Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
sGfciyumij.exe

Overview

General Information

Sample name:sGfciyumij.exe
renamed because original name is a hash value
Original sample name:499d69d5ab8ba263975d5780e3b639a2a8905c50f2a1379bf972889c3913add4.exe
Analysis ID:1509587
MD5:0c3dda927e649661441905cd181c7e70
SHA1:469bb0c2e694535b62cbd0def0eeb92b43948bea
SHA256:499d69d5ab8ba263975d5780e3b639a2a8905c50f2a1379bf972889c3913add4
Tags:62-192-173-45exe
Infos:

Detection

BruteRatel
Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected BruteRatel
AI detected suspicious sample
Found direct / indirect Syscall (likely to bypass EDR)
Modifies the context of a thread in another process (thread injection)
Sets debug register (to hijack the execution of another thread)
AV process strings found (often used to terminate AV products)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to launch a program with higher privileges
Contains functionality to query locales information (e.g. system language)
Contains functionality to query network adapater information
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Found potential string decryption / allocating functions
PE file contains an invalid checksum
PE file contains sections with non-standard names
Sample file is different than original file name gathered from version info
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • sGfciyumij.exe (PID: 5144 cmdline: "C:\Users\user\Desktop\sGfciyumij.exe" MD5: 0C3DDA927E649661441905CD181C7E70)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Brute Ratel C4, BruteRatelBrute Ratel is a a Customized Command and Control Center for Red Team and Adversary SimulationSMB and TCP payloads provide functionality to write custom external C2 channels over legitimate websites such as Slack, Discord, Microsoft Teams and more.Built-in debugger to detect EDR userland hooks.Ability to keep memory artifacts hidden from EDRs and AV.Direct Windows SYS calls on the fly.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.brute_ratel_c4
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.3387407913.000000000050C000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_BruteRatel_2Yara detected BruteRatelJoe Security
    Process Memory Space: sGfciyumij.exe PID: 5144JoeSecurity_BruteRatel_2Yara detected BruteRatelJoe Security
      No Sigma rule has matched
      No Suricata rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: sGfciyumij.exeReversingLabs: Detection: 36%
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_00000001400481B0 BCryptOpenAlgorithmProvider,BCryptGetProperty,BCryptGetProperty,BCryptCreateHash,BCryptHashData,BCryptFinishHash,BCryptCloseAlgorithmProvider,BCryptDestroyHash,0_2_00000001400481B0
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_0000000140048540 BCryptOpenAlgorithmProvider,BCryptImportKeyPair,BCryptVerifySignature,BCryptDestroyKey,BCryptDestroyKey,BCryptCloseAlgorithmProvider,0_2_0000000140048540
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_00000001400488E0 BCryptOpenAlgorithmProvider,BCryptDestroyKey,BCryptCloseAlgorithmProvider,BCryptImportKeyPair,BCryptVerifySignature,BCryptDestroyKey,0_2_00000001400488E0
      Source: Binary string: D:\Jenkins\workspace\N_MBAMWsc\bin\x64\Release\MBAMwsc.pdb source: sGfciyumij.exe
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_0000000140057D00 FindFirstFileW,GetLastError,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_0000000140057D00
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_0000000140035830 GetWindowsDirectoryW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,GetLogicalDriveStringsW,QueryDosDeviceW,_invalid_parameter_noinfo_noreturn,Concurrency::cancel_current_task,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_0000000140035830
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: global trafficDNS traffic detected: DNS query: weblineinfo.com
      Source: sGfciyumij.exe, 00000000.00000002.3387470070.0000000000576000.00000004.00000020.00020000.00000000.sdmp, sGfciyumij.exe, 00000000.00000002.3387470070.000000000059D000.00000004.00000020.00020000.00000000.sdmp, sGfciyumij.exe, 00000000.00000002.3387407913.000000000050C000.00000004.00000020.00020000.00000000.sdmp, sGfciyumij.exe, 00000000.00000003.3111896816.0000000000576000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://weblineinfo.com/
      Source: sGfciyumij.exe, 00000000.00000002.3387407913.000000000050C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://weblineinfo.com/1-46d0-b6b6-535557bcc5fahE
      Source: sGfciyumij.exe, 00000000.00000002.3387470070.000000000059D000.00000004.00000020.00020000.00000000.sdmp, sGfciyumij.exe, 00000000.00000003.3111870213.000000000059D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://weblineinfo.com/N
      Source: sGfciyumij.exe, 00000000.00000002.3387407913.000000000050C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://weblineinfo.com/user
      Source: sGfciyumij.exe, 00000000.00000002.3387470070.0000000000576000.00000004.00000020.00020000.00000000.sdmp, sGfciyumij.exe, 00000000.00000002.3387407913.000000000050C000.00000004.00000020.00020000.00000000.sdmp, sGfciyumij.exe, 00000000.00000002.3387407913.000000000056A000.00000004.00000020.00020000.00000000.sdmp, sGfciyumij.exe, 00000000.00000003.3111896816.0000000000576000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://weblineinfo.com/flags/api/v2/frontend/experimentValues
      Source: sGfciyumij.exe, 00000000.00000002.3387407913.000000000056A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://weblineinfo.com/flags/api/v2/frontend/experimentValues$
      Source: sGfciyumij.exe, 00000000.00000002.3387407913.000000000056A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://weblineinfo.com/flags/api/v2/frontend/experimentValues21
      Source: sGfciyumij.exe, 00000000.00000002.3387407913.000000000056A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://weblineinfo.com/flags/api/v2/frontend/experimentValuesBv_
      Source: sGfciyumij.exe, 00000000.00000002.3387407913.000000000056A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://weblineinfo.com/flags/api/v2/frontend/experimentValuesbu?
      Source: sGfciyumij.exe, 00000000.00000002.3387407913.000000000050C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://weblineinfo.com/flags/api/v2/frontend/experimentValueshqos.dll.muic5fazE
      Source: sGfciyumij.exe, 00000000.00000002.3387407913.000000000050C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://weblineinfo.com/flags/api/v2/frontend/experimentValuesl
      Source: sGfciyumij.exe, 00000000.00000002.3387470070.0000000000576000.00000004.00000020.00020000.00000000.sdmp, sGfciyumij.exe, 00000000.00000003.3111896816.0000000000576000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://weblineinfo.com/flags/api/v2/frontend/experimentValuesz
      Source: sGfciyumij.exe, 00000000.00000002.3387470070.0000000000576000.00000004.00000020.00020000.00000000.sdmp, sGfciyumij.exe, 00000000.00000003.3111896816.0000000000576000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://weblineinfo.com/xf
      Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 53999
      Source: unknownNetwork traffic detected: HTTP traffic on port 53999 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 54000 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 54000
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_0000000140048540 BCryptOpenAlgorithmProvider,BCryptImportKeyPair,BCryptVerifySignature,BCryptDestroyKey,BCryptDestroyKey,BCryptCloseAlgorithmProvider,0_2_0000000140048540
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_00000001400488E0 BCryptOpenAlgorithmProvider,BCryptDestroyKey,BCryptCloseAlgorithmProvider,BCryptImportKeyPair,BCryptVerifySignature,BCryptDestroyKey,0_2_00000001400488E0
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_3_01FDD6CA NtProtectVirtualMemory,0_3_01FDD6CA
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_3_01FDD65A NtAllocateVirtualMemory,0_3_01FDD65A
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_0000000140033A90 NtAllocateVirtualMemory,NtProtectVirtualMemory,0_2_0000000140033A90
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_0000000140033958 NtAllocateVirtualMemory,NtProtectVirtualMemory,0_2_0000000140033958
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_01FF55C0 NtClose,NtTerminateThread,0_2_01FF55C0
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_01FF8149 NtSetContextThread,0_2_01FF8149
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_02014740 NtFreeVirtualMemory,0_2_02014740
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_02014360 NtCreateThreadEx,0_2_02014360
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_02014BE0 NtProtectVirtualMemory,0_2_02014BE0
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_02014FF0 NtQueueApcThread,0_2_02014FF0
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_01FFF3A0 CreateToolhelp32Snapshot,Thread32First,NtSuspendThread,NtResumeThread,NtClose,0_2_01FFF3A0
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_01FF7A50 NtSetContextThread,0_2_01FF7A50
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_020151C0 NtReadVirtualMemory,0_2_020151C0
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_020145F0 NtDuplicateObject,0_2_020145F0
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_00000001400161100_2_0000000140016110
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_000000014000D2F00_2_000000014000D2F0
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_000000014000A9F80_2_000000014000A9F8
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_0000000140046A300_2_0000000140046A30
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_000000014000DA600_2_000000014000DA60
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_0000000140014BA00_2_0000000140014BA0
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_0000000140001D400_2_0000000140001D40
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_000000014003DE8B0_2_000000014003DE8B
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_00000001400290600_2_0000000140029060
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_000000014013A0900_2_000000014013A090
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_000000014001A0B00_2_000000014001A0B0
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_000000014001E1200_2_000000014001E120
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_00000001401581380_2_0000000140158138
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_00000001400101400_2_0000000140010140
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_00000001400031400_2_0000000140003140
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_00000001400451500_2_0000000140045150
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_000000014014F1B40_2_000000014014F1B4
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_00000001400152400_2_0000000140015240
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_00000001400212E00_2_00000001400212E0
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_00000001400253400_2_0000000140025340
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_000000014002E3500_2_000000014002E350
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_00000001401683780_2_0000000140168378
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_00000001401503DC0_2_00000001401503DC
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_00000001400363E30_2_00000001400363E3
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_00000001401663E80_2_00000001401663E8
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_00000001400434900_2_0000000140043490
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_000000014000E4B00_2_000000014000E4B0
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_000000014014D4AC0_2_000000014014D4AC
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_000000014001C4F00_2_000000014001C4F0
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_00000001401435100_2_0000000140143510
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_00000001401755340_2_0000000140175534
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_00000001400175400_2_0000000140017540
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_00000001400445C00_2_00000001400445C0
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_00000001400415C00_2_00000001400415C0
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_000000014003C5C00_2_000000014003C5C0
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_000000014002D6000_2_000000014002D600
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_00000001400216200_2_0000000140021620
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_00000001400456300_2_0000000140045630
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_00000001400416400_2_0000000140041640
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_00000001401656780_2_0000000140165678
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_000000014003F6B00_2_000000014003F6B0
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_000000014014D6B00_2_000000014014D6B0
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_000000014002A6C00_2_000000014002A6C0
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_000000014015C7140_2_000000014015C714
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_00000001401507E00_2_00000001401507E0
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_00000001400358300_2_0000000140035830
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_000000014014D8BC0_2_000000014014D8BC
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_00000001400378E00_2_00000001400378E0
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_000000014016193C0_2_000000014016193C
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_00000001400149300_2_0000000140014930
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_00000001400049600_2_0000000140004960
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_00000001401689F80_2_00000001401689F8
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_0000000140169A180_2_0000000140169A18
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_0000000140041A200_2_0000000140041A20
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_0000000140159A800_2_0000000140159A80
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_000000014014DAC00_2_000000014014DAC0
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_0000000140025AF00_2_0000000140025AF0
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_0000000140163AE80_2_0000000140163AE8
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_000000014000EBD00_2_000000014000EBD0
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_000000014003CC800_2_000000014003CC80
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_000000014014DCCC0_2_000000014014DCCC
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_000000014014EE300_2_000000014014EE30
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_000000014001CE500_2_000000014001CE50
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_000000014015BEC00_2_000000014015BEC0
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_0000000140020EC00_2_0000000140020EC0
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_000000014014DED00_2_000000014014DED0
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_0000000140167EE40_2_0000000140167EE4
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_0000000140043F300_2_0000000140043F30
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_0000000140159F8C0_2_0000000140159F8C
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_000000014002FFD00_2_000000014002FFD0
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_01FF55C00_2_01FF55C0
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_020102100_2_02010210
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_020072200_2_02007220
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_01FE99D00_2_01FE99D0
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_01FF4DB00_2_01FF4DB0
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_01FE5D600_2_01FE5D60
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_020082A00_2_020082A0
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_01FF91200_2_01FF9120
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_020066E00_2_020066E0
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_01FE95000_2_01FE9500
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_01FFA1000_2_01FFA100
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_01FFB4E00_2_01FFB4E0
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_02011F400_2_02011F40
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_02012F600_2_02012F60
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_020013A30_2_020013A3
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_02002BB00_2_02002BB0
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_0200FBC00_2_0200FBC0
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_020128120_2_02012812
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_01FFCBE00_2_01FFCBE0
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_020114900_2_02011490
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_01FEA7300_2_01FEA730
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_01FFBED00_2_01FFBED0
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_01FE66C00_2_01FE66C0
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_020045500_2_02004550
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_01FF16A00_2_01FF16A0
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_01FF42A00_2_01FF42A0
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_0200B5E00_2_0200B5E0
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_020055E00_2_020055E0
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: String function: 0000000140009260 appears 91 times
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: String function: 000000014013D720 appears 43 times
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: String function: 000000014013D238 appears 52 times
      Source: sGfciyumij.exeBinary or memory string: OriginalFilenameMBAMwsc.exe: vs sGfciyumij.exe
      Source: classification engineClassification label: mal72.troj.evad.winEXE@1/0@1/1
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_00000001400412F0 GetCurrentThread,OpenThreadToken,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,CloseHandle,AdjustTokenPrivileges,CloseHandle,0_2_00000001400412F0
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_01FFF3A0 CreateToolhelp32Snapshot,Thread32First,NtSuspendThread,NtResumeThread,NtClose,0_2_01FFF3A0
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_0000000140015240 CoInitializeEx,CoCreateInstance,VariantInit,VariantClear,VariantClear,CoUninitialize,_invalid_parameter_noinfo_noreturn,0_2_0000000140015240
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_0000000140045630 AuthzInitializeResourceManager,GetLastError,AuthzInitializeContextFromSid,GetLastError,AuthzAccessCheck,GetLastError,AuthzFreeContext,AuthzFreeResourceManager,0_2_0000000140045630
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_000000014000EBD0 OpenSCManagerW,GetLastError,OpenServiceW,GetLastError,GetLastError,GetLastError,GetTickCount64,NotifyServiceStatusChangeW,StartServiceW,GetLastError,GetLastError,GetLastError,GetLastError,SleepEx,CloseServiceHandle,CloseServiceHandle,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,CloseServiceHandle,CloseServiceHandle,_invalid_parameter_noinfo_noreturn,CloseServiceHandle,0_2_000000014000EBD0
      Source: C:\Users\user\Desktop\sGfciyumij.exeMutant created: NULL
      Source: sGfciyumij.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\sGfciyumij.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: sGfciyumij.exeReversingLabs: Detection: 36%
      Source: sGfciyumij.exeString found in binary or memory: /launch
      Source: sGfciyumij.exeString found in binary or memory: id-cmc-addExtensions
      Source: sGfciyumij.exeString found in binary or memory: set-addPolicy
      Source: sGfciyumij.exeString found in binary or memory: SOFTWARE\CLASSES\Wow6432Node/disable/uninstall/status/offlineclean/notifyexpire/renew runas/wac/AS/AV/enable/update/launchontrueoffsnoozedexpired/scansubstatusnonerecommendedneeded/settingssubstatus/updatesubstatus( #@
      Source: C:\Users\user\Desktop\sGfciyumij.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\sGfciyumij.exeSection loaded: version.dllJump to behavior
      Source: C:\Users\user\Desktop\sGfciyumij.exeSection loaded: mpr.dllJump to behavior
      Source: C:\Users\user\Desktop\sGfciyumij.exeSection loaded: netapi32.dllJump to behavior
      Source: C:\Users\user\Desktop\sGfciyumij.exeSection loaded: sfc.dllJump to behavior
      Source: C:\Users\user\Desktop\sGfciyumij.exeSection loaded: authz.dllJump to behavior
      Source: C:\Users\user\Desktop\sGfciyumij.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Users\user\Desktop\sGfciyumij.exeSection loaded: sfc_os.dllJump to behavior
      Source: C:\Users\user\Desktop\sGfciyumij.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\sGfciyumij.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\sGfciyumij.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Users\user\Desktop\sGfciyumij.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Users\user\Desktop\sGfciyumij.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Users\user\Desktop\sGfciyumij.exeSection loaded: dhcpcsvc.dllJump to behavior
      Source: C:\Users\user\Desktop\sGfciyumij.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Users\user\Desktop\sGfciyumij.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Users\user\Desktop\sGfciyumij.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\sGfciyumij.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\sGfciyumij.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\Desktop\sGfciyumij.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Users\user\Desktop\sGfciyumij.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Users\user\Desktop\sGfciyumij.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Users\user\Desktop\sGfciyumij.exeSection loaded: winnsi.dllJump to behavior
      Source: C:\Users\user\Desktop\sGfciyumij.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Users\user\Desktop\sGfciyumij.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Users\user\Desktop\sGfciyumij.exeSection loaded: dnsapi.dllJump to behavior
      Source: C:\Users\user\Desktop\sGfciyumij.exeSection loaded: rasadhlp.dllJump to behavior
      Source: C:\Users\user\Desktop\sGfciyumij.exeSection loaded: fwpuclnt.dllJump to behavior
      Source: C:\Users\user\Desktop\sGfciyumij.exeSection loaded: schannel.dllJump to behavior
      Source: C:\Users\user\Desktop\sGfciyumij.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
      Source: sGfciyumij.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
      Source: sGfciyumij.exeStatic PE information: Image base 0x140000000 > 0x60000000
      Source: sGfciyumij.exeStatic file information: File size 2857472 > 1048576
      Source: sGfciyumij.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x181600
      Source: sGfciyumij.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
      Source: sGfciyumij.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
      Source: sGfciyumij.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
      Source: sGfciyumij.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
      Source: sGfciyumij.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
      Source: sGfciyumij.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
      Source: sGfciyumij.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
      Source: Binary string: D:\Jenkins\workspace\N_MBAMWsc\bin\x64\Release\MBAMwsc.pdb source: sGfciyumij.exe
      Source: sGfciyumij.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
      Source: sGfciyumij.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
      Source: sGfciyumij.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
      Source: sGfciyumij.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
      Source: sGfciyumij.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
      Source: sGfciyumij.exeStatic PE information: real checksum: 0x28a8a2 should be: 0x2c58b3
      Source: sGfciyumij.exeStatic PE information: section name: _RDATA
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_0000000140022C5C push rax; retf 001Fh0_2_0000000140022C5D
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_000000014000EBD0 OpenSCManagerW,GetLastError,OpenServiceW,GetLastError,GetLastError,GetLastError,GetTickCount64,NotifyServiceStatusChangeW,StartServiceW,GetLastError,GetLastError,GetLastError,GetLastError,SleepEx,CloseServiceHandle,CloseServiceHandle,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,CloseServiceHandle,CloseServiceHandle,_invalid_parameter_noinfo_noreturn,CloseServiceHandle,0_2_000000014000EBD0
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: GetUserNameW,GetComputerNameExW,GetComputerNameExW,GetTokenInformation,GetNativeSystemInfo,GetAdaptersInfo,GetAdaptersInfo,0_2_02004D00
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_0000000140057D00 FindFirstFileW,GetLastError,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_0000000140057D00
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_0000000140035830 GetWindowsDirectoryW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,GetLogicalDriveStringsW,QueryDosDeviceW,_invalid_parameter_noinfo_noreturn,Concurrency::cancel_current_task,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_0000000140035830
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_0000000140036C70 GetModuleHandleW,GetProcAddress,GetModuleHandleW,GetProcAddress,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,GetSystemInfo,IsWow64Process2,GetCurrentProcess,GetModuleHandleW,GetProcAddress,IsWow64Process,0_2_0000000140036C70
      Source: sGfciyumij.exe, 00000000.00000002.3387470070.0000000000576000.00000004.00000020.00020000.00000000.sdmp, sGfciyumij.exe, 00000000.00000002.3387407913.000000000050C000.00000004.00000020.00020000.00000000.sdmp, sGfciyumij.exe, 00000000.00000003.3111896816.0000000000576000.00000004.00000020.00020000.00000000.sdmp, sGfciyumij.exe, 00000000.00000003.2480948451.0000000000584000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
      Source: sGfciyumij.exe, 00000000.00000003.2132945714.000000000052B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
      Source: C:\Users\user\Desktop\sGfciyumij.exeProcess information queried: ProcessInformationJump to behavior
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_01FECCE0 LdrGetProcedureAddress,0_2_01FECCE0
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_000000014014C1E0 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_000000014014C1E0
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_000000014013CC20 GetLastError,IsDebuggerPresent,OutputDebugStringW,0_2_000000014013CC20
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_0000000140047BE0 GetProcessHeap,HeapAlloc,0_2_0000000140047BE0
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_000000014014C1E0 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_000000014014C1E0
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_000000014013CDB0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_000000014013CDB0

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: C:\Users\user\Desktop\sGfciyumij.exeNtSetContextThread: Indirect: 0x1FF816EJump to behavior
      Source: C:\Users\user\Desktop\sGfciyumij.exeNtSetContextThread: Indirect: 0x1FF7AFEJump to behavior
      Source: C:\Users\user\Desktop\sGfciyumij.exeNtResumeThread: Indirect: 0x1FFF5FAJump to behavior
      Source: C:\Users\user\Desktop\sGfciyumij.exeNtReadVirtualMemory: Indirect: 0x201523CJump to behavior
      Source: C:\Users\user\Desktop\sGfciyumij.exeNtCreateThreadEx: Indirect: 0x201444EJump to behavior
      Source: C:\Users\user\Desktop\sGfciyumij.exeNtQueueApcThread: Indirect: 0x201506AJump to behavior
      Source: C:\Users\user\Desktop\sGfciyumij.exeNtClose: Indirect: 0x1FF6154
      Source: C:\Users\user\Desktop\sGfciyumij.exeNtTerminateThread: Indirect: 0x1FF6165Jump to behavior
      Source: C:\Users\user\Desktop\sGfciyumij.exeNtAllocateVirtualMemory: Indirect: 0x1FDD6C3Jump to behavior
      Source: C:\Users\user\Desktop\sGfciyumij.exeNtProtectVirtualMemory: Indirect: 0x1FDD71FJump to behavior
      Source: C:\Users\user\Desktop\sGfciyumij.exeNtSuspendThread: Indirect: 0x1FFF4F0Jump to behavior
      Source: C:\Users\user\Desktop\sGfciyumij.exeNtClose: Indirect: 0x1FFF626
      Source: C:\Users\user\Desktop\sGfciyumij.exeNtProtectVirtualMemory: Indirect: 0x2014C5CJump to behavior
      Source: C:\Users\user\Desktop\sGfciyumij.exeThread register set: target process: unknownJump to behavior
      Source: C:\Users\user\Desktop\sGfciyumij.exeThread register set: target process: unknownJump to behavior
      Source: C:\Users\user\Desktop\sGfciyumij.exeThread register set: unknown 1Jump to behavior
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_000000014000AD90 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,SysAllocString,ShellExecuteW,0_2_000000014000AD90
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_0000000140040CA0 AllocateAndInitializeSid,0_2_0000000140040CA0
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: EnumSystemLocalesW,GetUserDefaultLCID,ProcessCodePage,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_00000001401750D4
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: TranslateName,TranslateName,GetACP,IsValidCodePage,GetLocaleInfoW,0_2_000000014017468C
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: EnumSystemLocalesW,0_2_00000001401749E8
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: EnumSystemLocalesW,0_2_000000014016CA48
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: EnumSystemLocalesW,0_2_0000000140174AB8
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: GetLocaleInfoW,0_2_000000014016CEC8
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_0000000140174EF0
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_0000000140003140 CoInitializeEx,CoGetClassObject,CallNamedPipeW,Sleep,CallNamedPipeW,SysAllocString,SysFreeString,_invalid_parameter_noinfo_noreturn,GetLocalTime,GetTickCount,SysAllocString,SysAllocString,SysAllocString,SysAllocString,GetCurrentThreadId,GetProcessId,SysFreeString,SysFreeString,SysFreeString,SysFreeString,_invalid_parameter_noinfo_noreturn,GetLocalTime,GetTickCount,SysAllocString,SysAllocString,SysAllocString,SysAllocString,GetCurrentThreadId,GetProcessId,SysFreeString,SysFreeString,SysFreeString,SysFreeString,0_2_0000000140003140
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_02004D00 GetUserNameW,GetComputerNameExW,GetComputerNameExW,GetTokenInformation,GetNativeSystemInfo,GetAdaptersInfo,GetAdaptersInfo,0_2_02004D00
      Source: C:\Users\user\Desktop\sGfciyumij.exeCode function: 0_2_0000000140014930 GetModuleHandleW,GetProcAddress,GetVersionExW,NetWkstaGetInfo,NetApiBufferFree,RegOpenKeyExW,RegQueryValueExW,RegQueryValueExW,RegQueryValueExW,RegCloseKey,VerSetConditionMask,VerifyVersionInfoW,0_2_0000000140014930
      Source: sGfciyumij.exeBinary or memory string: \MBAM.exe

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: 00000000.00000002.3387407913.000000000050C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: sGfciyumij.exe PID: 5144, type: MEMORYSTR

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: 00000000.00000002.3387407913.000000000050C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: sGfciyumij.exe PID: 5144, type: MEMORYSTR
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
      Command and Scripting Interpreter
      1
      Windows Service
      1
      Exploitation for Privilege Escalation
      1
      Access Token Manipulation
      OS Credential Dumping1
      System Time Discovery
      Remote Services11
      Archive Collected Data
      22
      Encrypted Channel
      Exfiltration Over Other Network Medium1
      Data Encrypted for Impact
      CredentialsDomainsDefault Accounts2
      Service Execution
      1
      DLL Side-Loading
      1
      Access Token Manipulation
      2
      Process Injection
      LSASS Memory41
      Security Software Discovery
      Remote Desktop ProtocolData from Removable Media1
      Non-Application Layer Protocol
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
      Windows Service
      1
      Deobfuscate/Decode Files or Information
      Security Account Manager2
      Process Discovery
      SMB/Windows Admin SharesData from Network Shared Drive2
      Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook2
      Process Injection
      1
      Abuse Elevation Control Mechanism
      NTDS1
      Account Discovery
      Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script1
      Abuse Elevation Control Mechanism
      2
      Obfuscated Files or Information
      LSA Secrets1
      System Owner/User Discovery
      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts1
      DLL Side-Loading
      1
      DLL Side-Loading
      Cached Domain Credentials1
      System Network Configuration Discovery
      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync2
      File and Directory Discovery
      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem14
      System Information Discovery
      Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      sGfciyumij.exe37%ReversingLabsWin64.Trojan.InjectedShellCode
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      https://weblineinfo.com/N0%Avira URL Cloudsafe
      https://weblineinfo.com/1-46d0-b6b6-535557bcc5fahE0%Avira URL Cloudsafe
      https://weblineinfo.com/user0%Avira URL Cloudsafe
      https://weblineinfo.com/xf0%Avira URL Cloudsafe
      https://weblineinfo.com/0%Avira URL Cloudsafe
      NameIPActiveMaliciousAntivirus DetectionReputation
      weblineinfo.com
      62.192.173.45
      truefalse
        unknown
        NameSourceMaliciousAntivirus DetectionReputation
        https://weblineinfo.com/xfsGfciyumij.exe, 00000000.00000002.3387470070.0000000000576000.00000004.00000020.00020000.00000000.sdmp, sGfciyumij.exe, 00000000.00000003.3111896816.0000000000576000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        https://weblineinfo.com/NsGfciyumij.exe, 00000000.00000002.3387470070.000000000059D000.00000004.00000020.00020000.00000000.sdmp, sGfciyumij.exe, 00000000.00000003.3111870213.000000000059D000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        https://weblineinfo.com/sGfciyumij.exe, 00000000.00000002.3387470070.0000000000576000.00000004.00000020.00020000.00000000.sdmp, sGfciyumij.exe, 00000000.00000002.3387470070.000000000059D000.00000004.00000020.00020000.00000000.sdmp, sGfciyumij.exe, 00000000.00000002.3387407913.000000000050C000.00000004.00000020.00020000.00000000.sdmp, sGfciyumij.exe, 00000000.00000003.3111896816.0000000000576000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        https://weblineinfo.com/1-46d0-b6b6-535557bcc5fahEsGfciyumij.exe, 00000000.00000002.3387407913.000000000050C000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        https://weblineinfo.com/usersGfciyumij.exe, 00000000.00000002.3387407913.000000000050C000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        62.192.173.45
        weblineinfo.comLithuania
        25780HUGESERVER-NETWORKSUSfalse
        Joe Sandbox version:40.0.0 Tourmaline
        Analysis ID:1509587
        Start date and time:2024-09-11 20:21:12 +02:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 4m 39s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Number of analysed new started processes analysed:4
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:sGfciyumij.exe
        renamed because original name is a hash value
        Original Sample Name:499d69d5ab8ba263975d5780e3b639a2a8905c50f2a1379bf972889c3913add4.exe
        Detection:MAL
        Classification:mal72.troj.evad.winEXE@1/0@1/1
        EGA Information:
        • Successful, ratio: 100%
        HCA Information:
        • Successful, ratio: 77%
        • Number of executed functions: 39
        • Number of non-executed functions: 139
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
        • Report size exceeded maximum capacity and may have missing disassembly code.
        • Report size getting too big, too many NtQueryValueKey calls found.
        • VT rate limit hit for: sGfciyumij.exe
        No simulations
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        62.192.173.4510kmr9d7.dllGet hashmaliciousUnknownBrowse
          10kmr9d7.dllGet hashmaliciousUnknownBrowse
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            weblineinfo.com10kmr9d7.dllGet hashmaliciousUnknownBrowse
            • 62.192.173.45
            10kmr9d7.dllGet hashmaliciousUnknownBrowse
            • 62.192.173.45
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            HUGESERVER-NETWORKSUSsbuvJk8Zn8.exeGet hashmaliciousXenoRATBrowse
            • 2.58.85.196
            10kmr9d7.dllGet hashmaliciousUnknownBrowse
            • 62.192.173.45
            10kmr9d7.dllGet hashmaliciousUnknownBrowse
            • 62.192.173.45
            mirai.spc.elfGet hashmaliciousMiraiBrowse
            • 171.22.79.159
            ClientAny.exeGet hashmaliciousAsyncRAT, VenomRATBrowse
            • 2.58.84.229
            https://denizfirsatgsmtektikbuo.xyz/Get hashmaliciousHTMLPhisherBrowse
            • 2.58.85.5
            x86.elfGet hashmaliciousMirai, MoobotBrowse
            • 107.161.53.91
            lKXAJFq3ih.exeGet hashmaliciousAsyncRATBrowse
            • 2.58.85.145
            peign94sXb.elfGet hashmaliciousUnknownBrowse
            • 171.22.79.111
            jSlv5GLHad.exeGet hashmaliciousLummaC, Glupteba, LummaC Stealer, SmokeLoader, Socks5Systemz, StealcBrowse
            • 185.133.35.50
            No context
            No context
            No created / dropped files found
            File type:PE32+ executable (GUI) x86-64, for MS Windows
            Entropy (8bit):6.631203205093183
            TrID:
            • Win64 Executable GUI (202006/5) 92.65%
            • Win64 Executable (generic) (12005/4) 5.51%
            • Generic Win/DOS Executable (2004/3) 0.92%
            • DOS Executable Generic (2002/1) 0.92%
            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
            File name:sGfciyumij.exe
            File size:2'857'472 bytes
            MD5:0c3dda927e649661441905cd181c7e70
            SHA1:469bb0c2e694535b62cbd0def0eeb92b43948bea
            SHA256:499d69d5ab8ba263975d5780e3b639a2a8905c50f2a1379bf972889c3913add4
            SHA512:edeea381fcc54df4ec9197227b1719e048a6215eb5a015f4f122bcee465b0a968b1a811efab7e49dc04a548a0d04e34befee577f9b88567f9059c83dbd5d43f1
            SSDEEP:49152:IFfXWgsVXeLERcq5a7C2mwXBLM40HR1DldPYcaifCR18Q:NOFMdHXBOca/18
            TLSH:81D59D07D3EA41F9DDB6C2388962D403EBB2B8150770ABCF06A495651FE36E15E3E724
            File Content Preview:MZ......................@...................................0...........!..L.!This program cannot be run in DOS mode....$.......L.-..kC..kC..kC.C.@..kC.C.F..kC..kC..kC...G..kC...@..kC...F.ikC.u....kC.{.G..kC.C.G..kC.f.G..iC.f.F.WkC..kB..jC.C.B./kC.f.J.6kC
            Icon Hash:e9359c7777737333
            Entrypoint:0x14013d6ec
            Entrypoint Section:.text
            Digitally signed:false
            Imagebase:0x140000000
            Subsystem:windows gui
            Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE
            DLL Characteristics:HIGH_ENTROPY_VA
            Time Stamp:0x66688435 [Tue Jun 11 17:07:01 2024 UTC]
            TLS Callbacks:
            CLR (.Net) Version:
            OS Version Major:6
            OS Version Minor:0
            File Version Major:6
            File Version Minor:0
            Subsystem Version Major:6
            Subsystem Version Minor:0
            Import Hash:3e4dc544b32d46ff67e39ad1b3dbfdc4
            Instruction
            dec eax
            sub esp, 28h
            call 00007FA6A8ED06FCh
            dec eax
            add esp, 28h
            jmp 00007FA6A8ED0027h
            int3
            int3
            jmp 00007FA6A8ECF824h
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            nop word ptr [eax+eax+00000000h]
            dec eax
            sub esp, 10h
            dec esp
            mov dword ptr [esp], edx
            dec esp
            mov dword ptr [esp+08h], ebx
            dec ebp
            xor ebx, ebx
            dec esp
            lea edx, dword ptr [esp+18h]
            dec esp
            sub edx, eax
            dec ebp
            cmovb edx, ebx
            dec esp
            mov ebx, dword ptr [00000010h]
            dec ebp
            cmp edx, ebx
            jnc 00007FA6A8ED01C8h
            inc cx
            and edx, 8D4DF000h
            wait
            add al, dh
            Programming Language:
            • [C++] VS2013 UPD4 build 31101
            NameVirtual AddressVirtual Size Is in Section
            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IMPORT0x24aa480x140.rdata
            IMAGE_DIRECTORY_ENTRY_RESOURCE0x26e0000x4e5cc.rsrc
            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x25a0000x124ec.pdata
            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
            IMAGE_DIRECTORY_ENTRY_BASERELOC0x2bd0000x5ff8.reloc
            IMAGE_DIRECTORY_ENTRY_DEBUG0x22f4200x70.rdata
            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
            IMAGE_DIRECTORY_ENTRY_TLS0x22f6000x28.rdata
            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x22f2e00x140.rdata
            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IAT0x1830000x8c8.rdata
            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
            .text0x10000x18151e0x181600729bf26d67970947dc5f52ea3c131bfeFalse0.48268668403340903data6.4811954872775255IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            .rdata0x1830000xc98840xc9a0013a97fcf741931da0bdbe829b11b24b0False0.3742964875232486data5.684406524498899IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .data0x24d0000xce7c0x7800ea53810db83cddffd7b0abf079889430False0.18258463541666667data4.423063086771718IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            .pdata0x25a0000x124ec0x126006cd2363be479f36fafd6aefdfb77faebFalse0.4761373299319728PEX Binary Archive6.138155581624255IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            _RDATA0x26d0000x1f40x20094e583dfe43f0826cf4c77165249ec57False0.521484375data4.201666898260521IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .rsrc0x26e0000x4e5cc0x4e600f7c518deb20c05115ba8730e32950d93False0.8120576654704944data7.279045577242069IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .reloc0x2bd0000x5ff80x6000ced03205d1587997f90d126186c124abFalse0.2732340494791667data5.4500743873909725IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
            NameRVASizeTypeLanguageCountryZLIB Complexity
            RT_ICON0x26e1c00x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536, resolution 80630 x 80630 px/mEnglishUnited States0.1148852478410032
            RT_STRING0x27e9e80x30dataEnglishUnited States0.625
            RT_GROUP_ICON0x27ea180x14dataEnglishUnited States1.15
            RT_VERSION0x27ea2c0x2d4dataEnglishUnited States0.4613259668508287
            RT_ANICURSOR0x27ed000x3d74adata0.9982917663136317
            RT_MANIFEST0x2bc44c0x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
            DLLImport
            CRYPT32.dllCertDuplicateCertificateContext, CertFindCertificateInStore, CertFreeCertificateContext, CertOpenStore, CertCloseStore, CertGetCertificateContextProperty, CertEnumCertificatesInStore
            KERNEL32.dllGlobalFree, ExpandEnvironmentStringsW, GetLongPathNameW, GetWindowsDirectoryW, LocalAlloc, GetCurrentProcessId, GetFileSizeEx, ReadFile, WriteFile, GetFileSize, SetEndOfFile, GetStdHandle, FindNextFileW, FindClose, GetModuleHandleA, GetCurrentDirectoryW, InitializeCriticalSectionAndSpinCount, GetSystemTimeAsFileTime, TerminateProcess, GetStartupInfoW, SetEvent, ResetEvent, ReleaseMutex, CreateMutexW, CreateEventW, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetEnvironmentVariableW, SetEnvironmentVariableW, GetFileType, DeleteFiber, QueryPerformanceCounter, ConvertFiberToThread, GetConsoleMode, SetConsoleMode, ReadConsoleA, ReadConsoleW, WriteConsoleW, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetOEMCP, GetACP, IsValidCodePage, FindFirstFileExW, FlushFileBuffers, GetFileInformationByHandle, DeleteFileW, SetFileAttributesW, RemoveDirectoryW, CreateDirectoryW, GetFileAttributesExW, GetFileAttributesW, FindFirstFileW, WaitForMultipleObjects, GetCurrentThread, LoadLibraryW, GetExitCodeProcess, WaitForSingleObject, CreateProcessW, GlobalAlloc, GetLogicalDriveStringsW, SetLastError, GetNativeSystemInfo, IsWow64Process, CopyFileW, LocalFree, GetCurrentProcess, GetSystemInfo, VerifyVersionInfoW, VerSetConditionMask, GetVersionExW, MultiByteToWideChar, WideCharToMultiByte, OutputDebugStringW, FileTimeToSystemTime, CloseHandle, CreateFileW, GetTimeZoneInformation, SystemTimeToTzSpecificLocalTime, GetLocalTime, GetModuleHandleW, GetProcAddress, GetTickCount, SleepEx, GetTickCount64, GetModuleFileNameW, GetProcessHeap, DeleteCriticalSection, DecodePointer, HeapAlloc, HeapReAlloc, GetLastError, HeapSize, InitializeCriticalSectionEx, HeapFree, SwitchToThread, EnterCriticalSection, LeaveCriticalSection, RtlUnwind, GetFullPathNameW, SetStdHandle, EnumSystemLocalesW, GetUserDefaultLCID, IsValidLocale, GetLocaleInfoW, LCMapStringW, CompareStringW, FlsFree, FlsSetValue, FlsGetValue, FlsAlloc, SetFilePointerEx, GetConsoleOutputCP, GetCommandLineW, GetCommandLineA, PeekNamedPipe, GetDriveTypeW, SetConsoleCtrlHandler, GetModuleHandleExW, ExitProcess, LoadLibraryExW, RtlPcToFileHeader, InterlockedPushEntrySList, RtlUnwindEx, InitializeSListHead, SleepConditionVariableSRW, WakeAllConditionVariable, AcquireSRWLockExclusive, ReleaseSRWLockExclusive, IsProcessorFeaturePresent, SetUnhandledExceptionFilter, UnhandledExceptionFilter, RtlVirtualUnwind, RtlLookupFunctionEntry, RtlCaptureContext, RaiseException, IsDebuggerPresent, GetCPInfo, LCMapStringEx, EncodePointer, GetStringTypeW, FormatMessageW, CallNamedPipeW, GetProcessId, GetCurrentThreadId, Sleep, QueryDosDeviceW, FreeLibrary
            USER32.dllGetProcessWindowStation, MessageBoxW, GetUserObjectInformationW
            ADVAPI32.dllSetEntriesInAclW, CheckTokenMembership, FreeSid, StartServiceW, NotifyServiceStatusChangeW, CloseServiceHandle, RegOpenKeyExW, RegQueryValueExW, RegCloseKey, RegEnumKeyExW, IsTextUnicode, OpenThreadToken, OpenProcessToken, OpenSCManagerW, OpenServiceW, QueryServiceStatusEx, CryptEnumProvidersW, CryptSignHashW, CryptDecrypt, CryptExportKey, CryptGetUserKey, CryptGetProvParam, CryptSetHashParam, CryptDestroyKey, ReportEventW, RegisterEventSourceW, DeregisterEventSource, CryptDestroyHash, CryptReleaseContext, CryptCreateHash, CryptAcquireContextW, CreateWellKnownSid, GetSidSubAuthority, GetSidSubAuthorityCount, AreAllAccessesGranted, MapGenericMask, ConvertStringSidToSidW, ConvertSidToStringSidW, AdjustTokenPrivileges, LookupPrivilegeValueW, RegUnLoadKeyW, RegSetValueExW, RegSaveKeyW, RegRestoreKeyW, RegQueryInfoKeyW, RegLoadAppKeyW, RegLoadKeyW, RegEnumValueW, RegEnumKeyW, RegDeleteValueW, RegDeleteKeyW, RegCreateKeyExW, TreeSetNamedSecurityInfoW, SetSecurityInfo, GetSecurityInfo, SetNamedSecurityInfoW, GetNamedSecurityInfoW, DeleteAce, GetExplicitEntriesFromAclW, QueryServiceConfigW, AllocateAndInitializeSid
            SHELL32.dllSHGetFolderPathW, ShellExecuteW
            ole32.dllCoUninitialize, CoInitializeEx, CoGetClassObject, CoCreateInstance, StringFromGUID2
            OLEAUT32.dllSystemTimeToVariantTime, VariantInit, VariantClear, VariantTimeToSystemTime, VariantChangeType, SysFreeString, SysAllocString
            VERSION.dllVerQueryValueW, GetFileVersionInfoW, GetFileVersionInfoSizeW
            MPR.dllWNetGetConnectionW
            NETAPI32.dllNetApiBufferFree, NetWkstaGetInfo
            PSAPI.DLLGetProcessImageFileNameW
            sfc.dllSfcIsFileProtected
            AUTHZ.dllAuthzInitializeContextFromSid, AuthzAccessCheck, AuthzFreeContext, AuthzFreeResourceManager, AuthzInitializeResourceManager
            bcrypt.dllBCryptGetProperty, BCryptGenRandom, BCryptCreateHash, BCryptHashData, BCryptImportKeyPair, BCryptDestroyHash, BCryptCloseAlgorithmProvider, BCryptFinishHash, BCryptDestroyKey, BCryptVerifySignature, BCryptOpenAlgorithmProvider
            WS2_32.dllrecv, send, WSACleanup, WSAStartup, WSAGetLastError, WSASetLastError, closesocket
            Language of compilation systemCountry where language is spokenMap
            EnglishUnited States
            TimestampSource PortDest PortSource IPDest IP
            Sep 11, 2024 20:22:18.942310095 CEST49706443192.168.2.562.192.173.45
            Sep 11, 2024 20:22:18.942389965 CEST4434970662.192.173.45192.168.2.5
            Sep 11, 2024 20:22:18.942523003 CEST49706443192.168.2.562.192.173.45
            Sep 11, 2024 20:22:18.954622984 CEST49706443192.168.2.562.192.173.45
            Sep 11, 2024 20:22:18.954655886 CEST4434970662.192.173.45192.168.2.5
            Sep 11, 2024 20:22:51.020116091 CEST49706443192.168.2.562.192.173.45
            Sep 11, 2024 20:23:22.047103882 CEST53999443192.168.2.562.192.173.45
            Sep 11, 2024 20:23:22.047148943 CEST4435399962.192.173.45192.168.2.5
            Sep 11, 2024 20:23:22.047239065 CEST53999443192.168.2.562.192.173.45
            Sep 11, 2024 20:23:22.047689915 CEST53999443192.168.2.562.192.173.45
            Sep 11, 2024 20:23:22.047712088 CEST4435399962.192.173.45192.168.2.5
            Sep 11, 2024 20:23:54.114371061 CEST53999443192.168.2.562.192.173.45
            Sep 11, 2024 20:24:20.178037882 CEST54000443192.168.2.562.192.173.45
            Sep 11, 2024 20:24:20.178132057 CEST4435400062.192.173.45192.168.2.5
            Sep 11, 2024 20:24:20.178246021 CEST54000443192.168.2.562.192.173.45
            Sep 11, 2024 20:24:20.178653955 CEST54000443192.168.2.562.192.173.45
            Sep 11, 2024 20:24:20.178689957 CEST4435400062.192.173.45192.168.2.5
            TimestampSource PortDest PortSource IPDest IP
            Sep 11, 2024 20:22:18.920835018 CEST5587953192.168.2.51.1.1.1
            Sep 11, 2024 20:22:18.936714888 CEST53558791.1.1.1192.168.2.5
            Sep 11, 2024 20:22:35.870491982 CEST53513471.1.1.1192.168.2.5
            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
            Sep 11, 2024 20:22:18.920835018 CEST192.168.2.51.1.1.10x59d7Standard query (0)weblineinfo.comA (IP address)IN (0x0001)false
            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
            Sep 11, 2024 20:22:18.936714888 CEST1.1.1.1192.168.2.50x59d7No error (0)weblineinfo.com62.192.173.45A (IP address)IN (0x0001)false

            Click to jump to process

            Click to jump to process

            Click to dive into process behavior distribution

            Target ID:0
            Start time:14:22:15
            Start date:11/09/2024
            Path:C:\Users\user\Desktop\sGfciyumij.exe
            Wow64 process (32bit):false
            Commandline:"C:\Users\user\Desktop\sGfciyumij.exe"
            Imagebase:0x140000000
            File size:2'857'472 bytes
            MD5 hash:0C3DDA927E649661441905CD181C7E70
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Yara matches:
            • Rule: JoeSecurity_BruteRatel_2, Description: Yara detected BruteRatel, Source: 00000000.00000002.3387407913.000000000050C000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
            Reputation:low
            Has exited:false

            Reset < >

              Execution Graph

              Execution Coverage:3.5%
              Dynamic/Decrypted Code Coverage:42.3%
              Signature Coverage:40.1%
              Total number of Nodes:723
              Total number of Limit Nodes:29
              execution_graph 55543 2014be0 55545 2014c02 55543->55545 55544 2014c5e 55545->55544 55546 2014c5c NtProtectVirtualMemory 55545->55546 55546->55544 55547 14016cac4 55548 14016cb21 55547->55548 55555 14016cb1c __crtLCMapStringW 55547->55555 55549 14016cb51 LoadLibraryExW 55551 14016cc26 55549->55551 55552 14016cb76 GetLastError 55549->55552 55550 14016cc46 GetProcAddress 55550->55548 55554 14016cc57 55550->55554 55551->55550 55553 14016cc3d FreeLibrary 55551->55553 55552->55555 55553->55550 55554->55548 55555->55548 55555->55549 55555->55550 55556 14016cbb0 LoadLibraryExW 55555->55556 55556->55551 55556->55555 55557 14000a9f8 55559 14000a9a4 55557->55559 55558 14000a9da 55559->55558 55605 14014c4cc 55559->55605 55561 14000ab3d 55562 14000b7c0 68 API calls 55561->55562 55563 14000ab7d 55562->55563 55564 14013cd74 Concurrency::cancel_current_task 57 API calls 55563->55564 55565 14000ab8a memcpy_s 55564->55565 55566 140010140 58 API calls 55565->55566 55567 14000abb9 55566->55567 55568 14000c8f0 EnterCriticalSection 55567->55568 55569 14000abd3 55568->55569 55570 140010520 12 API calls 55569->55570 55571 14000ac3d 55570->55571 55572 14000c910 LeaveCriticalSection 55571->55572 55573 14000ac6b 55572->55573 55574 14000b7c0 68 API calls 55573->55574 55575 14000ac70 55574->55575 55576 14000da60 190 API calls 55575->55576 55577 14000ac97 55576->55577 55578 14000ba00 57 API calls 55577->55578 55579 14000addf 55578->55579 55580 14000a960 234 API calls 55579->55580 55581 14000ade2 55580->55581 55582 14000a960 234 API calls 55581->55582 55583 14000ade7 55582->55583 55584 14000adef AllocateAndInitializeSid 55583->55584 55591 14000ae69 55583->55591 55585 14000ae47 CheckTokenMembership 55584->55585 55584->55591 55586 14000ae5b 55585->55586 55587 14000ae5f FreeSid 55585->55587 55586->55587 55587->55591 55588 140152cac 61 API calls TranslateName 55600 14000b040 55588->55600 55589 140152cac TranslateName 61 API calls 55589->55591 55590 14000b773 ShellExecuteW 55592 14000b79c 55590->55592 55591->55589 55591->55600 55603 14000b145 55591->55603 55604 14000aeaf 55591->55604 55593 14013b928 57 API calls 55592->55593 55594 14000b7a9 55593->55594 55595 14013b970 std::bad_exception::bad_exception 57 API calls 55594->55595 55596 14000b7b6 55595->55596 55597 14000b759 55598 14000e7e0 57 API calls 55597->55598 55597->55603 55598->55603 55599 14000b0d2 SysAllocString 55599->55600 55600->55588 55600->55597 55600->55599 55601 1400043e0 131 API calls 55600->55601 55600->55603 55601->55600 55602 140152cac 61 API calls TranslateName 55602->55604 55603->55590 55604->55600 55604->55602 55604->55603 55610 14014c344 55 API calls _invalid_parameter_noinfo 55605->55610 55607 14014c4e5 55611 14014c4fc 17 API calls _invalid_parameter_noinfo_noreturn 55607->55611 55610->55607 55612 140032bf0 55613 140032da6 55612->55613 55617 140032c1b 55612->55617 55631 140006590 57 API calls std::bad_exception::bad_exception 55613->55631 55616 140032c2d memcpy_s 55617->55616 55623 140033a90 NtAllocateVirtualMemory 55617->55623 55624 140033ab1 NtProtectVirtualMemory 55623->55624 55625 140033b45 55623->55625 55627 140033b68 55624->55627 55630 140033ad8 55624->55630 55632 1400758d0 16 API calls 55625->55632 55633 1400758d0 16 API calls 55627->55633 55630->55630 55634 140167dac 55635 140167df7 55634->55635 55639 140167dbb _Getctype 55634->55639 55644 1401548d0 11 API calls _Wcrtomb 55635->55644 55637 140167dde HeapAlloc 55638 140167df5 55637->55638 55637->55639 55639->55635 55639->55637 55641 140164a40 55639->55641 55645 140164a80 55641->55645 55644->55638 55650 140163e18 EnterCriticalSection 55645->55650 55647 140164a8d 55648 140163e6c std::_Locinfo::_Locinfo_ctor LeaveCriticalSection 55647->55648 55649 140164a52 55648->55649 55649->55639 55651 1fe7bf0 55652 1fe7c06 55651->55652 55665 1fe2930 55652->55665 55654 1fe7c24 55804 1fe8ed0 55654->55804 55656 1fe7d64 55808 2004d00 GetUserNameW GetComputerNameExW 55656->55808 55658 1fe7f54 55659 1fe7da4 55659->55658 55820 2014740 55659->55820 55662 1ff8c60 CreateFiber DeleteFiber 55664 1fe7e3b 55662->55664 55664->55658 55664->55662 55824 1ff3d90 InternetOpenW InternetConnectW HttpSendRequestA InternetCloseHandle LdrGetProcedureAddress 55664->55824 55825 1fe8bc0 7 API calls 55664->55825 55826 1feffe0 55665->55826 55671 1fe2943 55672 1fef5f5 55671->55672 55898 1fecce0 55671->55898 55672->55654 55675 1fecce0 LdrGetProcedureAddress 55676 1feee2b 55675->55676 55677 1fecce0 LdrGetProcedureAddress 55676->55677 55678 1feee54 55677->55678 55679 1fecce0 LdrGetProcedureAddress 55678->55679 55680 1feee73 55679->55680 55681 1fecce0 LdrGetProcedureAddress 55680->55681 55682 1feee92 55681->55682 55683 1fecce0 LdrGetProcedureAddress 55682->55683 55684 1feeeb1 55683->55684 55685 1fecce0 LdrGetProcedureAddress 55684->55685 55686 1feeed0 55685->55686 55687 1fecce0 LdrGetProcedureAddress 55686->55687 55688 1feeeef 55687->55688 55689 1fecce0 LdrGetProcedureAddress 55688->55689 55690 1feef0e 55689->55690 55691 1fecce0 LdrGetProcedureAddress 55690->55691 55692 1feef2d 55691->55692 55693 1fecce0 LdrGetProcedureAddress 55692->55693 55694 1feef4c 55693->55694 55695 1fecce0 LdrGetProcedureAddress 55694->55695 55696 1feef6b 55695->55696 55697 1fecce0 LdrGetProcedureAddress 55696->55697 55698 1feef8a 55697->55698 55699 1fecce0 LdrGetProcedureAddress 55698->55699 55700 1feefa9 55699->55700 55701 1fecce0 LdrGetProcedureAddress 55700->55701 55702 1feefc8 55701->55702 55703 1fecce0 LdrGetProcedureAddress 55702->55703 55704 1feefe7 55703->55704 55705 1fecce0 LdrGetProcedureAddress 55704->55705 55706 1fef006 55705->55706 55707 1fecce0 LdrGetProcedureAddress 55706->55707 55708 1fef025 55707->55708 55709 1fecce0 LdrGetProcedureAddress 55708->55709 55710 1fef044 55709->55710 55711 1fecce0 LdrGetProcedureAddress 55710->55711 55712 1fef063 55711->55712 55713 1fecce0 LdrGetProcedureAddress 55712->55713 55714 1fef082 55713->55714 55715 1fecce0 LdrGetProcedureAddress 55714->55715 55716 1fef0a1 55715->55716 55717 1fecce0 LdrGetProcedureAddress 55716->55717 55718 1fef0c0 55717->55718 55719 1fecce0 LdrGetProcedureAddress 55718->55719 55720 1fef0df 55719->55720 55721 1fecce0 LdrGetProcedureAddress 55720->55721 55722 1fef0fe 55721->55722 55723 1fecce0 LdrGetProcedureAddress 55722->55723 55724 1fef11d 55723->55724 55725 1fecce0 LdrGetProcedureAddress 55724->55725 55726 1fef13c 55725->55726 55727 1fecce0 LdrGetProcedureAddress 55726->55727 55728 1fef15b 55727->55728 55729 1fecce0 LdrGetProcedureAddress 55728->55729 55730 1fef17a 55729->55730 55731 1fecce0 LdrGetProcedureAddress 55730->55731 55732 1fef199 55731->55732 55733 1fecce0 LdrGetProcedureAddress 55732->55733 55734 1fef1b8 55733->55734 55735 1fecce0 LdrGetProcedureAddress 55734->55735 55736 1fef1d7 55735->55736 55737 1fecce0 LdrGetProcedureAddress 55736->55737 55738 1fef1f6 55737->55738 55739 1fecce0 LdrGetProcedureAddress 55738->55739 55740 1fef215 55739->55740 55741 1fecce0 LdrGetProcedureAddress 55740->55741 55742 1fef234 55741->55742 55743 1fecce0 LdrGetProcedureAddress 55742->55743 55744 1fef253 55743->55744 55745 1fecce0 LdrGetProcedureAddress 55744->55745 55746 1fef272 55745->55746 55747 1fecce0 LdrGetProcedureAddress 55746->55747 55748 1fef291 55747->55748 55749 1fecce0 LdrGetProcedureAddress 55748->55749 55750 1fef2b0 55749->55750 55751 1fecce0 LdrGetProcedureAddress 55750->55751 55752 1fef2cf 55751->55752 55753 1fecce0 LdrGetProcedureAddress 55752->55753 55754 1fef2ee 55753->55754 55755 1fecce0 LdrGetProcedureAddress 55754->55755 55756 1fef30d 55755->55756 55757 1fecce0 LdrGetProcedureAddress 55756->55757 55758 1fef32c 55757->55758 55759 1fecce0 LdrGetProcedureAddress 55758->55759 55760 1fef34b 55759->55760 55761 1fecce0 LdrGetProcedureAddress 55760->55761 55762 1fef36a 55761->55762 55763 1fecce0 LdrGetProcedureAddress 55762->55763 55764 1fef389 55763->55764 55765 1fecce0 LdrGetProcedureAddress 55764->55765 55766 1fef3a8 55765->55766 55767 1fecce0 LdrGetProcedureAddress 55766->55767 55768 1fef3c7 55767->55768 55769 1fecce0 LdrGetProcedureAddress 55768->55769 55770 1fef3e6 55769->55770 55771 1fecce0 LdrGetProcedureAddress 55770->55771 55772 1fef405 55771->55772 55773 1fecce0 LdrGetProcedureAddress 55772->55773 55774 1fef424 55773->55774 55775 1fecce0 LdrGetProcedureAddress 55774->55775 55776 1fef443 55775->55776 55777 1fecce0 LdrGetProcedureAddress 55776->55777 55778 1fef462 55777->55778 55779 1fecce0 LdrGetProcedureAddress 55778->55779 55780 1fef481 55779->55780 55781 1fecce0 LdrGetProcedureAddress 55780->55781 55782 1fef4a0 55781->55782 55783 1fecce0 LdrGetProcedureAddress 55782->55783 55784 1fef4bf 55783->55784 55785 1fecce0 LdrGetProcedureAddress 55784->55785 55786 1fef4de 55785->55786 55787 1fecce0 LdrGetProcedureAddress 55786->55787 55788 1fef4fd 55787->55788 55789 1fecce0 LdrGetProcedureAddress 55788->55789 55790 1fef51c 55789->55790 55791 1fecce0 LdrGetProcedureAddress 55790->55791 55792 1fef53b 55791->55792 55793 1fecce0 LdrGetProcedureAddress 55792->55793 55794 1fef55a 55793->55794 55795 1fecce0 LdrGetProcedureAddress 55794->55795 55796 1fef579 55795->55796 55797 1fecce0 LdrGetProcedureAddress 55796->55797 55798 1fef598 55797->55798 55799 1fecce0 LdrGetProcedureAddress 55798->55799 55800 1fef5b7 55799->55800 55801 1fecce0 LdrGetProcedureAddress 55800->55801 55802 1fef5d6 55801->55802 55803 1fecce0 LdrGetProcedureAddress 55802->55803 55803->55672 55902 2004ce0 55804->55902 55807 1fe8f71 55807->55656 55809 2004db1 55808->55809 55810 2004dc7 GetComputerNameExW 55808->55810 55809->55810 55811 2004def 55810->55811 55812 2004df3 GetTokenInformation 55811->55812 55813 2004e1c 55811->55813 55812->55813 55814 2004eaa GetNativeSystemInfo 55813->55814 55817 2004ed3 55814->55817 55815 2004f8f GetAdaptersInfo 55816 2004fdd 55815->55816 55819 2004fbb 55815->55819 55818 2004fea GetAdaptersInfo 55816->55818 55816->55819 55817->55815 55818->55819 55819->55659 55821 2014759 55820->55821 55822 20147af 55821->55822 55823 20147ad NtFreeVirtualMemory 55821->55823 55822->55664 55823->55822 55824->55664 55825->55664 55828 1fefff9 55826->55828 55827 1fe2939 55846 1fef8a0 55827->55846 55828->55827 55829 1fecce0 LdrGetProcedureAddress 55828->55829 55830 1ff0072 55829->55830 55831 1fecce0 LdrGetProcedureAddress 55830->55831 55832 1ff008d 55831->55832 55833 1fecce0 LdrGetProcedureAddress 55832->55833 55834 1ff00b6 55833->55834 55835 1fecce0 LdrGetProcedureAddress 55834->55835 55836 1ff00d5 55835->55836 55837 1fecce0 LdrGetProcedureAddress 55836->55837 55838 1ff00f4 55837->55838 55839 1fecce0 LdrGetProcedureAddress 55838->55839 55840 1ff0113 55839->55840 55841 1fecce0 LdrGetProcedureAddress 55840->55841 55842 1ff0132 55841->55842 55843 1fecce0 LdrGetProcedureAddress 55842->55843 55844 1ff0151 55843->55844 55845 1fecce0 LdrGetProcedureAddress 55844->55845 55845->55827 55847 1fef8da 55846->55847 55848 1fecce0 LdrGetProcedureAddress 55847->55848 55849 1fe293e 55847->55849 55850 1fef900 55848->55850 55854 1ff3470 55849->55854 55851 1fecce0 LdrGetProcedureAddress 55850->55851 55852 1fef91b 55851->55852 55853 1fecce0 LdrGetProcedureAddress 55852->55853 55853->55849 55856 1ff3489 55854->55856 55855 1ff3493 55855->55671 55856->55855 55857 1fecce0 LdrGetProcedureAddress 55856->55857 55858 1ff3502 55857->55858 55859 1fecce0 LdrGetProcedureAddress 55858->55859 55860 1ff351d 55859->55860 55861 1fecce0 LdrGetProcedureAddress 55860->55861 55862 1ff3546 55861->55862 55863 1fecce0 LdrGetProcedureAddress 55862->55863 55864 1ff3565 55863->55864 55865 1fecce0 LdrGetProcedureAddress 55864->55865 55866 1ff3584 55865->55866 55867 1fecce0 LdrGetProcedureAddress 55866->55867 55868 1ff35a3 55867->55868 55869 1fecce0 LdrGetProcedureAddress 55868->55869 55870 1ff35c2 55869->55870 55871 1fecce0 LdrGetProcedureAddress 55870->55871 55872 1ff35e1 55871->55872 55873 1fecce0 LdrGetProcedureAddress 55872->55873 55874 1ff3600 55873->55874 55875 1fecce0 LdrGetProcedureAddress 55874->55875 55876 1ff361f 55875->55876 55877 1fecce0 LdrGetProcedureAddress 55876->55877 55878 1ff363e 55877->55878 55879 1fecce0 LdrGetProcedureAddress 55878->55879 55880 1ff365d 55879->55880 55881 1fecce0 LdrGetProcedureAddress 55880->55881 55882 1ff367c 55881->55882 55883 1fecce0 LdrGetProcedureAddress 55882->55883 55884 1ff369b 55883->55884 55885 1fecce0 LdrGetProcedureAddress 55884->55885 55886 1ff36ba 55885->55886 55887 1fecce0 LdrGetProcedureAddress 55886->55887 55888 1ff36d9 55887->55888 55889 1fecce0 LdrGetProcedureAddress 55888->55889 55890 1ff36f8 55889->55890 55891 1fecce0 LdrGetProcedureAddress 55890->55891 55892 1ff3717 55891->55892 55893 1fecce0 LdrGetProcedureAddress 55892->55893 55894 1ff3736 55893->55894 55895 1fecce0 LdrGetProcedureAddress 55894->55895 55896 1ff3755 55895->55896 55897 1fecce0 LdrGetProcedureAddress 55896->55897 55897->55855 55900 1fecd1b 55898->55900 55899 1fecdbf 55899->55675 55900->55899 55901 1fecd9b LdrGetProcedureAddress 55900->55901 55901->55899 55903 1fe8eee CreateMutexExA 55902->55903 55903->55807 55904 1fe7830 55905 1fe788a InternetOpenW 55904->55905 55906 1fe7885 55904->55906 55907 1fe7898 InternetConnectW 55905->55907 55912 1fe79e4 55905->55912 55906->55905 55910 1fe78dd 55907->55910 55907->55912 55908 1fe7b0e InternetCloseHandle 55909 1fe7b17 55908->55909 55911 1fe79cb HttpSendRequestA 55910->55911 55910->55912 55911->55912 55912->55908 55912->55909 55913 1400160c0 55916 140016110 55913->55916 55915 1400160d4 55917 140016130 55916->55917 55919 14001615e 55916->55919 55918 140016243 55917->55918 55917->55919 55920 14014c4cc _invalid_parameter_noinfo_noreturn 55 API calls 55918->55920 55928 1400161da 55919->55928 56051 140015a60 55919->56051 55921 140016248 55920->55921 55930 140016315 55921->55930 56054 140009480 55921->56054 55922 140033621 55928->55922 56091 1400345f0 75 API calls 55928->56091 56092 140034b90 75 API calls _invalid_parameter_noinfo_noreturn 55928->56092 55929 14001634d 56082 14013cd20 55929->56082 55930->55929 55977 14001640b 55930->55977 56063 14000ba00 55930->56063 55932 140016c63 55933 14014c4cc _invalid_parameter_noinfo_noreturn 55 API calls 55932->55933 55934 140016c69 55933->55934 55939 14014c4cc _invalid_parameter_noinfo_noreturn 55 API calls 55934->55939 55936 140016490 55940 1400164db 55936->55940 56068 140154a50 61 API calls 2 library calls 55936->56068 55937 140016c6f 55942 14014c4cc _invalid_parameter_noinfo_noreturn 55 API calls 55937->55942 55939->55937 55945 14001652d 55940->55945 56069 140154a50 61 API calls 2 library calls 55940->56069 55941 140016c2e 55944 14014c4cc _invalid_parameter_noinfo_noreturn 55 API calls 55941->55944 55946 140016c75 55942->55946 55943 1400167ec 55947 140016c4b 55943->55947 55953 14001688f memcpy_s 55943->55953 56081 140009ac0 57 API calls 3 library calls 55943->56081 55950 140016c33 55944->55950 55945->55943 55948 140016588 55945->55948 55946->55928 55961 14003fdf0 55946->55961 55954 14014c4cc _invalid_parameter_noinfo_noreturn 55 API calls 55947->55954 55951 140016c39 55948->55951 55957 14001662a memcpy_s 55948->55957 56070 140009ac0 57 API calls 3 library calls 55948->56070 55958 14014c4cc _invalid_parameter_noinfo_noreturn 55 API calls 55950->55958 55955 14014c4cc _invalid_parameter_noinfo_noreturn 55 API calls 55951->55955 55960 14000bae0 57 API calls 55953->55960 55956 140016c57 55954->55956 55959 140016c45 55955->55959 55962 14014c4cc _invalid_parameter_noinfo_noreturn 55 API calls 55956->55962 56071 14000bae0 55957->56071 55958->55951 55967 14014c4cc _invalid_parameter_noinfo_noreturn 55 API calls 55959->55967 55965 1400168f1 55960->55965 55963 14004016b 55961->55963 56093 140009260 55961->56093 55966 140016c5d 55962->55966 55963->55915 55969 1400064f0 55 API calls 55965->55969 55972 14014c4cc _invalid_parameter_noinfo_noreturn 55 API calls 55966->55972 55967->55947 55968 14001669f 55971 14000bae0 57 API calls 55968->55971 55969->55977 55974 1400166e7 55971->55974 55972->55932 55973 14003fea3 55975 1400064f0 55 API calls 55973->55975 56076 1400064f0 55974->56076 55980 14003feaf 55975->55980 55977->55929 55977->55932 55977->55934 55977->55937 55977->55941 55977->55947 55977->55950 55977->55951 55977->55956 55977->55959 55977->55966 55979 14004019d 55982 14014c4cc _invalid_parameter_noinfo_noreturn 55 API calls 55979->55982 55980->55979 55981 140009260 57 API calls 55980->55981 56042 140040129 55980->56042 55983 14003ff32 55981->55983 55984 1400401a3 55982->55984 55985 1400064f0 55 API calls 55983->55985 55986 140009260 57 API calls 55984->55986 55991 14003ff3e 55985->55991 55987 140040216 55986->55987 56102 140013520 57 API calls 3 library calls 55987->56102 55989 140040aa8 55992 14014c4cc _invalid_parameter_noinfo_noreturn 55 API calls 55989->55992 55990 140040227 55990->55989 55993 140040406 55990->55993 55996 140040317 55990->55996 56001 140009480 57 API calls 55990->56001 55991->55963 55991->55979 55994 140009260 57 API calls 55991->55994 55991->56042 55997 140040aad 55992->55997 55998 140040518 55993->55998 56003 140040ab3 55993->56003 56011 1400406a1 55993->56011 55995 140040019 55994->55995 56000 1400064f0 55 API calls 55995->56000 56002 14000ba00 57 API calls 55996->56002 55999 14014c4cc _invalid_parameter_noinfo_noreturn 55 API calls 55997->55999 56029 140040589 55998->56029 56104 140152cac 61 API calls 3 library calls 55998->56104 55999->56003 56034 140040025 56000->56034 56001->55996 56013 140040327 56002->56013 56007 14014c4cc _invalid_parameter_noinfo_noreturn 55 API calls 56003->56007 56004 14004064c 56005 1400064f0 55 API calls 56004->56005 56022 140040658 56005->56022 56010 140040ab9 56007->56010 56008 1400064f0 55 API calls 56008->56013 56009 1400409de 56014 1400064f0 55 API calls 56009->56014 56021 14014c4cc _invalid_parameter_noinfo_noreturn 55 API calls 56010->56021 56011->56022 56048 14004091d 56011->56048 56106 140152cac 61 API calls 3 library calls 56011->56106 56012 140040a78 56018 14013cd20 DName::DName 8 API calls 56012->56018 56013->56008 56024 140040358 56013->56024 56014->56022 56017 14000bae0 57 API calls 56017->56029 56023 140040a8d 56018->56023 56027 140040abf 56021->56027 56022->55989 56022->55997 56022->56012 56032 140040ac5 56022->56032 56023->55915 56024->55993 56024->56010 56103 140154a50 61 API calls 2 library calls 56024->56103 56025 1400064f0 55 API calls 56028 140040558 56025->56028 56026 14000bae0 57 API calls 56026->56048 56031 14014c4cc _invalid_parameter_noinfo_noreturn 55 API calls 56027->56031 56028->56025 56028->56029 56029->56004 56029->56017 56029->56027 56105 140013230 57 API calls 2 library calls 56029->56105 56030 140040780 56045 140040808 56030->56045 56030->56048 56107 140152cac 61 API calls 3 library calls 56030->56107 56031->56032 56035 14014c4cc _invalid_parameter_noinfo_noreturn 55 API calls 56032->56035 56034->55963 56034->55979 56036 140009260 57 API calls 56034->56036 56034->56042 56038 140040acb 56035->56038 56039 14004011d 56036->56039 56040 1400064f0 55 API calls 56039->56040 56040->56042 56041 1400407ce 56043 1400064f0 55 API calls 56041->56043 56041->56045 56042->55963 56042->55979 56101 140006590 57 API calls std::bad_exception::bad_exception 56042->56101 56043->56041 56044 1400408a1 56044->56048 56109 140152cac 61 API calls 3 library calls 56044->56109 56045->56027 56045->56048 56108 140152cac 61 API calls 3 library calls 56045->56108 56047 1400064f0 55 API calls 56049 1400408e8 56047->56049 56048->56009 56048->56026 56048->56027 56110 140013230 57 API calls 2 library calls 56048->56110 56049->56047 56049->56048 56111 14003d530 56051->56111 56053 140015a7e 56053->55928 56055 1400094cc 56054->56055 56059 1400094a2 memcpy_s 56054->56059 56057 14000951f memcpy_s 56055->56057 56225 140009ac0 57 API calls 3 library calls 56055->56225 56058 14014c4cc _invalid_parameter_noinfo_noreturn 55 API calls 56057->56058 56057->56059 56060 14000959f 56058->56060 56059->55930 56061 14000965c 56060->56061 56062 140009480 57 API calls 56060->56062 56061->55930 56062->56061 56064 14000ba2e 56063->56064 56065 14000ba52 56064->56065 56226 140009ac0 57 API calls 3 library calls 56064->56226 56065->55936 56067 14000ba9e memcpy_s 56067->55936 56068->55936 56069->55940 56070->55957 56072 14000bb43 56071->56072 56074 14000baff memcpy_s 56071->56074 56227 14000bc60 57 API calls 2 library calls 56072->56227 56074->55968 56075 14000bb5c 56075->55968 56077 140006538 56076->56077 56078 140006505 56076->56078 56077->55977 56078->56077 56079 14014c4cc _invalid_parameter_noinfo_noreturn 55 API calls 56078->56079 56080 140006581 56079->56080 56081->55953 56083 14013cd29 56082->56083 56084 140016c13 56083->56084 56085 14013cde4 IsProcessorFeaturePresent 56083->56085 56084->55915 56086 14013cdfc 56085->56086 56228 14013cfd8 RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 56086->56228 56088 14013ce0f 56229 14013cdb0 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 56088->56229 56091->55928 56092->55928 56094 140009323 56093->56094 56095 140009286 56093->56095 56099 140009260 57 API calls 56094->56099 56096 140009294 memcpy_s 56095->56096 56230 140009ac0 57 API calls 3 library calls 56095->56230 56096->55973 56098 1400092ea memcpy_s 56098->55973 56100 14000935f 56099->56100 56100->55973 56102->55990 56103->56024 56104->56028 56105->56029 56106->56030 56107->56041 56108->56044 56109->56049 56110->56048 56119 140056450 56111->56119 56113 14003d558 56125 1400561e0 56113->56125 56115 14003d5a7 56115->56053 56116 14003d573 56116->56115 56117 14014c4cc _invalid_parameter_noinfo_noreturn 55 API calls 56116->56117 56118 14003d5d1 56117->56118 56127 140056220 WaitForSingleObject 56119->56127 56121 140056461 WaitForMultipleObjects 56122 140056496 ResetEvent ResetEvent ReleaseMutex 56121->56122 56123 140056491 56121->56123 56122->56113 56123->56122 56124 1400564c5 56123->56124 56125->56116 56126 1400561f0 CloseHandle CloseHandle CloseHandle 56125->56126 56128 140056263 56127->56128 56129 14005623e 56127->56129 56148 140009220 56128->56148 56130 140056247 ResetEvent 56129->56130 56131 140056251 ReleaseMutex 56129->56131 56130->56131 56131->56128 56137 140056298 WaitForMultipleObjects 56139 1400562e1 ResetEvent ReleaseMutex 56137->56139 56140 1400562dc 56137->56140 56139->56121 56140->56139 56141 140056300 56140->56141 56142 140009220 std::bad_exception::bad_exception 57 API calls 56141->56142 56143 140056311 56142->56143 56144 140053280 std::bad_exception::bad_exception 57 API calls 56143->56144 56145 140056324 56144->56145 56146 14013f490 Concurrency::cancel_current_task 2 API calls 56145->56146 56147 140056335 56146->56147 56149 140009240 56148->56149 56149->56149 56160 140009120 56149->56160 56151 14000924e 56152 140053280 56151->56152 56187 1400531c0 56152->56187 56155 14013f490 56156 14013f4af 56155->56156 56157 14013f4d8 RtlPcToFileHeader 56156->56157 56158 14013f4fa RaiseException 56156->56158 56159 14013f4f0 56157->56159 56158->56137 56159->56158 56161 140009146 56160->56161 56167 140009215 56160->56167 56162 140009154 memcpy_s 56161->56162 56163 14000917d 56161->56163 56166 1400091cd 56161->56166 56162->56151 56165 14000920f 56163->56165 56175 14013cd74 56163->56175 56184 140009aa0 57 API calls 3 library calls 56165->56184 56170 14013cd74 Concurrency::cancel_current_task 57 API calls 56166->56170 56174 140009198 memcpy_s 56166->56174 56167->56167 56171 140009120 std::bad_exception::bad_exception 57 API calls 56167->56171 56170->56174 56173 14000924e 56171->56173 56172 14014c4cc _invalid_parameter_noinfo_noreturn 55 API calls 56172->56165 56173->56151 56174->56151 56176 14013cd7f 56175->56176 56177 140009193 56176->56177 56178 140164a40 Concurrency::cancel_current_task 2 API calls 56176->56178 56179 14013cd9e 56176->56179 56177->56172 56177->56174 56178->56176 56180 14013cda9 56179->56180 56185 14013b8e8 RtlPcToFileHeader RaiseException Concurrency::cancel_current_task std::bad_alloc::bad_alloc 56179->56185 56186 140009aa0 57 API calls 3 library calls 56180->56186 56183 14013cdaf 56184->56167 56186->56183 56190 140052c60 56187->56190 56193 140008990 56190->56193 56192 140052c8f 56192->56155 56195 1400089be 56193->56195 56194 1400089e2 56194->56192 56195->56194 56196 140008a0a 56195->56196 56197 140008a5d 56195->56197 56198 140008a9d 56195->56198 56199 14013cd74 Concurrency::cancel_current_task 57 API calls 56196->56199 56200 140008a97 56196->56200 56201 140008a28 memcpy_s 56197->56201 56204 14013cd74 Concurrency::cancel_current_task 57 API calls 56197->56204 56205 140009120 std::bad_exception::bad_exception 57 API calls 56198->56205 56203 140008a20 56199->56203 56222 140009aa0 57 API calls 3 library calls 56200->56222 56201->56192 56203->56201 56206 14014c4cc _invalid_parameter_noinfo_noreturn 55 API calls 56203->56206 56204->56201 56207 140008b14 56205->56207 56206->56200 56208 140008990 std::bad_exception::bad_exception 57 API calls 56207->56208 56209 140008b24 56208->56209 56223 140008830 57 API calls 5 library calls 56209->56223 56211 140008b42 56224 14013ec84 55 API calls 2 library calls 56211->56224 56213 140008c19 56216 14013cd20 DName::DName 8 API calls 56213->56216 56214 140008c51 56218 14014c4cc _invalid_parameter_noinfo_noreturn 55 API calls 56214->56218 56215 140008b7d 56215->56213 56215->56214 56219 140008c4c 56215->56219 56217 140008c3b 56216->56217 56217->56192 56221 140008c57 56218->56221 56220 14014c4cc _invalid_parameter_noinfo_noreturn 55 API calls 56219->56220 56220->56214 56221->56192 56222->56198 56223->56211 56224->56215 56225->56057 56226->56067 56227->56075 56228->56088 56230->56098 56231 1ff55c0 56236 1ff5609 56231->56236 56235 1ff5eed 56236->56235 56269 2014360 56236->56269 56237 1ff57d1 56237->56235 56277 1fff3a0 56237->56277 56239 1ff5871 56239->56235 56285 2014ff0 56239->56285 56242 2014ff0 NtQueueApcThread 56243 1ff5eb0 56242->56243 56243->56235 56244 1ff5ec5 56243->56244 56245 2014ff0 NtQueueApcThread 56243->56245 56244->56235 56246 2014ff0 NtQueueApcThread 56244->56246 56247 1ff5f0e 56245->56247 56248 1ff5ee9 56246->56248 56247->56235 56249 2014ff0 NtQueueApcThread 56247->56249 56248->56235 56250 2014ff0 NtQueueApcThread 56248->56250 56249->56244 56251 1ff5f67 56250->56251 56251->56235 56252 2014ff0 NtQueueApcThread 56251->56252 56253 1ff5f93 56252->56253 56253->56235 56254 2014ff0 NtQueueApcThread 56253->56254 56255 1ff5fbf 56254->56255 56255->56235 56256 1ff5fd4 56255->56256 56258 2014ff0 NtQueueApcThread 56255->56258 56256->56235 56257 2014ff0 NtQueueApcThread 56256->56257 56259 1ff5ff8 56257->56259 56258->56256 56259->56235 56260 1ff6033 56259->56260 56261 2014ff0 NtQueueApcThread 56259->56261 56260->56235 56262 2014ff0 NtQueueApcThread 56260->56262 56261->56260 56263 1ff6057 56262->56263 56263->56235 56264 2014ff0 NtQueueApcThread 56263->56264 56265 1ff60a9 56264->56265 56265->56235 56266 2014ff0 NtQueueApcThread 56265->56266 56267 1ff60d5 56266->56267 56267->56235 56289 2013a40 NtProtectVirtualMemory 56267->56289 56271 20143bd 56269->56271 56270 1ff5795 56270->56235 56273 20145f0 56270->56273 56271->56270 56272 201444e NtCreateThreadEx 56271->56272 56272->56270 56275 2014621 56273->56275 56274 2014686 56274->56237 56275->56274 56276 2014684 NtDuplicateObject 56275->56276 56276->56274 56278 1fff3bd 56277->56278 56279 1fff3f2 CreateToolhelp32Snapshot 56278->56279 56280 1fff418 Thread32First 56279->56280 56281 1fff610 56279->56281 56280->56281 56283 1fff439 56280->56283 56281->56239 56283->56281 56284 1fff5fa NtResumeThread 56283->56284 56290 20151c0 56283->56290 56284->56283 56287 2015011 56285->56287 56286 1ff5e84 56286->56235 56286->56242 56287->56286 56288 201506a NtQueueApcThread 56287->56288 56288->56286 56289->56235 56292 20151e2 56290->56292 56291 201523e 56291->56283 56292->56291 56293 201523c NtReadVirtualMemory 56292->56293 56293->56291 56294 140001d40 56346 140034e80 56294->56346 56297 140034e80 57 API calls 56298 140001dfa 56297->56298 56299 140034e80 57 API calls 56298->56299 56300 140001e6a memcpy_s 56299->56300 56301 140034e80 57 API calls 56300->56301 56302 140001ee2 memcpy_s 56301->56302 56303 140034e80 57 API calls 56302->56303 56304 140001f59 56303->56304 56305 140034e80 57 API calls 56304->56305 56306 140001fc5 56305->56306 56307 140034e80 57 API calls 56306->56307 56308 14000202b 56307->56308 56309 140034e80 57 API calls 56308->56309 56310 140002097 56309->56310 56311 140034e80 57 API calls 56310->56311 56312 140002107 memcpy_s 56311->56312 56313 140034e80 57 API calls 56312->56313 56314 1400021ef memcpy_s 56313->56314 56315 14013cd74 Concurrency::cancel_current_task 57 API calls 56314->56315 56320 140002252 56315->56320 56316 140002646 56368 140034f00 57 API calls 56316->56368 56318 14013cd74 Concurrency::cancel_current_task 57 API calls 56318->56320 56319 14000264c 56322 14014c4cc _invalid_parameter_noinfo_noreturn 55 API calls 56319->56322 56320->56316 56320->56318 56340 140002348 56320->56340 56367 140047de0 57 API calls memcpy_s 56320->56367 56324 140002652 56322->56324 56323 140002640 56325 14014c4cc _invalid_parameter_noinfo_noreturn 55 API calls 56323->56325 56326 14014c4cc _invalid_parameter_noinfo_noreturn 55 API calls 56324->56326 56325->56316 56327 140002658 56326->56327 56329 14014c4cc _invalid_parameter_noinfo_noreturn 55 API calls 56327->56329 56328 14000265e 56330 14014c4cc _invalid_parameter_noinfo_noreturn 55 API calls 56328->56330 56329->56328 56331 140002664 56330->56331 56332 14014c4cc _invalid_parameter_noinfo_noreturn 55 API calls 56331->56332 56333 14000266a 56332->56333 56335 14014c4cc _invalid_parameter_noinfo_noreturn 55 API calls 56333->56335 56334 140002670 56338 14014c4cc _invalid_parameter_noinfo_noreturn 55 API calls 56334->56338 56335->56334 56336 14000260f 56369 14013d238 57 API calls 56336->56369 56337 140002676 56341 14014c4cc _invalid_parameter_noinfo_noreturn 55 API calls 56337->56341 56338->56337 56340->56319 56340->56323 56340->56324 56340->56327 56340->56328 56340->56331 56340->56333 56340->56334 56340->56336 56340->56337 56342 14014c4cc _invalid_parameter_noinfo_noreturn 55 API calls 56340->56342 56344 14000267c 56341->56344 56342->56323 56343 14013d27d 56358 1400520c0 WSAStartup 56344->56358 56347 140034e99 56346->56347 56348 140034ebd 56346->56348 56349 140034ea2 56347->56349 56350 140034ee7 56347->56350 56351 140001d8c 56348->56351 56354 14013cd74 Concurrency::cancel_current_task 57 API calls 56348->56354 56353 14013cd74 Concurrency::cancel_current_task 57 API calls 56349->56353 56370 140009aa0 57 API calls 3 library calls 56350->56370 56351->56297 56355 140034ea7 56353->56355 56354->56351 56355->56351 56356 14014c4cc _invalid_parameter_noinfo_noreturn 55 API calls 56355->56356 56357 140034ef2 56356->56357 56359 1400520e6 56358->56359 56360 1400520de 56358->56360 56361 140009220 std::bad_exception::bad_exception 57 API calls 56359->56361 56360->56336 56362 1400520f7 56361->56362 56371 140052160 57 API calls std::bad_exception::bad_exception 56362->56371 56364 14005210a 56365 14013f490 Concurrency::cancel_current_task 2 API calls 56364->56365 56366 14005211b WSACleanup 56365->56366 56367->56320 56369->56343 56370->56355 56371->56364
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: FormatFreeLocalMessage_invalid_parameter_noinfo_noreturn
              • String ID: (0x$Could not load the offline registry library! File path = [%ls]. Will not be able to perform actions on offline hives.$D:\Jenkins\workspace\N_MBCommon-vs2022\src\mbcommon\OfflineRegistryLibrary.cpp$Failed to verify the file! Cannot load the offline registry library support dll! FilePath=[%ls].$Loading the offline registry library. Path = [%ls].$ORCloseHive$ORCloseKey$ORCreateHive$ORCreateKey$ORDeleteKey$ORDeleteValue$OREnumKey$OREnumValue$ORGetKeySecurity$ORGetValue$ORGetVersion$ORGetVirtualFlags$ORMergeHives$OROpenHive$OROpenKey$ORQueryInfoKey$ORSaveHive$ORSetKeySecurity$ORSetValue$ORSetVirtualFlags$Successfully loaded the offline registry library.$\offreg.dll$mb::common::system::OfflineRegistryLibrary::Load
              • API String ID: 1505264261-2641161069
              • Opcode ID: 152a30eae06c54f6305780326a33a88afdab27233bf6187057eb9b80a8b3f8a4
              • Instruction ID: f1b2e5f55cbf675957eb493b6f37cce96eeba6d922de30b3332a4f9d7433f89f
              • Opcode Fuzzy Hash: 152a30eae06c54f6305780326a33a88afdab27233bf6187057eb9b80a8b3f8a4
              • Instruction Fuzzy Hash: BAB28C72B10B8495EE06DB6AD5443ED63A1E78DBD8F505312EB6C17AEAEF78C191C300

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 420 140001d40-140002285 call 140034e80 * 3 call 140179d50 call 140034e80 call 140179d50 call 140034e80 * 5 call 140179d50 call 140034e80 call 140179d50 call 14013cd74 451 140002290-1400022b9 call 140051790 420->451 454 140002334-140002342 451->454 455 1400022bb-1400022c2 451->455 454->451 456 140002348-14000236c call 14013d3ac 454->456 457 140002647-14000264c call 140034f00 455->457 458 1400022c8-14000232f call 14013cd74 call 140047de0 call 140033c50 455->458 465 1400023ab-1400023b2 456->465 466 14000236e-14000237f 456->466 467 14000264d-140002652 call 14014c4cc 457->467 458->454 472 1400023f1-1400023f8 465->472 473 1400023b4-1400023c5 465->473 469 140002381-140002394 466->469 470 14000239a-1400023a7 call 14013cd40 466->470 489 140002653-140002658 call 14014c4cc 467->489 469->470 477 140002641-140002646 call 14014c4cc 469->477 470->465 475 140002437-14000243e 472->475 476 1400023fa-14000240b 472->476 480 1400023c7-1400023da 473->480 481 1400023e0-1400023ed call 14013cd40 473->481 486 14000247d-140002484 475->486 487 140002440-140002451 475->487 483 140002426-140002433 call 14013cd40 476->483 484 14000240d-140002420 476->484 477->457 480->467 480->481 481->472 483->475 484->483 484->489 495 1400024c3-1400024ca 486->495 496 140002486-140002497 486->496 493 140002453-140002466 487->493 494 14000246c-140002479 call 14013cd40 487->494 502 140002659-14000265e call 14014c4cc 489->502 493->494 493->502 494->486 499 140002509-140002510 495->499 500 1400024cc-1400024dd 495->500 504 1400024b2-1400024bf call 14013cd40 496->504 505 140002499-1400024ac 496->505 509 140002512-140002523 499->509 510 14000254f-140002556 499->510 507 1400024f8-140002505 call 14013cd40 500->507 508 1400024df-1400024f2 500->508 512 14000265f-140002664 call 14014c4cc 502->512 504->495 505->504 505->512 507->499 508->507 518 140002665-14000266a call 14014c4cc 508->518 520 140002525-140002538 509->520 521 14000253e-14000254b call 14013cd40 509->521 522 140002595-14000259c 510->522 523 140002558-140002569 510->523 512->518 529 14000266b-140002670 call 14014c4cc 518->529 520->521 520->529 521->510 525 1400025db-1400025e2 522->525 526 14000259e-1400025af 522->526 531 140002584-140002591 call 14013cd40 523->531 532 14000256b-14000257e 523->532 539 140002614-140002636 525->539 540 1400025e4-1400025f8 525->540 535 1400025b1-1400025c4 526->535 536 1400025ca-1400025d7 call 14013cd40 526->536 533 140002671-140002676 call 14014c4cc 529->533 531->522 532->531 532->533 543 140002677-140002684 call 14014c4cc call 1400520c0 533->543 535->536 535->543 536->525 549 14013d274-14013d28a call 14013d238 539->549 547 1400025fa-14000260d 540->547 548 14000260f call 14013cd40 540->548 561 140002689-140002694 543->561 547->548 553 14000263b-140002640 call 14014c4cc 547->553 548->539 553->477 561->549
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_task
              • String ID: )7CC$)7}$$-TES$4(P^$ANDA$EICA$H+H*$IRUS$L$LE!$$MSCF$NTIV$P%@A$PZX5$P[4\$R-ST$RD-A$Rar!$Rar!Rar!$T-FI$X5O!
              • API String ID: 3936042273-42239843
              • Opcode ID: d0f24612083c7cec7c108ed78f54bf0ed5cf37174db4eab948ebcd9a382ccca4
              • Instruction ID: 472343e91544a6cbda591fd361516fdcd391ed5c1335d5c251b9af51f3bbb3dc
              • Opcode Fuzzy Hash: d0f24612083c7cec7c108ed78f54bf0ed5cf37174db4eab948ebcd9a382ccca4
              • Instruction Fuzzy Hash: 61422873A11BC489EB61CF76E8843DD37A5F788B98F204615EB981BAA9DF74C190C740
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: _invalid_parameter_noinfo_noreturn
              • String ID: D:\Jenkins\workspace\N_MBCommon-vs2022\src\mbcommon\RegistryUtilities.cpp$Entry: RegistryUtilities::GetOriginalRegPath(%ls, %ls)$Exit: <- RegistryUtilities::GetOriginalRegPath(%ls, %ls)$_CLASSES$mb::common::system::RegistryUtilities::GetOriginalRegPath
              • API String ID: 3668304517-962652969
              • Opcode ID: 3f13b2fbf2e8f0d48acbf5614fda260bca3e461282a06ce0d80fb58b73834142
              • Instruction ID: 030596199d835868f9e2105171607def1744b4e36ea0835a01afc81454be1ad4
              • Opcode Fuzzy Hash: 3f13b2fbf2e8f0d48acbf5614fda260bca3e461282a06ce0d80fb58b73834142
              • Instruction Fuzzy Hash: 82E2ADB2B10A8085EB12CF6AD8543ED23A1F749BD8F454622EF5D17BAADF78C585C340

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1107 140033958-1400339f3 1108 1400339f8-1400339ff 1107->1108 1109 140033a08-140033a16 1108->1109 1109->1109 1110 140033a18-140033a1b 1109->1110 1110->1108 1111 140033a1d-140033a29 1110->1111 1112 140033a4c-140033aab call 140033b88 call 1400338c8 * 2 NtAllocateVirtualMemory 1111->1112 1113 140033a2b-140033a4b call 1400758d0 1111->1113 1122 140033ab1-140033ad2 NtProtectVirtualMemory 1112->1122 1123 140033b45-140033b54 call 1400758d0 1112->1123 1125 140033b68-140033b7d call 1400758d0 1122->1125 1126 140033ad8-140033af7 1122->1126 1127 140033b5a-140033b67 1123->1127 1125->1127 1129 140033b24-140033b3a 1126->1129 1130 140033af9 1126->1130 1131 140033b3c 1129->1131 1132 140033afb-140033b1f 1129->1132 1130->1131 1134 140033b40 1131->1134 1132->1129 1134->1134
              APIs
              • NtAllocateVirtualMemory.NTDLL(?,?,?,?,?,?,?,?,?,?,?,?,7FFFFFFFFFFFFFFE,0000000140019423), ref: 0000000140033AA7
              • NtProtectVirtualMemory.NTDLL(?,?,?,?,?,?,?,?,?,?,?,?,7FFFFFFFFFFFFFFE,0000000140019423), ref: 0000000140033ACE
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: MemoryVirtual$AllocateProtect
              • String ID: !$#$$$%$&$8$<$>$A$B$E$F$O$P$Y$f$k$m$x$z
              • API String ID: 2931642484-3285722826
              • Opcode ID: 39f445d931aa1c8d191d7cb3a9d0e493cf1c591d1aeb13f95d8391392bb9d6e8
              • Instruction ID: 8219aa4f2922111a13f794d4fdba734c6c57011f4a7618d342a4606a2c91253d
              • Opcode Fuzzy Hash: 39f445d931aa1c8d191d7cb3a9d0e493cf1c591d1aeb13f95d8391392bb9d6e8
              • Instruction Fuzzy Hash: F241702220C7C085E7529769B40878BEB90E3967B8F440255F7E847BDADBBEC548CB21

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1135 14000d2f0-14000d36b GetModuleFileNameW SysAllocString call 140009120 1137 14000d370-14000d389 call 140012ab0 1135->1137 1140 14000d38b-14000d39d 1137->1140 1141 14000d3bd-14000d425 SysAllocString call 140009120 call 140012ab0 1137->1141 1142 14000d3b8 call 14013cd40 1140->1142 1143 14000d39f-14000d3b2 1140->1143 1152 14000d427 1141->1152 1153 14000d42a-14000d440 SysAllocString 1141->1153 1142->1141 1143->1142 1146 14000d616-14000d61b call 14014c4cc 1143->1146 1154 14000d61c-14000d621 call 14014c4cc 1146->1154 1152->1153 1155 14000d442-14000d459 1153->1155 1156 14000d479-14000d497 1153->1156 1163 14000d622-14000d627 call 14014c4cc 1154->1163 1158 14000d474 call 14013cd40 1155->1158 1159 14000d45b-14000d46e 1155->1159 1160 14000d499-14000d4ab 1156->1160 1161 14000d4cb-14000d508 call 140009120 call 140012ab0 1156->1161 1158->1156 1159->1154 1159->1158 1165 14000d4c6 call 14013cd40 1160->1165 1166 14000d4ad-14000d4c0 1160->1166 1175 14000d50a 1161->1175 1176 14000d50d-14000d523 SysAllocString 1161->1176 1174 14000d628-14000d62d call 14014c4cc 1163->1174 1165->1161 1166->1163 1166->1165 1183 14000d62e-14000d66a call 14014c4cc 1174->1183 1175->1176 1178 14000d525-14000d53c 1176->1178 1179 14000d55c-14000d578 1176->1179 1181 14000d557 call 14013cd40 1178->1181 1182 14000d53e-14000d551 1178->1182 1184 14000d57a-14000d58c 1179->1184 1185 14000d5ad-14000d5b5 1179->1185 1181->1179 1182->1174 1182->1181 1200 14000d78b-14000d796 1183->1200 1201 14000d670-14000d698 call 140015240 1183->1201 1190 14000d5a7-14000d5ac call 14013cd40 1184->1190 1191 14000d58e-14000d5a1 1184->1191 1186 14000d5b7-14000d5cd 1185->1186 1187 14000d5e9-14000d60f call 14013cd20 1185->1187 1192 14000d5e4 call 14013cd40 1186->1192 1193 14000d5cf-14000d5e2 1186->1193 1190->1185 1191->1183 1191->1190 1192->1187 1193->1192 1197 14000d610-14000d615 call 14014c4cc 1193->1197 1197->1146 1208 14000d7a1-14000d7c6 call 14013cd20 1200->1208 1209 14000d798-14000d79b 1200->1209 1210 14000d69e 1201->1210 1211 14000d740-14000d743 1201->1211 1209->1208 1214 14000d6a0-14000d6e9 call 14000ba00 call 14000bb70 1210->1214 1211->1200 1213 14000d745-14000d76b call 14000c4f0 1211->1213 1221 14000d786 call 14013cd40 1213->1221 1222 14000d76d-14000d780 1213->1222 1226 14000d7c7-14000d7cb 1214->1226 1227 14000d6ef-14000d6f2 1214->1227 1221->1200 1222->1221 1224 14000d86a-14000d86f call 14014c4cc 1222->1224 1239 14000d870-14000d875 call 14014c4cc 1224->1239 1231 14000d7cd-14000d7df 1226->1231 1232 14000d7fe-14000d81a 1226->1232 1229 14000d6f4-14000d706 1227->1229 1230 14000d729-14000d730 1227->1230 1234 14000d721-14000d724 call 14013cd40 1229->1234 1235 14000d708-14000d71b 1229->1235 1230->1214 1236 14000d736-14000d73b 1230->1236 1237 14000d7e1-14000d7f4 1231->1237 1238 14000d7f6-14000d7f9 call 14013cd40 1231->1238 1240 14000d81c-14000d841 call 14000c4f0 1232->1240 1241 14000d85d-14000d85f 1232->1241 1234->1230 1235->1234 1235->1239 1236->1211 1237->1238 1237->1239 1238->1232 1248 14000d843-14000d856 1240->1248 1249 14000d858 call 14013cd40 1240->1249 1241->1208 1248->1249 1250 14000d864-14000d869 call 14014c4cc 1248->1250 1249->1241 1250->1224
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: _invalid_parameter_noinfo_noreturn$AllocString$ByteCharMultiWide$FileModuleName
              • String ID: 3.1.0.245$Malwarebytes$Malwarebytes
              • API String ID: 1712074557-2206061662
              • Opcode ID: 341e508f6d43bf4f9130441cc99660f6f47f8da3a1b257e6c0da50a16d517a0b
              • Instruction ID: 1882f31349a73834cecdb9e852d769fb4adce6bf615b1a67cefcbcac5dec22fd
              • Opcode Fuzzy Hash: 341e508f6d43bf4f9130441cc99660f6f47f8da3a1b257e6c0da50a16d517a0b
              • Instruction Fuzzy Hash: F8E16DB2624B8081EA12DB6AE4553DE6361E78DBE4F505312FBAD07AF9DF78C480C740

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1254 140014ba0-140014be5 call 14013d720 1257 140014be7-140014c10 RegOpenKeyExW 1254->1257 1258 140014c1d 1254->1258 1259 140014c12-140014c17 RegCloseKey 1257->1259 1260 140014c55-140014c58 1257->1260 1261 140014c25-140014c54 call 14013cd20 1258->1261 1259->1258 1260->1258 1263 140014c5a-140014c5d 1260->1263 1263->1258 1265 140014c5f-140014c88 RegOpenKeyExW 1263->1265 1265->1258 1266 140014c8a-140014ce2 RegQueryValueExW RegCloseKey 1265->1266 1267 140015008-14001503e SHGetFolderPathW 1266->1267 1268 140014ce8-140014d1a 1266->1268 1269 14001506a-140015096 1267->1269 1270 140015040-14001504b 1267->1270 1271 140014d20-140014d28 1268->1271 1272 1400150b5-1400150c5 call 140012c90 1269->1272 1273 140015098-14001509b 1269->1273 1274 140015050-140015058 1270->1274 1271->1271 1275 140014d2a-140014d4e call 140009260 call 140012c90 1271->1275 1286 1400150e1-140015114 call 14000bb70 1272->1286 1287 1400150c7-1400150d0 1272->1287 1277 1400150a0-1400150b3 call 140154b40 1273->1277 1274->1274 1279 14001505a-140015065 call 140009480 1274->1279 1292 140014d6b-140014d9c 1275->1292 1293 140014d50-140014d59 1275->1293 1277->1272 1279->1269 1296 140015116 1286->1296 1297 14001511e-140015122 1286->1297 1289 1400150d2 1287->1289 1290 1400150d5-1400150dc call 140009480 1287->1290 1289->1290 1290->1286 1300 140014db6-140014def SHGetFolderPathW 1292->1300 1301 140014d9e 1292->1301 1298 140014d5b 1293->1298 1299 140014d5e-140014d66 call 140009480 1293->1299 1296->1297 1297->1261 1302 140015128-14001513a 1297->1302 1298->1299 1299->1292 1305 140014df1 1300->1305 1306 140014e10-140014e42 1300->1306 1304 140014da1-140014db4 call 140154b40 1301->1304 1307 140014ffb-140015003 call 14013cd40 1302->1307 1308 140015140-140015153 1302->1308 1304->1300 1312 140014df5-140014dfd 1305->1312 1309 140014e44 1306->1309 1310 140014e5c-140014e6e call 140012c90 1306->1310 1307->1261 1314 140015155 1308->1314 1315 140015160-140015165 call 14014c4cc 1308->1315 1316 140014e47-140014e5a call 140154b40 1309->1316 1327 140014e8b-140014ec5 1310->1327 1328 140014e70-140014e79 1310->1328 1312->1312 1313 140014dff-140014e0b call 140009480 1312->1313 1313->1306 1314->1307 1329 140015166-14001516b call 14014c4cc 1315->1329 1316->1310 1332 140014f64 1327->1332 1333 140014ecb-140014ed1 1327->1333 1330 140014e7b 1328->1330 1331 140014e7e-140014e86 call 140009480 1328->1331 1330->1331 1331->1327 1334 140014f6c-140014f70 1332->1334 1333->1334 1335 140014ed7-140014eea 1333->1335 1338 140014f72-140014f84 1334->1338 1339 140014fb0-140014fc8 1334->1339 1340 140014ef0-140014ef9 1335->1340 1342 140014f86-140014f99 1338->1342 1343 140014f9f-140014fab call 14013cd40 1338->1343 1339->1261 1346 140014fce-140014fe0 1339->1346 1344 140014f17-140014f1d 1340->1344 1345 140014efb-140014eff 1340->1345 1342->1329 1342->1343 1343->1339 1350 140014f5f 1344->1350 1351 140014f1f-140014f28 1344->1351 1347 140014f01-140014f05 1345->1347 1348 140014f14 1345->1348 1346->1307 1352 140014fe2-140014ff5 1346->1352 1347->1344 1353 140014f07-140014f12 1347->1353 1348->1344 1350->1332 1355 140014f44-140014f50 1351->1355 1356 140014f2a-140014f2d 1351->1356 1352->1307 1357 14001515a-14001515f call 14014c4cc 1352->1357 1353->1347 1353->1348 1355->1334 1360 140014f52 1355->1360 1359 140014f30-140014f38 1356->1359 1357->1315 1362 140014f54-140014f5d 1359->1362 1363 140014f3a-140014f42 1359->1363 1360->1332 1362->1340 1363->1355 1363->1359
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: _invalid_parameter_noinfo_noreturn$CloseFolderOpenPath$QueryValue
              • String ID: BCD00000000$InstRoot$SOFTWARE\Microsoft\Windows NT\CurrentVersion\WinPE
              • API String ID: 3316190143-2582240236
              • Opcode ID: 1a85a1f4e35ecda581be34b5ba8eb01baa71020f111f761d15a2d553af307a42
              • Instruction ID: 9821237fe0aebb07e07302a056dcbfab63735c34570acbcf358e0cff65cc78bc
              • Opcode Fuzzy Hash: 1a85a1f4e35ecda581be34b5ba8eb01baa71020f111f761d15a2d553af307a42
              • Instruction Fuzzy Hash: D8F1BD72710B8081EB129F66E4443DEA7B1F789BD8F940216EB9D1BBB8DB79C585C700

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1364 14000a9f8-14000aa1a call 14000bb70 1368 14000a9a4-14000a9a8 1364->1368 1369 14000ab20-14000ab37 1364->1369 1370 14000a9aa-14000a9bc 1368->1370 1371 14000a9df-14000a9ea 1368->1371 1372 14000a9da call 14013cd40 1370->1372 1373 14000a9be-14000a9d1 1370->1373 1371->1369 1372->1371 1373->1372 1374 14000ab38-14000ac92 call 14014c4cc call 14000b7c0 call 14013cd74 call 14017a4d0 * 2 call 140010140 call 14000c8f0 call 140010520 call 14000c910 call 14000b7c0 call 14000da60 1373->1374 1404 14000ac97-14000ade9 call 14000ba00 call 14000a960 1374->1404 1413 14000ae73-14000ae7e 1404->1413 1414 14000adef-14000ae45 AllocateAndInitializeSid 1404->1414 1417 14000ae84-14000ae88 1413->1417 1418 14000b040-14000b057 1413->1418 1415 14000ae47-14000ae59 CheckTokenMembership 1414->1415 1416 14000ae69-14000ae6d 1414->1416 1419 14000ae5b 1415->1419 1420 14000ae5f-14000ae63 FreeSid 1415->1420 1416->1413 1422 14000b76a-14000b7b6 call 14000a8a0 ShellExecuteW call 140152bc4 call 14013b928 call 14013b970 1416->1422 1423 14000ae90-14000aead call 140152cac 1417->1423 1421 14000b060-14000b07d call 140152cac 1418->1421 1419->1420 1420->1416 1431 14000b083-14000b095 call 140152cac 1421->1431 1432 14000b13a-14000b13f 1421->1432 1437 14000aeaf-14000af87 1423->1437 1431->1432 1444 14000b09b-14000b0ad call 140152cac 1431->1444 1432->1421 1436 14000b145 1432->1436 1440 14000b762-14000b769 call 140152bc4 1436->1440 1445 14000af90-14000afa2 call 140152cac 1437->1445 1440->1422 1455 14000b0b3-14000b0d0 call 140152cac 1444->1455 1456 14000b759 1444->1456 1453 14000b034-14000b03a 1445->1453 1454 14000afa8-14000afba call 140152cac 1445->1454 1453->1418 1453->1445 1454->1453 1463 14000afbc-14000b016 call 140152cac * 4 1454->1463 1455->1432 1464 14000b0d2-14000b0e7 SysAllocString 1455->1464 1456->1440 1458 14000b75d call 14000e7e0 1456->1458 1458->1440 1482 14000b14a-14000b14f call 14000e110 1463->1482 1483 14000b01c-14000b02e call 140152cac 1463->1483 1466 14000b133 1464->1466 1467 14000b0e9-14000b10e call 1400043e0 1464->1467 1466->1432 1467->1466 1476 14000b110-14000b12c 1467->1476 1476->1466 1482->1440 1483->1453 1483->1482
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: FreeString$CriticalEnterSectionSleepSwitchThread_invalid_parameter_noinfo_noreturn
              • String ID: /notifyexpire$/offlineclean$/renew$/status$/uninstall
              • API String ID: 2155412874-690304953
              • Opcode ID: 4ebb4fa9563715da7d1d0742c0f45022e9f1940b4062bada7f839af18a8445d8
              • Instruction ID: 2ce03b71e1b1971416ab6af8a69fb9fd8e8ee4e7de491ae800abcc87c5891897
              • Opcode Fuzzy Hash: 4ebb4fa9563715da7d1d0742c0f45022e9f1940b4062bada7f839af18a8445d8
              • Instruction Fuzzy Hash: D1A1AA76710A8486EB56DB26E5543ED33A1A78EBE8F444212EB6E07BE9CF7CC541C301

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1558 2004d00-2004daf GetUserNameW GetComputerNameExW 1559 2004db1-2004dc1 call 200b4c0 1558->1559 1560 2004dc7-2004df1 GetComputerNameExW call 2014ad0 1558->1560 1559->1560 1565 2004df3-2004e1a GetTokenInformation 1560->1565 1566 2004e58-2004e92 call 2012750 call 1ffdfc0 1560->1566 1567 2004e1c-2004e28 1565->1567 1568 2004e4e-2004e53 call 2014000 1565->1568 1580 2004e94-2004ea5 call 2013de0 1566->1580 1581 2004eaa-2004ed1 GetNativeSystemInfo 1566->1581 1569 2004e2a-2004e39 call 2013de0 1567->1569 1570 2004e3e-2004e49 call 2013de0 1567->1570 1568->1566 1569->1570 1570->1568 1580->1581 1583 2004ed3-2004ee6 1581->1583 1584 2004ee8-2004eec 1581->1584 1585 2004f01-2004f15 call 2013de0 1583->1585 1586 2004f17-2004f2d call 2013de0 1584->1586 1587 2004eee-2004efd 1584->1587 1591 2004f32-2004f42 1585->1591 1586->1591 1587->1585 1593 2004f44-2004f84 call 2013b90 call 2013de0 call 2013b90 * 2 1591->1593 1594 2004f89-2004fb9 GetAdaptersInfo 1591->1594 1593->1594 1599 2004fbb-2004fdc call 200b4e0 * 2 1594->1599 1600 2004fdd-2004fe3 1594->1600 1600->1599 1601 2004fe5-2004ffd call 200b4c0 GetAdaptersInfo 1600->1601 1601->1599 1611 2004fff-200500c 1601->1611 1613 2005012-2005015 1611->1613 1613->1599 1614 2005017-2005018 1613->1614 1615 200501f-2005031 call 1fe93e0 1614->1615 1618 2005033-2005043 call 2013de0 1615->1618 1619 2005045-200504c 1615->1619 1618->1615 1619->1599 1620 2005052-2005062 call 2013de0 1619->1620 1620->1613
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3387519872.0000000001FE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 01FE1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1fe1000_sGfciyumij.jbxd
              Similarity
              • API ID: InfoName$AdaptersComputer$InformationNativeSystemTokenUser
              • String ID:
              • API String ID: 1596153048-0
              • Opcode ID: cee6622d4819fa64709ae73456ee7563a7e84bd08e275b7a7d176abad07eaf72
              • Instruction ID: 6f6a35dae173a3ff8b3f08e4c5e2dde680706dd976161345f53dd88111660a98
              • Opcode Fuzzy Hash: cee6622d4819fa64709ae73456ee7563a7e84bd08e275b7a7d176abad07eaf72
              • Instruction Fuzzy Hash: 4C91A330218B488FFB54EB14E8957DAB7E6FB94304F40452DE94AC7290DB78EA45CB83

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1625 140046a30-140046a70 call 14013cd74 1627 140046a75-140046a78 1625->1627 1628 140046a7e-140046ade call 14017a4d0 GetModuleFileNameW 1627->1628 1629 140046b5c-140046bbc call 14014c4cc call 14013cd74 1627->1629 1635 140046ae5-140046aee 1628->1635 1640 140046bc2-140046c4b call 14017a4d0 GetCurrentProcess GetProcessImageFileNameW 1629->1640 1641 140046d1d-140046d47 call 14014c4cc 1629->1641 1635->1635 1637 140046af0-140046b01 call 140009260 1635->1637 1645 140046b37-140046b5b call 14013cd20 1637->1645 1646 140046b03-140046b1b 1637->1646 1656 140046c50-140046c59 1640->1656 1654 140046d49-140046d5c 1641->1654 1655 140046d7b-140046d9b 1641->1655 1650 140046b32 call 14013cd40 1646->1650 1651 140046b1d-140046b30 1646->1651 1650->1645 1651->1629 1651->1650 1657 140046d76 call 14013cd40 1654->1657 1658 140046d5e-140046d73 1654->1658 1659 140046d9d-140046da5 call 14013cd40 1655->1659 1660 140046daa-140046db7 1655->1660 1656->1656 1661 140046c5b-140046c7d call 140009260 call 140035da0 1656->1661 1657->1655 1658->1657 1659->1660 1669 140046cb3-140046cbb 1661->1669 1670 140046c7f-140046c96 1661->1670 1673 140046cf1-140046d16 call 14013cd20 1669->1673 1674 140046cbd-140046cd5 1669->1674 1671 140046c98-140046cab 1670->1671 1672 140046cad-140046cb2 call 14013cd40 1670->1672 1671->1672 1675 140046d17-140046d1c call 14014c4cc 1671->1675 1672->1669 1677 140046cd7-140046cea 1674->1677 1678 140046cec call 14013cd40 1674->1678 1675->1641 1677->1641 1677->1678 1678->1673
              APIs
              • GetModuleFileNameW.KERNEL32(?,?,?,?,?,?,?,?,00000000,00000001400478C5), ref: 0000000140046AC5
              • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 0000000140046B5C
              • GetCurrentProcess.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,0000000140047685), ref: 0000000140046BFF
              • GetProcessImageFileNameW.PSAPI(?,?,?,?,?,?,?,?,?,?,?,?,00000000,0000000140047685), ref: 0000000140046C0E
              • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 0000000140046D17
              • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 0000000140046D1D
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: _invalid_parameter_noinfo_noreturn$FileNameProcess$CurrentImageModule
              • String ID:
              • API String ID: 1832280428-0
              • Opcode ID: ba64fc8e139bb2f5e48f7d4f83b44e0c1e79f37bcf759785589c5b864ed070ad
              • Instruction ID: 9d4b724f015df147c315dc65e45c68d65ea21a0d4aa9de6c9088870609f9364d
              • Opcode Fuzzy Hash: ba64fc8e139bb2f5e48f7d4f83b44e0c1e79f37bcf759785589c5b864ed070ad
              • Instruction Fuzzy Hash: E791BC72B14B8081EA118F66E44439EB3A1E789BE4F545325FBA907BE9DF78D490CB40

              Control-flow Graph

              APIs
                • Part of subcall function 000000014000E800: SwitchToThread.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,-0000002E,000000014000DAA0), ref: 000000014000E8DD
                • Part of subcall function 000000014000E800: Sleep.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,-0000002E,000000014000DAA0), ref: 000000014000E8EA
              • RegOpenKeyExW.KERNEL32 ref: 000000014000DAD1
              • RegQueryValueExW.KERNEL32 ref: 000000014000DB08
              • RegCloseKey.ADVAPI32 ref: 000000014000DB12
                • Part of subcall function 000000014000D2F0: GetModuleFileNameW.KERNEL32 ref: 000000014000D334
                • Part of subcall function 000000014000D2F0: SysAllocString.OLEAUT32 ref: 000000014000D33E
                • Part of subcall function 000000014000D2F0: SysAllocString.OLEAUT32 ref: 000000014000D3DE
                • Part of subcall function 000000014000D2F0: SysAllocString.OLEAUT32 ref: 000000014000D42D
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: AllocString$CloseFileModuleNameOpenQuerySleepSwitchThreadValue
              • String ID: SOFTWARE\Microsoft\Windows NT\CurrentVersion$UBR
              • API String ID: 2069460334-1999827919
              • Opcode ID: 2dd774db59b199ea5cdc9f663b069d3836465939255def7f1d4cbc2491be5a88
              • Instruction ID: f93b56ab3c629cbd67b773c966ce461e7c45a0b795098969249fcd14c68712d0
              • Opcode Fuzzy Hash: 2dd774db59b199ea5cdc9f663b069d3836465939255def7f1d4cbc2491be5a88
              • Instruction Fuzzy Hash: 05916D72A11B8186E711DF62E4543E873A4F79DB88F559226BB8C07766EF78C290C350

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1819 1fff3a0-1fff412 call 200b4c0 * 2 CreateToolhelp32Snapshot 1826 1fff418-1fff433 Thread32First 1819->1826 1827 1fff610-1fff621 call 200b4e0 call 2014000 1819->1827 1826->1827 1828 1fff439-1fff447 1826->1828 1837 1fff626-1fff630 call 2014000 1827->1837 1830 1fff44b-1fff452 1828->1830 1832 1fff5fc-1fff60a 1830->1832 1833 1fff458-1fff463 1830->1833 1832->1827 1832->1830 1833->1832 1836 1fff469-1fff4d8 call 2014b50 1833->1836 1836->1832 1843 1fff4de-1fff4f2 call 2015480 1836->1843 1844 1fff639-1fff643 call 200b4e0 1837->1844 1845 1fff632-1fff637 1837->1845 1843->1832 1851 1fff4f8-1fff52e call 2014df0 1843->1851 1847 1fff645-1fff658 1844->1847 1845->1847 1851->1832 1854 1fff534-1fff56f call 20151c0 1851->1854 1854->1832 1857 1fff575-1fff586 call 20147d0 1854->1857 1857->1832 1860 1fff588-1fff5f5 call 1fe1000 call 20044a0 call 2015270 1857->1860 1866 1fff5fa NtResumeThread 1860->1866 1866->1832
              APIs
              • CreateToolhelp32Snapshot.KERNEL32 ref: 01FFF406
              • Thread32First.KERNEL32 ref: 01FFF42B
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387519872.0000000001FE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 01FE1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1fe1000_sGfciyumij.jbxd
              Similarity
              • API ID: CreateFirstSnapshotThread32Toolhelp32
              • String ID: 0
              • API String ID: 490256885-4108050209
              • Opcode ID: fb1a1b96e559aa1530ecb2324eae7579615e09b3a3f5883ae9b762a1d4b345d2
              • Instruction ID: d42604cc4683dcdf0e15632b0098fcdd1ffdaa48214cc33d31925b75ba2e5615
              • Opcode Fuzzy Hash: fb1a1b96e559aa1530ecb2324eae7579615e09b3a3f5883ae9b762a1d4b345d2
              • Instruction Fuzzy Hash: 9B617171218B488FE794EF29D848BAAB7E1FFC8304F50456DA64EC32A0DFB4D5458B42
              APIs
              • NtAllocateVirtualMemory.NTDLL(?,?,?,?,?,?,?,?,?,?,?,?,7FFFFFFFFFFFFFFE,0000000140019423), ref: 0000000140033AA7
              • NtProtectVirtualMemory.NTDLL(?,?,?,?,?,?,?,?,?,?,?,?,7FFFFFFFFFFFFFFE,0000000140019423), ref: 0000000140033ACE
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: MemoryVirtual$AllocateProtect
              • String ID:
              • API String ID: 2931642484-0
              • Opcode ID: 65ef6fb0ad4f5bbb93bc364a7f9e746dec585cdcc59158779761026988766e45
              • Instruction ID: d2e3070823e07c721c61363a9a953ecbaf913381e04c0e2bd01639375735bcca
              • Opcode Fuzzy Hash: 65ef6fb0ad4f5bbb93bc364a7f9e746dec585cdcc59158779761026988766e45
              • Instruction Fuzzy Hash: 6821C672314B8082EB625B36A454B9B67A4E789BF4F940321EB7A57AE4DF3DC144C700
              APIs
              • LdrGetProcedureAddress.NTDLL ref: 01FECDB2
              Memory Dump Source
              • Source File: 00000000.00000002.3387519872.0000000001FE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 01FE1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1fe1000_sGfciyumij.jbxd
              Similarity
              • API ID: AddressProcedure
              • String ID:
              • API String ID: 3653107232-0
              • Opcode ID: 64a4c363e66e8fcb324c2d013a85a570e217f1f41a485886b1e3891cf8e103dc
              • Instruction ID: e0e54d3ddb25e5fcacab961fb37011acb1436bfe6bd88652fb0e43ad50826c85
              • Opcode Fuzzy Hash: 64a4c363e66e8fcb324c2d013a85a570e217f1f41a485886b1e3891cf8e103dc
              • Instruction Fuzzy Hash: D631B87151CB088BC7689F18DC4A6BAF7E4FB95711F54062EE58AC3211D632F8468BC7
              Memory Dump Source
              • Source File: 00000000.00000002.3387519872.0000000001FE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 01FE1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1fe1000_sGfciyumij.jbxd
              Similarity
              • API ID: CreateFirstSnapshotThread32Toolhelp32
              • String ID:
              • API String ID: 490256885-0
              • Opcode ID: 6d431203f5ad2e3b4f9a634e3776c8fe81fb6f5dc60a405660c162b949f7cce5
              • Instruction ID: 1e21b5e4749d97d444b9995d62e9c93c7281df91ce1cbcd18bac80e61b93d3ce
              • Opcode Fuzzy Hash: 6d431203f5ad2e3b4f9a634e3776c8fe81fb6f5dc60a405660c162b949f7cce5
              • Instruction Fuzzy Hash: 90629270118B098FD7A4DF18D884BA6B7E1FB98304F2146BED58DC7265CF75A846CB82
              Memory Dump Source
              • Source File: 00000000.00000002.3387519872.0000000001FE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 01FE1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1fe1000_sGfciyumij.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 246b04183441d9db0d4c236240df2ca26f18e78107733016fa740d2a375581b5
              • Instruction ID: 689193dce21a2178597584dfeb1dc912c21f8a037c47fcaddad8458030ab8fa2
              • Opcode Fuzzy Hash: 246b04183441d9db0d4c236240df2ca26f18e78107733016fa740d2a375581b5
              • Instruction Fuzzy Hash: 26411BB151CB488FE7B89F0CA8466EAB7E0FB99720F10492FD5C983215D775A4428BC3
              Memory Dump Source
              • Source File: 00000000.00000002.3387519872.0000000001FE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 01FE1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1fe1000_sGfciyumij.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 7425b9f205f2e48f6743ce85b3d4803992b94f2dd7c42288ff67dbf43d2a16d5
              • Instruction ID: 8db6a6b91e994cf990dceb87c826fe262d45ad6f719356711da3472fdd272898
              • Opcode Fuzzy Hash: 7425b9f205f2e48f6743ce85b3d4803992b94f2dd7c42288ff67dbf43d2a16d5
              • Instruction Fuzzy Hash: 6A21817161DB459FE754DF08D8466AABBE4FB98725F20091FE449C3320D7759480CB83
              Memory Dump Source
              • Source File: 00000000.00000002.3387519872.0000000001FE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 01FE1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1fe1000_sGfciyumij.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 4459b4d784854b5074084b1eb2e58009c50c2c7bf0fd286647bf740f6eacac18
              • Instruction ID: 43fd8a12b9fc72cff2c6aa36ce37eec1b11199900c8fe286ce02d316e77ae5d0
              • Opcode Fuzzy Hash: 4459b4d784854b5074084b1eb2e58009c50c2c7bf0fd286647bf740f6eacac18
              • Instruction Fuzzy Hash: 3211C23066CB498FDB94EF589847769B7E4F798316F40481EE889C3260D775E480CB93
              Memory Dump Source
              • Source File: 00000000.00000002.3387519872.0000000001FE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 01FE1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1fe1000_sGfciyumij.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: c9efb2dc69225788838bd08ce1b571aed7e5ff7df66dff9cf99eed66fee9a7a8
              • Instruction ID: 9427e1ceea94dc99f4c7660af0a9c8d95a22435e4278847c3fb278da2a30aa11
              • Opcode Fuzzy Hash: c9efb2dc69225788838bd08ce1b571aed7e5ff7df66dff9cf99eed66fee9a7a8
              • Instruction Fuzzy Hash: 5C110670668B498FDB58DF089C466B977E4F789315F80441EE889C3210D779D480CB83
              Memory Dump Source
              • Source File: 00000000.00000002.3387519872.0000000001FE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 01FE1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1fe1000_sGfciyumij.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 5bb11d53fe8240a521e5f77f5ce288efeffd0a38eebd87c38d9030f26bb6a810
              • Instruction ID: cab3343340696a087f5ceeff57b3367f4f9a759627eca1ef027f83b69cdad3a9
              • Opcode Fuzzy Hash: 5bb11d53fe8240a521e5f77f5ce288efeffd0a38eebd87c38d9030f26bb6a810
              • Instruction Fuzzy Hash: AB115C70518B488FE724AF9CD446776F7D1FB84314F50061DEA89C21B0EBF6914C8643
              Memory Dump Source
              • Source File: 00000000.00000002.3387519872.0000000001FE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 01FE1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1fe1000_sGfciyumij.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: a3b493b046dda1831e3ac93b31f1d57d2ffdedc147415695421c0937c946fff3
              • Instruction ID: 2ec74d127e9fae1ac7e93c9cfa308f484ffa87e37c0238cca0100799e30f0db2
              • Opcode Fuzzy Hash: a3b493b046dda1831e3ac93b31f1d57d2ffdedc147415695421c0937c946fff3
              • Instruction Fuzzy Hash: A411733061CB498FDB559F589C46BAA7BE0F798755F80081EE449C2250D775D480CAC3
              Memory Dump Source
              • Source File: 00000000.00000002.3387519872.0000000001FE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 01FE1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1fe1000_sGfciyumij.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: c6c2dce99591ed636752d02e92fb4e83679b8b4534c19c070d62bd12e62a70ad
              • Instruction ID: 7429a33435f097e636ef93c2ab2fdef3821c7a0715a70f4a3c4259289c898639
              • Opcode Fuzzy Hash: c6c2dce99591ed636752d02e92fb4e83679b8b4534c19c070d62bd12e62a70ad
              • Instruction Fuzzy Hash: 6301B53062CB458FEB48EB1898576BA77F1FB89714F14491EE44EC3660DB39E9408B83
              Memory Dump Source
              • Source File: 00000000.00000003.2156549221.0000000001FA0000.00000040.00001000.00020000.00000000.sdmp, Offset: 01FA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_3_1fa0000_sGfciyumij.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: d7e753f29fc521fa2d0b6c7a6994e588844e22f1070003091da851a212630d82
              • Instruction ID: d353e1c02ee15b97a1c3781f67527a920bded1c3206dd2b5a59dc73660b7393f
              • Opcode Fuzzy Hash: d7e753f29fc521fa2d0b6c7a6994e588844e22f1070003091da851a212630d82
              • Instruction Fuzzy Hash: 0AF068B0A28B448BD744DF2984C963577E1FBDC655F24452EE899C7361CB329842CB83
              Memory Dump Source
              • Source File: 00000000.00000003.2156549221.0000000001FA0000.00000040.00001000.00020000.00000000.sdmp, Offset: 01FA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_3_1fa0000_sGfciyumij.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: c03d8a45eb9b0d3ccc835ff03553e770b46152858ebd01b16508ffef1a6f20c3
              • Instruction ID: ce92d2cc8ead630f0bca072f6df8d887305257e8db4f3d07bd611d37afa88fce
              • Opcode Fuzzy Hash: c03d8a45eb9b0d3ccc835ff03553e770b46152858ebd01b16508ffef1a6f20c3
              • Instruction Fuzzy Hash: 57F08970A24F444BC704AF2C884A53577E2F7E8645F54452EE848C7361DB35E542CB43
              Memory Dump Source
              • Source File: 00000000.00000002.3387519872.0000000001FE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 01FE1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1fe1000_sGfciyumij.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 3a87759f1dbb7da0b31a2215c550786eb7d616866bd4ea5bb0906d9c5e547a0c
              • Instruction ID: fcfea591302347233b5c6b390070c5affd6ef56cfe6895f20972d02546fb5ab3
              • Opcode Fuzzy Hash: 3a87759f1dbb7da0b31a2215c550786eb7d616866bd4ea5bb0906d9c5e547a0c
              • Instruction Fuzzy Hash: 86D0A97348DB188EE7209AA8F8833E8B3E0F781328F80482FC18CC2002D63E40468B06

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1488 1400147c0-140014842 call 140014930 GetModuleHandleW GetProcAddress GetNativeSystemInfo 1491 140014844-140014859 GetCurrentProcess call 140036c70 1488->1491 1492 140014870-140014873 call 140014ba0 1488->1492 1491->1492 1497 14001485b-140014865 1491->1497 1496 140014878-14001487f 1492->1496 1498 140014881-1400148ac RegOpenKeyExW 1496->1498 1499 1400148cc-1400148f2 call 14013cd20 1496->1499 1497->1492 1501 140014867 1497->1501 1502 1400148bb-1400148be 1498->1502 1503 1400148ae-1400148b9 RegCloseKey 1498->1503 1501->1492 1502->1499 1504 1400148c0-1400148c3 1502->1504 1503->1499 1504->1499 1506 1400148c5 1504->1506 1506->1499
              APIs
                • Part of subcall function 0000000140014930: GetModuleHandleW.KERNEL32 ref: 0000000140014976
                • Part of subcall function 0000000140014930: GetProcAddress.KERNEL32 ref: 0000000140014986
                • Part of subcall function 0000000140014930: GetVersionExW.KERNEL32 ref: 00000001400149B3
                • Part of subcall function 0000000140014930: NetWkstaGetInfo.NETAPI32 ref: 00000001400149CF
                • Part of subcall function 0000000140014930: NetApiBufferFree.NETAPI32 ref: 00000001400149E5
                • Part of subcall function 0000000140014930: RegOpenKeyExW.ADVAPI32 ref: 0000000140014A11
                • Part of subcall function 0000000140014930: RegQueryValueExW.ADVAPI32 ref: 0000000140014A55
                • Part of subcall function 0000000140014930: RegQueryValueExW.ADVAPI32 ref: 0000000140014A94
                • Part of subcall function 0000000140014930: RegQueryValueExW.ADVAPI32 ref: 0000000140014ADD
              • GetModuleHandleW.KERNEL32(?,?,?,?,?,?,?,?,00000000,000000014000E93E), ref: 0000000140014805
              • GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,00000000,000000014000E93E), ref: 0000000140014815
              • GetNativeSystemInfo.KERNEL32(?,?,?,?,?,?,?,?,00000000,000000014000E93E), ref: 000000014001482D
              • GetCurrentProcess.KERNEL32(?,?,?,?,?,?,?,?,00000000,000000014000E93E), ref: 0000000140014844
                • Part of subcall function 0000000140036C70: GetModuleHandleW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 0000000140036CD4
                • Part of subcall function 0000000140036C70: GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 0000000140036CE4
                • Part of subcall function 0000000140036C70: GetModuleHandleW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 0000000140036D24
                • Part of subcall function 0000000140036C70: GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 0000000140036D34
                • Part of subcall function 0000000140036C70: GetCurrentProcess.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 0000000140036D99
                • Part of subcall function 0000000140036C70: IsWow64Process.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 0000000140036DA7
                • Part of subcall function 0000000140036C70: GetNativeSystemInfo.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 0000000140036DBD
              • RegOpenKeyExW.ADVAPI32(?,?,?,?,?,?,?,?,00000000,000000014000E93E), ref: 00000001400148A4
              • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,00000000,000000014000E93E), ref: 00000001400148B3
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: AddressHandleModuleProc$InfoProcessQueryValue$CurrentNativeOpenSystem$BufferCloseFreeVersionWkstaWow64
              • String ID: GetNativeSystemInfo$NativeSoftware\Wow6432Node\Microsoft\Windows\CurrentVersion\Run$kernel32.dll
              • API String ID: 2650187040-1704487226
              • Opcode ID: 1736c4be3a20f96ecfb9bdb5335c42383f1c3165f1d74c320c28dcbad8b4591c
              • Instruction ID: 74280784d4bc9cf742dc04d5e9cf70378f3f4cdf0393e2d2d249149cc7765621
              • Opcode Fuzzy Hash: 1736c4be3a20f96ecfb9bdb5335c42383f1c3165f1d74c320c28dcbad8b4591c
              • Instruction Fuzzy Hash: 1B314A32214B8081EB929F66F8843DA77A0FB8DB84F581125FB8A4B7B9DF39C545C750

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1507 14016cac4-14016cb16 1508 14016cc07 1507->1508 1509 14016cb1c-14016cb1f 1507->1509 1512 14016cc09-14016cc25 1508->1512 1510 14016cb21-14016cb24 1509->1510 1511 14016cb29-14016cb2c 1509->1511 1510->1512 1513 14016cb32-14016cb41 1511->1513 1514 14016cbec-14016cbff 1511->1514 1515 14016cb43-14016cb46 1513->1515 1516 14016cb51-14016cb70 LoadLibraryExW 1513->1516 1514->1508 1517 14016cc46-14016cc55 GetProcAddress 1515->1517 1518 14016cb4c 1515->1518 1519 14016cc26-14016cc3b 1516->1519 1520 14016cb76-14016cb7f GetLastError 1516->1520 1523 14016cc57-14016cc7e 1517->1523 1524 14016cbe5 1517->1524 1521 14016cbd8-14016cbdf 1518->1521 1519->1517 1522 14016cc3d-14016cc40 FreeLibrary 1519->1522 1525 14016cbc6-14016cbd0 1520->1525 1526 14016cb81-14016cb98 call 140154d9c 1520->1526 1521->1513 1521->1524 1522->1517 1523->1512 1524->1514 1525->1521 1526->1525 1529 14016cb9a-14016cbae call 140154d9c 1526->1529 1529->1525 1532 14016cbb0-14016cbc4 LoadLibraryExW 1529->1532 1532->1519 1532->1525
              APIs
              • FreeLibrary.KERNEL32(?,?,?,000000014016D2B8,?,?,?,?,0000000140163E91,?,?,?,?,000000014013C04C), ref: 000000014016CC40
              • GetProcAddress.KERNEL32(?,?,?,000000014016D2B8,?,?,?,?,0000000140163E91,?,?,?,?,000000014013C04C), ref: 000000014016CC4C
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: AddressFreeLibraryProc
              • String ID: api-ms-$ext-ms-
              • API String ID: 3013587201-537541572
              • Opcode ID: 1adb821155c22b541925954a9dc0fd7253069aa58c6e7ffdb90b8f366aa64c41
              • Instruction ID: 4ad419e63c0451b2e7d95b3925d1edb6d7b9003227e2fc4fdfccc5f616971cac
              • Opcode Fuzzy Hash: 1adb821155c22b541925954a9dc0fd7253069aa58c6e7ffdb90b8f366aa64c41
              • Instruction Fuzzy Hash: D8419D72321A4092EA57DB17AC04BF523A5BB4DFE0F495A25DF0D8B7A4EB39C945C304

              Control-flow Graph

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: Createstd::bad_exception::bad_exception$Event$Mutex
              • String ID: cannot create reader/writer lock
              • API String ID: 2124267931-2318472515
              • Opcode ID: ca99f4f60c774062c7544afa5256e3ed1891e3e61c66dd1e14279c19b4dfa002
              • Instruction ID: c0c37d7130e05df2cec0792781b445151af1821803f21a84a8343b1cfc7f81da
              • Opcode Fuzzy Hash: ca99f4f60c774062c7544afa5256e3ed1891e3e61c66dd1e14279c19b4dfa002
              • Instruction Fuzzy Hash: 0821B172311B05A2FF22EB25E4507DA2360FB8C784F946425AB4D47AB5EE3DC609CB00

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1743 1fe7830-1fe7883 1744 1fe788a-1fe7892 InternetOpenW 1743->1744 1745 1fe7885-1fe7888 1743->1745 1746 1fe7898-1fe78d7 InternetConnectW 1744->1746 1747 1fe7af9-1fe7afd 1744->1747 1745->1744 1746->1747 1748 1fe78dd-1fe792b 1746->1748 1749 1fe7aff-1fe7b0c 1747->1749 1748->1749 1755 1fe7931-1fe793b 1748->1755 1750 1fe7b0e-1fe7b11 InternetCloseHandle 1749->1750 1751 1fe7b17-1fe7b1a 1749->1751 1750->1751 1753 1fe7b1c-1fe7b1d 1751->1753 1754 1fe7b25-1fe7b28 1751->1754 1753->1754 1756 1fe7b2a-1fe7b2b 1754->1756 1757 1fe7b33-1fe7b3b 1754->1757 1760 1fe793d-1fe7945 1755->1760 1761 1fe7990-1fe79ab 1755->1761 1756->1757 1758 1fe7bd0-1fe7be3 1757->1758 1759 1fe7b41-1fe7b4b 1757->1759 1762 1fe7b4d-1fe7b54 call 2011230 1759->1762 1763 1fe7b62-1fe7b73 1759->1763 1760->1761 1764 1fe7947-1fe798b call 2012750 * 2 1760->1764 1761->1749 1771 1fe79b1-1fe79ba 1761->1771 1762->1763 1774 1fe7b56-1fe7b60 call 200b4e0 1762->1774 1767 1fe7b7a-1fe7b8a call 1fecb60 1763->1767 1768 1fe7b75-1fe7b78 1763->1768 1764->1761 1780 1fe7b8c-1fe7bb8 call 1fea050 call 200b4e0 1767->1780 1781 1fe7bba-1fe7bce call 2011410 1767->1781 1768->1758 1768->1767 1775 1fe79bc-1fe79de call 2011270 HttpSendRequestA 1771->1775 1776 1fe79e6-1fe7a0a 1771->1776 1774->1758 1775->1749 1792 1fe79e4-1fe7a16 1775->1792 1793 1fe7a0c 1776->1793 1780->1758 1781->1758 1781->1774 1797 1fe7a18-1fe7a1f call 200b4e0 1792->1797 1798 1fe7a24-1fe7a3b call 200b4c0 1792->1798 1793->1775 1797->1798 1802 1fe7a3f-1fe7a5b 1798->1802 1804 1fe7ae3-1fe7af7 call 200b4e0 1802->1804 1805 1fe7a61-1fe7a69 1802->1805 1804->1750 1805->1804 1807 1fe7a6b-1fe7a7e 1805->1807 1807->1804 1810 1fe7a80-1fe7a86 1807->1810 1810->1804 1811 1fe7a88-1fe7a96 1810->1811 1812 1fe7aac-1fe7aaf call 200b4c0 1811->1812 1813 1fe7a98-1fe7aaa 1811->1813 1815 1fe7ab4-1fe7ade call 20044a0 1812->1815 1813->1815 1815->1802
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3387519872.0000000001FE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 01FE1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1fe1000_sGfciyumij.jbxd
              Similarity
              • API ID: Internet$CloseConnectHandleHttpOpenRequestSend
              • String ID:
              • API String ID: 304526711-0
              • Opcode ID: 488b002841e1bd412dd0cc874d8b1d67b82a8a3cb49ca359c288d6713fbca809
              • Instruction ID: a15fc48f00f78efd7e64581b1a6caca0f077ca9043508b051790377d1044dade
              • Opcode Fuzzy Hash: 488b002841e1bd412dd0cc874d8b1d67b82a8a3cb49ca359c288d6713fbca809
              • Instruction Fuzzy Hash: 9BA1B330618B098FEB18EF5CD8597AAB7E5FB98700F04066DE94AC3294DF75D9418BC2

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1867 14000a960-14000a9a2 call 14000bb70 1871 14000a9a4-14000a9a8 1867->1871 1872 14000a9ef-14000aa1a call 14000bb70 1867->1872 1874 14000a9aa-14000a9bc 1871->1874 1875 14000a9df-14000a9ea 1871->1875 1872->1871 1876 14000ab20-14000ab37 1872->1876 1878 14000a9da call 14013cd40 1874->1878 1879 14000a9be-14000a9d1 1874->1879 1875->1876 1878->1875 1879->1878 1881 14000ab38-14000ade9 call 14014c4cc call 14000b7c0 call 14013cd74 call 14017a4d0 * 2 call 140010140 call 14000c8f0 call 140010520 call 14000c910 call 14000b7c0 call 14000da60 call 14000ba00 call 14000a960 1879->1881 1920 14000ae73-14000ae7e 1881->1920 1921 14000adef-14000ae45 AllocateAndInitializeSid 1881->1921 1924 14000ae84-14000ae88 1920->1924 1925 14000b040-14000b057 1920->1925 1922 14000ae47-14000ae59 CheckTokenMembership 1921->1922 1923 14000ae69-14000ae6d 1921->1923 1926 14000ae5b 1922->1926 1927 14000ae5f-14000ae63 FreeSid 1922->1927 1923->1920 1929 14000b76a-14000b7b6 call 14000a8a0 ShellExecuteW call 140152bc4 call 14013b928 call 14013b970 1923->1929 1930 14000ae90-14000aead call 140152cac 1924->1930 1928 14000b060-14000b07d call 140152cac 1925->1928 1926->1927 1927->1923 1938 14000b083-14000b095 call 140152cac 1928->1938 1939 14000b13a-14000b13f 1928->1939 1944 14000aeaf-14000af87 1930->1944 1938->1939 1951 14000b09b-14000b0ad call 140152cac 1938->1951 1939->1928 1943 14000b145 1939->1943 1947 14000b762-14000b769 call 140152bc4 1943->1947 1952 14000af90-14000afa2 call 140152cac 1944->1952 1947->1929 1962 14000b0b3-14000b0d0 call 140152cac 1951->1962 1963 14000b759 1951->1963 1960 14000b034-14000b03a 1952->1960 1961 14000afa8-14000afba call 140152cac 1952->1961 1960->1925 1960->1952 1961->1960 1970 14000afbc-14000b016 call 140152cac * 4 1961->1970 1962->1939 1971 14000b0d2-14000b0e7 SysAllocString 1962->1971 1963->1947 1965 14000b75d call 14000e7e0 1963->1965 1965->1947 1989 14000b14a-14000b14f call 14000e110 1970->1989 1990 14000b01c-14000b02e call 140152cac 1970->1990 1973 14000b133 1971->1973 1974 14000b0e9-14000b10e call 1400043e0 1971->1974 1973->1939 1974->1973 1983 14000b110-14000b12c 1974->1983 1983->1973 1989->1947 1990->1960 1990->1989
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID:
              • String ID: /disable$/uninstall
              • API String ID: 0-1084472821
              • Opcode ID: fbc4f2629d237c453a7ec397fc63e7d022fa54acb8b014f2ce1fab5554fd89aa
              • Instruction ID: b81a4eee4a98deaf5aeaf7e76c51fce8f8e6651ab16087b190fbcae63c2a01d1
              • Opcode Fuzzy Hash: fbc4f2629d237c453a7ec397fc63e7d022fa54acb8b014f2ce1fab5554fd89aa
              • Instruction Fuzzy Hash: 3B51AC76710B8085EB16DB66E4503EE33A1B78EBC8F544216EB9D07BAADF78C191C340

              Control-flow Graph

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: Startupstd::bad_exception::bad_exception
              • String ID: Failed to initialize network subsystem
              • API String ID: 36264510-1820565237
              • Opcode ID: b4eb353d5264da8f90b1a8a0ef867063e0c9c8b7a8b4c1db5961b8ebe8e52577
              • Instruction ID: 13c00bd7769de46b6a5651dd2a253a066179111457733b2a5429c6a39555dacd
              • Opcode Fuzzy Hash: b4eb353d5264da8f90b1a8a0ef867063e0c9c8b7a8b4c1db5961b8ebe8e52577
              • Instruction Fuzzy Hash: 7FF030B3214945A1FB21EB25F8553DA6321F799744FC06521A34D478BAEE7DC709C700
              APIs
              • SwitchToThread.KERNEL32 ref: 0000000140047837
              • Sleep.KERNEL32 ref: 0000000140047844
                • Part of subcall function 000000014013D334: AcquireSRWLockExclusive.KERNEL32(?,?,?,00000001400583E1,?,?,?,0000000140002BF9), ref: 000000014013D344
              • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 000000014004797A
                • Part of subcall function 000000014013D2C8: AcquireSRWLockExclusive.KERNEL32(?,?,?,000000014005840B,?,?,?,0000000140002BF9), ref: 000000014013D2D8
                • Part of subcall function 000000014013D2C8: ReleaseSRWLockExclusive.KERNEL32(?,?,?,000000014005840B,?,?,?,0000000140002BF9), ref: 000000014013D318
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: ExclusiveLock$Acquire$ReleaseSleepSwitchThread_invalid_parameter_noinfo_noreturn
              • String ID:
              • API String ID: 2006716402-0
              • Opcode ID: 9afc03b3c6b6327597985d4be38e61f325282314ef3a536221abb02654494955
              • Instruction ID: 7c9bd40af7ea37067aac91f1722c10aceb3b74398300da81d0ee049923a7fd0f
              • Opcode Fuzzy Hash: 9afc03b3c6b6327597985d4be38e61f325282314ef3a536221abb02654494955
              • Instruction Fuzzy Hash: 43619B32211A9086FA23CB26E8457D973A1F78CB90F404226EB5D837F1EFB9C984C744
              Strings
              Memory Dump Source
              • Source File: 00000000.00000003.2156549221.0000000001FA0000.00000040.00001000.00020000.00000000.sdmp, Offset: 01FA0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_3_1fa0000_sGfciyumij.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID: 0-3916222277
              • Opcode ID: e1b5f217ab961a454b36722efd1ce63e8d0791c74eab14a614d4f9e3fc2a9a33
              • Instruction ID: fe7e72448aa6e719fc5d9a83d221469554e4d068be75456e41cdb456463e298e
              • Opcode Fuzzy Hash: e1b5f217ab961a454b36722efd1ce63e8d0791c74eab14a614d4f9e3fc2a9a33
              • Instruction Fuzzy Hash: D7A1A33161CB088FDB54EF1CC885BAAB7E1FB98310F54466EE48AC7265DB34E545CB82
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3387519872.0000000001FE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 01FE1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1fe1000_sGfciyumij.jbxd
              Similarity
              • API ID: Fiber$CreateDelete
              • String ID:
              • API String ID: 2527733159-0
              • Opcode ID: a81c3d8a98be896dd9ba18f06cc8f029549e5d5c5a40f868ab439c78b2d98936
              • Instruction ID: 6e11fad19a7f0c31b1f82f6f950fdefedfd823bb0b7ed7ec0cf91211a4d76df8
              • Opcode Fuzzy Hash: a81c3d8a98be896dd9ba18f06cc8f029549e5d5c5a40f868ab439c78b2d98936
              • Instruction Fuzzy Hash: 0E51F831A189188FEB68AF2C9C5976973D5FF58350F20072EE99BC31E1DA75984287C2
              APIs
              • SwitchToThread.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,-0000002E,000000014000DAA0), ref: 000000014000E8DD
              • Sleep.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,-0000002E,000000014000DAA0), ref: 000000014000E8EA
                • Part of subcall function 000000014013D334: AcquireSRWLockExclusive.KERNEL32(?,?,?,00000001400583E1,?,?,?,0000000140002BF9), ref: 000000014013D344
                • Part of subcall function 000000014013D2C8: AcquireSRWLockExclusive.KERNEL32(?,?,?,000000014005840B,?,?,?,0000000140002BF9), ref: 000000014013D2D8
                • Part of subcall function 000000014013D2C8: ReleaseSRWLockExclusive.KERNEL32(?,?,?,000000014005840B,?,?,?,0000000140002BF9), ref: 000000014013D318
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: ExclusiveLock$Acquire$ReleaseSleepSwitchThread
              • String ID:
              • API String ID: 3066270627-0
              • Opcode ID: d011e9fcae6a3cf8af6303155344bf9c5ac1203140cdbd4589f26c72ccdfb819
              • Instruction ID: b616942290d6e4a425ff43685c7309482b68317d53eb933a04cff363b0de1ebb
              • Opcode Fuzzy Hash: d011e9fcae6a3cf8af6303155344bf9c5ac1203140cdbd4589f26c72ccdfb819
              • Instruction Fuzzy Hash: 64515B71206A8086FB52DB2BF8547DA73A5BB8CB90F444125EB4A873F5EF39C849C740
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: Concurrency::cancel_current_task$std::bad_alloc::bad_alloc
              • String ID:
              • API String ID: 1173176844-0
              • Opcode ID: b363fbfb082da6ed4b100b66efc0b1c3cca4414650e2484265a6478799093a01
              • Instruction ID: 1a53bc0ae4094479f314cc7956cdd9da91ea7a3763b39e4bee811d2a55a54395
              • Opcode Fuzzy Hash: b363fbfb082da6ed4b100b66efc0b1c3cca4414650e2484265a6478799093a01
              • Instruction Fuzzy Hash: 57E0127072118652FD7B32F358553E906840B1EF70E1C1B307B3B096F7E934C4619691
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: CloseHandle
              • String ID:
              • API String ID: 2962429428-0
              • Opcode ID: 7b0a4b3615aaa7102769c46be8e6c591c76dcee8c9bcb9b14aa991e0f9ab2447
              • Instruction ID: 723df857803f82974ecfc79fad59c764d73f5c57e806b5e40e2d497afb2c1645
              • Opcode Fuzzy Hash: 7b0a4b3615aaa7102769c46be8e6c591c76dcee8c9bcb9b14aa991e0f9ab2447
              • Instruction Fuzzy Hash: 87D09232600904D1EB169B73E8A43A863B0E78CF99F182021DF1E47271CE38C6968324
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3387519872.0000000001FE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 01FE1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1fe1000_sGfciyumij.jbxd
              Similarity
              • API ID: CreateMutex
              • String ID:
              • API String ID: 1964310414-0
              • Opcode ID: 6f5cb151aadba70b4aa6e5bafaf7101ce807ceecab62b3beafb4f2b699b4b3ec
              • Instruction ID: 2783cefe23adccdaad7c35596865c942492d87e3334113898f7e708136684508
              • Opcode Fuzzy Hash: 6f5cb151aadba70b4aa6e5bafaf7101ce807ceecab62b3beafb4f2b699b4b3ec
              • Instruction Fuzzy Hash: 56E10F71518A0D8FE751EF14E894BE6BBF4F768340F60067BE84AC6264DB389245CB86
              APIs
                • Part of subcall function 0000000140056450: WaitForMultipleObjects.KERNEL32 ref: 0000000140056487
                • Part of subcall function 0000000140056450: ResetEvent.KERNEL32 ref: 00000001400564A3
                • Part of subcall function 0000000140056450: ResetEvent.KERNEL32 ref: 00000001400564AD
                • Part of subcall function 0000000140056450: ReleaseMutex.KERNEL32 ref: 00000001400564B6
                • Part of subcall function 00000001400561E0: CloseHandle.KERNEL32 ref: 00000001400561FC
                • Part of subcall function 00000001400561E0: CloseHandle.KERNEL32 ref: 0000000140056206
              • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 000000014003D5CC
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: CloseEventHandleReset$MultipleMutexObjectsReleaseWait_invalid_parameter_noinfo_noreturn
              • String ID:
              • API String ID: 2886672318-0
              • Opcode ID: abb6fcb1c4f4bafc8d95b9ee41e8c8d985039863a12ab0f272bb873287092e26
              • Instruction ID: 527263015702d4115b4742bf2f4fdd3bfb1e38bd9170e42860ca13b629b5449b
              • Opcode Fuzzy Hash: abb6fcb1c4f4bafc8d95b9ee41e8c8d985039863a12ab0f272bb873287092e26
              • Instruction Fuzzy Hash: C5118C72310B8092EA06EB2AE5543EE7361F74CBC8F440622EB5D47B66EF39C5A0C344
              APIs
              • HeapAlloc.KERNEL32(?,?,?,000000014016EC4D,?,?,00000000,00000001401649FF,?,?,?,000000014016572F,?,?,?,0000000140165625), ref: 0000000140167DEA
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: AllocHeap
              • String ID:
              • API String ID: 4292702814-0
              • Opcode ID: a20a491f826e01268f0b819b45a0d52f4775ead2c48b6af0959b61fcd8953722
              • Instruction ID: 84e013747916b1eb75d2c46b29caed73478c1f4ee43632a2669ef8d94d904506
              • Opcode Fuzzy Hash: a20a491f826e01268f0b819b45a0d52f4775ead2c48b6af0959b61fcd8953722
              • Instruction Fuzzy Hash: 1BF01C3130128557FA5756E76D51BF512845F5DFB4F4C0E205F2E862E1DA7CC4418610
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: _invalid_parameter_noinfo_noreturn
              • String ID: " "$%ls failed with exit code %d$Could not delete key = %ls\%ls\%ls$D:\Jenkins\workspace\N_MBCommon-vs2022\src\mbcommon\RegistryUtilities.cpp$DisableRegistryTools$Error deleting key %ls\%ls, %ls$Error deleting offline key %ls\%ls, %ls$Failed to open key = %ls\%ls, wow64 = 0x%x, %ls$Failed to open offline reg key %ls\%ls, %ls$Failed to open reg key %ls\%ls, wow64 = 0x%x, %ls$Failed to query reg key %ls\%ls, value name = %ls, %ls$Software\Microsoft\Windows\CurrentVersion\Policies\System$Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Policies\System$SysWOW64$Sysnative$System32$export "$import "$mb::common::system::RegistryUtilities::DeleteKey$mb::common::system::RegistryUtilities::DeleteKeyImpl$mb::common::system::RegistryUtilities::DeleteOfflineKeyImpl$mb::common::system::RegistryUtilities::ExportRegFile$mb::common::system::RegistryUtilities::ExportRegFileInWinPE$mb::common::system::RegistryUtilities::GetBinaryValueImpl$mb::common::system::RegistryUtilities::ImportRegFile
              • API String ID: 3668304517-4245381116
              • Opcode ID: 462b89b6e59b777cc80b1431fa8f37c4793ea1841da6239b619aff98cc51b877
              • Instruction ID: 49ed9c544f69a9d3cc1f42c8d135e64a04342989ce10c8dd96f7f0071bfe9ec8
              • Opcode Fuzzy Hash: 462b89b6e59b777cc80b1431fa8f37c4793ea1841da6239b619aff98cc51b877
              • Instruction Fuzzy Hash: B6537AB2B10B8485EB11DB6AE4443ED63A1F789BE8F505216EF6C17BA9DF78C585C300
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: _invalid_parameter_noinfo_noreturn$SimpleString::operator=
              • String ID: (X86)$%PROGRAMFILES%$%PROGRAMFILES%\$%PROGRAMFILES(X86)%\$%SYSDIR%$%SYSTEM%\$%SYSTEMROOT%\$%WINDIR%\$(X86)$.DLL$.EXE$D:\Jenkins\workspace\N_MBCommon-vs2022\src\mbcommon\RegistryUtilities.cpp$Failed to get value '%ls' for open offline registry subkey '%ls': %i$RUNDLL32 $RUNDLL32.EXE $RegOpenKey failed: Key=%s, RetCode=%d.$RegQueryValue failed: Key=%s, Value=%s, RetCode=%d.$SYSTEM32\$SYSTEMROOT\$Using GetValueString for registry value type %d$Using GetValueString for registry value type (%d), Key=%s, Value=%s$\??\$\SYSTEMROOT\$mb::common::system::RegistryUtilities::GetOfflineValueString$mb::common::system::RegistryUtilities::GetValueStringInternal
              • API String ID: 3611281024-742977986
              • Opcode ID: aec5005acf46235b870413662141df9ab2d7366cc6b36072e49790399cda7ed7
              • Instruction ID: a637c67bfd62308773ed7eb7ca593789563a044841fd4f796b840801913f95fe
              • Opcode Fuzzy Hash: aec5005acf46235b870413662141df9ab2d7366cc6b36072e49790399cda7ed7
              • Instruction Fuzzy Hash: 8F538CB2710B8095EB11DF6AE8443DD23A1F748BE8F405616EB6D1BAEADF78C585C340
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: _invalid_parameter_noinfo_noreturn$ConvertFreeLocalString
              • String ID: ACLs not initialized, cannot reset file permissions on %s.$ACLs not initialized, cannot reset folder permissions on %s.$BUILTIN\Administrators SID not initialized, cannot reset folder permissions on %ls.$D:\Jenkins\workspace\N_MBCommon-vs2022\src\mbcommon\Permissions.cpp$Error converting PSID to sid string, Error = %s$Error converting sid '%s' to PSID, Error = %s$Error getting security info on '%s', %s$Error resetting permissions on given file %s, Error = %s.$Error taking ownership of given object %s, Error = %s.$Object '%s' has a NULL SID for group$Object '%s' has a NULL SID for owner$Permissions$mb::common::system::Permissions::GetGroup$mb::common::system::Permissions::GetOwner$mb::common::system::Permissions::ResetFilePermissions$mb::common::system::Permissions::ResetFolderOwnership$mb::common::system::Permissions::ResetFolderPermissions$mb::common::system::Permissions::SetOwner
              • API String ID: 347880976-2862994028
              • Opcode ID: afaa8cd3f92774f8b916f9589616477a91638bf1b100b1ab48e2dc968674ca20
              • Instruction ID: 93fe4ab0cfac20fe5e10077eb05eb808461078215abf2cda143accd2164bfda5
              • Opcode Fuzzy Hash: afaa8cd3f92774f8b916f9589616477a91638bf1b100b1ab48e2dc968674ca20
              • Instruction Fuzzy Hash: 93C289B2B10B4085EB11DB66E4847ED23A1F788BE8F815226EF5D17BA8DF78C195C344
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: ErrorLastService$CloseHandle$_invalid_parameter_noinfo_noreturn$Open$ManagerSleepSwitchThread
              • String ID: D:\Jenkins\workspace\N_MBAMWsc\src\wsccom.cpp$D:\Jenkins\workspace\N_MBCommon-vs2022\src\mbcommon\WindowsService.cpp$Failed to open wscsvc handle %08X$MBAMWsc$NotifyServiceStatusChange failed %u$OpenSCManager failed. Error %u.$OpenService failed on %1s. Error %u.$StartService failed %08X$Unable to get start state for %ls$Waiting %u seconds for wscsvc to enter running state$mb::common::system::WindowsService::GetServiceStartState$mb::common::system::WindowsService::Open$wsccom::WaitForWscServiceRunning$wscsvc$wscsvc did not enter the running state %u %u %08X$wscsvc has entered the running state$wscsvc is already running$wscsvc state %u pid %u
              • API String ID: 2726523056-1075624375
              • Opcode ID: f814ba64a25b7a01a76ce7358d567553f583ea29953cea7f00d4da0e5ef5a6b4
              • Instruction ID: 07f26e6115913c6db5420ea2eec29cca9812e2566524e71bbd7a5ecfc2170309
              • Opcode Fuzzy Hash: f814ba64a25b7a01a76ce7358d567553f583ea29953cea7f00d4da0e5ef5a6b4
              • Instruction Fuzzy Hash: 5B528BB6610B8486EB11CF26E8847ED33A1F78CB98F505216EB8D47AB9DF78C585D340
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: String$AllocFree$CallCountCurrentLocalNamedPipeProcessThreadTickTime_invalid_parameter_noinfo_noreturn$ClassInitializeObjectSleep
              • String ID: Error 0x$D:\Jenkins\workspace\N_MBAMWsc\src\IService.cpp$Initialize complete.$MBAMWsc$MbamService::Initialize$NeedAKey$\\.\pipe\MBLG
              • API String ID: 3662678588-1227516934
              • Opcode ID: 6a60c12cac678354da0e1a7e17c03cf93b820a5e75e704868b6d5b8e057fe969
              • Instruction ID: 35fe5bb89a2cccf6c61688297c03298982f1aee1f0a8af4f17683fb160d9ca06
              • Opcode Fuzzy Hash: 6a60c12cac678354da0e1a7e17c03cf93b820a5e75e704868b6d5b8e057fe969
              • Instruction Fuzzy Hash: 1C225BB2614B8096E712CF26E8443DE77A0F78DB94F545216EF8953BA8EF78C285C740
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: _invalid_parameter_noinfo_noreturn
              • String ID: D:\Jenkins\workspace\N_MBCommon-vs2022\src\mbcommon\RegistryUtilities.cpp$Entry: RegistryUtilities::GetHivePath(%p, %ls)$Entry: RegistryUtilities::GetOfflineHive(%ls, %p)$Entry: RegistryUtilities::TranslateHKU(%ls, %ls)$Exit: <- RegistryUtilities::TranslateHKU(%ls, %ls)$Exit: false <- RegistryUtilities::GetHivePath(%p, %ls)$Exit: false <- RegistryUtilities::GetOfflineHive(%ls, %p)$Exit: true <- RegistryUtilities::GetHivePath(%p, %ls)$Exit: true <- RegistryUtilities::GetOfflineHive(%ls, %p)$RegistryUtilities::TranslateHKU(%ls, %ls): profile not found for %ls$mb::common::system::RegistryUtilities::GetHivePath$mb::common::system::RegistryUtilities::GetOfflineHive$mb::common::system::RegistryUtilities::TranslateHKU
              • API String ID: 3668304517-3799554803
              • Opcode ID: 87dd03ea458205be0005401f9351cfab5973355789130229f8c8311f9301ba5c
              • Instruction ID: fe8202cd6a712caadc397c1c4c5253a0197549952831d91abc9ef9245069614f
              • Opcode Fuzzy Hash: 87dd03ea458205be0005401f9351cfab5973355789130229f8c8311f9301ba5c
              • Instruction Fuzzy Hash: 4D03ACB2A00B8485EB12CF6AE4443ED27A1F749BD8F50561AEB5D17BB9DF78C984C340
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: _invalid_parameter_noinfo_noreturn
              • String ID: Could not get security info for resetting permissions on key: Key=%s.$Could not open key after resetting permissions: Key=%s, status=%d.$D:\Jenkins\workspace\N_MBCommon-vs2022\src\mbcommon\RegistryUtilities.cpp$Entry: RegistryUtilities::EnumerateKeyImpl(%p, %ls, %p, %i, %i, %p:%i, %p:%ls)$Entry: RegistryUtilities::EnumerateOfflineKeyImpl(%p, %ls, %p, %i, %p:%i, %p:%ls)$Exit: <- RegistryUtilities::EnumerateKeyImpl(%p, %ls, %p, %i, %i, %p:%i, %p:%ls)$Exit: <- RegistryUtilities::EnumerateOfflineKeyImpl(%p, %ls, %p, %i, %p:%i, %p:%ls)$Failed to open offline registry subkey '%ls': %i$Failed to query offline registry subkey '%ls': %i$RegOpenKey failed, trying to reset permissions: Key=%s\%s, RetCode=%d.$RegOpenKey with ACCESS_SYSTEM_SECURITY failed: Key=%s\%s, RetCode=%d.$RegQueryInfoKey failed: Key=%s, RetCode=%d.$SeSecurityPrivilege$false$mb::common::system::RegistryUtilities::EnumerateKeyImpl$mb::common::system::RegistryUtilities::EnumerateOfflineKeyImpl$true
              • API String ID: 3668304517-2491135254
              • Opcode ID: 913bf4ddcd3dcfc8800f617e71d07c84fc348d892059dacaf472c4cc36d9d4e8
              • Instruction ID: 3f0d76ce6dd9d3c91182f6f908d507233ca0b22aefe430e5adc5768021a956b6
              • Opcode Fuzzy Hash: 913bf4ddcd3dcfc8800f617e71d07c84fc348d892059dacaf472c4cc36d9d4e8
              • Instruction Fuzzy Hash: DDF23776600B808AEB21CF66E8847DD77A5F749BD8F544216EB8D4BBA8DF39C584C700
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: _invalid_parameter_noinfo_noreturn
              • String ID: D:\Jenkins\workspace\N_MBCommon-vs2022\src\mbcommon\RegistryUtilities.cpp$Failed to create reg key %ls\%ls, %ls$Failed to restore reg key %ls to file %ls, %ls$Failed to save import file %ls to reg key %ls. %ls$Failed to save offline reg key %ls to file %ls, %ls$Failed to save reg key %ls to file %ls, %ls$SeBackupPrivilege$SeRestorePrivilege$mb::common::system::RegistryUtilities::CreateOfflineRegKeyImpl$mb::common::system::RegistryUtilities::ExportRegFileEx$mb::common::system::RegistryUtilities::ImportRegFileEx
              • API String ID: 3668304517-2524583579
              • Opcode ID: 5d4cb20496cd3017527228c49deeb0702a9c632286129b543997c496f8cdbfdd
              • Instruction ID: d9c78d17f384a3034e50a140ef03f7ee6672422892b895cf62c9e03ab5b088f8
              • Opcode Fuzzy Hash: 5d4cb20496cd3017527228c49deeb0702a9c632286129b543997c496f8cdbfdd
              • Instruction Fuzzy Hash: D4D27BB2B10B8085EB11CB6AE4847ED63A1F749BD8F505616EF6D17AE9DF78C984C300
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: Crypt$AlgorithmPropertyProvider$CloseDestroyHashOpen
              • String ID: **** Error 0x%x returned by BCryptCreateHash$**** Error 0x%x returned by BCryptFinishHash$**** Error 0x%x returned by BCryptGetProperty getting hash length$**** Error 0x%x returned by BCryptGetProperty getting object length$**** Error 0x%x returned by BCryptHashData$**** Error 0x%x returned by BCryptOpenAlgorithmProvider - Hash$**** Invalid hash buffer: %p$**** Invalid hash size: %u, need %u$**** memory allocation failed$D:\Jenkins\workspace\N_MBCommon-vs2022\src\mbcommon\CryptoUser.cpp$HashDigestLength$MD5$MbCommonSigCRYPTUSR$MbHashMemory$ObjectLength$SHA1$SHA256$SHA384$SHA512
              • API String ID: 786474298-4021669043
              • Opcode ID: 9bc2c1f0b46aa982d0170119001cd442fc1df9d4866e68e72b156281e49a3abf
              • Instruction ID: 6627d50b7561cfca1afa1e395a22bf4f982fcf655b713cb56ed58425fcbecb16
              • Opcode Fuzzy Hash: 9bc2c1f0b46aa982d0170119001cd442fc1df9d4866e68e72b156281e49a3abf
              • Instruction Fuzzy Hash: D7A17B76214B4182E622CB97F454BDAB7A4FB9CB84F51052AEF4983BB4DFB8C144CB44
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: Crypt$AlgorithmDestroyProvider$CloseImportOpenPairSignatureSleepSwitchThreadVerify
              • String ID: **** Error 0x%x returned by BCryptOpenAlgorithmProvider$**** Failed to import public key - %x$D:\Jenkins\workspace\N_MBCommon-vs2022\src\mbcommon\CryptoUser.cpp$Failed to import the public key - %x$ImportRsaPublicKeyX$MD5$MbCommonSigCRYPTUSR$RSA$RSAPUBLICBLOB$SHA1$SHA256$SHA384$SHA512$Verify signature returns %x$VerifyData
              • API String ID: 18285709-4080738847
              • Opcode ID: 253bd8ad043f7f5d23c6d42c4a7a4926aa2add889e7280a1aae84b636234c7c1
              • Instruction ID: d2732028aca960aa74f2a6cb9d20b61ea78ecf1427f6a480fbafe10b8f3c2ce6
              • Opcode Fuzzy Hash: 253bd8ad043f7f5d23c6d42c4a7a4926aa2add889e7280a1aae84b636234c7c1
              • Instruction Fuzzy Hash: CE617C36214B4082E722CF56F884B9A77A4F78CB94F55052AEF8D43BB4DBB8C545CB41
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: QueryValue$InfoVersion$AddressBufferCloseConditionFreeHandleMaskModuleOpenProcVerifyWksta
              • String ID: $CurrentBuild$CurrentMajorVersionNumber$CurrentMinorVersionNumber$RtlGetVersion$SOFTWARE\Microsoft\Windows NT\CurrentVersion$ntdll.dll
              • API String ID: 380271113-4080675615
              • Opcode ID: d264c980e0307f058ed0f7f38f8ee6f2c3e3912229aea73ce5ebb5bc72d3f01d
              • Instruction ID: 7c36c2c8f82c0f31277204bfe215c3ffd9385f40c7d0292b353260a1d1cec3fd
              • Opcode Fuzzy Hash: d264c980e0307f058ed0f7f38f8ee6f2c3e3912229aea73ce5ebb5bc72d3f01d
              • Instruction Fuzzy Hash: 69618133214B8096EB22CF22E8947DA73A4F78CB88F545125EB4A47B74DF79C655CB40
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: AllocStringVersion
              • String ID: AntiVirusProduct$companyName$displayName$instanceGuid$onAccessScanningEnabled$productUptoDate$versionNumber
              • API String ID: 396535641-3696764090
              • Opcode ID: 92365ec957f5c6bb7c3b5eaf72e40eea2b5cfd44aeb71e7cef8a06df930a09c4
              • Instruction ID: 1bde6fc8d24e5da1185405a7ee7afeaa44823d0016f5da261935d23c25a8d058
              • Opcode Fuzzy Hash: 92365ec957f5c6bb7c3b5eaf72e40eea2b5cfd44aeb71e7cef8a06df930a09c4
              • Instruction Fuzzy Hash: 58911876214B8582EB51CF26E49479EB7A0FB88B94F805112EF8E43B68DF7DC549CB00
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: CreateFileProcessProtected_invalid_parameter_noinfo_noreturn
              • String ID: /uninstall$D:\Jenkins\workspace\N_MBCommon-vs2022\src\mbcommon\ProcessUtils.cpp$Error spawning process = %s, %s$Failed to verify the signature of %s, cannot start process$ProcessUtils$mb::common::system::ProcessUtils::RunProcess$mb::common::system::ProcessUtils::RunProcessWithValidation
              • API String ID: 2770220707-1882738051
              • Opcode ID: 8e1107c93a25b49de24fe4887ffee283373b0477b51f6cd2cca23848c7d6ebfa
              • Instruction ID: acc5e87b79ad9ba3f185277cbc43708d8c731fbddf56daab43d67cc3d3e2ec4b
              • Opcode Fuzzy Hash: 8e1107c93a25b49de24fe4887ffee283373b0477b51f6cd2cca23848c7d6ebfa
              • Instruction Fuzzy Hash: 44F18072A10B8085EB12CB76E5453EE63A1F7897D8F509216EB9D17BB9DF78C190C340
              APIs
              • GetModuleHandleW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 0000000140036CD4
              • GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 0000000140036CE4
                • Part of subcall function 000000014013D2C8: AcquireSRWLockExclusive.KERNEL32(?,?,?,000000014005840B,?,?,?,0000000140002BF9), ref: 000000014013D2D8
                • Part of subcall function 000000014013D2C8: ReleaseSRWLockExclusive.KERNEL32(?,?,?,000000014005840B,?,?,?,0000000140002BF9), ref: 000000014013D318
              • GetModuleHandleW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 0000000140036D24
              • GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 0000000140036D34
              • GetCurrentProcess.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 0000000140036D99
              • IsWow64Process.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 0000000140036DA7
              • GetSystemInfo.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 0000000140036DCA
              • GetCurrentProcess.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 0000000140036E52
              • GetNativeSystemInfo.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 0000000140036DBD
                • Part of subcall function 000000014013D334: AcquireSRWLockExclusive.KERNEL32(?,?,?,00000001400583E1,?,?,?,0000000140002BF9), ref: 000000014013D344
              • GetModuleHandleW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 0000000140036E88
              • GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 0000000140036E98
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: AddressExclusiveHandleLockModuleProcProcess$AcquireCurrentInfoSystem$NativeReleaseWow64
              • String ID: IsWow64Process$IsWow64Process2$NtQueryInformationProcess$kernel32.dll$ntdll.dll
              • API String ID: 814231749-4277038175
              • Opcode ID: cf160950b207b9fe2748167afd79d1318de0ff561e3d995c345dac11aa07bdfd
              • Instruction ID: 4c6c794b614ded4db3535bcee7f7f68c80263225b478c109792987af0f95284a
              • Opcode Fuzzy Hash: cf160950b207b9fe2748167afd79d1318de0ff561e3d995c345dac11aa07bdfd
              • Instruction Fuzzy Hash: 9E916932615680C6FB53DB27E8547EA33B0BB9DB80F449126EB4A472F5EB79C984C710
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: _invalid_parameter_noinfo_noreturn
              • String ID: ACLs not initialized, cannot reset reg key permissions on %s.$D:\Jenkins\workspace\N_MBCommon-vs2022\src\mbcommon\Permissions.cpp$Error opening reg key %s, Error = %s.$Permissions$SeSecurityPrivilege$Software\Classes\$mb::common::system::Permissions::ResetRegKeyPermissions
              • API String ID: 3668304517-2727333950
              • Opcode ID: b3dbde28dcbd27a1c8b2fecfafdc2b4e2df126e134bff6941c6b53a3d40792f7
              • Instruction ID: 89c3f2516944e41edd1229ae083b33508687440877a06bf39677498dc0329626
              • Opcode Fuzzy Hash: b3dbde28dcbd27a1c8b2fecfafdc2b4e2df126e134bff6941c6b53a3d40792f7
              • Instruction Fuzzy Hash: AD528CB2610B8486EB11CF6AE48439E77A1F788BE8F515216EF9D17BA8DF78D044C704
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: _invalid_parameter_noinfo_noreturn$EventReset$DirectoryDriveLogicalMultipleMutexObjectsReleaseStringsWaitWindows
              • String ID:
              • API String ID: 1124998599-0
              • Opcode ID: b43362a7784f2dc0ec4de9731b391dbaa62c09b2302e314725346ea6ee0cfc97
              • Instruction ID: 077eeeb6691b516ca414932e43054904cd3c4191b601b66e6c81189ab9305f8f
              • Opcode Fuzzy Hash: b43362a7784f2dc0ec4de9731b391dbaa62c09b2302e314725346ea6ee0cfc97
              • Instruction Fuzzy Hash: B0628072A11B8481FA12EB6AE4553EE6361E78D7E4F505311BBAD17AFADF78C580C300
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: Variant$Clear$CreateInitInitializeInstanceSleepSwitchThreadUninitialize_invalid_parameter_noinfo_noreturn
              • String ID: SELECT * FROM AntiVirusProduct$WQL$displayName$root\SecurityCenter$root\SecurityCenter2
              • API String ID: 3760070528-1785626855
              • Opcode ID: d47ad77e5cc124070a6631159c9e03db79b36ebab5218442494dc71b3604b668
              • Instruction ID: d64ba0fc4eb054dfd6755f2fa1e94a3f29a1db3444e3bc84c7a8cf560e825fec
              • Opcode Fuzzy Hash: d47ad77e5cc124070a6631159c9e03db79b36ebab5218442494dc71b3604b668
              • Instruction Fuzzy Hash: 4FD16472710A44DAEB11DFA6E4547ED33B1FB48B89F804616EB1E1BAA8DF39C549C340
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: _invalid_parameter_noinfo_noreturn
              • String ID: DEBUG$Date{0}Time{0}Tick Count{0}Process ID{0}Thread ID{0}Log Level{0}Context Tag{0}Function Name{0}File Name{0}Line Number{0}Message$ERROR$INFO$NONE$TRACE$UNKNOWN$WARNING${0}
              • API String ID: 3668304517-1305759413
              • Opcode ID: 534d078a9a3faf7622c84812b5c1e571d89831ce9364a73a94c664d4c956d6c5
              • Instruction ID: a8732b692de3b30e342725d7ba537c73959aa8cafc9f8f866b3eba4f7b74e448
              • Opcode Fuzzy Hash: 534d078a9a3faf7622c84812b5c1e571d89831ce9364a73a94c664d4c956d6c5
              • Instruction Fuzzy Hash: 3CA1D0B2620B8592EA11DF2AE4847DE7365F78D7D8F519212EB9C0B6B5DF78C181C340
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: _invalid_parameter_noinfo_noreturn
              • String ID: D:\Jenkins\workspace\N_MBCommon-vs2022\src\mbcommon\RegistryUtilities.cpp$Failed to open key = %ls\%ls, wow64 = 0x%x, %ls$Failed to query reg key %ls\%ls, value name = %ls, %ls$mb::common::system::RegistryUtilities::GetValueAsStringImpl
              • API String ID: 3668304517-714731424
              • Opcode ID: 22e963a8d1c0e991d212bf7853635bf573f793fbea43b3ba8fd92718b7af0529
              • Instruction ID: 8fdebf23c4f3acc0543edb1a80cafcb94eb15696b0cb38256d14703cd8ce2f85
              • Opcode Fuzzy Hash: 22e963a8d1c0e991d212bf7853635bf573f793fbea43b3ba8fd92718b7af0529
              • Instruction Fuzzy Hash: C9226972A10B8485EB11DF6AE4843ED67A1F789BD8F50421AEF9C17BA8DF38C585C344
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: _invalid_parameter_noinfo_noreturn
              • String ID: HKCR\$HKCU\$HKEY_CLASSES_ROOT\$HKEY_CURRENT_USER\$HKEY_LOCAL_MACHINE\$HKEY_USERS\$HKLM\$HKU\
              • API String ID: 3668304517-4065843753
              • Opcode ID: e39a7440d2ec571e2b586c18d62dce03bc594a7fb33e88e4a2afa08fc3543b79
              • Instruction ID: ed8fa5fc2ca0593537f8e17d26cde3807e627fd17fe6126ab0e58f79e9cd9ef5
              • Opcode Fuzzy Hash: e39a7440d2ec571e2b586c18d62dce03bc594a7fb33e88e4a2afa08fc3543b79
              • Instruction Fuzzy Hash: 3112D1B2A20A8491EE12CB6BD944BEC2361B78D7F4F405702FB791BAE5DF79D5908300
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_task
              • String ID: D:\Jenkins\workspace\N_MBCommon-vs2022\src\mbcommon\Permissions.cpp$Error calling TreeSetNamedSecurityInfo on '%s', %s$Error creating well-known ID %u$Invalid path argument$Permissions$Successfully called TreeSetNamedSecurityInfo on '%s'$mb::common::system::Permissions::CheckEffectiveAccess$mb::common::system::Permissions::RecurseResetNamedSecurityInfo
              • API String ID: 3936042273-2496151557
              • Opcode ID: 46e375f59ab2a20bd7a5b3918fc5e8747e896e5653b8f4cae5d3a0626df9bfe8
              • Instruction ID: cf5927056bd4b684578dd3b2d0bd1a7d601be3b7a79627e55d28c336953f106f
              • Opcode Fuzzy Hash: 46e375f59ab2a20bd7a5b3918fc5e8747e896e5653b8f4cae5d3a0626df9bfe8
              • Instruction Fuzzy Hash: 9AD1AC72205B8481EA62DB16E5447EE73A1F78DBE5F554226EB8D07BB9EF78C041C700
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: _invalid_parameter_noinfo_noreturn$ErrorLast$DeviceQuery
              • String ID: *#?[
              • API String ID: 2801438217-1890044607
              • Opcode ID: 7e8d6770c942fb455ac005f85bd689bacdf5f4f0d2d8311d71f8ef889df53a9b
              • Instruction ID: 4214f1e3003680b90a7d2225dea77450e3abe261e8fd504cf25d92d0c8d85158
              • Opcode Fuzzy Hash: 7e8d6770c942fb455ac005f85bd689bacdf5f4f0d2d8311d71f8ef889df53a9b
              • Instruction Fuzzy Hash: 7532E3B2B10B8091EB16DB7AE4443EE2361E749BE8F405312EF6957AE9DF78D495C300
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: _invalid_parameter_noinfo
              • String ID: 0$f$f$p$p$f
              • API String ID: 3215553584-303101543
              • Opcode ID: d7a9dd42b1848e2143ed605a801f00928f2ca6b2440c02d50b299732a67e6c35
              • Instruction ID: 6fe22bcf7abdc2e8213343559dcad6da7cdc74627848b1691c4bf1520e189d54
              • Opcode Fuzzy Hash: d7a9dd42b1848e2143ed605a801f00928f2ca6b2440c02d50b299732a67e6c35
              • Instruction Fuzzy Hash: 3242E13260468186FB669B1BD0443F973A1F398F54F9C4D16DFA65FAE4DB3AC8908B10
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: _invalid_parameter_noinfo_noreturn
              • String ID: SOFTWARE\Microsoft\Windows\CurrentVersion\QualityCompat$cadca5fe-87d3-4b96-b7fb-a231484277cc
              • API String ID: 3668304517-895003009
              • Opcode ID: 5574246dd8d0897dc1a7b11709eaf55db77457b99466e98868d3df49de9ede99
              • Instruction ID: f035f80d48dff788a4860d08f1fd81ae8387436c0e06aaea8abaab332b87018a
              • Opcode Fuzzy Hash: 5574246dd8d0897dc1a7b11709eaf55db77457b99466e98868d3df49de9ede99
              • Instruction Fuzzy Hash: 599161B2B24B8494EB11DB7AE0453ED6361E799BE4F545312BB6C27AEADF74C180C340
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: Token$CloseCurrentHandleOpenProcessThread$AdjustLookupPrivilegePrivilegesValue
              • String ID:
              • API String ID: 815265755-0
              • Opcode ID: 67856adf70b52231435489435047f255276115e7e7c1964fc957456d8e4ce2e3
              • Instruction ID: cd7dc849102994aad23d29b918c37a566c55a803bd918467edc59231a32ad169
              • Opcode Fuzzy Hash: 67856adf70b52231435489435047f255276115e7e7c1964fc957456d8e4ce2e3
              • Instruction Fuzzy Hash: 3B214C76314A8492EB528F62E4543DAB7A0FB8CF95F441025EB8A47B64DF7CC288DB10
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: AddressHandleModuleProc
              • String ID: Sfc.dll$SfcIsKeyProtected
              • API String ID: 1646373207-2682706285
              • Opcode ID: 95ce98735e58c2b9bfffad71a79250629429116caadc5794d116ed701922a4dd
              • Instruction ID: f24936e27466ac17eeaf3d6335868034eca60d4857a6cbcee4d85eb2fce53f33
              • Opcode Fuzzy Hash: 95ce98735e58c2b9bfffad71a79250629429116caadc5794d116ed701922a4dd
              • Instruction Fuzzy Hash: F581E172204B8082EA118BA6E4443EEA7A1F7E9BE4F544215FF9907BF9CF78C585C700
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: Value$Locale$CodeErrorInfoLastPageValid$DefaultEnumLocalesProcessSystemUser
              • String ID:
              • API String ID: 2591520935-0
              • Opcode ID: 396caba08cb7377e3113bb913dcbd9c1d2dd11e5ed165bdd9fd4473bb18ab49f
              • Instruction ID: d49b362cbde4f135e2c410e3d415beb0941842d2651573d911125a182ab74851
              • Opcode Fuzzy Hash: 396caba08cb7377e3113bb913dcbd9c1d2dd11e5ed165bdd9fd4473bb18ab49f
              • Instruction Fuzzy Hash: AA7149327107508AFB62AB62D8507ED37B0BB4CF88F9445268F1A577A6EBB8C945C350
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
              • String ID:
              • API String ID: 1239891234-0
              • Opcode ID: 755106d5b8320feb1360f5384fccd98747917d2b8f1d28cf8d4cc2dd22e3e23b
              • Instruction ID: ccf897ea4f23b192354f64f64014109c0226c5af9b20a71b83aa40ab866b74cc
              • Opcode Fuzzy Hash: 755106d5b8320feb1360f5384fccd98747917d2b8f1d28cf8d4cc2dd22e3e23b
              • Instruction Fuzzy Hash: 7B314236214B8096EB61CF26E8447DE73A4F78CB98F540126EB9D43BA5EF78C655CB00
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: _invalid_parameter_noinfo_noreturn
              • String ID: %$+
              • API String ID: 3668304517-2626897407
              • Opcode ID: ef67291946aa4c9e33d217ee6b1085f198b0b20f24ce95c927d283db96a5419e
              • Instruction ID: 2978ac92ec34a4398e9e4422668e9e1858cd5b9aab98dee59a783e642f3f1c55
              • Opcode Fuzzy Hash: ef67291946aa4c9e33d217ee6b1085f198b0b20f24ce95c927d283db96a5419e
              • Instruction Fuzzy Hash: FC120132714A848AFB27CB66E4407EE67B1AB9DBC8F144225EF4D17BA9DB38C545C340
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: _invalid_parameter_noinfo_noreturn
              • String ID: %$+
              • API String ID: 3668304517-2626897407
              • Opcode ID: a07c91fe86db3863ba3603b1c064481582d3c7eaeafc6911a57574c4078a6de7
              • Instruction ID: 1c6ec397d2fd1074b71bf9d284edaf945d0b4ff835e23d395e6dd2091c94cb26
              • Opcode Fuzzy Hash: a07c91fe86db3863ba3603b1c064481582d3c7eaeafc6911a57574c4078a6de7
              • Instruction Fuzzy Hash: 4B1205B27146C48AFB26CF66E4503EE67A1EB9D7C8F044221EF4917BAADB38C545C344
              APIs
              Strings
              • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 000000014013CCA3
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: DebugDebuggerErrorLastOutputPresentString
              • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
              • API String ID: 389471666-631824599
              • Opcode ID: 5b36b9ae3331362d9a3dd631090981b644f3c78fc874ca70b388895a508e2db4
              • Instruction ID: 92014cf3c0786f25768dde6fe5f6ec1edd56ed8e2d1ba26b04b1199915b2e7ab
              • Opcode Fuzzy Hash: 5b36b9ae3331362d9a3dd631090981b644f3c78fc874ca70b388895a508e2db4
              • Instruction Fuzzy Hash: 15118E32310B90A7F706DB63EA583E933A4FB48B54F445125DB4983AA0EF79D5B8C710
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387519872.0000000001FE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 01FE1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1fe1000_sGfciyumij.jbxd
              Similarity
              • API ID:
              • String ID: $ $ $(
              • API String ID: 0-3698178323
              • Opcode ID: ae88a64d9128b7ea91ad866959b872dc0bc89cc83698f34044dd52247478a8bb
              • Instruction ID: 41a76cdd61e4d35aedada52fa44ed94c444e550db94d07e3d36167115e574b8b
              • Opcode Fuzzy Hash: ae88a64d9128b7ea91ad866959b872dc0bc89cc83698f34044dd52247478a8bb
              • Instruction Fuzzy Hash: 0AD15C70618B888FE769DF28D888BAAB7E5FB88304F40492DD58EC3251DF759545CB82
              APIs
              • _invalid_parameter_noinfo.LIBCMT ref: 0000000140161A20
              • SetConsoleCtrlHandler.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000001401607D0), ref: 0000000140161C3C
              • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000001401607D0), ref: 0000000140161C4F
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: ConsoleCtrlErrorHandlerLast_invalid_parameter_noinfo
              • String ID:
              • API String ID: 2654339681-0
              • Opcode ID: 3e5d63b0454c0a6e39d3d928f087767678f41cb6f101e604e376369ec17ee97c
              • Instruction ID: 1d03c99324dcf61f8c94b18674a3bdfa57ca5041516929358568f4ca188d754f
              • Opcode Fuzzy Hash: 3e5d63b0454c0a6e39d3d928f087767678f41cb6f101e604e376369ec17ee97c
              • Instruction Fuzzy Hash: B5C1AC3260564083FA679B6BDC543EE66A1A7CDF84F5C4C26DB0E57BF4EA78C9419300
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387519872.0000000001FE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 01FE1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1fe1000_sGfciyumij.jbxd
              Similarity
              • API ID: AddressProcedure
              • String ID: $'2O$U/$\8j
              • API String ID: 3653107232-658286377
              • Opcode ID: 4935f0f32ad2d9a935451ba930207134b4bd1056c48635d3548c9aa2ad88d671
              • Instruction ID: bcacbae62061b13ee1b3deb64e27b32e71975fd9aa348387d77c7dec15ebf4d6
              • Opcode Fuzzy Hash: 4935f0f32ad2d9a935451ba930207134b4bd1056c48635d3548c9aa2ad88d671
              • Instruction Fuzzy Hash: D0427774B60A858FE798EF7CEC5C73536E2F7AD3407A0856AA409D73A4DE3D98025B40
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387519872.0000000001FE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 01FE1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1fe1000_sGfciyumij.jbxd
              Similarity
              • API ID:
              • String ID: $0$@
              • API String ID: 0-2347541974
              • Opcode ID: 13e784bc25f126a74ffd797636f91267a9e64475e21a47f507065c68eba02605
              • Instruction ID: 3ea616b23f421dac3777480126d120a8f9be5abd8edfc41d9bbd7d46a0d023aa
              • Opcode Fuzzy Hash: 13e784bc25f126a74ffd797636f91267a9e64475e21a47f507065c68eba02605
              • Instruction Fuzzy Hash: 55222F70218B488FE7A4EF18D895BDAB7E1FB98314F50462DD58EC32A0DF78A545CB42
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: ExceptionRaise_clrfp
              • String ID:
              • API String ID: 15204871-0
              • Opcode ID: f6d5b661d75791a1c395168faed2e2afadaa5f31fac753cee68d38bcf272f211
              • Instruction ID: 1661daac63cbb97339e586268a213c546ae75180bec48695b2d33eba4b1741c7
              • Opcode Fuzzy Hash: f6d5b661d75791a1c395168faed2e2afadaa5f31fac753cee68d38bcf272f211
              • Instruction Fuzzy Hash: 79B1C677611B848BEB56CF2AC8863987BE4F388F58F198915DB5D877A8CB39C451C700
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387519872.0000000001FE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 01FE1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1fe1000_sGfciyumij.jbxd
              Similarity
              • API ID:
              • String ID: )$p
              • API String ID: 0-1764766951
              • Opcode ID: b0860d0b4d58efb4f2e2f1552468fa527151c01b601a8b10e355e2c993dcd8de
              • Instruction ID: 969cd2574b39b43100ee34ab7946ca273d2a11cf7363743c5ad1bca39929dd26
              • Opcode Fuzzy Hash: b0860d0b4d58efb4f2e2f1552468fa527151c01b601a8b10e355e2c993dcd8de
              • Instruction Fuzzy Hash: 2C020F30618B488FF7A5DF18D895BAAB7E2FB98308F50492DE48EC3290DF749545DB42
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID:
              • String ID: e+000$gfff
              • API String ID: 0-3030954782
              • Opcode ID: d81937549b1f2002436f5e2bb3da605523053ddeda466b9169e692c92c4c3c57
              • Instruction ID: 8650e506bdd1be2f4e2033797dbf534079e1177994c6090c3f82b3b200f69782
              • Opcode Fuzzy Hash: d81937549b1f2002436f5e2bb3da605523053ddeda466b9169e692c92c4c3c57
              • Instruction Fuzzy Hash: 105143727146D487E7268E3AEC10799AB91F348F94F489722CFA88BAE5DF39C4458700
              APIs
              • GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,0000000140047AF9), ref: 0000000140047C10
              • HeapAlloc.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,0000000140047AF9), ref: 0000000140047C21
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: Heap$AllocProcess
              • String ID:
              • API String ID: 1617791916-0
              • Opcode ID: ec63a258a964875cecf9824b430d78ec8442724cc5992bb29e9149edf67b474d
              • Instruction ID: c0b361fd154bdff6aebe20077f67496f38163e3b4af1793c91f5050f86ebca54
              • Opcode Fuzzy Hash: ec63a258a964875cecf9824b430d78ec8442724cc5992bb29e9149edf67b474d
              • Instruction Fuzzy Hash: 01118B32208B8086EB41CF52F54439ABBA0F78DB94F588129EB8C47765DFBCC1A48B00
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387519872.0000000001FE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 01FE1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1fe1000_sGfciyumij.jbxd
              Similarity
              • API ID: AddressProcedure
              • String ID: !yOr
              • API String ID: 3653107232-2868905794
              • Opcode ID: a344c6b9773561e1a8feff107ffa0bbb357e6f0ee830072877925764f08a3291
              • Instruction ID: 30e4a1093f66f974d8e310794b21f7fef6a2de2a2dbffb936403e723e840bd6a
              • Opcode Fuzzy Hash: a344c6b9773561e1a8feff107ffa0bbb357e6f0ee830072877925764f08a3291
              • Instruction Fuzzy Hash: 03125D30218B488FE7A8EF28C855BAAB7E1FF99304F50452D918EC32A0DF75D945CB42
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387519872.0000000001FE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 01FE1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1fe1000_sGfciyumij.jbxd
              Similarity
              • API ID:
              • String ID: P
              • API String ID: 0-3110715001
              • Opcode ID: fc71c7b77c584ab428780ddc863f287b4ad5f6815cb57d0fe849b24e33f4b176
              • Instruction ID: dc6e99ed824f33aa3b6e9558fddd85552b27b5370bba48e8ecb000d8b5c4772f
              • Opcode Fuzzy Hash: fc71c7b77c584ab428780ddc863f287b4ad5f6815cb57d0fe849b24e33f4b176
              • Instruction Fuzzy Hash: 5702633061CB488FE774EF68D8587AAB6D2FF98305F50452DA58AC32A1DFB9C4458B42
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387519872.0000000001FE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 01FE1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1fe1000_sGfciyumij.jbxd
              Similarity
              • API ID:
              • String ID: (
              • API String ID: 0-3887548279
              • Opcode ID: abcda2cce44acd7600387513da42d6dbaa6d0e49c1554b2389a16b5e095b6a28
              • Instruction ID: acb8f91b5f10ea9f8ab63cb7da3da47bda060cc70e200389b579b5b8a83cd3cd
              • Opcode Fuzzy Hash: abcda2cce44acd7600387513da42d6dbaa6d0e49c1554b2389a16b5e095b6a28
              • Instruction Fuzzy Hash: D9F19071B18B488FEB69DF2C844876ABBE2FBD8714F50452EE08EC3251DB35D4468B46
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387519872.0000000001FE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 01FE1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1fe1000_sGfciyumij.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID: 0-3916222277
              • Opcode ID: c8f6abd951fddb39abbf005080ccbc701d7de3dfb555edcc3e9d7ef58874c8aa
              • Instruction ID: 88d8dc9dc5e34583125829733df44f469421a737d62d9dcb8eadb1528b8ea2a9
              • Opcode Fuzzy Hash: c8f6abd951fddb39abbf005080ccbc701d7de3dfb555edcc3e9d7ef58874c8aa
              • Instruction Fuzzy Hash: C0D1C330628B884FF775EF68C8897BAB7E1FB99304F504A2ED48EC3291DB7494459742
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387519872.0000000001FE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 01FE1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1fe1000_sGfciyumij.jbxd
              Similarity
              • API ID:
              • String ID: 8
              • API String ID: 0-4194326291
              • Opcode ID: 6b67e5068f6b5c119f0bffc7c64d18de370588fa1bf746384f48e482c057c185
              • Instruction ID: 6353ac8ac7a4774b9f4dd6da13bcf3ec7204e89970cffbc6fb66c527d0a9d446
              • Opcode Fuzzy Hash: 6b67e5068f6b5c119f0bffc7c64d18de370588fa1bf746384f48e482c057c185
              • Instruction Fuzzy Hash: AAC1B430228B484FF765EB28D8957AEB3D2FBD8304F50452DA54AC32E0DF74D8469B86
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387519872.0000000001FE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 01FE1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1fe1000_sGfciyumij.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID: 0-3916222277
              • Opcode ID: aa71fcebb32854f5365f8010357581097b4f2512602ed2335f62549310407270
              • Instruction ID: 04bbbf321e55bcf17f431b590bf1b93c598baca47695342cb7962bd881bb27cb
              • Opcode Fuzzy Hash: aa71fcebb32854f5365f8010357581097b4f2512602ed2335f62549310407270
              • Instruction Fuzzy Hash: 6391B93022CB484FE758EF28D89576AB7D6FBC8304F50452DE58AC3291DF79D8429B86
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387519872.0000000001FE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 01FE1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1fe1000_sGfciyumij.jbxd
              Similarity
              • API ID:
              • String ID: @
              • API String ID: 0-2766056989
              • Opcode ID: 59a31fbeb8a05151edb759329d96371e831f95528c315330fb92cc5f8aafcbf3
              • Instruction ID: 3e8a8a80ca1e9c7ce0f72fc35060c60da28789e2ca944b3a301439ab54ef456c
              • Opcode Fuzzy Hash: 59a31fbeb8a05151edb759329d96371e831f95528c315330fb92cc5f8aafcbf3
              • Instruction Fuzzy Hash: 22A13F70228B044BE758EF2CD85575AB7E2FBC8708F50862DB18ED3690DB79D9418B87
              APIs
                • Part of subcall function 0000000140167A10: GetLastError.KERNEL32 ref: 0000000140167A1F
                • Part of subcall function 0000000140167A10: FlsGetValue.KERNEL32 ref: 0000000140167A34
                • Part of subcall function 0000000140167A10: SetLastError.KERNEL32 ref: 0000000140167ABF
              • EnumSystemLocalesW.KERNEL32(?,?,?,00000001401751D7,?,00000000,00000092,?,?,00000000,?,0000000140166599), ref: 0000000140174A86
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: ErrorLast$EnumLocalesSystemValue
              • String ID:
              • API String ID: 3029459697-0
              • Opcode ID: d827d398fb2be732cf64f640d77d11986ad99533ecfdda7ab377154c05eb39d1
              • Instruction ID: afa71bbefb048de6964e5928d27107bf35cc809329f89af43224725e76f0d794
              • Opcode Fuzzy Hash: d827d398fb2be732cf64f640d77d11986ad99533ecfdda7ab377154c05eb39d1
              • Instruction Fuzzy Hash: D311AC77A546448BEB268F26E4807E97BA0E398FE5F549115CB2A433E4DB34CAD1C740
              APIs
                • Part of subcall function 0000000140167A10: GetLastError.KERNEL32 ref: 0000000140167A1F
                • Part of subcall function 0000000140167A10: FlsGetValue.KERNEL32 ref: 0000000140167A34
                • Part of subcall function 0000000140167A10: SetLastError.KERNEL32 ref: 0000000140167ABF
              • EnumSystemLocalesW.KERNEL32(?,?,?,0000000140175193,?,00000000,00000092,?,?,00000000,?,0000000140166599), ref: 0000000140174B36
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: ErrorLast$EnumLocalesSystemValue
              • String ID:
              • API String ID: 3029459697-0
              • Opcode ID: e978d8d44f54b43789b77c9c3e0592a449489afad3c4f8d1a33e47e592676277
              • Instruction ID: 5c78489ed30e5fe006e7936c2b3adfcb67fe9c892e52a028572902b1c42f9280
              • Opcode Fuzzy Hash: e978d8d44f54b43789b77c9c3e0592a449489afad3c4f8d1a33e47e592676277
              • Instruction Fuzzy Hash: BC017B72B0828487E7124F27F4407E972E1E748FA1F459321D765432E8CB74C8C0C700
              APIs
              • EnumSystemLocalesW.KERNEL32(?,?,00000000,000000014016CE97,?,?,?,?,?,?,?,?,00000000,0000000140174038), ref: 000000014016CA97
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: EnumLocalesSystem
              • String ID:
              • API String ID: 2099609381-0
              • Opcode ID: a1a4aebfc91c581e2bb9a6b543a7038600c51dc8710df0846d963a8f5ed3316b
              • Instruction ID: 120d6c98ecb1d39f65b88de00a80dba8693697b588a339e0bea9d0409361e825
              • Opcode Fuzzy Hash: a1a4aebfc91c581e2bb9a6b543a7038600c51dc8710df0846d963a8f5ed3316b
              • Instruction Fuzzy Hash: 54F03776300A4483EB45DB6AF8947D93361F79DBC0F549025EB4A837B5EE7CC9A18304
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: AllocateInitialize
              • String ID:
              • API String ID: 220217950-0
              • Opcode ID: 3660a22e3e960f987bf451dafde6dcb525b2f72f462f9537d55531b1bf86a41b
              • Instruction ID: 2dfcc9cfaf486a5bc15e72cbce0e6305dde1758bee78a4e6201e0eb95db29ec4
              • Opcode Fuzzy Hash: 3660a22e3e960f987bf451dafde6dcb525b2f72f462f9537d55531b1bf86a41b
              • Instruction Fuzzy Hash: F7F06D76A192C48BD3B0CF29E480B5ABBA1F799B94F104115EAC983B18D739D5948F00
              Memory Dump Source
              • Source File: 00000000.00000002.3387519872.0000000001FE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 01FE1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1fe1000_sGfciyumij.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: c77ee9db95c24773db9081a7deccb5cf2f36f3081fec3039551d8f54b381666b
              • Instruction ID: d3ca5170e2ccd73d97df5f993bd7759adb513bc08308c89d95e3b8003c69c779
              • Opcode Fuzzy Hash: c77ee9db95c24773db9081a7deccb5cf2f36f3081fec3039551d8f54b381666b
              • Instruction Fuzzy Hash: 16620434720B0A8BFB29DF2CDC99BA537D6FB9C750F844474AC4AC7285DE78E8418691
              Memory Dump Source
              • Source File: 00000000.00000002.3387519872.0000000001FE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 01FE1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1fe1000_sGfciyumij.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: eb335efdb646f4d1c715b7d8a92101005b4f4c71c71004709584aa8badfbe395
              • Instruction ID: a58ddf6e00b528602d3e5ee67d58f801998dbc37d53b165537af69a9dfc04437
              • Opcode Fuzzy Hash: eb335efdb646f4d1c715b7d8a92101005b4f4c71c71004709584aa8badfbe395
              • Instruction Fuzzy Hash: 98428230328B048FE769AB18DC557AAB7D2FBD8704F50456DA48AC3290DF38D945DB83
              Memory Dump Source
              • Source File: 00000000.00000002.3387519872.0000000001FE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 01FE1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1fe1000_sGfciyumij.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: d6a83add80c015651db2210a2c8c18f03a1d4ada41add862ec9d8abcd3fa1614
              • Instruction ID: d37ada3612325dec7dc37df606ed3495e030ea24c9350e66834f4f4daafc7878
              • Opcode Fuzzy Hash: d6a83add80c015651db2210a2c8c18f03a1d4ada41add862ec9d8abcd3fa1614
              • Instruction Fuzzy Hash: 7D222E70218B888FE7B9EF18C854BDAB7E1FB98305F504A6DE48EC3290DB749545CB42
              Memory Dump Source
              • Source File: 00000000.00000002.3387519872.0000000001FE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 01FE1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1fe1000_sGfciyumij.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 141414486e6dcd6db102a0dcc69ba121492b53746aa2abfaed83b5878ad76e83
              • Instruction ID: 6a4087318f85f8ac8a30ed6ec6722a64153ed826f03c42d4e826219fa7080887
              • Opcode Fuzzy Hash: 141414486e6dcd6db102a0dcc69ba121492b53746aa2abfaed83b5878ad76e83
              • Instruction Fuzzy Hash: E9120E30218B488FE7A4EF28D894BAAB7E1FB98305F504A6DD49EC3290DF74D545DB42
              Memory Dump Source
              • Source File: 00000000.00000002.3387519872.0000000001FE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 01FE1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1fe1000_sGfciyumij.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 3d6830cd1ff2b1eea55f6eaa4abb6144c01ddd4dc95e3f02123529a47543dd8d
              • Instruction ID: c908901c70e6aeaf34a8159b135dddcf80a0ecdd534f03cb81c7c1bc6ed190e8
              • Opcode Fuzzy Hash: 3d6830cd1ff2b1eea55f6eaa4abb6144c01ddd4dc95e3f02123529a47543dd8d
              • Instruction Fuzzy Hash: 0CF1613032CB484FE758EB28D8A576AB7D2FBD8344F50452DA58AC3290DF78D9419B87
              Memory Dump Source
              • Source File: 00000000.00000002.3387519872.0000000001FE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 01FE1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1fe1000_sGfciyumij.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 5b75fb823a353ca8dc1e44f519c5ae98cd4bc4c796f790001a98ff7edc0cca4a
              • Instruction ID: 235967d92420522192fd0d04a150dc2c9ba2cba23d4d1a1096f7780bb702964d
              • Opcode Fuzzy Hash: 5b75fb823a353ca8dc1e44f519c5ae98cd4bc4c796f790001a98ff7edc0cca4a
              • Instruction Fuzzy Hash: CDF13070218B488FE764DF28D8957AAB7E2FBD8304F50462DA58EC32A0DF75D945CB42
              Memory Dump Source
              • Source File: 00000000.00000002.3387519872.0000000001FE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 01FE1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1fe1000_sGfciyumij.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: cfa8ef53c996ffe4f0ea5f186e32b437e4baf59453c7933b166b4a13b75eea46
              • Instruction ID: 51cb717b560dac4b0ebdd30ceea9f75fffd0cb55e06b4a5ffd31b204e4b4d13b
              • Opcode Fuzzy Hash: cfa8ef53c996ffe4f0ea5f186e32b437e4baf59453c7933b166b4a13b75eea46
              • Instruction Fuzzy Hash: 6FF16F70218B488FE768EF18D8557AAB7E1FB88308F50452DE18EC32A1DBB9D545CB43
              Memory Dump Source
              • Source File: 00000000.00000002.3387519872.0000000001FE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 01FE1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1fe1000_sGfciyumij.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: cf909c3245cbfb605e205f1b6652f61485a4d0021b7aed283de42b2c53d394ff
              • Instruction ID: 2c5f4d4164b4ef7f139cd994d1397511c42629bd4b7471bf77e04e16b2aed4b9
              • Opcode Fuzzy Hash: cf909c3245cbfb605e205f1b6652f61485a4d0021b7aed283de42b2c53d394ff
              • Instruction Fuzzy Hash: CAF18030618B488FE774EF28D8587AAB7E2FB98304F504A2D958EC3290DFB5D545CB52
              Memory Dump Source
              • Source File: 00000000.00000002.3387519872.0000000001FE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 01FE1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1fe1000_sGfciyumij.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 9aa099fc02c16ba095d4bf4291fdb0dcd3e10970e4b1abe0c916cefc9fc1f856
              • Instruction ID: dc3d7da33186b06f5b6f64c5ec520f1dfaecf321c251d33d3e9322f03d69abc8
              • Opcode Fuzzy Hash: 9aa099fc02c16ba095d4bf4291fdb0dcd3e10970e4b1abe0c916cefc9fc1f856
              • Instruction Fuzzy Hash: 25D15030328B484FE758EB2CD86576EB7D2FBD8344F50452DA58AC3290DFB8D9419B86
              Memory Dump Source
              • Source File: 00000000.00000002.3387519872.0000000001FE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 01FE1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1fe1000_sGfciyumij.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 55d560102bc2eea68efe4c92e244aa415b9a8cc1eab01d618360132088605c66
              • Instruction ID: 86dfe466e9c68d5e1760a4f6e2f44b5fcaae19b4264c6e813e672c6804806e07
              • Opcode Fuzzy Hash: 55d560102bc2eea68efe4c92e244aa415b9a8cc1eab01d618360132088605c66
              • Instruction Fuzzy Hash: 50D1953022CB488FD758EB2CC495BABB7D2FB99344F50456DE18AC32A0DF75D9458B82
              Memory Dump Source
              • Source File: 00000000.00000002.3387519872.0000000001FE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 01FE1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1fe1000_sGfciyumij.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: b817203ba3c4443f5fb8480b07f75b397d38fcfc8ae896fd7bf819042d688969
              • Instruction ID: 8bb30c240282346ac2c53ec211b8a27157dadc18bd0302c50f10d337b376c11b
              • Opcode Fuzzy Hash: b817203ba3c4443f5fb8480b07f75b397d38fcfc8ae896fd7bf819042d688969
              • Instruction Fuzzy Hash: 61D1513061CB088FEB59EF29D85566AB7E1FF98304F10056EE58AC3260DFB5E945CB42
              Memory Dump Source
              • Source File: 00000000.00000002.3387519872.0000000001FE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 01FE1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1fe1000_sGfciyumij.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: cf57cbc0b7ccc185c60c4b5f94adbeda4c451ce52c5a668f06d63ff3a15e055d
              • Instruction ID: 351ea5643f28d876d02e11c404067796cdc4882d4262d4bdaba1c96e8f32bf29
              • Opcode Fuzzy Hash: cf57cbc0b7ccc185c60c4b5f94adbeda4c451ce52c5a668f06d63ff3a15e055d
              • Instruction Fuzzy Hash: 0BC1307021CB484FF768EF68D8997AAB7D2FB98304F50862DD58EC3290DF7494459B82
              Memory Dump Source
              • Source File: 00000000.00000002.3387519872.0000000001FE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 01FE1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1fe1000_sGfciyumij.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: d67f70248d9871493b444570412385d01f8192461fdcfc939c1c5d9bc251a4ce
              • Instruction ID: 3b8179e2c40c7d15fb73fa4851688526326c83cd316421553c9898dfa01c3828
              • Opcode Fuzzy Hash: d67f70248d9871493b444570412385d01f8192461fdcfc939c1c5d9bc251a4ce
              • Instruction Fuzzy Hash: 1FC17070328B484FE758EB2CD85576ABBD2FB8C308F50462DE08AC3290DB79D9459B46
              Memory Dump Source
              • Source File: 00000000.00000002.3387519872.0000000001FE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 01FE1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1fe1000_sGfciyumij.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 2428df4c2b5cda2abb3800129e89791470056923b1d70c4f1012cb95f183359f
              • Instruction ID: 2a82dac9ec1a2037f456fac638b40e63586231a3ed0e9f663a21297253761a7c
              • Opcode Fuzzy Hash: 2428df4c2b5cda2abb3800129e89791470056923b1d70c4f1012cb95f183359f
              • Instruction Fuzzy Hash: 79B13D70628B488FE768EF2CD459B9AB7E1FB98304F50452DE18EC3261DB75D845CB42
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: ca157f37a7ff7870d8233d8b2cc212f20d7f303e8a9724ae19aaef0a627145a7
              • Instruction ID: f1874bfbc7e1281058d3564017ccc93f286706d85707bd6ff5c1edb4637aebbe
              • Opcode Fuzzy Hash: ca157f37a7ff7870d8233d8b2cc212f20d7f303e8a9724ae19aaef0a627145a7
              • Instruction Fuzzy Hash: 03D1AA36610A4086EB6BCEAB95543ED37A1F74DF48F2C4215DF4A0B6B5EB36C851CB40
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: ErrorLastNameTranslate$CodePageValidValue_invalid_parameter_noinfo
              • String ID:
              • API String ID: 4023145424-0
              • Opcode ID: 83a0a706191b9cbd7d58c2f48e7b76d66853e0ba45b62b363f1df9343bf7d59c
              • Instruction ID: 06f5bbde143778937eb0fafaa398f8d0b5196f9c9d70593ec7ad9d63aa788f3e
              • Opcode Fuzzy Hash: 83a0a706191b9cbd7d58c2f48e7b76d66853e0ba45b62b363f1df9343bf7d59c
              • Instruction Fuzzy Hash: 1EC1C17620078086EB619B73DD107EA77A5F798F88F444926EF8E87AA9DF38C545C700
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 188c10d7e66e5bfed439f5e22177af773f0e3c25f04850c32b4aa30e70456c53
              • Instruction ID: 99b709c28741e4176f1b4272f39a96b64e97b6f7daf7a7144a5b344df3208594
              • Opcode Fuzzy Hash: 188c10d7e66e5bfed439f5e22177af773f0e3c25f04850c32b4aa30e70456c53
              • Instruction Fuzzy Hash: 3191683331468446FF2A8E27A4507F926E0A749F94F0C1529DF2A4F7E5DA3AC506DB02
              Memory Dump Source
              • Source File: 00000000.00000002.3387519872.0000000001FE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 01FE1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1fe1000_sGfciyumij.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 739a3d2fd449fcecab3bc3dc05aa0fa5b4f8815b2c591d1fde98be55f4dc1af0
              • Instruction ID: 9857ab83672164aa7957b261643e8a8047ed2984a28908f88d4efb964b536423
              • Opcode Fuzzy Hash: 739a3d2fd449fcecab3bc3dc05aa0fa5b4f8815b2c591d1fde98be55f4dc1af0
              • Instruction Fuzzy Hash: B481BF3061CA488FE719DF1CD88876ABBE1FB99304F15466DE48BC3291DB75D842CB82
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 2700913cdaa8e072fbaccf966302ce6e5f9fdad91f4d24834899644e4036f4ea
              • Instruction ID: ffbaa6f9c57025f90e0b292df968a750f48d97ce8f1ac2bdfb349248bd13b909
              • Opcode Fuzzy Hash: 2700913cdaa8e072fbaccf966302ce6e5f9fdad91f4d24834899644e4036f4ea
              • Instruction Fuzzy Hash: 1CB16C76204B848AEB66CF3AD0503AD3BA0F34DF48F2A422ADB4A473B5CB75D441E755
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: _invalid_parameter_noinfo
              • String ID:
              • API String ID: 3215553584-0
              • Opcode ID: acba69c8a14c132deca5852aba72511722fcf418cd711944a4c76bd6c587ef30
              • Instruction ID: 3a30d487e53f8b73cdf3bb574a6b4e81c138e69f3b58ec60369493071200ead1
              • Opcode Fuzzy Hash: acba69c8a14c132deca5852aba72511722fcf418cd711944a4c76bd6c587ef30
              • Instruction Fuzzy Hash: 6C819172610A5087EB65CF6ADC913AD23A0F748FA8F548A16EF2E977E5CF34C4528700
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 94877b7f1168a199183d97b9ee620f98dfed5660db1c467fcd5f505cffb62de4
              • Instruction ID: b96502891d90a0d417930f3e190cc36b07dd1574319377b0cf734b00601ccb58
              • Opcode Fuzzy Hash: 94877b7f1168a199183d97b9ee620f98dfed5660db1c467fcd5f505cffb62de4
              • Instruction Fuzzy Hash: 1081927261478087EB75CF1AAC807EA7691F349B94F544726DF9D47BA9CB3DC4408B00
              Memory Dump Source
              • Source File: 00000000.00000002.3387519872.0000000001FE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 01FE1000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1fe1000_sGfciyumij.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: d0716cf927f3d622e8d1be20f109cdfcaa474ac34fc56a286013c67232f28705
              • Instruction ID: ca91fc87a69e970c7f5f908e22084e9f166f95fc86622d8a93e1389057fad613
              • Opcode Fuzzy Hash: d0716cf927f3d622e8d1be20f109cdfcaa474ac34fc56a286013c67232f28705
              • Instruction Fuzzy Hash: 01319A3596838C8EE31C4B2C98453B13B86EFA3685F2A622DCBDFC3272E99750474D41
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 27099d1c67046ba5536a5c52bb1b19252402c8bb4a5167aa336477e7b6d5f807
              • Instruction ID: 725235c21b47caf0edbcd50936ad3ab27c366b7dafd4723d132d9e19fb169f0c
              • Opcode Fuzzy Hash: 27099d1c67046ba5536a5c52bb1b19252402c8bb4a5167aa336477e7b6d5f807
              • Instruction Fuzzy Hash: D8517176210A5096EF368F2AC0843A837A1E79DF68F264225CF49577B8CB76DC53C780
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: f6a3dccb135ddd09f63c505db29ff29986bf9dd63497299e7c799fac6b959aa4
              • Instruction ID: 6a9cddf51357c73a49b2b04b7ed73e33111add63407a83b77df6bb68fe242a81
              • Opcode Fuzzy Hash: f6a3dccb135ddd09f63c505db29ff29986bf9dd63497299e7c799fac6b959aa4
              • Instruction Fuzzy Hash: 0E517E76224A5096EB268F2AC0503A837A0E74DF5CF269121CF8D977B9CB36CC53C780
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: db363646d287334b7a31293e9082935613ba5dde14aee32d187fc7345eaa1eeb
              • Instruction ID: ac5d1c6bd68b3ff00ec2dc55348a953991c08f666444e243ebda23d6ea0f3805
              • Opcode Fuzzy Hash: db363646d287334b7a31293e9082935613ba5dde14aee32d187fc7345eaa1eeb
              • Instruction Fuzzy Hash: E8517E76620A5096EB268B2AD0503A837B0E35DF5CF2A9121DF4D5B7B8CB36DC43CB40
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: e46230d8c0bb23a9b26f12389beaf27d8e9063d4bba2e4d98de2a57eaa924be5
              • Instruction ID: a9699c7ab3d5653fbf48160e69d0a6032427de9810f49af852ddafcb59c472f4
              • Opcode Fuzzy Hash: e46230d8c0bb23a9b26f12389beaf27d8e9063d4bba2e4d98de2a57eaa924be5
              • Instruction Fuzzy Hash: 1F517F76620A5096EB268B2AC0503A837A0E79DF68F269121CF495B7F9C736DC53C780
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: _invalid_parameter_noinfo_noreturn
              • String ID: /AS$/AV$/disable$/enable$/notifyexpire$/offlineclean$/renew$/scansubstatus$/settingssubstatus$/status$/uninstall$/update$/updatesubstatus$/wac$D:\Jenkins\workspace\N_MBAMWsc\src\wscApp.cpp$InitiateOfflineCleaning failed.$NotifyUserForNearExpiration failed.$expired$invalid stoi argument$needed$none$off$recommended$runas$snoozed$stoi argument out of range$true$wscApp::InitiateOfflineCleaning$wscApp::NotifyUserForNearExpiration
              • API String ID: 3668304517-793541459
              • Opcode ID: 526ea6badeea54726d4b16b0a3cf65bd3febbc1057dcb98f1bee845a2d33564f
              • Instruction ID: c2579e90a46674481716ed07c56492673aac538bb9cbd6c9f5aa16ef27347ac4
              • Opcode Fuzzy Hash: 526ea6badeea54726d4b16b0a3cf65bd3febbc1057dcb98f1bee845a2d33564f
              • Instruction Fuzzy Hash: ABD012B1B5164581EC1A936A954539C22D1874BBF1E908711A33C0B7E5C97890D65305
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: String$Time$AllocFree$SystemVariant$CountCurrentLocalProcessThreadTickUninitialize
              • String ID: 8$D:\Jenkins\workspace\N_MBAMWsc\src\IService.cpp$MBAMWsc$MBAMWsc process finished.$MbamService::~MbamService
              • API String ID: 696792126-3938568586
              • Opcode ID: 53a718f3b0540c413012100aaca2926b44f4adbb5edd2298459ffa551bc3d378
              • Instruction ID: 9b694a97de8b48f67e0d5064a82356e898c7834bf51fe69a95c371d96420f6c7
              • Opcode Fuzzy Hash: 53a718f3b0540c413012100aaca2926b44f4adbb5edd2298459ffa551bc3d378
              • Instruction Fuzzy Hash: 4A513876214B4096E712DF26F85439AB7A0F78CB94F585126EF8943B74EF38C685CB00
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: CloseHandle
              • String ID: D:\Jenkins\workspace\N_MBCommon-vs2022\src\mbcommon\ProcessUtils.cpp$Error waiting for process = %s, %s$ProcessUtils$Timed out waiting for process = %s to complete$mb::common::system::ProcessUtils::RunProcess
              • API String ID: 2962429428-736685494
              • Opcode ID: d633e290a468bb55dcca76d4bf9d34330a68f9745e317e56a982112744ded800
              • Instruction ID: 53520191e7dd1020d5252804e307f7974c283abbcb0436c4ff4f17d7b5862060
              • Opcode Fuzzy Hash: d633e290a468bb55dcca76d4bf9d34330a68f9745e317e56a982112744ded800
              • Instruction Fuzzy Hash: BB519C72710A8181FA139B6AE0443EE63A0E78DBE4F418612EBAD177F9DF78C581C340
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: std::_$Lockit$Concurrency::cancel_current_taskLockit::_Lockit::~_$Locinfo::_Locinfo_ctor
              • String ID: bad locale name$false$true
              • API String ID: 1486878244-1062449267
              • Opcode ID: b809507398d5140daaecabadf8c44e7591a094269cc9e2850de97db1ee4c1cdb
              • Instruction ID: 7534540067920b88e5e7eb1bf51e4358e90caed4b63b60b23605e3ce2a7512bb
              • Opcode Fuzzy Hash: b809507398d5140daaecabadf8c44e7591a094269cc9e2850de97db1ee4c1cdb
              • Instruction Fuzzy Hash: 84A16D36215B8086FB27DF66E4507EE33B0FB89B84F184125EB8917AB9DB38C555C344
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: SleepUninitialize$CreateInitializeInstanceManagerOpenSwitchThread
              • String ID: %hs operation failed with error %08X$%hs operation succeeded$D:\Jenkins\workspace\N_MBAMWsc\src\wsccom.h$Failed to create %hs with error %08X$Failed to intialize COM %08X$MBAMWsc$wsccom::PerformWscOperation
              • API String ID: 3937220661-2729994674
              • Opcode ID: c7fef79e8bbe42b6a6fc89a96eb80cb3d0f48e99b2ffc64067655ec7bf735adb
              • Instruction ID: 0a099f440a5ffeba8f8ba95b688c0b903fbc44dad2b734f68776baead0ec466c
              • Opcode Fuzzy Hash: c7fef79e8bbe42b6a6fc89a96eb80cb3d0f48e99b2ffc64067655ec7bf735adb
              • Instruction Fuzzy Hash: ACA187B6204B4496EB12DF22E4947A937A0F78DBC4F945122EB4E87BB4DF78C145D740
              APIs
              • CoInitializeEx.OLE32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,000000014000C9BE), ref: 000000014000CA31
              • CoCreateInstance.OLE32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,000000014000C9BE), ref: 000000014000CAD5
              • Sleep.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,000000014000C9BE), ref: 000000014000CC01
              • CoUninitialize.OLE32 ref: 000000014000CB60
                • Part of subcall function 000000014000B7C0: SwitchToThread.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,000000014000AB7D), ref: 000000014000B89D
                • Part of subcall function 000000014000B7C0: Sleep.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,000000014000AB7D), ref: 000000014000B8AA
              • CoUninitialize.OLE32 ref: 000000014000CD08
                • Part of subcall function 000000014000EBD0: OpenSCManagerW.ADVAPI32 ref: 000000014000ED56
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: SleepUninitialize$CreateInitializeInstanceManagerOpenSwitchThread
              • String ID: %hs operation failed with error %08X$%hs operation succeeded$D:\Jenkins\workspace\N_MBAMWsc\src\wsccom.h$Failed to create %hs with error %08X$Failed to intialize COM %08X$MBAMWsc$wsccom::PerformWscOperation
              • API String ID: 3937220661-2729994674
              • Opcode ID: 387ecaf826ad825417d1f8c639b61aaf22df31e30c1e67de20dbbe22fac656fe
              • Instruction ID: f54efe713470790398bc6acc87ea05565f9e4a8c35b2e352f00cce6a0e2c715f
              • Opcode Fuzzy Hash: 387ecaf826ad825417d1f8c639b61aaf22df31e30c1e67de20dbbe22fac656fe
              • Instruction Fuzzy Hash: FDA16576215B4486EB22DF22E494BAA37A1F78CBC4F941126EB4E47BB4DF78C185C740
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: _invalid_parameter_noinfo_noreturn$ErrorLast
              • String ID: D:\Jenkins\workspace\N_MBAMWsc\src\wscApp.cpp$Running MBAM.exe to allow the user to renew from within the UI.$Unable to renew. MBAM.exe not found.$\MBAM.exe$wscApp::StartUI
              • API String ID: 3964982034-2749715901
              • Opcode ID: a2c317415937a591dda9f6822fd405d552ca31da9b70ec88461424471f1fe3a0
              • Instruction ID: 1409f0f41a22f678ab47fe46961c9c04dd1ffa017a2fa52575aae2632c261655
              • Opcode Fuzzy Hash: a2c317415937a591dda9f6822fd405d552ca31da9b70ec88461424471f1fe3a0
              • Instruction Fuzzy Hash: C6918CB2720B8594FB02DB66E4543ED2361E749BD8F405622FB6D27AF9DE78C285C300
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: Name::operator+
              • String ID:
              • API String ID: 2943138195-0
              • Opcode ID: ced1b9e1ae3291a376d97cb8cdc71d8be10b1b2046d8044dd26887b720c14143
              • Instruction ID: e7de062e02c99b5ebeab4365ebb3593a7ab62677071afae590ab2aad0122d94c
              • Opcode Fuzzy Hash: ced1b9e1ae3291a376d97cb8cdc71d8be10b1b2046d8044dd26887b720c14143
              • Instruction Fuzzy Hash: CCF15876B00A809AEB12DFB6E4903EC37B1E308B4CF454426EB4A67BB9DA74C559C741
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: NameName::$Name::operator+
              • String ID: NULL$`generic-class-parameter-$`generic-method-parameter-$`template-type-parameter-$lambda$nullptr
              • API String ID: 826178784-2441609178
              • Opcode ID: 819c3618de74dfa5dc9eb9d21f3e73f85e00453ac3ff858ee773a0cbadd207bb
              • Instruction ID: f562cf4fd72b348b98da37fb4846fb8b724129f14434e23c19c411854dda40ed
              • Opcode Fuzzy Hash: 819c3618de74dfa5dc9eb9d21f3e73f85e00453ac3ff858ee773a0cbadd207bb
              • Instruction Fuzzy Hash: D0F18C72A1061084FB17DB6BC9A53FC27A5A74EF44F574136CF0A2AAFADA78C945C340
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: Value$ErrorLast$Heap$AllocFree
              • String ID:
              • API String ID: 570795689-0
              • Opcode ID: 6fb280773c261191e5205d109ce90158d526da447b5a306f5cc78d9f9789c596
              • Instruction ID: d73c95da8eebc20ef8bff53ca693855745d5e0f11272634882566d3ea5c8345a
              • Opcode Fuzzy Hash: 6fb280773c261191e5205d109ce90158d526da447b5a306f5cc78d9f9789c596
              • Instruction Fuzzy Hash: 3B416B3021128047FAAB67739D55BFD62529B8CFB0F580F25AB3E07BF6EA39D5408640
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID:
              • String ID: D:\Jenkins\workspace\N_MBCommon-vs2022\src\mbcommon\RegistryUtilities.cpp$Exit: <- RegistryUtilities::EnumerateOfflineKeyImpl(%p, %ls, %p, %i, %p:%i, %p:%ls)$false$mb::common::system::RegistryUtilities::EnumerateOfflineKeyImpl$true
              • API String ID: 0-2350909114
              • Opcode ID: ff673658baa75ce793c006bad514cad36dc9babd8f94592b8ec5495efda8e05e
              • Instruction ID: 382b135f274541b43b6d6caace4a782826f4cfa1d9850ae111180f6cb1a4597a
              • Opcode Fuzzy Hash: ff673658baa75ce793c006bad514cad36dc9babd8f94592b8ec5495efda8e05e
              • Instruction Fuzzy Hash: CBF16672A10B808AEB11CF66E8807DD77B4F748B88F148126EF9D5BBA9DB74C591C740
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: Name::operator+
              • String ID:
              • API String ID: 2943138195-0
              • Opcode ID: 536d155ff77887aee090ba886be595260276b993b91fd58ecf4b56afdb8a2922
              • Instruction ID: 2800bd264709c01dea67a649882f85adfa1e0bd059473b0e80193fb1657a9420
              • Opcode Fuzzy Hash: 536d155ff77887aee090ba886be595260276b993b91fd58ecf4b56afdb8a2922
              • Instruction Fuzzy Hash: 8F713D72710A41AAEB12DFA6D4903DC33B1E748B8CF465525DF0967AB9EF70C619C384
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: _invalid_parameter_noinfo_noreturn$AddressProc
              • String ID: Could not load '%s' function ptr from DLL because DLL is not loaded$Could not load '%s' function ptr from DLL, %s$D:\Jenkins\workspace\N_MBCommon-vs2022\src\mbcommon\DynamicLibrary.cpp$mb::common::system::DynamicLibrary::GetFunctionAddress
              • API String ID: 1230731272-560569770
              • Opcode ID: a49e30e0549e96d7b52b5eb2b38217757a5b1c39450f1bbd7fcbd44854d91e30
              • Instruction ID: ec9f815a35aff084cab028937da5dc540590b5f542e012cadce9fa68b7cd6d52
              • Opcode Fuzzy Hash: a49e30e0549e96d7b52b5eb2b38217757a5b1c39450f1bbd7fcbd44854d91e30
              • Instruction Fuzzy Hash: C4A17EB2721B8095EB12CF6AE4943DD73A1E749BD8F409612EB6C57AA9DF78C185C300
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: Name::operator+
              • String ID: `unknown ecsu'$class $coclass $cointerface $enum $struct $union
              • API String ID: 2943138195-1464470183
              • Opcode ID: 2eaaf7d4005071d23eb4c0f5f255f35bee69f90fd73084f6d67c33011e2648cd
              • Instruction ID: 57182be866b82b315a826a3767d317f8670486a4151317bdac16802e215984a1
              • Opcode Fuzzy Hash: 2eaaf7d4005071d23eb4c0f5f255f35bee69f90fd73084f6d67c33011e2648cd
              • Instruction Fuzzy Hash: 2D515A32B10A6099FB12CB76E8847EC37B1B708B88F550129DF0A67BB9DB75C545CB01
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: AccessesFreeGenericGrantedInfoLocalMaskNamedSecurity
              • String ID: D:\Jenkins\workspace\N_MBCommon-vs2022\src\mbcommon\Permissions.cpp$Failed to get security information for %ls %u$Invalid parameter %p %ls %u$Permissions$mb::common::system::Permissions::AccessCheckByFilePath
              • API String ID: 2574652830-1742175897
              • Opcode ID: 549c6dfb294b73f883a01d668710bcec24bf5c3b65c788fbfa44142b41e9a300
              • Instruction ID: 96df7a6bb2a53517f70fd46415591a760f9cb0e61fd3347a896aed6453b617fe
              • Opcode Fuzzy Hash: 549c6dfb294b73f883a01d668710bcec24bf5c3b65c788fbfa44142b41e9a300
              • Instruction Fuzzy Hash: 1A518132204B448AEB52DF12F48479A77B4F78CB94F544226EB8903B75DF78C559CB40
              APIs
              • CreateWellKnownSid.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?,0000000140045569), ref: 0000000140047A7B
              • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,0000000140045569), ref: 0000000140047A95
              • CreateWellKnownSid.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?,0000000140045569), ref: 0000000140047B0B
              • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,0000000140045569), ref: 0000000140047B25
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: CreateErrorKnownLastWell
              • String ID: D:\Jenkins\workspace\N_MBCommon-vs2022\src\mbcommon\Sid.cpp$Failed to create SID. Error %u$SidUtilities$Unable to calculate size. Error %u$mb::common::system::Sid::CreateFromWellKnownId
              • API String ID: 593908311-745277635
              • Opcode ID: cc4cff6892311a6c1e3498ffb2864b1d503bb009f51c5358d7cc8204457a50a0
              • Instruction ID: c4972b71db0ae2d34d9fa3694a88b8a04fba8128dfb2a48cd8b29d3000e36761
              • Opcode Fuzzy Hash: cc4cff6892311a6c1e3498ffb2864b1d503bb009f51c5358d7cc8204457a50a0
              • Instruction Fuzzy Hash: 89417C33205B8086EB128F66E884B9AB7A4F78CBA4F158126EF8D43B74DF78C555C740
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: _invalid_parameter_noinfo
              • String ID: -$:$f$p$p
              • API String ID: 3215553584-2013873522
              • Opcode ID: 5d83d6891c745ba87f30799c271509f88d6f175bdfdb4357c0eb11f97c89a9b5
              • Instruction ID: 74a4b8f5d7082b8e80b5c2295f0020de8079cab5c72f5d5a0f6e922a9e1071bb
              • Opcode Fuzzy Hash: 5d83d6891c745ba87f30799c271509f88d6f175bdfdb4357c0eb11f97c89a9b5
              • Instruction Fuzzy Hash: C0120636A0416287FB269B56E0443EEB6A1F358FA8FDC4116E7924F6E4D73AC590CB01
              APIs
              • QueryServiceConfigW.ADVAPI32(?,?,?,?,?,?,?,?,?,?,00000000,00000000,?,0000EA60), ref: 00000001400373D3
              • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,00000000,?,0000EA60), ref: 00000001400373F0
              • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00000001400375E0
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: ConfigErrorLastQueryService_invalid_parameter_noinfo_noreturn
              • String ID: D:\Jenkins\workspace\N_MBCommon-vs2022\src\mbcommon\WindowsService.cpp$Failed to call QueryServiceConfig for %ls, error %u$Invalid data buffer$Invalid service handle for %ls$mb::common::system::WindowsService::CallQueryServiceConfig
              • API String ID: 2057177955-775020918
              • Opcode ID: a40d3db1cefc73c5813ac865f5ec5311c5b3718884f7ada95a1ef65a4e4a8d54
              • Instruction ID: 047b188f8f061827e1493370f1094a22d848c17937309e98af42965ffc519344
              • Opcode Fuzzy Hash: a40d3db1cefc73c5813ac865f5ec5311c5b3718884f7ada95a1ef65a4e4a8d54
              • Instruction Fuzzy Hash: 34917972710A5485FB26CF66E484BAE27A0FB48BD8F145216EB5D27BA8CF78C591C340
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: _invalid_parameter_noinfo_noreturn
              • String ID: AUX$COM$CON$LPT$NUL$PRN$\\.\
              • API String ID: 3668304517-431953350
              • Opcode ID: 11b31c2ee0db22a3558905b1bc3c5419560a738c0f79a28d60b9fb32397422e6
              • Instruction ID: 5bc9f3eba1f897a59fdc517d27536db70d78d94185ff9d74dcff53f5879f9d21
              • Opcode Fuzzy Hash: 11b31c2ee0db22a3558905b1bc3c5419560a738c0f79a28d60b9fb32397422e6
              • Instruction Fuzzy Hash: 9571C4B3714A80D2EA628F66D014BF967A1F369B84F968121FB8D436F4DB7DCA41C604
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: CloseHandle
              • String ID: D:\Jenkins\workspace\N_MBCommon-vs2022\src\mbcommon\ProcessUtils.cpp$Error getting exit code of process = %s, %s$ProcessUtils$mb::common::system::ProcessUtils::RunProcess
              • API String ID: 2962429428-2781858381
              • Opcode ID: d88e912a8a15424c2bc31cc8cd76dcc175a2b214fd51519bf180b0a7f2857127
              • Instruction ID: 6e94396ed04217719b0a5edb4fb581e35fc32233c976419dbe42b2f74155664c
              • Opcode Fuzzy Hash: d88e912a8a15424c2bc31cc8cd76dcc175a2b214fd51519bf180b0a7f2857127
              • Instruction Fuzzy Hash: 88418D72710A8085EE02DB6AE4543EE63A1E78DBE4F409612EBAD577F9DF78C581C300
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: Name::operator+
              • String ID: cli::array<$cli::pin_ptr<$std::nullptr_t$std::nullptr_t $void$void
              • API String ID: 2943138195-2239912363
              • Opcode ID: ff0c7a5896472f3944db5f8cec5ff0fa6d411fdf6fdcc3d3148b8152eb8ce105
              • Instruction ID: 90d58a23994952c08b1bcbe8f49be64a7913f429874871fc7b6f18f56aad4abd
              • Opcode Fuzzy Hash: ff0c7a5896472f3944db5f8cec5ff0fa6d411fdf6fdcc3d3148b8152eb8ce105
              • Instruction Fuzzy Hash: 355157B2A14B5099FB12CB62E8847EC37B0B74CB48F454126DF4A23BB9DBB8C195C710
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: _invalid_parameter_noinfo_noreturn$ByteCharMultiWidestd::bad_exception::bad_exception$CloseHandle
              • String ID:
              • API String ID: 1007650202-0
              • Opcode ID: ee35f23eab8eb1b3641a80946236ceecabace32f793b0acd2ca6f84ca75f7666
              • Instruction ID: 65ce164cb7276dfde234dfb0f2906340d26cf9e31f4f4c77ce2e5564ef4f5986
              • Opcode Fuzzy Hash: ee35f23eab8eb1b3641a80946236ceecabace32f793b0acd2ca6f84ca75f7666
              • Instruction Fuzzy Hash: EA91B7726156C580EE63AB6AE0563EF6351E78DBE1F505721A7BC07AF6EE78C084C700
              APIs
              Strings
              • mb::common::system::RegistryUtilities::CreateRegKeyImpl, xrefs: 0000000140028D1F
              • D:\Jenkins\workspace\N_MBCommon-vs2022\src\mbcommon\RegistryUtilities.cpp, xrefs: 0000000140028D18
              • Failed to create reg key %ls\%ls, wow64 = 0x%x, %ls, xrefs: 0000000140028CF9
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: _invalid_parameter_noinfo_noreturn
              • String ID: D:\Jenkins\workspace\N_MBCommon-vs2022\src\mbcommon\RegistryUtilities.cpp$Failed to create reg key %ls\%ls, wow64 = 0x%x, %ls$mb::common::system::RegistryUtilities::CreateRegKeyImpl
              • API String ID: 3668304517-3498662468
              • Opcode ID: f8b150574f845ef828c000daf84a0881a56d81eb36987d8157a1ae8ca23b0ebc
              • Instruction ID: 31a579414711654e769ef75ec47890e0750260992f5b024917c0aed097b5a76d
              • Opcode Fuzzy Hash: f8b150574f845ef828c000daf84a0881a56d81eb36987d8157a1ae8ca23b0ebc
              • Instruction Fuzzy Hash: 49C189B6215B8486EA61DF1AF44479EB7A1F789BD4F544216EF9C03BA8DF38C485CB00
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: Close$CreateOpenValue
              • String ID: DisableMonitoring$Software\Microsoft\Security Center\Monitoring
              • API String ID: 678895439-4070697454
              • Opcode ID: 81dea28931f6972ae66c8845ef20e11d780cf120f9648db2e64d902f2fc82963
              • Instruction ID: d855fb5c4d86a42225a7e31c8f0b97991da4a637e0b984f8b4f5a8d306e729f1
              • Opcode Fuzzy Hash: 81dea28931f6972ae66c8845ef20e11d780cf120f9648db2e64d902f2fc82963
              • Instruction Fuzzy Hash: 17212E32608B9182E7618B66F48474AB7A4F788B94F505215EB8987F68EF7CC2558B04
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: EventResetWait$MultipleMutexObjectObjectsReleaseSinglestd::bad_exception::bad_exception
              • String ID: cannot lock reader/writer lock
              • API String ID: 293155808-3465051855
              • Opcode ID: e59351486e9443f9e40111e54a9b2ef31e98472e9c7443791f11b6325c379572
              • Instruction ID: 0e75493302944bd9e7b15dbc3a9dfd89c2f59db9818a00f8541147089c47b245
              • Opcode Fuzzy Hash: e59351486e9443f9e40111e54a9b2ef31e98472e9c7443791f11b6325c379572
              • Instruction Fuzzy Hash: AC215932300E0492EB22DF26E8543A97370F798F98F545121EB5D476B5DF39CA49C700
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: _invalid_parameter_noinfo
              • String ID: f$p$p
              • API String ID: 3215553584-1995029353
              • Opcode ID: 5ba8f657296955fa3f66b8da595bac26607bddac8d7bcaaa97e56423690fea3d
              • Instruction ID: 85a71509cee07936f6f148524e4d0acc7eaf99a934b7d397918794e3f2d5a0b8
              • Opcode Fuzzy Hash: 5ba8f657296955fa3f66b8da595bac26607bddac8d7bcaaa97e56423690fea3d
              • Instruction Fuzzy Hash: F512D5B2A1428286FB669B16E0547FAB7A1F388F50FDC4115E7924F6E4E73BC580CB00
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID:
              • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set$vector too long
              • API String ID: 0-2271544611
              • Opcode ID: e55702b65e16a2f69c4260a70adfe00c358c37ab95e76d92afce820b356e44d5
              • Instruction ID: ae729dea0abd5e62fc7225159c118ed7ae842a659b7ee57d970ddd36ab6cafe9
              • Opcode Fuzzy Hash: e55702b65e16a2f69c4260a70adfe00c358c37ab95e76d92afce820b356e44d5
              • Instruction Fuzzy Hash: 8CB18E32200A8491EB66CB16D4847AD77A1F78CFD4F598622EF5E4B7B1DB3AC462C340
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: Name::operator+
              • String ID: {for
              • API String ID: 2943138195-864106941
              • Opcode ID: 70abbf3ee22149e307f55b43cb72c4d1799d44a00a3e84a400823ab5df7b9196
              • Instruction ID: e2c0deb88fc7b94ae7e76a4b51ce622b935d2c65a0afa69aea29462c96dc48f1
              • Opcode Fuzzy Hash: 70abbf3ee22149e307f55b43cb72c4d1799d44a00a3e84a400823ab5df7b9196
              • Instruction Fuzzy Hash: 0D516C72610B84AAFB029F66D5453EC37A0F348B88F868422EB4D5BBB5DFB8C555C340
              APIs
              • QueryServiceStatusEx.ADVAPI32(?,?,?,?,?,?,?,?,?,?,00000000,000000014000EEEC), ref: 00000001400371E2
              • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,000000014000EEEC), ref: 000000014003720F
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: ErrorLastQueryServiceStatus
              • String ID: D:\Jenkins\workspace\N_MBCommon-vs2022\src\mbcommon\WindowsService.cpp$Invalid service handle for %ls$QueryServiceStatusEx failed on %1s. Error %u.$mb::common::system::WindowsService::QueryStatusEx
              • API String ID: 3544625541-3834371814
              • Opcode ID: f940c91df44b36f97ba3843cdf7b4ad9b75e6f0394553b3ebe38a5465a4717d4
              • Instruction ID: 60fb98fce8a23e0466891abd8b850b8b7e5c64f9e6be64cfb437abacac22fa47
              • Opcode Fuzzy Hash: f940c91df44b36f97ba3843cdf7b4ad9b75e6f0394553b3ebe38a5465a4717d4
              • Instruction Fuzzy Hash: 534139B2604B8482EB66CF62F44079A77A4F79CB88F445216EB8C47768DF78C195CB40
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: EventReset$Wait$MultipleMutexObjectObjectsReleaseSingle
              • String ID: cannot lock reader/writer lock$cannot unlock reader/writer lock
              • API String ID: 1008919174-2331149746
              • Opcode ID: f278338fa424768d87383f8a38bbf6ad8ce8a3eb2052e3059145dd6ecefd0307
              • Instruction ID: 2c51c9a2cf7b20b4ab62582ab8a17ce6d8da9bcbc5fca1e46bbf1657fba6e54a
              • Opcode Fuzzy Hash: f278338fa424768d87383f8a38bbf6ad8ce8a3eb2052e3059145dd6ecefd0307
              • Instruction Fuzzy Hash: B501F632200B0486EB269F36E85079D7360F788F99F084121DE9A473A9CF39C699CB41
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_task
              • String ID:
              • API String ID: 3936042273-0
              • Opcode ID: 47ac7a7365b90ab4f4ea6d3041da5dd1c441095ef817d8b65f6d8979793d65e3
              • Instruction ID: f0ba0ac5c0db4927016258d603e1d80b91c1bd942e65dac1f9016bc60554a08c
              • Opcode Fuzzy Hash: 47ac7a7365b90ab4f4ea6d3041da5dd1c441095ef817d8b65f6d8979793d65e3
              • Instruction Fuzzy Hash: 52C19072614B8481EA22DB26E4513ED6360F799BE4F549321EBAC07BE6EF78C5D1C340
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: ByteCharMultiStringWide
              • String ID:
              • API String ID: 2829165498-0
              • Opcode ID: 1ad9458f6110a64eaf78223e7508bf1f0d9e9f0bde86025a7688cb32f63c554a
              • Instruction ID: 9a620ab765e4878969c1eacdabf29c938fe4217996ed460ef6f3529f6a991c5d
              • Opcode Fuzzy Hash: 1ad9458f6110a64eaf78223e7508bf1f0d9e9f0bde86025a7688cb32f63c554a
              • Instruction Fuzzy Hash: DC81813321078486FB618F26E4407EAB7E1FB59FE8F184615EB5957BE8DB38C5158700
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
              • String ID:
              • API String ID: 2081738530-0
              • Opcode ID: a51ffa365af961e9e657dfdc85cfb8d31fe91408219503cf46cab9aa6d051666
              • Instruction ID: c2ac795c2f0c21321cc7c93fa587029711438d4417d8fa265569bdf59029a98f
              • Opcode Fuzzy Hash: a51ffa365af961e9e657dfdc85cfb8d31fe91408219503cf46cab9aa6d051666
              • Instruction Fuzzy Hash: 7B317C72215A4084FA26DF27F4847DA63A5F78CBE8F481222EB8E177F5DE38C4558700
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
              • String ID:
              • API String ID: 2081738530-0
              • Opcode ID: ae6fc260dac909998aad872746bea46f964fb71e7e2e3663e7e262a08e17c3a2
              • Instruction ID: 287997294f2af973b1583e57968790a3780f2042e4d8cfe7b4a3c0247e476c68
              • Opcode Fuzzy Hash: ae6fc260dac909998aad872746bea46f964fb71e7e2e3663e7e262a08e17c3a2
              • Instruction Fuzzy Hash: E7313672604A4080EA26DF16F884BDA63A0F79CBD4F480622AB9E072B9DF78C4558744
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
              • String ID:
              • API String ID: 2081738530-0
              • Opcode ID: b8031d3ce14c389318d4f2f958ae011d571469996da26fa6a8f524c0c4619768
              • Instruction ID: 80df17189ee19fd901b970c0d5c24fc72d5d36fa09cf65dcdb7ff04ff09797b1
              • Opcode Fuzzy Hash: b8031d3ce14c389318d4f2f958ae011d571469996da26fa6a8f524c0c4619768
              • Instruction Fuzzy Hash: D6314872604B4081FA26DF17F445BDA63A1F78CBE8F580622AF8E073B5DE79C5558704
              APIs
              • GetLastError.KERNEL32(?,?,000045F42809D22C,00000001401548D9,?,?,?,?,000000014016EC66,?,?,00000000,00000001401649FF,?,?,?), ref: 0000000140167B97
              • FlsSetValue.KERNEL32(?,?,000045F42809D22C,00000001401548D9,?,?,?,?,000000014016EC66,?,?,00000000,00000001401649FF,?,?,?), ref: 0000000140167BCD
              • FlsSetValue.KERNEL32(?,?,000045F42809D22C,00000001401548D9,?,?,?,?,000000014016EC66,?,?,00000000,00000001401649FF,?,?,?), ref: 0000000140167BFA
              • FlsSetValue.KERNEL32(?,?,000045F42809D22C,00000001401548D9,?,?,?,?,000000014016EC66,?,?,00000000,00000001401649FF,?,?,?), ref: 0000000140167C0B
              • FlsSetValue.KERNEL32(?,?,000045F42809D22C,00000001401548D9,?,?,?,?,000000014016EC66,?,?,00000000,00000001401649FF,?,?,?), ref: 0000000140167C1C
              • SetLastError.KERNEL32(?,?,000045F42809D22C,00000001401548D9,?,?,?,?,000000014016EC66,?,?,00000000,00000001401649FF,?,?,?), ref: 0000000140167C37
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: Value$ErrorLast
              • String ID:
              • API String ID: 2506987500-0
              • Opcode ID: a48a770b4761676df5049221d2361d904eaada45cecb2da31b9b22047447a242
              • Instruction ID: cf83103111ac15da5ee6f1fbd3c6a61e743c274bb870845df3326e910256b861
              • Opcode Fuzzy Hash: a48a770b4761676df5049221d2361d904eaada45cecb2da31b9b22047447a242
              • Instruction Fuzzy Hash: 62113A3131068043FA9B67339E55BF962629B8CFB0F544F25AB3A07BF6EE79D4414640
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: std::_$Lockit$GetctypeLocinfo::_Locinfo_ctorLockit::_Lockit::~_
              • String ID: bad locale name
              • API String ID: 2967684691-1405518554
              • Opcode ID: da7205e4d3090da993bd70d538c7045fe935b9be17360c01237a60171a5e39a2
              • Instruction ID: ca96636f042f5223933b571fd6b47802c03752461e8a14668bf6921d8558fcba
              • Opcode Fuzzy Hash: da7205e4d3090da993bd70d538c7045fe935b9be17360c01237a60171a5e39a2
              • Instruction Fuzzy Hash: C5512732B45B808AFB16CBB6E4503EC3374BB98B88F084525DF8927A66DB34C5669344
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: NameName::
              • String ID: `template-parameter$void
              • API String ID: 1333004437-4057429177
              • Opcode ID: c1809ff316c2ca2c45a902e0da5cbaafba1e99388b5c63b68634db8828e58bb5
              • Instruction ID: c0d34d732f0af6c1f5b87027a59c14e8fcff88424753aee7a655c319da20d4cc
              • Opcode Fuzzy Hash: c1809ff316c2ca2c45a902e0da5cbaafba1e99388b5c63b68634db8828e58bb5
              • Instruction Fuzzy Hash: 98414832B10B5499FB02CBA6D8557EC23B1BB4CB98F951125DF092BBB9DFB8C5458300
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: EventMultipleMutexObjectsReleaseResetWaitstd::bad_exception::bad_exception
              • String ID: cannot lock reader/writer lock
              • API String ID: 2739960895-3465051855
              • Opcode ID: dc359fc11c38174b8224d2634e75c0b50ca414a80f47cb31c0377533414e0148
              • Instruction ID: 7998604c3a9102f2150f04ad27db98e6da05c95a7b9b456042232f93d9de2e1d
              • Opcode Fuzzy Hash: dc359fc11c38174b8224d2634e75c0b50ca414a80f47cb31c0377533414e0148
              • Instruction Fuzzy Hash: 52017172310E0492EB21DF2AE8507D97320F798B98F445121EB9D476B5DF79C648C700
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: _invalid_parameter_noinfo_noreturn$DebugOutputString
              • String ID:
              • API String ID: 2094900029-0
              • Opcode ID: 327c7d7336889510ee4ed1d629614a92e23b16bb5f77fa56660626976aa0b9c2
              • Instruction ID: b36ed0d8b268d4ba27a55bedf1659f5c9ea122582247bffe9707be164eae009b
              • Opcode Fuzzy Hash: 327c7d7336889510ee4ed1d629614a92e23b16bb5f77fa56660626976aa0b9c2
              • Instruction Fuzzy Hash: 66718EB3B20A8486EB01DBBAE4417ED6362F7897D8F105312AF5C17AAADF74D181C340
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: NameName::$Name::operator+
              • String ID:
              • API String ID: 826178784-0
              • Opcode ID: ba6654f4b376d28a48223d92461b0fc23439baae17d4d7f94e7a49911b44ce06
              • Instruction ID: 36fe011757a991a2c4ccf27f790faa28e1a33d44b65646c093d83b53312f297a
              • Opcode Fuzzy Hash: ba6654f4b376d28a48223d92461b0fc23439baae17d4d7f94e7a49911b44ce06
              • Instruction Fuzzy Hash: 9F416B32311A50A5EB12CB22E890BEC37B4B75CF84F964526DF4A237B5DBB5C919C701
              APIs
              • FlsGetValue.KERNEL32(?,?,?,000000014014C16F,?,?,00000000,000000014014C40A,?,?,?,?,?,000000014014C396), ref: 0000000140167C6F
              • FlsSetValue.KERNEL32(?,?,?,000000014014C16F,?,?,00000000,000000014014C40A,?,?,?,?,?,000000014014C396), ref: 0000000140167C8E
              • FlsSetValue.KERNEL32(?,?,?,000000014014C16F,?,?,00000000,000000014014C40A,?,?,?,?,?,000000014014C396), ref: 0000000140167CB6
              • FlsSetValue.KERNEL32(?,?,?,000000014014C16F,?,?,00000000,000000014014C40A,?,?,?,?,?,000000014014C396), ref: 0000000140167CC7
              • FlsSetValue.KERNEL32(?,?,?,000000014014C16F,?,?,00000000,000000014014C40A,?,?,?,?,?,000000014014C396), ref: 0000000140167CD8
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: Value
              • String ID:
              • API String ID: 3702945584-0
              • Opcode ID: 046c2e0dc215b76133a85a9bfc8f09b6f8f8064bdf1d9940554f4cdb3f29d40e
              • Instruction ID: de56f534fdb3ef53aa8ff706109013e6bf9de45ae4fbd6bc753bffc9c91aef68
              • Opcode Fuzzy Hash: 046c2e0dc215b76133a85a9bfc8f09b6f8f8064bdf1d9940554f4cdb3f29d40e
              • Instruction Fuzzy Hash: 30116D7031068143FA9A9B3B9D51BF96552AF8CFB0F544F25AB3E067F6DE38D5418600
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: _invalid_parameter_noinfo_noreturn
              • String ID: NULL$UNKNOWN
              • API String ID: 3668304517-1702702805
              • Opcode ID: 6d22b8edb13444eaba12218aef5f33c8faed01fd0078e557a101a74a5c2c6a68
              • Instruction ID: d988c613f7871877e55e696108978b7194945110669dbe465829733ff935218e
              • Opcode Fuzzy Hash: 6d22b8edb13444eaba12218aef5f33c8faed01fd0078e557a101a74a5c2c6a68
              • Instruction Fuzzy Hash: 92E1AAB2700A8492EB05DB66E4843DE73A2F789BC8F404512EF5C5BBAADF79C595C340
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: CountLocalTickTime_invalid_parameter_noinfo_noreturn
              • String ID: NULL
              • API String ID: 2617042107-324932091
              • Opcode ID: 9eea1394cd220d565c10a6f1157f121d1e714a70e2003470300d37bfc92b9d49
              • Instruction ID: c772afeb89a265b1c28c664051977f340156a854098f5626edbb3aa3806fab08
              • Opcode Fuzzy Hash: 9eea1394cd220d565c10a6f1157f121d1e714a70e2003470300d37bfc92b9d49
              • Instruction Fuzzy Hash: 16819D72618B9485EA11DB66A4407AEB7A0F7C9BD4F504226FFD947BA9DF7CC081CB00
              APIs
              Strings
              • D:\Jenkins\workspace\N_MBCommon-vs2022\src\mbcommon\DynamicLibrary.cpp, xrefs: 000000014003DC6F
              • mb::common::system::DynamicLibrary::GetFunctionAddress, xrefs: 000000014003DC76
              • Could not load '%s' function ptr from DLL, %s, xrefs: 000000014003DC50
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: _invalid_parameter_noinfo_noreturn$AddressProc
              • String ID: Could not load '%s' function ptr from DLL, %s$D:\Jenkins\workspace\N_MBCommon-vs2022\src\mbcommon\DynamicLibrary.cpp$mb::common::system::DynamicLibrary::GetFunctionAddress
              • API String ID: 1230731272-4139386056
              • Opcode ID: 1061a028fe493cee1872c8485793ead55ba370b63807753ca0677535ee79a9db
              • Instruction ID: 812c2e6998b0f9f352243bede7c63ee51f2c355518dfd79b4ee4fd2b478071d3
              • Opcode Fuzzy Hash: 1061a028fe493cee1872c8485793ead55ba370b63807753ca0677535ee79a9db
              • Instruction Fuzzy Hash: 03616EB2B21B8095EB12CB6AE4543DD7361E788BD8F409612EF6C57BA9DF78C185C340
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: std::_$Lockit$Locinfo::_Locinfo_ctorLockit::_Lockit::~_
              • String ID: bad locale name
              • API String ID: 2775327233-1405518554
              • Opcode ID: 49088ce8b2e5767c4ed8ccdddf3b75674d69078aa35bb5f09a7bac20184de9ea
              • Instruction ID: 6c7efa32fcf971d34321b93e835ab57b3080dd86c245248caded277330a92e57
              • Opcode Fuzzy Hash: 49088ce8b2e5767c4ed8ccdddf3b75674d69078aa35bb5f09a7bac20184de9ea
              • Instruction Fuzzy Hash: 05413633342A8089FB56DFA6E4907ED33A4EB48B88F084525EB4927EB5DE38C525D345
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: std::_$Lockit$Locinfo::_Locinfo_ctorLockit::_Lockit::~_
              • String ID: bad locale name
              • API String ID: 2775327233-1405518554
              • Opcode ID: 5503059cc9a078d1ce4e2c0a60ecb17a4fd153e4c1fd92222cef4641eb8eb0eb
              • Instruction ID: b203d7cbc7aa485389eff5955ca433a3002ad10fdbab3e9d5be72a3c8ebceffc
              • Opcode Fuzzy Hash: 5503059cc9a078d1ce4e2c0a60ecb17a4fd153e4c1fd92222cef4641eb8eb0eb
              • Instruction Fuzzy Hash: 29412A33752A8089FB56DF72E490BED33A4EB49B48F084425EF4927AA5DE38C6259344
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: String$AllocCreateFreeInstance
              • String ID: \\.\root\SecurityCenter
              • API String ID: 391255401-3879495660
              • Opcode ID: 477889bc36b94cdf336964be665b76fd8f01a141538cf9a670d5d35525c3f305
              • Instruction ID: a66105b6de9b8549b41adadc4c78a8f29c57513e5d546d07c5ed463642c00647
              • Opcode Fuzzy Hash: 477889bc36b94cdf336964be665b76fd8f01a141538cf9a670d5d35525c3f305
              • Instruction Fuzzy Hash: 82113472608B5482EB11DB26F484B8AB7A5F78CF84F444116EB8943F68DF38D255CB40
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: AttributesFile_invalid_parameter_noinfo_noreturn
              • String ID: *#?[$\\?\
              • API String ID: 4085684281-1416793408
              • Opcode ID: 341ce1fcadb7b34fcd00d92a3e31b855a5d46ba2d74d3b0e543e14f9d589ee5d
              • Instruction ID: e3826b3e8af972dab3b9d7d7725173b1b0866ba78d9935e9cc4c0fd1a9bb1f99
              • Opcode Fuzzy Hash: 341ce1fcadb7b34fcd00d92a3e31b855a5d46ba2d74d3b0e543e14f9d589ee5d
              • Instruction Fuzzy Hash: 79F096B271064491EE13AB6AD45939E6391E78CBE8F404621FB7D077F5DD38C5848300
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: _invalid_parameter_noinfo_noreturn
              • String ID:
              • API String ID: 3668304517-0
              • Opcode ID: ea0061aaaca18e862210f63c976e41b390a6599fb10e853f66fac53096f5395a
              • Instruction ID: be65ef7267e40faa84b5fa134effab412aa6cc79844e511da6459c784097def7
              • Opcode Fuzzy Hash: ea0061aaaca18e862210f63c976e41b390a6599fb10e853f66fac53096f5395a
              • Instruction Fuzzy Hash: B6A19EB2714B8485EB21DB2AE44039EA7A1F78DBE4F544612EF9C47BA9DF78C581C700
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: _invalid_parameter_noinfo_noreturn
              • String ID:
              • API String ID: 3668304517-0
              • Opcode ID: a51d54e093470f5a1b4e2f6b55290b6b802ae337c843becb5acb8b187c56173f
              • Instruction ID: ea393c662d65376652dcbd7205264fd7189d2d14800c5fbcd9f31c30c11199c5
              • Opcode Fuzzy Hash: a51d54e093470f5a1b4e2f6b55290b6b802ae337c843becb5acb8b187c56173f
              • Instruction Fuzzy Hash: 4771EFB2B1068481EE56AB6BE1413EF63A1E78DFD5F444121EF6D0BBF5DA38C5818340
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: ByteCharMultiWide$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
              • String ID:
              • API String ID: 143101810-0
              • Opcode ID: b6551e8d1c13d3c25d7ff8937ea8d1eae6de0220b2913642ef14812ec7c8ff84
              • Instruction ID: 3a847b099823ca26131f19a692db5aed14ca0cda2ad5bef10cbc4d24aa4189ca
              • Opcode Fuzzy Hash: b6551e8d1c13d3c25d7ff8937ea8d1eae6de0220b2913642ef14812ec7c8ff84
              • Instruction Fuzzy Hash: F2510472614B8442EA15CF67E44439EB3A1F78DBE4F244225FBAC07BE8DB79C4918740
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: ByteCharMultiWide$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
              • String ID:
              • API String ID: 143101810-0
              • Opcode ID: 4c3cfe6864c9d7d38577500d1b95826d81f8be3f7532701bbabf940380d9b2e1
              • Instruction ID: 76633529d9eafcef87484edceb09ffe62ee1534dc96728213f41976dea224908
              • Opcode Fuzzy Hash: 4c3cfe6864c9d7d38577500d1b95826d81f8be3f7532701bbabf940380d9b2e1
              • Instruction Fuzzy Hash: 5751D032614B8086EA25CF67E44039EB7A1FB88BE0F544225BBA907BA5DF79D091C740
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: Name::operator+$Replicator::operator[]
              • String ID:
              • API String ID: 3863519203-0
              • Opcode ID: 32701a683d00f4047edd853e6b9576ee3a8e9ec03156c55c1a02d554fbe271af
              • Instruction ID: 29f59a5a0f8e8bf00a366a705d560d2c53b67c14e32d9f076a576580f3e95b68
              • Opcode Fuzzy Hash: 32701a683d00f4047edd853e6b9576ee3a8e9ec03156c55c1a02d554fbe271af
              • Instruction Fuzzy Hash: DC4148B2A00B9099FB02CFA6D8543EC37B0F348B48F598525DF496B7A9DBB8C445C740
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
              • String ID:
              • API String ID: 2933794660-0
              • Opcode ID: 2bdd47dfd6c4fb17b1c3a864db2b1a1a1abb014928fcd48528d2ad794ee673df
              • Instruction ID: 5e8cf9600bcedfe04a0903642396ed8186a91d381a17148e10052b1e61b7b15c
              • Opcode Fuzzy Hash: 2bdd47dfd6c4fb17b1c3a864db2b1a1a1abb014928fcd48528d2ad794ee673df
              • Instruction Fuzzy Hash: 6F11F736710F008AEB41CF65E8553A933A4F75DB68F441E25EF6D867A4EFB8D2948340
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: _invalid_parameter_noinfo_noreturn
              • String ID: HKEY_CLASSES_ROOT$string too long
              • API String ID: 3668304517-669301083
              • Opcode ID: 89b3b8a4cb50dc5c4e1928be09276d36fbe45692aa0b69731c297bcec2e37c39
              • Instruction ID: 99a023ac1a8dad6ea3ba3aa7e648dc9493d144c39321f98eb073844f2c633bf4
              • Opcode Fuzzy Hash: 89b3b8a4cb50dc5c4e1928be09276d36fbe45692aa0b69731c297bcec2e37c39
              • Instruction Fuzzy Hash: 5B51BCB2710B8485EA56CF5AE4403ED63A1F789FD8F588622EF5D477A5EB39C192C300
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: _invalid_parameter_noinfo_noreturn$CreateInitializeInstanceUninitialize
              • String ID: Malwarebytes
              • API String ID: 273938800-1399732342
              • Opcode ID: 6e185ec63b5e80506e589ad6579432b63accc9dba0bc74bac8098311b851cde8
              • Instruction ID: 2d540a640d5d9a85d61436de65ce4afb88fe29467fc7e8fa20315361429e7535
              • Opcode Fuzzy Hash: 6e185ec63b5e80506e589ad6579432b63accc9dba0bc74bac8098311b851cde8
              • Instruction Fuzzy Hash: 78417E72724A8081EA51DB2BF5453ED6761A789BF0F555322FB69077E9CA38C481C700
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: NameName::
              • String ID: %lf
              • API String ID: 1333004437-2891890143
              • Opcode ID: 26d0d7eb62b33114c850b8c470d2869356a3e04c9ccae6a18ccd8aecc8e518e4
              • Instruction ID: c7edaf5f38504274949752bf9b5b2eb6b73046673dea82f03097cd260d72a1d3
              • Opcode Fuzzy Hash: 26d0d7eb62b33114c850b8c470d2869356a3e04c9ccae6a18ccd8aecc8e518e4
              • Instruction Fuzzy Hash: 0B31D171204B8486EB22CB23B8503EA73A0FB5DFC4F558226EF8A677B5DA38C545C740
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: std::_$Locinfo::_Locinfo_ctorLockitLockit::_Yarn
              • String ID: bad locale name
              • API String ID: 1838369231-1405518554
              • Opcode ID: eea2ecb1fbcab68af80ac54c6ec57019c3cc4956c90f059e6f203255c2b815b5
              • Instruction ID: 557562a38ce3c42ac8dd400b930b8ee48cb69af7c3111a89bd66db26b68c2eb6
              • Opcode Fuzzy Hash: eea2ecb1fbcab68af80ac54c6ec57019c3cc4956c90f059e6f203255c2b815b5
              • Instruction Fuzzy Hash: 90118273101B80C9D756DF76B88039933A5FB5CF84F1851249B8C8776AEB34C490C340
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: Allocstd::bad_exception::bad_exception
              • String ID: cannot allocate thread context key
              • API String ID: 287486779-1710566765
              • Opcode ID: 8a419b5cec5fbabe226d8f00ab716875f1def469e240a1042e8fa260f1b4cc27
              • Instruction ID: 727f44e000f00508497cecc79bae0313f168b1963e06c36c554f12ef8679cbed
              • Opcode Fuzzy Hash: 8a419b5cec5fbabe226d8f00ab716875f1def469e240a1042e8fa260f1b4cc27
              • Instruction Fuzzy Hash: 5E016D71620945A2FA22EB36E8857E96320F79D748FD01612E35E835F6DE7CC35ACB00
              APIs
              • RtlPcToFileHeader.KERNEL32(?,?,?,?,?,?,?,?,?,000000014013B96E), ref: 000000014013F4E0
              • RaiseException.KERNEL32(?,?,?,?,?,?,?,?,?,000000014013B96E), ref: 000000014013F521
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: ExceptionFileHeaderRaise
              • String ID: csm
              • API String ID: 2573137834-1018135373
              • Opcode ID: bbf4c8d96c2d1b13b2eb055c5be80afc231ee68d77ba38fb6be477ab8f8d0845
              • Instruction ID: 623220740b85b1f462730b002427edb6323ddaa5476250331664a54d396c729c
              • Opcode Fuzzy Hash: bbf4c8d96c2d1b13b2eb055c5be80afc231ee68d77ba38fb6be477ab8f8d0845
              • Instruction Fuzzy Hash: A7111932215B8092EB228B16E44439A77E5F78CF94F685225EB8D07768DF38C6558B00
              APIs
              • GetFileAttributesW.KERNEL32(?,?,?,?,?,?,?,00000001400556C1,?,?,?,0000000140055688), ref: 0000000140055C9E
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: AttributesFile
              • String ID: !_path.empty()$D:\Jenkins\workspace\N_Poco-VS2022\poco-1.12.4\Foundation\src\File_WIN32U.cpp
              • API String ID: 3188754299-3037167476
              • Opcode ID: 894283fa9d00d58927e02be5b7d7a4faa3245e5ab04c4c2ea587933cb224d54c
              • Instruction ID: f6421971dd98383fa2bb279480063023fa215071a108ea19ab6c79a5d2d13a48
              • Opcode Fuzzy Hash: 894283fa9d00d58927e02be5b7d7a4faa3245e5ab04c4c2ea587933cb224d54c
              • Instruction Fuzzy Hash: EDF0E97360060045FB25E726D8A03E81690A71D784F640511D729875F0DF3ACACAC301
              APIs
              • GetFileAttributesW.KERNEL32(?,?,?,00000001400556C1,?,?,?,0000000140055688), ref: 0000000140055C2E
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3387760348.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.3387748638.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140183000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387846978.0000000140193000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387910053.000000014024D000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387921683.000000014024E000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387932973.000000014024F000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387944360.0000000140251000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140254000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387956329.0000000140258000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014025A000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.0000000140270000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3387981533.000000014027E000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_sGfciyumij.jbxd
              Similarity
              • API ID: AttributesFile
              • String ID: !_path.empty()$D:\Jenkins\workspace\N_Poco-VS2022\poco-1.12.4\Foundation\src\File_WIN32U.cpp
              • API String ID: 3188754299-3037167476
              • Opcode ID: 8c8d8a6ddb9321c10c85db20912533d3d5159feabeddeee5cb6a6ad149b972a3
              • Instruction ID: b1fe4f926ec61f6afbf768ef6877448f59e8084cf699c84078ed8c021526a2fe
              • Opcode Fuzzy Hash: 8c8d8a6ddb9321c10c85db20912533d3d5159feabeddeee5cb6a6ad149b972a3
              • Instruction Fuzzy Hash: FAF0A777A1090481FE2AE726D4A47E81690E769B85F640511D72A475F1FF36CB86C300