x13d0000x46000x4600f9acd086a22d3118c471c96fb2f59f28False0.2746651785714286data3.6929859121760287IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_STRING0x13d4600x31cDOS executable (COM, 0x8C-variant)0.4258793969849246
RT_STRING0x13d77c0xb5cdata0.2548143053645117
RT_STRING0x13e2d80x428data0.37406015037593987
RT_STRING0x13e7000x3c4data0.37655601659751037
RT_STRING0x13eac40x3ccdata0.2757201646090535
RT_STRING0x13ee900x394data0.4334061135371179
RT_STRING0x13f2240x4e4data0.35303514376996803
RT_STRING0x13f7080x374data0.3563348416289593
RT_STRING0x13fa7c0x454data0.38898916967509023
RT_STRING0x13fed00x1ecdata0.3983739837398374
RT_STRING0x1400bc0xc4data0.6428571428571429
RT_STRING0x1401800x170data0.5597826086956522
RT_STRING0x1402f00x334data0.41585365853658535
RT_STRING0x1406240x408data0.3168604651162791
RT_STRING0x140a2c0x36cdata0.4018264840182648
RT_STRING0x140d980x2b8data0.4367816091954023
RT_RCDATA0x1410500x10data1.5
RT_RCDATA0x1410600x398data0.6043478260869565
RT_RCDATA0x1413f80x2dataEnglishUnited States5.0
RT_VERSION0x1413fc0x200Intel ia64 COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970EnglishUnited States0.4765625
DLLImport
oleaut32.dllSysFreeString, SysReAllocStringLen, SysAllocStringLen
advapi32.dllRegQueryValueExW, RegOpenKeyExW, RegCloseKey
user32.dllCharNextW, LoadStringW
kernel32.dllSleep, VirtualFree, VirtualAlloc, lstrlenW, VirtualQuery, QueryPerformanceCounter, GetTickCount, GetSystemInfo, GetVersion, CompareStringW, IsValidLocale, SetThreadLocale, GetSystemDefaultUILanguage, GetUserDefaultUILanguage, GetLocaleInfoW, WideCharToMultiByte, MultiByteToWideChar, GetACP, LoadLibraryExW, GetStartupInfoW, GetProcAddress, GetModuleHandleW, GetModuleFileNameW, GetCommandLineW, FreeLibrary, GetLastError, UnhandledExceptionFilter, RtlUnwind, RaiseException, ExitProcess, ExitThread, SwitchToThread, GetCurrentThreadId, CreateThread, DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, FindFirstFileW, FindClose, WriteFile, GetStdHandle, CloseHandle
kernel32.dllGetProcAddress, RaiseException, LoadLibraryA, GetLastError, TlsSetValue, TlsGetValue, TlsFree, TlsAlloc, LocalFree, LocalAlloc, FreeLibrary
user32.dllReleaseDC, PeekMessageW, MsgWaitForMultipleObjects, MessageBoxW, LoadStringW, LoadImageW, LoadIconW, GetSystemMetrics, GetSysColor, GetIconInfo, GetDC, GetClipboardData, FrameRect, FillRect, DrawTextExW, DrawIconEx, DrawFocusRect, DestroyIcon, CreateIcon, CopyIcon, CharUpperBuffW, CharUpperW, CharLowerBuffW
gdi32.dllUnrealizeObject, StretchDIBits, StretchBlt, SetWinMetaFileBits, SetTextColor, SetStretchBltMode, SetROP2, SetPixel, SetEnhMetaFileBits, SetDIBits, SetDIBColorTable, SetBrushOrgEx, SetBkMode, SetBkColor, SelectPalette, SelectObject, RoundRect, ResizePalette, Rectangle, RealizePalette, Polyline, Polygon, PolyBezierTo, PolyBezier, PlayEnhMetaFile, Pie, PatBlt, MoveToEx, MaskBlt, LineTo, GetWindowOrgEx, GetWinMetaFileBits, GetTextMetricsW, GetTextExtentPoint32W, GetSystemPaletteEntries, GetStretchBltMode, GetStockObject, GetPixel, GetPaletteEntries, GetObjectW, GetNearestPaletteIndex, GetEnhMetaFilePaletteEntries, GetEnhMetaFileHeader, GetEnhMetaFileDescriptionW, GetEnhMetaFileBits, GetDeviceCaps, GetDIBits, GetDIBColorTable, GetCurrentPositionEx, GetClipBox, GetBrushOrgEx, GetBitmapBits, GdiFlush, ExtTextOutW, ExtFloodFill, Ellipse, DeleteObject, DeleteEnhMetaFile, DeleteDC, CreatePenIndirect, CreatePalette, CreateHalftonePalette, CreateFontIndirectW, CreateDIBitmap, CreateDIBSection, CreateCompatibleDC, CreateCompatibleBitmap, CreateBrushIndirect, CreateBitmap, CopyEnhMetaFileW, Chord, BitBlt, ArcTo, Arc, AngleArc
version.dllVerQueryValueW, GetFileVersionInfoSizeW, GetFileVersionInfoW
kernel32.dllWriteFile, WideCharToMultiByte, WaitForSingleObject, VirtualQueryEx, VirtualQuery, VirtualProtect, VirtualFree, VirtualAlloc, VerSetConditionMask, VerifyVersionInfoW, SwitchToThread, SuspendThread, Sleep, SizeofResource, SetThreadPriority, SetFilePointer, SetEvent, SetEndOfFile, ResumeThread, ResetEvent, ReadFile, RaiseException, IsDebuggerPresent, MulDiv, LockResource, LocalFree, LoadResource, LoadLibraryW, LeaveCriticalSection, IsValidLocale, IsBadReadPtr, InitializeCriticalSection, HeapSize, HeapFree, HeapDestroy, HeapCreate, HeapAlloc, GetVersionExW, GetTickCount, GetThreadPriority, GetThreadLocale, GetStdHandle, GetProcessHeap, GetProcAddress, GetModuleHandleW, GetModuleFileNameW, GetLocaleInfoW, GetLocalTime, GetLastError, GetFullPathNameW, GetExitCodeThread, GetDiskFreeSpaceW, GetDateFormatW, GetCurrentThreadId, GetCurrentThread, GetCurrentProcess, GetCPInfoExW, GetCPInfo, GetACP, FreeResource, FreeLibrary, FormatMessageW, FindResourceW, EnumSystemLocalesW, EnumCalendarInfoW, EnterCriticalSection, DeleteCriticalSection, CreateFileW, CreateEventW, CompareStringW, CloseHandle
advapi32.dllRegUnLoadKeyW, RegSetValueExW, RegSaveKeyW, RegRestoreKeyW, RegReplaceKeyW, RegQueryValueExW, RegQueryInfoKeyW, RegOpenKeyExW, RegLoadKeyW, RegFlushKey, RegEnumValueW, RegEnumKeyExW, RegDeleteValueW, RegDeleteKeyW, RegCreateKeyExW, RegConnectRegistryW, RegCloseKey
kernel32.dllSleep
netapi32.dllNetApiBufferFree, NetWkstaGetInfo
oleaut32.dllSafeArrayPtrOfIndex, SafeArrayGetUBound, SafeArrayGetLBound, SafeArrayCreate, VariantChangeType, VariantCopy, VariantClear, VariantInit
ole32.dllCoCreateInstance, IsEqualGUID
msvcrt.dllmemset, memcpy
NameOrdinalAddress
BarCreate40x50a344
BarDestroy50x50a340
BarFreeRec60x50a33c
BarRecognize70x50a338
TMethodImplementationIntercept30x45f330
__dbk_fcall_wrapper20x41041c
dbkFCallWrapperAddr10x51b630
wkeCreateWebView130x50a320
wkeDestroyWebView80x50a334
wkeFinalize90x50a330
wkeFireContextMenuEvent160x50a314
wkeFireKeyDownEvent120x50a324
wkeFireKeyPressEvent140x50a31c
wkeFireKeyUpEvent230x50a2f8
wkeFireMouseEvent150x50a318
wkeFireMouseWheelEvent170x50a310
wkeGetCaretRect200x50a304
wkeInitialize220x50a2fc
wkeIsDirty210x50a300
wkeKillFocus190x50a308
wkePaint2240x50a2f4
wkeResize110x50a328
wkeSetDirty100x50a32c
wkeSetFocus180x50a30c
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
No network behavior found

Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Click to jump to process

Target ID:0
Start time:14:10:54
Start date:29/10/2024
Path:C:\Windows\System32\loaddll32.exe
Wow64 process (32bit):true
Commandline:loaddll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll"
Imagebase:0x110000
File size:126'464 bytes
MD5 hash:51E6071F9CBA48E79F10C84515AAE618
Has elevated privileges:true
Has administrator privileges:true
Programmed in:Borland Delphi
Reputation:high
Has exited:true

Target ID:1
Start time:14:10:54
Start date:29/10/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff6ee680000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:2
Start time:14:10:54
Start date:29/10/2024
Path:C:\Windows\SysWOW64\cmd.exe
Wow64 process (32bit):true
Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",#1
Imagebase:0xa40000
File size:236'544 bytes
MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:3
Start time:14:10:54
Start date:29/10/2024
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe C:\Users\user\Desktop\n57kYr8YQW.dll,BarCreate
Imagebase:0xf0000
File size:61'440 bytes
MD5 hash:889B99C52A60DD49227C5E485A016679
Has elevated privileges:true
Has administrator privileges:true
Programmed in:Borland Delphi
Reputation:high
Has exited:true

Target ID:4
Start time:14:10:54
Start date:29/10/2024
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",#1
Imagebase:0xf0000
File size:61'440 bytes
MD5 hash:889B99C52A60DD49227C5E485A016679
Has elevated privileges:true
Has administrator privileges:true
Programmed in:Borland Delphi
Reputation:high
Has exited:true

Target ID:8
Start time:14:10:54
Start date:29/10/2024
Path:C:\Windows\SysWOW64\WerFault.exe
Wow64 process (32bit):true
Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5212 -s 648
Imagebase:0x350000
File size:483'680 bytes
MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:10
Start time:14:10:57
Start date:29/10/2024
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe C:\Users\user\Desktop\n57kYr8YQW.dll,BarDestroy
Imagebase:0xf0000
File size:61'440 bytes
MD5 hash:889B99C52A60DD49227C5E485A016679
Has elevated privileges:true
Has administrator privileges:true
Programmed in:Borland Delphi
Reputation:high
Has exited:true

Target ID:11
Start time:14:11:00
Start date:29/10/2024
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe C:\Users\user\Desktop\n57kYr8YQW.dll,BarFreeRec
Imagebase:0xf0000
File size:61'440 bytes
MD5 hash:889B99C52A60DD49227C5E485A016679
Has elevated privileges:true
Has administrator privileges:true
Programmed in:Borland Delphi
Reputation:high
Has exited:true

Target ID:12
Start time:14:11:03
Start date:29/10/2024
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",BarCreate
Imagebase:0xf0000
File size:61'440 bytes
MD5 hash:889B99C52A60DD49227C5E485A016679
Has elevated privileges:true
Has administrator privileges:true
Programmed in:Borland Delphi
Reputation:high
Has exited:true

Target ID:13
Start time:14:11:03
Start date:29/10/2024
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",BarDestroy
Imagebase:0xf0000
File size:61'440 bytes
MD5 hash:889B99C52A60DD49227C5E485A016679
Has elevated privileges:true
Has administrator privileges:true
Programmed in:Borland Delphi
Reputation:high
Has exited:true

Target ID:14
Start time:14:11:03
Start date:29/10/2024
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",BarFreeRec
Imagebase:0xf0000
File size:61'440 bytes
MD5 hash:889B99C52A60DD49227C5E485A016679
Has elevated privileges:true
Has administrator privileges:true
Programmed in:Borland Delphi
Reputation:high
Has exited:true

Target ID:15
Start time:14:11:03
Start date:29/10/2024
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeSetFocus
Imagebase:0xf0000
File size:61'440 bytes
MD5 hash:889B99C52A60DD49227C5E485A016679
Has elevated privileges:true
Has administrator privileges:true
Programmed in:Borland Delphi
Has exited:true

Target ID:16
Start time:14:11:03
Start date:29/10/2024
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeSetDirty
Imagebase:0xf0000
File size:61'440 bytes
MD5 hash:889B99C52A60DD49227C5E485A016679
Has elevated privileges:true
Has administrator privileges:true
Programmed in:Borland Delphi
Has exited:true

Target ID:17
Start time:14:11:03
Start date:29/10/2024
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeResize
Imagebase:0xf0000
File size:61'440 bytes
MD5 hash:889B99C52A60DD49227C5E485A016679
Has elevated privileges:true
Has administrator privileges:true
Programmed in:Borland Delphi
Has exited:true

Target ID:18
Start time:14:11:03
Start date:29/10/2024
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkePaint2
Imagebase:0xf0000
File size:61'440 bytes
MD5 hash:889B99C52A60DD49227C5E485A016679
Has elevated privileges:true
Has administrator privileges:true
Programmed in:Borland Delphi
Has exited:true

Target ID:19
Start time:14:11:03
Start date:29/10/2024
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeKillFocus
Imagebase:0xf0000
File size:61'440 bytes
MD5 hash:889B99C52A60DD49227C5E485A016679
Has elevated privileges:true
Has administrator privileges:true
Programmed in:Borland Delphi
Has exited:true

Target ID:20
Start time:14:11:03
Start date:29/10/2024
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeIsDirty
Imagebase:0xf0000
File size:61'440 bytes
MD5 hash:889B99C52A60DD49227C5E485A016679
Has elevated privileges:true
Has administrator privileges:true
Programmed in:Borland Delphi
Has exited:true

Target ID:21
Start time:14:11:03
Start date:29/10/2024
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeInitialize
Imagebase:0xf0000
File size:61'440 bytes
MD5 hash:889B99C52A60DD49227C5E485A016679
Has elevated privileges:true
Has administrator privileges:true
Programmed in:Borland Delphi
Has exited:true

Target ID:22
Start time:14:11:03
Start date:29/10/2024
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeGetCaretRect
Imagebase:0xf0000
File size:61'440 bytes
MD5 hash:889B99C52A60DD49227C5E485A016679
Has elevated privileges:true
Has administrator privileges:true
Programmed in:Borland Delphi
Has exited:true

Target ID:23
Start time:14:11:03
Start date:29/10/2024
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeFireMouseWheelEvent
Imagebase:0xf0000
File size:61'440 bytes
MD5 hash:889B99C52A60DD49227C5E485A016679
Has elevated privileges:true
Has administrator privileges:true
Programmed in:Borland Delphi
Has exited:true

Target ID:24
Start time:14:11:03
Start date:29/10/2024
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeFireMouseEvent
Imagebase:0xf0000
File size:61'440 bytes
MD5 hash:889B99C52A60DD49227C5E485A016679
Has elevated privileges:true
Has administrator privileges:true
Programmed in:Borland Delphi
Has exited:true

Target ID:25
Start time:14:11:04
Start date:29/10/2024
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeFireKeyUpEvent
Imagebase:0xf0000
File size:61'440 bytes
MD5 hash:889B99C52A60DD49227C5E485A016679
Has elevated privileges:true
Has administrator privileges:true
Programmed in:Borland Delphi
Has exited:true

Target ID:26
Start time:14:11:04
Start date:29/10/2024
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeFireKeyPressEvent
Imagebase:0xf0000
File size:61'440 bytes
MD5 hash:889B99C52A60DD49227C5E485A016679
Has elevated privileges:true
Has administrator privileges:true
Programmed in:Borland Delphi
Has exited:true

Target ID:27
Start time:14:11:04
Start date:29/10/2024
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeFireKeyDownEvent
Imagebase:0xf0000
File size:61'440 bytes
MD5 hash:889B99C52A60DD49227C5E485A016679
Has elevated privileges:true
Has administrator privileges:true
Programmed in:Borland Delphi
Has exited:true

Target ID:28
Start time:14:11:04
Start date:29/10/2024
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeFireContextMenuEvent
Imagebase:0xf0000
File size:61'440 bytes
MD5 hash:889B99C52A60DD49227C5E485A016679
Has elevated privileges:true
Has administrator privileges:true
Programmed in:Borland Delphi
Has exited:true

Target ID:29
Start time:14:11:04
Start date:29/10/2024
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeFinalize
Imagebase:0xf0000
File size:61'440 bytes
MD5 hash:889B99C52A60DD49227C5E485A016679
Has elevated privileges:true
Has administrator privileges:true
Programmed in:Borland Delphi
Has exited:true

Target ID:30
Start time:14:11:04
Start date:29/10/2024
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeDestroyWebView
Imagebase:0xf0000
File size:61'440 bytes
MD5 hash:889B99C52A60DD49227C5E485A016679
Has elevated privileges:true
Has administrator privileges:true
Programmed in:Borland Delphi
Has exited:true

Target ID:31
Start time:14:11:04
Start date:29/10/2024
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",wkeCreateWebView
Imagebase:0xf0000
File size:61'440 bytes
MD5 hash:889B99C52A60DD49227C5E485A016679
Has elevated privileges:true
Has administrator privileges:true
Programmed in:Borland Delphi
Has exited:true

Target ID:32
Start time:14:11:04
Start date:29/10/2024
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",dbkFCallWrapperAddr
Imagebase:0xf0000
File size:61'440 bytes
MD5 hash:889B99C52A60DD49227C5E485A016679
Has elevated privileges:true
Has administrator privileges:true
Programmed in:Borland Delphi
Has exited:true

Target ID:33
Start time:14:11:04
Start date:29/10/2024
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",__dbk_fcall_wrapper
Imagebase:0xf0000
File size:61'440 bytes
MD5 hash:889B99C52A60DD49227C5E485A016679
Has elevated privileges:true
Has administrator privileges:true
Programmed in:Borland Delphi
Has exited:true

Target ID:34
Start time:14:11:04
Start date:29/10/2024
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",TMethodImplementationIntercept
Imagebase:0xf0000
File size:61'440 bytes
MD5 hash:889B99C52A60DD49227C5E485A016679
Has elevated privileges:true
Has administrator privileges:true
Programmed in:Borland Delphi
Has exited:true

Target ID:35
Start time:14:11:04
Start date:29/10/2024
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe "C:\Users\user\Desktop\n57kYr8YQW.dll",BarRecognize
Imagebase:0xf0000
File size:61'440 bytes
MD5 hash:889B99C52A60DD49227C5E485A016679
Has elevated privileges:true
Has administrator privileges:true
Programmed in:Borland Delphi
Has exited:true

Target ID:38
Start time:14:11:04
Start date:29/10/2024
Path:C:\Windows\SysWOW64\WerFault.exe
Wow64 process (32bit):true
Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 3488 -s 640
Imagebase:0x350000
File size:483'680 bytes
MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:39
Start time:14:11:05
Start date:29/10/2024
Path:C:\Windows\SysWOW64\WerFault.exe
Wow64 process (32bit):true
Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 828 -s 640
Imagebase:0x350000
File size:483'680 bytes
MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Reset < >

    Execution Graph

    Execution Coverage:0.9%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:9.7%
    Total number of Nodes:331
    Total number of Limit Nodes:24
    execution_graph 48080 427884 48095 40a060 48080->48095 48084 4278bc 48085 4278c8 GetFileVersionInfoSizeW 48084->48085 48086 42796e 48085->48086 48089 4278d8 48085->48089 48104 409c38 48086->48104 48090 427901 GetFileVersionInfoW 48089->48090 48091 427925 48090->48091 48092 42790b VerQueryValueW 48090->48092 48103 406e40 11 API calls 48091->48103 48092->48091 48094 427966 48097 40a064 48095->48097 48096 40a088 48099 40a1c8 48096->48099 48097->48096 48108 406e40 11 API calls 48097->48108 48101 40a130 48099->48101 48100 40a16b 48100->48084 48101->48100 48109 406e40 11 API calls 48101->48109 48103->48094 48105 409c59 48104->48105 48106 409c3e 48104->48106 48106->48105 48110 406e40 11 API calls 48106->48110 48108->48096 48109->48100 48110->48105 48111 40c278 48112 40c2a4 48111->48112 48113 40c288 GetModuleFileNameW 48111->48113 48115 40d4ec GetModuleFileNameW 48113->48115 48116 40d53a 48115->48116 48125 40d3c8 48116->48125 48118 40d566 48119 40d580 48118->48119 48121 40d578 LoadLibraryExW 48118->48121 48151 409c98 48119->48151 48121->48119 48123 409c38 11 API calls 48124 40d5a5 48123->48124 48124->48112 48126 40d3e9 48125->48126 48127 409c38 11 API calls 48126->48127 48128 40d406 48127->48128 48130 40a060 11 API calls 48128->48130 48141 40d471 48128->48141 48129 409c98 11 API calls 48131 40d4de 48129->48131 48133 40d41b 48130->48133 48131->48118 48132 40d44c 48155 40d104 48132->48155 48133->48132 48218 40ab24 48133->48218 48137 40d473 GetUserDefaultUILanguage 48163 40cab4 EnterCriticalSection 48137->48163 48138 40d464 48139 40d230 13 API calls 48138->48139 48139->48141 48141->48129 48145 40d4b5 48145->48141 48200 40d2fc 48145->48200 48146 40d49b GetSystemDefaultUILanguage 48147 40cab4 28 API calls 48146->48147 48149 40d4a8 48147->48149 48150 40d230 13 API calls 48149->48150 48150->48145 48152 409c9e 48151->48152 48153 409cc4 48152->48153 48286 406e40 11 API calls 48152->48286 48153->48123 48156 40d126 48155->48156 48157 40d138 48155->48157 48222 40cde8 48156->48222 48161 409c38 11 API calls 48157->48161 48159 40d130 48246 40d168 11 API calls 48159->48246 48162 40d15a 48161->48162 48162->48137 48162->48138 48164 40cb00 LeaveCriticalSection 48163->48164 48165 40cae0 48163->48165 48166 409c38 11 API calls 48164->48166 48167 40caf1 LeaveCriticalSection 48165->48167 48168 40cb11 IsValidLocale 48166->48168 48169 40cba2 48167->48169 48170 40cb20 48168->48170 48171 40cb6f EnterCriticalSection 48168->48171 48175 409c38 11 API calls 48169->48175 48173 40cb34 48170->48173 48174 40cb29 48170->48174 48172 40cb87 48171->48172 48182 40cb98 LeaveCriticalSection 48172->48182 48250 40c79c 14 API calls 48173->48250 48249 40c998 17 API calls 48174->48249 48178 40cbb7 48175->48178 48188 40d230 48178->48188 48179 40cb32 48179->48171 48180 40cb3d GetSystemDefaultUILanguage 48180->48171 48181 40cb47 48180->48181 48183 40cb58 GetSystemDefaultUILanguage 48181->48183 48251 40a018 11 API calls 48181->48251 48182->48169 48252 40c79c 14 API calls 48183->48252 48186 40cb65 48253 40a018 11 API calls 48186->48253 48189 40d24e 48188->48189 48190 409c38 11 API calls 48189->48190 48197 40d26b 48190->48197 48191 40d2c9 48192 409c38 11 API calls 48191->48192 48193 40d2d0 48192->48193 48194 409c98 11 API calls 48193->48194 48195 40d2ea 48194->48195 48195->48145 48195->48146 48196 40ab24 11 API calls 48196->48197 48197->48191 48197->48193 48197->48196 48254 40a9b4 48197->48254 48265 40d1c4 48197->48265 48275 409d1c 48200->48275 48203 40d34c 48204 40a9b4 11 API calls 48203->48204 48205 40d359 48204->48205 48206 40d1c4 13 API calls 48205->48206 48209 40d360 48206->48209 48207 40d399 48208 409c98 11 API calls 48207->48208 48210 40d3b3 48208->48210 48209->48207 48211 40a9b4 11 API calls 48209->48211 48212 409c38 11 API calls 48210->48212 48213 40d387 48211->48213 48214 40d3bb 48212->48214 48215 40d1c4 13 API calls 48213->48215 48214->48141 48216 40d38e 48215->48216 48216->48207 48217 409c38 11 API calls 48216->48217 48217->48207 48219 40ab2f 48218->48219 48277 409dc0 48219->48277 48223 40cdff 48222->48223 48224 40ce13 GetModuleFileNameW 48223->48224 48225 40ce28 48223->48225 48224->48225 48226 40ce50 RegOpenKeyExW 48225->48226 48227 40cff7 48225->48227 48229 40cf11 48226->48229 48230 40ce77 RegOpenKeyExW 48226->48230 48228 409c38 11 API calls 48227->48228 48232 40d00c 48228->48232 48247 40cbf8 7 API calls 48229->48247 48230->48229 48233 40ce95 RegOpenKeyExW 48230->48233 48232->48159 48233->48229 48235 40ceb3 RegOpenKeyExW 48233->48235 48234 40cf2f RegQueryValueExW 48236 40cf80 RegQueryValueExW 48234->48236 48238 40cf4d 48234->48238 48235->48229 48237 40ced1 RegOpenKeyExW 48235->48237 48239 40cf7e 48236->48239 48240 40cf9c 48236->48240 48237->48229 48241 40ceef RegOpenKeyExW 48237->48241 48242 40cf55 RegQueryValueExW 48238->48242 48243 40cfe6 RegCloseKey 48239->48243 48248 406e40 11 API calls 48239->48248 48244 40cfa4 RegQueryValueExW 48240->48244 48241->48227 48241->48229 48242->48239 48243->48159 48244->48239 48246->48157 48247->48234 48248->48243 48249->48179 48250->48180 48251->48183 48252->48186 48253->48171 48255 40aa26 48254->48255 48256 40a9b8 48254->48256 48257 40a9c0 48256->48257 48260 40a018 48256->48260 48257->48255 48262 40a9cf 48257->48262 48273 40a018 11 API calls 48257->48273 48258 40a05c 48258->48197 48260->48258 48272 406e40 11 API calls 48260->48272 48262->48255 48274 40a018 11 API calls 48262->48274 48264 40aa22 48264->48197 48266 40d1d9 48265->48266 48267 40d1f6 FindFirstFileW 48266->48267 48268 40d206 FindClose 48267->48268 48269 40d20c 48267->48269 48268->48269 48270 409c38 11 API calls 48269->48270 48271 40d221 48270->48271 48271->48197 48272->48258 48273->48262 48274->48264 48276 409d20 GetUserDefaultUILanguage GetLocaleInfoW 48275->48276 48276->48203 48278 409dd0 48277->48278 48281 409c5c 48278->48281 48282 409c62 48281->48282 48284 409c7d 48281->48284 48282->48284 48285 406e40 11 API calls 48282->48285 48284->48132 48285->48284 48286->48152 48287 50eee8 48292 410548 48287->48292 48293 410553 48292->48293 48297 40961c 48293->48297 48296 409968 11 API calls 48298 409630 GetCurrentThreadId 48297->48298 48299 40962b 48297->48299 48300 409666 48298->48300 48299->48298 48301 409968 48300->48301 48302 4096d9 48300->48302 48303 409984 48301->48303 48304 409995 48301->48304 48316 4095b0 48302->48316 48322 4098d0 GetStdHandle WriteFile GetStdHandle WriteFile 48303->48322 48306 40999e GetCurrentThreadId 48304->48306 48311 4099ab 48304->48311 48306->48311 48309 40998e 48309->48304 48310 406ec8 11 API calls 48310->48311 48311->48310 48312 409a3b FreeLibrary 48311->48312 48313 409a63 48311->48313 48312->48311 48314 409a72 ExitProcess 48313->48314 48315 409a6c 48313->48315 48315->48314 48317 4095c0 48316->48317 48318 4095f8 48316->48318 48317->48318 48323 40ee84 GetSystemInfo 48317->48323 48324 50e000 48317->48324 48336 50e47c 48317->48336 48318->48296 48322->48309 48323->48317 48325 50e0c9 48324->48325 48326 50e01e 48324->48326 48325->48317 48327 50e028 SetThreadLocale 48326->48327 48350 40c520 InitializeCriticalSection GetVersion 48327->48350 48331 50e05e 48332 50e077 GetCommandLineW 48331->48332 48354 405244 GetStartupInfoW 48332->48354 48334 50e0a1 GetACP GetCurrentThreadId 48355 40ee98 GetVersion 48334->48355 48337 50e504 48336->48337 48338 50e496 48336->48338 48337->48317 48356 4097a0 48338->48356 48340 50e4a0 48342 50e4c2 48340->48342 48369 40a018 11 API calls 48340->48369 48362 42782c GetVersionExW 48342->48362 48344 50e4d6 48364 4289ec GetModuleHandleW 48344->48364 48347 40d104 30 API calls 48348 50e4e7 48347->48348 48370 427e74 95 API calls 48348->48370 48351 40c550 6 API calls 48350->48351 48352 40c59e 48350->48352 48351->48352 48353 40ee84 GetSystemInfo 48352->48353 48353->48331 48354->48334 48355->48325 48359 4097ac 48356->48359 48361 4097e3 48359->48361 48371 4096e4 57 API calls 48359->48371 48372 40973c 57 API calls 48359->48372 48373 40978c 57 API calls 48359->48373 48361->48340 48363 427861 48362->48363 48363->48344 48365 4289fd 48364->48365 48367 428a0d 48364->48367 48374 4139b0 13 API calls 48365->48374 48367->48347 48368 428a08 48368->48367 48369->48342 48370->48337 48371->48359 48372->48359 48373->48359 48374->48368 48375 4eee14 MulDiv 48376 4eee66 48375->48376 48377 4eee50 48375->48377 48391 4d8de8 48376->48391 48443 4eedd0 GetDC SelectObject GetTextMetricsW ReleaseDC 48377->48443 48380 4eee55 48380->48376 48384 40a060 11 API calls 48380->48384 48381 4eee72 48395 4d8ed0 48381->48395 48384->48376 48387 4eeeb9 48392 4d8dee 48391->48392 48393 4d8ed0 14 API calls 48392->48393 48394 4d8e06 48393->48394 48394->48381 48396 4d8edd 48395->48396 48397 4d8ef7 48395->48397 48398 4d8eed 48396->48398 48399 4d8ee3 RegCloseKey 48396->48399 48401 4d915c 48397->48401 48400 4d8ea0 13 API calls 48398->48400 48399->48398 48400->48397 48402 40a060 11 API calls 48401->48402 48403 4d9186 48402->48403 48405 4d91a6 48403->48405 48450 40ab6c 11 API calls 48403->48450 48406 4d91d4 RegOpenKeyExW 48405->48406 48407 4d91e3 48406->48407 48409 4d91ec 48407->48409 48412 4d922a 48407->48412 48408 4d9218 48452 4d8efc 13 API calls 48408->48452 48409->48408 48451 40aa3c 11 API calls 48409->48451 48414 4d924a RegOpenKeyExW 48412->48414 48413 4d9225 48416 409c38 11 API calls 48413->48416 48415 4d9259 48414->48415 48418 4d9262 48415->48418 48422 4d929d 48415->48422 48417 4d931e 48416->48417 48417->48387 48428 4d99e8 48417->48428 48419 4d928e 48418->48419 48453 40aa3c 11 API calls 48418->48453 48454 4d8efc 13 API calls 48419->48454 48423 4d92bb RegOpenKeyExW 48422->48423 48425 4d92ca 48423->48425 48424 4d92fc 48456 4d8efc 13 API calls 48424->48456 48425->48413 48425->48424 48455 40aa3c 11 API calls 48425->48455 48457 4d9930 48428->48457 48431 4d9a57 48433 409c38 11 API calls 48431->48433 48432 4d9a02 48434 409dc0 11 API calls 48432->48434 48435 4d9a4c 48433->48435 48436 4d9a14 48434->48436 48444 4d8ea0 48435->48444 48460 4d9edc 48436->48460 48438 4d9a2c 48439 4d9a4e 48438->48439 48441 4d9a38 48438->48441 48469 4d8c68 80 API calls 48439->48469 48468 40a8dc 11 API calls 48441->48468 48443->48380 48445 4d8ecc 48444->48445 48446 4d8eaa 48444->48446 48445->48387 48447 4d8eb6 RegCloseKey 48446->48447 48448 4d8eb0 RegFlushKey 48446->48448 48449 409c38 11 API calls 48447->48449 48448->48447 48449->48445 48450->48405 48452->48413 48454->48413 48456->48413 48470 4d98dc 48457->48470 48459 4d9944 48459->48431 48459->48432 48474 40a748 48460->48474 48462 4d9f02 RegQueryValueExW 48463 4d9f15 48462->48463 48465 4d9f3d 48463->48465 48476 426a14 80 API calls 48463->48476 48465->48438 48466 4d9f38 48477 4092b4 11 API calls 48466->48477 48468->48435 48469->48435 48471 4d98f4 48470->48471 48472 4d9908 RegQueryValueExW 48471->48472 48473 4d991b 48472->48473 48473->48459 48475 40a74e 48474->48475 48475->48462 48476->48466 48478 40591c 48479 405b7c 48478->48479 48489 405934 48478->48489 48481 405c94 48479->48481 48482 405b40 48479->48482 48480 405946 48485 405955 48480->48485 48492 405a34 48480->48492 48495 405a15 Sleep 48480->48495 48483 4056c8 VirtualAlloc 48481->48483 48484 405c9d 48481->48484 48486 405b9a 48482->48486 48488 405b5a Sleep 48482->48488 48487 4056f3 48483->48487 48491 405703 48483->48491 48496 405600 VirtualAlloc 48486->48496 48500 405bb8 48486->48500 48502 40567c Sleep Sleep 48487->48502 48488->48486 48493 405b70 Sleep 48488->48493 48489->48480 48494 4059d1 Sleep 48489->48494 48501 405a40 48492->48501 48503 405600 48492->48503 48493->48482 48494->48480 48497 4059e7 Sleep 48494->48497 48495->48492 48499 405a2b Sleep 48495->48499 48496->48500 48497->48489 48499->48480 48502->48491 48507 405594 48503->48507 48505 405609 VirtualAlloc 48506 405620 48505->48506 48506->48501 48508 405534 48507->48508 48508->48505

    Control-flow Graph

    APIs
    • GetUserDefaultUILanguage.KERNEL32(00000003,?,00000004,00000000,0040D3BC,?,?), ref: 0040D32E
    • GetLocaleInfoW.KERNEL32(?,00000003,?,00000004,00000000,0040D3BC,?,?), ref: 0040D337
      • Part of subcall function 0040D1C4: FindFirstFileW.KERNEL32(00000000,?,00000000,0040D222,?,00000001), ref: 0040D1F7
      • Part of subcall function 0040D1C4: FindClose.KERNEL32(00000000,00000000,?,00000000,0040D222,?,00000001), ref: 0040D207
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: Find$CloseDefaultFileFirstInfoLanguageLocaleUser
    • String ID:
    • API String ID: 3216391948-0
    • Opcode ID: bb5aebafb1050cca1833a86485a25d2ce173cc466728c947d737821306c0bec7
    • Instruction ID: 31cc6c2f53d714b9faa06a3b986118d36ba9187928ad3646f11bb52bdd509fcd
    • Opcode Fuzzy Hash: bb5aebafb1050cca1833a86485a25d2ce173cc466728c947d737821306c0bec7
    • Instruction Fuzzy Hash: DD113670E042099BDF00EFA5D952AAEB3B4EF45304F50447EB904B73C2D7785E098669

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 333 40d1c4-40d204 call 409d1c call 40a748 FindFirstFileW 338 40d206-40d207 FindClose 333->338 339 40d20c-40d221 call 409c38 333->339 338->339
    APIs
    • FindFirstFileW.KERNEL32(00000000,?,00000000,0040D222,?,00000001), ref: 0040D1F7
    • FindClose.KERNEL32(00000000,00000000,?,00000000,0040D222,?,00000001), ref: 0040D207
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: Find$CloseFileFirst
    • String ID:
    • API String ID: 2295610775-0
    • Opcode ID: fd6b56c6bec8101a1a2edd49b896a968750317b75b60eb436ea3e7407fe2b467
    • Instruction ID: f2706f95e4b90df003fff4208de2c5c05cd5cdeba3f5e8022b992bb7b9acb03d
    • Opcode Fuzzy Hash: fd6b56c6bec8101a1a2edd49b896a968750317b75b60eb436ea3e7407fe2b467
    • Instruction Fuzzy Hash: 80F08271944608BEDB20FBB5DC5299EB7FCEB48314BA005BAB404F31D2EB389E14995D
    APIs
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: InfoSystem
    • String ID:
    • API String ID: 31276548-0
    • Opcode ID: c27e8cf9b7b8b28db5bf16ce19b686b88097b3598cd7681285108ea85b127420
    • Instruction ID: 4e8efc271a9064b51e8e7fb51594f2112b3c6a5914667696f4d1ddbf71e3eb2d
    • Opcode Fuzzy Hash: c27e8cf9b7b8b28db5bf16ce19b686b88097b3598cd7681285108ea85b127420
    • Instruction Fuzzy Hash: 72A012208088000EC408A7194C4350F31805941118FC40624785CA92C2E619896546EF

    Control-flow Graph

    APIs
    • GetModuleFileNameW.KERNEL32(00000000,?,00000105,00000000,0040D00D,?,?), ref: 0040CE21
    • RegOpenKeyExW.ADVAPI32(80000001,Software\Embarcadero\Locales,00000000,000F0019,?,00000000,0040D00D,?,?), ref: 0040CE6A
    • RegOpenKeyExW.ADVAPI32(80000002,Software\Embarcadero\Locales,00000000,000F0019,?,80000001,Software\Embarcadero\Locales,00000000,000F0019,?,00000000,0040D00D,?,?), ref: 0040CE8C
    • RegOpenKeyExW.ADVAPI32(80000001,Software\CodeGear\Locales,00000000,000F0019,?,80000002,Software\Embarcadero\Locales,00000000,000F0019,?,80000001,Software\Embarcadero\Locales,00000000,000F0019,?,00000000), ref: 0040CEAA
    • RegOpenKeyExW.ADVAPI32(80000002,Software\CodeGear\Locales,00000000,000F0019,?,80000001,Software\CodeGear\Locales,00000000,000F0019,?,80000002,Software\Embarcadero\Locales,00000000,000F0019,?,80000001), ref: 0040CEC8
    • RegOpenKeyExW.ADVAPI32(80000001,Software\Borland\Locales,00000000,000F0019,?,80000002,Software\CodeGear\Locales,00000000,000F0019,?,80000001,Software\CodeGear\Locales,00000000,000F0019,?,80000002), ref: 0040CEE6
    • RegOpenKeyExW.ADVAPI32(80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,80000002,Software\CodeGear\Locales,00000000,000F0019,?,80000001), ref: 0040CF04
    • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,00000000,?,00000000,0040CFF0,?,80000001,Software\Embarcadero\Locales,00000000,000F0019,?,00000000,0040D00D), ref: 0040CF44
    • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,?,00000000,00000000,00000000,?,00000000,0040CFF0,?,80000001), ref: 0040CF6F
    • RegCloseKey.ADVAPI32(?,0040CFF7,00000000,00000000,?,?,?,00000000,00000000,00000000,?,00000000,0040CFF0,?,80000001,Software\Embarcadero\Locales), ref: 0040CFEA
    Strings
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: Open$QueryValue$CloseFileModuleName
    • String ID: Software\Borland\Delphi\Locales$Software\Borland\Locales$Software\CodeGear\Locales$Software\Embarcadero\Locales
    • API String ID: 2701450724-3496071916
    • Opcode ID: f7c917e479dc5b8b684dcf2a59e43bffe3130ab6fea02e13758483d346620e00
    • Instruction ID: 80583e44c54d8f6c8431ac525ce0e8cce3f8a82ce7c118a8e5b64ed8406c3328
    • Opcode Fuzzy Hash: f7c917e479dc5b8b684dcf2a59e43bffe3130ab6fea02e13758483d346620e00
    • Instruction Fuzzy Hash: DC512675A40609BEEB20DBA5CC82FAFB7BCDB08704F504077BA04F61C1D6789D059A5D

    Control-flow Graph

    APIs
    • EnterCriticalSection.KERNEL32(0051AC10,00000000,0040CBB8,?,?,?,00000000,?,0040D480,00000000,0040D4DF,?,?,00000000,00000000,00000000), ref: 0040CAD2
    • LeaveCriticalSection.KERNEL32(0051AC10,0051AC10,00000000,0040CBB8,?,?,?,00000000,?,0040D480,00000000,0040D4DF,?,?,00000000,00000000), ref: 0040CAF6
    • LeaveCriticalSection.KERNEL32(0051AC10,0051AC10,00000000,0040CBB8,?,?,?,00000000,?,0040D480,00000000,0040D4DF,?,?,00000000,00000000), ref: 0040CB05
    • IsValidLocale.KERNEL32(00000000,00000002,0051AC10,0051AC10,00000000,0040CBB8,?,?,?,00000000,?,0040D480,00000000,0040D4DF), ref: 0040CB17
    • EnterCriticalSection.KERNEL32(0051AC10,00000000,00000002,0051AC10,0051AC10,00000000,0040CBB8,?,?,?,00000000,?,0040D480,00000000,0040D4DF), ref: 0040CB74
    • LeaveCriticalSection.KERNEL32(0051AC10,0051AC10,00000000,00000002,0051AC10,0051AC10,00000000,0040CBB8,?,?,?,00000000,?,0040D480,00000000,0040D4DF), ref: 0040CB9D
    Strings
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: CriticalSection$Leave$Enter$LocaleValid
    • String ID: en-GB,en,en-US,
    • API String ID: 975949045-3021119265
    • Opcode ID: 16983b795ea3f6d15511b6f3b7a2fd081026003eab2b4e0bc2c7165cd39925dc
    • Instruction ID: dbd07ac227d82710da470fa0a9828874cbe6fbb8e5c29b4c0eb771d3e90eaa4c
    • Opcode Fuzzy Hash: 16983b795ea3f6d15511b6f3b7a2fd081026003eab2b4e0bc2c7165cd39925dc
    • Instruction Fuzzy Hash: 59214220740744D7EA12B77AA85376E36A4EB45718F50853BB000B72C2D9BD9D418ADF

    Control-flow Graph

    APIs
    • MulDiv.KERNEL32(00000008,00000060,00000048), ref: 004EEE3A
      • Part of subcall function 004EEDD0: GetDC.USER32(00000000), ref: 004EEDD9
      • Part of subcall function 004EEDD0: SelectObject.GDI32(00000000,058A00B4), ref: 004EEDEB
      • Part of subcall function 004EEDD0: GetTextMetricsW.GDI32(00000000), ref: 004EEDF6
      • Part of subcall function 004EEDD0: ReleaseDC.USER32(00000000,00000000), ref: 004EEE07
    Strings
    • Tahoma, xrefs: 004EEE5C
    • SOFTWARE\Microsoft\Windows NT\CurrentVersion\FontSubstitutes, xrefs: 004EEE90
    • MS Shell Dlg 2, xrefs: 004EEEA4
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: MetricsObjectReleaseSelectText
    • String ID: MS Shell Dlg 2$SOFTWARE\Microsoft\Windows NT\CurrentVersion\FontSubstitutes$Tahoma
    • API String ID: 2013942131-1011973972
    • Opcode ID: 097e2b04109c535b1ff6f7b8f22f0f4b945d927974ab36b84c2c83510e6f8af6
    • Instruction ID: e778abe1add94e60aef3389f339230e1650141aaed61f0d7e84fdd46377505a2
    • Opcode Fuzzy Hash: 097e2b04109c535b1ff6f7b8f22f0f4b945d927974ab36b84c2c83510e6f8af6
    • Instruction Fuzzy Hash: 7E11D030600149AFC711EF6BCC12A9E7BB5EB45705F90847BF400A7791DB39AD01CB18

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 84 40961c-409629 85 409630-409664 GetCurrentThreadId 84->85 86 40962b 84->86 87 409666 85->87 88 409668-409694 call 409500 85->88 86->85 87->88 91 409696-409698 88->91 92 40969d-4096a4 88->92 91->92 93 40969a 91->93 94 4096a6-4096a9 92->94 95 4096ae-4096b4 92->95 93->92 94->95 96 4096b6 95->96 97 4096b9-4096c0 95->97 96->97 98 4096c2-4096c9 97->98 99 4096cf-4096d3 97->99 98->99 100 409968-409982 99->100 101 4096d9 call 4095b0 99->101 102 409984-409990 call 409848 call 4098d0 100->102 103 409995-40999c 100->103 108 4096de 101->108 102->103 106 40999e-4099a9 GetCurrentThreadId 103->106 107 4099bf-4099c3 103->107 106->107 110 4099ab-4099ba call 409520 call 4098a4 106->110 111 4099c5-4099c9 107->111 112 4099dd-4099e1 107->112 110->107 111->112 117 4099cb-4099db 111->117 113 4099e3-4099e6 112->113 114 4099ed-4099f1 112->114 113->114 118 4099e8-4099ea 113->118 119 409a10-409a19 call 409548 114->119 120 4099f3-4099fc call 406ec8 114->120 117->112 118->114 130 409a20-409a25 119->130 131 409a1b-409a1e 119->131 120->119 129 4099fe-409a0e call 407dcc call 406ec8 120->129 129->119 132 409a41-409a4c call 409520 130->132 133 409a27-409a35 call 40d6dc 130->133 131->130 131->132 142 409a51-409a55 132->142 143 409a4e 132->143 133->132 141 409a37-409a39 133->141 141->132 145 409a3b-409a3c FreeLibrary 141->145 146 409a57-409a59 call 4098a4 142->146 147 409a5e-409a61 142->147 143->142 145->132 146->147 149 409a63-409a6a 147->149 150 409a7a-409a8b 147->150 151 409a72-409a75 ExitProcess 149->151 152 409a6c 149->152 150->112 152->151
    APIs
    • GetCurrentThreadId.KERNEL32 ref: 00409653
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: CurrentThread
    • String ID:
    • API String ID: 2882836952-0
    • Opcode ID: 5a2d98b2b9303db085ca7903a3e8743554e309b17d8937ec0eab1567879db523
    • Instruction ID: 57d564f7514a768ac0d6b140dc1e0ae383663f7c9c7dd69698fd604fdf563357
    • Opcode Fuzzy Hash: 5a2d98b2b9303db085ca7903a3e8743554e309b17d8937ec0eab1567879db523
    • Instruction Fuzzy Hash: FF516B706002449BDB25EF6AC88479B7BE1AF59314F14843FE809AA3D3D779DC88CB59

    Control-flow Graph

    APIs
    • SetThreadLocale.KERNEL32(00000400,00000000,0050E0D7), ref: 0050E02D
      • Part of subcall function 0040C520: InitializeCriticalSection.KERNEL32(0051AC10,0050E037,00000400,00000000,0050E0D7), ref: 0040C525
      • Part of subcall function 0040C520: GetVersion.KERNEL32(0051AC10,0050E037,00000400,00000000,0050E0D7), ref: 0040C533
      • Part of subcall function 0040C520: GetModuleHandleW.KERNEL32(kernel32.dll,GetThreadPreferredUILanguages,0051AC10,0050E037,00000400,00000000,0050E0D7), ref: 0040C55A
      • Part of subcall function 0040C520: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0040C560
      • Part of subcall function 0040C520: GetModuleHandleW.KERNEL32(kernel32.dll,SetThreadPreferredUILanguages,00000000,kernel32.dll,GetThreadPreferredUILanguages,0051AC10,0050E037,00000400,00000000,0050E0D7), ref: 0040C574
      • Part of subcall function 0040C520: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0040C57A
      • Part of subcall function 0040C520: GetModuleHandleW.KERNEL32(kernel32.dll,GetThreadUILanguage,00000000,kernel32.dll,SetThreadPreferredUILanguages,00000000,kernel32.dll,GetThreadPreferredUILanguages,0051AC10,0050E037,00000400,00000000,0050E0D7), ref: 0040C58E
      • Part of subcall function 0040C520: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0040C594
      • Part of subcall function 0040EE84: GetSystemInfo.KERNEL32 ref: 0040EE88
    • GetCommandLineW.KERNEL32(00000400,00000000,0050E0D7), ref: 0050E092
      • Part of subcall function 00405244: GetStartupInfoW.KERNEL32 ref: 00405255
    • GetACP.KERNEL32(00000400,00000000,0050E0D7), ref: 0050E0A6
    • GetCurrentThreadId.KERNEL32 ref: 0050E0BA
      • Part of subcall function 0040EE98: GetVersion.KERNEL32(0050E0C9,00000400,00000000,0050E0D7), ref: 0040EE98
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: AddressHandleModuleProc$InfoThreadVersion$CommandCriticalCurrentInitializeLineLocaleSectionStartupSystem
    • String ID:
    • API String ID: 2740004594-0
    • Opcode ID: da96efc90d0f3f823da1e0c30568e20cb602c22b5ccd4f7319bb0d9d278b2238
    • Instruction ID: b63630b870325ab19e945f9b7a74bc4420f07e9680e2ed97b13d29786ef075bf
    • Opcode Fuzzy Hash: da96efc90d0f3f823da1e0c30568e20cb602c22b5ccd4f7319bb0d9d278b2238
    • Instruction Fuzzy Hash: 3411217040478889D720FF72AC1A2693AA4FB19308710C87ED1006A2E2DFBD540CEF6E

    Control-flow Graph

    APIs
    • RegOpenKeyExW.ADVAPI32(00000000,00000000,00000000,?,?,00000000,004D931F), ref: 004D91D5
    • RegOpenKeyExW.ADVAPI32(00000000,00000000,00000000,?,?,00000000,00000000,00000000,?,?,00000000,004D931F), ref: 004D924B
    • RegOpenKeyExW.ADVAPI32(00000000,00000000,00000000,?,?,00000000,00000000,00000000,?,?,00000000,00000000,00000000,?,?,00000000), ref: 004D92BC
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: Open
    • String ID:
    • API String ID: 71445658-0
    • Opcode ID: 297e97f5790f3bfbe46446021c8049ae68c7a4fb6bdd877cd8b5aad7bbb95b8b
    • Instruction ID: ad3af0877aad2f918cc60e01b05eab59aa261d8504b712c7e441bbb361f6d9d3
    • Opcode Fuzzy Hash: 297e97f5790f3bfbe46446021c8049ae68c7a4fb6bdd877cd8b5aad7bbb95b8b
    • Instruction Fuzzy Hash: 87515431B00208BFDB11EBA5C852B9EB7FAAB48304F15446FB444E3382DA7D9F069759

    Control-flow Graph

    APIs
    • GetFileVersionInfoSizeW.VERSION(00000000,?,00000000,00427984), ref: 004278C9
    • GetFileVersionInfoW.VERSION(00000000,?,00000000,?,00000000,00427967,?,00000000,?,00000000,00427984), ref: 00427902
    • VerQueryValueW.VERSION(?,00427998,?,?,00000000,?,00000000,?,00000000,00427967,?,00000000,?,00000000,00427984), ref: 0042791C
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: FileInfoVersion$QuerySizeValue
    • String ID:
    • API String ID: 2179348866-0
    • Opcode ID: d254ea856f19eca79d65d9f3d227b80f169b0e93736270e157245cabf41f0a7c
    • Instruction ID: c637f2b1f86e41ba3c57f6c02bd3706f471a10e856d15e50b91235f572eefc7d
    • Opcode Fuzzy Hash: d254ea856f19eca79d65d9f3d227b80f169b0e93736270e157245cabf41f0a7c
    • Instruction Fuzzy Hash: BC3141B5A04319AFEB00DFA9D881DAEB7F8EB48704B9144BAF544E3241D778DE40CB65

    Control-flow Graph

    APIs
    • RegQueryValueExW.ADVAPI32(?,00000000,00000000,?,00000000,?,?,004D9BB9), ref: 004D9F07
    Strings
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: QueryValue
    • String ID: 8DA
    • API String ID: 3660427363-1089967677
    • Opcode ID: fb23700e1ae61f67946166d4bf62f27f5b8893b9de390ec045e8b9287b1db4f3
    • Instruction ID: e25cda230c208e90296d212b571606f5724dbad4f61f31a9ad7a87890f2af682
    • Opcode Fuzzy Hash: fb23700e1ae61f67946166d4bf62f27f5b8893b9de390ec045e8b9287b1db4f3
    • Instruction Fuzzy Hash: D5015E71A00208AFDB00EFA9DC81ADAB7E89B59314F0081ABF914DB342DA759E0587A5

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 251 40d3c8-40d40a call 409d1c * 2 call 409c38 258 40d410-40d420 call 40a060 251->258 259 40d4c4-40d4de call 409c98 251->259 264 40d422-40d425 258->264 265 40d427-40d42c 258->265 264->265 266 40d453-40d462 call 40d104 265->266 267 40d42e-40d437 265->267 274 40d473-40d490 GetUserDefaultUILanguage call 40cab4 call 40d230 266->274 275 40d464-40d471 call 40d230 266->275 268 40d439-40d44c call 40ab24 267->268 269 40d44e-40d451 267->269 268->266 269->266 269->267 282 40d492-40d499 274->282 283 40d4b5-40d4b8 274->283 275->259 282->283 284 40d49b-40d4b0 GetSystemDefaultUILanguage call 40cab4 call 40d230 282->284 283->259 285 40d4ba-40d4bf call 40d2fc 283->285 284->283 285->259
    APIs
    • GetUserDefaultUILanguage.KERNEL32(00000000,0040D4DF,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,0040D566,00000000,?,00000105), ref: 0040D473
    • GetSystemDefaultUILanguage.KERNEL32(00000000,0040D4DF,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,0040D566,00000000,?,00000105), ref: 0040D49B
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: DefaultLanguage$SystemUser
    • String ID:
    • API String ID: 384301227-0
    • Opcode ID: e5fbb9e0fc620f56b36578c07845851fe2fed8148833940ec20a2950b4b279a8
    • Instruction ID: 914cf1b0947d833fcc03ff50d5076885400eec8b7426a2207ce03941fa5f7576
    • Opcode Fuzzy Hash: e5fbb9e0fc620f56b36578c07845851fe2fed8148833940ec20a2950b4b279a8
    • Instruction Fuzzy Hash: DB31EB30E142099BDB10EFA9C891BAEB7B5EF44304F50457BE400B72D2D778AD498A59

    Control-flow Graph

    APIs
    • GetModuleFileNameW.KERNEL32(00000000,?,00000105,00000000,0040D5A6,?,00400000,0050FC1C), ref: 0040D528
    • LoadLibraryExW.KERNEL32(00000000,00000000,00000002,00000000,?,00000105,00000000,0040D5A6,?,00400000,0050FC1C), ref: 0040D579
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: FileLibraryLoadModuleName
    • String ID:
    • API String ID: 1159719554-0
    • Opcode ID: 783f705d58062fb5f8e85dc88ba71afedba3f43c8334a4a5c8ebaaa4e4aa5bf8
    • Instruction ID: 258510d9c4dee0299c5f3f79c4fbca46c564eaaadbdb9c5c4e3057b0bb4fa4ad
    • Opcode Fuzzy Hash: 783f705d58062fb5f8e85dc88ba71afedba3f43c8334a4a5c8ebaaa4e4aa5bf8
    • Instruction Fuzzy Hash: 3F114F70E4461CABDB10EB94CC86BDE73B8DB04304F5144BAB508B72D1EA785F858A99

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 328 405600-40561e call 405594 VirtualAlloc 331 405620-40566d 328->331 332 40566e-405679 328->332
    APIs
    • VirtualAlloc.KERNEL32(00000000,0013FFF0,00001000,00000004,?,?,00405C17), ref: 00405617
    Strings
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: AllocVirtual
    • String ID: @.
    • API String ID: 4275171209-4201455939
    • Opcode ID: e9bd031fac14de1d523f3f0fd1d0bc821c44dc6a8c79c950d7b754ab0e602f81
    • Instruction ID: 7dac567e4a07de2f06f580edb35680116b9bdba5c2a0860377bbd693bdd19f0d
    • Opcode Fuzzy Hash: e9bd031fac14de1d523f3f0fd1d0bc821c44dc6a8c79c950d7b754ab0e602f81
    • Instruction Fuzzy Hash: 49F0AFF2B003004FD7248F789D407A67AD4FB08324F10827FE908EB798DBB488048B84

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 342 4d8ea0-4d8ea8 343 4d8ecc-4d8ecd 342->343 344 4d8eaa-4d8eae 342->344 345 4d8eb6-4d8ec7 RegCloseKey call 409c38 344->345 346 4d8eb0-4d8eb1 RegFlushKey 344->346 345->343 346->345
    APIs
    • RegFlushKey.ADVAPI32(00000000,?,004D8F0C,?,?,00000000,004D9123,00000000,00000000,00000000,?,?,00000000,004D9139), ref: 004D8EB1
    • RegCloseKey.ADVAPI32(00000000,?,004D8F0C,?,?,00000000,004D9123,00000000,00000000,00000000,?,?,00000000,004D9139), ref: 004D8EBA
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: CloseFlush
    • String ID:
    • API String ID: 320916635-0
    • Opcode ID: 53487b9075c46a64610a4022df3c6a921f3544410d10f835025151eaea8ac81c
    • Instruction ID: 6f4c2654893a1a96a1da4be1dd0c350b83e18a7e628d6434c516513760379d46
    • Opcode Fuzzy Hash: 53487b9075c46a64610a4022df3c6a921f3544410d10f835025151eaea8ac81c
    • Instruction Fuzzy Hash: 40D067B1E042049ADF60EF7AC9C5A577BDC6F44315B08C4ABB808DF247DA3CD9409B28

    Control-flow Graph

    APIs
    • RegQueryValueExW.ADVAPI32(?,00000000,00000000,?,00000000,?,?,?,?,?,004D9AE0,00000000,004D9C1C), ref: 004D990D
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: QueryValue
    • String ID:
    • API String ID: 3660427363-0
    • Opcode ID: ad67be82557188437bc6127552a9993e0998d0cde0f580ab283647e522f4a4dc
    • Instruction ID: bf80709a24f295cc4fff76cdf4c79f612c8773d4563c6b2b62db8eae0a0485ee
    • Opcode Fuzzy Hash: ad67be82557188437bc6127552a9993e0998d0cde0f580ab283647e522f4a4dc
    • Instruction Fuzzy Hash: 3CF01C623052046FD344FA6E9C81F6B66DC9B88754F10843FB248C7342D964DC058375
    APIs
    • GetModuleFileNameW.KERNEL32(00400000,?,0000020A), ref: 0040C296
      • Part of subcall function 0040D4EC: GetModuleFileNameW.KERNEL32(00000000,?,00000105,00000000,0040D5A6,?,00400000,0050FC1C), ref: 0040D528
      • Part of subcall function 0040D4EC: LoadLibraryExW.KERNEL32(00000000,00000000,00000002,00000000,?,00000105,00000000,0040D5A6,?,00400000,0050FC1C), ref: 0040D579
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: FileModuleName$LibraryLoad
    • String ID:
    • API String ID: 4113206344-0
    • Opcode ID: d994d483d02e46fdff6fa18ed6b597f72d1d7e29fcadbbba57b44e2c2294e8a2
    • Instruction ID: dd2aa8039920255b97d322d6193c29fca073ce87a4a4145dda77fc50cf625817
    • Opcode Fuzzy Hash: d994d483d02e46fdff6fa18ed6b597f72d1d7e29fcadbbba57b44e2c2294e8a2
    • Instruction Fuzzy Hash: 07E0ED71E003109BCB10DF98C9C5A4737D8AB08754F0446A6AD14DF387D775DD148BD5
    APIs
    • GetObjectW.GDI32(00000000,00000054,?), ref: 004EAAFC
    • GetDC.USER32(00000000), ref: 004EAB0D
    • CreateCompatibleDC.GDI32(00000000), ref: 004EAB1E
    • CreateBitmap.GDI32(?,?,00000001,00000001,00000000), ref: 004EAB6A
    • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 004EAB8E
    • SelectObject.GDI32(?,?), ref: 004EADE6
    • SelectPalette.GDI32(?,00000000,00000000), ref: 004EAE26
    • RealizePalette.GDI32(?), ref: 004EAE32
    • SetTextColor.GDI32(?,00000000), ref: 004EAE9B
    • SetBkColor.GDI32(?,00000000), ref: 004EAEB6
    • SetDIBColorTable.GDI32(?,00000000,00000002,?,?,00000000,?,00000000,00000000,004EB046,?,00000000,004EB068,?,00000000,004EB079), ref: 004EAEFF
    • FillRect.USER32(?,00000000,00000000), ref: 004EAE83
      • Part of subcall function 004E32AC: GetSysColor.USER32(?), ref: 004E32B6
    • PatBlt.GDI32(?,00000000,00000000,?,?,00FF0062), ref: 004EAF21
    • CreateCompatibleDC.GDI32(00000000), ref: 004EAF34
    • SelectObject.GDI32(004EB33B,00000000), ref: 004EAF57
    • SelectPalette.GDI32(004EB33B,00000000,00000000), ref: 004EAF73
    • RealizePalette.GDI32(004EB33B), ref: 004EAF7E
    • SetTextColor.GDI32(004EB33B,00000000), ref: 004EAF9C
    • SetBkColor.GDI32(004EB33B,00000000), ref: 004EAFB7
    • BitBlt.GDI32(?,00000000,00000000,?,?,004EB33B,00000000,00000000,00CC0020), ref: 004EAFDF
    • SelectPalette.GDI32(004EB33B,00000000,000000FF), ref: 004EAFF1
    • SelectObject.GDI32(004EB33B,00000000), ref: 004EAFFB
    • DeleteDC.GDI32(004EB33B), ref: 004EB016
      • Part of subcall function 004E45BC: EnterCriticalSection.KERNEL32(-00000008), ref: 004E45E4
      • Part of subcall function 004E45BC: CreateBrushIndirect.GDI32(?), ref: 004E4671
      • Part of subcall function 004E45BC: LeaveCriticalSection.KERNEL32(?,004E46A5,-00000008), ref: 004E4698
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: ColorSelect$CreatePalette$Object$Compatible$BitmapCriticalRealizeSectionText$BrushDeleteEnterFillIndirectLeaveRectTable
    • String ID:
    • API String ID: 3271313764-0
    • Opcode ID: fe2f7d032ca60ba23a25b8aee0731278cea1c8a05eae85922534dd69cbd64bb5
    • Instruction ID: 35a244f6f23a8f79e02010a3497fee76c02ec5d27261e314751b2550eb949676
    • Opcode Fuzzy Hash: fe2f7d032ca60ba23a25b8aee0731278cea1c8a05eae85922534dd69cbd64bb5
    • Instruction Fuzzy Hash: 47121975A00248AFDB10DFAAC885F9EB7B9EF08315F118456F914EB291C778EE80CB55
    APIs
    • InitializeCriticalSection.KERNEL32(0051AC10,0050E037,00000400,00000000,0050E0D7), ref: 0040C525
    • GetVersion.KERNEL32(0051AC10,0050E037,00000400,00000000,0050E0D7), ref: 0040C533
    • GetModuleHandleW.KERNEL32(kernel32.dll,GetThreadPreferredUILanguages,0051AC10,0050E037,00000400,00000000,0050E0D7), ref: 0040C55A
    • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0040C560
    • GetModuleHandleW.KERNEL32(kernel32.dll,SetThreadPreferredUILanguages,00000000,kernel32.dll,GetThreadPreferredUILanguages,0051AC10,0050E037,00000400,00000000,0050E0D7), ref: 0040C574
    • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0040C57A
    • GetModuleHandleW.KERNEL32(kernel32.dll,GetThreadUILanguage,00000000,kernel32.dll,SetThreadPreferredUILanguages,00000000,kernel32.dll,GetThreadPreferredUILanguages,0051AC10,0050E037,00000400,00000000,0050E0D7), ref: 0040C58E
    • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0040C594
    Strings
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: AddressHandleModuleProc$CriticalInitializeSectionVersion
    • String ID: GetThreadPreferredUILanguages$GetThreadUILanguage$SetThreadPreferredUILanguages$kernel32.dll
    • API String ID: 74573329-1403180336
    • Opcode ID: 3eb0d1b683875d0a4e7ed686173063676bd5968c29d9e357da0c930b2f0c2479
    • Instruction ID: 8edfc10a46b7400df28ad4f2c85025a5e0675a444164cbed82ad90a550fe5e83
    • Opcode Fuzzy Hash: 3eb0d1b683875d0a4e7ed686173063676bd5968c29d9e357da0c930b2f0c2479
    • Instruction Fuzzy Hash: 15F05EB8951B10BADA023772AD8375F3680DA1070CB20853BB100790D2DEBC19549E9E
    APIs
    • CreateCompatibleDC.GDI32(00000000), ref: 004FFE79
    • CreateDIBSection.GDI32(00000000,?,00000000,?,00000000,00000000), ref: 004FFEC0
    • DeleteObject.GDI32(00000000), ref: 004FFEDE
    • DeleteDC.GDI32(00000000), ref: 004FFEE7
    • SelectObject.GDI32(00000000,00000000), ref: 004FFF18
    • BitBlt.GDI32(00000000,00000000,00000000,?,?,?,?,?,00CC0020), ref: 004FFF47
    • BitBlt.GDI32(?,?,?,?,?,00000000,00000000,00000000,00CC0020), ref: 00500607
    • SelectObject.GDI32(00000000,?), ref: 00500614
    • DeleteObject.GDI32(00000000), ref: 0050061D
    • DeleteDC.GDI32(00000000), ref: 00500626
    Strings
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: DeleteObject$CreateSelect$CompatibleSection
    • String ID: 4iQ
    • API String ID: 1283611041-1953506770
    • Opcode ID: 7130bac8e803064e932ef57a6e6566469b9ff46b5490c7ef49ca98dc624ce1be
    • Instruction ID: 489c7739ec4370bc5bfdebaf3771013a00e6f61c8886369afeb8e820d07e5809
    • Opcode Fuzzy Hash: 7130bac8e803064e932ef57a6e6566469b9ff46b5490c7ef49ca98dc624ce1be
    • Instruction Fuzzy Hash: 62528D71E042598FCB15CFA9C881BEDBBF2FF45300F1481AAE458EB2D2C638A945DB14
    APIs
    • GetModuleHandleW.KERNEL32(kernel32.dll,0041A5A8,?,?), ref: 0040CC15
    • GetProcAddress.KERNEL32(00000000,GetLongPathNameW), ref: 0040CC26
    • FindFirstFileW.KERNEL32(?,?,kernel32.dll,0041A5A8,?,?), ref: 0040CD26
    • FindClose.KERNEL32(?,?,?,kernel32.dll,0041A5A8,?,?), ref: 0040CD38
    • lstrlenW.KERNEL32(?,?,?,?,kernel32.dll,0041A5A8,?,?), ref: 0040CD44
    • lstrlenW.KERNEL32(?,?,?,?,?,kernel32.dll,0041A5A8,?,?), ref: 0040CD89
    Strings
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: Findlstrlen$AddressCloseFileFirstHandleModuleProc
    • String ID: GetLongPathNameW$\$kernel32.dll
    • API String ID: 1930782624-3908791685
    • Opcode ID: 047ad798f282a4f53d2bfa85006bf39dd452bc892cd983c7192c00f70524a19f
    • Instruction ID: 182d901b7ba620ca83dfe24b28ff924219823170be1df94bbfac5eeb8ceb1ef4
    • Opcode Fuzzy Hash: 047ad798f282a4f53d2bfa85006bf39dd452bc892cd983c7192c00f70524a19f
    • Instruction Fuzzy Hash: 73417F71A00618DBDB20EBA4CCC5ADEB3B5AF84314F1846BA9504F72C1E77CAE45CB49
    APIs
    • LoadLibraryW.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,0050A171,?,00000000,?,00000000), ref: 00509F8E
    • IsBadReadPtr.KERNEL32(?,00000014), ref: 0050A142
    Strings
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: LibraryLoadRead
    • String ID: BuildImportTable: GetProcAddress failed$BuildImportTable: ReallocMemory failed$BuildImportTable: can't load library: $Q
    • API String ID: 1452896035-1248965296
    • Opcode ID: 624b6a481da2d4e0e2557361c6a3e5f3bb81faf17dfaa577d8091a5bd25c36fc
    • Instruction ID: 79c6ccc65db54bbd0ac28440b6136ff53135dc4e1d04f2ea193c697df5b6055c
    • Opcode Fuzzy Hash: 624b6a481da2d4e0e2557361c6a3e5f3bb81faf17dfaa577d8091a5bd25c36fc
    • Instruction Fuzzy Hash: 8C714C70A00209AFDB10DB69CC86BAEBBF9FF89310F4484A9F155EB291D774AD45CB11
    APIs
    • FreeLibrary.KERNEL32(00000000,00000000,?,?,?,?,?,00000000,00508E55,?,?,?,?,?,00000000,00000000), ref: 00508FC4
    • VirtualFree.KERNEL32(?,00000000,00008000,?,?,?,?,00000000,00508E55,?,?,?,?,?,00000000,00000000), ref: 00508FF3
    • GetProcessHeap.KERNEL32(00000000,?,?,?,?,?,00000000,00508E55,?,?,?,?,?,00000000,00000000), ref: 00508FFE
    • HeapFree.KERNEL32(00000000,00000000,?,?,?,?,?,00000000,00508E55,?,?,?,?,?,00000000,00000000), ref: 00509004
    • VirtualFree.KERNEL32(?,?,00008000,?,?,?,?,00000000,00508E55,?,?,?,?,?,00000000,00000000), ref: 00509044
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: Free$HeapVirtual$LibraryProcess
    • String ID:
    • API String ID: 565514093-0
    • Opcode ID: ec53eb67f07e112ebaad708714b759570eedab89a0434c605d510451f714df12
    • Instruction ID: 586cf716fabd9d070d37681a3ed92f7946a2b61a65b0c95988127996bec1744a
    • Opcode Fuzzy Hash: ec53eb67f07e112ebaad708714b759570eedab89a0434c605d510451f714df12
    • Instruction Fuzzy Hash: 613181B1204606AFD320EF69CC89F6ABBA9FF84710F144619F554CB292CB64FD45C7A0
    APIs
    • FindResourceW.KERNEL32(?,?,?,?,?,?,00000000,?,004AA7FE,00000000,?), ref: 004AA927
    • LoadResource.KERNEL32(?,?,?,?,?,?,?,?,00000000,?,004AA7FE,00000000,?), ref: 004AA941
    • SizeofResource.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,?,004AA7FE,00000000,?), ref: 004AA95B
    • LockResource.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?,00000000,?,004AA7FE,00000000), ref: 004AA965
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: Resource$FindLoadLockSizeof
    • String ID:
    • API String ID: 3473537107-0
    • Opcode ID: fc04eeb3631007fa40f9e630dbcfa29d272b4c52aaff94a3e4b6f83a4223a638
    • Instruction ID: cb9b2a388fffd021e353bf4cf2117ea65373932cb549638ab777629fd56d0805
    • Opcode Fuzzy Hash: fc04eeb3631007fa40f9e630dbcfa29d272b4c52aaff94a3e4b6f83a4223a638
    • Instruction Fuzzy Hash: 96F062B26042047F5744EE5EA841D5B7BECDE5A264310011FF908D7207DA38ED51837D
    APIs
    • IsValidLocale.KERNEL32(?,00000002,00000000,0040C901,?,0041A5A8,?,00000000), ref: 0040C846
    • GetLocaleInfoW.KERNEL32(00000000,00000059,?,00000055,?,00000002,00000000,0040C901,?,0041A5A8,?,00000000), ref: 0040C862
    • GetLocaleInfoW.KERNEL32(00000000,0000005A,?,00000055,00000000,00000059,?,00000055,?,00000002,00000000,0040C901,?,0041A5A8,?,00000000), ref: 0040C873
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: Locale$Info$Valid
    • String ID:
    • API String ID: 1826331170-0
    • Opcode ID: d62bc5ecf4585d0b78f38a216359797881bb5583d195145a11d1f228b605bdfe
    • Instruction ID: 2a28b5b25d505860436f04a2e6c8396a795a98c7f85c76968f02c108a8d9c51a
    • Opcode Fuzzy Hash: d62bc5ecf4585d0b78f38a216359797881bb5583d195145a11d1f228b605bdfe
    • Instruction Fuzzy Hash: BB319C71A0061CEBDB20EB55DC81BDE77B9EB44705F6042BAA508B32D0D6395E80DE59
    APIs
    • GetClipboardData.USER32(0000000E), ref: 004EA1E5
    • CopyEnhMetaFileW.GDI32(00000000,00000000), ref: 004EA207
    • GetEnhMetaFileHeader.GDI32(?,0000006C,?,00000000,00000000), ref: 004EA219
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: FileMeta$ClipboardCopyDataHeader
    • String ID:
    • API String ID: 1752724394-0
    • Opcode ID: 66224f9e71742e994135c4ca1ded3115ca749d2bafb37c10849f9b0bb9981f8c
    • Instruction ID: a579deb15176a2d0a1dbf34907e0b0f9d8595ad382c3220d39a671540978c399
    • Opcode Fuzzy Hash: 66224f9e71742e994135c4ca1ded3115ca749d2bafb37c10849f9b0bb9981f8c
    • Instruction Fuzzy Hash: 0D117C726003448FC710DFAEC885A9AB7F8AF49314F10466EE509DB252DA74EC48CB94
    Strings
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID: jjj
    • API String ID: 0-2289343631
    • Opcode ID: 379f3ad564931047c85a0e8324c1b925258155478eac1b2c346929ac29ebc0ac
    • Instruction ID: 0e6e8520d3be3831dee58035f3478674022d586b9291955b557444e96a04ac11
    • Opcode Fuzzy Hash: 379f3ad564931047c85a0e8324c1b925258155478eac1b2c346929ac29ebc0ac
    • Instruction Fuzzy Hash: CB723970600204CFDB29CF19D9C0B677BA2FB95315F14869AD9464F38BC738E856CB6A
    Strings
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID: 9Q
    • API String ID: 0-4141447236
    • Opcode ID: c85e39b14b60b4e960e998f2343e0d1547b2847ac62002dfaddbb849c39a277c
    • Instruction ID: 872c69647381f06e73c0189917d9e5469cc943f97499b4375cee1c22dc96545a
    • Opcode Fuzzy Hash: c85e39b14b60b4e960e998f2343e0d1547b2847ac62002dfaddbb849c39a277c
    • Instruction Fuzzy Hash: 40626D70900209DFDB19CF58C984BBEBBB1BF88304F15819ADD559B386C778D985CB89
    APIs
    • IsDebuggerPresent.KERNEL32(00000000,004B80BB), ref: 004B8032
    • RaiseException.KERNEL32(406D1388,00000000,00000004,00001000,00000000,004B808D,?,00000000,004B80BB), ref: 004B807E
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: DebuggerExceptionPresentRaise
    • String ID:
    • API String ID: 1899633966-0
    • Opcode ID: 918f654b1989dfd3ee398986ac0d4d5983e76a9e6b43d16da8286ca8f312fc4d
    • Instruction ID: aa851b4e1d0f37632037c728c599de388d05abd6bc809da2430ac8adde4c7f7f
    • Opcode Fuzzy Hash: 918f654b1989dfd3ee398986ac0d4d5983e76a9e6b43d16da8286ca8f312fc4d
    • Instruction Fuzzy Hash: 7A11D671A14208AFD710EF65DC52ADEBBFCEB48704F61447BE500E3651EB785E04CA68
    APIs
    • GetLastError.KERNEL32(00000000,004E5B3C,?,00000000,?,004E5B54,00000000,004EB19B,00000000,004EB33B,?,00000000,00000054,?,00000000,?), ref: 004E5AC0
    • FormatMessageW.KERNEL32(00001000,00000000,00000000,00000400,?,00000100,00000000,00000000,004E5B3C,?,00000000,?,004E5B54,00000000,004EB19B,00000000), ref: 004E5AE6
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: ErrorFormatLastMessage
    • String ID:
    • API String ID: 3479602957-0
    • Opcode ID: 3d658324b1b03f1d33dfdd215c91ea1b99e4dd16f5471f85141302732c58e772
    • Instruction ID: c91c4b4c8320e0c1e530085dddd9d5d25a400c360d6da16a75b1d286b8cd0c3b
    • Opcode Fuzzy Hash: 3d658324b1b03f1d33dfdd215c91ea1b99e4dd16f5471f85141302732c58e772
    • Instruction Fuzzy Hash: 7401AC707147455FE721FB628D92F9977A8DB04709F5044BAF704E62C3EAB86D40891D
    APIs
    • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?), ref: 004219F9
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: DiskFreeSpace
    • String ID:
    • API String ID: 1705453755-0
    • Opcode ID: 7055af4c37e798c4eedd1ab66a3f56a97fac90cff517f4e9d1e1818016eb5d1c
    • Instruction ID: 0ac6486f21f903cb75f282dfc890b26380fbcd4d5ccfbab9b17402b0b1878633
    • Opcode Fuzzy Hash: 7055af4c37e798c4eedd1ab66a3f56a97fac90cff517f4e9d1e1818016eb5d1c
    • Instruction Fuzzy Hash: 6011CCB5A00209AFDB04CF99C8819AFB7F9EFC8704B14C56AA509E7354E6319A41CBA4
    APIs
    • GetLocaleInfoW.KERNEL32(?,?,?,00000100), ref: 00425352
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: InfoLocale
    • String ID:
    • API String ID: 2299586839-0
    • Opcode ID: ea3b3c1b5a1cf1a130d0f040b5935ae3e0cd2e837d4e3e09926aa746a21f6665
    • Instruction ID: 4ace5e9765896cc83d0c08b398fcb6cdb51b1f9deae2cd3a8e1490c56280457a
    • Opcode Fuzzy Hash: ea3b3c1b5a1cf1a130d0f040b5935ae3e0cd2e837d4e3e09926aa746a21f6665
    • Instruction Fuzzy Hash: DEE0D87171071817D714A9599C86DFBB25CAB88340F4045BFBE05D7383EDB49E4446ED
    APIs
    • EnumSystemLocalesW.KERNEL32(00428FB4,00000002,?,?,0042958D,004257FD,?,00000000,0042583E,?,?,?,00000000,00000000), ref: 00429239
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: EnumLocalesSystem
    • String ID:
    • API String ID: 2099609381-0
    • Opcode ID: cca9abc3a11610917688cb0633c448d3797570d25fd4a641b53c3c50ab693acf
    • Instruction ID: 63fa091e9d080db82cecbc2cc5fa61dc70d90b6f989caf0edc4abe69f196ef62
    • Opcode Fuzzy Hash: cca9abc3a11610917688cb0633c448d3797570d25fd4a641b53c3c50ab693acf
    • Instruction Fuzzy Hash: A0E02662B415319BC120B7BA1E43B9A7A024F81BA4F08857BF498DF3C3EA6D0C0541FE
    APIs
    • GetLocaleInfoW.KERNEL32(?,0000000F,?,00000002,0000002C,?,?,?,00425482,?,00000001,00000000,00425691), ref: 00425393
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: InfoLocale
    • String ID:
    • API String ID: 2299586839-0
    • Opcode ID: e6b6a51cb939c12e8be8693ad0cf5385fb4deb90edb709e785ba876ef48dd5f6
    • Instruction ID: 9eed19484239e9ca95c0a1dfbed1db1bf7cda38a4e2fdab08b9ea4c2367ee6e5
    • Opcode Fuzzy Hash: e6b6a51cb939c12e8be8693ad0cf5385fb4deb90edb709e785ba876ef48dd5f6
    • Instruction Fuzzy Hash: 0BD05EA631922036E210915B7E45DBB5ADCDBC47B2F14483FBE48CA201D2A4CC059275
    APIs
    • GetLocaleInfoW.KERNEL32(00000000,00000003,?,00000400,?,00429086,?,00000000,004291D3), ref: 00428FEB
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: InfoLocale
    • String ID:
    • API String ID: 2299586839-0
    • Opcode ID: e4b498ff0c44464bb9c319f2c4cdb7eba90f2cd8f1e1edfbafd7f3df4e5c9a38
    • Instruction ID: a303c1cb07ff97bfd8ef16a179b2a7490fc3f5062c6a27ca45c0f37d97ec2e54
    • Opcode Fuzzy Hash: e4b498ff0c44464bb9c319f2c4cdb7eba90f2cd8f1e1edfbafd7f3df4e5c9a38
    • Instruction Fuzzy Hash: F6D0A7E1B2420023E30426548C42B6722889B84704F10443C7784973C0EE7C591552BF
    APIs
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: LocalTime
    • String ID:
    • API String ID: 481472006-0
    • Opcode ID: 4c927502ff6ca848d6d79f783507b1be3d95d0ac7cdb7b449a5a22e2f4b00210
    • Instruction ID: 8da0d5d7dce6a760fb6fb5968247694cf968f8d8edeffb1c78389c91dfcd4fca
    • Opcode Fuzzy Hash: 4c927502ff6ca848d6d79f783507b1be3d95d0ac7cdb7b449a5a22e2f4b00210
    • Instruction Fuzzy Hash: 25A0125044582011814037190C0317570405840621FC40789B8F8403D1E91E026040D7
    Strings
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID: xGQ
    • API String ID: 0-116873306
    • Opcode ID: e390bb8781cfb50e0bf67600d25b5dc8b096431c9f5b13ce083519ddae5a6ed1
    • Instruction ID: b43b3417401406a326c0658d495f7bfac22fcab4f87dfe3d4983a9788a7a34dd
    • Opcode Fuzzy Hash: e390bb8781cfb50e0bf67600d25b5dc8b096431c9f5b13ce083519ddae5a6ed1
    • Instruction Fuzzy Hash: 84814D77D105774BE7628E28C8043A17392AFDC39DF6B42B4ED04ABA42D536BD5386C0
    Strings
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID: xGQ
    • API String ID: 0-116873306
    • Opcode ID: 6bc0205b4ab2c64538ca0b113fa78fac9b85d5e4605181a21ca93e4cce34d19d
    • Instruction ID: 9cfbf6d39703a2f841c89ad7d8bc5bd644356b16f8883d5035a763e39ed3e34d
    • Opcode Fuzzy Hash: 6bc0205b4ab2c64538ca0b113fa78fac9b85d5e4605181a21ca93e4cce34d19d
    • Instruction Fuzzy Hash: DB711877D204775BEB609E68C8043617392EF8925CF6B46B4DE04BBA42C636BD539AC0
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 96dbd05c6a5cda271e1d6996937e8b3347f306cca49e2da1ac7c058721fcefef
    • Instruction ID: 0e1373ad738d05412743fbfe0b30fd2dda4791c2bd02ca1af8785a3d2d390580
    • Opcode Fuzzy Hash: 96dbd05c6a5cda271e1d6996937e8b3347f306cca49e2da1ac7c058721fcefef
    • Instruction Fuzzy Hash: 8702BE32910235DFDB96CF6AC040109B7B6FF8A72472A82D6D854AB229D370BE51DFD1
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 3c8e7f5fa08233c9cf6af3f4da3c8a8b0854dd8decd54ec8197df6d450736b3b
    • Instruction ID: 3b8a4b9bdbcbb050131b8f531c600d22b301e14a5b3c7c96b4b24d21a3266e97
    • Opcode Fuzzy Hash: 3c8e7f5fa08233c9cf6af3f4da3c8a8b0854dd8decd54ec8197df6d450736b3b
    • Instruction Fuzzy Hash: 2871A53238978207E7288E7D9CE02B7EAD35FC531872EC97D95DAC3F42D979A4164248
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: d7b4a472199e05cc7d5662b025e4d780bd874dc3e3dcfc1069f2e998be189936
    • Instruction ID: b7ad73d6065eefe40be1e3c61ddaa82719b5b59149f48ac65b38381fd691009e
    • Opcode Fuzzy Hash: d7b4a472199e05cc7d5662b025e4d780bd874dc3e3dcfc1069f2e998be189936
    • Instruction Fuzzy Hash: F8418E31B002558BDB58EE2DC8D16A6B7A2AF94254B18C675DCA88F70BC938DD42C7A0
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: d7b4a472199e05cc7d5662b025e4d780bd874dc3e3dcfc1069f2e998be189936
    • Instruction ID: 9a75494c871b48b3840d49ff1b59f6b632724ee8b9803b4084a2a4f9b95828cd
    • Opcode Fuzzy Hash: d7b4a472199e05cc7d5662b025e4d780bd874dc3e3dcfc1069f2e998be189936
    • Instruction Fuzzy Hash: 40419336A002559BDB48DE5DC8D1696B7A3BFC8314B19C675DCA88F70BC938DE02C7A0
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 2bc20041c257ff7d61a283088bfa9f2de2708563aa29e0e00101f28d62c41ba6
    • Instruction ID: 2dc40e0aa77415d55bc0616e35fc77692ce9a422371aba29c42deb2143eb0115
    • Opcode Fuzzy Hash: 2bc20041c257ff7d61a283088bfa9f2de2708563aa29e0e00101f28d62c41ba6
    • Instruction Fuzzy Hash: EEE0016420010A8ED348BF38C1098A2B3E3EFECA1038BC4D0D44A9F23EF622C481C300
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 1f1654813ed5821a00b8b7144780f614f73eea8c4dc557e3c0d17b55d1bda45a
    • Instruction ID: c1f34be03cf0569538104f0038f02cfb84df381903d0011f2ebedd3a3241928c
    • Opcode Fuzzy Hash: 1f1654813ed5821a00b8b7144780f614f73eea8c4dc557e3c0d17b55d1bda45a
    • Instruction Fuzzy Hash: 76C0E9B550D6066E975C8F1AB480815FBE5FAC8324364C22EA01C83644D73154518A64
    APIs
    • CreateCompatibleDC.GDI32(?), ref: 004FABD2
    • CreateDIBitmap.GDI32(?,?,00000004,?,?,00000000), ref: 004FABE7
    • SelectObject.GDI32(00000000,00000000), ref: 004FABEE
    • CreateCompatibleDC.GDI32(?), ref: 004FAC22
    • CreateCompatibleDC.GDI32(?), ref: 004FAC2E
    • CreateCompatibleDC.GDI32(?), ref: 004FAC3A
    • CreateBitmap.GDI32(?,?,00000001,00000001,00000000), ref: 004FAC4D
    • CreateBitmap.GDI32(?,?,00000001,00000001,00000000), ref: 004FAC5D
    • CreateCompatibleBitmap.GDI32(?,?,?), ref: 004FAC6B
    • SelectObject.GDI32(?,?), ref: 004FAC7B
    • SelectObject.GDI32(?,?), ref: 004FAC8B
    • SelectObject.GDI32(?,?), ref: 004FAC9B
    • SetBkColor.GDI32(00000000,?), ref: 004FACA8
    • StretchBlt.GDI32(?,00000000,00000000,?,?,00000000,00000000,00000000,?,?,00CC0020), ref: 004FACCC
    • SetBkColor.GDI32(00000000,?), ref: 004FACD6
    • BitBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00330008), ref: 004FACF2
    • BitBlt.GDI32(?,00000000,00000000,?,?,?,?,?,00CC0020), ref: 004FAD12
    • BitBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,008800C6), ref: 004FAD2E
    • StretchBlt.GDI32(00000000,00000000,00000000,?,?,?,00000000,00000000,?,?,008800C6), ref: 004FAD4F
    • StretchBlt.GDI32(?,00000000,00000000,?,?,00000000,00000000,00000000,?,?,00EE0086), ref: 004FAD70
    • BitBlt.GDI32(?,?,?,?,?,?,00000000,00000000,00CC0020), ref: 004FAD90
    • SelectObject.GDI32(?,?), ref: 004FAD9D
    • DeleteObject.GDI32(00000000), ref: 004FADA3
    • SelectObject.GDI32(?,?), ref: 004FADB0
    • DeleteObject.GDI32(00000000), ref: 004FADB6
    • SelectObject.GDI32(?,?), ref: 004FADC3
    • DeleteObject.GDI32(00000000), ref: 004FADC9
    • SelectObject.GDI32(00000000,?), ref: 004FADD3
    • DeleteObject.GDI32(00000000), ref: 004FADD9
    • DeleteDC.GDI32(?), ref: 004FADE2
    • DeleteDC.GDI32(?), ref: 004FADEB
    • DeleteDC.GDI32(?), ref: 004FADF4
    • DeleteDC.GDI32(00000000), ref: 004FADFA
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: Object$CreateDeleteSelect$Compatible$Bitmap$Stretch$Color
    • String ID:
    • API String ID: 881050057-0
    • Opcode ID: d06672be3dad3db98e6b51f863aed52956d6e0b67a9b4389ede429620055148c
    • Instruction ID: 825b2a03bc1370e51723bfade82acbff92c39003225e20d7aaefe19e3380dd92
    • Opcode Fuzzy Hash: d06672be3dad3db98e6b51f863aed52956d6e0b67a9b4389ede429620055148c
    • Instruction Fuzzy Hash: 82815BB2E40218BADB10DEE9CD85FDFBBBCAB09715F104459F604FB241D675AE408BA4
    APIs
    • GetModuleHandleW.KERNEL32(oleaut32.dll), ref: 0042EFA5
      • Part of subcall function 0042EF70: GetProcAddress.KERNEL32(00000000), ref: 0042EF89
    Strings
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: AddressHandleModuleProc
    • String ID: VarAdd$VarAnd$VarBoolFromStr$VarBstrFromBool$VarBstrFromCy$VarBstrFromDate$VarCmp$VarCyFromStr$VarDateFromStr$VarDiv$VarI4FromStr$VarIdiv$VarMod$VarMul$VarNeg$VarNot$VarOr$VarR4FromStr$VarR8FromStr$VarSub$VarXor$VariantChangeTypeEx$oleaut32.dll
    • API String ID: 1646373207-1918263038
    • Opcode ID: 51ba0cccc0257aa61a896f7588f8220aaff411b585e609356873e0dfdd144972
    • Instruction ID: 4d8a8b603ccf47e63391c59ab7cad31be334c78caf3acb6b5dd0fd78b8a56fbb
    • Opcode Fuzzy Hash: 51ba0cccc0257aa61a896f7588f8220aaff411b585e609356873e0dfdd144972
    • Instruction Fuzzy Hash: 15412761708239AA53046B6FBE0146677F8EA567103E1C4BBB404CBA69DB3CBC89573D
    APIs
    • CreateCompatibleBitmap.GDI32(?,00000001,00000001), ref: 004E5D2F
    • SelectObject.GDI32(?,?), ref: 004E5D44
    • MaskBlt.GDI32(?,?,?,?,?,?,?,?,?,?,?,CCAA0029,00000000,004E5DB4,?,?), ref: 004E5D88
    • SelectObject.GDI32(?,?), ref: 004E5DA2
    • DeleteObject.GDI32(?), ref: 004E5DAE
    • CreateCompatibleDC.GDI32(00000000), ref: 004E5DC2
    • CreateCompatibleBitmap.GDI32(?,?,?), ref: 004E5DE3
    • SelectObject.GDI32(?,?), ref: 004E5DF8
    • SelectPalette.GDI32(?,03080DD1,00000000), ref: 004E5E0C
    • SelectPalette.GDI32(?,?,00000000), ref: 004E5E1E
    • SelectPalette.GDI32(?,00000000,000000FF), ref: 004E5E33
    • SelectPalette.GDI32(?,03080DD1,000000FF), ref: 004E5E49
    • RealizePalette.GDI32(?), ref: 004E5E55
    • StretchBlt.GDI32(?,00000000,00000000,?,?,?,?,?,?,?,00CC0020), ref: 004E5E77
    • StretchBlt.GDI32(?,00000000,00000000,?,?,00000000,?,?,?,?,00440328), ref: 004E5E99
    • SetTextColor.GDI32(?,00000000), ref: 004E5EA1
    • SetBkColor.GDI32(?,00FFFFFF), ref: 004E5EAF
    • StretchBlt.GDI32(?,?,?,?,?,?,?,?,?,?,008800C6), ref: 004E5EDB
    • StretchBlt.GDI32(?,?,?,?,?,?,00000000,00000000,?,?,00660046), ref: 004E5F00
    • SetTextColor.GDI32(?,?), ref: 004E5F0A
    • SetBkColor.GDI32(?,?), ref: 004E5F14
    • SelectObject.GDI32(?,00000000), ref: 004E5F27
    • DeleteObject.GDI32(?), ref: 004E5F30
    • SelectPalette.GDI32(?,00000000,00000000), ref: 004E5F52
    • DeleteDC.GDI32(?), ref: 004E5F5B
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: Select$ObjectPalette$ColorStretch$CompatibleCreateDelete$BitmapText$MaskRealize
    • String ID:
    • API String ID: 3976802218-0
    • Opcode ID: d926cea88b54c98c5f8c33fd5aa36f3efbb0280da2e4b50b368c8efec4318bb5
    • Instruction ID: 9ef0841ecd8e06ff8f84fa962cf4055aa40bf1e693f84d78164795f68e0e85cf
    • Opcode Fuzzy Hash: d926cea88b54c98c5f8c33fd5aa36f3efbb0280da2e4b50b368c8efec4318bb5
    • Instruction Fuzzy Hash: 9B8193B2A00209AFDB50DEA9CC85EEF7BEDAB0D715F100559F618E7240C238AE408B65
    APIs
    • GetObjectW.GDI32(00000000,00000054,?), ref: 004EB163
    • GetDC.USER32(00000000), ref: 004EB191
    • CreateCompatibleDC.GDI32(?), ref: 004EB1A2
    • CreateBitmap.GDI32(?,?,00000001,00000001,00000000), ref: 004EB1BD
    • SelectObject.GDI32(?,00000000), ref: 004EB1D7
    • PatBlt.GDI32(?,00000000,00000000,?,?,00000042), ref: 004EB1F9
    • CreateCompatibleDC.GDI32(?), ref: 004EB207
    • SelectObject.GDI32(00000000,00000000), ref: 004EB24F
    • SelectPalette.GDI32(00000000,?,00000000), ref: 004EB262
    • RealizePalette.GDI32(00000000), ref: 004EB26B
    • SelectPalette.GDI32(?,?,00000000), ref: 004EB277
    • RealizePalette.GDI32(?), ref: 004EB280
    • SetBkColor.GDI32(00000000,00000000), ref: 004EB28A
    • BitBlt.GDI32(?,00000000,00000000,?,?,00000000,00000000,00000000,00CC0020), ref: 004EB2AE
    • SetBkColor.GDI32(00000000,00000000), ref: 004EB2B8
    • SelectObject.GDI32(00000000,00000000), ref: 004EB2CB
    • DeleteObject.GDI32(00000000), ref: 004EB2D7
    • DeleteDC.GDI32(00000000), ref: 004EB2ED
    • SelectObject.GDI32(?,00000000), ref: 004EB308
    • DeleteDC.GDI32(00000000), ref: 004EB324
    • ReleaseDC.USER32(00000000,00000000), ref: 004EB335
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: ObjectSelect$Palette$CreateDelete$ColorCompatibleRealize$BitmapRelease
    • String ID:
    • API String ID: 332224125-0
    • Opcode ID: 12377b0042ab6e2186f72ca2209710d3867943cee396a54fa97a17432a339029
    • Instruction ID: a297371bd76699a261ad6334b1a26cfdb4486747052644e0b66a5fa1a439e62f
    • Opcode Fuzzy Hash: 12377b0042ab6e2186f72ca2209710d3867943cee396a54fa97a17432a339029
    • Instruction Fuzzy Hash: 1E51FF72E00355BBDB10DAEACC56FEFB7BCEF09705F10445AB614E7281D6789A408B94
    APIs
    • GetDC.USER32(00000000), ref: 004EC9A4
    • CreateCompatibleDC.GDI32(00000001), ref: 004ECA09
    • CreateCompatibleBitmap.GDI32(00000001,00000001,00000001), ref: 004ECA1E
    • SelectObject.GDI32(?,00000000), ref: 004ECA28
    • SelectPalette.GDI32(?,?,00000000), ref: 004ECA58
    • RealizePalette.GDI32(?), ref: 004ECA64
    • CreateDIBitmap.GDI32(?,?,00000004,00000000,?,00000000), ref: 004ECA88
    • GetLastError.KERNEL32(?,?,00000004,00000000,?,00000000,00000000,004ECAE1,?,?,00000000,00000001,00000001,00000001,00000001,00000000), ref: 004ECA96
    • SelectPalette.GDI32(?,00000000,000000FF), ref: 004ECAC8
    • SelectObject.GDI32(?,?), ref: 004ECAD5
    • DeleteObject.GDI32(00000000), ref: 004ECADB
    Strings
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: Select$CreateObjectPalette$BitmapCompatible$DeleteErrorLastRealize
    • String ID: ($BM
    • API String ID: 2831685396-2980357723
    • Opcode ID: 58cff889bad4eb6068600e16470511e9d3c6de989ab61339c39165482e17afec
    • Instruction ID: c616a1a90de752524bbdd14157f5dcfa9445539bd7604b4aa4e24f76313b1463
    • Opcode Fuzzy Hash: 58cff889bad4eb6068600e16470511e9d3c6de989ab61339c39165482e17afec
    • Instruction Fuzzy Hash: A4E16E70A002589FDF04DFAAC885BAEBBF5FF49305F10856AF904A7391D7389941CB58
    APIs
      • Part of subcall function 004EC31C: GetDC.USER32(00000000), ref: 004EC372
      • Part of subcall function 004EC31C: GetDeviceCaps.GDI32(00000000,0000000C), ref: 004EC387
      • Part of subcall function 004EC31C: GetDeviceCaps.GDI32(00000000,0000000E), ref: 004EC391
      • Part of subcall function 004EC31C: CreateHalftonePalette.GDI32(00000000,00000000,?,?,?,?,004EA7DB,00000000,004EA867), ref: 004EC3B5
      • Part of subcall function 004EC31C: ReleaseDC.USER32(00000000,00000000), ref: 004EC3C0
    • SelectPalette.GDI32(?,?,000000FF), ref: 004EB6DB
    • RealizePalette.GDI32(?), ref: 004EB6EA
    • GetStretchBltMode.GDI32(00000000), ref: 004EB6FC
    • GetDeviceCaps.GDI32(?,0000000C), ref: 004EB70D
    • GetDeviceCaps.GDI32(?,0000000E), ref: 004EB71C
    • GetBrushOrgEx.GDI32(?,?,0000000E,00000000,?,0000000C,00000000), ref: 004EB74F
    • SetStretchBltMode.GDI32(?,00000004), ref: 004EB75D
    • SetBrushOrgEx.GDI32(?,?,?,?,?,00000004,?,?,0000000E,00000000,?,0000000C,00000000), ref: 004EB775
    • SetStretchBltMode.GDI32(00000000,00000003), ref: 004EB792
    • CreateCompatibleDC.GDI32(00000000), ref: 004EB7F3
    • SelectObject.GDI32(?,?), ref: 004EB808
    • SelectObject.GDI32(?,00000000), ref: 004EB867
    • DeleteDC.GDI32(00000000), ref: 004EB876
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: CapsDevice$ModePaletteSelectStretch$BrushCreateObject$CompatibleDeleteHalftoneRealizeRelease
    • String ID:
    • API String ID: 28117789-0
    • Opcode ID: 230a5d8b8307ea4118e7af7672871789c69a95fa8ce89b2824e3c90030dde8aa
    • Instruction ID: 489584e9c4cd725b990482e09af51c0bca80148c9d3d35cd6fb0d49a7a8e8351
    • Opcode Fuzzy Hash: 230a5d8b8307ea4118e7af7672871789c69a95fa8ce89b2824e3c90030dde8aa
    • Instruction Fuzzy Hash: 76A1D8B1600245AFDB40EFAAC985F9AB7E8EF08305F504559F605E7652D738ED40CBA4
    Strings
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID: BTMemoryLoadLibary: BuildImportTable failed$BTMemoryLoadLibary: Can't attach library$BTMemoryLoadLibary: Get DLLEntyPoint failed$BTMemoryLoadLibary: IMAGE_NT_SIGNATURE is not valid$BTMemoryLoadLibary: VirtualAlloc failed$BTMemoryLoadLibary: dll dos header is not valid$MZ$PE$Q
    • API String ID: 0-1835101375
    • Opcode ID: 026aab04b6424d41126d101af9ba600e8763032157b3ce281d2c5bc560554c5e
    • Instruction ID: 000319917d59fcf878daeedc43a51531e06e7e960508893f52dfaa3799957b49
    • Opcode Fuzzy Hash: 026aab04b6424d41126d101af9ba600e8763032157b3ce281d2c5bc560554c5e
    • Instruction Fuzzy Hash: 2B718A75B08205AFDB15DFA9DC81BAEBBE9EB89300F0084A9F504E7386DA74DD058B54
    APIs
    • CreateCompatibleDC.GDI32(00000000), ref: 004E5B6F
    • CreateCompatibleDC.GDI32(00000000), ref: 004E5B79
    • GetObjectW.GDI32(?,00000018,?), ref: 004E5B99
    • CreateBitmap.GDI32(?,?,00000001,00000001,00000000), ref: 004E5BB0
    • GetDC.USER32(00000000), ref: 004E5BBC
    • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 004E5BE9
    • ReleaseDC.USER32(00000000,00000000), ref: 004E5C0F
    • SelectObject.GDI32(?,?), ref: 004E5C2A
    • SelectObject.GDI32(?,00000000), ref: 004E5C39
    • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,?,?,00CC0020), ref: 004E5C65
    • SelectObject.GDI32(?,00000000), ref: 004E5C73
    • SelectObject.GDI32(?,00000000), ref: 004E5C81
    • DeleteDC.GDI32(?), ref: 004E5C97
    • DeleteDC.GDI32(?), ref: 004E5CA0
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: Object$CreateSelect$Compatible$BitmapDelete$ReleaseStretch
    • String ID:
    • API String ID: 644427674-0
    • Opcode ID: aef1841c4e128ff32c9b36ede18983638337cbd9838766df907cc8eb69374be7
    • Instruction ID: 17c9c49937640a7ee63a15ab90711d013368aaab887e413720973401a1c3c297
    • Opcode Fuzzy Hash: aef1841c4e128ff32c9b36ede18983638337cbd9838766df907cc8eb69374be7
    • Instruction Fuzzy Hash: 3D410C72E40754BFDB10EAE9C952FAFB7BCAB09705F50045AB600E7281D6789A4087A4
    APIs
      • Part of subcall function 004EC31C: GetDC.USER32(00000000), ref: 004EC372
      • Part of subcall function 004EC31C: GetDeviceCaps.GDI32(00000000,0000000C), ref: 004EC387
      • Part of subcall function 004EC31C: GetDeviceCaps.GDI32(00000000,0000000E), ref: 004EC391
      • Part of subcall function 004EC31C: CreateHalftonePalette.GDI32(00000000,00000000,?,?,?,?,004EA7DB,00000000,004EA867), ref: 004EC3B5
      • Part of subcall function 004EC31C: ReleaseDC.USER32(00000000,00000000), ref: 004EC3C0
    • SelectPalette.GDI32(?,?,000000FF), ref: 004EB9A7
    • RealizePalette.GDI32(?), ref: 004EB9B6
    • GetDeviceCaps.GDI32(?,0000000C), ref: 004EB9C8
    • GetDeviceCaps.GDI32(?,0000000E), ref: 004EB9D7
    • GetBrushOrgEx.GDI32(?,?,0000000E,00000000,?,0000000C), ref: 004EBA0A
    • SetStretchBltMode.GDI32(?,00000004), ref: 004EBA18
    • SetBrushOrgEx.GDI32(?,?,?,?,?,00000004,?,?,0000000E,00000000,?,0000000C), ref: 004EBA30
    • SetStretchBltMode.GDI32(00000000,00000003), ref: 004EBA4D
    • CreateCompatibleDC.GDI32(00000000), ref: 004EBAAE
    • SelectObject.GDI32(?,?), ref: 004EBAC3
    • SelectObject.GDI32(?,00000000), ref: 004EBB22
    • DeleteDC.GDI32(00000000), ref: 004EBB31
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: CapsDevice$PaletteSelect$BrushCreateModeObjectStretch$CompatibleDeleteHalftoneRealizeRelease
    • String ID:
    • API String ID: 2414602066-0
    • Opcode ID: cd1fa1e0ecb1de98fa74186667cffcb93663ecd76ac09dee35a8bf4f5781b3c6
    • Instruction ID: 7ad90294f0dfa4864f0bea30e35c96d4e1fa41525923fe95d334a894f78dac22
    • Opcode Fuzzy Hash: cd1fa1e0ecb1de98fa74186667cffcb93663ecd76ac09dee35a8bf4f5781b3c6
    • Instruction Fuzzy Hash: 54912971604245AFDB50DFAAC981F9FBBE8AB08305F10455AF505E7651D738ED40CBA4
    APIs
    • IsEqualGUID.OLE32(?,?), ref: 004EE9B4
    • IsEqualGUID.OLE32(?,00512700), ref: 004EE9D5
    • IsEqualGUID.OLE32(?,00512710), ref: 004EE9EB
    Strings
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: Equal
    • String ID: 'Q$0'Q$@'Q$P'Q
    • API String ID: 4016716531-2080303212
    • Opcode ID: 910d10efe8b6ce12eb182f7a0428389f332f0c3d9b0304f790f2e4746874814d
    • Instruction ID: 20151e35af89753a34490d08d14bce8ff8fff53931f03d45fc67b9aa9c7eeaed
    • Opcode Fuzzy Hash: 910d10efe8b6ce12eb182f7a0428389f332f0c3d9b0304f790f2e4746874814d
    • Instruction Fuzzy Hash: E71178710085849EDB61DB2BED80AB72B5D6F5A305F04509BFD844F243D39D484A876E
    APIs
      • Part of subcall function 00408850: GetTickCount.KERNEL32 ref: 00408887
      • Part of subcall function 00408850: GetTickCount.KERNEL32 ref: 0040889F
      • Part of subcall function 00425334: GetLocaleInfoW.KERNEL32(?,?,?,00000100), ref: 00425352
    • GetThreadLocale.KERNEL32(00000000,00000004), ref: 00425E60
    • EnumCalendarInfoW.KERNEL32(00425C8C,00000000,00000000,00000004), ref: 00425E6B
    • GetThreadLocale.KERNEL32(00000000,00000003,00425C8C,00000000,00000000,00000004), ref: 00425EA6
    • EnumCalendarInfoW.KERNEL32(00425D30,00000000,00000000,00000003,00425C8C,00000000,00000000,00000004), ref: 00425EB1
    • GetThreadLocale.KERNEL32(00000000,00000004), ref: 00425F42
    • EnumCalendarInfoW.KERNEL32(00425C8C,00000000,00000000,00000004), ref: 00425F4D
    • GetThreadLocale.KERNEL32(00000000,00000003,00425C8C,00000000,00000000,00000004), ref: 00425F8A
    • EnumCalendarInfoW.KERNEL32(00425D30,00000000,00000000,00000003,00425C8C,00000000,00000000,00000004), ref: 00425F95
    Strings
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: InfoLocale$CalendarEnumThread$CountTick
    • String ID: B.C.$[B
    • API String ID: 1601775584-1960173975
    • Opcode ID: e40e9ab9cf9b4c6e49e3745789ea4f322e936ade47d61e4d3ee6c26c34c542ee
    • Instruction ID: 696a8cbb88cbf135683503293481ae752516e7a6c47e6b4c93b3b9376ce1ac3d
    • Opcode Fuzzy Hash: e40e9ab9cf9b4c6e49e3745789ea4f322e936ade47d61e4d3ee6c26c34c542ee
    • Instruction Fuzzy Hash: 9761F570B006129FE710EF69E885AAA77E5EF44724B51857EF400EB3E1C738AD41DB98
    APIs
      • Part of subcall function 004ED0C0: DeleteObject.GDI32(00000000), ref: 004ED206
    • DrawIconEx.USER32(00000000,00000000,00000000,00000000,00000000), ref: 004ED865
    • GetDIBits.GDI32(00000000,00000000,00000000,00000000,?,?), ref: 004ED8E3
    • GetIconInfo.USER32(00000000,?), ref: 004ED947
    • GetDIBits.GDI32(00000000,?,00000000,00000000,?,00000000,?), ref: 004ED980
    • SetDIBits.GDI32(00000000,00000000,?,00000000,?,00000000,004EDA2B), ref: 004ED9E9
    • DeleteObject.GDI32(?), ref: 004ED9FF
    • DeleteObject.GDI32(?), ref: 004EDA08
    Strings
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: BitsDeleteObject$Icon$DrawInfo
    • String ID: $,
    • API String ID: 1810795657-71045815
    • Opcode ID: 0c5187b6c173e4ec8a62df78b25059c000a8f0dee15bd527dab433ee5dea9988
    • Instruction ID: 3b15df45811348dce314f71d9fb3896dfd83895a50164542f8512fd99f32aa23
    • Opcode Fuzzy Hash: 0c5187b6c173e4ec8a62df78b25059c000a8f0dee15bd527dab433ee5dea9988
    • Instruction Fuzzy Hash: F4913871B00145AFD700EFAAC885A9EBBF9FF48305F6041AAF505EB251DA34ED45CB94
    APIs
    • IsValidLocale.KERNEL32(?,00000001,00000000,00425691,?,?,?,?,00000000,00000000), ref: 004253D3
    • GetThreadLocale.KERNEL32(?,00000001,00000000,00425691,?,?,?,?,00000000,00000000), ref: 004253DC
      • Part of subcall function 00425380: GetLocaleInfoW.KERNEL32(?,0000000F,?,00000002,0000002C,?,?,?,00425482,?,00000001,00000000,00425691), ref: 00425393
      • Part of subcall function 00425334: GetLocaleInfoW.KERNEL32(?,?,?,00000100), ref: 00425352
    Strings
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: Locale$Info$ThreadValid
    • String ID: AMPM$2$:mm$:mm:ss$AMPM $m/d/yy$mmmm d, yyyy
    • API String ID: 233154393-3379564615
    • Opcode ID: ecbc7d69b4f11c979955816f9b11cd38cc839c94d643873308f8a088d78fbf3d
    • Instruction ID: ae11f37f10c7c7cc2ece4aa2851bd9592c5e3db29736d4fa45ff2483457f4832
    • Opcode Fuzzy Hash: ecbc7d69b4f11c979955816f9b11cd38cc839c94d643873308f8a088d78fbf3d
    • Instruction Fuzzy Hash: 597122307005699BDB01EBA5E881ADE72A6DF84344FD0807BF904EB646DB3CDE16879D
    APIs
      • Part of subcall function 004264A8: VirtualQuery.KERNEL32(?,?,0000001C,00000000,00426654), ref: 004264DB
      • Part of subcall function 004264A8: GetModuleFileNameW.KERNEL32(?,?,00000105), ref: 004264FF
      • Part of subcall function 004264A8: GetModuleFileNameW.KERNEL32(MZP,?,00000105), ref: 0042651A
      • Part of subcall function 004264A8: LoadStringW.USER32(00000000,0000FFEB,?,00000100), ref: 004265B5
    • WideCharToMultiByte.KERNEL32(00000001,00000000,?,00000000,00000000,00000000,00000000,00000000,00000400,00000000,004267C5), ref: 00426701
    • WideCharToMultiByte.KERNEL32(00000001,00000000,?,00000000,?,00000000,00000000,00000000), ref: 00426734
    • GetStdHandle.KERNEL32(000000F4,?,00000000,?,00000000,00000001,00000000,?,00000000,?,00000000,00000000,00000000), ref: 00426746
    • WriteFile.KERNEL32(00000000,000000F4,?,00000000,?,00000000,00000001,00000000,?,00000000,?,00000000,00000000,00000000), ref: 0042674C
    • GetStdHandle.KERNEL32(000000F4,004267E0,00000002,?,00000000,00000000,000000F4,?,00000000,?,00000000,00000001,00000000,?,00000000,?), ref: 00426760
    • WriteFile.KERNEL32(00000000,000000F4,004267E0,00000002,?,00000000,00000000,000000F4,?,00000000,?,00000000,00000001,00000000,?,00000000), ref: 00426766
    • LoadStringW.USER32(00000000,0000FFEC,?,00000040), ref: 0042678A
    • MessageBoxW.USER32(00000000,?,?,00002010), ref: 004267A4
    Strings
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: File$ByteCharHandleLoadModuleMultiNameStringWideWrite$MessageQueryVirtual
    • String ID: tfB
    • API String ID: 135118572-130872579
    • Opcode ID: 53370dbc22c51bc763ce5d6ae76ca78748e253c1498e84ef0533850a9c2449d9
    • Instruction ID: 2fee535d3888c4169f5bd1f234f159aa2942923c4c0afb6fb1cfc7f5ec0a3504
    • Opcode Fuzzy Hash: 53370dbc22c51bc763ce5d6ae76ca78748e253c1498e84ef0533850a9c2449d9
    • Instruction Fuzzy Hash: 6D3184B5744218BFEB10EB65DC83FDA73BCEB04704F9041A6B604E61D1DA78AE84876C
    APIs
      • Part of subcall function 004E4778: EnterCriticalSection.KERNEL32(0051DE34,?,004E4858,?,?,?,?,?,?,?,?,00000000,004E4870,?,0051DE34), ref: 004E4780
      • Part of subcall function 004E4778: LeaveCriticalSection.KERNEL32(0051DE34,0051DE34,?,004E4858,?,?,?,?,?,?,?,?,00000000,004E4870,?,0051DE34), ref: 004E478D
      • Part of subcall function 004E4778: EnterCriticalSection.KERNEL32(?,0051DE34,0051DE34,?,004E4858,?,?,?,?,?,?,?,?,00000000,004E4870), ref: 004E4796
    • CreateCompatibleDC.GDI32(00000000), ref: 004E4B64
    • SelectObject.GDI32(?,?), ref: 004E4B74
    • StretchBlt.GDI32(?,?,?,?,?,?,?,?,00000000,?,00CC0020), ref: 004E4C70
    • SetTextColor.GDI32(?,00000000), ref: 004E4C7E
    • SetBkColor.GDI32(?,00FFFFFF), ref: 004E4C92
    • StretchBlt.GDI32(?,?,?,?,?,?,?,?,00000000,?,00E20746), ref: 004E4CC5
    • SetTextColor.GDI32(?,?), ref: 004E4CD5
    • SetBkColor.GDI32(?,?), ref: 004E4CE5
    • SelectObject.GDI32(?,00000000), ref: 004E4D15
    • DeleteDC.GDI32(?), ref: 004E4D1E
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: Color$CriticalSection$EnterObjectSelectStretchText$CompatibleCreateDeleteLeave
    • String ID:
    • API String ID: 675119849-0
    • Opcode ID: 17a9f5c396fd801cce45f3af1a2c03a7e908330b3a1013798d2b0e4747143bd7
    • Instruction ID: 71bf14b9f78042d93af0d274de238ac5bd12102c0260bb26fb2fcf8b95af7db9
    • Opcode Fuzzy Hash: 17a9f5c396fd801cce45f3af1a2c03a7e908330b3a1013798d2b0e4747143bd7
    • Instruction Fuzzy Hash: EE919375A00248AFCB40DFAAC981E9EBBF9EF4D315B10449AF505EB661C734EE41CB64
    APIs
    • GetModuleHandleW.KERNEL32(kernel32.dll,GetLogicalProcessorInformation), ref: 004085DD
    • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 004085E3
    • GetLogicalProcessorInformation.KERNEL32(00000000,?,GetLogicalProcessorInformation), ref: 004085F6
    • GetLastError.KERNEL32(00000000,?,GetLogicalProcessorInformation), ref: 004085FF
    • GetLogicalProcessorInformation.KERNEL32(00000000,?,00000000,00408676,?,00000000,?,GetLogicalProcessorInformation), ref: 0040862A
    Strings
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: InformationLogicalProcessor$AddressErrorHandleLastModuleProc
    • String ID: @$GetLogicalProcessorInformation$kernel32.dll
    • API String ID: 1184211438-79381301
    • Opcode ID: 9b6de5aca907aff7f49779a1cb565253b723d78320fe21404139914b83ab067e
    • Instruction ID: 500c6e41f31b7fdb6d34238680861789b78f08bdeabe16a24c436e355b3d89bb
    • Opcode Fuzzy Hash: 9b6de5aca907aff7f49779a1cb565253b723d78320fe21404139914b83ab067e
    • Instruction Fuzzy Hash: E0116370D00208AADB10EBA5CA05B5EB7A4DF04304F1288BFE854B72C1DA7E8E508E59
    APIs
    • RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0041064C
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: ExceptionRaise
    • String ID:
    • API String ID: 3997070919-0
    • Opcode ID: 01433c88fba5b4f775e71df606895a677a3445a2bc368d898035e78ffffcbf29
    • Instruction ID: 0ce41ded5bccfca64fbac36b7d610e41f84856dd8e2a7bbc42b78d3b128abe8f
    • Opcode Fuzzy Hash: 01433c88fba5b4f775e71df606895a677a3445a2bc368d898035e78ffffcbf29
    • Instruction Fuzzy Hash: 0CA19075A013099FDB20DFA8D881BEEB7B5FF58310F14812AE915A7390DBB4A9C4CB54
    APIs
    • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 00430AED
    • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 00430B09
    • SafeArrayCreate.OLEAUT32(0000000C,?,?), ref: 00430B42
    • SafeArrayPtrOfIndex.OLEAUT32(?,?,?), ref: 00430BBF
    • SafeArrayPtrOfIndex.OLEAUT32(00000000,?,?), ref: 00430BD8
    • VariantCopy.OLEAUT32(?), ref: 00430C0D
    Strings
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: ArraySafe$BoundIndex$CopyCreateVariant
    • String ID:
    • API String ID: 351091851-3916222277
    • Opcode ID: b24821290767192b64c8f13178bb3ebd50a91d5dafaf8b93d1d09599547c4c5d
    • Instruction ID: c5ac3e0bb315912875ce6d6a8b12eb4200af54bb65bf5f77a9b42e84e07fd96b
    • Opcode Fuzzy Hash: b24821290767192b64c8f13178bb3ebd50a91d5dafaf8b93d1d09599547c4c5d
    • Instruction Fuzzy Hash: 2C51227590022D9BCB25DB59CC91BDAB3BCAF4C304F0052DAF548E7252D634AF848F65
    APIs
    • MulDiv.KERNEL32(?,000009EC,00000000), ref: 004E9AA6
    • MulDiv.KERNEL32(?,000009EC,00000000), ref: 004E9AC3
    • SetWinMetaFileBits.GDI32(00000016,?,00000000,00000008,?,000009EC,00000000,?,000009EC,00000000), ref: 004E9AEF
    • GetEnhMetaFileHeader.GDI32(00000016,0000006C,?,00000016,?,00000000,00000008,?,000009EC,00000000,?,000009EC,00000000), ref: 004E9B0F
    • DeleteEnhMetaFile.GDI32(00000016), ref: 004E9B30
    • SetWinMetaFileBits.GDI32(00000016,?,00000000,00000008,00000016,0000006C,?,00000016,?,00000000,00000008,?,000009EC,00000000,?,000009EC), ref: 004E9B43
    Strings
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: FileMeta$Bits$DeleteHeader
    • String ID: `
    • API String ID: 1990453761-2679148245
    • Opcode ID: 1bc734305bfd0bdb724ca875092e956d4852018e6443de175511f346f92c27bf
    • Instruction ID: e4881d64baec76ee9eafe246b21c5bc9d5a9281d976d74d65e8b275913b0d6f5
    • Opcode Fuzzy Hash: 1bc734305bfd0bdb724ca875092e956d4852018e6443de175511f346f92c27bf
    • Instruction Fuzzy Hash: 8A412275D00248AFDB40DFA9C881AAEB7F9FF48711F50816AF904EB241E7389E40CB64
    APIs
    • GetStdHandle.KERNEL32(000000F4,00405358,00000000,?,00000000,?,?,00000000,00406B8F), ref: 00406206
    • WriteFile.KERNEL32(00000000,000000F4,00405358,00000000,?,00000000,?,?,00000000,00406B8F), ref: 0040620C
    • GetStdHandle.KERNEL32(000000F4,00405354,00000000,?,00000000,00000000,000000F4,00405358,00000000,?,00000000,?,?,00000000,00406B8F), ref: 0040622B
    • WriteFile.KERNEL32(00000000,000000F4,00405354,00000000,?,00000000,00000000,000000F4,00405358,00000000,?,00000000,?,?,00000000,00406B8F), ref: 00406231
    • GetStdHandle.KERNEL32(000000F4,?,00000000,?,00000000,00000000,000000F4,00405354,00000000,?,00000000,00000000,000000F4,00405358,00000000,?), ref: 00406248
    • WriteFile.KERNEL32(00000000,000000F4,?,00000000,?,00000000,00000000,000000F4,00405354,00000000,?,00000000,00000000,000000F4,00405358,00000000), ref: 0040624E
    Strings
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: FileHandleWrite
    • String ID: TS@
    • API String ID: 3320372497-1941835897
    • Opcode ID: 773f2b01c096205ed1640b90909cb80b96b374e64d656fdce13fcbbb072e403a
    • Instruction ID: 82cfcf8d63e4733cb96d407babe502fa205990dff362196b090b8b3cf9cfd937
    • Opcode Fuzzy Hash: 773f2b01c096205ed1640b90909cb80b96b374e64d656fdce13fcbbb072e403a
    • Instruction Fuzzy Hash: 9D0162A16486147DE110F2BA9C8AF6F368CDB18724F10077E7618F60D2C5785C449B7A
    APIs
    • Sleep.KERNEL32(00000000), ref: 004059D3
    • Sleep.KERNEL32(0000000A,00000000), ref: 004059E9
    • Sleep.KERNEL32(00000000), ref: 00405A17
    • Sleep.KERNEL32(0000000A,00000000), ref: 00405A2D
    Strings
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: Sleep
    • String ID: @.
    • API String ID: 3472027048-4201455939
    • Opcode ID: ada7fe0ad1e969fa1615a2ce2c1f205a77d44d1215cb1e65cc2c198de2b16ae9
    • Instruction ID: a95b6186faaf28ee99436786a323c89c11953a43e3af36f3f78c15d8c677067a
    • Opcode Fuzzy Hash: ada7fe0ad1e969fa1615a2ce2c1f205a77d44d1215cb1e65cc2c198de2b16ae9
    • Instruction Fuzzy Hash: 0DC16972601B118FD725CF28D884367BBA1EB95320F1882BFD4059B3D5C778A849DF88
    APIs
    • Sleep.KERNEL32(00000000,?,?,00000000,00405912), ref: 00405D36
    • Sleep.KERNEL32(0000000A,00000000,?,?,00000000,00405912), ref: 00405D50
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: Sleep
    • String ID:
    • API String ID: 3472027048-0
    • Opcode ID: b3bac45a803a588073ab35a9efb47af0939235da5b92122c96ba95b50cef7661
    • Instruction ID: 4f935fbc936f4d5eb3d08406d1a455a3bc696dbd4939a17767f2164eefdcc051
    • Opcode Fuzzy Hash: b3bac45a803a588073ab35a9efb47af0939235da5b92122c96ba95b50cef7661
    • Instruction Fuzzy Hash: 1371D231604B008FE725DB28D888B67BBD4EF95314F14C2BFD844AB3D2D67888459F59
    APIs
    • GetDC.USER32(00000000), ref: 004E60B2
    • GetDeviceCaps.GDI32(?,00000068), ref: 004E60CE
    • GetSystemPaletteEntries.GDI32(?,00000000,00000008,?), ref: 004E60ED
    • GetSystemPaletteEntries.GDI32(?,-00000008,00000001,00C0C0C0), ref: 004E6111
    • GetSystemPaletteEntries.GDI32(?,00000000,00000007,?), ref: 004E612F
    • GetSystemPaletteEntries.GDI32(?,00000007,00000001,?), ref: 004E6143
    • GetSystemPaletteEntries.GDI32(?,00000000,00000008,?), ref: 004E6163
    • ReleaseDC.USER32(00000000,?), ref: 004E617B
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: EntriesPaletteSystem$CapsDeviceRelease
    • String ID:
    • API String ID: 1781840570-0
    • Opcode ID: 76daa9d26c080c564ad9041f13802c656f185a4c8ec9210214833560b50aa864
    • Instruction ID: 253042d8ae561a030da4b25cfcc59df415f83bc43ecdec077c49d488911ed581
    • Opcode Fuzzy Hash: 76daa9d26c080c564ad9041f13802c656f185a4c8ec9210214833560b50aa864
    • Instruction Fuzzy Hash: 8F2156B1A40218BADB50DFA5DD86F9EB3BCEB08705F510496F704E71C1D679AF408B28
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 6090a39ba4113efe279c4ce94d3a27bfd3a3f347abc7f88e99f6aa2524520e12
    • Instruction ID: 14c4d9104ddc23c6b9370c21b65e9a421d4bec3d23930416dd05d6dcb6f7df23
    • Opcode Fuzzy Hash: 6090a39ba4113efe279c4ce94d3a27bfd3a3f347abc7f88e99f6aa2524520e12
    • Instruction Fuzzy Hash: 01C12262710A014BD714AA7D9C8836FB286DBC4325F68823FE645EB3C6DA7CCC458B58
    APIs
    • CreateCompatibleDC.GDI32(?), ref: 00501CF9
    • CreateDIBSection.GDI32(?,?,00000000,?,00000000,00000000), ref: 00501D28
    • SelectObject.GDI32(?,?), ref: 00501D38
    • DeleteObject.GDI32(?), ref: 00501F51
    • DeleteDC.GDI32(?), ref: 00501F5D
    Strings
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: CreateDeleteObject$CompatibleSectionSelect
    • String ID: |O
    • API String ID: 2986811175-2178481767
    • Opcode ID: 9817963ed5f4cc2f2364ac26bd9ac3b368ca35d8fe3561940ec2ced3533d1099
    • Instruction ID: ce8aac707b3dbeaa7a58b126956c68cb979dc772affd9570816d51a962cff8d2
    • Opcode Fuzzy Hash: 9817963ed5f4cc2f2364ac26bd9ac3b368ca35d8fe3561940ec2ced3533d1099
    • Instruction Fuzzy Hash: 11B1C5B5E0060A9FCB04DF99C985AAEBBF5FF48300F2181A5E914A73A1D734AD41CF55
    APIs
      • Part of subcall function 004FC400: DeleteObject.GDI32(?), ref: 004FC40B
      • Part of subcall function 004FC400: DeleteDC.GDI32(?), ref: 004FC418
      • Part of subcall function 004FC400: DeleteObject.GDI32(?), ref: 004FC434
    • CreateCompatibleDC.GDI32(00000000), ref: 004FC903
    • CreateHalftonePalette.GDI32(?,00000000), ref: 004FC93E
    • ResizePalette.GDI32(?,00000001), ref: 004FC973
    • SelectPalette.GDI32(?,?,00000000), ref: 004FC998
    • RealizePalette.GDI32(?), ref: 004FC9A3
    • CreateDIBSection.GDI32(?,-00000474,00000000,-00000450,00000000,00000000), ref: 004FC9CE
    • SelectObject.GDI32(?,00000000), ref: 004FC9E1
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: Palette$CreateDeleteObject$Select$CompatibleHalftoneRealizeResizeSection
    • String ID:
    • API String ID: 2525607832-0
    • Opcode ID: 3b39bf79a773d9044507b5f4a6ba50a4e1458e9f25aaa5a6f7355112836dca1f
    • Instruction ID: 4ba82757873bb3c143a4d1742f8b993ef62ffc4f5942cec004fa87537f0c0421
    • Opcode Fuzzy Hash: 3b39bf79a773d9044507b5f4a6ba50a4e1458e9f25aaa5a6f7355112836dca1f
    • Instruction Fuzzy Hash: E67137756005289FDB04EF19C4D5F6637E5EF0A305F0541E6F2048F3AAC678E84ACB9A
    APIs
      • Part of subcall function 00408CDC: GetCurrentThreadId.KERNEL32 ref: 00408CDF
    • GetTickCount.KERNEL32 ref: 00408887
    • GetTickCount.KERNEL32 ref: 0040889F
    • GetCurrentThreadId.KERNEL32 ref: 004088CE
    • GetTickCount.KERNEL32 ref: 004088F9
    • GetTickCount.KERNEL32 ref: 00408930
    • GetTickCount.KERNEL32 ref: 0040895A
    • GetCurrentThreadId.KERNEL32 ref: 004089CA
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: CountTick$CurrentThread
    • String ID:
    • API String ID: 3968769311-0
    • Opcode ID: 7d0f63ae373317c5f21e857476dc24018feec28cf215cb5a173da7a4db92fdee
    • Instruction ID: 59fdbd664e4c2a787114e1462c869c0698e504600effbf6fb817d1e717bb5ab3
    • Opcode Fuzzy Hash: 7d0f63ae373317c5f21e857476dc24018feec28cf215cb5a173da7a4db92fdee
    • Instruction Fuzzy Hash: BB415E716083419EDB21BE79CA4032BBAD1AB91354F14893FD4D8A73C2EE798881D75B
    APIs
    • MulDiv.KERNEL32(?,?,000009EC), ref: 004EA0E2
    • MulDiv.KERNEL32(?,?,000009EC), ref: 004EA0F9
    • GetDC.USER32(00000000), ref: 004EA110
    • GetWinMetaFileBits.GDI32(?,00000000,00000000,00000008,?,00000000,004EA1CB,?,00000000,?,?,000009EC,?,?,000009EC), ref: 004EA134
    • GetWinMetaFileBits.GDI32(?,?,?,00000008,?,00000000,004EA1AB,?,?,00000000,00000000,00000008,?,00000000,004EA1CB), ref: 004EA167
    Strings
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: BitsFileMeta
    • String ID: `
    • API String ID: 858000408-2679148245
    • Opcode ID: b7f937434eb2587f847978740abbd8c81bb9dfc3e5197959b54ccdff63f1a7cc
    • Instruction ID: 560aeff5e142fb22fc32d70ae3aa060d7ef4d96bf65ee7c2df06f2301dcbdb9f
    • Opcode Fuzzy Hash: b7f937434eb2587f847978740abbd8c81bb9dfc3e5197959b54ccdff63f1a7cc
    • Instruction Fuzzy Hash: AD318775A00248ABDB00DFD5C882BEEF7B8EF0D705F514496F904EB281D678AE50D7A9
    APIs
      • Part of subcall function 004E62F0: GetObjectW.GDI32(00000000,00000004), ref: 004E6307
      • Part of subcall function 004E62F0: GetPaletteEntries.GDI32(00000000,00000000,?,00000028), ref: 004E632A
    • GetDC.USER32(00000000), ref: 004EA9B2
    • CreateCompatibleDC.GDI32(?), ref: 004EA9BE
    • SelectObject.GDI32(?), ref: 004EA9CB
    • SetDIBColorTable.GDI32(?,00000000,00000000,?,00000000,004EAA23,?,?,?,?,00000000), ref: 004EA9EF
    • SelectObject.GDI32(?,?), ref: 004EAA09
    • DeleteDC.GDI32(?), ref: 004EAA12
    • ReleaseDC.USER32(00000000,?), ref: 004EAA1D
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: Object$Select$ColorCompatibleCreateDeleteEntriesPaletteReleaseTable
    • String ID:
    • API String ID: 4046155103-0
    • Opcode ID: ec8649657c05e97b9ba1c19bfcd01e8d0b09a6ae33e64875ffb60a9979b168a2
    • Instruction ID: a90b19bdd86dec3490e2a43e61abe2758ba6d863edaf7bda9a2135b5bf853f90
    • Opcode Fuzzy Hash: ec8649657c05e97b9ba1c19bfcd01e8d0b09a6ae33e64875ffb60a9979b168a2
    • Instruction Fuzzy Hash: 54115172E00359BFDB10EFE9C851AEEB7BCEB09705F4044AAF504E7241E6789E5087A4
    APIs
    • GetStdHandle.KERNEL32(000000F5,Runtime error at 00000000,0000001D,?,00000000,?,0040998E,?,?,?,?,00409AA2,00406F13,00406F5A,?,?), ref: 00409909
    • WriteFile.KERNEL32(00000000,000000F5,Runtime error at 00000000,0000001D,?,00000000,?,0040998E,?,?,?,?,00409AA2,00406F13,00406F5A,?), ref: 0040990F
    • GetStdHandle.KERNEL32(000000F5,00000000,00000002,?,00000000,00000000,000000F5,Runtime error at 00000000,0000001D,?,00000000,?,0040998E,?,?,?), ref: 0040992A
    • WriteFile.KERNEL32(00000000,000000F5,00000000,00000002,?,00000000,00000000,000000F5,Runtime error at 00000000,0000001D,?,00000000,?,0040998E), ref: 00409930
    Strings
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: FileHandleWrite
    • String ID: Error$Runtime error at 00000000
    • API String ID: 3320372497-2970929446
    • Opcode ID: 1f536b54c0f7e54d54e2ef4696db32368710aa63d846f2239d9123bcbb9aa4c9
    • Instruction ID: 1cafd5f0b55deffaaa1a260c41e3c473f996b032a313f4f96ee96a2a81eb749b
    • Opcode Fuzzy Hash: 1f536b54c0f7e54d54e2ef4696db32368710aa63d846f2239d9123bcbb9aa4c9
    • Instruction Fuzzy Hash: FBF04491A4134479FA3077A55C56F6F2B589704B18F18893FB650782D3CAB84C889766
    APIs
    • GetSystemMetrics.USER32(0000000B), ref: 004E662E
    • GetSystemMetrics.USER32(0000000C), ref: 004E663A
    • GetDC.USER32(00000000), ref: 004E6656
    • GetDeviceCaps.GDI32(00000000,0000000E), ref: 004E667D
    • GetDeviceCaps.GDI32(00000000,0000000C), ref: 004E668A
    • ReleaseDC.USER32(00000000,00000000), ref: 004E66C3
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: CapsDeviceMetricsSystem$Release
    • String ID:
    • API String ID: 447804332-0
    • Opcode ID: 514544e9451769a20b0d63ec12d45414229ecaa25948937d2ba282ff4bb2ffa2
    • Instruction ID: 4016dc568379c8c19e12672c107d27f7e339e6f7b848dc7462e147759cb92e24
    • Opcode Fuzzy Hash: 514544e9451769a20b0d63ec12d45414229ecaa25948937d2ba282ff4bb2ffa2
    • Instruction Fuzzy Hash: BA318474E00244EFEB00DFA6C841AAEBBB5FF49751F11856AF414AB384C6749D41CB65
    APIs
    • CreateCompatibleDC.GDI32(00000000), ref: 004E6252
    • SelectObject.GDI32(00000000,00000000), ref: 004E625B
    • GetDIBColorTable.GDI32(00000000,00000000,00000100,?,00000000,00000000,00000000,?,00000000,?,?,004EC367), ref: 004E626F
    • SelectObject.GDI32(00000000,00000000), ref: 004E627B
    • DeleteDC.GDI32(00000000), ref: 004E6281
    • CreatePalette.GDI32 ref: 004E62DC
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: CreateObjectSelect$ColorCompatibleDeletePaletteTable
    • String ID:
    • API String ID: 2515223848-0
    • Opcode ID: 7562e105f237616201ae257fa9036799e28e0c389752a133ae9929039913ccec
    • Instruction ID: 340cc0428f8d1b704eb02a17b4838aecf4abac5ba2e172b2ebb1ae9e933cb0ba
    • Opcode Fuzzy Hash: 7562e105f237616201ae257fa9036799e28e0c389752a133ae9929039913ccec
    • Instruction Fuzzy Hash: 2911063120434022E210BB679C43BAB72A8DFD575AF01C52FF649D7382E67C8D49439E
    APIs
      • Part of subcall function 004E6950: GetObjectW.GDI32(?,00000054), ref: 004E6964
    • CreateCompatibleDC.GDI32(00000000), ref: 004E6ABE
    • SelectPalette.GDI32(?,?,00000000), ref: 004E6ADF
    • RealizePalette.GDI32(?), ref: 004E6AEB
    • GetDIBits.GDI32(?,?,00000000,?,?,?,00000000), ref: 004E6B02
    • SelectPalette.GDI32(?,00000000,00000000), ref: 004E6B2A
    • DeleteDC.GDI32(?), ref: 004E6B33
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: Palette$Select$BitsCompatibleCreateDeleteObjectRealize
    • String ID:
    • API String ID: 1221726059-0
    • Opcode ID: 9dbd0a09d7bff179ba26f2c840b696ab711f6e12a27d33c9ec649e9677f75141
    • Instruction ID: ce5ef7bc2b447eaaf5ad7ea58a7014afe3a29db5ee430c20c38cefb41b0ea7be
    • Opcode Fuzzy Hash: 9dbd0a09d7bff179ba26f2c840b696ab711f6e12a27d33c9ec649e9677f75141
    • Instruction Fuzzy Hash: EF114275E403047FDB10DFAA8C42F9EBBEDDB49701F51806AB514E7281D678AE408768
    APIs
    • SetDIBits.GDI32(00000000,00000000), ref: 004EECF4
    Strings
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: Bits
    • String ID: $,$p'Q$pN
    • API String ID: 3573556081-239200797
    • Opcode ID: 3146448c29a5267273b5e1d6cef1f92d1d1f3eb03af883d51033a66525d253fe
    • Instruction ID: 1e54a06a1e95e94ba1a65037bf0ed17888ccc8f38b9ad7b73d83704f2355172f
    • Opcode Fuzzy Hash: 3146448c29a5267273b5e1d6cef1f92d1d1f3eb03af883d51033a66525d253fe
    • Instruction Fuzzy Hash: 8651C074A00208AFDB40DF9AD881E9EB7F9FB48314F5181A6F914EB362D735AE44CB54
    APIs
    • GetDIBits.GDI32(00000000,00000000,00000000,?,?,0000002C,00000000), ref: 004EE4B2
    Strings
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: Bits
    • String ID: $,$`'Q$p'Q
    • API String ID: 3573556081-2603654308
    • Opcode ID: 42b49852a6c059686f70261b7c1b5614e6ac850c4d35c3e5e38e0dda175fe21e
    • Instruction ID: 7dffdbb38bb168055dc73683a78424d275a6f5c6279662ade84370ffcc63c4ed
    • Opcode Fuzzy Hash: 42b49852a6c059686f70261b7c1b5614e6ac850c4d35c3e5e38e0dda175fe21e
    • Instruction Fuzzy Hash: 9F4155B1A00104AFDB40DF6AC885A9A77F9FF09318B2141A6FC04EB356D775ED45CB94
    APIs
    • VirtualQuery.KERNEL32(?,?,0000001C,00000000,00426654), ref: 004264DB
    • GetModuleFileNameW.KERNEL32(?,?,00000105), ref: 004264FF
    • GetModuleFileNameW.KERNEL32(MZP,?,00000105), ref: 0042651A
    • LoadStringW.USER32(00000000,0000FFEB,?,00000100), ref: 004265B5
    Strings
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: FileModuleName$LoadQueryStringVirtual
    • String ID: MZP
    • API String ID: 3990497365-2889622443
    • Opcode ID: 9d6add118e4e8414791f245c42018ec3a7e548b569db00738a6d801e4d88121c
    • Instruction ID: 6bd50542f63c29d3254cd85bcaf85244e765c7bfaa2bd12f09b9b5e59819b565
    • Opcode Fuzzy Hash: 9d6add118e4e8414791f245c42018ec3a7e548b569db00738a6d801e4d88121c
    • Instruction Fuzzy Hash: AF415170A002289FDB20DF65DC81BC9B7F9AB59304F8140EAE508E7241D7799E948F59
    APIs
    • GetDC.USER32(00000000), ref: 004ED17C
    • CreateHalftonePalette.GDI32(00000000,00000000), ref: 004ED189
    • ReleaseDC.USER32(00000000,00000000), ref: 004ED198
    • DeleteObject.GDI32(00000000), ref: 004ED206
    Strings
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: CreateDeleteHalftoneObjectPaletteRelease
    • String ID: (
    • API String ID: 577518360-3887548279
    • Opcode ID: 709b07984c9d5aa3bd38b67693ada89a75e7f84293946e09d557a8f39a1a4486
    • Instruction ID: 8cdd9680a7724fdad575afc561e1f2c7bb06fb3b539269e5054995d0d95929bc
    • Opcode Fuzzy Hash: 709b07984c9d5aa3bd38b67693ada89a75e7f84293946e09d557a8f39a1a4486
    • Instruction Fuzzy Hash: 1341BE70E04248AFCB10DFA6C885ADEFBB5EF49305F1480AAE404AB351D7789A45DB99
    APIs
    • GetLastError.KERNEL32(00000000,004B722A,?,?,004B5444,00000001), ref: 004B71CC
    • GetCurrentThread.KERNEL32 ref: 004B7204
    • GetCurrentThreadId.KERNEL32 ref: 004B720C
    Strings
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: CurrentThread$ErrorLast
    • String ID: BnK$pDA
    • API String ID: 4172138867-3175749474
    • Opcode ID: daa02272e5fee77470c674822105215f1e84114ca22350b49d75c226eb007105
    • Instruction ID: a3e0ae559b31ed47dc59385f5b02629c22696de2c4cef8aa035d475b9da624f8
    • Opcode Fuzzy Hash: daa02272e5fee77470c674822105215f1e84114ca22350b49d75c226eb007105
    • Instruction Fuzzy Hash: 0C212B709086456ED701DFB5CC817EABBE4BF89304F4485BBE42497782DB389815C7B9
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 9b1296c92a046bb743362478882edb4bed3443ecb9e909bca9af9b7118eca8f6
    • Instruction ID: 8d3459a469465bc4371695b4e367a65a38b978d34797e4c4e50731b7cb5a1aca
    • Opcode Fuzzy Hash: 9b1296c92a046bb743362478882edb4bed3443ecb9e909bca9af9b7118eca8f6
    • Instruction Fuzzy Hash: AFD1C235A00209AFCF00EF95C4918EEFBB9EF0D310F5590A6E840A7251D638AE46DB79
    APIs
    • memcpy.MSVCRT(?,?,00000038), ref: 004F08C0
    • memcpy.MSVCRT(00000000,00000000,000016C4), ref: 004F08F3
    • memcpy.MSVCRT(00000000,?,?), ref: 004F0989
    • memcpy.MSVCRT(00000000,?,?), ref: 004F099F
    • memcpy.MSVCRT(00000000,?,?), ref: 004F09B5
    • memcpy.MSVCRT(00000000,?,?), ref: 004F09C9
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: memcpy
    • String ID:
    • API String ID: 3510742995-0
    • Opcode ID: d948a10c9f1e2417ed34ae8df7b8044f991836d94fef36a5c337458bb54a48b1
    • Instruction ID: bcd7db05d191351e9405a97d2655ef30d3ed96d280d6279a09f2b3dd0a47b8f8
    • Opcode Fuzzy Hash: d948a10c9f1e2417ed34ae8df7b8044f991836d94fef36a5c337458bb54a48b1
    • Instruction Fuzzy Hash: 965175B1600200AFDB14CF69CCC5E6677A8BF88314F08827AEE098F346E735E944CB94
    APIs
    • GetDC.USER32(00000000), ref: 004EC372
    • GetDeviceCaps.GDI32(00000000,0000000C), ref: 004EC387
    • GetDeviceCaps.GDI32(00000000,0000000E), ref: 004EC391
    • CreateHalftonePalette.GDI32(00000000,00000000,?,?,?,?,004EA7DB,00000000,004EA867), ref: 004EC3B5
    • ReleaseDC.USER32(00000000,00000000), ref: 004EC3C0
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: CapsDevice$CreateHalftonePaletteRelease
    • String ID:
    • API String ID: 2404249990-0
    • Opcode ID: c4a1b20b6082907148ca0743ca9c7e76063a1768cc102af30ff38a7623f7df5f
    • Instruction ID: 76c421ad3c698b7ff88da0f61c3aa7df07cb2880bcd4f869b6d47c825d99da29
    • Opcode Fuzzy Hash: c4a1b20b6082907148ca0743ca9c7e76063a1768cc102af30ff38a7623f7df5f
    • Instruction Fuzzy Hash: 3D11D3315012D9AEEB20AF27C481BEF3B94AF55357F04505BFC005A281D7BC8DA2C7A9
    APIs
    • GetDC.USER32(00000000), ref: 004E61B4
    • GetDeviceCaps.GDI32(?,00000068), ref: 004E61D0
    • GetPaletteEntries.GDI32(03080DD1,00000000,00000008,?), ref: 004E61E8
    • GetPaletteEntries.GDI32(03080DD1,00000008,00000008,?), ref: 004E6200
    • ReleaseDC.USER32(00000000,?), ref: 004E621C
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: EntriesPalette$CapsDeviceRelease
    • String ID:
    • API String ID: 3128150645-0
    • Opcode ID: e2e0119970b46360f4dbaca9755fcc1ef81ad606db22181b8a12d53334abd375
    • Instruction ID: fb62e25858754de89261d63ddcf899fc845c4e56b322bcc1c3ebe9d0414cdd2c
    • Opcode Fuzzy Hash: e2e0119970b46360f4dbaca9755fcc1ef81ad606db22181b8a12d53334abd375
    • Instruction Fuzzy Hash: 191108716483447EEB00DFA6EC42FA97FACE719706F40849BF204DA1C1DABA5544C324
    APIs
    • UnhandledExceptionFilter.KERNEL32(?,00000000), ref: 0040911E
    Strings
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: ExceptionFilterUnhandled
    • String ID: ,qB$hsB
    • API String ID: 3192549508-2187915683
    • Opcode ID: 1700f64120af452dff93675b6e54fdb508242944783359e32faae08426496f92
    • Instruction ID: 7df4318895a31e83b2a36aa030ba475ccd5b90e95bae95c0b52881597b1f7c6e
    • Opcode Fuzzy Hash: 1700f64120af452dff93675b6e54fdb508242944783359e32faae08426496f92
    • Instruction Fuzzy Hash: 834196717042029FE720DF14C888B6BB7E5EB85314F15857AE448AB393C739EC45CB59
    APIs
    • VirtualFree.KERNEL32(?,?,00004000), ref: 00508BFD
    • VirtualProtect.KERNEL32(?,?,?,?,?), ref: 00508C82
    Strings
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: Virtual$FreeProtect
    • String ID: FinalizeSections: VirtualProtect failed$Q
    • API String ID: 2581862158-2157760199
    • Opcode ID: 5b9ce3603e1f06b0cc2f71a78788117888607f07353cb78b5fee8d3d13493d47
    • Instruction ID: 9853b7ae0d98e4b03c66dd04b799e9e921a3f981399b1d975435f4a8c9b352d0
    • Opcode Fuzzy Hash: 5b9ce3603e1f06b0cc2f71a78788117888607f07353cb78b5fee8d3d13493d47
    • Instruction Fuzzy Hash: F73116746022059FE710DB58C989FA9BBF8BB48354F154584FAA4DF3E2CB30ED408BA0
    APIs
    • GetThreadLocale.KERNEL32(00000004,?,00000000,?,00000200,00000000,00423D0B), ref: 00423CAE
    • GetDateFormatW.KERNEL32(00000000,00000004,?,00000000,?,00000200,00000000,00423D0B), ref: 00423CB4
    Strings
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: DateFormatLocaleThread
    • String ID: $yyyy
    • API String ID: 3303714858-404527807
    • Opcode ID: 0809fa2659c157af8da77a48e90bfea0ac0ad0ed8c95e6ae3a57ad6ba9429efe
    • Instruction ID: 4198a1d351d31b9a86c79895a928489856ad1452b39a35c365c2990c697424f4
    • Opcode Fuzzy Hash: 0809fa2659c157af8da77a48e90bfea0ac0ad0ed8c95e6ae3a57ad6ba9429efe
    • Instruction Fuzzy Hash: F4217F35A046289BDB10EF95D842AAEB3F8EF08701F91406BF905F7281D63C9F00C76A
    APIs
    • GetACP.KERNEL32(0041F85C,00000001), ref: 0042D6B8
    • GetCPInfo.KERNEL32(0042D79C,0042C1C5,0041F85C,00000001), ref: 0042D6D9
    Strings
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: Info
    • String ID: $CA$\A
    • API String ID: 1807457897-218779800
    • Opcode ID: 5eeed4a1fe1997d1979fd9be693cba12f47eb0a3d5b140c4eb6e39407f1a236c
    • Instruction ID: 3f161ca63d9b70b18435ca805e2739cb9bbe25dfc1e96fa5ecbc0a11a2866f3f
    • Opcode Fuzzy Hash: 5eeed4a1fe1997d1979fd9be693cba12f47eb0a3d5b140c4eb6e39407f1a236c
    • Instruction Fuzzy Hash: EF01C471A00A158FC720EF69A981997B7E4AF05364700852FEC99C7351EA3999048BA9
    APIs
    • EnterCriticalSection.KERNEL32(?,00000000,004E3BCC), ref: 004E39AC
    • LeaveCriticalSection.KERNEL32(?,004E3BA3,?,00000000,004E3BCC), ref: 004E3B96
    Strings
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: CriticalSection$EnterLeave
    • String ID: Default$-Q
    • API String ID: 3168844106-3821686248
    • Opcode ID: 1a1d0b3d7fef57fbd369e5ba3f48b81e015b8509224f28914d8de7d590d176ed
    • Instruction ID: 19d7f923896caa44bc4d2895c7d959a39db7ed687c0c5984d3f2fc8e9670fb4e
    • Opcode Fuzzy Hash: 1a1d0b3d7fef57fbd369e5ba3f48b81e015b8509224f28914d8de7d590d176ed
    • Instruction Fuzzy Hash: BA519470A083589FDB02DFA9C845AEEBBF5FF48305F51446AE404A7352D778AE44CB14
    APIs
    • GetObjectW.GDI32(?,00000000,00000000), ref: 004E3EF7
    • GetObjectW.GDI32(?,00000010,?), ref: 004E3F0A
    • GetObjectW.GDI32(?,00000000,?), ref: 004E3F63
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: Object
    • String ID:
    • API String ID: 2936123098-0
    • Opcode ID: a40579d9f90c76d0c9fca4423f8c07d8447b4155338eb9add3561dc35ea178ad
    • Instruction ID: b9ca84249461113418995685c1b411e63f59ddf32e5f5f2b3ba05ad8a3118a75
    • Opcode Fuzzy Hash: a40579d9f90c76d0c9fca4423f8c07d8447b4155338eb9add3561dc35ea178ad
    • Instruction Fuzzy Hash: 09319471A047849FD711CF5AC885EAABBF9EF49311F14846EF854DB741D234E9008B64
    APIs
    • GetThreadUILanguage.KERNEL32(?,00000000), ref: 0040C9A9
    • SetThreadPreferredUILanguages.KERNEL32(00000004,?,?), ref: 0040CA07
    • SetThreadPreferredUILanguages.KERNEL32(00000000,00000000,?), ref: 0040CA64
    • SetThreadPreferredUILanguages.KERNEL32(00000008,?,?), ref: 0040CA97
      • Part of subcall function 0040C954: GetThreadPreferredUILanguages.KERNEL32(00000038,?,00000000,?,?,00000000,?,?,0040CA15), ref: 0040C96B
      • Part of subcall function 0040C954: GetThreadPreferredUILanguages.KERNEL32(00000038,?,00000000,?,?,?,0040CA15), ref: 0040C988
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: Thread$LanguagesPreferred$Language
    • String ID:
    • API String ID: 2255706666-0
    • Opcode ID: ab0a3fc87b5d274f299d69668d3c9eef21079eaeea860c77a07499101e2d6c50
    • Instruction ID: 8d1cb3547ee4b9364daa38f1b6dc697d03ddbece5e120c74778344a30482e11a
    • Opcode Fuzzy Hash: ab0a3fc87b5d274f299d69668d3c9eef21079eaeea860c77a07499101e2d6c50
    • Instruction Fuzzy Hash: DF313D70A0021E9BDB10DBA9C8C57AFB7B5EF04304F00427AE555E7291DB789A04CB95
    APIs
      • Part of subcall function 004E4778: EnterCriticalSection.KERNEL32(0051DE34,?,004E4858,?,?,?,?,?,?,?,?,00000000,004E4870,?,0051DE34), ref: 004E4780
      • Part of subcall function 004E4778: LeaveCriticalSection.KERNEL32(0051DE34,0051DE34,?,004E4858,?,?,?,?,?,?,?,?,00000000,004E4870,?,0051DE34), ref: 004E478D
      • Part of subcall function 004E4778: EnterCriticalSection.KERNEL32(?,0051DE34,0051DE34,?,004E4858,?,?,?,?,?,?,?,?,00000000,004E4870), ref: 004E4796
      • Part of subcall function 004EC31C: GetDC.USER32(00000000), ref: 004EC372
      • Part of subcall function 004EC31C: GetDeviceCaps.GDI32(00000000,0000000C), ref: 004EC387
      • Part of subcall function 004EC31C: GetDeviceCaps.GDI32(00000000,0000000E), ref: 004EC391
      • Part of subcall function 004EC31C: CreateHalftonePalette.GDI32(00000000,00000000,?,?,?,?,004EA7DB,00000000,004EA867), ref: 004EC3B5
      • Part of subcall function 004EC31C: ReleaseDC.USER32(00000000,00000000), ref: 004EC3C0
    • CreateCompatibleDC.GDI32(00000000), ref: 004EA7DD
    • SelectObject.GDI32(00000000,?), ref: 004EA7F6
    • SelectPalette.GDI32(00000000,?,000000FF), ref: 004EA81F
    • RealizePalette.GDI32(00000000), ref: 004EA82B
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: CriticalPaletteSection$CapsCreateDeviceEnterSelect$CompatibleHalftoneLeaveObjectRealizeRelease
    • String ID:
    • API String ID: 979337279-0
    • Opcode ID: e4708b13d4162338c8fa8d9abf0c706dab058b01908a5adb0ec73a38d2e26af5
    • Instruction ID: 70351cf6032dbd0939f732d494bf93bb1b6777d92977e90662745986a4f58f41
    • Opcode Fuzzy Hash: e4708b13d4162338c8fa8d9abf0c706dab058b01908a5adb0ec73a38d2e26af5
    • Instruction Fuzzy Hash: E8310634A00684EFD704EF5AD981D5EB7F5FF48315B6241A6E804AB322C738EE82DB54
    APIs
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: Object$Delete$IconInfo
    • String ID:
    • API String ID: 507670407-0
    • Opcode ID: 7a1785c32ae41643537aa2786bfbdbae53e7e625d4899cd26e3bbc34933ba4e6
    • Instruction ID: 1a97c13f3edbda2b3c1502a7d4827854aa80e6db8bf7018fb0a338cf34cd0894
    • Opcode Fuzzy Hash: 7a1785c32ae41643537aa2786bfbdbae53e7e625d4899cd26e3bbc34933ba4e6
    • Instruction Fuzzy Hash: 32119175A00208AFDB00DFABC982C9EB7F9EB48311B1085AAF904D7351DB75EE00DA94
    APIs
    • GetDC.USER32(00000000), ref: 004EEDD9
    • SelectObject.GDI32(00000000,058A00B4), ref: 004EEDEB
    • GetTextMetricsW.GDI32(00000000), ref: 004EEDF6
    • ReleaseDC.USER32(00000000,00000000), ref: 004EEE07
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: MetricsObjectReleaseSelectText
    • String ID:
    • API String ID: 2013942131-0
    • Opcode ID: 69fa914ca851ee74fc1149395581ca18b64c37d6fa6240ddf4510f1bbda6b75f
    • Instruction ID: a86a7c8164184303e7b2e3849245c9a5924fc7d8bd12fc902a680fb7c4b12911
    • Opcode Fuzzy Hash: 69fa914ca851ee74fc1149395581ca18b64c37d6fa6240ddf4510f1bbda6b75f
    • Instruction Fuzzy Hash: 94E04F626027B032D551666B5D86BDB2A4C4F026ABF480116FD44997D1DA0DCE5083FA
    APIs
    • VirtualQuery.KERNEL32(?,?,0000001C,00000000,00427356), ref: 004271F0
    • GetModuleFileNameW.KERNEL32(?,?,00000105,?,?,0000001C,00000000,00427356), ref: 0042721C
      • Part of subcall function 0040EDD0: LoadStringW.USER32(00000000,00010000,?,00001000), ref: 0040EE15
    Strings
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: FileLoadModuleNameQueryStringVirtual
    • String ID: T@A
    • API String ID: 902310565-1700159869
    • Opcode ID: b1904c3b1e25de0c743b57fdaef9e03b7063e3f2f5df921ab3fb199db786710b
    • Instruction ID: 292cc49da6a1f77817d57b352a36c2b8d2767a536ed26fc9e9afb2df57e86b37
    • Opcode Fuzzy Hash: b1904c3b1e25de0c743b57fdaef9e03b7063e3f2f5df921ab3fb199db786710b
    • Instruction Fuzzy Hash: 72510834A08269DFDB10DF69DC88AD9B7F4AF48304F5045EAA808A7351D778AE84CF59
    APIs
    • CharUpperW.USER32(?,00000000,?,00000000,00000000,00000000,00000000,?,?,?,00000000,0042BB77,00000000,0042BCB7), ref: 00428707
    Strings
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: CharUpper
    • String ID: A$Z
    • API String ID: 9403516-4098844585
    • Opcode ID: 0853d31e4c62cbf45948dc29de724639dcf269313cc23831c9dadc14004e3c7b
    • Instruction ID: b9253ecd29e492176c38fe4a03f9f14fb6b287faa95297cdab911eb37b575cf8
    • Opcode Fuzzy Hash: 0853d31e4c62cbf45948dc29de724639dcf269313cc23831c9dadc14004e3c7b
    • Instruction Fuzzy Hash: 431136127466200BE720643FAC817FF958A87C63A4F99023FF505D73C1DC5C8C0142D9
    APIs
    • UnhandledExceptionFilter.KERNEL32(00000006,00000000), ref: 00408F8A
    • UnhandledExceptionFilter.KERNEL32(?,?,?,Function_00008F20), ref: 00408FC7
    Strings
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: ExceptionFilterUnhandled
    • String ID: hsB
    • API String ID: 3192549508-625297667
    • Opcode ID: 71af4e390d5abfd6d2040d1b975c0e968029a7204a6687ef051946c3d04c1d81
    • Instruction ID: a3b05377a8d17e60e07457b386e13646049d2c6927d33ce14a72d1f6f32e6c37
    • Opcode Fuzzy Hash: 71af4e390d5abfd6d2040d1b975c0e968029a7204a6687ef051946c3d04c1d81
    • Instruction Fuzzy Hash: 1A3180B0604301AFD720DB24C984F2BB7EAEB88714F14857EF548972A2CB38EC45D719
    APIs
    • RegCreateKeyExW.ADVAPI32(00000000,00000000,00000000,00000000,00000000,?,00000000,?,?,00000000,004D9018), ref: 004D8FBC
    • RegCloseKey.ADVAPI32(?,00000000,00000000,00000000,00000000,00000000,?,00000000,?,?,00000000,004D9018), ref: 004D8FD4
    Strings
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: CloseCreate
    • String ID: 0DA
    • API String ID: 2932200918-1323616133
    • Opcode ID: bb97c0676561c50b367f398c45e962b75bcf36dbd0bce4dbaefa2d6a69331ce0
    • Instruction ID: d53944c613411017ec76b3ffae7557840a5ef6c12a4d2874e33b6d03a67fcfae
    • Opcode Fuzzy Hash: bb97c0676561c50b367f398c45e962b75bcf36dbd0bce4dbaefa2d6a69331ce0
    • Instruction Fuzzy Hash: 48215171B04208ABDB11EFA5CC62BAE77F9EB48704F10407BF504E7381EA789E059659
    APIs
    • UnhandledExceptionFilter.KERNEL32(00000006), ref: 0040947F
    Strings
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: ExceptionFilterUnhandled
    • String ID: hsB$ptB
    • API String ID: 3192549508-579888589
    • Opcode ID: 6040466f00e2c8a053fbe7c5040ef9d1dac393dd0ce99f32a3ea5679555daf94
    • Instruction ID: 1c15842ca407df81533eab869cf356bb1e86fa8830085c109665a44f2841b22d
    • Opcode Fuzzy Hash: 6040466f00e2c8a053fbe7c5040ef9d1dac393dd0ce99f32a3ea5679555daf94
    • Instruction Fuzzy Hash: 722187742082059BDB24DF29D884B2B7391AB98710F14C53AA845973D7C73CEC46DB59
    APIs
    • SetEnhMetaFileBits.GDI32(0000006C,?,00000000,004E99F3), ref: 004E99AB
    Strings
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: BitsFileMeta
    • String ID: EMF$l
    • API String ID: 858000408-2398670571
    • Opcode ID: c3248d0ab480d3108a0ba36822d6b66260935bb63d396376c0e867e9965ccc25
    • Instruction ID: d8b59ccd57732e94ff2d5b122cdf495c560b21a665579054683b94a632da62f7
    • Opcode Fuzzy Hash: c3248d0ab480d3108a0ba36822d6b66260935bb63d396376c0e867e9965ccc25
    • Instruction Fuzzy Hash: 84217F71A00244DFCB10EFAAC881A6EB7F5FF49714F55426EE405AB786DB38AD01CB58
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: InitVariant
    • String ID: U8C$U8C
    • API String ID: 1927566239-2794899156
    • Opcode ID: db6a9f75b1a4584b7bc33f5e8f49c8cdb8db5e0e3866a7495bae4b43e4eaed12
    • Instruction ID: 3718f543713a639fbd9363f2c08326ab3eccad4979a804db5ac30ab2a6f2115c
    • Opcode Fuzzy Hash: db6a9f75b1a4584b7bc33f5e8f49c8cdb8db5e0e3866a7495bae4b43e4eaed12
    • Instruction Fuzzy Hash: 1FF0C975E0021DEBCB00DF99D881AEEBBF8FB08310F008156EA54E7350E774AA44CB95
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: InitVariant
    • String ID: >C$>C
    • API String ID: 1927566239-3959820462
    • Opcode ID: 9431cc45d2050322a4fe7e3993520c2e8b16b55c3dfe581ae8e886489c6d48fe
    • Instruction ID: f0b58e972ab66ce2c2c386f2ce8a0745796aa178129b7f8f94bba518b5364a4c
    • Opcode Fuzzy Hash: 9431cc45d2050322a4fe7e3993520c2e8b16b55c3dfe581ae8e886489c6d48fe
    • Instruction Fuzzy Hash: B9F0EC75E0021DABCB00DF99C881ADFB7F8FB08310F008156EA14E7340E775AA44CB95
    APIs
    • GetModuleHandleW.KERNEL32(kernel32.dll,?,0050E4DB,00000000,0050E512), ref: 004289F2
      • Part of subcall function 004139B0: GetProcAddress.KERNEL32(0043C998,?), ref: 004139DA
    Strings
    Memory Dump Source
    • Source File: 00000004.00000002.1542029034.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000004.00000002.1542012250.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542105732.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542122335.0000000000510000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542136604.0000000000511000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542155303.0000000000513000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542171238.0000000000518000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542186936.000000000051F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542217680.0000000000520000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542232013.0000000000521000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000522000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000004.00000002.1542246219.0000000000524000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_4_2_400000_rundll32.jbxd
    Similarity
    • API ID: AddressHandleModuleProc
    • String ID: GetDiskFreeSpaceExW$kernel32.dll
    • API String ID: 1646373207-1127948838
    • Opcode ID: c7edea2ffbbda9fdc0d07ee16b935c76c2adbbdc0e38b75f3dfa78325f9fbb0d
    • Instruction ID: 8ccd786351900723a36e45e0a3bb3a683afe0fdfe4abf5b7f5dbba0d790a7421
    • Opcode Fuzzy Hash: c7edea2ffbbda9fdc0d07ee16b935c76c2adbbdc0e38b75f3dfa78325f9fbb0d
    • Instruction Fuzzy Hash: 24D05EB07123624AD760ABA1B882B1E2288A320F06F80013FB20145B26CFFD8848534C

    Execution Graph

    Execution Coverage:0.9%
    Dynamic/Decrypted Code Coverage:100%
    Signature Coverage:0%
    Total number of Nodes:334
    Total number of Limit Nodes:36
    execution_graph 47131 2c4ee14 MulDiv 47132 2c4ee66 47131->47132 47133 2c4ee50 47131->47133 47147 2c38de8 47132->47147 47199 2c4edd0 GetDC SelectObject GetTextMetricsW ReleaseDC 47133->47199 47136 2c4ee55 47136->47132 47200 2b6a060 47136->47200 47137 2c4ee72 47151 2c38ed0 47137->47151 47143 2c4eeb9 47148 2c38dee 47147->47148 47149 2c38ed0 14 API calls 47148->47149 47150 2c38e06 47149->47150 47150->47137 47152 2c38ef7 47151->47152 47153 2c38edd 47151->47153 47157 2c3915c 47152->47157 47154 2c38ee3 RegCloseKey 47153->47154 47155 2c38eed 47153->47155 47154->47155 47156 2c38ea0 13 API calls 47155->47156 47156->47152 47158 2b6a060 11 API calls 47157->47158 47159 2c39186 47158->47159 47161 2c391a6 47159->47161 47210 2b6ab6c 11 API calls 47159->47210 47162 2c391d4 RegOpenKeyExW 47161->47162 47163 2c391e3 47162->47163 47164 2c391ec 47163->47164 47169 2c3922a 47163->47169 47165 2c39218 47164->47165 47211 2b6aa3c 11 API calls 47164->47211 47212 2c38efc 13 API calls 47165->47212 47168 2c39225 47217 2b69c38 47168->47217 47170 2c3924a RegOpenKeyExW 47169->47170 47171 2c39259 47170->47171 47174 2c39262 47171->47174 47178 2c3929d 47171->47178 47175 2c3928e 47174->47175 47213 2b6aa3c 11 API calls 47174->47213 47214 2c38efc 13 API calls 47175->47214 47179 2c392bb RegOpenKeyExW 47178->47179 47180 2c392ca 47179->47180 47180->47168 47181 2c392fc 47180->47181 47215 2b6aa3c 11 API calls 47180->47215 47216 2c38efc 13 API calls 47181->47216 47184 2c399e8 47222 2c39930 47184->47222 47187 2c39a02 47225 2b69dc0 47187->47225 47188 2c39a57 47189 2b69c38 11 API calls 47188->47189 47197 2c39a4c 47189->47197 47191 2c39a14 47229 2c39edc 47191->47229 47193 2c39a2c 47194 2c39a38 47193->47194 47195 2c39a4e 47193->47195 47237 2b6a8dc 11 API calls 47194->47237 47238 2c38c68 80 API calls 47195->47238 47204 2c38ea0 47197->47204 47199->47136 47201 2b6a064 47200->47201 47202 2b6a088 47201->47202 47252 2b66e40 11 API calls 47201->47252 47202->47132 47205 2c38eaa 47204->47205 47206 2c38ecc 47204->47206 47207 2c38eb0 RegFlushKey 47205->47207 47208 2c38eb6 RegCloseKey 47205->47208 47206->47143 47207->47208 47209 2b69c38 11 API calls 47208->47209 47209->47206 47210->47161 47212->47168 47214->47168 47216->47168 47218 2b69c3e 47217->47218 47220 2b69c59 47217->47220 47218->47220 47221 2b66e40 11 API calls 47218->47221 47220->47143 47220->47184 47221->47220 47239 2c398dc 47222->47239 47224 2c39944 47224->47187 47224->47188 47226 2b69dd0 47225->47226 47243 2b69c5c 47226->47243 47248 2b6a748 47229->47248 47231 2c39f02 RegQueryValueExW 47232 2c39f15 47231->47232 47233 2c39f3d 47232->47233 47250 2b86a14 80 API calls 47232->47250 47233->47193 47235 2c39f38 47251 2b692b4 11 API calls 47235->47251 47237->47197 47238->47197 47240 2c398f4 47239->47240 47241 2c39908 RegQueryValueExW 47240->47241 47242 2c3991b 47241->47242 47242->47224 47244 2b69c62 47243->47244 47246 2b69c7d 47243->47246 47244->47246 47247 2b66e40 11 API calls 47244->47247 47246->47191 47247->47246 47249 2b6a74e 47248->47249 47249->47231 47250->47235 47252->47202 47253 2b6591c 47254 2b65934 47253->47254 47255 2b65b7c 47253->47255 47265 2b65946 47254->47265 47269 2b659d1 Sleep 47254->47269 47256 2b65b40 47255->47256 47257 2b65c94 47255->47257 47266 2b65b5a Sleep 47256->47266 47267 2b65b9a 47256->47267 47258 2b65c9d 47257->47258 47259 2b656c8 VirtualAlloc 47257->47259 47261 2b65703 47259->47261 47262 2b656f3 47259->47262 47260 2b65955 47277 2b6567c Sleep Sleep 47262->47277 47264 2b65a34 47276 2b65a40 47264->47276 47278 2b65600 47264->47278 47265->47260 47265->47264 47271 2b65a15 Sleep 47265->47271 47266->47267 47268 2b65b70 Sleep 47266->47268 47272 2b65600 VirtualAlloc 47267->47272 47273 2b65bb8 47267->47273 47268->47256 47269->47265 47270 2b659e7 Sleep 47269->47270 47270->47254 47271->47264 47275 2b65a2b Sleep 47271->47275 47272->47273 47275->47265 47277->47261 47282 2b65594 47278->47282 47280 2b65609 VirtualAlloc 47281 2b65620 47280->47281 47281->47276 47283 2b65534 47282->47283 47283->47280 47284 2b87884 47285 2b6a060 11 API calls 47284->47285 47286 2b878b4 47285->47286 47299 2b6a1c8 47286->47299 47288 2b878bc 47289 2b878c8 GetFileVersionInfoSizeW 47288->47289 47290 2b8796e 47289->47290 47293 2b878d8 47289->47293 47291 2b69c38 11 API calls 47290->47291 47292 2b87983 47291->47292 47294 2b87901 GetFileVersionInfoW 47293->47294 47295 2b8790b VerQueryValueW 47294->47295 47296 2b87925 47294->47296 47295->47296 47303 2b66e40 11 API calls 47296->47303 47298 2b87966 47300 2b6a130 47299->47300 47301 2b6a16b 47300->47301 47304 2b66e40 11 API calls 47300->47304 47301->47288 47303->47298 47304->47301 47305 2c6eee8 47310 2b70548 47305->47310 47311 2b70553 47310->47311 47315 2b6961c 47311->47315 47314 2b69968 11 API calls 47316 2b69630 GetCurrentThreadId 47315->47316 47317 2b6962b 47315->47317 47318 2b69666 47316->47318 47317->47316 47319 2b69968 47318->47319 47320 2b696d9 47318->47320 47322 2b69984 47319->47322 47323 2b69995 47319->47323 47334 2b695b0 47320->47334 47340 2b698d0 GetStdHandle WriteFile GetStdHandle WriteFile 47322->47340 47325 2b6999e GetCurrentThreadId 47323->47325 47326 2b699ab 47323->47326 47325->47326 47329 2b66ec8 11 API calls 47326->47329 47330 2b69a3b FreeLibrary 47326->47330 47331 2b69a63 47326->47331 47328 2b6998e 47328->47323 47329->47326 47330->47326 47332 2b69a72 ExitProcess 47331->47332 47333 2b69a6c 47331->47333 47333->47332 47335 2b695f8 47334->47335 47336 2b695c0 47334->47336 47335->47314 47336->47335 47341 2b6ee84 GetSystemInfo 47336->47341 47342 2c6e47c 47336->47342 47356 2c6e000 47336->47356 47340->47328 47341->47336 47343 2c6e496 47342->47343 47344 2c6e504 47342->47344 47368 2b697a0 47343->47368 47344->47336 47346 2c6e4a0 47348 2c6e4c2 47346->47348 47389 2b6a018 11 API calls 47346->47389 47374 2b8782c GetVersionExW 47348->47374 47350 2c6e4d6 47376 2b889ec GetModuleHandleW 47350->47376 47354 2c6e4e7 47390 2b87e74 95 API calls 47354->47390 47357 2c6e0c9 47356->47357 47358 2c6e01e 47356->47358 47357->47336 47359 2c6e028 SetThreadLocale 47358->47359 47422 2b6c520 InitializeCriticalSection GetVersion 47359->47422 47363 2c6e05e 47364 2c6e077 GetCommandLineW 47363->47364 47426 2b65244 GetStartupInfoW 47364->47426 47366 2c6e0a1 GetACP GetCurrentThreadId 47427 2b6ee98 GetVersion 47366->47427 47371 2b697ac 47368->47371 47373 2b697e3 47371->47373 47391 2b696e4 57 API calls 47371->47391 47392 2b6973c 57 API calls 47371->47392 47393 2b6978c 57 API calls 47371->47393 47373->47346 47375 2b87861 47374->47375 47375->47350 47377 2b88a0d 47376->47377 47378 2b889fd 47376->47378 47381 2b6d104 47377->47381 47394 2b739b0 13 API calls 47378->47394 47380 2b88a08 47380->47377 47382 2b6d126 47381->47382 47383 2b6d138 47381->47383 47395 2b6cde8 47382->47395 47387 2b69c38 11 API calls 47383->47387 47385 2b6d130 47419 2b6d168 11 API calls 47385->47419 47388 2b6d15a 47387->47388 47388->47354 47389->47348 47390->47344 47391->47371 47392->47371 47393->47371 47394->47380 47396 2b6cdff 47395->47396 47397 2b6ce13 GetModuleFileNameW 47396->47397 47398 2b6ce28 47396->47398 47397->47398 47399 2b6cff7 47398->47399 47400 2b6ce50 RegOpenKeyExW 47398->47400 47401 2b69c38 11 API calls 47399->47401 47402 2b6ce77 RegOpenKeyExW 47400->47402 47403 2b6cf11 47400->47403 47404 2b6d00c 47401->47404 47402->47403 47405 2b6ce95 RegOpenKeyExW 47402->47405 47420 2b6cbf8 7 API calls 47403->47420 47404->47385 47405->47403 47407 2b6ceb3 RegOpenKeyExW 47405->47407 47407->47403 47409 2b6ced1 RegOpenKeyExW 47407->47409 47408 2b6cf2f RegQueryValueExW 47410 2b6cf80 RegQueryValueExW 47408->47410 47412 2b6cf4d 47408->47412 47409->47403 47411 2b6ceef RegOpenKeyExW 47409->47411 47413 2b6cf9c 47410->47413 47418 2b6cf7e 47410->47418 47411->47399 47411->47403 47415 2b6cf55 RegQueryValueExW 47412->47415 47416 2b6cfa4 RegQueryValueExW 47413->47416 47414 2b6cfe6 RegCloseKey 47414->47385 47414->47399 47415->47418 47416->47418 47418->47414 47421 2b66e40 11 API calls 47418->47421 47419->47383 47420->47408 47421->47414 47423 2b6c550 6 API calls 47422->47423 47424 2b6c59e 47422->47424 47423->47424 47425 2b6ee84 GetSystemInfo 47424->47425 47425->47363 47426->47366 47427->47357 47428 2b6c278 47429 2b6c2a4 47428->47429 47430 2b6c288 GetModuleFileNameW 47428->47430 47432 2b6d4ec GetModuleFileNameW 47430->47432 47433 2b6d53a 47432->47433 47442 2b6d3c8 47433->47442 47435 2b6d580 47468 2b69c98 47435->47468 47436 2b6d566 47436->47435 47438 2b6d578 LoadLibraryExW 47436->47438 47438->47435 47440 2b69c38 11 API calls 47441 2b6d5a5 47440->47441 47441->47429 47443 2b6d3e9 47442->47443 47444 2b69c38 11 API calls 47443->47444 47445 2b6d406 47444->47445 47446 2b6d471 47445->47446 47448 2b6a060 11 API calls 47445->47448 47447 2b69c98 11 API calls 47446->47447 47449 2b6d4de 47447->47449 47452 2b6d41b 47448->47452 47449->47436 47450 2b6d44c 47451 2b6d104 30 API calls 47450->47451 47453 2b6d45e 47451->47453 47452->47450 47527 2b6ab24 47452->47527 47455 2b6d464 47453->47455 47456 2b6d473 GetUserDefaultUILanguage 47453->47456 47457 2b6d230 13 API calls 47455->47457 47472 2b6cab4 EnterCriticalSection 47456->47472 47457->47446 47462 2b6d4b5 47462->47446 47509 2b6d2fc 47462->47509 47463 2b6d49b GetSystemDefaultUILanguage 47465 2b6cab4 28 API calls 47463->47465 47466 2b6d4a8 47465->47466 47467 2b6d230 13 API calls 47466->47467 47467->47462 47469 2b69c9e 47468->47469 47470 2b69cc4 47469->47470 47559 2b66e40 11 API calls 47469->47559 47470->47440 47473 2b6cb00 LeaveCriticalSection 47472->47473 47474 2b6cae0 47472->47474 47475 2b69c38 11 API calls 47473->47475 47477 2b6caf1 LeaveCriticalSection 47474->47477 47476 2b6cb11 IsValidLocale 47475->47476 47479 2b6cb20 47476->47479 47480 2b6cb6f EnterCriticalSection 47476->47480 47478 2b6cba2 47477->47478 47484 2b69c38 11 API calls 47478->47484 47482 2b6cb34 47479->47482 47483 2b6cb29 47479->47483 47481 2b6cb87 47480->47481 47490 2b6cb98 LeaveCriticalSection 47481->47490 47532 2b6c79c 14 API calls 47482->47532 47531 2b6c998 17 API calls 47483->47531 47487 2b6cbb7 47484->47487 47497 2b6d230 47487->47497 47488 2b6cb32 47488->47480 47489 2b6cb3d GetSystemDefaultUILanguage 47489->47480 47491 2b6cb47 47489->47491 47490->47478 47492 2b6cb58 GetSystemDefaultUILanguage 47491->47492 47533 2b6a018 11 API calls 47491->47533 47534 2b6c79c 14 API calls 47492->47534 47495 2b6cb65 47535 2b6a018 11 API calls 47495->47535 47498 2b6d24e 47497->47498 47499 2b69c38 11 API calls 47498->47499 47506 2b6d26b 47499->47506 47500 2b6d2c9 47501 2b69c38 11 API calls 47500->47501 47502 2b6d2d0 47501->47502 47503 2b69c98 11 API calls 47502->47503 47504 2b6d2ea 47503->47504 47504->47462 47504->47463 47505 2b6ab24 11 API calls 47505->47506 47506->47500 47506->47502 47506->47505 47536 2b6a9b4 47506->47536 47547 2b6d1c4 47506->47547 47557 2b69d1c 47509->47557 47512 2b6d34c 47513 2b6a9b4 11 API calls 47512->47513 47514 2b6d359 47513->47514 47515 2b6d1c4 13 API calls 47514->47515 47516 2b6d360 47515->47516 47517 2b6d399 47516->47517 47521 2b6a9b4 11 API calls 47516->47521 47518 2b69c98 11 API calls 47517->47518 47519 2b6d3b3 47518->47519 47520 2b69c38 11 API calls 47519->47520 47522 2b6d3bb 47520->47522 47523 2b6d387 47521->47523 47522->47446 47524 2b6d1c4 13 API calls 47523->47524 47525 2b6d38e 47524->47525 47525->47517 47526 2b69c38 11 API calls 47525->47526 47526->47517 47528 2b6ab2f 47527->47528 47529 2b69dc0 11 API calls 47528->47529 47530 2b6ab65 47529->47530 47530->47450 47531->47488 47532->47489 47533->47492 47534->47495 47535->47480 47537 2b6a9b8 47536->47537 47539 2b6aa26 47536->47539 47538 2b6a9c0 47537->47538 47540 2b6a018 47537->47540 47538->47539 47544 2b6a9cf 47538->47544 47555 2b6a018 11 API calls 47538->47555 47541 2b6a05c 47540->47541 47554 2b66e40 11 API calls 47540->47554 47541->47506 47544->47539 47556 2b6a018 11 API calls 47544->47556 47546 2b6aa22 47546->47506 47548 2b6d1d9 47547->47548 47549 2b6d1f6 FindFirstFileW 47548->47549 47550 2b6d206 FindClose 47549->47550 47551 2b6d20c 47549->47551 47550->47551 47552 2b69c38 11 API calls 47551->47552 47553 2b6d221 47552->47553 47553->47506 47554->47541 47555->47544 47556->47546 47558 2b69d20 GetUserDefaultUILanguage GetLocaleInfoW 47557->47558 47558->47512 47559->47469

    Control-flow Graph

    APIs
    • GetUserDefaultUILanguage.KERNEL32(00000003,?,00000004,00000000,02B6D3BC,?,?), ref: 02B6D32E
    • GetLocaleInfoW.KERNEL32(?,00000003,?,00000004,00000000,02B6D3BC,?,?), ref: 02B6D337
      • Part of subcall function 02B6D1C4: FindFirstFileW.KERNEL32(00000000,?,00000000,02B6D222,?,00000001), ref: 02B6D1F7
      • Part of subcall function 02B6D1C4: FindClose.KERNEL32(00000000,00000000,?,00000000,02B6D222,?,00000001), ref: 02B6D207
    Memory Dump Source
    • Source File: 00000020.00000002.1629785315.0000000002B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 02B60000, based on PE: true
    • Associated: 00000020.00000002.1629751702.0000000002B60000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629918239.0000000002C6F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629951953.0000000002C70000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629988721.0000000002C71000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630023350.0000000002C75000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630059756.0000000002C76000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630153321.0000000002C80000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630194479.0000000002C81000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C82000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C84000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_32_2_2b60000_rundll32.jbxd
    Similarity
    • API ID: Find$CloseDefaultFileFirstInfoLanguageLocaleUser
    • String ID:
    • API String ID: 3216391948-0
    • Opcode ID: 2b2eeca1165a028a54e0f60a90376487f18b7d7ef4db804bedb6965df259c088
    • Instruction ID: 0336676b6210bfe0330c6357a11d8d8101ab4d4e0ba7f47a8588e0a87c53ccfb
    • Opcode Fuzzy Hash: 2b2eeca1165a028a54e0f60a90376487f18b7d7ef4db804bedb6965df259c088
    • Instruction Fuzzy Hash: D0114F70B042099BDF00EFA4D895ABEB3BAEF48300F5044F5A904E7290DB786E05CE65

    Control-flow Graph

    APIs
    • FindFirstFileW.KERNEL32(00000000,?,00000000,02B6D222,?,00000001), ref: 02B6D1F7
    • FindClose.KERNEL32(00000000,00000000,?,00000000,02B6D222,?,00000001), ref: 02B6D207
    Memory Dump Source
    • Source File: 00000020.00000002.1629785315.0000000002B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 02B60000, based on PE: true
    • Associated: 00000020.00000002.1629751702.0000000002B60000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629918239.0000000002C6F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629951953.0000000002C70000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629988721.0000000002C71000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630023350.0000000002C75000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630059756.0000000002C76000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630153321.0000000002C80000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630194479.0000000002C81000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C82000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C84000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_32_2_2b60000_rundll32.jbxd
    Similarity
    • API ID: Find$CloseFileFirst
    • String ID:
    • API String ID: 2295610775-0
    • Opcode ID: 7dfcf1251daa01666c1c8433808237b59341d0371ee7ecf14db511de3f8c2e1d
    • Instruction ID: 0c35f8391bf53b432c5cd52ddf5d05a9ac10d88ccdc7addd6d57f92704e932b6
    • Opcode Fuzzy Hash: 7dfcf1251daa01666c1c8433808237b59341d0371ee7ecf14db511de3f8c2e1d
    • Instruction Fuzzy Hash: 0CF08C71644609AEDB20FBB8DC59DBEB7FDEB48710BA005F1B454E3190EB38DE109A64

    Control-flow Graph

    APIs
    • GetModuleFileNameW.KERNEL32(00000000,?,00000105,00000000,02B6D00D,?,?), ref: 02B6CE21
    • RegOpenKeyExW.ADVAPI32(80000001,Software\Embarcadero\Locales,00000000,000F0019,?,00000000,02B6D00D,?,?), ref: 02B6CE6A
    • RegOpenKeyExW.ADVAPI32(80000002,Software\Embarcadero\Locales,00000000,000F0019,?,80000001,Software\Embarcadero\Locales,00000000,000F0019,?,00000000,02B6D00D,?,?), ref: 02B6CE8C
    • RegOpenKeyExW.ADVAPI32(80000001,Software\CodeGear\Locales,00000000,000F0019,?,80000002,Software\Embarcadero\Locales,00000000,000F0019,?,80000001,Software\Embarcadero\Locales,00000000,000F0019,?,00000000), ref: 02B6CEAA
    • RegOpenKeyExW.ADVAPI32(80000002,Software\CodeGear\Locales,00000000,000F0019,?,80000001,Software\CodeGear\Locales,00000000,000F0019,?,80000002,Software\Embarcadero\Locales,00000000,000F0019,?,80000001), ref: 02B6CEC8
    • RegOpenKeyExW.ADVAPI32(80000001,Software\Borland\Locales,00000000,000F0019,?,80000002,Software\CodeGear\Locales,00000000,000F0019,?,80000001,Software\CodeGear\Locales,00000000,000F0019,?,80000002), ref: 02B6CEE6
    • RegOpenKeyExW.ADVAPI32(80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,80000002,Software\CodeGear\Locales,00000000,000F0019,?,80000001), ref: 02B6CF04
    • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,00000000,?,00000000,02B6CFF0,?,80000001,Software\Embarcadero\Locales,00000000,000F0019,?,00000000,02B6D00D), ref: 02B6CF44
    • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,?,00000000,00000000,00000000,?,00000000,02B6CFF0,?,80000001), ref: 02B6CF6F
    • RegCloseKey.ADVAPI32(?,02B6CFF7,00000000,00000000,?,?,?,00000000,00000000,00000000,?,00000000,02B6CFF0,?,80000001,Software\Embarcadero\Locales), ref: 02B6CFEA
    Strings
    Memory Dump Source
    • Source File: 00000020.00000002.1629785315.0000000002B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 02B60000, based on PE: true
    • Associated: 00000020.00000002.1629751702.0000000002B60000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629918239.0000000002C6F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629951953.0000000002C70000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629988721.0000000002C71000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630023350.0000000002C75000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630059756.0000000002C76000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630153321.0000000002C80000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630194479.0000000002C81000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C82000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C84000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_32_2_2b60000_rundll32.jbxd
    Similarity
    • API ID: Open$QueryValue$CloseFileModuleName
    • String ID: Software\Borland\Delphi\Locales$Software\Borland\Locales$Software\CodeGear\Locales$Software\Embarcadero\Locales
    • API String ID: 2701450724-3496071916
    • Opcode ID: fc58ac1d850ab7bb3ec8fa2e472e815bc983a47bb6da3e6b601aad85f22b7be1
    • Instruction ID: 99ca3fd381ca620ca477b3933821ffcaf186cc51228e35960ae1e6d8f37695d2
    • Opcode Fuzzy Hash: fc58ac1d850ab7bb3ec8fa2e472e815bc983a47bb6da3e6b601aad85f22b7be1
    • Instruction Fuzzy Hash: 6D514375B40209BEEB20DAA5CC5DFBEB7BDEB08704F5044E2BA14E6181D7B899448B54

    Control-flow Graph

    APIs
    • EnterCriticalSection.KERNEL32(02C7AC10,00000000,02B6CBB8,?,?,?,00000000,?,02B6D480,00000000,02B6D4DF,?,?,00000000,00000000,00000000), ref: 02B6CAD2
    • LeaveCriticalSection.KERNEL32(02C7AC10,02C7AC10,00000000,02B6CBB8,?,?,?,00000000,?,02B6D480,00000000,02B6D4DF,?,?,00000000,00000000), ref: 02B6CAF6
    • LeaveCriticalSection.KERNEL32(02C7AC10,02C7AC10,00000000,02B6CBB8,?,?,?,00000000,?,02B6D480,00000000,02B6D4DF,?,?,00000000,00000000), ref: 02B6CB05
    • IsValidLocale.KERNEL32(00000000,00000002,02C7AC10,02C7AC10,00000000,02B6CBB8,?,?,?,00000000,?,02B6D480,00000000,02B6D4DF), ref: 02B6CB17
    • EnterCriticalSection.KERNEL32(02C7AC10,00000000,00000002,02C7AC10,02C7AC10,00000000,02B6CBB8,?,?,?,00000000,?,02B6D480,00000000,02B6D4DF), ref: 02B6CB74
    • LeaveCriticalSection.KERNEL32(02C7AC10,02C7AC10,00000000,00000002,02C7AC10,02C7AC10,00000000,02B6CBB8,?,?,?,00000000,?,02B6D480,00000000,02B6D4DF), ref: 02B6CB9D
    Strings
    Memory Dump Source
    • Source File: 00000020.00000002.1629785315.0000000002B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 02B60000, based on PE: true
    • Associated: 00000020.00000002.1629751702.0000000002B60000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629918239.0000000002C6F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629951953.0000000002C70000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629988721.0000000002C71000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630023350.0000000002C75000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630059756.0000000002C76000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630153321.0000000002C80000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630194479.0000000002C81000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C82000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C84000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_32_2_2b60000_rundll32.jbxd
    Similarity
    • API ID: CriticalSection$Leave$Enter$LocaleValid
    • String ID: en-GB,en,en-US,
    • API String ID: 975949045-3021119265
    • Opcode ID: 863dc8c73c940f73aae507d9a8f7ad67f58fb8e076768070d2809b11c918a9c7
    • Instruction ID: 2fcd81916633427c0a42daa91ba06afd583aafed6d6aae351b65853ddb28f311
    • Opcode Fuzzy Hash: 863dc8c73c940f73aae507d9a8f7ad67f58fb8e076768070d2809b11c918a9c7
    • Instruction Fuzzy Hash: DA21A57034064967FB20B769C81D73E3B9ADB45B00FA448F3E18197281DE7E8C508F96

    Control-flow Graph

    APIs
    • MulDiv.KERNEL32(00000008,00000060,00000048), ref: 02C4EE3A
      • Part of subcall function 02C4EDD0: GetDC.USER32(00000000), ref: 02C4EDD9
      • Part of subcall function 02C4EDD0: SelectObject.GDI32(00000000,058A00B4), ref: 02C4EDEB
      • Part of subcall function 02C4EDD0: GetTextMetricsW.GDI32(00000000), ref: 02C4EDF6
      • Part of subcall function 02C4EDD0: ReleaseDC.USER32(00000000,00000000), ref: 02C4EE07
    Strings
    • MS Shell Dlg 2, xrefs: 02C4EEA4
    • Tahoma, xrefs: 02C4EE5C
    • SOFTWARE\Microsoft\Windows NT\CurrentVersion\FontSubstitutes, xrefs: 02C4EE90
    Memory Dump Source
    • Source File: 00000020.00000002.1629785315.0000000002B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 02B60000, based on PE: true
    • Associated: 00000020.00000002.1629751702.0000000002B60000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629918239.0000000002C6F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629951953.0000000002C70000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629988721.0000000002C71000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630023350.0000000002C75000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630059756.0000000002C76000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630153321.0000000002C80000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630194479.0000000002C81000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C82000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C84000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_32_2_2b60000_rundll32.jbxd
    Similarity
    • API ID: MetricsObjectReleaseSelectText
    • String ID: MS Shell Dlg 2$SOFTWARE\Microsoft\Windows NT\CurrentVersion\FontSubstitutes$Tahoma
    • API String ID: 2013942131-1011973972
    • Opcode ID: cf68bfaad158f39c36d476ba0135035bf2a3909acdaee96fee222a5cba75bd6e
    • Instruction ID: 897c1f08f081f3230799c9fbf8812694094e52749d8d0cdacaa3a21f9b29eb13
    • Opcode Fuzzy Hash: cf68bfaad158f39c36d476ba0135035bf2a3909acdaee96fee222a5cba75bd6e
    • Instruction Fuzzy Hash: 28119170A40248EFE712EFA4DC51A5FBBEAFB46700F9249B0E400A7740DB72AE05DB50

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 84 2b6961c-2b69629 85 2b69630-2b69664 GetCurrentThreadId 84->85 86 2b6962b 84->86 87 2b69666 85->87 88 2b69668-2b69694 call 2b69500 85->88 86->85 87->88 91 2b69696-2b69698 88->91 92 2b6969d-2b696a4 88->92 91->92 93 2b6969a 91->93 94 2b696a6-2b696a9 92->94 95 2b696ae-2b696b4 92->95 93->92 94->95 96 2b696b6 95->96 97 2b696b9-2b696c0 95->97 96->97 98 2b696c2-2b696c9 97->98 99 2b696cf-2b696d3 97->99 98->99 100 2b69968-2b69982 99->100 101 2b696d9 call 2b695b0 99->101 103 2b69984-2b69990 call 2b69848 call 2b698d0 100->103 104 2b69995-2b6999c 100->104 105 2b696de 101->105 103->104 107 2b6999e-2b699a9 GetCurrentThreadId 104->107 108 2b699bf-2b699c3 104->108 107->108 109 2b699ab-2b699ba call 2b69520 call 2b698a4 107->109 110 2b699c5-2b699c9 108->110 111 2b699dd-2b699e1 108->111 109->108 110->111 114 2b699cb-2b699db 110->114 115 2b699e3-2b699e6 111->115 116 2b699ed-2b699f1 111->116 114->111 115->116 119 2b699e8-2b699ea 115->119 120 2b699f3-2b699fc call 2b66ec8 116->120 121 2b69a10-2b69a19 call 2b69548 116->121 119->116 120->121 129 2b699fe-2b69a0e call 2b67dcc call 2b66ec8 120->129 130 2b69a20-2b69a25 121->130 131 2b69a1b-2b69a1e 121->131 129->121 133 2b69a41-2b69a4c call 2b69520 130->133 134 2b69a27-2b69a35 call 2b6d6dc 130->134 131->130 131->133 141 2b69a51-2b69a55 133->141 142 2b69a4e 133->142 134->133 144 2b69a37-2b69a39 134->144 145 2b69a57-2b69a59 call 2b698a4 141->145 146 2b69a5e-2b69a61 141->146 142->141 144->133 147 2b69a3b-2b69a3c FreeLibrary 144->147 145->146 149 2b69a63-2b69a6a 146->149 150 2b69a7a-2b69a8b 146->150 147->133 151 2b69a72-2b69a75 ExitProcess 149->151 152 2b69a6c 149->152 150->111 152->151
    APIs
    • GetCurrentThreadId.KERNEL32 ref: 02B69653
    Memory Dump Source
    • Source File: 00000020.00000002.1629785315.0000000002B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 02B60000, based on PE: true
    • Associated: 00000020.00000002.1629751702.0000000002B60000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629918239.0000000002C6F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629951953.0000000002C70000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629988721.0000000002C71000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630023350.0000000002C75000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630059756.0000000002C76000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630153321.0000000002C80000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630194479.0000000002C81000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C82000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C84000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_32_2_2b60000_rundll32.jbxd
    Similarity
    • API ID: CurrentThread
    • String ID:
    • API String ID: 2882836952-0
    • Opcode ID: 61ce2f99f2ed71ef1b43c021610445c5ce65f95d5c397ee90e377a028c0cc444
    • Instruction ID: eaac251ef6108a4e911e03416e6ccda2ce5bec0a2764cd38ad5614ae40f12692
    • Opcode Fuzzy Hash: 61ce2f99f2ed71ef1b43c021610445c5ce65f95d5c397ee90e377a028c0cc444
    • Instruction Fuzzy Hash: 99517E74A00B44DFDB24DF68C48C77A77E1EF09314F148AAAD9198B281D779D894CF91

    Control-flow Graph

    APIs
    • SetThreadLocale.KERNEL32(00000400,00000000,02C6E0D7), ref: 02C6E02D
      • Part of subcall function 02B6C520: InitializeCriticalSection.KERNEL32(02C7AC10,02C6E037,00000400,00000000,02C6E0D7), ref: 02B6C525
      • Part of subcall function 02B6C520: GetVersion.KERNEL32(02C7AC10,02C6E037,00000400,00000000,02C6E0D7), ref: 02B6C533
      • Part of subcall function 02B6C520: GetModuleHandleW.KERNEL32(kernel32.dll,GetThreadPreferredUILanguages,02C7AC10,02C6E037,00000400,00000000,02C6E0D7), ref: 02B6C55A
      • Part of subcall function 02B6C520: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 02B6C560
      • Part of subcall function 02B6C520: GetModuleHandleW.KERNEL32(kernel32.dll,SetThreadPreferredUILanguages,00000000,kernel32.dll,GetThreadPreferredUILanguages,02C7AC10,02C6E037,00000400,00000000,02C6E0D7), ref: 02B6C574
      • Part of subcall function 02B6C520: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 02B6C57A
      • Part of subcall function 02B6C520: GetModuleHandleW.KERNEL32(kernel32.dll,GetThreadUILanguage,00000000,kernel32.dll,SetThreadPreferredUILanguages,00000000,kernel32.dll,GetThreadPreferredUILanguages,02C7AC10,02C6E037,00000400,00000000,02C6E0D7), ref: 02B6C58E
      • Part of subcall function 02B6C520: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 02B6C594
      • Part of subcall function 02B6EE84: GetSystemInfo.KERNEL32 ref: 02B6EE88
    • GetCommandLineW.KERNEL32(00000400,00000000,02C6E0D7), ref: 02C6E092
      • Part of subcall function 02B65244: GetStartupInfoW.KERNEL32 ref: 02B65255
    • GetACP.KERNEL32(00000400,00000000,02C6E0D7), ref: 02C6E0A6
    • GetCurrentThreadId.KERNEL32 ref: 02C6E0BA
      • Part of subcall function 02B6EE98: GetVersion.KERNEL32(02C6E0C9,00000400,00000000,02C6E0D7), ref: 02B6EE98
    Memory Dump Source
    • Source File: 00000020.00000002.1629785315.0000000002B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 02B60000, based on PE: true
    • Associated: 00000020.00000002.1629751702.0000000002B60000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629918239.0000000002C6F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629951953.0000000002C70000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629988721.0000000002C71000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630023350.0000000002C75000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630059756.0000000002C76000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630153321.0000000002C80000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630194479.0000000002C81000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C82000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C84000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_32_2_2b60000_rundll32.jbxd
    Similarity
    • API ID: AddressHandleModuleProc$InfoThreadVersion$CommandCriticalCurrentInitializeLineLocaleSectionStartupSystem
    • String ID:
    • API String ID: 2740004594-0
    • Opcode ID: 24473849a90402805736f029173c8b7438e86567c21d1566c5de1acb4dfe3580
    • Instruction ID: ae0309619e5ae4cda03bad2b362c894d1578729950634ef6089784b5fdf9ed04
    • Opcode Fuzzy Hash: 24473849a90402805736f029173c8b7438e86567c21d1566c5de1acb4dfe3580
    • Instruction Fuzzy Hash: FF11097498538099E710FFB5A80D7397BA9FB05718B808FA9C7444A640EB7D4028EFA6

    Control-flow Graph

    APIs
    • RegOpenKeyExW.ADVAPI32(00000000,00000000,00000000,?,?,00000000,02C3931F), ref: 02C391D5
    • RegOpenKeyExW.ADVAPI32(00000000,00000000,00000000,?,?,00000000,00000000,00000000,?,?,00000000,02C3931F), ref: 02C3924B
    • RegOpenKeyExW.ADVAPI32(00000000,00000000,00000000,?,?,00000000,00000000,00000000,?,?,00000000,00000000,00000000,?,?,00000000), ref: 02C392BC
    Memory Dump Source
    • Source File: 00000020.00000002.1629785315.0000000002B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 02B60000, based on PE: true
    • Associated: 00000020.00000002.1629751702.0000000002B60000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629918239.0000000002C6F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629951953.0000000002C70000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629988721.0000000002C71000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630023350.0000000002C75000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630059756.0000000002C76000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630153321.0000000002C80000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630194479.0000000002C81000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C82000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C84000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_32_2_2b60000_rundll32.jbxd
    Similarity
    • API ID: Open
    • String ID:
    • API String ID: 71445658-0
    • Opcode ID: 4d465a378bd5123c4c45a8c7bdc46580280ee86b727a503bfac7c12e0b699925
    • Instruction ID: da4fea615370d8e5a141631d8606d49d32e976e8a4d843d84928a3855ff1471c
    • Opcode Fuzzy Hash: 4d465a378bd5123c4c45a8c7bdc46580280ee86b727a503bfac7c12e0b699925
    • Instruction Fuzzy Hash: 7A51B471B00648AFEB12EBA4CC40B9EB7FBAB48304F1148A5E405E3240D779AF06EB41

    Control-flow Graph

    APIs
    • GetFileVersionInfoSizeW.VERSION(00000000,?,00000000,02B87984), ref: 02B878C9
    • GetFileVersionInfoW.VERSION(00000000,?,00000000,?,00000000,02B87967,?,00000000,?,00000000,02B87984), ref: 02B87902
    • VerQueryValueW.VERSION(?,02B87998,?,?,00000000,?,00000000,?,00000000,02B87967,?,00000000,?,00000000,02B87984), ref: 02B8791C
    Memory Dump Source
    • Source File: 00000020.00000002.1629785315.0000000002B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 02B60000, based on PE: true
    • Associated: 00000020.00000002.1629751702.0000000002B60000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629918239.0000000002C6F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629951953.0000000002C70000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629988721.0000000002C71000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630023350.0000000002C75000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630059756.0000000002C76000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630153321.0000000002C80000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630194479.0000000002C81000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C82000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C84000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_32_2_2b60000_rundll32.jbxd
    Similarity
    • API ID: FileInfoVersion$QuerySizeValue
    • String ID:
    • API String ID: 2179348866-0
    • Opcode ID: 2007be2bc39298d3b0c4578da680257007726a997b6c7c01cf854e0fb374c829
    • Instruction ID: dc4f52873f02c39c588dcc6e7c1b12c63d9e3d8afe35d913d619f942281c6281
    • Opcode Fuzzy Hash: 2007be2bc39298d3b0c4578da680257007726a997b6c7c01cf854e0fb374c829
    • Instruction Fuzzy Hash: 46312B75A04209AFEB00EFA9C9859AEB7F9EB48704B6144F5A544E3210DB74DD00DB60

    Control-flow Graph

    APIs
    • GetUserDefaultUILanguage.KERNEL32(00000000,02B6D4DF,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,02B6D566,00000000,?,00000105), ref: 02B6D473
    • GetSystemDefaultUILanguage.KERNEL32(00000000,02B6D4DF,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,02B6D566,00000000,?,00000105), ref: 02B6D49B
    Memory Dump Source
    • Source File: 00000020.00000002.1629785315.0000000002B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 02B60000, based on PE: true
    • Associated: 00000020.00000002.1629751702.0000000002B60000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629918239.0000000002C6F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629951953.0000000002C70000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629988721.0000000002C71000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630023350.0000000002C75000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630059756.0000000002C76000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630153321.0000000002C80000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630194479.0000000002C81000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C82000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C84000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_32_2_2b60000_rundll32.jbxd
    Similarity
    • API ID: DefaultLanguage$SystemUser
    • String ID:
    • API String ID: 384301227-0
    • Opcode ID: e5498419b7e037eb7b360ff091b3a4a976b36194869959bd1e74ae0037333255
    • Instruction ID: e75ba5a3618ba9e4f58a0c05ebce3bc2e3b7874ae311519e10d092a44fd9270d
    • Opcode Fuzzy Hash: e5498419b7e037eb7b360ff091b3a4a976b36194869959bd1e74ae0037333255
    • Instruction Fuzzy Hash: D0312A30B0420A9BDF14EFA8C898BBEB7B6EF48700F5444E5D400A3650DBB8AD80CF51

    Control-flow Graph

    APIs
    • GetModuleFileNameW.KERNEL32(00000000,?,00000105,00000000,02B6D5A6,?,02B60000,02C6FC1C), ref: 02B6D528
    • LoadLibraryExW.KERNEL32(00000000,00000000,00000002,00000000,?,00000105,00000000,02B6D5A6,?,02B60000,02C6FC1C), ref: 02B6D579
    Memory Dump Source
    • Source File: 00000020.00000002.1629785315.0000000002B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 02B60000, based on PE: true
    • Associated: 00000020.00000002.1629751702.0000000002B60000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629918239.0000000002C6F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629951953.0000000002C70000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629988721.0000000002C71000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630023350.0000000002C75000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630059756.0000000002C76000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630153321.0000000002C80000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630194479.0000000002C81000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C82000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C84000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_32_2_2b60000_rundll32.jbxd
    Similarity
    • API ID: FileLibraryLoadModuleName
    • String ID:
    • API String ID: 1159719554-0
    • Opcode ID: 6b7768a3243404a6c57964c40f50336f13fcf00f20583d1fb2f6c492a024d39c
    • Instruction ID: 99cf1df4177ad008fb189f428b4276a6576d555d6619089b3a443b214161ce60
    • Opcode Fuzzy Hash: 6b7768a3243404a6c57964c40f50336f13fcf00f20583d1fb2f6c492a024d39c
    • Instruction Fuzzy Hash: 56117370A4461D9BDB20EF54CC99FED73BADB44304F5140F6E508A3290EA785F858E94

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 316 2b65600-2b6561e call 2b65594 VirtualAlloc 319 2b65620-2b6566d 316->319 320 2b6566e-2b65679 316->320
    APIs
    • VirtualAlloc.KERNEL32(00000000,0013FFF0,00001000,00000004,?,?,02B65C17,?,02B661BC), ref: 02B65617
    Strings
    Memory Dump Source
    • Source File: 00000020.00000002.1629785315.0000000002B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 02B60000, based on PE: true
    • Associated: 00000020.00000002.1629751702.0000000002B60000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629918239.0000000002C6F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629951953.0000000002C70000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629988721.0000000002C71000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630023350.0000000002C75000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630059756.0000000002C76000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630153321.0000000002C80000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630194479.0000000002C81000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C82000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C84000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_32_2_2b60000_rundll32.jbxd
    Similarity
    • API ID: AllocVirtual
    • String ID: @.
    • API String ID: 4275171209-4201455939
    • Opcode ID: 8f1b6b6593b3808f306d9ba65987db70526a8d42dd6b4945784ea92d46fb36d0
    • Instruction ID: 42920e996f6ff4025b9b650c7217afad3a0b1008c16019e70b5ae8db7ed342dc
    • Opcode Fuzzy Hash: 8f1b6b6593b3808f306d9ba65987db70526a8d42dd6b4945784ea92d46fb36d0
    • Instruction Fuzzy Hash: 4AF0AFF2F803014FD7248F7899497127AD5E709324F50477EEA48DB788D77488149B90

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 330 2c38ea0-2c38ea8 331 2c38eaa-2c38eae 330->331 332 2c38ecc-2c38ecd 330->332 333 2c38eb0-2c38eb1 RegFlushKey 331->333 334 2c38eb6-2c38ec7 RegCloseKey call 2b69c38 331->334 333->334 334->332
    APIs
    • RegFlushKey.ADVAPI32(00000000,?,02C38F0C,?,?,00000000,02C39123,00000000,00000000,00000000,?,?,00000000,02C39139), ref: 02C38EB1
    • RegCloseKey.ADVAPI32(00000000,?,02C38F0C,?,?,00000000,02C39123,00000000,00000000,00000000,?,?,00000000,02C39139), ref: 02C38EBA
    Memory Dump Source
    • Source File: 00000020.00000002.1629785315.0000000002B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 02B60000, based on PE: true
    • Associated: 00000020.00000002.1629751702.0000000002B60000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629918239.0000000002C6F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629951953.0000000002C70000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629988721.0000000002C71000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630023350.0000000002C75000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630059756.0000000002C76000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630153321.0000000002C80000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630194479.0000000002C81000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C82000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C84000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_32_2_2b60000_rundll32.jbxd
    Similarity
    • API ID: CloseFlush
    • String ID:
    • API String ID: 320916635-0
    • Opcode ID: 53487b9075c46a64610a4022df3c6a921f3544410d10f835025151eaea8ac81c
    • Instruction ID: 6350fe4f1de251edd43e196642c6c3630634a757a2c4766b04b63718a5335113
    • Opcode Fuzzy Hash: 53487b9075c46a64610a4022df3c6a921f3544410d10f835025151eaea8ac81c
    • Instruction Fuzzy Hash: 0ED067A5A04244DADF51EE79C9C4B567BDD6F44610B08C9E6A818CF146D738D5409B21

    Control-flow Graph

    APIs
    • RegQueryValueExW.ADVAPI32(?,00000000,00000000,?,00000000,?,?,02C39BB9), ref: 02C39F07
    Memory Dump Source
    • Source File: 00000020.00000002.1629785315.0000000002B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 02B60000, based on PE: true
    • Associated: 00000020.00000002.1629751702.0000000002B60000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629918239.0000000002C6F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629951953.0000000002C70000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629988721.0000000002C71000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630023350.0000000002C75000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630059756.0000000002C76000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630153321.0000000002C80000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630194479.0000000002C81000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C82000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C84000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_32_2_2b60000_rundll32.jbxd
    Similarity
    • API ID: QueryValue
    • String ID:
    • API String ID: 3660427363-0
    • Opcode ID: 85fc74020a955a39fb263c9e22b6792ec8f3cc81395999f13bd42818e6708c34
    • Instruction ID: 0c5589881fa8d7e2bab9553b79753d6e555fa4a6f78f54408d730a6560a56ed6
    • Opcode Fuzzy Hash: 85fc74020a955a39fb263c9e22b6792ec8f3cc81395999f13bd42818e6708c34
    • Instruction Fuzzy Hash: A3014476B01208AFDB00EEA8DCC0ADEB7EDDB49314F1085A6F918DB341D6759E059BA1

    Control-flow Graph

    APIs
    • RegQueryValueExW.ADVAPI32(?,00000000,00000000,?,00000000,?,?,?,?,?,02C39AE0,00000000,02C39C1C), ref: 02C3990D
    Memory Dump Source
    • Source File: 00000020.00000002.1629785315.0000000002B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 02B60000, based on PE: true
    • Associated: 00000020.00000002.1629751702.0000000002B60000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629918239.0000000002C6F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629951953.0000000002C70000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629988721.0000000002C71000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630023350.0000000002C75000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630059756.0000000002C76000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630153321.0000000002C80000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630194479.0000000002C81000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C82000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C84000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_32_2_2b60000_rundll32.jbxd
    Similarity
    • API ID: QueryValue
    • String ID:
    • API String ID: 3660427363-0
    • Opcode ID: ad67be82557188437bc6127552a9993e0998d0cde0f580ab283647e522f4a4dc
    • Instruction ID: 9d68e512cf063b30b98029930ddc16ec457759b7983fd94d2a50013d97ca2669
    • Opcode Fuzzy Hash: ad67be82557188437bc6127552a9993e0998d0cde0f580ab283647e522f4a4dc
    • Instruction Fuzzy Hash: C9F039763052446FE744EAACAC84FABA6DEDB88710F10897AB24CC7241D964DC099BA1
    APIs
    • GetModuleFileNameW.KERNEL32(02B60000,?,0000020A), ref: 02B6C296
      • Part of subcall function 02B6D4EC: GetModuleFileNameW.KERNEL32(00000000,?,00000105,00000000,02B6D5A6,?,02B60000,02C6FC1C), ref: 02B6D528
      • Part of subcall function 02B6D4EC: LoadLibraryExW.KERNEL32(00000000,00000000,00000002,00000000,?,00000105,00000000,02B6D5A6,?,02B60000,02C6FC1C), ref: 02B6D579
    Memory Dump Source
    • Source File: 00000020.00000002.1629785315.0000000002B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 02B60000, based on PE: true
    • Associated: 00000020.00000002.1629751702.0000000002B60000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629918239.0000000002C6F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629951953.0000000002C70000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629988721.0000000002C71000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630023350.0000000002C75000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630059756.0000000002C76000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630153321.0000000002C80000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630194479.0000000002C81000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C82000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C84000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_32_2_2b60000_rundll32.jbxd
    Similarity
    • API ID: FileModuleName$LibraryLoad
    • String ID:
    • API String ID: 4113206344-0
    • Opcode ID: d994d483d02e46fdff6fa18ed6b597f72d1d7e29fcadbbba57b44e2c2294e8a2
    • Instruction ID: e587540d3ae482795fdb2c27d3464cc4afc6ab4e7edc2a0a3cf63158911cbf79
    • Opcode Fuzzy Hash: d994d483d02e46fdff6fa18ed6b597f72d1d7e29fcadbbba57b44e2c2294e8a2
    • Instruction Fuzzy Hash: 3CE0ED71A003109BCB24DE98C9C9B5637D8AB08754F0445A6AD54CF346D775D9208BD1
    APIs
    Memory Dump Source
    • Source File: 00000020.00000002.1629785315.0000000002B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 02B60000, based on PE: true
    • Associated: 00000020.00000002.1629751702.0000000002B60000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629918239.0000000002C6F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629951953.0000000002C70000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629988721.0000000002C71000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630023350.0000000002C75000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630059756.0000000002C76000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630153321.0000000002C80000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630194479.0000000002C81000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C82000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C84000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_32_2_2b60000_rundll32.jbxd
    Similarity
    • API ID: InfoSystem
    • String ID:
    • API String ID: 31276548-0
    • Opcode ID: c27e8cf9b7b8b28db5bf16ce19b686b88097b3598cd7681285108ea85b127420
    • Instruction ID: a715ccc2ed76aa76300a65d434332124a29defbed579c4c3ac8ff1f816fe8bc2
    • Opcode Fuzzy Hash: c27e8cf9b7b8b28db5bf16ce19b686b88097b3598cd7681285108ea85b127420
    • Instruction Fuzzy Hash: FDA012504094000EC408A7184C4240F31801A41214FC40750685C95281E60985B507DB
    APIs
    • GetModuleHandleW.KERNEL32(kernel32.dll,02B7A5A8,?,?), ref: 02B6CC15
    • GetProcAddress.KERNEL32(00000000,GetLongPathNameW), ref: 02B6CC26
    • FindFirstFileW.KERNEL32(?,?,kernel32.dll,02B7A5A8,?,?), ref: 02B6CD26
    • FindClose.KERNEL32(?,?,?,kernel32.dll,02B7A5A8,?,?), ref: 02B6CD38
    • lstrlenW.KERNEL32(?,?,?,?,kernel32.dll,02B7A5A8,?,?), ref: 02B6CD44
    • lstrlenW.KERNEL32(?,?,?,?,?,kernel32.dll,02B7A5A8,?,?), ref: 02B6CD89
    Strings
    Memory Dump Source
    • Source File: 00000020.00000002.1629785315.0000000002B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 02B60000, based on PE: true
    • Associated: 00000020.00000002.1629751702.0000000002B60000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629918239.0000000002C6F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629951953.0000000002C70000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629988721.0000000002C71000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630023350.0000000002C75000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630059756.0000000002C76000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630153321.0000000002C80000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630194479.0000000002C81000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C82000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C84000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_32_2_2b60000_rundll32.jbxd
    Similarity
    • API ID: Findlstrlen$AddressCloseFileFirstHandleModuleProc
    • String ID: GetLongPathNameW$\$kernel32.dll
    • API String ID: 1930782624-3908791685
    • Opcode ID: aa897aee1ca9f62cd5592d036444c1c0603ae48262d1edefd4a64f276a5d88bd
    • Instruction ID: 8a8e9a867e3b15032aab2de9c956e23817315f2f670f2bc2301a8042191b40eb
    • Opcode Fuzzy Hash: aa897aee1ca9f62cd5592d036444c1c0603ae48262d1edefd4a64f276a5d88bd
    • Instruction Fuzzy Hash: 91418271A006189BCB20EBA8CC8CAED7BB6EF44310F5445E68589E7250E77CAE54CF85
    APIs
    • CreateCompatibleDC.GDI32(?), ref: 02C5ABD2
    • CreateDIBitmap.GDI32(?,?,00000004,?,?,00000000), ref: 02C5ABE7
    • SelectObject.GDI32(00000000,00000000), ref: 02C5ABEE
    • CreateCompatibleDC.GDI32(?), ref: 02C5AC22
    • CreateCompatibleDC.GDI32(?), ref: 02C5AC2E
    • CreateCompatibleDC.GDI32(?), ref: 02C5AC3A
    • CreateBitmap.GDI32(?,?,00000001,00000001,00000000), ref: 02C5AC4D
    • CreateBitmap.GDI32(?,?,00000001,00000001,00000000), ref: 02C5AC5D
    • CreateCompatibleBitmap.GDI32(?,?,?), ref: 02C5AC6B
    • SelectObject.GDI32(?,?), ref: 02C5AC7B
    • SelectObject.GDI32(?,?), ref: 02C5AC8B
    • SelectObject.GDI32(?,?), ref: 02C5AC9B
    • SetBkColor.GDI32(00000000,?), ref: 02C5ACA8
    • StretchBlt.GDI32(?,00000000,00000000,?,?,00000000,00000000,00000000,?,?,00CC0020), ref: 02C5ACCC
    • SetBkColor.GDI32(00000000,?), ref: 02C5ACD6
    • BitBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00330008), ref: 02C5ACF2
    • BitBlt.GDI32(?,00000000,00000000,?,?,?,?,?,00CC0020), ref: 02C5AD12
    • BitBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,008800C6), ref: 02C5AD2E
    • StretchBlt.GDI32(00000000,00000000,00000000,?,?,?,00000000,00000000,?,?,008800C6), ref: 02C5AD4F
    • StretchBlt.GDI32(?,00000000,00000000,?,?,00000000,00000000,00000000,?,?,00EE0086), ref: 02C5AD70
    • BitBlt.GDI32(?,?,?,?,?,?,00000000,00000000,00CC0020), ref: 02C5AD90
    • SelectObject.GDI32(?,?), ref: 02C5AD9D
    • DeleteObject.GDI32(00000000), ref: 02C5ADA3
    • SelectObject.GDI32(?,?), ref: 02C5ADB0
    • DeleteObject.GDI32(00000000), ref: 02C5ADB6
    • SelectObject.GDI32(?,?), ref: 02C5ADC3
    • DeleteObject.GDI32(00000000), ref: 02C5ADC9
    • SelectObject.GDI32(00000000,?), ref: 02C5ADD3
    • DeleteObject.GDI32(00000000), ref: 02C5ADD9
    • DeleteDC.GDI32(?), ref: 02C5ADE2
    • DeleteDC.GDI32(?), ref: 02C5ADEB
    • DeleteDC.GDI32(?), ref: 02C5ADF4
    • DeleteDC.GDI32(00000000), ref: 02C5ADFA
    Memory Dump Source
    • Source File: 00000020.00000002.1629785315.0000000002B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 02B60000, based on PE: true
    • Associated: 00000020.00000002.1629751702.0000000002B60000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629918239.0000000002C6F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629951953.0000000002C70000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629988721.0000000002C71000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630023350.0000000002C75000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630059756.0000000002C76000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630153321.0000000002C80000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630194479.0000000002C81000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C82000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C84000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_32_2_2b60000_rundll32.jbxd
    Similarity
    • API ID: Object$CreateDeleteSelect$Compatible$Bitmap$Stretch$Color
    • String ID:
    • API String ID: 881050057-0
    • Opcode ID: d06672be3dad3db98e6b51f863aed52956d6e0b67a9b4389ede429620055148c
    • Instruction ID: d14019e95fc5f32faac4c706599da0be292d81f61ce5c974c1a671d0eaa88dc5
    • Opcode Fuzzy Hash: d06672be3dad3db98e6b51f863aed52956d6e0b67a9b4389ede429620055148c
    • Instruction Fuzzy Hash: 338144B1E40218BADB50EAE8CD85FAFB7FDAB09710F104494F614FB280C675AD419B75
    APIs
    • GetModuleHandleW.KERNEL32(oleaut32.dll), ref: 02B8EFA5
      • Part of subcall function 02B8EF70: GetProcAddress.KERNEL32(00000000), ref: 02B8EF89
    Strings
    Memory Dump Source
    • Source File: 00000020.00000002.1629785315.0000000002B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 02B60000, based on PE: true
    • Associated: 00000020.00000002.1629751702.0000000002B60000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629918239.0000000002C6F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629951953.0000000002C70000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629988721.0000000002C71000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630023350.0000000002C75000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630059756.0000000002C76000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630153321.0000000002C80000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630194479.0000000002C81000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C82000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C84000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_32_2_2b60000_rundll32.jbxd
    Similarity
    • API ID: AddressHandleModuleProc
    • String ID: VarAdd$VarAnd$VarBoolFromStr$VarBstrFromBool$VarBstrFromCy$VarBstrFromDate$VarCmp$VarCyFromStr$VarDateFromStr$VarDiv$VarI4FromStr$VarIdiv$VarMod$VarMul$VarNeg$VarNot$VarOr$VarR4FromStr$VarR8FromStr$VarSub$VarXor$VariantChangeTypeEx$oleaut32.dll
    • API String ID: 1646373207-1918263038
    • Opcode ID: 8e6eb03018befe1e8aa7d5cf0595781ce82da00f039d77e6e4989306f0817b2c
    • Instruction ID: 5a702ecf7a2785a1c76380a0162bdbe3c3ceaba5aa9b844168b5c07fe009bc76
    • Opcode Fuzzy Hash: 8e6eb03018befe1e8aa7d5cf0595781ce82da00f039d77e6e4989306f0817b2c
    • Instruction Fuzzy Hash: 7D413C63A482459A63047B6D7C0043B73DAEF46B10BA049DAB41DDBB58DE30FC91CB6E
    APIs
    • CreateCompatibleBitmap.GDI32(?,00000001,00000001), ref: 02C45D2F
    • SelectObject.GDI32(?,?), ref: 02C45D44
    • MaskBlt.GDI32(?,?,?,?,?,?,?,?,?,?,?,CCAA0029,00000000,02C45DB4,?,?), ref: 02C45D88
    • SelectObject.GDI32(?,?), ref: 02C45DA2
    • DeleteObject.GDI32(?), ref: 02C45DAE
    • CreateCompatibleDC.GDI32(00000000), ref: 02C45DC2
    • CreateCompatibleBitmap.GDI32(?,?,?), ref: 02C45DE3
    • SelectObject.GDI32(?,?), ref: 02C45DF8
    • SelectPalette.GDI32(?,D6080894,00000000), ref: 02C45E0C
    • SelectPalette.GDI32(?,?,00000000), ref: 02C45E1E
    • SelectPalette.GDI32(?,00000000,000000FF), ref: 02C45E33
    • SelectPalette.GDI32(?,D6080894,000000FF), ref: 02C45E49
    • RealizePalette.GDI32(?), ref: 02C45E55
    • StretchBlt.GDI32(?,00000000,00000000,?,?,?,?,?,?,?,00CC0020), ref: 02C45E77
    • StretchBlt.GDI32(?,00000000,00000000,?,?,00000000,?,?,?,?,00440328), ref: 02C45E99
    • SetTextColor.GDI32(?,00000000), ref: 02C45EA1
    • SetBkColor.GDI32(?,00FFFFFF), ref: 02C45EAF
    • StretchBlt.GDI32(?,?,?,?,?,?,?,?,?,?,008800C6), ref: 02C45EDB
    • StretchBlt.GDI32(?,?,?,?,?,?,00000000,00000000,?,?,00660046), ref: 02C45F00
    • SetTextColor.GDI32(?,?), ref: 02C45F0A
    • SetBkColor.GDI32(?,?), ref: 02C45F14
    • SelectObject.GDI32(?,00000000), ref: 02C45F27
    • DeleteObject.GDI32(?), ref: 02C45F30
    • SelectPalette.GDI32(?,00000000,00000000), ref: 02C45F52
    • DeleteDC.GDI32(?), ref: 02C45F5B
    Memory Dump Source
    • Source File: 00000020.00000002.1629785315.0000000002B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 02B60000, based on PE: true
    • Associated: 00000020.00000002.1629751702.0000000002B60000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629918239.0000000002C6F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629951953.0000000002C70000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629988721.0000000002C71000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630023350.0000000002C75000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630059756.0000000002C76000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630153321.0000000002C80000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630194479.0000000002C81000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C82000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C84000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_32_2_2b60000_rundll32.jbxd
    Similarity
    • API ID: Select$ObjectPalette$ColorStretch$CompatibleCreateDelete$BitmapText$MaskRealize
    • String ID:
    • API String ID: 3976802218-0
    • Opcode ID: e34b26149824a80a6dd81bb53239c687f7517c20d167b32a3b4ff54836ddba9b
    • Instruction ID: 3c950b10f2cef717a6620bca67fe1452ceaf52f58f33f39c8ea2ca428e681cca
    • Opcode Fuzzy Hash: e34b26149824a80a6dd81bb53239c687f7517c20d167b32a3b4ff54836ddba9b
    • Instruction Fuzzy Hash: 17818FB2A00209BFEB50DEA8CD85EAF77EDAB0D750F550594F618E7280C635AD009B71
    APIs
    • GetObjectW.GDI32(00000000,00000054,?), ref: 02C4B163
    • GetDC.USER32(00000000), ref: 02C4B191
    • CreateCompatibleDC.GDI32(?), ref: 02C4B1A2
    • CreateBitmap.GDI32(?,?,00000001,00000001,00000000), ref: 02C4B1BD
    • SelectObject.GDI32(?,00000000), ref: 02C4B1D7
    • PatBlt.GDI32(?,00000000,00000000,?,?,00000042), ref: 02C4B1F9
    • CreateCompatibleDC.GDI32(?), ref: 02C4B207
    • SelectObject.GDI32(00000000,00000000), ref: 02C4B24F
    • SelectPalette.GDI32(00000000,?,00000000), ref: 02C4B262
    • RealizePalette.GDI32(00000000), ref: 02C4B26B
    • SelectPalette.GDI32(?,?,00000000), ref: 02C4B277
    • RealizePalette.GDI32(?), ref: 02C4B280
    • SetBkColor.GDI32(00000000,00000000), ref: 02C4B28A
    • BitBlt.GDI32(?,00000000,00000000,?,?,00000000,00000000,00000000,00CC0020), ref: 02C4B2AE
    • SetBkColor.GDI32(00000000,00000000), ref: 02C4B2B8
    • SelectObject.GDI32(00000000,00000000), ref: 02C4B2CB
    • DeleteObject.GDI32(00000000), ref: 02C4B2D7
    • DeleteDC.GDI32(00000000), ref: 02C4B2ED
    • SelectObject.GDI32(?,00000000), ref: 02C4B308
    • DeleteDC.GDI32(00000000), ref: 02C4B324
    • ReleaseDC.USER32(00000000,00000000), ref: 02C4B335
    Memory Dump Source
    • Source File: 00000020.00000002.1629785315.0000000002B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 02B60000, based on PE: true
    • Associated: 00000020.00000002.1629751702.0000000002B60000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629918239.0000000002C6F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629951953.0000000002C70000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629988721.0000000002C71000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630023350.0000000002C75000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630059756.0000000002C76000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630153321.0000000002C80000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630194479.0000000002C81000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C82000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C84000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_32_2_2b60000_rundll32.jbxd
    Similarity
    • API ID: ObjectSelect$Palette$CreateDelete$ColorCompatibleRealize$BitmapRelease
    • String ID:
    • API String ID: 332224125-0
    • Opcode ID: 79d28acd41d5244e93665d0842eb99c55f566a07bfde3610af1a15f32ab4e767
    • Instruction ID: 8d7928ad80f8c2579d7b5ed83404599193e1d6153341f98aede266b96e925d4b
    • Opcode Fuzzy Hash: 79d28acd41d5244e93665d0842eb99c55f566a07bfde3610af1a15f32ab4e767
    • Instruction Fuzzy Hash: BE51FB71E00309BBEB10DAE9CC95FAFB7FDAB49704F5044A5F624E7280DA749A409B60
    APIs
    • GetDC.USER32(00000000), ref: 02C4C9A4
    • CreateCompatibleDC.GDI32(00000001), ref: 02C4CA09
    • CreateCompatibleBitmap.GDI32(00000001,00000001,00000001), ref: 02C4CA1E
    • SelectObject.GDI32(?,00000000), ref: 02C4CA28
    • SelectPalette.GDI32(?,?,00000000), ref: 02C4CA58
    • RealizePalette.GDI32(?), ref: 02C4CA64
    • CreateDIBitmap.GDI32(?,?,00000004,00000000,?,00000000), ref: 02C4CA88
    • GetLastError.KERNEL32(?,?,00000004,00000000,?,00000000,00000000,02C4CAE1,?,?,00000000,00000001,00000001,00000001,00000001,00000000), ref: 02C4CA96
    • SelectPalette.GDI32(?,00000000,000000FF), ref: 02C4CAC8
    • SelectObject.GDI32(?,?), ref: 02C4CAD5
    • DeleteObject.GDI32(00000000), ref: 02C4CADB
    Strings
    Memory Dump Source
    • Source File: 00000020.00000002.1629785315.0000000002B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 02B60000, based on PE: true
    • Associated: 00000020.00000002.1629751702.0000000002B60000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629918239.0000000002C6F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629951953.0000000002C70000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629988721.0000000002C71000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630023350.0000000002C75000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630059756.0000000002C76000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630153321.0000000002C80000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630194479.0000000002C81000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C82000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C84000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_32_2_2b60000_rundll32.jbxd
    Similarity
    • API ID: Select$CreateObjectPalette$BitmapCompatible$DeleteErrorLastRealize
    • String ID: ($BM
    • API String ID: 2831685396-2980357723
    • Opcode ID: 6a245c37e4a683394b2343f23a63f1688fa376c32745b8cc5fc07b14a31a9f1b
    • Instruction ID: 76cae6b63869b09fb4d5d59ac01d9c818c2601341a6250e50753333b972b3d10
    • Opcode Fuzzy Hash: 6a245c37e4a683394b2343f23a63f1688fa376c32745b8cc5fc07b14a31a9f1b
    • Instruction Fuzzy Hash: F5E12071A01218AFDF14DFA8C884BAEBBF6FF49304F148566E915E7294DB349A40CF61
    APIs
      • Part of subcall function 02C4C31C: GetDC.USER32(00000000), ref: 02C4C372
      • Part of subcall function 02C4C31C: GetDeviceCaps.GDI32(00000000,0000000C), ref: 02C4C387
      • Part of subcall function 02C4C31C: GetDeviceCaps.GDI32(00000000,0000000E), ref: 02C4C391
      • Part of subcall function 02C4C31C: CreateHalftonePalette.GDI32(00000000,00000000,?,?,?,?,02C4A7DB,00000000,02C4A867), ref: 02C4C3B5
      • Part of subcall function 02C4C31C: ReleaseDC.USER32(00000000,00000000), ref: 02C4C3C0
    • SelectPalette.GDI32(?,?,000000FF), ref: 02C4B6DB
    • RealizePalette.GDI32(?), ref: 02C4B6EA
    • GetStretchBltMode.GDI32(00000000), ref: 02C4B6FC
    • GetDeviceCaps.GDI32(?,0000000C), ref: 02C4B70D
    • GetDeviceCaps.GDI32(?,0000000E), ref: 02C4B71C
    • GetBrushOrgEx.GDI32(?,?,0000000E,00000000,?,0000000C,00000000), ref: 02C4B74F
    • SetStretchBltMode.GDI32(?,00000004), ref: 02C4B75D
    • SetBrushOrgEx.GDI32(?,?,?,?,?,00000004,?,?,0000000E,00000000,?,0000000C,00000000), ref: 02C4B775
    • SetStretchBltMode.GDI32(00000000,00000003), ref: 02C4B792
    • CreateCompatibleDC.GDI32(00000000), ref: 02C4B7F3
    • SelectObject.GDI32(?,?), ref: 02C4B808
    • SelectObject.GDI32(?,00000000), ref: 02C4B867
    • DeleteDC.GDI32(00000000), ref: 02C4B876
    Memory Dump Source
    • Source File: 00000020.00000002.1629785315.0000000002B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 02B60000, based on PE: true
    • Associated: 00000020.00000002.1629751702.0000000002B60000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629918239.0000000002C6F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629951953.0000000002C70000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629988721.0000000002C71000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630023350.0000000002C75000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630059756.0000000002C76000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630153321.0000000002C80000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630194479.0000000002C81000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C82000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C84000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_32_2_2b60000_rundll32.jbxd
    Similarity
    • API ID: CapsDevice$ModePaletteSelectStretch$BrushCreateObject$CompatibleDeleteHalftoneRealizeRelease
    • String ID:
    • API String ID: 28117789-0
    • Opcode ID: 3df24bb8116ff9a23390d8d08a700750f68463431efa3ea4a536915e50b805c9
    • Instruction ID: 1ba0680fd581a7c2c8339bc98f40677fa1cea9fbb240776a9d833e0208856a00
    • Opcode Fuzzy Hash: 3df24bb8116ff9a23390d8d08a700750f68463431efa3ea4a536915e50b805c9
    • Instruction Fuzzy Hash: D5A1F2B1A00605AFDB50EBA9C984F9FBBF9AF08304F504594F519EB691DB34EE40DB60
    Strings
    • BTMemoryLoadLibary: BuildImportTable failed, xrefs: 02C696C0
    • BTMemoryLoadLibary: VirtualAlloc failed, xrefs: 02C695D8
    • BTMemoryLoadLibary: Can't attach library, xrefs: 02C69738
    • BTMemoryLoadLibary: dll dos header is not valid, xrefs: 02C6953C
    • BTMemoryLoadLibary: Get DLLEntyPoint failed, xrefs: 02C6970D
    • PE, xrefs: 02C69570
    • BTMemoryLoadLibary: IMAGE_NT_SIGNATURE is not valid, xrefs: 02C69581
    • MZ, xrefs: 02C6952F
    Memory Dump Source
    • Source File: 00000020.00000002.1629785315.0000000002B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 02B60000, based on PE: true
    • Associated: 00000020.00000002.1629751702.0000000002B60000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629918239.0000000002C6F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629951953.0000000002C70000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629988721.0000000002C71000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630023350.0000000002C75000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630059756.0000000002C76000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630153321.0000000002C80000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630194479.0000000002C81000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C82000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C84000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_32_2_2b60000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID: BTMemoryLoadLibary: BuildImportTable failed$BTMemoryLoadLibary: Can't attach library$BTMemoryLoadLibary: Get DLLEntyPoint failed$BTMemoryLoadLibary: IMAGE_NT_SIGNATURE is not valid$BTMemoryLoadLibary: VirtualAlloc failed$BTMemoryLoadLibary: dll dos header is not valid$MZ$PE
    • API String ID: 0-3631919656
    • Opcode ID: 7966455ae0ce41409f76a7294d26e325fc3a992e4a435d9fb64d724a673d2604
    • Instruction ID: 259bcc77175a794f934ec2504b09abbbc26033390374e9035af41601a4312823
    • Opcode Fuzzy Hash: 7966455ae0ce41409f76a7294d26e325fc3a992e4a435d9fb64d724a673d2604
    • Instruction Fuzzy Hash: B3715E75B04205AFDB15EFA9C894BBEB7EAEF88700F0484A5E514E7380D674DD09CB51
    APIs
    • CreateCompatibleDC.GDI32(00000000), ref: 02C45B6F
    • CreateCompatibleDC.GDI32(00000000), ref: 02C45B79
    • GetObjectW.GDI32(?,00000018,?), ref: 02C45B99
    • CreateBitmap.GDI32(?,?,00000001,00000001,00000000), ref: 02C45BB0
    • GetDC.USER32(00000000), ref: 02C45BBC
    • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 02C45BE9
    • ReleaseDC.USER32(00000000,00000000), ref: 02C45C0F
    • SelectObject.GDI32(?,?), ref: 02C45C2A
    • SelectObject.GDI32(?,00000000), ref: 02C45C39
    • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,?,?,00CC0020), ref: 02C45C65
    • SelectObject.GDI32(?,00000000), ref: 02C45C73
    • SelectObject.GDI32(?,00000000), ref: 02C45C81
    • DeleteDC.GDI32(?), ref: 02C45C97
    • DeleteDC.GDI32(?), ref: 02C45CA0
    Memory Dump Source
    • Source File: 00000020.00000002.1629785315.0000000002B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 02B60000, based on PE: true
    • Associated: 00000020.00000002.1629751702.0000000002B60000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629918239.0000000002C6F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629951953.0000000002C70000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629988721.0000000002C71000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630023350.0000000002C75000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630059756.0000000002C76000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630153321.0000000002C80000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630194479.0000000002C81000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C82000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C84000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_32_2_2b60000_rundll32.jbxd
    Similarity
    • API ID: Object$CreateSelect$Compatible$BitmapDelete$ReleaseStretch
    • String ID:
    • API String ID: 644427674-0
    • Opcode ID: f89f6787752f0dec4c760b0c06bdca903b76360eeddd0fcd96020f42cf87cfa3
    • Instruction ID: 3e38e0327ef72d0a241c9fedd841007e86ca1e83d10686d5196a535248d24f39
    • Opcode Fuzzy Hash: f89f6787752f0dec4c760b0c06bdca903b76360eeddd0fcd96020f42cf87cfa3
    • Instruction Fuzzy Hash: 4D41F9B2E40609BFEB50EBE8C941FAFB7FDEB48740F400495F610E7280D6749A409BA1
    APIs
    • InitializeCriticalSection.KERNEL32(02C7AC10,02C6E037,00000400,00000000,02C6E0D7), ref: 02B6C525
    • GetVersion.KERNEL32(02C7AC10,02C6E037,00000400,00000000,02C6E0D7), ref: 02B6C533
    • GetModuleHandleW.KERNEL32(kernel32.dll,GetThreadPreferredUILanguages,02C7AC10,02C6E037,00000400,00000000,02C6E0D7), ref: 02B6C55A
    • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 02B6C560
    • GetModuleHandleW.KERNEL32(kernel32.dll,SetThreadPreferredUILanguages,00000000,kernel32.dll,GetThreadPreferredUILanguages,02C7AC10,02C6E037,00000400,00000000,02C6E0D7), ref: 02B6C574
    • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 02B6C57A
    • GetModuleHandleW.KERNEL32(kernel32.dll,GetThreadUILanguage,00000000,kernel32.dll,SetThreadPreferredUILanguages,00000000,kernel32.dll,GetThreadPreferredUILanguages,02C7AC10,02C6E037,00000400,00000000,02C6E0D7), ref: 02B6C58E
    • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 02B6C594
    Strings
    Memory Dump Source
    • Source File: 00000020.00000002.1629785315.0000000002B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 02B60000, based on PE: true
    • Associated: 00000020.00000002.1629751702.0000000002B60000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629918239.0000000002C6F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629951953.0000000002C70000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629988721.0000000002C71000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630023350.0000000002C75000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630059756.0000000002C76000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630153321.0000000002C80000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630194479.0000000002C81000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C82000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C84000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_32_2_2b60000_rundll32.jbxd
    Similarity
    • API ID: AddressHandleModuleProc$CriticalInitializeSectionVersion
    • String ID: GetThreadPreferredUILanguages$GetThreadUILanguage$SetThreadPreferredUILanguages$kernel32.dll
    • API String ID: 74573329-1403180336
    • Opcode ID: 138211897f4d23d996b2a6003fe43c1499b9ee6c94e3ad90fbb042da8a02085f
    • Instruction ID: 9989e44350ce7db1f936429710c02614267b1a54861745627d701ae54e2fcffd
    • Opcode Fuzzy Hash: 138211897f4d23d996b2a6003fe43c1499b9ee6c94e3ad90fbb042da8a02085f
    • Instruction Fuzzy Hash: 74F01CE19C0B8436F72037719C0EB3E2F86AB00704B9049E7B18199013DEAD81E48F15
    APIs
      • Part of subcall function 02C4C31C: GetDC.USER32(00000000), ref: 02C4C372
      • Part of subcall function 02C4C31C: GetDeviceCaps.GDI32(00000000,0000000C), ref: 02C4C387
      • Part of subcall function 02C4C31C: GetDeviceCaps.GDI32(00000000,0000000E), ref: 02C4C391
      • Part of subcall function 02C4C31C: CreateHalftonePalette.GDI32(00000000,00000000,?,?,?,?,02C4A7DB,00000000,02C4A867), ref: 02C4C3B5
      • Part of subcall function 02C4C31C: ReleaseDC.USER32(00000000,00000000), ref: 02C4C3C0
    • SelectPalette.GDI32(?,?,000000FF), ref: 02C4B9A7
    • RealizePalette.GDI32(?), ref: 02C4B9B6
    • GetDeviceCaps.GDI32(?,0000000C), ref: 02C4B9C8
    • GetDeviceCaps.GDI32(?,0000000E), ref: 02C4B9D7
    • GetBrushOrgEx.GDI32(?,?,0000000E,00000000,?,0000000C), ref: 02C4BA0A
    • SetStretchBltMode.GDI32(?,00000004), ref: 02C4BA18
    • SetBrushOrgEx.GDI32(?,?,?,?,?,00000004,?,?,0000000E,00000000,?,0000000C), ref: 02C4BA30
    • SetStretchBltMode.GDI32(00000000,00000003), ref: 02C4BA4D
    • CreateCompatibleDC.GDI32(00000000), ref: 02C4BAAE
    • SelectObject.GDI32(?,?), ref: 02C4BAC3
    • SelectObject.GDI32(?,00000000), ref: 02C4BB22
    • DeleteDC.GDI32(00000000), ref: 02C4BB31
    Memory Dump Source
    • Source File: 00000020.00000002.1629785315.0000000002B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 02B60000, based on PE: true
    • Associated: 00000020.00000002.1629751702.0000000002B60000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629918239.0000000002C6F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629951953.0000000002C70000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629988721.0000000002C71000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630023350.0000000002C75000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630059756.0000000002C76000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630153321.0000000002C80000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630194479.0000000002C81000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C82000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C84000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_32_2_2b60000_rundll32.jbxd
    Similarity
    • API ID: CapsDevice$PaletteSelect$BrushCreateModeObjectStretch$CompatibleDeleteHalftoneRealizeRelease
    • String ID:
    • API String ID: 2414602066-0
    • Opcode ID: e74c6d9599b2179d0f9d4a99a374c0b8216b2f1bfaa04751204b6d0fc5c057cd
    • Instruction ID: 644ad3bee7477af126800376c6c478af8b0304c4ac831bbe352a7c7ae9e96c4c
    • Opcode Fuzzy Hash: e74c6d9599b2179d0f9d4a99a374c0b8216b2f1bfaa04751204b6d0fc5c057cd
    • Instruction Fuzzy Hash: B49133B1A00245AFDB50EBA9C980F9FBBF9AF09304F104595F519EB691DB34EE40DB60
    APIs
      • Part of subcall function 02C4D0C0: DeleteObject.GDI32(00000000), ref: 02C4D206
    • DrawIconEx.USER32(00000000,00000000,00000000,00000000,00000000), ref: 02C4D865
    • GetDIBits.GDI32(00000000,00000000,00000000,00000000,?,?), ref: 02C4D8E3
    • GetIconInfo.USER32(00000000,?), ref: 02C4D947
    • GetDIBits.GDI32(00000000,?,00000000,00000000,?,00000000,?), ref: 02C4D980
    • SetDIBits.GDI32(00000000,00000000,?,00000000,?,00000000,02C4DA2B), ref: 02C4D9E9
    • DeleteObject.GDI32(?), ref: 02C4D9FF
    • DeleteObject.GDI32(?), ref: 02C4DA08
    Strings
    Memory Dump Source
    • Source File: 00000020.00000002.1629785315.0000000002B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 02B60000, based on PE: true
    • Associated: 00000020.00000002.1629751702.0000000002B60000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629918239.0000000002C6F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629951953.0000000002C70000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629988721.0000000002C71000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630023350.0000000002C75000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630059756.0000000002C76000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630153321.0000000002C80000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630194479.0000000002C81000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C82000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C84000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_32_2_2b60000_rundll32.jbxd
    Similarity
    • API ID: BitsDeleteObject$Icon$DrawInfo
    • String ID: $,
    • API String ID: 1810795657-71045815
    • Opcode ID: 48175114d3f7ded31e85657b9a7bc351c9b490fdbbd5b0ed2d7af7b8f3dec1d8
    • Instruction ID: bde2e4e413d77564d8ed3be667f949bdb96fb1c7e316480384b31d3d9df778b3
    • Opcode Fuzzy Hash: 48175114d3f7ded31e85657b9a7bc351c9b490fdbbd5b0ed2d7af7b8f3dec1d8
    • Instruction Fuzzy Hash: E1910671B00209AFD710EFA9C884A9EBBFAFF48700F5041A5E519EB264DB30ED45DB91
    APIs
    • IsValidLocale.KERNEL32(?,00000001,00000000,02B85691,?,?,?,?,00000000,00000000), ref: 02B853D3
    • GetThreadLocale.KERNEL32(?,00000001,00000000,02B85691,?,?,?,?,00000000,00000000), ref: 02B853DC
      • Part of subcall function 02B85380: GetLocaleInfoW.KERNEL32(?,0000000F,?,00000002,0000002C,?,?,?,02B85482,?,00000001,00000000,02B85691), ref: 02B85393
      • Part of subcall function 02B85334: GetLocaleInfoW.KERNEL32(?,?,?,00000100), ref: 02B85352
    Strings
    Memory Dump Source
    • Source File: 00000020.00000002.1629785315.0000000002B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 02B60000, based on PE: true
    • Associated: 00000020.00000002.1629751702.0000000002B60000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629918239.0000000002C6F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629951953.0000000002C70000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629988721.0000000002C71000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630023350.0000000002C75000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630059756.0000000002C76000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630153321.0000000002C80000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630194479.0000000002C81000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C82000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C84000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_32_2_2b60000_rundll32.jbxd
    Similarity
    • API ID: Locale$Info$ThreadValid
    • String ID: AMPM$2$:mm$:mm:ss$AMPM $m/d/yy$mmmm d, yyyy
    • API String ID: 233154393-3379564615
    • Opcode ID: fcc1941505476096e3c116680d0d83c024553e97384f243847e56757cb85c8bf
    • Instruction ID: fa2305897f33a221507aa77c73092462144df89a650796cffaaf347a4ffebde1
    • Opcode Fuzzy Hash: fcc1941505476096e3c116680d0d83c024553e97384f243847e56757cb85c8bf
    • Instruction Fuzzy Hash: 88714D357001099BDB21FBA4D880BDF77ABEF88700F91C0A5E509AB645DB39DE06CB55
    APIs
      • Part of subcall function 02B68850: GetTickCount.KERNEL32 ref: 02B68887
      • Part of subcall function 02B68850: GetTickCount.KERNEL32 ref: 02B6889F
      • Part of subcall function 02B85334: GetLocaleInfoW.KERNEL32(?,?,?,00000100), ref: 02B85352
    • GetThreadLocale.KERNEL32(00000000,00000004), ref: 02B85E60
    • EnumCalendarInfoW.KERNEL32(02B85C8C,00000000,00000000,00000004), ref: 02B85E6B
    • GetThreadLocale.KERNEL32(00000000,00000003,02B85C8C,00000000,00000000,00000004), ref: 02B85EA6
    • EnumCalendarInfoW.KERNEL32(02B85D30,00000000,00000000,00000003,02B85C8C,00000000,00000000,00000004), ref: 02B85EB1
    • GetThreadLocale.KERNEL32(00000000,00000004), ref: 02B85F42
    • EnumCalendarInfoW.KERNEL32(02B85C8C,00000000,00000000,00000004), ref: 02B85F4D
    • GetThreadLocale.KERNEL32(00000000,00000003,02B85C8C,00000000,00000000,00000004), ref: 02B85F8A
    • EnumCalendarInfoW.KERNEL32(02B85D30,00000000,00000000,00000003,02B85C8C,00000000,00000000,00000004), ref: 02B85F95
    Strings
    Memory Dump Source
    • Source File: 00000020.00000002.1629785315.0000000002B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 02B60000, based on PE: true
    • Associated: 00000020.00000002.1629751702.0000000002B60000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629918239.0000000002C6F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629951953.0000000002C70000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629988721.0000000002C71000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630023350.0000000002C75000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630059756.0000000002C76000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630153321.0000000002C80000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630194479.0000000002C81000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C82000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C84000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_32_2_2b60000_rundll32.jbxd
    Similarity
    • API ID: InfoLocale$CalendarEnumThread$CountTick
    • String ID: B.C.
    • API String ID: 1601775584-621294921
    • Opcode ID: 354cbbc39b5f3b5374be2deae4a3ab99cf52405a1d99216997fc43abe841cf0d
    • Instruction ID: ce62dadae820b4b4e235dcfe4867aa7d058b1e9e6c6506f32eb34f18d2aa4090
    • Opcode Fuzzy Hash: 354cbbc39b5f3b5374be2deae4a3ab99cf52405a1d99216997fc43abe841cf0d
    • Instruction Fuzzy Hash: 49619474A402059FE720EF68D888A6E77FAEF04714B5246E8E919EB390D731ED45CF60
    APIs
      • Part of subcall function 02C44778: EnterCriticalSection.KERNEL32(02C7DE34,?,02C44858,?,?,?,?,?,?,?,?,00000000,02C44870,?,02C7DE34), ref: 02C44780
      • Part of subcall function 02C44778: LeaveCriticalSection.KERNEL32(02C7DE34,02C7DE34,?,02C44858,?,?,?,?,?,?,?,?,00000000,02C44870,?,02C7DE34), ref: 02C4478D
      • Part of subcall function 02C44778: EnterCriticalSection.KERNEL32(?,02C7DE34,02C7DE34,?,02C44858,?,?,?,?,?,?,?,?,00000000,02C44870), ref: 02C44796
    • CreateCompatibleDC.GDI32(00000000), ref: 02C44B64
    • SelectObject.GDI32(?,?), ref: 02C44B74
    • StretchBlt.GDI32(?,?,?,?,?,?,?,?,00000000,?,00CC0020), ref: 02C44C70
    • SetTextColor.GDI32(?,00000000), ref: 02C44C7E
    • SetBkColor.GDI32(?,00FFFFFF), ref: 02C44C92
    • StretchBlt.GDI32(?,?,?,?,?,?,?,?,00000000,?,00E20746), ref: 02C44CC5
    • SetTextColor.GDI32(?,?), ref: 02C44CD5
    • SetBkColor.GDI32(?,?), ref: 02C44CE5
    • SelectObject.GDI32(?,00000000), ref: 02C44D15
    • DeleteDC.GDI32(?), ref: 02C44D1E
    Memory Dump Source
    • Source File: 00000020.00000002.1629785315.0000000002B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 02B60000, based on PE: true
    • Associated: 00000020.00000002.1629751702.0000000002B60000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629918239.0000000002C6F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629951953.0000000002C70000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629988721.0000000002C71000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630023350.0000000002C75000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630059756.0000000002C76000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630153321.0000000002C80000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630194479.0000000002C81000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C82000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C84000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_32_2_2b60000_rundll32.jbxd
    Similarity
    • API ID: Color$CriticalSection$EnterObjectSelectStretchText$CompatibleCreateDeleteLeave
    • String ID:
    • API String ID: 675119849-0
    • Opcode ID: fa2842b2eae4bd6c02bd6035d2d5b609f24daedecd8082f0dc658e3d09993ed5
    • Instruction ID: c13802d8ffaca764f3c283cd72e6e206f3a905e26de856157273a235a7be88c8
    • Opcode Fuzzy Hash: fa2842b2eae4bd6c02bd6035d2d5b609f24daedecd8082f0dc658e3d09993ed5
    • Instruction Fuzzy Hash: 11918075A00518AFCB50DFA8C980E9EB7F9EF4D300B644595E919EB220CB34EE41DF61
    APIs
    • GetModuleHandleW.KERNEL32(kernel32.dll,GetLogicalProcessorInformation), ref: 02B685DD
    • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 02B685E3
    • GetLogicalProcessorInformation.KERNEL32(00000000,?,GetLogicalProcessorInformation), ref: 02B685F6
    • GetLastError.KERNEL32(00000000,?,GetLogicalProcessorInformation), ref: 02B685FF
    • GetLogicalProcessorInformation.KERNEL32(00000000,?,00000000,02B68676,?,00000000,?,GetLogicalProcessorInformation), ref: 02B6862A
    Strings
    Memory Dump Source
    • Source File: 00000020.00000002.1629785315.0000000002B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 02B60000, based on PE: true
    • Associated: 00000020.00000002.1629751702.0000000002B60000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629918239.0000000002C6F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629951953.0000000002C70000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629988721.0000000002C71000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630023350.0000000002C75000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630059756.0000000002C76000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630153321.0000000002C80000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630194479.0000000002C81000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C82000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C84000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_32_2_2b60000_rundll32.jbxd
    Similarity
    • API ID: InformationLogicalProcessor$AddressErrorHandleLastModuleProc
    • String ID: @$GetLogicalProcessorInformation$kernel32.dll
    • API String ID: 1184211438-79381301
    • Opcode ID: 360f0666712f24e10df0ad33c5ae52430036fec91eb18781682e634f74947478
    • Instruction ID: 38c162b50d1a7a92682b16e0ebb5e0b217e7161de8a9efb2484e30622260d2fc
    • Opcode Fuzzy Hash: 360f0666712f24e10df0ad33c5ae52430036fec91eb18781682e634f74947478
    • Instruction Fuzzy Hash: BE1179B1D00208AEEB20EBA4C80CBBDB7B9EB04700F5484E5E814A3250D77C8A88CF91
    APIs
    • RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 02B7064C
    Memory Dump Source
    • Source File: 00000020.00000002.1629785315.0000000002B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 02B60000, based on PE: true
    • Associated: 00000020.00000002.1629751702.0000000002B60000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629918239.0000000002C6F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629951953.0000000002C70000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629988721.0000000002C71000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630023350.0000000002C75000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630059756.0000000002C76000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630153321.0000000002C80000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630194479.0000000002C81000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C82000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C84000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_32_2_2b60000_rundll32.jbxd
    Similarity
    • API ID: ExceptionRaise
    • String ID:
    • API String ID: 3997070919-0
    • Opcode ID: 5486e7fcef16fdf79714de96f9b462b65ef79b631497f8368003537b42c33690
    • Instruction ID: d3847b87e2275bfa8148e719c9fe2d3a696e0fcb7d67361cc5d4d09fa144399c
    • Opcode Fuzzy Hash: 5486e7fcef16fdf79714de96f9b462b65ef79b631497f8368003537b42c33690
    • Instruction Fuzzy Hash: 8AA17075D013099FDB14EFE8D884BAEBBB5FF48314F144A6AE925A7280DB70A944CF50
    APIs
    • LoadLibraryW.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,02C6A171,?,00000000,?,00000000), ref: 02C69F8E
    • IsBadReadPtr.KERNEL32(?,00000014), ref: 02C6A142
    Strings
    • BuildImportTable: GetProcAddress failed, xrefs: 02C6A115
    • BuildImportTable: ReallocMemory failed, xrefs: 02C6A020
    • BuildImportTable: can't load library: , xrefs: 02C69FD5
    Memory Dump Source
    • Source File: 00000020.00000002.1629785315.0000000002B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 02B60000, based on PE: true
    • Associated: 00000020.00000002.1629751702.0000000002B60000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629918239.0000000002C6F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629951953.0000000002C70000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629988721.0000000002C71000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630023350.0000000002C75000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630059756.0000000002C76000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630153321.0000000002C80000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630194479.0000000002C81000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C82000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C84000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_32_2_2b60000_rundll32.jbxd
    Similarity
    • API ID: LibraryLoadRead
    • String ID: BuildImportTable: GetProcAddress failed$BuildImportTable: ReallocMemory failed$BuildImportTable: can't load library:
    • API String ID: 1452896035-1384308123
    • Opcode ID: 459911985ae5c901d816d4ce0d5e3b42bef7f2b029c733671069bf5561098495
    • Instruction ID: da68b5518e6a168605cd91d948eb63df40b68803f6ee419f8f1410ac9754ee97
    • Opcode Fuzzy Hash: 459911985ae5c901d816d4ce0d5e3b42bef7f2b029c733671069bf5561098495
    • Instruction Fuzzy Hash: 9E711B70A00205AFDB10EB69CCC9BBAB7FAEF89310F4084A4E559E7250D775AE45CF61
    APIs
    • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 02B90AED
    • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 02B90B09
    • SafeArrayCreate.OLEAUT32(0000000C,?,?), ref: 02B90B42
    • SafeArrayPtrOfIndex.OLEAUT32(?,?,?), ref: 02B90BBF
    • SafeArrayPtrOfIndex.OLEAUT32(00000000,?,?), ref: 02B90BD8
    • VariantCopy.OLEAUT32(?), ref: 02B90C0D
    Strings
    Memory Dump Source
    • Source File: 00000020.00000002.1629785315.0000000002B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 02B60000, based on PE: true
    • Associated: 00000020.00000002.1629751702.0000000002B60000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629918239.0000000002C6F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629951953.0000000002C70000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629988721.0000000002C71000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630023350.0000000002C75000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630059756.0000000002C76000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630153321.0000000002C80000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630194479.0000000002C81000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C82000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C84000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_32_2_2b60000_rundll32.jbxd
    Similarity
    • API ID: ArraySafe$BoundIndex$CopyCreateVariant
    • String ID:
    • API String ID: 351091851-3916222277
    • Opcode ID: 4d50a89296325ef0fdf9e6951e056667a096c5e053e762f2c5e4ddb089fcda8a
    • Instruction ID: 7134fc016d38c3cb0270c024e97515e9a8e1a7245f618f0a9592f54696875cf3
    • Opcode Fuzzy Hash: 4d50a89296325ef0fdf9e6951e056667a096c5e053e762f2c5e4ddb089fcda8a
    • Instruction Fuzzy Hash: A451F575A0022D9BDF62EF58C880BDAB3BDAF49314F0045E5E649A7251DA34AF84CF61
    APIs
    • MulDiv.KERNEL32(?,000009EC,00000000), ref: 02C49AA6
    • MulDiv.KERNEL32(?,000009EC,00000000), ref: 02C49AC3
    • SetWinMetaFileBits.GDI32(00000016,?,00000000,00000008,?,000009EC,00000000,?,000009EC,00000000), ref: 02C49AEF
    • GetEnhMetaFileHeader.GDI32(00000016,0000006C,?,00000016,?,00000000,00000008,?,000009EC,00000000,?,000009EC,00000000), ref: 02C49B0F
    • DeleteEnhMetaFile.GDI32(00000016), ref: 02C49B30
    • SetWinMetaFileBits.GDI32(00000016,?,00000000,00000008,00000016,0000006C,?,00000016,?,00000000,00000008,?,000009EC,00000000,?,000009EC), ref: 02C49B43
    Strings
    Memory Dump Source
    • Source File: 00000020.00000002.1629785315.0000000002B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 02B60000, based on PE: true
    • Associated: 00000020.00000002.1629751702.0000000002B60000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629918239.0000000002C6F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629951953.0000000002C70000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629988721.0000000002C71000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630023350.0000000002C75000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630059756.0000000002C76000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630153321.0000000002C80000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630194479.0000000002C81000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C82000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C84000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_32_2_2b60000_rundll32.jbxd
    Similarity
    • API ID: FileMeta$Bits$DeleteHeader
    • String ID: `
    • API String ID: 1990453761-2679148245
    • Opcode ID: a192b18e51b16ec2e75d765a65553f6690b68b2d0af0291fd4341f8f4df993f2
    • Instruction ID: 3117878751cab7dfda8a769515e3cc14844ba4a3af6769008cb8b4227a4194d7
    • Opcode Fuzzy Hash: a192b18e51b16ec2e75d765a65553f6690b68b2d0af0291fd4341f8f4df993f2
    • Instruction Fuzzy Hash: BB410C75D00218AFDB50DFA8C884AAFB7F9EF48710F5085A5E904EB240EB349E44DF65
    APIs
    • Sleep.KERNEL32(00000000,?,02B661BC), ref: 02B659D3
    • Sleep.KERNEL32(0000000A,00000000,?,02B661BC), ref: 02B659E9
    • Sleep.KERNEL32(00000000,?,?,?,02B661BC), ref: 02B65A17
    • Sleep.KERNEL32(0000000A,00000000,?,?,?,02B661BC), ref: 02B65A2D
    Strings
    Memory Dump Source
    • Source File: 00000020.00000002.1629785315.0000000002B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 02B60000, based on PE: true
    • Associated: 00000020.00000002.1629751702.0000000002B60000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629918239.0000000002C6F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629951953.0000000002C70000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629988721.0000000002C71000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630023350.0000000002C75000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630059756.0000000002C76000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630153321.0000000002C80000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630194479.0000000002C81000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C82000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C84000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_32_2_2b60000_rundll32.jbxd
    Similarity
    • API ID: Sleep
    • String ID: @.
    • API String ID: 3472027048-4201455939
    • Opcode ID: 73bebf8b732dc62eecd15a9cbe9dbb7a232cf5585baef367299c33da9b463689
    • Instruction ID: 38cef0254da337037779caae587dccff3dd2cecb163e25aa2efd4949aa31e27f
    • Opcode Fuzzy Hash: 73bebf8b732dc62eecd15a9cbe9dbb7a232cf5585baef367299c33da9b463689
    • Instruction Fuzzy Hash: 4FC136B2A412418FC725CF68D88C726BBD1EB84324F8847EED5558B385C774D479CBA0
    APIs
    • Sleep.KERNEL32(00000000,?), ref: 02B65D36
    • Sleep.KERNEL32(0000000A,00000000,?), ref: 02B65D50
    Memory Dump Source
    • Source File: 00000020.00000002.1629785315.0000000002B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 02B60000, based on PE: true
    • Associated: 00000020.00000002.1629751702.0000000002B60000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629918239.0000000002C6F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629951953.0000000002C70000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629988721.0000000002C71000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630023350.0000000002C75000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630059756.0000000002C76000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630153321.0000000002C80000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630194479.0000000002C81000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C82000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C84000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_32_2_2b60000_rundll32.jbxd
    Similarity
    • API ID: Sleep
    • String ID:
    • API String ID: 3472027048-0
    • Opcode ID: 604b9d30567a773a4fc8a1f202e001a942c79cd9928bb5c37947aca05cc15855
    • Instruction ID: f7e85971eb6aa95c8d9e85852a5b52681430c562743924744b30cb290a651621
    • Opcode Fuzzy Hash: 604b9d30567a773a4fc8a1f202e001a942c79cd9928bb5c37947aca05cc15855
    • Instruction Fuzzy Hash: 947112316402408FD735CF68C88CB36BBD5EB85324F9887EAD8848B2D5D778C865CB91
    APIs
      • Part of subcall function 02B864A8: VirtualQuery.KERNEL32(?,?,0000001C,00000000,02B86654), ref: 02B864DB
      • Part of subcall function 02B864A8: GetModuleFileNameW.KERNEL32(?,?,00000105), ref: 02B864FF
      • Part of subcall function 02B864A8: GetModuleFileNameW.KERNEL32(MZP,?,00000105), ref: 02B8651A
      • Part of subcall function 02B864A8: LoadStringW.USER32(00000000,0000FFEB,?,00000100), ref: 02B865B5
    • WideCharToMultiByte.KERNEL32(00000001,00000000,?,00000000,00000000,00000000,00000000,00000000,00000400,00000000,02B867C5), ref: 02B86701
    • WideCharToMultiByte.KERNEL32(00000001,00000000,?,00000000,?,00000000,00000000,00000000), ref: 02B86734
    • GetStdHandle.KERNEL32(000000F4,?,00000000,?,00000000,00000001,00000000,?,00000000,?,00000000,00000000,00000000), ref: 02B86746
    • WriteFile.KERNEL32(00000000,000000F4,?,00000000,?,00000000,00000001,00000000,?,00000000,?,00000000,00000000,00000000), ref: 02B8674C
    • GetStdHandle.KERNEL32(000000F4,02B867E0,00000002,?,00000000,00000000,000000F4,?,00000000,?,00000000,00000001,00000000,?,00000000,?), ref: 02B86760
    • WriteFile.KERNEL32(00000000,000000F4,02B867E0,00000002,?,00000000,00000000,000000F4,?,00000000,?,00000000,00000001,00000000,?,00000000), ref: 02B86766
    • LoadStringW.USER32(00000000,0000FFEC,?,00000040), ref: 02B8678A
    • MessageBoxW.USER32(00000000,?,?,00002010), ref: 02B867A4
    Memory Dump Source
    • Source File: 00000020.00000002.1629785315.0000000002B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 02B60000, based on PE: true
    • Associated: 00000020.00000002.1629751702.0000000002B60000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629918239.0000000002C6F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629951953.0000000002C70000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629988721.0000000002C71000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630023350.0000000002C75000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630059756.0000000002C76000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630153321.0000000002C80000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630194479.0000000002C81000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C82000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C84000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_32_2_2b60000_rundll32.jbxd
    Similarity
    • API ID: File$ByteCharHandleLoadModuleMultiNameStringWideWrite$MessageQueryVirtual
    • String ID:
    • API String ID: 135118572-0
    • Opcode ID: 3732f26fbeff1a45836d39484c182b827d42dbebc459320c21fd79af7f45935b
    • Instruction ID: c8b38c5a2ce1ab9c32de57bd188e237256d924f7c66c7be24fefc2252d7e9449
    • Opcode Fuzzy Hash: 3732f26fbeff1a45836d39484c182b827d42dbebc459320c21fd79af7f45935b
    • Instruction Fuzzy Hash: 94314175684208BFEB14EAA4DC82FEA73EDEB04700F5041E1BA19E61D0DA746E548B65
    APIs
    • GetDC.USER32(00000000), ref: 02C460B2
    • GetDeviceCaps.GDI32(?,00000068), ref: 02C460CE
    • GetSystemPaletteEntries.GDI32(?,00000000,00000008,?), ref: 02C460ED
    • GetSystemPaletteEntries.GDI32(?,-00000008,00000001,00C0C0C0), ref: 02C46111
    • GetSystemPaletteEntries.GDI32(?,00000000,00000007,?), ref: 02C4612F
    • GetSystemPaletteEntries.GDI32(?,00000007,00000001,?), ref: 02C46143
    • GetSystemPaletteEntries.GDI32(?,00000000,00000008,?), ref: 02C46163
    • ReleaseDC.USER32(00000000,?), ref: 02C4617B
    Memory Dump Source
    • Source File: 00000020.00000002.1629785315.0000000002B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 02B60000, based on PE: true
    • Associated: 00000020.00000002.1629751702.0000000002B60000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629918239.0000000002C6F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629951953.0000000002C70000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629988721.0000000002C71000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630023350.0000000002C75000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630059756.0000000002C76000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630153321.0000000002C80000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630194479.0000000002C81000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C82000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C84000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_32_2_2b60000_rundll32.jbxd
    Similarity
    • API ID: EntriesPaletteSystem$CapsDeviceRelease
    • String ID:
    • API String ID: 1781840570-0
    • Opcode ID: fe4b928bfcb89692458902bcd1785afc261b3bff2805712483b55cbe8abec9ad
    • Instruction ID: 486ef35dc539be75efae33678c8e2d0578a0719e8df925060d503de641c9d061
    • Opcode Fuzzy Hash: fe4b928bfcb89692458902bcd1785afc261b3bff2805712483b55cbe8abec9ad
    • Instruction Fuzzy Hash: 01212AB5A40208BBEB50DBA8CD85FAE73EDEB49704F5004E5F704F6180DA75AE449B25
    Memory Dump Source
    • Source File: 00000020.00000002.1629785315.0000000002B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 02B60000, based on PE: true
    • Associated: 00000020.00000002.1629751702.0000000002B60000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629918239.0000000002C6F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629951953.0000000002C70000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629988721.0000000002C71000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630023350.0000000002C75000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630059756.0000000002C76000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630153321.0000000002C80000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630194479.0000000002C81000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C82000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C84000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_32_2_2b60000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 6768bbf0e742e02f6e74a240fcf27349f212b4f366d2f98ccfcec06659e13dd5
    • Instruction ID: 227d41d1e00d6ae6e81edf3298d1ca8763d1469c47c526aab69f5c35187558cb
    • Opcode Fuzzy Hash: 6768bbf0e742e02f6e74a240fcf27349f212b4f366d2f98ccfcec06659e13dd5
    • Instruction Fuzzy Hash: E0C1E3A2B106100BD734AA7C9C8C77EB78ADBC4325F9886B9E254CB3C5DB7CD8658750
    APIs
      • Part of subcall function 02C5C400: DeleteObject.GDI32(?), ref: 02C5C40B
      • Part of subcall function 02C5C400: DeleteDC.GDI32(?), ref: 02C5C418
      • Part of subcall function 02C5C400: DeleteObject.GDI32(?), ref: 02C5C434
    • CreateCompatibleDC.GDI32(00000000), ref: 02C5C903
    • CreateHalftonePalette.GDI32(?,00000000), ref: 02C5C93E
    • ResizePalette.GDI32(?,00000001), ref: 02C5C973
    • SelectPalette.GDI32(?,?,00000000), ref: 02C5C998
    • RealizePalette.GDI32(?), ref: 02C5C9A3
    • CreateDIBSection.GDI32(?,-00000474,00000000,-00000450,00000000,00000000), ref: 02C5C9CE
    • SelectObject.GDI32(?,00000000), ref: 02C5C9E1
    Memory Dump Source
    • Source File: 00000020.00000002.1629785315.0000000002B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 02B60000, based on PE: true
    • Associated: 00000020.00000002.1629751702.0000000002B60000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629918239.0000000002C6F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629951953.0000000002C70000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629988721.0000000002C71000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630023350.0000000002C75000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630059756.0000000002C76000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630153321.0000000002C80000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630194479.0000000002C81000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C82000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C84000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_32_2_2b60000_rundll32.jbxd
    Similarity
    • API ID: Palette$CreateDeleteObject$Select$CompatibleHalftoneRealizeResizeSection
    • String ID:
    • API String ID: 2525607832-0
    • Opcode ID: e470db31d7cb599619d4b462895cc9a80ed51459a1c61c412d48eab758b75784
    • Instruction ID: 7c667a3839b4da4af5f5444054492d890db686d554101e4bb6d948e32e653745
    • Opcode Fuzzy Hash: e470db31d7cb599619d4b462895cc9a80ed51459a1c61c412d48eab758b75784
    • Instruction Fuzzy Hash: C07147752006209FDB44DB28C4D4F6673E6EF4A304F0541E6E604CF36ACB34E98ACB9A
    APIs
      • Part of subcall function 02B68CDC: GetCurrentThreadId.KERNEL32 ref: 02B68CDF
    • GetTickCount.KERNEL32 ref: 02B68887
    • GetTickCount.KERNEL32 ref: 02B6889F
    • GetCurrentThreadId.KERNEL32 ref: 02B688CE
    • GetTickCount.KERNEL32 ref: 02B688F9
    • GetTickCount.KERNEL32 ref: 02B68930
    • GetTickCount.KERNEL32 ref: 02B6895A
    • GetCurrentThreadId.KERNEL32 ref: 02B689CA
    Memory Dump Source
    • Source File: 00000020.00000002.1629785315.0000000002B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 02B60000, based on PE: true
    • Associated: 00000020.00000002.1629751702.0000000002B60000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629918239.0000000002C6F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629951953.0000000002C70000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629988721.0000000002C71000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630023350.0000000002C75000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630059756.0000000002C76000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630153321.0000000002C80000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630194479.0000000002C81000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C82000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C84000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_32_2_2b60000_rundll32.jbxd
    Similarity
    • API ID: CountTick$CurrentThread
    • String ID:
    • API String ID: 3968769311-0
    • Opcode ID: 79ee69578ae38d50098b695464986d430ecca96b9ca3b66a4fa9ef66139004c8
    • Instruction ID: abc1669f188dab96c914866ad11dd6fd18a512062e1c11e7ad20d9269d9bc256
    • Opcode Fuzzy Hash: 79ee69578ae38d50098b695464986d430ecca96b9ca3b66a4fa9ef66139004c8
    • Instruction Fuzzy Hash: 85415E716093419ED721EE7CC98C33EBAD2EF81354F1489ADD6D887281EB799488CB53
    APIs
    • MulDiv.KERNEL32(?,?,000009EC), ref: 02C4A0E2
    • MulDiv.KERNEL32(?,?,000009EC), ref: 02C4A0F9
    • GetDC.USER32(00000000), ref: 02C4A110
    • GetWinMetaFileBits.GDI32(?,00000000,00000000,00000008,?,00000000,02C4A1CB,?,00000000,?,?,000009EC,?,?,000009EC), ref: 02C4A134
    • GetWinMetaFileBits.GDI32(?,?,?,00000008,?,00000000,02C4A1AB,?,?,00000000,00000000,00000008,?,00000000,02C4A1CB), ref: 02C4A167
    Strings
    Memory Dump Source
    • Source File: 00000020.00000002.1629785315.0000000002B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 02B60000, based on PE: true
    • Associated: 00000020.00000002.1629751702.0000000002B60000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629918239.0000000002C6F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629951953.0000000002C70000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629988721.0000000002C71000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630023350.0000000002C75000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630059756.0000000002C76000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630153321.0000000002C80000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630194479.0000000002C81000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C82000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C84000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_32_2_2b60000_rundll32.jbxd
    Similarity
    • API ID: BitsFileMeta
    • String ID: `
    • API String ID: 858000408-2679148245
    • Opcode ID: 6c08e1985d299c651b890baad2de0a33829fdd2158f914143de7c66f19e6c51f
    • Instruction ID: 7fed63bec54c40f856efbed94b6e2f79c24c6f48c751d906927f66a319660837
    • Opcode Fuzzy Hash: 6c08e1985d299c651b890baad2de0a33829fdd2158f914143de7c66f19e6c51f
    • Instruction Fuzzy Hash: 28312F75A40248ABDB00DFE4C891ABFB7B9EF0D700F504495E914EB240DA75AE00EBA5
    APIs
    • IsEqualGUID.OLE32(?,?), ref: 02C4E9B4
    • IsEqualGUID.OLE32(?,02C72700), ref: 02C4E9D5
    • IsEqualGUID.OLE32(?,02C72710), ref: 02C4E9EB
    Memory Dump Source
    • Source File: 00000020.00000002.1629785315.0000000002B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 02B60000, based on PE: true
    • Associated: 00000020.00000002.1629751702.0000000002B60000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629918239.0000000002C6F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629951953.0000000002C70000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629988721.0000000002C71000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630023350.0000000002C75000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630059756.0000000002C76000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630153321.0000000002C80000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630194479.0000000002C81000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C82000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C84000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_32_2_2b60000_rundll32.jbxd
    Similarity
    • API ID: Equal
    • String ID:
    • API String ID: 4016716531-0
    • Opcode ID: d27913e91ab066e969785e88548b4da2b4140d82584787e723042442c7f4635d
    • Instruction ID: 5aa59f16a1af4b497c3631b61b607dcce9641f8025090507d6c6e5ab4a5da4ee
    • Opcode Fuzzy Hash: d27913e91ab066e969785e88548b4da2b4140d82584787e723042442c7f4635d
    • Instruction Fuzzy Hash: DB11D3B1044540DEDF51DA29CD84BB76F8EBF82258F0D14D2EE404F282DB958549CBF6
    APIs
      • Part of subcall function 02C462F0: GetObjectW.GDI32(00000000,00000004), ref: 02C46307
      • Part of subcall function 02C462F0: GetPaletteEntries.GDI32(00000000,00000000,?,00000028), ref: 02C4632A
    • GetDC.USER32(00000000), ref: 02C4A9B2
    • CreateCompatibleDC.GDI32(?), ref: 02C4A9BE
    • SelectObject.GDI32(?), ref: 02C4A9CB
    • SetDIBColorTable.GDI32(?,00000000,00000000,?,00000000,02C4AA23,?,?,?,?,00000000), ref: 02C4A9EF
    • SelectObject.GDI32(?,?), ref: 02C4AA09
    • DeleteDC.GDI32(?), ref: 02C4AA12
    • ReleaseDC.USER32(00000000,?), ref: 02C4AA1D
    Memory Dump Source
    • Source File: 00000020.00000002.1629785315.0000000002B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 02B60000, based on PE: true
    • Associated: 00000020.00000002.1629751702.0000000002B60000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629918239.0000000002C6F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629951953.0000000002C70000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629988721.0000000002C71000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630023350.0000000002C75000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630059756.0000000002C76000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630153321.0000000002C80000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630194479.0000000002C81000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C82000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C84000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_32_2_2b60000_rundll32.jbxd
    Similarity
    • API ID: Object$Select$ColorCompatibleCreateDeleteEntriesPaletteReleaseTable
    • String ID:
    • API String ID: 4046155103-0
    • Opcode ID: d5a764c99c4841969e23b2dcf908edf156ee783150c03dacccabd767818ad968
    • Instruction ID: 4759a4a9ccef6d2f5e09e8ac98c5cb1b766e197854a59b6042894377cd2a117d
    • Opcode Fuzzy Hash: d5a764c99c4841969e23b2dcf908edf156ee783150c03dacccabd767818ad968
    • Instruction Fuzzy Hash: 76113072E40219BFDB10EBE8CC51AAEB3FDEB49700F4044E5EA14E7240DA759E509FA1
    APIs
    • GetStdHandle.KERNEL32(000000F5,Runtime error at 00000000,0000001D,?,00000000,?,02B6998E,?,?,?,?,02B69AA2,02B66F13,02B66F5A,?,?), ref: 02B69909
    • WriteFile.KERNEL32(00000000,000000F5,Runtime error at 00000000,0000001D,?,00000000,?,02B6998E,?,?,?,?,02B69AA2,02B66F13,02B66F5A,?), ref: 02B6990F
    • GetStdHandle.KERNEL32(000000F5,00000000,00000002,?,00000000,00000000,000000F5,Runtime error at 00000000,0000001D,?,00000000,?,02B6998E,?,?,?), ref: 02B6992A
    • WriteFile.KERNEL32(00000000,000000F5,00000000,00000002,?,00000000,00000000,000000F5,Runtime error at 00000000,0000001D,?,00000000,?,02B6998E), ref: 02B69930
    Strings
    Memory Dump Source
    • Source File: 00000020.00000002.1629785315.0000000002B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 02B60000, based on PE: true
    • Associated: 00000020.00000002.1629751702.0000000002B60000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629918239.0000000002C6F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629951953.0000000002C70000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629988721.0000000002C71000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630023350.0000000002C75000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630059756.0000000002C76000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630153321.0000000002C80000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630194479.0000000002C81000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C82000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C84000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_32_2_2b60000_rundll32.jbxd
    Similarity
    • API ID: FileHandleWrite
    • String ID: Error$Runtime error at 00000000
    • API String ID: 3320372497-2970929446
    • Opcode ID: 8f125133f6cb6636e70c8dcbd61e098745f90c8ae74349a2c06cabdb43c148f2
    • Instruction ID: 584dacc65825b16af030834a2907d4bf8fcfeb04433fd091649d0a48063e58b0
    • Opcode Fuzzy Hash: 8f125133f6cb6636e70c8dcbd61e098745f90c8ae74349a2c06cabdb43c148f2
    • Instruction Fuzzy Hash: 78F09691A80340B9FB3077B46C5EF7A375C9740B14F544B99B359590C5C7B880989B62
    APIs
    • GetSystemMetrics.USER32(0000000B), ref: 02C4662E
    • GetSystemMetrics.USER32(0000000C), ref: 02C4663A
    • GetDC.USER32(00000000), ref: 02C46656
    • GetDeviceCaps.GDI32(00000000,0000000E), ref: 02C4667D
    • GetDeviceCaps.GDI32(00000000,0000000C), ref: 02C4668A
    • ReleaseDC.USER32(00000000,00000000), ref: 02C466C3
    Memory Dump Source
    • Source File: 00000020.00000002.1629785315.0000000002B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 02B60000, based on PE: true
    • Associated: 00000020.00000002.1629751702.0000000002B60000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629918239.0000000002C6F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629951953.0000000002C70000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629988721.0000000002C71000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630023350.0000000002C75000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630059756.0000000002C76000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630153321.0000000002C80000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630194479.0000000002C81000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C82000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C84000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_32_2_2b60000_rundll32.jbxd
    Similarity
    • API ID: CapsDeviceMetricsSystem$Release
    • String ID:
    • API String ID: 447804332-0
    • Opcode ID: 457733d9609f54d125e62b583700168451c256b414a61099d0eaad43ddc44d0f
    • Instruction ID: a5a2dd34137d182c8ab921d0a895ed6326955775acecc99b05024562bee2e308
    • Opcode Fuzzy Hash: 457733d9609f54d125e62b583700168451c256b414a61099d0eaad43ddc44d0f
    • Instruction Fuzzy Hash: 6E314174E00208EFEB10DFA5C981AAEBBF9FF89750F1085A5E914AB354CB709940CF61
    APIs
    • CreateCompatibleDC.GDI32(00000000), ref: 02C46252
    • SelectObject.GDI32(00000000,00000000), ref: 02C4625B
    • GetDIBColorTable.GDI32(00000000,00000000,00000100,?,00000000,00000000,00000000,?,00000000,?,?,02C4C367), ref: 02C4626F
    • SelectObject.GDI32(00000000,00000000), ref: 02C4627B
    • DeleteDC.GDI32(00000000), ref: 02C46281
    • CreatePalette.GDI32 ref: 02C462DC
    Memory Dump Source
    • Source File: 00000020.00000002.1629785315.0000000002B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 02B60000, based on PE: true
    • Associated: 00000020.00000002.1629751702.0000000002B60000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629918239.0000000002C6F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629951953.0000000002C70000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629988721.0000000002C71000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630023350.0000000002C75000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630059756.0000000002C76000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630153321.0000000002C80000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630194479.0000000002C81000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C82000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C84000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_32_2_2b60000_rundll32.jbxd
    Similarity
    • API ID: CreateObjectSelect$ColorCompatibleDeletePaletteTable
    • String ID:
    • API String ID: 2515223848-0
    • Opcode ID: 30df465cdafede8327223e229e5e327e680b3cdc3a22b1eb51a9e93e1b8bca54
    • Instruction ID: 455eb70f669c8fc30f6f15ddc1242df518404356233945ffd07eb90ec58a7b25
    • Opcode Fuzzy Hash: 30df465cdafede8327223e229e5e327e680b3cdc3a22b1eb51a9e93e1b8bca54
    • Instruction Fuzzy Hash: 6411066160431033E320A7758C41F6B72EDDFC2710F10896DF949D7280EA788848A7A2
    APIs
      • Part of subcall function 02C46950: GetObjectW.GDI32(?,00000054), ref: 02C46964
    • CreateCompatibleDC.GDI32(00000000), ref: 02C46ABE
    • SelectPalette.GDI32(?,?,00000000), ref: 02C46ADF
    • RealizePalette.GDI32(?), ref: 02C46AEB
    • GetDIBits.GDI32(?,?,00000000,?,?,?,00000000), ref: 02C46B02
    • SelectPalette.GDI32(?,00000000,00000000), ref: 02C46B2A
    • DeleteDC.GDI32(?), ref: 02C46B33
    Memory Dump Source
    • Source File: 00000020.00000002.1629785315.0000000002B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 02B60000, based on PE: true
    • Associated: 00000020.00000002.1629751702.0000000002B60000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629918239.0000000002C6F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629951953.0000000002C70000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629988721.0000000002C71000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630023350.0000000002C75000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630059756.0000000002C76000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630153321.0000000002C80000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630194479.0000000002C81000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C82000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C84000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_32_2_2b60000_rundll32.jbxd
    Similarity
    • API ID: Palette$Select$BitsCompatibleCreateDeleteObjectRealize
    • String ID:
    • API String ID: 1221726059-0
    • Opcode ID: ebb72241cc379e76052ed5412e6aefd8f1711ec7c062a88af306b5373aed71ba
    • Instruction ID: 894038995aa27213ee5ea56fd50264ae9c5bcb322a5b4f573a83c7452f012213
    • Opcode Fuzzy Hash: ebb72241cc379e76052ed5412e6aefd8f1711ec7c062a88af306b5373aed71ba
    • Instruction Fuzzy Hash: C6114C75A006047BEB10DBA88C81F9FB7EDEB4D710F5080A5B628E7280DA749A409B61
    APIs
    • GetStdHandle.KERNEL32(000000F4,02B65358,00000000,?,00000000,?,?,00000000,02B66B8F), ref: 02B66206
    • WriteFile.KERNEL32(00000000,000000F4,02B65358,00000000,?,00000000,?,?,00000000,02B66B8F), ref: 02B6620C
    • GetStdHandle.KERNEL32(000000F4,02B65354,00000000,?,00000000,00000000,000000F4,02B65358,00000000,?,00000000,?,?,00000000,02B66B8F), ref: 02B6622B
    • WriteFile.KERNEL32(00000000,000000F4,02B65354,00000000,?,00000000,00000000,000000F4,02B65358,00000000,?,00000000,?,?,00000000,02B66B8F), ref: 02B66231
    • GetStdHandle.KERNEL32(000000F4,?,00000000,?,00000000,00000000,000000F4,02B65354,00000000,?,00000000,00000000,000000F4,02B65358,00000000,?), ref: 02B66248
    • WriteFile.KERNEL32(00000000,000000F4,?,00000000,?,00000000,00000000,000000F4,02B65354,00000000,?,00000000,00000000,000000F4,02B65358,00000000), ref: 02B6624E
    Memory Dump Source
    • Source File: 00000020.00000002.1629785315.0000000002B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 02B60000, based on PE: true
    • Associated: 00000020.00000002.1629751702.0000000002B60000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629918239.0000000002C6F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629951953.0000000002C70000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629988721.0000000002C71000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630023350.0000000002C75000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630059756.0000000002C76000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630153321.0000000002C80000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630194479.0000000002C81000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C82000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C84000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_32_2_2b60000_rundll32.jbxd
    Similarity
    • API ID: FileHandleWrite
    • String ID:
    • API String ID: 3320372497-0
    • Opcode ID: c9c0ce56ceb1cd18b73f7b8b7271eb02ce6882bd09f1fb59f9c006506759e7c8
    • Instruction ID: 412137e60f730fec9d92c0cb52cfe5eb39ecde441d2dbb08693237fd3d9bc82d
    • Opcode Fuzzy Hash: c9c0ce56ceb1cd18b73f7b8b7271eb02ce6882bd09f1fb59f9c006506759e7c8
    • Instruction Fuzzy Hash: 380168A16482107EE660F2B89C8DFBB378D9B59721F500B95B258F20C1CA6CDC548BB1
    APIs
    • VirtualQuery.KERNEL32(?,?,0000001C,00000000,02B86654), ref: 02B864DB
    • GetModuleFileNameW.KERNEL32(?,?,00000105), ref: 02B864FF
    • GetModuleFileNameW.KERNEL32(MZP,?,00000105), ref: 02B8651A
    • LoadStringW.USER32(00000000,0000FFEB,?,00000100), ref: 02B865B5
    Strings
    Memory Dump Source
    • Source File: 00000020.00000002.1629785315.0000000002B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 02B60000, based on PE: true
    • Associated: 00000020.00000002.1629751702.0000000002B60000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629918239.0000000002C6F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629951953.0000000002C70000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629988721.0000000002C71000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630023350.0000000002C75000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630059756.0000000002C76000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630153321.0000000002C80000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630194479.0000000002C81000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C82000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C84000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_32_2_2b60000_rundll32.jbxd
    Similarity
    • API ID: FileModuleName$LoadQueryStringVirtual
    • String ID: MZP
    • API String ID: 3990497365-2889622443
    • Opcode ID: f2cc9bbc5afb8d4fb48351abe42b1b7a8be6e6c3dd53ed5472ccefeea1cb75c7
    • Instruction ID: 26823d9e2f2ec254f26c090a99f9f0295c727ec5333922846a36437958e57c8f
    • Opcode Fuzzy Hash: f2cc9bbc5afb8d4fb48351abe42b1b7a8be6e6c3dd53ed5472ccefeea1cb75c7
    • Instruction Fuzzy Hash: 74411BB1A4025C9FDB20EF68CC84BD9B7FAAB59300F4044E5A50CE7241D776AE94CF50
    APIs
    • GetDC.USER32(00000000), ref: 02C4D17C
    • CreateHalftonePalette.GDI32(00000000,00000000), ref: 02C4D189
    • ReleaseDC.USER32(00000000,00000000), ref: 02C4D198
    • DeleteObject.GDI32(00000000), ref: 02C4D206
    Strings
    Memory Dump Source
    • Source File: 00000020.00000002.1629785315.0000000002B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 02B60000, based on PE: true
    • Associated: 00000020.00000002.1629751702.0000000002B60000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629918239.0000000002C6F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629951953.0000000002C70000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629988721.0000000002C71000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630023350.0000000002C75000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630059756.0000000002C76000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630153321.0000000002C80000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630194479.0000000002C81000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C82000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C84000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_32_2_2b60000_rundll32.jbxd
    Similarity
    • API ID: CreateDeleteHalftoneObjectPaletteRelease
    • String ID: (
    • API String ID: 577518360-3887548279
    • Opcode ID: 4fc3d711f6a2fa176bb1dec8f118d3545a9610b2519c73e53bb21cbb64c0fdd5
    • Instruction ID: 17dc5ef083394af73961a9ece03371be2b971b773bce096cb50cb63abfa9736e
    • Opcode Fuzzy Hash: 4fc3d711f6a2fa176bb1dec8f118d3545a9610b2519c73e53bb21cbb64c0fdd5
    • Instruction Fuzzy Hash: E0416D70A04208AFDB10EFA5C884B9EFBF6EF89304F5440A5E806AB351DB759E45DB51
    Memory Dump Source
    • Source File: 00000020.00000002.1629785315.0000000002B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 02B60000, based on PE: true
    • Associated: 00000020.00000002.1629751702.0000000002B60000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629918239.0000000002C6F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629951953.0000000002C70000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629988721.0000000002C71000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630023350.0000000002C75000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630059756.0000000002C76000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630153321.0000000002C80000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630194479.0000000002C81000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C82000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C84000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_32_2_2b60000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 3b60640832d6db820346097bf258c483b95aefc5fca73a19af1a4bf9b25508d0
    • Instruction ID: 4e75d0346f706ab1c14d0e6d8b109b48314bae40615dac780f7cbf23799dab5f
    • Opcode Fuzzy Hash: 3b60640832d6db820346097bf258c483b95aefc5fca73a19af1a4bf9b25508d0
    • Instruction Fuzzy Hash: 52D16C35A04249AFDF01EFA9C4809FDFBBAEF49710F9484F5E850A7210D734AA85DB61
    APIs
    • CreateCompatibleDC.GDI32(?), ref: 02C61CF9
    • CreateDIBSection.GDI32(?,?,00000000,?,00000000,00000000), ref: 02C61D28
    • SelectObject.GDI32(?,?), ref: 02C61D38
    • DeleteObject.GDI32(?), ref: 02C61F51
    • DeleteDC.GDI32(?), ref: 02C61F5D
    Memory Dump Source
    • Source File: 00000020.00000002.1629785315.0000000002B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 02B60000, based on PE: true
    • Associated: 00000020.00000002.1629751702.0000000002B60000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629918239.0000000002C6F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629951953.0000000002C70000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629988721.0000000002C71000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630023350.0000000002C75000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630059756.0000000002C76000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630153321.0000000002C80000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630194479.0000000002C81000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C82000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C84000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_32_2_2b60000_rundll32.jbxd
    Similarity
    • API ID: CreateDeleteObject$CompatibleSectionSelect
    • String ID:
    • API String ID: 2986811175-0
    • Opcode ID: 0167fa3ae48454baa197b3d28432bbb9244175284dbda83da00c44f68e3c73d0
    • Instruction ID: 37765e545e9509ff1260b81aff9624a8b1a0a853f6642941403ae883a39baf07
    • Opcode Fuzzy Hash: 0167fa3ae48454baa197b3d28432bbb9244175284dbda83da00c44f68e3c73d0
    • Instruction Fuzzy Hash: 13B1B474E006099FCB44DFA9C988AAEBBF6FF48301F2485A5E814AB361D774AD41DF50
    APIs
    • memcpy.MSVCRT(?,?,00000038), ref: 02C508C0
    • memcpy.MSVCRT(00000000,00000000,000016C4), ref: 02C508F3
    • memcpy.MSVCRT(00000000,?,?), ref: 02C50989
    • memcpy.MSVCRT(00000000,?,?), ref: 02C5099F
    • memcpy.MSVCRT(00000000,?,?), ref: 02C509B5
    • memcpy.MSVCRT(00000000,?,?), ref: 02C509C9
    Memory Dump Source
    • Source File: 00000020.00000002.1629785315.0000000002B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 02B60000, based on PE: true
    • Associated: 00000020.00000002.1629751702.0000000002B60000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629918239.0000000002C6F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629951953.0000000002C70000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629988721.0000000002C71000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630023350.0000000002C75000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630059756.0000000002C76000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630153321.0000000002C80000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630194479.0000000002C81000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C82000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C84000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_32_2_2b60000_rundll32.jbxd
    Similarity
    • API ID: memcpy
    • String ID:
    • API String ID: 3510742995-0
    • Opcode ID: d948a10c9f1e2417ed34ae8df7b8044f991836d94fef36a5c337458bb54a48b1
    • Instruction ID: b1ce5cb8a7bbe498bff4c0239331c69e2cd47c385ad7faa998b6f5f5e4f56530
    • Opcode Fuzzy Hash: d948a10c9f1e2417ed34ae8df7b8044f991836d94fef36a5c337458bb54a48b1
    • Instruction Fuzzy Hash: 025181B1600600AFDB14DF68DCC5E9677A9FF88314F088669ED0D8F64AE731E950CB94
    APIs
    • FreeLibrary.KERNEL32(00000000,00000000,?,?,?,?,?,00000000,02C68E55,?,?,?,?,?,00000000,00000000), ref: 02C68FC4
    • VirtualFree.KERNEL32(?,00000000,00008000,?,?,?,?,00000000,02C68E55,?,?,?,?,?,00000000,00000000), ref: 02C68FF3
    • GetProcessHeap.KERNEL32(00000000,?,?,?,?,?,00000000,02C68E55,?,?,?,?,?,00000000,00000000), ref: 02C68FFE
    • HeapFree.KERNEL32(00000000,00000000,?,?,?,?,?,00000000,02C68E55,?,?,?,?,?,00000000,00000000), ref: 02C69004
    • VirtualFree.KERNEL32(?,?,00008000,?,?,?,?,00000000,02C68E55,?,?,?,?,?,00000000,00000000), ref: 02C69044
    Memory Dump Source
    • Source File: 00000020.00000002.1629785315.0000000002B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 02B60000, based on PE: true
    • Associated: 00000020.00000002.1629751702.0000000002B60000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629918239.0000000002C6F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629951953.0000000002C70000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629988721.0000000002C71000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630023350.0000000002C75000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630059756.0000000002C76000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630153321.0000000002C80000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630194479.0000000002C81000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C82000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C84000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_32_2_2b60000_rundll32.jbxd
    Similarity
    • API ID: Free$HeapVirtual$LibraryProcess
    • String ID:
    • API String ID: 565514093-0
    • Opcode ID: c4b1ced6cffb9864ea216645eba83079f8fa8014517a8bfc374ee1b845c1b89f
    • Instruction ID: ac54ffbeed8836414ac7405c0490f6aebd67c9b410bc8270fd02728cee7c339c
    • Opcode Fuzzy Hash: c4b1ced6cffb9864ea216645eba83079f8fa8014517a8bfc374ee1b845c1b89f
    • Instruction Fuzzy Hash: E831AF75600605AFD720EE68CCC8F36B3AAFF88B14F104668F564CB290C731E9598BE0
    APIs
    • GetDC.USER32(00000000), ref: 02C4C372
    • GetDeviceCaps.GDI32(00000000,0000000C), ref: 02C4C387
    • GetDeviceCaps.GDI32(00000000,0000000E), ref: 02C4C391
    • CreateHalftonePalette.GDI32(00000000,00000000,?,?,?,?,02C4A7DB,00000000,02C4A867), ref: 02C4C3B5
    • ReleaseDC.USER32(00000000,00000000), ref: 02C4C3C0
    Memory Dump Source
    • Source File: 00000020.00000002.1629785315.0000000002B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 02B60000, based on PE: true
    • Associated: 00000020.00000002.1629751702.0000000002B60000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629918239.0000000002C6F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629951953.0000000002C70000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629988721.0000000002C71000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630023350.0000000002C75000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630059756.0000000002C76000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630153321.0000000002C80000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630194479.0000000002C81000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C82000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C84000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_32_2_2b60000_rundll32.jbxd
    Similarity
    • API ID: CapsDevice$CreateHalftonePaletteRelease
    • String ID:
    • API String ID: 2404249990-0
    • Opcode ID: c4a1b20b6082907148ca0743ca9c7e76063a1768cc102af30ff38a7623f7df5f
    • Instruction ID: c9e84037bd8aecef3bd3f2f54615d0d944e08fa5e01d295163319e088595bfd9
    • Opcode Fuzzy Hash: c4a1b20b6082907148ca0743ca9c7e76063a1768cc102af30ff38a7623f7df5f
    • Instruction Fuzzy Hash: C7110832142399AEDB20AF75C4407EF3BD6AF85359F041092FC149A1D0CBB58B90DBA5
    APIs
    • GetDC.USER32(00000000), ref: 02C461B4
    • GetDeviceCaps.GDI32(?,00000068), ref: 02C461D0
    • GetPaletteEntries.GDI32(D6080894,00000000,00000008,?), ref: 02C461E8
    • GetPaletteEntries.GDI32(D6080894,00000008,00000008,?), ref: 02C46200
    • ReleaseDC.USER32(00000000,?), ref: 02C4621C
    Memory Dump Source
    • Source File: 00000020.00000002.1629785315.0000000002B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 02B60000, based on PE: true
    • Associated: 00000020.00000002.1629751702.0000000002B60000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629918239.0000000002C6F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629951953.0000000002C70000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629988721.0000000002C71000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630023350.0000000002C75000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630059756.0000000002C76000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630153321.0000000002C80000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630194479.0000000002C81000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C82000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C84000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_32_2_2b60000_rundll32.jbxd
    Similarity
    • API ID: EntriesPalette$CapsDeviceRelease
    • String ID:
    • API String ID: 3128150645-0
    • Opcode ID: a2a65a8cffcfbcf1f080c704d80b1f8efaefa31f867518b8ab98909dd2f032ad
    • Instruction ID: 8dc8c2ae8a5d110fc3785023fe53d338a2ba847e014631629a153b98da0b9be7
    • Opcode Fuzzy Hash: a2a65a8cffcfbcf1f080c704d80b1f8efaefa31f867518b8ab98909dd2f032ad
    • Instruction Fuzzy Hash: 00110431A88344BEFB51DBA8E841F6A7BEDEB09B00F5084D6F614EA1C0DBB69404C720
    APIs
    • GetThreadLocale.KERNEL32(00000004,?,00000000,?,00000200,00000000,02B83D0B), ref: 02B83CAE
    • GetDateFormatW.KERNEL32(00000000,00000004,?,00000000,?,00000200,00000000,02B83D0B), ref: 02B83CB4
    Strings
    Memory Dump Source
    • Source File: 00000020.00000002.1629785315.0000000002B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 02B60000, based on PE: true
    • Associated: 00000020.00000002.1629751702.0000000002B60000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629918239.0000000002C6F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629951953.0000000002C70000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629988721.0000000002C71000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630023350.0000000002C75000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630059756.0000000002C76000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630153321.0000000002C80000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630194479.0000000002C81000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C82000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C84000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_32_2_2b60000_rundll32.jbxd
    Similarity
    • API ID: DateFormatLocaleThread
    • String ID: $yyyy
    • API String ID: 3303714858-404527807
    • Opcode ID: 2bd26d82cce11ccc0d28c57afd85f9c2e9b44da8c6c0a8258cf4b096bacc716d
    • Instruction ID: b788fa94338e74d8926fe11a5a0d29c3295b2c0c4fa55965ede8750c7f89ddb3
    • Opcode Fuzzy Hash: 2bd26d82cce11ccc0d28c57afd85f9c2e9b44da8c6c0a8258cf4b096bacc716d
    • Instruction Fuzzy Hash: 46214175A04618ABDB11EF98C895ABEB3F9EF08B00F5140E5FD09E7250E7349E40CBA5
    APIs
    • GetObjectW.GDI32(?,00000000,00000000), ref: 02C43EF7
    • GetObjectW.GDI32(?,00000010,?), ref: 02C43F0A
    • GetObjectW.GDI32(?,00000000,?), ref: 02C43F63
    Memory Dump Source
    • Source File: 00000020.00000002.1629785315.0000000002B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 02B60000, based on PE: true
    • Associated: 00000020.00000002.1629751702.0000000002B60000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629918239.0000000002C6F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629951953.0000000002C70000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629988721.0000000002C71000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630023350.0000000002C75000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630059756.0000000002C76000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630153321.0000000002C80000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630194479.0000000002C81000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C82000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C84000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_32_2_2b60000_rundll32.jbxd
    Similarity
    • API ID: Object
    • String ID:
    • API String ID: 2936123098-0
    • Opcode ID: 1d851fb5a1027d62b7a44852b74bd73f75ab3924783baef76ace4e0b5034ca88
    • Instruction ID: 1c0825ca394dc220887b0c525c79fd2ec9279cbc1ec75ec430ffd36bef982f27
    • Opcode Fuzzy Hash: 1d851fb5a1027d62b7a44852b74bd73f75ab3924783baef76ace4e0b5034ca88
    • Instruction Fuzzy Hash: A931A171604784AFE721DF69C880D6BBBF9EF89210B2485EAF955DB601D731E900CB20
    APIs
    • GetThreadUILanguage.KERNEL32(?,00000000), ref: 02B6C9A9
    • SetThreadPreferredUILanguages.KERNEL32(00000004,?,?), ref: 02B6CA07
    • SetThreadPreferredUILanguages.KERNEL32(00000000,00000000,?), ref: 02B6CA64
    • SetThreadPreferredUILanguages.KERNEL32(00000008,?,?), ref: 02B6CA97
      • Part of subcall function 02B6C954: GetThreadPreferredUILanguages.KERNEL32(00000038,?,00000000,?,?,00000000,?,?,02B6CA15), ref: 02B6C96B
      • Part of subcall function 02B6C954: GetThreadPreferredUILanguages.KERNEL32(00000038,?,00000000,?,?,?,02B6CA15), ref: 02B6C988
    Memory Dump Source
    • Source File: 00000020.00000002.1629785315.0000000002B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 02B60000, based on PE: true
    • Associated: 00000020.00000002.1629751702.0000000002B60000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629918239.0000000002C6F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629951953.0000000002C70000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629988721.0000000002C71000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630023350.0000000002C75000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630059756.0000000002C76000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630153321.0000000002C80000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630194479.0000000002C81000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C82000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C84000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_32_2_2b60000_rundll32.jbxd
    Similarity
    • API ID: Thread$LanguagesPreferred$Language
    • String ID:
    • API String ID: 2255706666-0
    • Opcode ID: 0b000afb18e6dacb890c1427d88aff219a8a18e208d7499ce094eca533e465cc
    • Instruction ID: 6815aec142befa7d29a85ae10ff48a89cf8f0c66fec4df768f64e3273db8ecca
    • Opcode Fuzzy Hash: 0b000afb18e6dacb890c1427d88aff219a8a18e208d7499ce094eca533e465cc
    • Instruction Fuzzy Hash: 19313C71E0011AABDB10DFE9C88CBBEB7B9FF04304F4045A6D5A5E7285DB799A05CB90
    APIs
      • Part of subcall function 02C44778: EnterCriticalSection.KERNEL32(02C7DE34,?,02C44858,?,?,?,?,?,?,?,?,00000000,02C44870,?,02C7DE34), ref: 02C44780
      • Part of subcall function 02C44778: LeaveCriticalSection.KERNEL32(02C7DE34,02C7DE34,?,02C44858,?,?,?,?,?,?,?,?,00000000,02C44870,?,02C7DE34), ref: 02C4478D
      • Part of subcall function 02C44778: EnterCriticalSection.KERNEL32(?,02C7DE34,02C7DE34,?,02C44858,?,?,?,?,?,?,?,?,00000000,02C44870), ref: 02C44796
      • Part of subcall function 02C4C31C: GetDC.USER32(00000000), ref: 02C4C372
      • Part of subcall function 02C4C31C: GetDeviceCaps.GDI32(00000000,0000000C), ref: 02C4C387
      • Part of subcall function 02C4C31C: GetDeviceCaps.GDI32(00000000,0000000E), ref: 02C4C391
      • Part of subcall function 02C4C31C: CreateHalftonePalette.GDI32(00000000,00000000,?,?,?,?,02C4A7DB,00000000,02C4A867), ref: 02C4C3B5
      • Part of subcall function 02C4C31C: ReleaseDC.USER32(00000000,00000000), ref: 02C4C3C0
    • CreateCompatibleDC.GDI32(00000000), ref: 02C4A7DD
    • SelectObject.GDI32(00000000,?), ref: 02C4A7F6
    • SelectPalette.GDI32(00000000,?,000000FF), ref: 02C4A81F
    • RealizePalette.GDI32(00000000), ref: 02C4A82B
    Memory Dump Source
    • Source File: 00000020.00000002.1629785315.0000000002B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 02B60000, based on PE: true
    • Associated: 00000020.00000002.1629751702.0000000002B60000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629918239.0000000002C6F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629951953.0000000002C70000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629988721.0000000002C71000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630023350.0000000002C75000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630059756.0000000002C76000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630153321.0000000002C80000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630194479.0000000002C81000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C82000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C84000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_32_2_2b60000_rundll32.jbxd
    Similarity
    • API ID: CriticalPaletteSection$CapsCreateDeviceEnterSelect$CompatibleHalftoneLeaveObjectRealizeRelease
    • String ID:
    • API String ID: 979337279-0
    • Opcode ID: 3ffb5b68a314d74de448ab402795954848f4e81c571fd387d96d0ffce98dac54
    • Instruction ID: 980246a6a0aa217ced291307bef745ff303727a1619760b847d4747a2f910801
    • Opcode Fuzzy Hash: 3ffb5b68a314d74de448ab402795954848f4e81c571fd387d96d0ffce98dac54
    • Instruction Fuzzy Hash: D731F434A44644EFD714EB69C980D5EB3F6EF48710BA241A1E804AB321CB30EE81EF90
    APIs
    Memory Dump Source
    • Source File: 00000020.00000002.1629785315.0000000002B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 02B60000, based on PE: true
    • Associated: 00000020.00000002.1629751702.0000000002B60000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629918239.0000000002C6F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629951953.0000000002C70000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629988721.0000000002C71000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630023350.0000000002C75000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630059756.0000000002C76000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630153321.0000000002C80000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630194479.0000000002C81000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C82000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C84000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_32_2_2b60000_rundll32.jbxd
    Similarity
    • API ID: Object$Delete$IconInfo
    • String ID:
    • API String ID: 507670407-0
    • Opcode ID: 62707a7b9c379f47bdc47e7f9b3d02683a1ec267ff676a91bf67981d69d354d7
    • Instruction ID: 33fe048e49f18023b27204cdb7ed385d0312e7a2bca8273dcd206aebc5d999dc
    • Opcode Fuzzy Hash: 62707a7b9c379f47bdc47e7f9b3d02683a1ec267ff676a91bf67981d69d354d7
    • Instruction Fuzzy Hash: 3C111C75A00208AFAB04DFA9D981C9EB7F9FB88310B5585A5A915D7250DB31EE00AA90
    APIs
    • FindResourceW.KERNEL32(?,?,?,?,?,?,00000000,?,02C0A7FE,00000000,?), ref: 02C0A927
    • LoadResource.KERNEL32(?,?,?,?,?,?,?,?,00000000,?,02C0A7FE,00000000,?), ref: 02C0A941
    • SizeofResource.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,?,02C0A7FE,00000000,?), ref: 02C0A95B
    • LockResource.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?,00000000,?,02C0A7FE,00000000), ref: 02C0A965
    Memory Dump Source
    • Source File: 00000020.00000002.1629785315.0000000002B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 02B60000, based on PE: true
    • Associated: 00000020.00000002.1629751702.0000000002B60000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629918239.0000000002C6F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629951953.0000000002C70000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629988721.0000000002C71000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630023350.0000000002C75000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630059756.0000000002C76000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630153321.0000000002C80000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630194479.0000000002C81000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C82000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C84000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_32_2_2b60000_rundll32.jbxd
    Similarity
    • API ID: Resource$FindLoadLockSizeof
    • String ID:
    • API String ID: 3473537107-0
    • Opcode ID: fc04eeb3631007fa40f9e630dbcfa29d272b4c52aaff94a3e4b6f83a4223a638
    • Instruction ID: b1e511ae4608ce4bb61cdceb961cf93b5e2a35c1fd5c628e3f741106777e8898
    • Opcode Fuzzy Hash: fc04eeb3631007fa40f9e630dbcfa29d272b4c52aaff94a3e4b6f83a4223a638
    • Instruction Fuzzy Hash: 3DF03CB36052047F5748FE6CA880E6F77EDEF8926035001AAFA18D7345DA30DE025B79
    APIs
    • GetDC.USER32(00000000), ref: 02C4EDD9
    • SelectObject.GDI32(00000000,058A00B4), ref: 02C4EDEB
    • GetTextMetricsW.GDI32(00000000), ref: 02C4EDF6
    • ReleaseDC.USER32(00000000,00000000), ref: 02C4EE07
    Memory Dump Source
    • Source File: 00000020.00000002.1629785315.0000000002B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 02B60000, based on PE: true
    • Associated: 00000020.00000002.1629751702.0000000002B60000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629918239.0000000002C6F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629951953.0000000002C70000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629988721.0000000002C71000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630023350.0000000002C75000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630059756.0000000002C76000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630153321.0000000002C80000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630194479.0000000002C81000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C82000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C84000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_32_2_2b60000_rundll32.jbxd
    Similarity
    • API ID: MetricsObjectReleaseSelectText
    • String ID:
    • API String ID: 2013942131-0
    • Opcode ID: d0001d2a86392a042f6f76adb36a2a3019db7900231a6df8f44a893e2606f3d8
    • Instruction ID: eb0c0f7218c1ce11a07c6ecdfc9a155021ac56a499d84f676cdb1eafaeb658ce
    • Opcode Fuzzy Hash: d0001d2a86392a042f6f76adb36a2a3019db7900231a6df8f44a893e2606f3d8
    • Instruction Fuzzy Hash: 61E086526425B132D75161651D85BDB269D8F426E5F4901D0FD64992C0EF06CE1097F3
    APIs
    • SetDIBits.GDI32(00000000,00000000), ref: 02C4ECF4
    Strings
    Memory Dump Source
    • Source File: 00000020.00000002.1629785315.0000000002B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 02B60000, based on PE: true
    • Associated: 00000020.00000002.1629751702.0000000002B60000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629918239.0000000002C6F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629951953.0000000002C70000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629988721.0000000002C71000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630023350.0000000002C75000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630059756.0000000002C76000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630153321.0000000002C80000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630194479.0000000002C81000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C82000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C84000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_32_2_2b60000_rundll32.jbxd
    Similarity
    • API ID: Bits
    • String ID: $,
    • API String ID: 3573556081-71045815
    • Opcode ID: f6d7b365fd2d492e20ddaa3e732f8eabbe6990316118a2da1408328edddb8e35
    • Instruction ID: f9770e80d248156505c2ea345f06d40e45827c1d916059ec90b660ade885a3e4
    • Opcode Fuzzy Hash: f6d7b365fd2d492e20ddaa3e732f8eabbe6990316118a2da1408328edddb8e35
    • Instruction Fuzzy Hash: D051D075A00208AFDB40DFA9D884E9EB7F9FB48314F5181A5E915EB361DB30EE04CB10
    APIs
    • GetDIBits.GDI32(00000000,00000000,00000000,?,?,0000002C,00000000), ref: 02C4E4B2
    Strings
    Memory Dump Source
    • Source File: 00000020.00000002.1629785315.0000000002B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 02B60000, based on PE: true
    • Associated: 00000020.00000002.1629751702.0000000002B60000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629918239.0000000002C6F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629951953.0000000002C70000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629988721.0000000002C71000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630023350.0000000002C75000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630059756.0000000002C76000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630153321.0000000002C80000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630194479.0000000002C81000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C82000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C84000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_32_2_2b60000_rundll32.jbxd
    Similarity
    • API ID: Bits
    • String ID: $,
    • API String ID: 3573556081-71045815
    • Opcode ID: f89da9f29483c14b7df78e09a9896aa6a98fab68bc8d55833a6d853a94ee915f
    • Instruction ID: a6f8fefd363a17c1b0e246145196d6d109ee01917635572f9437e0dc15dbe459
    • Opcode Fuzzy Hash: f89da9f29483c14b7df78e09a9896aa6a98fab68bc8d55833a6d853a94ee915f
    • Instruction Fuzzy Hash: 104125B1A10104AFDB40DFA8C884A9A77FAFF49314B5251A1EC09EB255DB70ED45CF91
    APIs
    • VirtualFree.KERNEL32(?,?,00004000), ref: 02C68BFD
    • VirtualProtect.KERNEL32(?,?,?,?,?), ref: 02C68C82
    Strings
    • FinalizeSections: VirtualProtect failed, xrefs: 02C68C90
    Memory Dump Source
    • Source File: 00000020.00000002.1629785315.0000000002B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 02B60000, based on PE: true
    • Associated: 00000020.00000002.1629751702.0000000002B60000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629918239.0000000002C6F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629951953.0000000002C70000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629988721.0000000002C71000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630023350.0000000002C75000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630059756.0000000002C76000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630153321.0000000002C80000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630194479.0000000002C81000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C82000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C84000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_32_2_2b60000_rundll32.jbxd
    Similarity
    • API ID: Virtual$FreeProtect
    • String ID: FinalizeSections: VirtualProtect failed
    • API String ID: 2581862158-3584865983
    • Opcode ID: 106a674d75456394c40cbd14f3e703be467fec61811ed34d3ad9f249d72e33ee
    • Instruction ID: 3f6a7ad1787658d3e9a796dbec8170dac6f5c2c997d07e01d3e0c2daadd3b756
    • Opcode Fuzzy Hash: 106a674d75456394c40cbd14f3e703be467fec61811ed34d3ad9f249d72e33ee
    • Instruction Fuzzy Hash: 3D311674702605AFDB10DB5CC9C9FAAB7EABF48344F154280EA54DB3A1C334EA48DB90
    APIs
    • CharUpperW.USER32(?,00000000,?,00000000,00000000,00000000,00000000,?,?,?,00000000,02B8BB77,00000000,02B8BCB7), ref: 02B88707
    Strings
    Memory Dump Source
    • Source File: 00000020.00000002.1629785315.0000000002B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 02B60000, based on PE: true
    • Associated: 00000020.00000002.1629751702.0000000002B60000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629918239.0000000002C6F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629951953.0000000002C70000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629988721.0000000002C71000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630023350.0000000002C75000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630059756.0000000002C76000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630153321.0000000002C80000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630194479.0000000002C81000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C82000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C84000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_32_2_2b60000_rundll32.jbxd
    Similarity
    • API ID: CharUpper
    • String ID: A$Z
    • API String ID: 9403516-4098844585
    • Opcode ID: 0853d31e4c62cbf45948dc29de724639dcf269313cc23831c9dadc14004e3c7b
    • Instruction ID: e3f3dfd4ebf8ba9a252b44e37c43e93a55469bfe0631304f60f114c1585e6508
    • Opcode Fuzzy Hash: 0853d31e4c62cbf45948dc29de724639dcf269313cc23831c9dadc14004e3c7b
    • Instruction Fuzzy Hash: 181138267456181BE73074BE9C95BFBA68BDB863A0FC902BAE549C72C0D9488C41C3D1
    APIs
    • SetEnhMetaFileBits.GDI32(0000006C,?,00000000,02C499F3), ref: 02C499AB
    Strings
    Memory Dump Source
    • Source File: 00000020.00000002.1629785315.0000000002B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 02B60000, based on PE: true
    • Associated: 00000020.00000002.1629751702.0000000002B60000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629918239.0000000002C6F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629951953.0000000002C70000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629988721.0000000002C71000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630023350.0000000002C75000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630059756.0000000002C76000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630153321.0000000002C80000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630194479.0000000002C81000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C82000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C84000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_32_2_2b60000_rundll32.jbxd
    Similarity
    • API ID: BitsFileMeta
    • String ID: EMF$l
    • API String ID: 858000408-2398670571
    • Opcode ID: b58c4b27d9b1ddba5a2458b2db7130fc9bc2c4a9a50b1ac3cc495161c88b081f
    • Instruction ID: 755b1638cdc4763fa529ccbcaf163b093aa796421989dd9024b7259f8c49d624
    • Opcode Fuzzy Hash: b58c4b27d9b1ddba5a2458b2db7130fc9bc2c4a9a50b1ac3cc495161c88b081f
    • Instruction Fuzzy Hash: 76213831A00218DFDB10EFA8C890A6FB7FAFF89710F544269D409AB249DB34AD01DF95
    APIs
    • GetModuleHandleW.KERNEL32(kernel32.dll,?,02C6E4DB,00000000,02C6E512), ref: 02B889F2
      • Part of subcall function 02B739B0: GetProcAddress.KERNEL32(02B9C998,?), ref: 02B739DA
    Strings
    Memory Dump Source
    • Source File: 00000020.00000002.1629785315.0000000002B61000.00000020.00000001.01000000.00000003.sdmp, Offset: 02B60000, based on PE: true
    • Associated: 00000020.00000002.1629751702.0000000002B60000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629918239.0000000002C6F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629951953.0000000002C70000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1629988721.0000000002C71000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630023350.0000000002C75000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630059756.0000000002C76000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630086496.0000000002C7F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630153321.0000000002C80000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630194479.0000000002C81000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C82000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000020.00000002.1630237473.0000000002C84000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_32_2_2b60000_rundll32.jbxd
    Similarity
    • API ID: AddressHandleModuleProc
    • String ID: GetDiskFreeSpaceExW$kernel32.dll
    • API String ID: 1646373207-1127948838
    • Opcode ID: 381e5972efbc0a339dbfce02009ff6fcb62c05b502eaeb6a5217066d954b40c7
    • Instruction ID: fef023ad1dd61e099b6b7da1d70d83b60071c749c016cb40e4f8e1f39e53ef06
    • Opcode Fuzzy Hash: 381e5972efbc0a339dbfce02009ff6fcb62c05b502eaeb6a5217066d954b40c7
    • Instruction Fuzzy Hash: 44D05E61A9038B4BE751BAE27484B122B95E300A09B8026E9F32F49A42C7B28410D641