Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
3lOLt0TUE4.exe

Overview

General Information

Sample name:3lOLt0TUE4.exe
renamed because original name is a hash value
Original sample name:6970f935606328c81997e47b826ae655fa98f6503edf7c98fe84bbfd6bd26177.exe
Analysis ID:1542046
MD5:731497243f4c710c562dd084dcd34ec1
SHA1:4171c0e0095b0baf7b9ceede925ba55cedb22087
SHA256:6970f935606328c81997e47b826ae655fa98f6503edf7c98fe84bbfd6bd26177
Infos:

Detection

Score:68
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Contains functionality to behave differently if execute on a Russian/Kazak computer
Machine Learning detection for sample
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found evasive API chain checking for process token information
PE file contains sections with non-standard names
Program does not show much activity (idle)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • 3lOLt0TUE4.exe (PID: 7548 cmdline: "C:\Users\user\Desktop\3lOLt0TUE4.exe" MD5: 731497243F4C710C562DD084DCD34EC1)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: 3lOLt0TUE4.exeAvira: detected
Source: 3lOLt0TUE4.exeReversingLabs: Detection: 65%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.7% probability
Source: 3lOLt0TUE4.exeJoe Sandbox ML: detected
Source: Binary string: elevation_service.exe.pdb source: 3lOLt0TUE4.exe
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeCode function: 0_2_000000014004569C FindFirstFileExW,0_2_000000014004569C
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeCode function: 0_2_0000000140015450 RtlInitUnicodeString,NtOpenKeyEx,0_2_0000000140015450
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeCode function: 0_2_0000000140015620 RtlInitUnicodeString,NtQueryValueKey,0_2_0000000140015620
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeCode function: 0_2_0000000140015940 NtClose,0_2_0000000140015940
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeCode function: 0_2_0000000140014CF0 GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,RtlInitUnicodeString,NtCreateKey,NtOpenKeyEx,NtDeleteKey,NtClose,NtQueryKey,NtEnumerateKey,NtQueryValueKey,GetProcAddress,GetProcAddress,RtlFormatCurrentUserKeyPath,GetCommandLineW,GetEnvironmentVariableW,GetEnvironmentVariableW,GetModuleHandleW,GetProcAddress,GetCurrentProcess,0_2_0000000140014CF0
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeCode function: 0_2_000000014000FFB00_2_000000014000FFB0
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeCode function: 0_2_00000001400240100_2_0000000140024010
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeCode function: 0_2_00000001400330750_2_0000000140033075
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeCode function: 0_2_00000001400240A00_2_00000001400240A0
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeCode function: 0_2_00000001400380AC0_2_00000001400380AC
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeCode function: 0_2_00000001400490E80_2_00000001400490E8
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeCode function: 0_2_000000014001E1200_2_000000014001E120
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeCode function: 0_2_000000014003312A0_2_000000014003312A
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeCode function: 0_2_00000001400341740_2_0000000140034174
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeCode function: 0_2_00000001400061C00_2_00000001400061C0
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeCode function: 0_2_00000001400261D00_2_00000001400261D0
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeCode function: 0_2_00000001400422880_2_0000000140042288
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeCode function: 0_2_00000001400442E00_2_00000001400442E0
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeCode function: 0_2_000000014003B3100_2_000000014003B310
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeCode function: 0_2_00000001400313280_2_0000000140031328
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeCode function: 0_2_000000014003F37C0_2_000000014003F37C
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeCode function: 0_2_00000001400454640_2_0000000140045464
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeCode function: 0_2_00000001400074F00_2_00000001400074F0
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeCode function: 0_2_00000001400195200_2_0000000140019520
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeCode function: 0_2_000000014000A6800_2_000000014000A680
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeCode function: 0_2_000000014003A6B40_2_000000014003A6B4
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeCode function: 0_2_000000014003A7260_2_000000014003A726
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeCode function: 0_2_00000001400447400_2_0000000140044740
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeCode function: 0_2_00000001400027D00_2_00000001400027D0
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeCode function: 0_2_00000001400268500_2_0000000140026850
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeCode function: 0_2_00000001400268D00_2_00000001400268D0
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeCode function: 0_2_00000001400119100_2_0000000140011910
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeCode function: 0_2_0000000140047A140_2_0000000140047A14
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeCode function: 0_2_0000000140042A600_2_0000000140042A60
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeCode function: 0_2_0000000140032B750_2_0000000140032B75
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeCode function: 0_2_0000000140032BC00_2_0000000140032BC0
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeCode function: 0_2_000000014000BBD00_2_000000014000BBD0
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeCode function: 0_2_000000014002BCBC0_2_000000014002BCBC
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeCode function: 0_2_0000000140026CC00_2_0000000140026CC0
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeCode function: 0_2_000000014002FDC00_2_000000014002FDC0
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeCode function: 0_2_0000000140017E600_2_0000000140017E60
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeCode function: 0_2_0000000140072E6B0_2_0000000140072E6B
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeCode function: 0_2_000000014002BEC00_2_000000014002BEC0
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeCode function: 0_2_004292A00_2_004292A0
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeCode function: 0_2_004293B00_2_004293B0
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeCode function: 0_2_0042A8100_2_0042A810
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeCode function: 0_2_004079F00_2_004079F0
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeCode function: 0_2_00407C000_2_00407C00
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeCode function: 0_2_00432D400_2_00432D40
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeCode function: 0_2_0042EEB00_2_0042EEB0
Source: 3lOLt0TUE4.exe, 00000000.00000000.1816671674.0000000140070000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameelevation_service.exe< vs 3lOLt0TUE4.exe
Source: 3lOLt0TUE4.exeBinary or memory string: OriginalFilenameelevation_service.exe< vs 3lOLt0TUE4.exe
Source: 3lOLt0TUE4.exeStatic PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
Source: 3lOLt0TUE4.exeStatic PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
Source: classification engineClassification label: mal68.expl.winEXE@1/0@0/0
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeCode function: 0_2_000000014000DEC0 FormatMessageA,GetLastError,_invalid_parameter_noinfo_noreturn,0_2_000000014000DEC0
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeCode function: 0_2_00000001400024F0 StartServiceCtrlDispatcherW,GetLastError,GetLastError,0_2_00000001400024F0
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeCode function: 0_2_00000001400024F0 StartServiceCtrlDispatcherW,GetLastError,GetLastError,0_2_00000001400024F0
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeMutant created: \Sessions\1\BaseNamedObjects\Global\Multiarch.m0yv-dff86b9b42af94777d8e3ee9-b
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeMutant created: \Sessions\1\BaseNamedObjects\Global\Multiarch.m0yv-dff86b9b42af9477-inf
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: 3lOLt0TUE4.exeReversingLabs: Detection: 65%
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeSection loaded: kernel.appcore.dllJump to behavior
Source: 3lOLt0TUE4.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: 3lOLt0TUE4.exeStatic file information: File size 1869824 > 1048576
Source: 3lOLt0TUE4.exeStatic PE information: Raw size of .reloc is bigger than: 0x100000 < 0x15f000
Source: 3lOLt0TUE4.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: elevation_service.exe.pdb source: 3lOLt0TUE4.exe
Source: 3lOLt0TUE4.exeStatic PE information: section name: .00cfg
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeCode function: 0_2_000000014007231C push rdx; ret 0_2_0000000140072328
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeCode function: 0_2_00000001400024F0 StartServiceCtrlDispatcherW,GetLastError,GetLastError,0_2_00000001400024F0
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeCode function: 0_2_0000000140014CF0 GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,RtlInitUnicodeString,NtCreateKey,NtOpenKeyEx,NtDeleteKey,NtClose,NtQueryKey,NtEnumerateKey,NtQueryValueKey,GetProcAddress,GetProcAddress,RtlFormatCurrentUserKeyPath,GetCommandLineW,GetEnvironmentVariableW,GetEnvironmentVariableW,GetModuleHandleW,GetProcAddress,GetCurrentProcess,0_2_0000000140014CF0

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeCode function: 0_2_004052A0 GetSystemDefaultLangID, lea ecx, dword ptr [eax-00000419h] lea ecx, dword ptr [eax-00000419h] lea ecx, dword ptr [eax-00000419h] 0_2_004052A0
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_0-30760
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeCode function: 0_2_000000014004569C FindFirstFileExW,0_2_000000014004569C
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeCode function: 0_2_000000014002DFDC VirtualQuery,GetSystemInfo,0_2_000000014002DFDC
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeCode function: 0_2_000000014002B4C0 GetLastError,IsDebuggerPresent,OutputDebugStringW,0_2_000000014002B4C0
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeCode function: 0_2_000000014002B4C0 GetLastError,IsDebuggerPresent,OutputDebugStringW,0_2_000000014002B4C0
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeCode function: 0_2_00000001400036C0 _Init_thread_header,GetProcessHeap,_Init_thread_header,0_2_00000001400036C0
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeCode function: 0_2_000000014002B874 SetUnhandledExceptionFilter,0_2_000000014002B874
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeCode function: 0_2_000000014002B884 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_000000014002B884
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeCode function: 0_2_000000014002BC88 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_000000014002BC88
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeCode function: 0_2_0000000140034D64 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0000000140034D64
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeCode function: 0_2_0000000140002F30 GetSecurityDescriptorDacl,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,GetAclInformation,_invalid_parameter_noinfo,0_2_0000000140002F30
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeCode function: 0_2_0000000140046450 cpuid 0_2_0000000140046450
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeCode function: EnumSystemLocalesW,0_2_0000000140045028
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeCode function: GetLocaleInfoW,0_2_00000001400450C0
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeCode function: GetLocaleInfoW,0_2_00000001400451D0
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeCode function: EnumSystemLocalesW,0_2_000000014003F220
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_00000001400452B8
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeCode function: GetLocaleInfoW,0_2_0000000140045368
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeCode function: EnumSystemLocalesW,GetUserDefaultLCID,ProcessCodePage,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_0000000140044A08
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeCode function: try_get_function,GetLocaleInfoW,0_2_000000014003EAF8
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeCode function: EnumSystemLocalesW,0_2_0000000140044D08
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_0000000140044DE0
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeCode function: 0_2_000000014002E504 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_000000014002E504
Source: C:\Users\user\Desktop\3lOLt0TUE4.exeCode function: 0_2_00420080 VirtualFree,VirtualFree,VirtualAlloc,GetUserNameW,GetComputerNameW,GetComputerNameW,0_2_00420080
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Service Execution
3
Windows Service
3
Windows Service
1
Obfuscated Files or Information
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts1
Native API
1
DLL Side-Loading
1
DLL Side-Loading
1
DLL Side-Loading
LSASS Memory13
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account Manager1
Account Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS1
System Owner/User Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
File and Directory Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials33
System Information Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
3lOLt0TUE4.exe66%ReversingLabsWin64.Virus.Expiro
3lOLt0TUE4.exe100%AviraW32/Infector.Gen
3lOLt0TUE4.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1542046
Start date and time:2024-10-25 14:00:03 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 2m 25s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:1
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:3lOLt0TUE4.exe
renamed because original name is a hash value
Original Sample Name:6970f935606328c81997e47b826ae655fa98f6503edf7c98fe84bbfd6bd26177.exe
Detection:MAL
Classification:mal68.expl.winEXE@1/0@0/0
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 61%
  • Number of executed functions: 30
  • Number of non-executed functions: 114
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Stop behavior analysis, all processes terminated
  • VT rate limit hit for: 3lOLt0TUE4.exe
No simulations
No context
No context
No context
No context
No context
No created / dropped files found
File type:PE32+ executable (GUI) x86-64, for MS Windows
Entropy (8bit):4.829304172850523
TrID:
  • Win64 Executable GUI (202006/5) 92.65%
  • Win64 Executable (generic) (12005/4) 5.51%
  • Generic Win/DOS Executable (2004/3) 0.92%
  • DOS Executable Generic (2002/1) 0.92%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:3lOLt0TUE4.exe
File size:1'869'824 bytes
MD5:731497243f4c710c562dd084dcd34ec1
SHA1:4171c0e0095b0baf7b9ceede925ba55cedb22087
SHA256:6970f935606328c81997e47b826ae655fa98f6503edf7c98fe84bbfd6bd26177
SHA512:992f762c770ef81f23bd7f21792585cc9dc0f99b8396ac86e5d1c1c7a9cc35887bdd5320914413117db1470a9f96102a86225f94717cabb0119e26de69078bfd
SSDEEP:24576:4YRq7Y2cb+cREW2JOt934J7Z6bQaj1BvUm9J:5sLcnROJE3jM2ce
TLSH:C285E00BE25914FDD067C1788A569801FAB17C550B61AAEF2364D7362F37AE44F3EB20
File Content Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d...PD.\.........."............................@..............................*.....76.... ........................................
Icon Hash:90cececece8e8eb0
Entrypoint:0x14002de90
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x140000000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
DLL Characteristics:HIGH_ENTROPY_VA, NX_COMPAT, TERMINAL_SERVER_AWARE
Time Stamp:0x5C0F4450 [Tue Dec 11 05:00:00 2018 UTC]
TLS Callbacks:0x40026830, 0x1
CLR (.Net) Version:
OS Version Major:5
OS Version Minor:2
File Version Major:5
File Version Minor:2
Subsystem Version Major:5
Subsystem Version Minor:2
Import Hash:6a8bffcb635443fadba2b7b98db52eda
Instruction
dec eax
sub esp, 28h
call 00007F8CF52EE3B0h
dec eax
add esp, 28h
jmp 00007F8CF52EDBBFh
int3
int3
dec eax
mov dword ptr [esp+08h], ebx
push edi
dec eax
sub esp, 20h
dec eax
mov eax, dword ptr [0003B06Bh]
mov edi, 00000001h
dec eax
cmp eax, edi
je 00007F8CF52EDDB5h
dec eax
test eax, eax
jne 00007F8CF52EDDABh
dec eax
lea ecx, dword ptr [000268F5h]
call dword ptr [00033A47h]
dec eax
mov ebx, eax
dec eax
test eax, eax
jne 00007F8CF52EDD47h
dec eax
mov ebx, edi
jmp 00007F8CF52EDD7Ah
dec eax
lea edx, dword ptr [000236FBh]
dec eax
mov ecx, ebx
call dword ptr [00033A42h]
dec eax
test eax, eax
je 00007F8CF52EDD28h
dec eax
lea edx, dword ptr [0002371Eh]
dec eax
mov dword ptr [0003B027h], eax
dec eax
mov ecx, ebx
call dword ptr [00033A26h]
dec eax
test eax, eax
je 00007F8CF52EDD0Ch
dec eax
mov dword ptr [0003B01Ah], eax
xor eax, eax
dec eax
cmpxchg dword ptr [0003AFFFh], ebx
jne 00007F8CF52EDD47h
dec eax
cmp ebx, edi
je 00007F8CF52EDD4Ch
dec eax
cmp eax, edi
je 00007F8CF52EDD47h
inc eax
mov al, bh
jmp 00007F8CF52EDD44h
xor al, al
dec eax
mov ebx, dword ptr [esp+30h]
dec eax
add esp, 20h
pop edi
ret
int3
dec eax
mov dword ptr [esp+08h], ebx
dec eax
mov dword ptr [esp+10h], esi
dec eax
mov dword ptr [esp+18h], edi
dec esp
arpl word ptr [FFFD20E6h], ax
dec eax
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x612080x5e.rdata
IMAGE_DIRECTORY_ENTRY_IMPORT0x612660x78.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x700000x948.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x6a0000x3780.pdata
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
IMAGE_DIRECTORY_ENTRY_DEBUG0x602440x1c.rdata
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x5f9e80x28.rdata
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x547e00x100.rdata
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x617400x460.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x4aca60x4ae003c60d8867697b500b2455b7fac8253fdFalse0.5312369574290484data6.477200698968966IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0x4c0000x18d080x18e00916637c466ffd5fc9c94d7370fc4eea7False0.44274104899497485data5.192284743118082IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x650000x4d200x10004e2f13f9aa20faa9f27368fbcb78a056False0.193359375data2.703701150071771IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.pdata0x6a0000x37800x380077348ef4c6ddb2cf19c409be4fdd3ee0False0.4867466517857143data5.559956334775326IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.00cfg0x6e0000x100x200d4993f37d538f2865a4cb11c88676c32False0.046875data0.19586940608732903IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.tls0x6f0000x90x2001f354d76203061bfdd5a53dae48d5435False0.033203125data0.020393135236084953IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rsrc0x700000x9480xa0036a620379a9e69328d3b53af9a8fecc9False0.425data4.53306183589971IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x710000x22f0000x15f000a3e234ef91c4ef1b3d9082c600e128f0unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_VERSION0x704d00x478dataEnglishUnited States0.4388111888111888
RT_MANIFEST0x700a00x42cXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (1008), with CRLF line terminatorsEnglishUnited States0.5037453183520599
DLLImport
ADVAPI32.dllAddAce, CopySid, GetAclInformation, GetLengthSid, GetSecurityDescriptorControl, GetSecurityDescriptorDacl, GetSecurityDescriptorGroup, GetSecurityDescriptorOwner, GetSecurityDescriptorSacl, GetSidLengthRequired, GetSidSubAuthority, InitializeAcl, InitializeSecurityDescriptor, InitializeSid, IsValidSid, MakeAbsoluteSD, RegisterServiceCtrlHandlerW, SetSecurityDescriptorDacl, SetSecurityDescriptorGroup, SetSecurityDescriptorOwner, SetServiceStatus, StartServiceCtrlDispatcherW
KERNEL32.dllAcquireSRWLockExclusive, CloseHandle, CreateEventW, CreateFileW, DecodePointer, DeleteCriticalSection, DeleteFileW, EncodePointer, EnterCriticalSection, EnumSystemLocalesW, ExitProcess, FindClose, FindFirstFileExW, FindNextFileW, FlushFileBuffers, FormatMessageA, FreeEnvironmentStringsW, FreeLibrary, GetACP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetConsoleCP, GetConsoleMode, GetCurrentDirectoryW, GetCurrentProcess, GetCurrentProcessId, GetCurrentThreadId, GetEnvironmentStringsW, GetEnvironmentVariableW, GetFileType, GetLastError, GetLocalTime, GetLocaleInfoW, GetModuleFileNameW, GetModuleHandleExW, GetModuleHandleW, GetNativeSystemInfo, GetOEMCP, GetProcAddress, GetProcessHeap, GetStartupInfoW, GetStdHandle, GetStringTypeW, GetSystemInfo, GetSystemTimeAsFileTime, GetTickCount, GetUserDefaultLCID, HeapAlloc, HeapCreate, HeapDestroy, HeapFree, HeapReAlloc, HeapSetInformation, HeapSize, InitializeCriticalSectionAndSpinCount, InitializeSListHead, IsDebuggerPresent, IsProcessorFeaturePresent, IsValidCodePage, IsValidLocale, LCMapStringW, LeaveCriticalSection, LoadLibraryExA, LoadLibraryExW, LocalFree, MultiByteToWideChar, OutputDebugStringA, OutputDebugStringW, QueryPerformanceCounter, QueryPerformanceFrequency, RaiseException, ReadConsoleW, ReadFile, ReleaseSRWLockExclusive, ResetEvent, RtlCaptureContext, RtlCaptureStackBackTrace, RtlLookupFunctionEntry, RtlPcToFileHeader, RtlUnwindEx, RtlVirtualUnwind, SetEvent, SetFilePointerEx, SetLastError, SetStdHandle, SetUnhandledExceptionFilter, Sleep, SwitchToThread, TerminateProcess, TlsAlloc, TlsFree, TlsGetValue, TlsSetValue, TryAcquireSRWLockExclusive, UnhandledExceptionFilter, VirtualProtect, VirtualQuery, WaitForSingleObject, WaitForSingleObjectEx, WideCharToMultiByte, WriteConsoleW, WriteFile
ole32.dllCoAddRefServerProcess, CoInitializeEx, CoInitializeSecurity, CoRegisterClassObject, CoReleaseServerProcess, CoResumeClassObjects, CoRevokeClassObject, CoUninitialize
SHELL32.dllCommandLineToArgvW
WINMM.dlltimeGetTime
NameOrdinalAddress
GetHandleVerifier10x14001d8b0
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
No network behavior found

Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Target ID:0
Start time:08:01:09
Start date:25/10/2024
Path:C:\Users\user\Desktop\3lOLt0TUE4.exe
Wow64 process (32bit):false
Commandline:"C:\Users\user\Desktop\3lOLt0TUE4.exe"
Imagebase:0x140000000
File size:1'869'824 bytes
MD5 hash:731497243F4C710C562DD084DCD34EC1
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Reset < >

    Execution Graph

    Execution Coverage:3.8%
    Dynamic/Decrypted Code Coverage:6.9%
    Signature Coverage:16.7%
    Total number of Nodes:681
    Total number of Limit Nodes:11
    execution_graph 30736 405b00 30737 405bba 30736->30737 30744 4152c0 30737->30744 30739 405bc7 30743 405bde 30739->30743 30749 420080 30739->30749 30745 4152c6 30744->30745 30748 4152ce 30744->30748 30745->30748 30763 40e050 30745->30763 30748->30739 30755 420089 30749->30755 30750 4203e0 GetComputerNameW 30750->30755 30751 420181 VirtualFree 30751->30755 30752 40e050 VirtualAlloc 30752->30755 30753 4203bf GetUserNameW 30753->30755 30754 4204d6 GetComputerNameW 30754->30755 30755->30750 30755->30751 30755->30752 30755->30753 30755->30754 30756 405c7b 30755->30756 30757 408070 30756->30757 30761 408075 30757->30761 30758 408186 CloseHandle 30758->30761 30759 4080ca GetTokenInformation 30759->30761 30760 4081ad GetTokenInformation 30760->30761 30761->30758 30761->30759 30761->30760 30762 4080a7 30761->30762 30762->30743 30764 40e0c3 30763->30764 30765 40e0d8 VirtualAlloc 30764->30765 30765->30764 30766 14002a4d4 30767 14002a4f6 __scrt_initialize_crt 30766->30767 30774 14002f13c 30767->30774 30771 14002a4ff 30775 14002f145 __vcrt_initialize_winapi_thunks __vcrt_initialize 30774->30775 30787 14003d8cc 30775->30787 30778 14002a4fb 30778->30771 30782 1400305ec 30778->30782 30780 14002f15c 30780->30778 30794 14003d914 DeleteCriticalSection 30780->30794 30783 140040904 30782->30783 30784 14002a508 30783->30784 30811 14000fb90 HeapCreate 30783->30811 30784->30771 30786 14002f170 8 API calls 3 library calls 30784->30786 30786->30771 30788 14003d8d4 30787->30788 30790 14003d905 30788->30790 30792 14002f14f 30788->30792 30795 14003da78 30788->30795 30800 14003d914 DeleteCriticalSection 30790->30800 30792->30778 30793 14003c26c 8 API calls 3 library calls 30792->30793 30793->30780 30794->30778 30801 14003db4c 30795->30801 30798 14003dac3 InitializeCriticalSectionAndSpinCount 30799 14003dab8 30798->30799 30799->30788 30800->30792 30802 14003daae 30801->30802 30809 14003dba8 try_get_function 30801->30809 30802->30798 30802->30799 30803 14003dc90 30803->30802 30805 14003dc9e GetProcAddress 30803->30805 30804 14003dbdc LoadLibraryExW 30806 14003dbfd GetLastError 30804->30806 30804->30809 30807 14003dcaf 30805->30807 30806->30809 30807->30802 30808 14003dc75 FreeLibrary 30808->30809 30809->30802 30809->30803 30809->30804 30809->30808 30810 14003dc37 LoadLibraryExW 30809->30810 30810->30809 30811->30783 30812 4081b1 30816 408075 30812->30816 30813 408186 CloseHandle 30813->30816 30814 4080ca GetTokenInformation 30814->30816 30815 4081ad GetTokenInformation 30815->30816 30816->30813 30816->30814 30816->30815 30817 4080a7 30816->30817 30818 405b42 30819 405b07 30818->30819 30819->30818 30820 405cdf CreateThread 30819->30820 30823 405b68 30819->30823 30821 405c01 30820->30821 30824 4054a0 30820->30824 30822 405c03 CloseHandle 30821->30822 30821->30823 30822->30823 30825 4054b5 30824->30825 30826 405522 VirtualAlloc 30825->30826 30826->30825 30827 405b87 CreateThread 30828 405b1c 30827->30828 30834 405810 30827->30834 30829 405cdf CreateThread 30828->30829 30832 405c20 30828->30832 30830 405c01 30829->30830 30833 4054a0 VirtualAlloc 30829->30833 30831 405c03 CloseHandle 30830->30831 30830->30832 30831->30832 30835 405822 30834->30835 30836 14002dd1c 30837 14002dd30 30836->30837 30838 14002de68 30837->30838 30839 14002dd38 __scrt_acquire_startup_lock 30837->30839 30881 14002b884 7 API calls 2 library calls 30838->30881 30841 14002de72 30839->30841 30850 14002dd56 _purecall __scrt_is_nonwritable_in_current_image __scrt_release_startup_lock 30839->30850 30882 14002b884 7 API calls 2 library calls 30841->30882 30843 14002de7d 30869 140032354 30843->30869 30846 14002dd7b 30848 14002de8c 30849 14002de01 30863 14002b7e0 30849->30863 30850->30846 30850->30849 30880 14003238c 41 API calls IsInExceptionSpec 30850->30880 30852 14002de06 30866 140001000 30852->30866 30884 14002f7d0 30863->30884 30886 140008c80 30866->30886 30868 140001024 30870 14003248c 30869->30870 30871 1400324f3 30870->30871 30872 1400324a9 GetModuleHandleW 30870->30872 31012 140032620 30871->31012 30872->30871 30877 1400324b6 30872->30877 30875 14002de84 30883 140032360 21 API calls _purecall 30875->30883 30877->30871 31026 1400323d8 GetModuleHandleExW 30877->31026 30878 140032547 30880->30849 30881->30841 30882->30843 30883->30848 30885 14002b7f7 GetStartupInfoW 30884->30885 30885->30852 30887 140008cad 30886->30887 30901 140008ca6 30886->30901 30905 140029f90 30887->30905 30892 140029f90 std::_Facet_Register 4 API calls 30893 140008cc4 30892->30893 30894 140029f90 std::_Facet_Register 4 API calls 30893->30894 30895 140008cfe GetCommandLineW 30894->30895 30896 140008d40 30895->30896 30898 140008d59 _Yarn 30896->30898 30930 14000ae40 33 API calls 3 library calls 30896->30930 30917 140008e00 30898->30917 30931 14002a340 30901->30931 30902 140008dea 30940 140034cb0 31 API calls _invalid_parameter_noinfo_noreturn 30902->30940 30908 140029f9b 30905->30908 30907 140008cb7 30907->30892 30908->30907 30910 140029fba 30908->30910 30941 140032658 30908->30941 30944 14000fa50 30908->30944 30911 140029fc5 30910->30911 30948 14002af20 RtlPcToFileHeader RaiseException std::bad_alloc::bad_alloc _CxxThrowException 30910->30948 30949 14002b7b8 RtlPcToFileHeader RaiseException std::bad_alloc::bad_alloc _CxxThrowException 30911->30949 30957 140011660 30917->30957 30920 140008e92 30925 140008eeb 30920->30925 30926 140008ec7 30920->30926 30921 140008e69 CommandLineToArgvW 30963 140008970 30921->30963 30923 14002a340 _UnwindNestedFrames 8 API calls 30927 140008d87 30923->30927 30977 140034cb0 31 API calls _invalid_parameter_noinfo_noreturn 30925->30977 30926->30923 30927->30901 30927->30902 30930->30898 30932 14002a34a 30931->30932 30933 14002bad0 IsProcessorFeaturePresent 30932->30933 30934 140008ddb 30932->30934 30935 14002bae7 30933->30935 30934->30868 31010 14002bc14 RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 30935->31010 30937 14002bafa 31011 14002bc88 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 30937->31011 30950 140032690 30941->30950 30945 14000fa70 30944->30945 30946 14000fa9a 30945->30946 30956 140014b40 EnterCriticalSection LeaveCriticalSection _Getctype 30945->30956 30946->30908 30955 140035098 EnterCriticalSection 30950->30955 30952 14003269d 30953 1400350b4 Concurrency::details::SchedulerProxy::DeleteThis LeaveCriticalSection 30952->30953 30954 140032666 30953->30954 30954->30908 30956->30945 30958 140011690 30957->30958 30958->30958 30978 140011360 30958->30978 30961 14002a340 _UnwindNestedFrames 8 API calls 30962 140008e4c 30961->30962 30962->30920 30962->30921 30964 140008add 30963->30964 30973 1400089b9 _Yarn 30963->30973 30996 140008b30 33 API calls 2 library calls 30964->30996 30966 140008aed 30997 140004ad0 30966->30997 30970 14002a340 _UnwindNestedFrames 8 API calls 30971 140008b02 LocalFree 30970->30971 30971->30920 30973->30964 30974 140008b20 30973->30974 30994 14000ae40 33 API calls 3 library calls 30973->30994 30995 14000a680 33 API calls std::_Facet_Register 30973->30995 31003 140034cb0 31 API calls _invalid_parameter_noinfo_noreturn 30974->31003 30979 140011393 30978->30979 30981 140011593 30979->30981 30984 140011420 30979->30984 30990 140011454 30979->30990 30980 14002a340 _UnwindNestedFrames 8 API calls 30982 140011582 30980->30982 30992 1400073d0 33 API calls 30981->30992 30982->30961 30989 140011452 _Yarn 30984->30989 30991 14000ae40 33 API calls 3 library calls 30984->30991 30985 140011598 30993 140034cb0 31 API calls _invalid_parameter_noinfo_noreturn 30985->30993 30989->30985 30989->30990 30990->30980 30991->30989 30994->30973 30995->30973 30996->30966 30998 140004b15 30997->30998 30999 140004adf 30997->30999 30998->30970 31000 140004afc 30999->31000 31004 140003a60 30999->31004 31008 140004b30 31 API calls _invalid_parameter_noinfo_noreturn 31000->31008 31005 140003a72 31004->31005 31006 140003a80 31004->31006 31009 140003aa0 31 API calls 2 library calls 31005->31009 31006->30999 31009->31006 31010->30937 31032 140035098 EnterCriticalSection 31012->31032 31014 14003263c 31015 140032548 _purecall 14 API calls 31014->31015 31016 140032645 31015->31016 31017 1400350b4 Concurrency::details::SchedulerProxy::DeleteThis LeaveCriticalSection 31016->31017 31018 14003252f 31017->31018 31018->30875 31019 140032434 31018->31019 31033 140042880 31019->31033 31022 14003246e 31024 1400323d8 _purecall 3 API calls 31022->31024 31023 14003245d GetCurrentProcess TerminateProcess 31023->31022 31025 140032475 ExitProcess 31024->31025 31027 1400323fe GetProcAddress 31026->31027 31028 14003241d 31026->31028 31027->31028 31029 140032415 31027->31029 31030 140032427 FreeLibrary 31028->31030 31031 14003242d 31028->31031 31029->31028 31030->31031 31031->30871 31034 14004289e 31033->31034 31035 140032441 31033->31035 31037 14003ee38 5 API calls try_get_function 31034->31037 31035->31022 31035->31023 31037->31035 31038 14000103f 31039 140001049 31038->31039 31065 140010ba0 31039->31065 31043 140001053 31044 14000f770 EnterCriticalSection LeaveCriticalSection 31043->31044 31045 140001058 shared_ptr 31044->31045 31046 14000f980 CoInitializeEx 31045->31046 31047 140001079 31046->31047 31048 140001085 31047->31048 31051 1400010b2 31047->31051 31049 140001e10 58 API calls 31048->31049 31050 14000108a 31049->31050 31054 140001ee0 87 API calls 31050->31054 31052 14000109d 31051->31052 31056 14000e280 54 API calls 31051->31056 31053 14000f9b0 CoUninitialize 31052->31053 31055 140001117 31053->31055 31054->31052 31057 1400080f0 14 API calls 31055->31057 31058 1400010f1 31056->31058 31059 140001121 31057->31059 31060 140001140 35 API calls 31058->31060 31061 14002a340 _UnwindNestedFrames 8 API calls 31059->31061 31062 140001105 31060->31062 31063 140001131 31061->31063 31064 14000e3c0 89 API calls 31062->31064 31064->31052 31081 140010750 31065->31081 31067 140010be3 GetModuleFileNameW 31069 140010c02 31067->31069 31070 140010c14 31067->31070 31113 14000fe60 33 API calls 31069->31113 31072 140003a60 31 API calls 31070->31072 31073 140010c63 31072->31073 31092 140010ca0 31073->31092 31075 140010c78 31076 140003a60 31 API calls 31075->31076 31077 140010c88 31076->31077 31078 14002a340 _UnwindNestedFrames 8 API calls 31077->31078 31079 14000104e 31078->31079 31080 14000f750 HeapSetInformation 31079->31080 31082 140010759 31081->31082 31084 140010761 31081->31084 31083 140010840 31082->31083 31087 1400107af 31082->31087 31116 140001850 33 API calls 31083->31116 31084->31067 31084->31084 31114 140010480 RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection std::_Facet_Register 31087->31114 31089 1400107f2 31090 14001082d 31089->31090 31115 140003aa0 31 API calls 2 library calls 31089->31115 31090->31067 31093 140029f90 std::_Facet_Register 4 API calls 31092->31093 31094 140010cd5 31093->31094 31117 140010f40 31094->31117 31097 140010cf3 31098 140010d2f 31097->31098 31123 140035700 31097->31123 31099 140003a60 31 API calls 31098->31099 31100 140010d41 31099->31100 31101 140010d53 31100->31101 31179 140010e90 43 API calls _UnwindNestedFrames 31100->31179 31140 14000ffb0 31101->31140 31104 140010db2 31105 140003a60 31 API calls 31104->31105 31106 140010dc5 31105->31106 31107 140003a60 31 API calls 31106->31107 31108 140010de3 31107->31108 31109 140003a60 31 API calls 31108->31109 31110 140010deb 31109->31110 31111 14002a340 _UnwindNestedFrames 8 API calls 31110->31111 31112 140010dfb 31111->31112 31112->31075 31113->31070 31114->31089 31115->31090 31119 140010f66 31117->31119 31122 140011025 31117->31122 31121 140010fb5 31119->31121 31180 1400358a0 42 API calls 3 library calls 31119->31180 31121->31122 31181 1400358a0 42 API calls 3 library calls 31121->31181 31122->31097 31124 14003578b 31123->31124 31125 140035710 31123->31125 31186 14002fcd4 41 API calls 3 library calls 31124->31186 31127 140035734 31125->31127 31182 140034620 31125->31182 31127->31097 31130 1400357be 31132 1400357ca 31130->31132 31137 1400357e4 31130->31137 31133 140034620 _set_errno_from_matherr 14 API calls 31132->31133 31135 1400357cf 31133->31135 31134 140035725 31134->31097 31187 140034c90 31 API calls _invalid_parameter_noinfo_noreturn 31135->31187 31138 1400357da 31137->31138 31139 140045f3c 42 API calls TranslateName 31137->31139 31138->31097 31139->31137 31141 14000fff5 31140->31141 31142 14000ffe9 31140->31142 31237 140014c10 33 API calls 31141->31237 31236 140014cd0 33 API calls 31142->31236 31145 14000fff3 31222 140015940 31145->31222 31147 1400100d7 31151 140010127 31147->31151 31238 14000b530 33 API calls 2 library calls 31147->31238 31149 14001006a 31149->31147 31232 14000fd80 31149->31232 31150 1400100b2 31153 140015940 69 API calls 31150->31153 31154 140003a60 31 API calls 31151->31154 31153->31147 31156 1400103df 31154->31156 31155 140010113 31164 1400101b7 31155->31164 31239 14003b7c0 46 API calls 31155->31239 31240 14000fe10 33 API calls 31155->31240 31157 140003a60 31 API calls 31156->31157 31158 1400103e9 31157->31158 31159 14002a340 _UnwindNestedFrames 8 API calls 31158->31159 31160 1400103f9 31159->31160 31160->31104 31162 140003a60 31 API calls 31162->31151 31165 14001024f 31164->31165 31167 14001025e 31164->31167 31174 1400101df 31164->31174 31166 140003a60 31 API calls 31165->31166 31166->31174 31168 140003a60 31 API calls 31167->31168 31169 1400102a2 31168->31169 31170 140003a60 31 API calls 31169->31170 31171 1400102af 31170->31171 31172 140010330 31171->31172 31171->31174 31175 14001033f 31171->31175 31173 140003a60 31 API calls 31172->31173 31173->31174 31174->31162 31176 140003a60 31 API calls 31175->31176 31177 140010383 31176->31177 31178 140003a60 31 API calls 31177->31178 31178->31174 31179->31101 31180->31119 31181->31122 31188 14003e0a0 GetLastError 31182->31188 31184 140034629 31185 140034c90 31 API calls _invalid_parameter_noinfo_noreturn 31184->31185 31185->31134 31186->31130 31187->31138 31189 14003e0c2 31188->31189 31190 14003e0bd 31188->31190 31195 14003e0ca 31189->31195 31214 14003eaa4 6 API calls try_get_function 31189->31214 31213 14003ea5c 6 API calls try_get_function 31190->31213 31193 14003e0e3 31194 14003e0e7 31193->31194 31193->31195 31215 14003f304 14 API calls 2 library calls 31194->31215 31196 14003e141 SetLastError 31195->31196 31196->31184 31198 14003e0f6 31199 14003e114 31198->31199 31200 14003e104 31198->31200 31218 14003eaa4 6 API calls try_get_function 31199->31218 31216 14003eaa4 6 API calls try_get_function 31200->31216 31203 14003e11c 31205 14003e132 31203->31205 31206 14003e120 31203->31206 31204 14003e10b 31217 14003dd34 14 API calls 2 library calls 31204->31217 31220 14003e1e8 14 API calls _set_errno_from_matherr 31205->31220 31219 14003eaa4 6 API calls try_get_function 31206->31219 31210 14003e13a 31221 14003dd34 14 API calls 2 library calls 31210->31221 31211 14003e112 31211->31195 31214->31193 31215->31198 31216->31204 31217->31211 31218->31203 31219->31204 31220->31210 31221->31196 31241 140015450 31222->31241 31225 1400159b3 31228 14002a340 _UnwindNestedFrames 8 API calls 31225->31228 31230 1400159c2 31228->31230 31229 1400159a8 NtClose 31229->31225 31230->31149 31233 14000fda0 31232->31233 31235 14000fdb0 _Yarn 31232->31235 31361 14000b730 33 API calls 3 library calls 31233->31361 31235->31150 31236->31145 31237->31145 31238->31155 31239->31155 31240->31155 31242 140015483 __crtLCMapStringW 31241->31242 31243 140014cf0 27 API calls 31242->31243 31250 1400154aa 31242->31250 31260 1400155f3 31242->31260 31243->31250 31244 14001553e 31309 140015320 31244->31309 31246 14002a340 _UnwindNestedFrames 8 API calls 31248 140015607 31246->31248 31247 14001554d 31315 140015bb0 31247->31315 31248->31225 31261 1400157b0 31248->31261 31250->31244 31250->31260 31288 140015020 31250->31288 31251 14001557b 31254 140003a60 31 API calls 31251->31254 31256 140015583 RtlInitUnicodeString NtOpenKeyEx 31254->31256 31258 1400155dc 31256->31258 31259 140003a60 31 API calls 31258->31259 31259->31260 31260->31246 31330 140015620 31261->31330 31264 140015849 31267 14002a340 _UnwindNestedFrames 8 API calls 31264->31267 31268 140015864 31267->31268 31268->31229 31270 140014cf0 10 API calls 31268->31270 31269 1400157fc 31269->31264 31344 140001870 31 API calls _invalid_parameter_noinfo_noreturn 31269->31344 31271 140014f93 31270->31271 31272 140014ddc 31270->31272 31273 14002a340 _UnwindNestedFrames 8 API calls 31271->31273 31272->31271 31275 140014e5c GetProcAddress GetProcAddress 31272->31275 31274 14001500c 31273->31274 31274->31229 31275->31271 31276 140014e82 31275->31276 31276->31271 31277 140014e8e RtlFormatCurrentUserKeyPath 31276->31277 31277->31271 31278 140014e9d __scrt_get_show_window_mode 31277->31278 31279 140014f1a GetCommandLineW GetEnvironmentVariableW 31278->31279 31280 140014f44 try_get_function 31279->31280 31281 140014f58 GetEnvironmentVariableW 31279->31281 31284 140014f54 31280->31284 31282 140014f7b 31281->31282 31285 140014f8b try_get_function 31281->31285 31282->31285 31283 140014f99 GetModuleHandleW GetProcAddress 31286 140014fdc 31283->31286 31287 140014fc9 GetCurrentProcess 31283->31287 31284->31281 31284->31285 31285->31283 31286->31271 31287->31286 31289 14001503a 31288->31289 31290 140015088 31289->31290 31322 14000fe60 33 API calls 31289->31322 31299 140015130 31290->31299 31292 140015051 31323 1400106f0 33 API calls _Yarn 31292->31323 31294 1400150b7 31324 140015a40 8 API calls 31294->31324 31296 1400150c9 31296->31290 31325 1400106f0 33 API calls _Yarn 31296->31325 31326 140015a40 8 API calls 31296->31326 31300 140015156 31299->31300 31308 140015187 31299->31308 31302 1400151a6 GetNativeSystemInfo 31300->31302 31300->31308 31301 14002a340 _UnwindNestedFrames 8 API calls 31303 140015194 31301->31303 31304 1400151c8 31302->31304 31302->31308 31303->31244 31306 1400152d0 31304->31306 31304->31308 31327 1400358a0 42 API calls 3 library calls 31304->31327 31307 140015bb0 33 API calls 31306->31307 31306->31308 31307->31308 31308->31301 31310 14001532e 31309->31310 31311 1400153f2 31310->31311 31312 14000fd80 33 API calls 31310->31312 31311->31247 31313 1400153dd 31312->31313 31314 14000fd80 33 API calls 31313->31314 31314->31311 31316 140015c88 31315->31316 31317 140015bd0 31315->31317 31329 1400073d0 33 API calls 31316->31329 31319 140015bfd _Yarn 31317->31319 31328 140015c90 33 API calls 2 library calls 31317->31328 31319->31251 31322->31292 31323->31294 31324->31296 31325->31296 31326->31296 31327->31304 31328->31319 31331 140015669 RtlInitUnicodeString 31330->31331 31332 14001565c 31330->31332 31345 140016070 31331->31345 31334 140014cf0 27 API calls 31332->31334 31335 140015661 31334->31335 31335->31331 31342 14001574e 31335->31342 31336 14001569f 31338 1400156ef NtQueryValueKey 31336->31338 31340 140015724 31336->31340 31337 14002a340 _UnwindNestedFrames 8 API calls 31339 140015795 31337->31339 31338->31336 31339->31269 31343 140015870 33 API calls _UnwindNestedFrames 31339->31343 31340->31342 31359 140001870 31 API calls _invalid_parameter_noinfo_noreturn 31340->31359 31342->31337 31343->31269 31346 140016087 31345->31346 31347 1400160cd 31345->31347 31346->31347 31360 14000abb0 33 API calls 31346->31360 31347->31336 31361->31235 31362 1400024f0 StartServiceCtrlDispatcherW 31363 140002525 GetLastError 31362->31363 31364 14000251f 31362->31364 31365 14000253c 31363->31365 31366 14002a340 _UnwindNestedFrames 8 API calls 31364->31366 31365->31364 31367 140002540 GetLastError 31365->31367 31368 140002594 31366->31368 31374 14000e280 31367->31374 31375 14000e2d7 31374->31375 31376 140029f90 std::_Facet_Register 4 API calls 31375->31376 31377 14000e312 31376->31377 31409 14002ad20 31377->31409 31381 14000e3a0 31425 14000cbe0 31381->31425 31384 140001140 31385 14000116b 31384->31385 31386 1400012f0 35 API calls 31385->31386 31389 14000119d 31386->31389 31388 14000128b 31390 14002a340 _UnwindNestedFrames 8 API calls 31388->31390 31389->31388 31576 140001450 35 API calls _UnwindNestedFrames 31389->31576 31391 1400012be 31390->31391 31392 14000e3c0 31391->31392 31393 140001140 35 API calls 31392->31393 31394 14000e3e9 31393->31394 31577 14000dec0 FormatMessageA 31394->31577 31399 14000e446 31603 14000cf50 31399->31603 31400 14000e487 31637 140034cb0 31 API calls _invalid_parameter_noinfo_noreturn 31400->31637 31405 14002a340 _UnwindNestedFrames 8 API calls 31407 14000e47e 31405->31407 31407->31364 31495 14002a630 31409->31495 31411 14002ad43 31419 14002ad94 31411->31419 31503 14002abb4 4 API calls 2 library calls 31411->31503 31413 14002ad57 31415 14002ad76 31413->31415 31504 14002c5bc 42 API calls _purecall 31413->31504 31505 14002ab3c EnterCriticalSection LeaveCriticalSection __std_exception_copy _Yarn 31415->31505 31416 14000e31c 31420 140012e20 31416->31420 31499 14002a670 31419->31499 31421 140034620 _set_errno_from_matherr 14 API calls 31420->31421 31422 140012e2d 31421->31422 31423 140034620 _set_errno_from_matherr 14 API calls 31422->31423 31424 140012e36 GetLastError SetLastError 31423->31424 31424->31381 31426 14000cc12 31425->31426 31507 1400135a0 31426->31507 31430 14000cf36 31546 140034cb0 31 API calls _invalid_parameter_noinfo_noreturn 31430->31546 31432 14000cc84 31436 14000cca7 31432->31436 31437 14000cc8d GetCurrentProcessId 31432->31437 31434 140001140 35 API calls 31438 14000cc7a 31434->31438 31440 14000ccc9 31436->31440 31441 14000ccb0 GetCurrentThreadId 31436->31441 31439 14000d830 37 API calls 31437->31439 31444 14000d580 35 API calls 31438->31444 31445 14000cc9d 31439->31445 31442 14000ccd6 GetLocalTime 31440->31442 31443 14000ce1b 31440->31443 31538 14000d9d0 37 API calls _UnwindNestedFrames 31441->31538 31447 14000ccfa 31442->31447 31449 14000ce24 GetTickCount 31443->31449 31450 14000ce3e 31443->31450 31444->31432 31448 14000d580 35 API calls 31445->31448 31539 14000db70 37 API calls _UnwindNestedFrames 31447->31539 31448->31436 31545 14000dd10 37 API calls _UnwindNestedFrames 31449->31545 31452 14000ce46 31450->31452 31453 14000ce58 31450->31453 31451 14000ccbf 31455 14000d580 35 API calls 31451->31455 31462 140001140 35 API calls 31452->31462 31456 140001140 35 API calls 31453->31456 31455->31440 31458 14000ce67 31456->31458 31457 14000ce34 31459 14000d580 35 API calls 31457->31459 31460 14000d830 37 API calls 31458->31460 31459->31450 31463 14000ce73 31460->31463 31462->31463 31464 140001140 35 API calls 31463->31464 31465 14000ce93 31464->31465 31519 140012eb0 31465->31519 31467 14000cd17 31540 14000db70 37 API calls _UnwindNestedFrames 31467->31540 31469 140001140 35 API calls 31471 14000ceae 31469->31471 31522 14000d830 31471->31522 31472 14000cd45 31474 14000d580 35 API calls 31472->31474 31479 14000cd4f 31474->31479 31476 140001140 35 API calls 31477 14000cec8 31476->31477 31534 14000eea0 31477->31534 31541 14000db70 37 API calls _UnwindNestedFrames 31479->31541 31480 14000ced5 31480->31430 31482 14000cf0c 31480->31482 31483 14002a340 _UnwindNestedFrames 8 API calls 31482->31483 31484 140002569 31483->31484 31484->31384 31485 14000cd7d 31542 14000db70 37 API calls _UnwindNestedFrames 31485->31542 31487 14000cdab 31543 14000db70 37 API calls _UnwindNestedFrames 31487->31543 31489 14000cdd9 31490 14000d580 35 API calls 31489->31490 31491 14000cde3 31490->31491 31544 14000db70 37 API calls _UnwindNestedFrames 31491->31544 31493 14000ce11 31494 14000d580 35 API calls 31493->31494 31494->31443 31496 14002a644 31495->31496 31497 14002a63f 31495->31497 31496->31411 31506 1400350d0 6 API calls std::_Lockit::_Lockit 31497->31506 31500 14002a684 31499->31500 31501 14002a67b LeaveCriticalSection 31499->31501 31500->31416 31503->31413 31504->31415 31505->31419 31510 1400135c8 31507->31510 31508 14002a340 _UnwindNestedFrames 8 API calls 31509 14000cc39 31508->31509 31509->31430 31511 14000d580 31509->31511 31510->31508 31512 14000d5a1 31511->31512 31516 14000d5c0 31512->31516 31549 1400013a0 31512->31549 31514 14000cc66 31514->31432 31514->31434 31517 14000d5f8 31516->31517 31547 140001450 35 API calls _UnwindNestedFrames 31516->31547 31517->31514 31548 140001450 35 API calls _UnwindNestedFrames 31517->31548 31562 140012ed0 31519->31562 31524 14000d85c 31522->31524 31523 14000d999 31525 14002a340 _UnwindNestedFrames 8 API calls 31523->31525 31526 1400013a0 35 API calls 31524->31526 31527 14000d88c 31524->31527 31530 14000d95a 31524->31530 31528 14000ceb9 31525->31528 31526->31527 31527->31530 31572 14000f5c0 19 API calls 5 library calls 31527->31572 31528->31476 31530->31523 31574 140001450 35 API calls _UnwindNestedFrames 31530->31574 31532 14000d8c0 31532->31530 31573 140001450 35 API calls _UnwindNestedFrames 31532->31573 31535 14000eeb0 31534->31535 31536 14000ef19 _Yarn 31535->31536 31575 140001750 33 API calls 2 library calls 31535->31575 31536->31480 31538->31451 31539->31467 31540->31472 31541->31485 31542->31487 31543->31489 31544->31493 31545->31457 31547->31517 31548->31514 31550 1400013c7 31549->31550 31555 14000140e 31549->31555 31557 1400012f0 31550->31557 31551 14002a340 _UnwindNestedFrames 8 API calls 31553 140001441 31551->31553 31553->31516 31555->31551 31559 140001310 31557->31559 31558 14000133c 31558->31555 31561 140001450 35 API calls _UnwindNestedFrames 31558->31561 31559->31558 31560 1400013a0 35 API calls 31559->31560 31560->31558 31561->31555 31563 140012ef1 31562->31563 31564 140012f07 31563->31564 31567 1400013a0 35 API calls 31563->31567 31568 140012f1e 31564->31568 31570 140001450 35 API calls _UnwindNestedFrames 31564->31570 31566 14000ce9f 31566->31469 31567->31564 31568->31566 31571 140001450 35 API calls _UnwindNestedFrames 31568->31571 31570->31568 31571->31566 31572->31532 31573->31530 31574->31523 31575->31536 31576->31388 31578 14000df1f 31577->31578 31579 14000df80 GetLastError 31577->31579 31638 140014270 8 API calls _UnwindNestedFrames 31578->31638 31640 140014270 8 API calls _UnwindNestedFrames 31579->31640 31582 14000df9b 31583 14002a340 _UnwindNestedFrames 8 API calls 31582->31583 31584 14000e25b 31583->31584 31595 14000f240 31584->31595 31585 14000df39 31586 14000df7e _Yarn 31585->31586 31639 140001750 33 API calls 2 library calls 31585->31639 31641 1400116e0 33 API calls 31586->31641 31589 14000dfd4 31593 14000e014 _Yarn 31589->31593 31642 140001b60 33 API calls 2 library calls 31589->31642 31591 14000e272 31643 140034cb0 31 API calls _invalid_parameter_noinfo_noreturn 31591->31643 31593->31582 31593->31591 31597 14000f285 31595->31597 31598 1400013a0 35 API calls 31597->31598 31599 14000f2a8 31597->31599 31602 14000f2cb 31597->31602 31598->31599 31599->31602 31644 140001450 35 API calls _UnwindNestedFrames 31599->31644 31600 14000e418 31600->31399 31600->31400 31602->31600 31645 140001450 35 API calls _UnwindNestedFrames 31602->31645 31646 14000d490 31603->31646 31606 14000cf8b 31652 14000f490 31606->31652 31608 1400013a0 35 API calls 31609 14000cff8 31608->31609 31610 14000eea0 33 API calls 31609->31610 31612 14000d00e 31610->31612 31611 14000d0d4 OutputDebugStringA 31619 14000d093 31611->31619 31612->31611 31612->31619 31621 14000d03c 31612->31621 31613 14000d12e 31614 14000d137 31613->31614 31632 14000d17b 31613->31632 31662 14000c5e0 37 API calls 3 library calls 31614->31662 31616 14000d13c 31627 14000d161 WriteFile 31616->31627 31616->31632 31618 14000d46c 31667 140034cb0 31 API calls _invalid_parameter_noinfo_noreturn 31618->31667 31619->31613 31660 1400375f0 72 API calls 2 library calls 31619->31660 31620 14000d076 31665 140012e60 15 API calls _set_errno_from_matherr 31620->31665 31621->31618 31621->31620 31622 14000d3bd 31666 14000e580 31 API calls _invalid_parameter_noinfo_noreturn 31622->31666 31627->31632 31628 14000d11c 31661 1400369f0 71 API calls 31628->31661 31630 14000d3f6 std::ios_base::_Ios_base_dtor 31631 14002a340 _UnwindNestedFrames 8 API calls 31630->31631 31633 14000d45b 31631->31633 31632->31618 31632->31621 31636 14000d21f 31632->31636 31663 140012d50 10 API calls _UnwindNestedFrames 31632->31663 31633->31405 31636->31618 31636->31621 31664 140012d50 10 API calls _UnwindNestedFrames 31636->31664 31638->31585 31639->31586 31640->31582 31641->31589 31642->31593 31644->31602 31645->31600 31647 14000d4ad 31646->31647 31648 1400013a0 35 API calls 31647->31648 31649 14000d4d6 31647->31649 31648->31649 31650 14000d55c 31649->31650 31668 140001450 35 API calls _UnwindNestedFrames 31649->31668 31650->31606 31655 14000f4ac 31652->31655 31654 14000f4c5 31658 14000f4da 31654->31658 31669 140001450 35 API calls _UnwindNestedFrames 31654->31669 31655->31654 31657 1400013a0 35 API calls 31655->31657 31656 14000cff0 31656->31608 31657->31654 31658->31656 31670 140001450 35 API calls _UnwindNestedFrames 31658->31670 31660->31628 31661->31613 31662->31616 31663->31636 31664->31621 31665->31622 31666->31630 31668->31650 31669->31658 31670->31656

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: AddressProc$CurrentEnvironmentHandleModuleVariable$CommandFormatLinePathProcessUser
    • String ID: IsWow64Process$NtClose$NtCreateKey$NtDeleteKey$NtEnumerateKey$NtOpenKeyEx$NtQueryKey$NtQueryValueKey$NtSetValueKey$PROGRAMFILES$PROGRAMFILES(X86)$RtlFormatCurrentUserKeyPath$RtlFreeUnicodeString$RtlInitUnicodeString$S-1-5-21-2246122658-3693405117-2476756634-1002$\REGISTRY\USER\S-1-5-21-2246122658-3693405117-2476756634-1002\$kernel32.dll$ntdll.dll
    • API String ID: 1671916859-2421250923
    • Opcode ID: 51e83f291381af31b42b1c98bec66c3da49ae0de3528acdf520019cf3f77114b
    • Instruction ID: 8296f3a076c74dc75d48bb717b5bb466eaaaa9445ea67098805aad6311cd0baf
    • Opcode Fuzzy Hash: 51e83f291381af31b42b1c98bec66c3da49ae0de3528acdf520019cf3f77114b
    • Instruction Fuzzy Hash: AE817A31312B8591FB17AB27E8507E93392AB4DBC4F59442ABA0D4B7B0EF38C506C354

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 45 14000ffb0-14000ffe7 46 14000fff5-14000fffe call 140014c10 45->46 47 14000ffe9-14000fff3 call 140014cd0 45->47 51 140010003-14001002d 46->51 47->51 52 140010036 51->52 53 14001002f-140010034 51->53 54 14001003b-140010073 call 140015940 52->54 53->54 57 140010096-140010099 54->57 58 140010075-140010077 54->58 59 1400100d7-1400100e1 57->59 60 14001009b-1400100b7 call 14000fd80 57->60 58->57 61 140010079-140010084 58->61 63 1400100e3-1400100e6 59->63 64 140010127-14001015f call 14003bbb0 call 140010420 59->64 74 1400100b9 60->74 75 1400100bc-1400100d2 call 140015940 60->75 65 140010086 61->65 66 14001008b-140010091 call 140010420 61->66 70 140010164-14001017f 63->70 71 1400100e8-14001011e call 14000b530 63->71 73 1400103d5-140010414 call 140003a60 * 2 call 14002a340 64->73 65->66 66->57 70->73 83 140010184 71->83 84 140010120-140010125 71->84 74->75 75->59 85 140010189-14001018c 83->85 84->85 87 1400101b7-1400101c0 85->87 88 14001018e-140010193 85->88 91 1400101c2-1400101dd call 1400104e0 87->91 92 1400101df-1400101fa 87->92 90 14001019b-1400101b5 call 14003b7c0 call 14000fe10 88->90 90->87 91->92 101 1400101ff-14001024d call 140010420 call 14000fea0 91->101 95 1400103c8-1400103d0 call 140003a60 92->95 95->73 108 14001025e-1400102b1 call 140010420 call 14000fea0 call 140003a60 * 2 101->108 109 14001024f-14001025c call 140003a60 101->109 114 1400102b3-1400102db 108->114 123 1400102e0-14001032e call 140010420 call 14000fea0 108->123 109->114 116 1400103c0-1400103c3 call 140010420 114->116 116->95 128 140010330-14001033d call 140003a60 123->128 129 14001033f-140010392 call 140010420 call 14000fea0 call 140003a60 * 2 123->129 134 140010398-1400103ba 128->134 129->92 129->134 134->116
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID:
    • String ID: *x64-beta*$*x64-dev*$1?1-*$2?0-d*$\cohort$beta$dev$name$stable
    • API String ID: 0-1206257362
    • Opcode ID: 6f138ba23e1d23f54e3d8ac82d72c120f9328417ba8d9caae46b6457ae672a18
    • Instruction ID: 398733223c91b89438fb77706fb9c883d0450d721ce0617513930940ee9ad35b
    • Opcode Fuzzy Hash: 6f138ba23e1d23f54e3d8ac82d72c120f9328417ba8d9caae46b6457ae672a18
    • Instruction Fuzzy Hash: 14B1C1727147A092F722DB16E4407EAA360EB8A7C0F804112FBC95BAA6EF7DD645C741

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 271 14000dec0-14000df1d FormatMessageA 272 14000df1f-14000df67 call 140014270 call 14003b060 271->272 273 14000df80-14000df9b GetLastError call 140014270 271->273 283 14000df69-14000df7e call 140001750 272->283 284 14000dfa0-14000dfba call 14002f370 272->284 278 14000e24b-14000e271 call 14002a340 273->278 289 14000dfbf-14000dff7 call 1400116e0 283->289 284->289 292 14000e014-14000e018 289->292 293 14000dff9-14000e002 289->293 294 14000e022-14000e032 292->294 295 14000e01a 292->295 296 14000e004-14000e008 293->296 297 14000e059-14000e05d 293->297 298 14000e034 294->298 299 14000e039-14000e057 call 14002f370 294->299 295->294 302 14000e066 296->302 303 14000e00a-14000e012 296->303 300 14000e0b7 297->300 301 14000e05f-14000e064 297->301 298->299 312 14000e08e-14000e0b2 299->312 306 14000e0bc-14000e0cc 300->306 301->306 304 14000e06e-14000e08a call 140001b60 302->304 303->304 304->312 307 14000e0d8 306->307 308 14000e0ce-14000e0d6 306->308 311 14000e0e0-14000e0ea 307->311 308->311 314 14000e102-14000e168 call 14002f370 * 3 311->314 315 14000e0ec-14000e0f6 311->315 316 14000e170-14000e179 312->316 314->316 315->314 317 14000e0f8-14000e0fe 315->317 319 14000e1b1-14000e1d4 316->319 320 14000e17b-14000e18b 316->320 317->314 323 14000e100 317->323 321 14000e1d6-14000e1e6 319->321 322 14000e208-14000e214 319->322 325 14000e1ac call 14002a000 320->325 326 14000e18d-14000e19c 320->326 330 14000e203 call 14002a000 321->330 331 14000e1e8-14000e1f7 321->331 322->278 333 14000e216-14000e229 322->333 323->314 325->319 327 14000e272-14000e279 call 140034cb0 326->327 328 14000e1a2-14000e1a9 326->328 328->325 330->322 331->327 335 14000e1f9-14000e200 331->335 338 14000e246 call 14002a000 333->338 339 14000e22b-14000e23a 333->339 335->330 338->278 339->327 342 14000e23c-14000e243 339->342 342->338
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: ErrorFormatLastMessage_invalid_parameter_noinfo_noreturn
    • String ID: (0x%lX)$Error (0x%lX) while retrieving error. (0x%lX)
    • API String ID: 591752230-3206765257
    • Opcode ID: 5a88ea380572ae09f6ce5331f679d7b6b1edc069f2d8577d0edd30badad5a6a5
    • Instruction ID: 53488e4425ebb39b2910f2ed6443e1d08a5109003c21c04acb770f03378b82bc
    • Opcode Fuzzy Hash: 5a88ea380572ae09f6ce5331f679d7b6b1edc069f2d8577d0edd30badad5a6a5
    • Instruction Fuzzy Hash: A6A1C2B2704AC086EA21DB16E4043EEA351F78ABC4F444212FB9D17BAADF7CC585C740

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: ErrorLast$CtrlDispatcherServiceStart
    • String ID: ../../chrome/elevation_service/service_main.cc$Failed to connect to the service control manager
    • API String ID: 3662569860-2232062004
    • Opcode ID: a30684eb1eb4cdf6be966ec6cf183f7b6a043c4217d192a437088d9dc669c3e8
    • Instruction ID: dacb01c47e93046820a4c1f43b8fc6d40c8ed1c51e59134581f31ccb0bade41a
    • Opcode Fuzzy Hash: a30684eb1eb4cdf6be966ec6cf183f7b6a043c4217d192a437088d9dc669c3e8
    • Instruction Fuzzy Hash: C711C07170468192FB22EB23F9253EA3361AB8D7C0F400026BB4E577B6DE3CC6068B40

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 442 420080-420286 444 420099-420575 442->444 445 42028c 442->445 449 420155 444->449 450 42057b 444->450 447 420445 445->447 447->444 448 42044b-420457 447->448 451 420458-420472 GetComputerNameW 448->451 453 4202ef-420495 call 40e050 * 2 449->453 450->449 452 420581-420587 450->452 457 4203ee-4203f4 451->457 458 42024c-420253 451->458 455 42058b 452->455 453->451 494 42043e 453->494 460 420181 VirtualFree 455->460 461 42058c-420591 455->461 480 4200da-42023f 457->480 481 4203fa 457->481 465 4201e6 458->465 466 420255 458->466 462 4201a8-4202ac call 437164 460->462 463 420597 461->463 464 4204ab-4204af 461->464 469 4202b1-4202be 462->469 463->464 472 42059d 463->472 491 4204c7 464->491 465->469 470 4201ec-420313 call 43715c 465->470 473 4202d3 466->473 476 4202c4 469->476 477 4203bf-4203d9 GetUserNameW 469->477 497 420318-42031e 470->497 472->464 473->465 479 4202d9 473->479 476->477 486 4202ca 476->486 487 420331 477->487 479->453 480->458 495 420241-42024a 480->495 481->480 488 420400 481->488 486->473 492 420171 487->492 493 420337 487->493 496 42b1ee-42b49f 488->496 503 4204cc-4204e6 call 439970 GetComputerNameW 491->503 498 420173 492->498 499 42013f-420146 492->499 493->492 500 42033d 493->500 494->447 495->458 495->469 501 420324 497->501 502 420568-42056b 497->502 504 420230 498->504 499->455 505 4205d0-4205d9 500->505 501->502 507 42032a 501->507 502->503 511 420131 503->511 512 4204ec-420514 503->512 504->491 509 420236-4205c2 504->509 505->496 507->487 509->491 516 4205c8-4205c9 509->516 514 420137 511->514 515 420089-42008c 511->515 512->502 514->515 519 42013d 514->519 515->462 518 420092 515->518 516->505 518->462 520 420098 518->520 519->460 519->499 520->444
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1817403285.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: ComputerName
    • String ID:
    • API String ID: 3545744682-0
    • Opcode ID: a53a589e1d79c8daebd35e0be32d5c07406a5a25e6b1b8ac5d66ad9906a0b4eb
    • Instruction ID: f8b86653bd004c7e84363ce45d4b8142a181499096cd0f76e4eaa8bc9fd1a51b
    • Opcode Fuzzy Hash: a53a589e1d79c8daebd35e0be32d5c07406a5a25e6b1b8ac5d66ad9906a0b4eb
    • Instruction Fuzzy Hash: E5D14631618B1D8BC724EF58E8457EAB3E1FBA0310F98461FD846C3266DA78DA45C6C7

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: InitOpenStringUnicode
    • String ID:
    • API String ID: 3946626324-0
    • Opcode ID: 5480831c4fd5be8783304773b96a1f93051e85664f6868c34c085dff86f3d31a
    • Instruction ID: d4ed13a627d0b679ebc93e404228c36212a9fdc28a708f4602ab8cebe4e2a734
    • Opcode Fuzzy Hash: 5480831c4fd5be8783304773b96a1f93051e85664f6868c34c085dff86f3d31a
    • Instruction Fuzzy Hash: A4412571604B8081FB63AB27A8513EAA3A2BB8D7D5F544112BF890F7A5EF7DC1858340

    Control-flow Graph

    APIs
    • RtlInitUnicodeString.NTDLL ref: 0000000140015677
    • NtQueryValueKey.NTDLL ref: 0000000140015710
      • Part of subcall function 0000000140014CF0: GetModuleHandleW.KERNEL32 ref: 0000000140014D16
      • Part of subcall function 0000000140014CF0: GetProcAddress.KERNEL32 ref: 0000000140014D30
      • Part of subcall function 0000000140014CF0: GetProcAddress.KERNEL32 ref: 0000000140014D43
      • Part of subcall function 0000000140014CF0: GetProcAddress.KERNEL32 ref: 0000000140014D56
      • Part of subcall function 0000000140014CF0: GetProcAddress.KERNEL32 ref: 0000000140014D69
      • Part of subcall function 0000000140014CF0: GetProcAddress.KERNEL32 ref: 0000000140014D7C
      • Part of subcall function 0000000140014CF0: GetProcAddress.KERNEL32 ref: 0000000140014D8F
      • Part of subcall function 0000000140014CF0: GetProcAddress.KERNEL32 ref: 0000000140014DA2
      • Part of subcall function 0000000140014CF0: GetProcAddress.KERNEL32 ref: 0000000140014DB5
      • Part of subcall function 0000000140014CF0: GetProcAddress.KERNEL32 ref: 0000000140014DC8
      • Part of subcall function 0000000140014CF0: GetProcAddress.KERNEL32 ref: 0000000140014E66
      • Part of subcall function 0000000140014CF0: GetProcAddress.KERNEL32 ref: 0000000140014E75
      • Part of subcall function 0000000140014CF0: RtlFormatCurrentUserKeyPath.NTDLL ref: 0000000140014E93
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: AddressProc$CurrentFormatHandleInitModulePathQueryStringUnicodeUserValue
    • String ID:
    • API String ID: 231354608-0
    • Opcode ID: 1734560149f36f8d03c55b117f486ed2182c301374a4193f377fd9754da6bc27
    • Instruction ID: c50907179431403786d3ea5dec8f3848759f60ebd4dc49af5400d481357085ec
    • Opcode Fuzzy Hash: 1734560149f36f8d03c55b117f486ed2182c301374a4193f377fd9754da6bc27
    • Instruction Fuzzy Hash: FD41E232218A80C6F652DB16E8017EAB3A0F78D7C5F508111FF894B7A5DF3AD586CB40
    APIs
    • GetSystemDefaultLangID.KERNELBASE ref: 004053C4
    Memory Dump Source
    • Source File: 00000000.00000002.1817403285.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: DefaultLangSystem
    • String ID:
    • API String ID: 706401283-0
    • Opcode ID: be85cc28eff309c6b04ec446b1d1922c7f56a33d23bc4027ac3bc4e0d37bd274
    • Instruction ID: 39fcdf4db9a6261c521629ad4ecb41ad9280b7c21900a9b30eb29d996c612ff5
    • Opcode Fuzzy Hash: be85cc28eff309c6b04ec446b1d1922c7f56a33d23bc4027ac3bc4e0d37bd274
    • Instruction Fuzzy Hash: 8E41B36141DE958FD726522454643B37BA0DB123A2F9905FBD882A62E2D1BC4C829F2F
    APIs
      • Part of subcall function 0000000140015450: RtlInitUnicodeString.NTDLL ref: 000000014001559C
      • Part of subcall function 0000000140015450: NtOpenKeyEx.NTDLL ref: 00000001400155D1
    • NtClose.NTDLL ref: 00000001400159AB
      • Part of subcall function 0000000140014CF0: GetModuleHandleW.KERNEL32 ref: 0000000140014D16
      • Part of subcall function 0000000140014CF0: GetProcAddress.KERNEL32 ref: 0000000140014D30
      • Part of subcall function 0000000140014CF0: GetProcAddress.KERNEL32 ref: 0000000140014D43
      • Part of subcall function 0000000140014CF0: GetProcAddress.KERNEL32 ref: 0000000140014D56
      • Part of subcall function 0000000140014CF0: GetProcAddress.KERNEL32 ref: 0000000140014D69
      • Part of subcall function 0000000140014CF0: GetProcAddress.KERNEL32 ref: 0000000140014D7C
      • Part of subcall function 0000000140014CF0: GetProcAddress.KERNEL32 ref: 0000000140014D8F
      • Part of subcall function 0000000140014CF0: GetProcAddress.KERNEL32 ref: 0000000140014DA2
      • Part of subcall function 0000000140014CF0: GetProcAddress.KERNEL32 ref: 0000000140014DB5
      • Part of subcall function 0000000140014CF0: GetProcAddress.KERNEL32 ref: 0000000140014DC8
      • Part of subcall function 0000000140014CF0: GetProcAddress.KERNEL32 ref: 0000000140014E66
      • Part of subcall function 0000000140014CF0: GetProcAddress.KERNEL32 ref: 0000000140014E75
      • Part of subcall function 0000000140014CF0: RtlFormatCurrentUserKeyPath.NTDLL ref: 0000000140014E93
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: AddressProc$CloseCurrentFormatHandleInitModuleOpenPathStringUnicodeUser
    • String ID:
    • API String ID: 1355870404-0
    • Opcode ID: 069697732174b08c5421a8e0b8eb38806591bf883f45a15495bd91b262c98a86
    • Instruction ID: 920d10d6ba070a493e9e84cdfb2cbd90d9881cca1393e1a4799ee7752d236afa
    • Opcode Fuzzy Hash: 069697732174b08c5421a8e0b8eb38806591bf883f45a15495bd91b262c98a86
    • Instruction Fuzzy Hash: 65018F32618640C2F622A727A8153DA6791A78DBF4F544311FF984F7F5CE3DC5418B80

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 141 14000cf50-14000cfcb call 14000d490 call 14000f0b0 148 14000cfe6-14000d018 call 14000f490 call 1400013a0 call 14000eea0 141->148 149 14000cfcd-14000cfd6 141->149 158 14000d08a-14000d091 148->158 159 14000d01a-14000d03a 148->159 149->148 153 14000cfd8-14000cfe0 149->153 153->148 160 14000d093-14000d096 158->160 161 14000d0c0-14000d0cb 158->161 159->158 168 14000d03c-14000d047 159->168 165 14000d09c-14000d0b5 call 140030640 160->165 166 14000d12e-14000d135 160->166 162 14000d0d4-14000d0df OutputDebugStringA call 140030640 161->162 163 14000d0cd 161->163 173 14000d0e4-14000d0f3 162->173 163->162 189 14000d107 165->189 190 14000d0b7-14000d0be 165->190 170 14000d137-14000d13e call 14000c5e0 166->170 171 14000d17b-14000d17e 166->171 174 14000d3b1-14000d40f call 140012e60 call 14000e580 168->174 175 14000d04d-14000d05f 168->175 170->171 191 14000d140-14000d14f 170->191 176 14000d361-14000d36c 171->176 177 14000d184-14000d18e 171->177 180 14000d0f5 173->180 181 14000d0fc-14000d105 173->181 222 14000d411-14000d418 174->222 223 14000d43a-14000d46b call 14002b6d0 call 14002a340 174->223 182 14000d061-14000d070 175->182 183 14000d080-14000d085 call 14002a000 175->183 184 14000d3a6 176->184 185 14000d36e-14000d380 176->185 186 14000d1c2-14000d1ca 177->186 187 14000d190-14000d19f 177->187 180->181 194 14000d114-14000d129 call 1400375f0 call 140030640 call 1400369f0 181->194 192 14000d076-14000d07d 182->192 193 14000d47a-14000d481 call 140034cb0 182->193 183->174 184->174 197 14000d3a1 call 14002a000 185->197 198 14000d382-14000d391 185->198 201 14000d1d5 186->201 202 14000d1cc-14000d1d3 186->202 199 14000d1a1-14000d1a8 187->199 200 14000d1aa 187->200 196 14000d10e 189->196 190->196 210 14000d151-14000d158 191->210 211 14000d15a 191->211 192->183 194->166 196->194 197->184 198->193 207 14000d397-14000d39e 198->207 213 14000d1b1-14000d1bd call 1400140d0 199->213 200->213 204 14000d1dc-14000d200 call 140011c30 call 140003820 201->204 202->204 233 14000d206-14000d211 204->233 234 14000d46c-14000d471 204->234 207->197 217 14000d161-14000d175 WriteFile 210->217 211->217 213->186 217->171 225 14000d432-14000d435 call 140029ff0 222->225 226 14000d41a-14000d423 222->226 225->223 226->225 240 14000d425-14000d42d 226->240 238 14000d213-14000d221 call 140012d50 233->238 239 14000d259-14000d261 233->239 237 14000d473-14000d478 234->237 237->193 249 14000d252 238->249 250 14000d223-14000d250 call 140012e00 238->250 239->234 243 14000d267-14000d272 239->243 240->225 245 14000d274-14000d282 call 140012d50 243->245 246 14000d2ba-14000d2d0 243->246 254 14000d2b3 245->254 255 14000d284-14000d2b1 call 140012e00 245->255 246->237 248 14000d2d6-14000d2ed call 140011230 246->248 259 14000d358-14000d35c call 140011210 248->259 260 14000d2ef-14000d2f7 248->260 249->239 250->239 254->246 255->246 259->176 263 14000d302 260->263 264 14000d2f9-14000d300 260->264 265 14000d309-14000d313 263->265 264->265 266 14000d315-14000d31a call 14003b060 265->266 267 14000d31c 265->267 268 14000d31e-14000d352 266->268 267->268 268->259
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: DebugFileIos_base_dtorOutputStringWrite_invalid_parameter_noinfo_noreturnstd::ios_base::_
    • String ID: ../../chrome/elevation_service/elevation_service.cc
    • API String ID: 226236003-1549279015
    • Opcode ID: ab6d76d4c5131a80eb0358f53b457fa6198d93df4692c0a5135be7d8bfcd0524
    • Instruction ID: 68e831ab567a8e62df6560536f9084be9cf55f5e74627eef730b6f369121fe5a
    • Opcode Fuzzy Hash: ab6d76d4c5131a80eb0358f53b457fa6198d93df4692c0a5135be7d8bfcd0524
    • Instruction Fuzzy Hash: 8FE13A72700A8586EB26DF22E8903ED3361F749BC8F544526EB5E4BBB5DF78C6858310

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 359 140015130-140015154 360 140015156-140015161 359->360 361 140015187-1400151a5 call 14002a340 359->361 362 140015163-14001516a 360->362 363 14001516c-140015185 360->363 362->361 362->363 363->361 365 1400151a6-1400151c6 GetNativeSystemInfo 363->365 365->361 367 1400151c8-1400151d6 365->367 367->361 368 1400151d8-1400151e0 367->368 368->361 369 1400151e2-140015200 368->369 370 140015202 369->370 371 140015206-14001522a 369->371 370->371 372 1400152a2-1400152ac 371->372 373 1400152c4-1400152c8 372->373 374 1400152ae-1400152be call 1400358a0 372->374 375 1400152cb-1400152ce 373->375 374->373 379 14001522c-140015234 374->379 375->372 377 1400152d0-1400152d5 375->377 377->361 380 1400152db-1400152e4 377->380 381 140015236-140015239 379->381 382 14001523f-140015250 379->382 383 1400152e6 380->383 384 1400152ea-140015313 call 14003bbb0 call 140015bb0 380->384 381->373 381->382 385 140015252-140015255 382->385 386 14001526d-140015275 382->386 383->384 384->361 388 140015263-140015268 385->388 389 140015257-140015261 385->389 391 140015285-1400152a0 386->391 392 140015277-140015283 386->392 388->386 389->386 391->375 392->391 392->392
    APIs
    • GetNativeSystemInfo.KERNELBASE(?,?,?,?,?,-00000057,?,000000014001597D), ref: 00000001400151BC
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: InfoNativeSystem
    • String ID: WOW6432Node\$\WOW6432Node
    • API String ID: 1721193555-1560920464
    • Opcode ID: d81fd6df615f1914662e93cf4afaec8f64a10296871aa215cd2874a58c377b06
    • Instruction ID: ba60b726f5ade01af3f4d23444ebb7e4da502369cb533b6d12bd15868b63a01d
    • Opcode Fuzzy Hash: d81fd6df615f1914662e93cf4afaec8f64a10296871aa215cd2874a58c377b06
    • Instruction Fuzzy Hash: 0251E232615A44D6EA22EB17E8483EA63A1F35D7C5F584416FF4A0B7B4EB3AC582C740

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: FileInitializeModuleNameshared_ptr
    • String ID: ../../chrome/elevation_service/elevation_service.cc$Failed to initialize COM
    • API String ID: 2916548040-130731028
    • Opcode ID: 987bdfe2f2d8951f2a717531bccb9fa8a144bbc2809a3a2965c38921e725fa24
    • Instruction ID: 67b516fd3486ec22f6aaff8752bdcc9f8d1ff125ee610cd7b41472f17a57262f
    • Opcode Fuzzy Hash: 987bdfe2f2d8951f2a717531bccb9fa8a144bbc2809a3a2965c38921e725fa24
    • Instruction Fuzzy Hash: 7B2189B130854050FA66FBA3B5523FE2201ABCE7D4F404121BF8A1BAF7DE38C5469792

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 521 408070-40817e 523 408180 521->523 524 40813d-4081a5 521->524 523->524 527 408161 523->527 530 4081a7 524->530 531 4081bd-4081ca 524->531 529 408163-408170 call 437164 527->529 535 408172 529->535 536 408186 CloseHandle 529->536 538 4081d0 531->538 539 4080f3 531->539 537 40818c-408192 535->537 536->537 540 408194 537->540 541 408115-408118 537->541 554 4080c3 538->554 555 4081fe-408201 GetTokenInformation 538->555 542 4080f5 539->542 543 40808c 539->543 540->541 545 40819a 540->545 549 4080a7 541->549 550 408119-40811a 541->550 542->543 551 408077 542->551 547 40808e-408184 543->547 545->524 547->536 547->537 550->549 556 40811c 550->556 559 4081d7-4081de call 43715c 551->559 554->555 557 4080c9 554->557 558 40820f 555->558 567 4081b7 555->567 556->558 561 4080ca-4080d8 GetTokenInformation 557->561 558->547 563 408215-40821e 558->563 565 4081e3-4081e6 559->565 566 40810f 561->566 563->547 577 408224 563->577 565->561 579 408089 565->579 570 408111 566->570 571 40812d 566->571 567->558 569 4081b9-4081bb 567->569 569->531 570->571 576 408113 570->576 574 408133-4081f0 571->574 575 4080a8 571->575 582 4081f6 574->582 583 4080da-4080f1 574->583 580 4080aa-4080ad 575->580 576->541 577->559 581 408226 577->581 579->561 584 40808b 579->584 580->529 585 4080b3-408203 580->585 581->559 586 408228-4082ee call 405d90 581->586 582->583 587 4081fc 582->587 583->580 584->543 585->529 591 408209 585->591 596 4082f0 586->596 597 40830c-408320 call 405d90 call 40ec00 586->597 587->555 596->597 598 4082f2 596->598 600 4082f7-4082fc call 405d90 597->600 613 408322 597->613 598->600 606 408302 600->606 607 408253-408265 call 421280 600->607 606->607 611 408308-40830a 606->611 614 408328 607->614 615 40826b 607->615 611->597 613->600 616 408324-408326 613->616 620 408335 614->620 621 4082df-40832b 614->621 615->614 619 40823f-408243 615->619 616->614 619->600 625 408287 620->625 626 40829b-40829d 620->626 621->620 624 40832d-408331 621->624 624->620 625->626 628 40824e-408252 625->628 628->607
    Memory Dump Source
    • Source File: 00000000.00000002.1817403285.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_3lOLt0TUE4.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 4e190fe7d4b3c5e57d75e6528bbdfe52906c1a61a35aefbd00297ac479a6f7d8
    • Instruction ID: 3a4af9ea66d678aaf1ea1a6dd5bb3d26c191bc867120809e853e5f7bb098c59a
    • Opcode Fuzzy Hash: 4e190fe7d4b3c5e57d75e6528bbdfe52906c1a61a35aefbd00297ac479a6f7d8
    • Instruction Fuzzy Hash: D161EE3060CA458FC7658B288A142367AA0FF95360F5946BFE8C6E62E1DF3C4C46975F

    Control-flow Graph

    APIs
    • CommandLineToArgvW.SHELL32(?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,0000000140008D87), ref: 0000000140008E71
    • LocalFree.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,0000000140008D87), ref: 0000000140008E8C
    • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 0000000140008EEB
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: ArgvCommandFreeLineLocal_invalid_parameter_noinfo_noreturn
    • String ID:
    • API String ID: 2755104575-0
    • Opcode ID: abbff420a7c97e6f353825c49e0def7c244750ef885427641574ca0a11af2c95
    • Instruction ID: 7e5a121b4e84af557d0da3e38d07c50298f3672cbc291d307638bbf8a8110edc
    • Opcode Fuzzy Hash: abbff420a7c97e6f353825c49e0def7c244750ef885427641574ca0a11af2c95
    • Instruction Fuzzy Hash: F121AF7261868042EA25DB56E5593AAA362F7CEBD0F104215FF9D17BA8EF7CC0428700

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: Process$CurrentExitTerminate
    • String ID:
    • API String ID: 1703294689-0
    • Opcode ID: cac87529363405e3a11f56f9b0a2ba470cadb2bf3304bd556552995707d226d5
    • Instruction ID: b8b2ccad4743ecea6164f5e9ec8b5b56324ebd32d46e0703e414886726e5a564
    • Opcode Fuzzy Hash: cac87529363405e3a11f56f9b0a2ba470cadb2bf3304bd556552995707d226d5
    • Instruction Fuzzy Hash: CBE0BF3470070446EB566B729C957EE23E2A78D7C1F145828EA0A437B6CD3DC4498351

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: FormatIos_base_dtorMessage_invalid_parameter_noinfo_noreturnstd::ios_base::_
    • String ID:
    • API String ID: 1724511648-0
    • Opcode ID: e2a40321510436837262c66e338418c873de45eb8b32cbb62751fc3610e8727d
    • Instruction ID: 4ed6b3063f70579ee5069ef56db3cfa9fdee01982b610708d3b2ae5f7b06f849
    • Opcode Fuzzy Hash: e2a40321510436837262c66e338418c873de45eb8b32cbb62751fc3610e8727d
    • Instruction Fuzzy Hash: 8D418F72701A4095EA16DF26E8503E97760FB89BE4F448226FF6D477E5EF38C5468700

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: CommandLine_invalid_parameter_noinfo_noreturn
    • String ID:
    • API String ID: 1276230952-0
    • Opcode ID: 30fbfc44f23f9256cf21dad34319314847c2cd5e764320d6ec266162983d685a
    • Instruction ID: fe3c5639ae5f0bbf5a95d3522ebde841213fb980ca3d20f15a232087e8381233
    • Opcode Fuzzy Hash: 30fbfc44f23f9256cf21dad34319314847c2cd5e764320d6ec266162983d685a
    • Instruction Fuzzy Hash: 1C318E72604B4081EA229B12F4543AEA3A1EB9D7E4F504625FB8D4B7F5EF7CC5818340
    Memory Dump Source
    • Source File: 00000000.00000002.1817403285.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_3lOLt0TUE4.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 355f5de826a502d2b078035f50b0d1b19bc6bd6d86d359f9387c1ff3fa9cfd06
    • Instruction ID: a4c1eae16118128e463e81baae65f4585e62460cffa3dbffa250007df7947a65
    • Opcode Fuzzy Hash: 355f5de826a502d2b078035f50b0d1b19bc6bd6d86d359f9387c1ff3fa9cfd06
    • Instruction Fuzzy Hash: C0016D3050DF468FEB556624981827B77A0EB50324F6901BB8487EA1D6DABC5902AF1F
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: Concurrency::cancel_current_task$ExceptionThrowstd::bad_alloc::bad_alloc
    • String ID:
    • API String ID: 2386360001-0
    • Opcode ID: 3d4548bcd3710c03090b989d6b72080c1aa640ba6f282ecb1ffb60b036e738d5
    • Instruction ID: c876e692dc01cfc1f02e8f1a0850f411f601efdcb0b469c1a8427bd4193611da
    • Opcode Fuzzy Hash: 3d4548bcd3710c03090b989d6b72080c1aa640ba6f282ecb1ffb60b036e738d5
    • Instruction Fuzzy Hash: 94E06D7160520645F8E6337336163E801404B5E3F0E6817387B7A876F6E93888528600
    Memory Dump Source
    • Source File: 00000000.00000002.1817403285.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_3lOLt0TUE4.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 61e7e04614083fc9a4d415ed1ed9d586c41edeef07ca5b9990f411115d9a6df2
    • Instruction ID: 2619670e389b767678ae0bcb6d9d84d36d65e32aa2926de5067951b932e94eee
    • Opcode Fuzzy Hash: 61e7e04614083fc9a4d415ed1ed9d586c41edeef07ca5b9990f411115d9a6df2
    • Instruction Fuzzy Hash: 7AF1043071CE588FC669A71D68413BB73D2EB99314F9845AFE04AC3396DD3C9C46878A
    Memory Dump Source
    • Source File: 00000000.00000002.1817403285.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_3lOLt0TUE4.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 2ff8010c23fac40248132f603dcb160a69be8753e27de13806aa853a5623418f
    • Instruction ID: e6b545dc5e83240c3b2fc77e151e9fb3744f1ffef380e44ad6d5682570b17013
    • Opcode Fuzzy Hash: 2ff8010c23fac40248132f603dcb160a69be8753e27de13806aa853a5623418f
    • Instruction Fuzzy Hash: 6C217C3020CF448FEB699A28944877776A1EB55310F6941BB9047FF2E2CA3C9C459F1E
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: FileModuleName
    • String ID:
    • API String ID: 514040917-0
    • Opcode ID: 09ae042064b9b11f703a718ff4850778541440455f56ec9e4536d37bf1a53b82
    • Instruction ID: 7c249e8453e414afdd35d547ba56bb3b8965b1465d8e916de8cc658a6cc80857
    • Opcode Fuzzy Hash: 09ae042064b9b11f703a718ff4850778541440455f56ec9e4536d37bf1a53b82
    • Instruction Fuzzy Hash: DF214422A186A083F7129B29A4117EEA360EB89784F505110FBC967B55EF7DE686C740
    APIs
    • GetModuleHandleW.KERNEL32(?,?,?,?,?,?,?,?,00000000,0000000140036445,?,?,?,?,000000014003DFF5), ref: 00000001400324AB
      • Part of subcall function 00000001400323D8: GetModuleHandleExW.KERNEL32 ref: 00000001400323F4
      • Part of subcall function 00000001400323D8: GetProcAddress.KERNEL32 ref: 000000014003240A
      • Part of subcall function 00000001400323D8: FreeLibrary.KERNEL32 ref: 0000000140032427
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: HandleModule$AddressFreeLibraryProc
    • String ID:
    • API String ID: 3947729631-0
    • Opcode ID: 75c2b925c9412d87332cc4835abf463a082df7010962ba50e87d88dca86b8437
    • Instruction ID: 98f55a34dabb3302a6898dd994618cbcb35b0e1b2766cdf8020a80853a80fed0
    • Opcode Fuzzy Hash: 75c2b925c9412d87332cc4835abf463a082df7010962ba50e87d88dca86b8437
    • Instruction Fuzzy Hash: 13218032A01740DAEB17DF79D4403EE37B0F788788F544526E70903AA5EB78C585CB80
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1817403285.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: CreateThread
    • String ID:
    • API String ID: 2422867632-0
    • Opcode ID: a986bd5c00f5553bdb8598d00602888b78738e64b994e3da4fa4453f2922062f
    • Instruction ID: 9dfd677ec4baf572e80963ba6737c722466ff10812f1acdc481c7b4b3cfd00ce
    • Opcode Fuzzy Hash: a986bd5c00f5553bdb8598d00602888b78738e64b994e3da4fa4453f2922062f
    • Instruction Fuzzy Hash: 29E04F2060DB444EEB599B24581031A3AE5EB88310F1501EFC44AE72D6CB7D2A064B8A
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: Initialize
    • String ID:
    • API String ID: 2538663250-0
    • Opcode ID: cc04c06e56847a1d1ad3e98fcb8df8358d835db6dd748cfef12d409b8dd6b6fa
    • Instruction ID: 148cfbb3d84dd5a5369efbb4e6d93de0c6302a30308153b5c8a87584f9775cc2
    • Opcode Fuzzy Hash: cc04c06e56847a1d1ad3e98fcb8df8358d835db6dd748cfef12d409b8dd6b6fa
    • Instruction Fuzzy Hash: 23D0C735B0075097E7599F77B4913D53251A748744F15D435CA5D43724DA3884978704
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: CreateHeap
    • String ID:
    • API String ID: 10892065-0
    • Opcode ID: 9df30dcb39f272073a8d8f5d51858d5be5450818d437caba021d4046df29c3fa
    • Instruction ID: a797f07e02d91039713ae016c1196e66f1a9767137325b475626a636edb3230f
    • Opcode Fuzzy Hash: 9df30dcb39f272073a8d8f5d51858d5be5450818d437caba021d4046df29c3fa
    • Instruction Fuzzy Hash: 0BC04C7AA1695183E78DAB275C517961253A39D340FE49824DA0E42720E93501564A10
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1817403285.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: wcscpy
    • String ID:
    • API String ID: 1284135714-0
    • Opcode ID: 51412a402b8cd50030cf07c80cfd4b00c1a38cf92c70ea7e66de183ec09a8362
    • Instruction ID: 87745563e7275ec3e804d81b4d0ba01836872a15e3d3764ae08941af790ac9a6
    • Opcode Fuzzy Hash: 51412a402b8cd50030cf07c80cfd4b00c1a38cf92c70ea7e66de183ec09a8362
    • Instruction Fuzzy Hash: 7E01A2F061EE90CFDA5AA71C504527B7592FB98724F28457B908AE72D2C87C4D029F4E
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1817403285.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: CloseHandle
    • String ID:
    • API String ID: 2962429428-0
    • Opcode ID: 5b5d7b071b63003723a190de38853bb16d482f491faa3db3b767200ea78fc1cb
    • Instruction ID: f5eaa5a81e22cad19efdc024805bcdfaafbb186a3ef927ad5e033b3396103dd1
    • Opcode Fuzzy Hash: 5b5d7b071b63003723a190de38853bb16d482f491faa3db3b767200ea78fc1cb
    • Instruction Fuzzy Hash: 35E08C3150CE1A8FFA54A618C90927726D0DA2432032449338802F62D0E43CEA476F0F
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1817403285.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: CloseHandle
    • String ID:
    • API String ID: 2962429428-0
    • Opcode ID: 618394ff9deb9f6b5e010b5aaee4db8be701b981e1d63e6b3fb36a727850c086
    • Instruction ID: b511c629561cf3a32caa9716ba2b2ae8dd997b5a4b1a4daf738c95f9ae624592
    • Opcode Fuzzy Hash: 618394ff9deb9f6b5e010b5aaee4db8be701b981e1d63e6b3fb36a727850c086
    • Instruction Fuzzy Hash: F0C0127012884A96DA3802481E0B0B22A008F82350B08002F8CC2A83A0DD7C8E0300AF
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1817403285.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: CloseHandle
    • String ID:
    • API String ID: 2962429428-0
    • Opcode ID: a0153765961d18982154f5649a6418830ea2767f573826a199b39b51e69f8ae7
    • Instruction ID: 25dc5a5b6346411875af5c42b5ea943a91518cfd549025f108831be9a67f23f7
    • Opcode Fuzzy Hash: a0153765961d18982154f5649a6418830ea2767f573826a199b39b51e69f8ae7
    • Instruction Fuzzy Hash: A4C048B056850986D93826886E0A4A229518F92760B08443BAC86BE3E2D9BC4D4341EE
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: _invalid_parameter_noinfo$memcpy_s$fegetenv
    • String ID: 1#IND$1#INF$1#QNAN$1#SNAN$MZx
    • API String ID: 808467561-2638907429
    • Opcode ID: 39e18bddedc245116aa42cb4c6a2fb5f1bf9f1c036cca9173c7c16ab1bc2569a
    • Instruction ID: 288fc22dd7118f36f94a0711066f1addcef15fab421f90b8eb0627026f29abd7
    • Opcode Fuzzy Hash: 39e18bddedc245116aa42cb4c6a2fb5f1bf9f1c036cca9173c7c16ab1bc2569a
    • Instruction Fuzzy Hash: 6DB2F2B26142818BE776CE6AD540BED37A1F38D7C8F515139EB0657BA8DB38CA04CB44
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID:
    • String ID: (flags = 0x%x)$ {%3.1f%%}$, mean = %.1f$... $Histogram: %s recorded %d samples
    • API String ID: 0-513715224
    • Opcode ID: d3b9878a77a302a2db09a7dd43a9470f1b4416b11ddf4165d2043fb7ad780024
    • Instruction ID: 04adb059001c06fc7b9070ed1c1074ce23e3f918ef5302a408a698290118c1fd
    • Opcode Fuzzy Hash: d3b9878a77a302a2db09a7dd43a9470f1b4416b11ddf4165d2043fb7ad780024
    • Instruction Fuzzy Hash: B9227072304B8485EA159F27E4583AAA7A1F78DFC4F448622FF8A1B7A9DF39C545C340
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: Locale$CodeErrorInfoLastPageValid$DefaultEnumLocalesProcessSystemUser
    • String ID:
    • API String ID: 3939093798-0
    • Opcode ID: c005d6c4a0b7eea474aab5746353985fca1bd7f6c0a9f1eb59589514450c4349
    • Instruction ID: 4e2e5a851d46792085a9059a05388c8494f6cbc947e27c41578d1fa2635e79d4
    • Opcode Fuzzy Hash: c005d6c4a0b7eea474aab5746353985fca1bd7f6c0a9f1eb59589514450c4349
    • Instruction Fuzzy Hash: 7D717E32701B508AFB52EF62D8907ED33A4FB4C7C8F4A4126AB09577A5EB38C845C394
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
    • String ID:
    • API String ID: 3140674995-0
    • Opcode ID: 9924b99f63e3d307044a6c9e876192410d7423eef716954732aaf5b44b485aa7
    • Instruction ID: 830872bed35560bdea2addcf938ab35cbca3cfc5ab11a569337613b495db0446
    • Opcode Fuzzy Hash: 9924b99f63e3d307044a6c9e876192410d7423eef716954732aaf5b44b485aa7
    • Instruction Fuzzy Hash: FF316672205B8089EB61DF65E8507ED7375F788788F44442AEB4E47BA9EF38C648C710
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: std::_$Lockit$Facet_Lockit::_Lockit::~_Register
    • String ID:
    • API String ID: 878851027-0
    • Opcode ID: 2aa50b52456933a7f656678efc06121d3b45dfadf587f4065a936d5d93dd3d59
    • Instruction ID: 88ad6182ced35b8d16633005081ff2d009f7fd94776e1b4ccaf01a724b04c38a
    • Opcode Fuzzy Hash: 2aa50b52456933a7f656678efc06121d3b45dfadf587f4065a936d5d93dd3d59
    • Instruction Fuzzy Hash: 9C3262766096C089DA72DB26A4507EEB7A1F799BD0F088111EBCD47BAADB3CC445CB01
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: std::_$Lockit$Facet_Lockit::_Lockit::~_Register
    • String ID:
    • API String ID: 878851027-0
    • Opcode ID: de6d0140e11fe5034402b96d49d641318218cdf513e4805170c559fba9fda33b
    • Instruction ID: 4334b2d6731cb2c92d059481db1bad3029907abb5cbb5d65f7f569d960259019
    • Opcode Fuzzy Hash: de6d0140e11fe5034402b96d49d641318218cdf513e4805170c559fba9fda33b
    • Instruction Fuzzy Hash: 81329276209BD485DA72CF26E0503EEBBA5F799BD0F088111EBD957BA9DB38C445CB00
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: Valid$InitializeLength$AuthorityCopyRequiredSecurity
    • String ID: @
    • API String ID: 3675658427-2328788274
    • Opcode ID: 13b996e590429cacfa25733084150d1326f374f3df9e85463b1f56c268df3ca7
    • Instruction ID: 8840cc2ff78aa68ce04bf614d35ad1f43d2ebde6d55aac3b0b5cf47f7f9bf176
    • Opcode Fuzzy Hash: 13b996e590429cacfa25733084150d1326f374f3df9e85463b1f56c268df3ca7
    • Instruction Fuzzy Hash: E7222BB2605E8582E761DB2AE45039E73A0F789BB4F458312EBB9437E5DF78C845C780
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
    • String ID:
    • API String ID: 1239891234-0
    • Opcode ID: b452193c1a726e5a153f0fda66400893445a65ab5c43022d6fc1d144f9b470e7
    • Instruction ID: 5ab1ace98d973d2c61399d052f67637f8a65f6cffa68e5360ba8d42150e6ecaa
    • Opcode Fuzzy Hash: b452193c1a726e5a153f0fda66400893445a65ab5c43022d6fc1d144f9b470e7
    • Instruction Fuzzy Hash: 82315B36214B8086EB61CF66E8403EE73A5F789798F54052AFB8D47BA8DF38C545CB00
    APIs
    • _invalid_parameter_noinfo.LIBCMT ref: 00000001400454AC
      • Part of subcall function 0000000140034CE0: IsProcessorFeaturePresent.KERNEL32(?,?,?,?,0000000140034F75), ref: 0000000140034CE9
      • Part of subcall function 0000000140034CE0: GetCurrentProcess.KERNEL32(?,?,?,?,0000000140034F75), ref: 0000000140034D0E
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: CurrentFeaturePresentProcessProcessor_invalid_parameter_noinfo
    • String ID: *$.$.$C:\Users\user\Desktop\3lOLt0TUE4.exe
    • API String ID: 4036615347-2802115526
    • Opcode ID: c009e349a145a249dc6b9d08f3bdec5f9e2c06d3726469bee2aa494ae9dd3382
    • Instruction ID: e2253a77b244eface347fc0b715fadd82f1304834761960bbb0d6286c2c6efbd
    • Opcode Fuzzy Hash: c009e349a145a249dc6b9d08f3bdec5f9e2c06d3726469bee2aa494ae9dd3382
    • Instruction Fuzzy Hash: 3351F172B11B1485FB12EBA7D8103ED37A0B748BD9F964925EF0D1BB96EA38C4428304
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: DebugDebuggerErrorLastOutputPresentString
    • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule$MZx
    • API String ID: 389471666-1466369552
    • Opcode ID: 14272c93465a4f83ebf7303f8390c378ec07a3553b7ffdc706b149d59c270c9c
    • Instruction ID: 13bff59ef44acf3a57119c98018217d18445bb8a14eb71a66d3b19ed1c104958
    • Opcode Fuzzy Hash: 14272c93465a4f83ebf7303f8390c378ec07a3553b7ffdc706b149d59c270c9c
    • Instruction Fuzzy Hash: BC11AC32210B80A7FB16DB27EA403E932A5FB48386F444029E70983AA0EF78D4B4C750
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: DescriptorSecurity$Dacl$ControlInformationInitialize_invalid_parameter_noinfo
    • String ID:
    • API String ID: 1177257891-0
    • Opcode ID: 12d77a2eedc4291097bdb8193906ad4b5aa31f9470b126b0a5fbd8435bec464f
    • Instruction ID: 2c67b213d3f321a145779a2d9abb25ecd4e5a131b40f0e9bbbec0380017ee0a2
    • Opcode Fuzzy Hash: 12d77a2eedc4291097bdb8193906ad4b5aa31f9470b126b0a5fbd8435bec464f
    • Instruction Fuzzy Hash: FE416EB2316A4145FB5BEB23B8157FA62A59B8DBC0F088038BF4E477B6DF38C5419241
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID:
    • String ID: (flags = 0x%x)$Histogram: %s recorded %d samples
    • API String ID: 0-1860478404
    • Opcode ID: addf4fd06b6d8822ab1e70227b4b45fb609eb714e2566f51c4b5348d0cffd109
    • Instruction ID: fe8a92417c3a9fcee806598b1e802e50bf88f744f0785638290ea864ff0ed106
    • Opcode Fuzzy Hash: addf4fd06b6d8822ab1e70227b4b45fb609eb714e2566f51c4b5348d0cffd109
    • Instruction Fuzzy Hash: E6F15A76304A8482EA11DB2AE05839EB761FB89FD8F504516EF8E07BB9CF39C945C740
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
    • String ID:
    • API String ID: 2933794660-0
    • Opcode ID: 115d615ad3d4a8c1cf2c51eaf74dd9ecc9ef062d0fc191d3f32c32f6fba14844
    • Instruction ID: a6bbe25f283b26d3ee7781465b7746a1965b7a986c9ac71e6d710a6a285a8412
    • Opcode Fuzzy Hash: 115d615ad3d4a8c1cf2c51eaf74dd9ecc9ef062d0fc191d3f32c32f6fba14844
    • Instruction Fuzzy Hash: 58112A32601F448AEB119F62EC583D933A4F75D798F581A25FB5D837A4DF38C1A48380
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: _invalid_parameter_noinfo
    • String ID: gfffffff
    • API String ID: 3215553584-1523873471
    • Opcode ID: d7f089267822a7d7c498ddd9cc78de30a48eb2309234509972d0e6ecb9ff54c4
    • Instruction ID: 077d0ac64fbe7df0fe57da7447584eacbf889f050b4e69444a95177c2bd889a9
    • Opcode Fuzzy Hash: d7f089267822a7d7c498ddd9cc78de30a48eb2309234509972d0e6ecb9ff54c4
    • Instruction Fuzzy Hash: C99145737057C486EB17CB2A94103EE6BA5E799BC4F468032EB59477A5EA3DC506C301
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID:
    • String ID: .$C:\Users\user\Desktop\3lOLt0TUE4.exe
    • API String ID: 0-591925995
    • Opcode ID: d4f832015fd176ee4aeaa909b131ce0476798d284691c4d6dcf782e53615dd94
    • Instruction ID: 34e17e5c7ae27c6c12b54a272270a67da56588a8c4166aa8caa9f6d246ee93ee
    • Opcode Fuzzy Hash: d4f832015fd176ee4aeaa909b131ce0476798d284691c4d6dcf782e53615dd94
    • Instruction Fuzzy Hash: 7531597271069089E761AF63A8047EABB90F398FE4F558635BF6917BD5CE3CC4018304
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: InfoLocaletry_get_function
    • String ID: GetLocaleInfoEx
    • API String ID: 2200034068-2904428671
    • Opcode ID: 12ef3ac6d0956768d989ed42a96e06b1939e9f3656ab2ed1898a7468755ec872
    • Instruction ID: 71d32cb82b3a1926ac18cfbf67ec8272d1323327aa96994b2e580eeafb5a75be
    • Opcode Fuzzy Hash: 12ef3ac6d0956768d989ed42a96e06b1939e9f3656ab2ed1898a7468755ec872
    • Instruction Fuzzy Hash: 23016935704B8082EB029B67B8407DAA761EB8DBC0F684526BF4917BBACF38C9418740
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: aebf8648d7ee3da799c4f541d254e1186d0b124807c91a44ae569beb0c557d06
    • Instruction ID: 01d3a463934a168e00f3390b1149be4eb49b74242ff690a1a72836b2a718fe1b
    • Opcode Fuzzy Hash: aebf8648d7ee3da799c4f541d254e1186d0b124807c91a44ae569beb0c557d06
    • Instruction Fuzzy Hash: 8AC1C27271868487DB72CF1AE18879BB7A1F3887C8F448125EB4A87B54D73CD941CB40
    APIs
      • Part of subcall function 000000014003DF34: GetLastError.KERNEL32(?,?,?,000000014002FD13,?,?,00000000,0000000140034FB0), ref: 000000014003DF3E
      • Part of subcall function 000000014003DF34: SetLastError.KERNEL32(?,?,?,000000014002FD13,?,?,00000000,0000000140034FB0), ref: 000000014003DFD7
    • GetLocaleInfoW.KERNEL32 ref: 0000000140044E4D
    • GetLocaleInfoW.KERNEL32 ref: 0000000140044E9F
    • GetLocaleInfoW.KERNEL32 ref: 0000000140044F66
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: InfoLocale$ErrorLast
    • String ID:
    • API String ID: 661929714-0
    • Opcode ID: c204252a773c87163fff4f0362213be6f0208685aaed122eb1322148d8a0f4f3
    • Instruction ID: f1de9223200c27af968db60780e83fc2b0075db97719c156028d2ce688342a37
    • Opcode Fuzzy Hash: c204252a773c87163fff4f0362213be6f0208685aaed122eb1322148d8a0f4f3
    • Instruction Fuzzy Hash: ED61AF7221064186EB368F26E5903D973A1F38C7C9F42813AFB9A876F5DB38D959C704
    APIs
    • _Init_thread_header.LIBCMT ref: 0000000140003719
    • GetProcessHeap.KERNEL32(?,?,?,?,00000001400044BD,?,?,?,00000001400046B1), ref: 0000000140003729
    • _Init_thread_header.LIBCMT ref: 000000014000376C
      • Part of subcall function 000000014002A160: EnterCriticalSection.KERNEL32(?,?,?,0000000140004BAD,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 000000014002A170
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: Init_thread_header$CriticalEnterHeapProcessSection
    • String ID:
    • API String ID: 1961180699-0
    • Opcode ID: ea7d4aa280539babd2439ac70b35f0a14f6da2330253ab1b0fcbbe8c39324500
    • Instruction ID: b1a7a9b823775a7ff0b0abd0f565b74e208dea8deb4b8e45dab32a2784a8e270
    • Opcode Fuzzy Hash: ea7d4aa280539babd2439ac70b35f0a14f6da2330253ab1b0fcbbe8c39324500
    • Instruction Fuzzy Hash: C0319FB4204A049AF603EB16FC913D9336AB76D796FA00A25F70D832B5DF78C959C740
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: _invalid_parameter_noinfo_noreturn
    • String ID: 8
    • API String ID: 3668304517-4194326291
    • Opcode ID: cd094b8745f7822e6cee6d102c0d711dda94fa4e21595a32246fdf589eb05285
    • Instruction ID: b2a42fad97facabcfdc3e8b4229c675377f070a9ec24647be01870069db31e2d
    • Opcode Fuzzy Hash: cd094b8745f7822e6cee6d102c0d711dda94fa4e21595a32246fdf589eb05285
    • Instruction Fuzzy Hash: 7642AEB3A21B8482EE528B56D5443AC63A4F799BE4F558725EB7E077E0EF35D290C300
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: _invalid_parameter_noinfo
    • String ID: C$U$_.,
    • API String ID: 3215553584-4113466154
    • Opcode ID: 3697b6e9065fedabf29f95a1d0b9fb91b062bd9b7abf63880ab349f7acdb9131
    • Instruction ID: 40eb6e07938e41d6686bdfa972585d962385e7bee0ee595ea1081590dc3b67ce
    • Opcode Fuzzy Hash: 3697b6e9065fedabf29f95a1d0b9fb91b062bd9b7abf63880ab349f7acdb9131
    • Instruction Fuzzy Hash: DFD19D32201A9096EB67CB26E491BDF73A0F78C7D4F508126FF8947AA4EB38D551CB00
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: ExceptionRaise_clrfp
    • String ID:
    • API String ID: 15204871-0
    • Opcode ID: b8432e4d214cab16cfb2bf6679ca1aae80b9e5a705a068ecbf0dd26367b68ee7
    • Instruction ID: c460a78c2965215d35bee289a5656983ccaf5fb8ee74277a9e76be3a7fe63068
    • Opcode Fuzzy Hash: b8432e4d214cab16cfb2bf6679ca1aae80b9e5a705a068ecbf0dd26367b68ee7
    • Instruction Fuzzy Hash: 7DB13077610B448BEB16CF2AC88679C77A0F388B88F168925EB5D877B4CB39D451C704
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID:
    • String ID: utf-8$utf8
    • API String ID: 0-782216586
    • Opcode ID: 978d04cd92163e68937c9480117004e58a46cd15dd6386bf0436826f11b4dd9f
    • Instruction ID: e9297553737458bfa032fdbe21df2a31fe1b49ef2ee594be4f30ce70a75b312a
    • Opcode Fuzzy Hash: 978d04cd92163e68937c9480117004e58a46cd15dd6386bf0436826f11b4dd9f
    • Instruction Fuzzy Hash: FE71E33671479542FB6B9BB7A5227EB6391F7887C4F509026BF4A47AE9DB38C401C600
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: _invalid_parameter_noinfo
    • String ID: U$_.,
    • API String ID: 3215553584-1203667853
    • Opcode ID: e9e4d7ea6193ea173a39a13d78a613238c3576ed98a9238de90d494753d2b3fa
    • Instruction ID: 04431c00e84afd95eb1178677b969e772501119a817e1cfb62a7e157e173de4d
    • Opcode Fuzzy Hash: e9e4d7ea6193ea173a39a13d78a613238c3576ed98a9238de90d494753d2b3fa
    • Instruction Fuzzy Hash: 93411232600A9056FB7BCB67E8A1BDB63A1F78C7D4F444526BF49076A5EF38C6458700
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: Info
    • String ID:
    • API String ID: 1807457897-0
    • Opcode ID: c4460a703a5c82801f327fd0d8c12fc3a24cb7ecc4907b1ad99c6689b4c168ad
    • Instruction ID: 28e5d708f86b046eca387909a1eeb9c83e8f378084fb12c0d7a1723b202ac3b8
    • Opcode Fuzzy Hash: c4460a703a5c82801f327fd0d8c12fc3a24cb7ecc4907b1ad99c6689b4c168ad
    • Instruction Fuzzy Hash: B1029B32A09BC086E752CF3AD4553EE73A4F75D788F459226EB8883662EB35D6C5C700
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: e11331c0f7b0de21d87e3997c2057673ff42dd0b78d24890b965fd2c86d00f64
    • Instruction ID: da9e90e54c6406e99383d0488136bfa8116d4b0103085308ed5267d2dce82ac5
    • Opcode Fuzzy Hash: e11331c0f7b0de21d87e3997c2057673ff42dd0b78d24890b965fd2c86d00f64
    • Instruction Fuzzy Hash: 08E12176700B8085E722DB62E4417EE37A4F7997C8F414A26AF5D577A6EF38C249D300
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1817403285.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: _clrfp
    • String ID:
    • API String ID: 3618594692-0
    • Opcode ID: b2614b7e1b0189ae345bd4c1d95b1b808051b71dd771fb59e21b33d23e549fbc
    • Instruction ID: c80435e8494229a43a5fffd4d6288923b7ccbb2c72bf2b8950da5cc93c6173a1
    • Opcode Fuzzy Hash: b2614b7e1b0189ae345bd4c1d95b1b808051b71dd771fb59e21b33d23e549fbc
    • Instruction Fuzzy Hash: EDB18931610A4DCFDB99CF1CC88AB6677E0FF59304F18959AE869CB262C339D852CB05
    APIs
      • Part of subcall function 000000014003DF34: GetLastError.KERNEL32(?,?,?,000000014002FD13,?,?,00000000,0000000140034FB0), ref: 000000014003DF3E
      • Part of subcall function 000000014003DF34: SetLastError.KERNEL32(?,?,?,000000014002FD13,?,?,00000000,0000000140034FB0), ref: 000000014003DFD7
    • GetLocaleInfoW.KERNEL32 ref: 0000000140045128
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: ErrorLast$InfoLocale
    • String ID:
    • API String ID: 3736152602-0
    • Opcode ID: 64a676d30c5538ac30c42c6a960a82695894d88443eeb02e983a2a47c0e9bb73
    • Instruction ID: b60c7d9e43adfc0e96cc9b42baa4256d00f1f4af276eaba2ee17b3d07a81f0d6
    • Opcode Fuzzy Hash: 64a676d30c5538ac30c42c6a960a82695894d88443eeb02e983a2a47c0e9bb73
    • Instruction Fuzzy Hash: BA31A07231468186EB2AEB23E4513DA73A1F78C7C6F458139BB4A873B6DB38D951C700
    APIs
      • Part of subcall function 000000014003DF34: GetLastError.KERNEL32(?,?,?,000000014002FD13,?,?,00000000,0000000140034FB0), ref: 000000014003DF3E
      • Part of subcall function 000000014003DF34: SetLastError.KERNEL32(?,?,?,000000014002FD13,?,?,00000000,0000000140034FB0), ref: 000000014003DFD7
    • EnumSystemLocalesW.KERNEL32(?,?,?,0000000140044B0B), ref: 0000000140044DA6
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: ErrorLast$EnumLocalesSystem
    • String ID:
    • API String ID: 2417226690-0
    • Opcode ID: b874de089d8b916dca863298a54351e0a382e0a1a50e2333e8cb51a8d322e9ee
    • Instruction ID: 6a9b6fff6bac6e3b88f0aef6cd7cec4e9e0bc20301a9c130c683a048d487afec
    • Opcode Fuzzy Hash: b874de089d8b916dca863298a54351e0a382e0a1a50e2333e8cb51a8d322e9ee
    • Instruction Fuzzy Hash: 5A1106B7A046448AEB168F16D4803EC77A1F398FE4F458125E725433E0DB34C5D1C740
    APIs
      • Part of subcall function 000000014003DF34: GetLastError.KERNEL32(?,?,?,000000014002FD13,?,?,00000000,0000000140034FB0), ref: 000000014003DF3E
      • Part of subcall function 000000014003DF34: SetLastError.KERNEL32(?,?,?,000000014002FD13,?,?,00000000,0000000140034FB0), ref: 000000014003DFD7
    • GetLocaleInfoW.KERNEL32 ref: 000000014004523D
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: ErrorLast$InfoLocale
    • String ID:
    • API String ID: 3736152602-0
    • Opcode ID: f2ccbd1d4dfeb7a0f20c9447ecd23894780dc1affbab8a383636f8e0d6df1a65
    • Instruction ID: 1f8081382046405dc1d65548bc78fa479e1aa2f6d29be4dcf940a41c361a5a78
    • Opcode Fuzzy Hash: f2ccbd1d4dfeb7a0f20c9447ecd23894780dc1affbab8a383636f8e0d6df1a65
    • Instruction Fuzzy Hash: A321BE32214A818AEB22EF22E8413D933A1F38DBC5F854136FB4987366DB38D511CB00
    APIs
      • Part of subcall function 000000014003DF34: GetLastError.KERNEL32(?,?,?,000000014002FD13,?,?,00000000,0000000140034FB0), ref: 000000014003DF3E
      • Part of subcall function 000000014003DF34: SetLastError.KERNEL32(?,?,?,000000014002FD13,?,?,00000000,0000000140034FB0), ref: 000000014003DFD7
    • GetLocaleInfoW.KERNEL32(?,?,?,0000000140044FE4), ref: 000000014004539F
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: ErrorLast$InfoLocale
    • String ID:
    • API String ID: 3736152602-0
    • Opcode ID: 0f1f5c272739da45f03698522d766ea31d23f7546ba83fa7e85e600b54ff1951
    • Instruction ID: 9354cfc18fa9c48870e24b7c2c6b362ed95af0148e089eb09ca7dd1f57cf14d1
    • Opcode Fuzzy Hash: 0f1f5c272739da45f03698522d766ea31d23f7546ba83fa7e85e600b54ff1951
    • Instruction Fuzzy Hash: F9114C3261459482E766AF23D0407EE22A1E388BE7F554532FB26477E6D675C9818704
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: EnumLocalesSystem
    • String ID:
    • API String ID: 2099609381-0
    • Opcode ID: 14372d48a1652f84cc00f4219de4d6aac04428eeebca81ac7541f1d4c8695c10
    • Instruction ID: 9c7bded7325398d7d455f30185e52bc959eb35c322dc9b428cf19d75dced7e1b
    • Opcode Fuzzy Hash: 14372d48a1652f84cc00f4219de4d6aac04428eeebca81ac7541f1d4c8695c10
    • Instruction Fuzzy Hash: 2C015772714B4482E705DB26E8903DA73A2E79CBC0F548126FB4957779DE3CC8558780
    APIs
      • Part of subcall function 000000014003DF34: GetLastError.KERNEL32(?,?,?,000000014002FD13,?,?,00000000,0000000140034FB0), ref: 000000014003DF3E
      • Part of subcall function 000000014003DF34: SetLastError.KERNEL32(?,?,?,000000014002FD13,?,?,00000000,0000000140034FB0), ref: 000000014003DFD7
    • EnumSystemLocalesW.KERNEL32(?,?,?,0000000140044AC7), ref: 00000001400450A8
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: ErrorLast$EnumLocalesSystem
    • String ID:
    • API String ID: 2417226690-0
    • Opcode ID: 7cb256954bbe78e7548afe37c9f598bef31b6951fa3e8e5cd53e6db253b308d8
    • Instruction ID: ad41d8708550984db28ee92cd2034e7700f59557bfe88d30ad1fc60c0df5b5ac
    • Opcode Fuzzy Hash: 7cb256954bbe78e7548afe37c9f598bef31b6951fa3e8e5cd53e6db253b308d8
    • Instruction Fuzzy Hash: 1A0147767002808AE7126F27E8407DA76E2E748BE6F428332E724472E6DB35C880C744
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: _invalid_parameter_noinfo
    • String ID: 0
    • API String ID: 3215553584-4108050209
    • Opcode ID: d9185aa07112d9a397941b7a65cc466e270287a2d1db34efb85fca043499bcac
    • Instruction ID: d2144be35f16c4ee13989f4b748e251055a33fdb26aafc76b09d5dcef4449e4b
    • Opcode Fuzzy Hash: d9185aa07112d9a397941b7a65cc466e270287a2d1db34efb85fca043499bcac
    • Instruction Fuzzy Hash: 5661C03530464186FB6B8A6B90403EF67D1A7CEBC8F581916FF419B6FACB35C8868741
    APIs
    • GetLastError.KERNEL32 ref: 000000014003F421
      • Part of subcall function 000000014003F304: HeapAlloc.KERNEL32(?,?,00000000,000000014003E0F6,?,?,?,0000000140034629,?,?,?,?,000000014003D87A,?,?,00000000), ref: 000000014003F359
      • Part of subcall function 000000014003DD34: HeapFree.KERNEL32(?,?,?,000000014004391B,?,?,?,00000001400434C3,?,?,?,0000000140043E10,?,?,?,0000000140043D1B), ref: 000000014003DD4A
      • Part of subcall function 000000014003DD34: GetLastError.KERNEL32(?,?,?,000000014004391B,?,?,?,00000001400434C3,?,?,?,0000000140043E10,?,?,?,0000000140043D1B), ref: 000000014003DD5C
      • Part of subcall function 0000000140048DB4: _invalid_parameter_noinfo.LIBCMT ref: 0000000140048DE2
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: ErrorHeapLast$AllocFree_invalid_parameter_noinfo
    • String ID:
    • API String ID: 916656526-0
    • Opcode ID: a3cec2b28e1aa257cd2e5574e980ce52070b7ce858f97940b60499b01ef453c4
    • Instruction ID: 43cd58880e768521110e6309741aff83a8c5d5cd14caf30911540818398961f5
    • Opcode Fuzzy Hash: a3cec2b28e1aa257cd2e5574e980ce52070b7ce858f97940b60499b01ef453c4
    • Instruction Fuzzy Hash: 0E419031301A8242FA739E27A851BFBA791BB9DBC0F444525BF4947BE6DE3CC505A700
    Memory Dump Source
    • Source File: 00000000.00000002.1817403285.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_3lOLt0TUE4.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 33f1da026cedb8bb4c154c58f95936b4a0e13185094ee08358de1f6eed02a0cf
    • Instruction ID: ba832315f60bfe01f78e135ab607fabacc940a44a85b0e34bee37f325de42116
    • Opcode Fuzzy Hash: 33f1da026cedb8bb4c154c58f95936b4a0e13185094ee08358de1f6eed02a0cf
    • Instruction Fuzzy Hash: 68F19732668F1C079728EE9DAC8E2B573C2D3E8722F4A437F9805D3265DD75AC8185C6
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 03d564e2b74aa32b693c35aacfbc297a91a2dcb490c9579aa42c28f1748b5c47
    • Instruction ID: f261b2cfc3b8da4730995c8c31609a819ad6049ffb89d2880c2c31b5664bb443
    • Opcode Fuzzy Hash: 03d564e2b74aa32b693c35aacfbc297a91a2dcb490c9579aa42c28f1748b5c47
    • Instruction Fuzzy Hash: 8722B1B7F2415047D31CCF69EC42E9A7692F7E4748B89D128DB06D3F08E93DEA168A44
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: e05e5622fff88cd8dcc88363a90415e03d0231f8b5d6bcc2e7f476e7ac88c9da
    • Instruction ID: 3eaa9111eca2a033ce1543174c22640db4d918014b2af92e71b3a4345db54def
    • Opcode Fuzzy Hash: e05e5622fff88cd8dcc88363a90415e03d0231f8b5d6bcc2e7f476e7ac88c9da
    • Instruction Fuzzy Hash: CE422E31525F4889E663DB37A8357967728BB5A3C2F818303FE4A77A71DB3AD4428700
    Memory Dump Source
    • Source File: 00000000.00000002.1817403285.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_3lOLt0TUE4.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 724192d415810ac4f34237431d09bd2ecc20d27c57fa4998346b62a5e3d6f42c
    • Instruction ID: 552ee4f71a8be2f15d39a9fb372ab8504bfcda2e79b68cea8d5aa1bc6b814482
    • Opcode Fuzzy Hash: 724192d415810ac4f34237431d09bd2ecc20d27c57fa4998346b62a5e3d6f42c
    • Instruction Fuzzy Hash: 53C15B3282DF644AD3279F7D98812E6F3E4FFD9319F41872AD9C5A3060DB3864478286
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: Concurrency::cancel_current_task
    • String ID:
    • API String ID: 118556049-0
    • Opcode ID: 7d68bc6bf42f81b163c14409fa430129394e9f4b49efbe72a0f3e1f7b7919d75
    • Instruction ID: c23b2f8605ce77865fd8eca59e4c52f58e0637ccf5fc140646b78fe76c822a39
    • Opcode Fuzzy Hash: 7d68bc6bf42f81b163c14409fa430129394e9f4b49efbe72a0f3e1f7b7919d75
    • Instruction Fuzzy Hash: A8F17363D24BD482E711CB29D9007F86760F7ADB98F15E315EF6A137A2EB75A2D18300
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 1b87a718667909f6521cf663e20e1afefa7280e59d9047530e69ff38576f4387
    • Instruction ID: b114a49d2efadab1ae8ef0229d4c509ef51cef604c18844825b472bfb3120bf1
    • Opcode Fuzzy Hash: 1b87a718667909f6521cf663e20e1afefa7280e59d9047530e69ff38576f4387
    • Instruction Fuzzy Hash: B6E11393D24FD482F701CF2989007E86760F7EABD8F55A308DF99133A6DB79A695C240
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: a48ac8054aa67be7bfd890edce459658a7d96b5f006aee6d1443f3813cf500f5
    • Instruction ID: 78fa1d0389ac902604521bf60ea3c097077983ceb04c330fe09852acf3d8aaa9
    • Opcode Fuzzy Hash: a48ac8054aa67be7bfd890edce459658a7d96b5f006aee6d1443f3813cf500f5
    • Instruction Fuzzy Hash: C1C18D32304B9486E7769A17D4087AE77A6F349BC4F580029FF8E4BBA5CB39C985D300
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: ErrorLast$CurrentFeaturePresentProcessProcessortry_get_function
    • String ID:
    • API String ID: 3790591341-0
    • Opcode ID: 7edd881d4be8a13f44d5f6aa40e1782afd083a500a278d412750523e2058b5f3
    • Instruction ID: 1503339e08ada572e4c723e1fa5b92f2024c1875ebdcd176f11bbe18d9b670ba
    • Opcode Fuzzy Hash: 7edd881d4be8a13f44d5f6aa40e1782afd083a500a278d412750523e2058b5f3
    • Instruction Fuzzy Hash: 90A1D23261069482EB66EF33D411BEA3391F788BCCF518235BF4587AEADB38C9518744
    Memory Dump Source
    • Source File: 00000000.00000002.1817403285.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_3lOLt0TUE4.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 4e6b58e5a89bf5cdf24951cf629520558a61642b70cf246aec3f524e75493717
    • Instruction ID: 81878882f838a7c71bfcd71a9427000161ba3efb37b033e1f2411dee7fd754be
    • Opcode Fuzzy Hash: 4e6b58e5a89bf5cdf24951cf629520558a61642b70cf246aec3f524e75493717
    • Instruction Fuzzy Hash: 6061E531A293894B930DC91D9C864517B92EAA651937CC3ECCDD28F387E862F517C3D2
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 1aef237ae5a4f47ce23a2d7149d4205e725aae9d2895f165d36055238af7eab5
    • Instruction ID: c96c1e92399dc4ff530452948c69ed0ea770b934022747f0d9713e5808f975b6
    • Opcode Fuzzy Hash: 1aef237ae5a4f47ce23a2d7149d4205e725aae9d2895f165d36055238af7eab5
    • Instruction Fuzzy Hash: 3B712572F17A9442EA17863A44027E46A91AFD67F0F46C712EE383B7E6E736D1418300
    Memory Dump Source
    • Source File: 00000000.00000002.1817403285.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_3lOLt0TUE4.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 63e4cd470e5335410284ca3e833719b72024060eaaa31e98f07d66ec036bdbde
    • Instruction ID: 34ad47e74f1ccfb71a9995f93287e9bff7a02906dd33a4a2ec043376cb3b1107
    • Opcode Fuzzy Hash: 63e4cd470e5335410284ca3e833719b72024060eaaa31e98f07d66ec036bdbde
    • Instruction Fuzzy Hash: 22510910F1C7844BDB395B2C485427B36A1EB95328F1942BBE446F23D2D93C7E42965F
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: dfec977527b5bcc444f809b3d51313d185a825bce9d59066c9c2fee62b3e45b9
    • Instruction ID: 2288c0f7a9d0da9ce16da8606a03351df7758a3cfb5be3452c1ae86280c5cc37
    • Opcode Fuzzy Hash: dfec977527b5bcc444f809b3d51313d185a825bce9d59066c9c2fee62b3e45b9
    • Instruction Fuzzy Hash: 9B6183736186848BE735CF2AE44039ABBA0E359384F44412DFB8EC7BA2D67CD9458B05
    Memory Dump Source
    • Source File: 00000000.00000002.1817403285.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_3lOLt0TUE4.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: f1cb0376d5f4543bb8137eeff6a4ca7b4a3039c8d8bd8826e253d9a000427cd9
    • Instruction ID: dd5ab14a278209c2a8eb9a9065036ab52eaa82f327a7141319c9eec701cba398
    • Opcode Fuzzy Hash: f1cb0376d5f4543bb8137eeff6a4ca7b4a3039c8d8bd8826e253d9a000427cd9
    • Instruction Fuzzy Hash: 53510DB28183058F8308CF19C882126FBE5FB8A714B15855EE9D697212D731F9538FC2
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: AllocHeap
    • String ID:
    • API String ID: 4292702814-0
    • Opcode ID: d34cce4d7287b7d75e27684d7a43430cb5af39a04496c1d52e288c822b004839
    • Instruction ID: 82aaf97a0ef8cb6b6cdd5268e39beda681071c869067a888d23555b72fb9981a
    • Opcode Fuzzy Hash: d34cce4d7287b7d75e27684d7a43430cb5af39a04496c1d52e288c822b004839
    • Instruction Fuzzy Hash: B351B232711A5482EB66CF26D5D53AE33A4F789BD8F518A16EF1E97AA5CF38C051C300
    Memory Dump Source
    • Source File: 00000000.00000002.1817403285.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_3lOLt0TUE4.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 0710a6d56e74f75e4f2d76c0792897e09a389baafeaf9ef38ca3dee3c678baf7
    • Instruction ID: 95f53bcb3013ffc607570205fa4a55d7e593650cec09bf4caffca84637faaae4
    • Opcode Fuzzy Hash: 0710a6d56e74f75e4f2d76c0792897e09a389baafeaf9ef38ca3dee3c678baf7
    • Instruction Fuzzy Hash: C84182B69683048F830CDF14C883422B7E4FB8A719B25C56DD9D64B202DB31F953DAC2
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 2447063f7cd4f98a0ae3ed48a6a75841ce19c8fdd0e5f0f292fdbffb0ceb1534
    • Instruction ID: 6b9b02058375bcecfbb59437eb0cb2d39f611623c4381441f130834f492fd430
    • Opcode Fuzzy Hash: 2447063f7cd4f98a0ae3ed48a6a75841ce19c8fdd0e5f0f292fdbffb0ceb1534
    • Instruction Fuzzy Hash: 5C41B372310B4482EF45DF6BDA2439AB3A2E74CFD4F499426EF0D97B68DA38C5458340
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: _invalid_parameter_noinfo
    • String ID:
    • API String ID: 3215553584-0
    • Opcode ID: 5bab3a6beb5876d68e17d7876697978282b9db638857d2baeaccf3ee70fe3890
    • Instruction ID: 71d1b069d77aa432aa2a9583704c86dbaa2ddd7b6448a706519fc493aff1ed2a
    • Opcode Fuzzy Hash: 5bab3a6beb5876d68e17d7876697978282b9db638857d2baeaccf3ee70fe3890
    • Instruction Fuzzy Hash: 0E31B33B7202A047F37ADAB77922FDB2251B7883D4F5496297F9507D95CB3CC0528A00
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: d7670e76163cd66883b4efc7e3c17b4edb03b89a1b82b7a62a75a7081b0b7ba9
    • Instruction ID: b09f4ae942ec73054a9de2b8787de49b9a5ec8876b679cd0ee3400aa84bbbdff
    • Opcode Fuzzy Hash: d7670e76163cd66883b4efc7e3c17b4edb03b89a1b82b7a62a75a7081b0b7ba9
    • Instruction Fuzzy Hash: 78319273E1003147E7BA533E68157B965C157987D4F4A872AEE19E32E0E525CD52E2C0
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: f98b334728c508f8a9d96360c225ff665e2112f8fbde2b6107ec001dc329bfa3
    • Instruction ID: 37e2c45ad4b60748a68cc4d80484d22f4ed56dc5a2df46cdb1c8efd71eb9c72b
    • Opcode Fuzzy Hash: f98b334728c508f8a9d96360c225ff665e2112f8fbde2b6107ec001dc329bfa3
    • Instruction Fuzzy Hash: E741E4726182108AFB669F27F8457CA3A91F35C3D0F61882DFB5D876B0E778C8508B40
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: ErrorLasttry_get_function$CurrentFeaturePresentProcessProcessor
    • String ID:
    • API String ID: 3433887101-0
    • Opcode ID: b3232d7d03fea3ec08f031af25467d18b9ad2a1cfc87cfbb60455cb53af29ac8
    • Instruction ID: 76ea5f5a28b968cc35811154b2a1651ede0a9e78d64fec79c2efac54d397a43f
    • Opcode Fuzzy Hash: b3232d7d03fea3ec08f031af25467d18b9ad2a1cfc87cfbb60455cb53af29ac8
    • Instruction Fuzzy Hash: 4241D432214AC442EB62DB22E8117DA2360F78CBD8F514325BF69477D9CF38C552C740
    Memory Dump Source
    • Source File: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 1b2540150fab47bdc3bb884613f5a7273d42d65200fa140bbed8dbff9215ffa4
    • Instruction ID: 5ee309807ff80ba20bd5b14fe7370d8625deebd74df5ac24a86580155dad0fa2
    • Opcode Fuzzy Hash: 1b2540150fab47bdc3bb884613f5a7273d42d65200fa140bbed8dbff9215ffa4
    • Instruction Fuzzy Hash: C63138376143E04BE36A8BB6A512BCB3761F7897D4F58C229AF9507D96C73C8412CA00
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 0853de7745177a4f017aa76284a316cc91dc138732e4886c0a652ba30e32a584
    • Instruction ID: 03023baf41d7edfaf3de9d77937d8966f826a7d2a1c982761b8fdeb6e43aa32e
    • Opcode Fuzzy Hash: 0853de7745177a4f017aa76284a316cc91dc138732e4886c0a652ba30e32a584
    • Instruction Fuzzy Hash: FA11823672015883F77ED677B166BAB2352A7993C4F14D515BB420BDA6CF3CD0514A04
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 165a5aa6dccafd6047d2a19d3efdb2a52f476aa11013381039673b76e21ff959
    • Instruction ID: 6e7bc2ce785c34fe49913341867df66185ac30375d8a1be741251f17b1d54bbb
    • Opcode Fuzzy Hash: 165a5aa6dccafd6047d2a19d3efdb2a52f476aa11013381039673b76e21ff959
    • Instruction Fuzzy Hash: F6014F33D201B046DB91EB7E8C48B8A67A1E7C9741FAB8721EF4863754D6399D42D3E0
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 276a3b3fb41928333db733a9fe7fa8fe356879d2fbec6fbca3a46653d126ea2f
    • Instruction ID: a9fff9e572b526238a7215ab704cb81dcd9280e85d4663171c42906c161b0720
    • Opcode Fuzzy Hash: 276a3b3fb41928333db733a9fe7fa8fe356879d2fbec6fbca3a46653d126ea2f
    • Instruction Fuzzy Hash: 87012133D101B046DB91EB6A9C48B9A67A1E7C9345FA68322DF4863754D2359D42D3D0
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 9869b9370ae91ce55583a1c2da905f5353009ac5ccd9dda881d43b69f60637a5
    • Instruction ID: 799ae78e7d9203150839d317021f4b36836e0ee54ce60c27f15aa25c60bd6efc
    • Opcode Fuzzy Hash: 9869b9370ae91ce55583a1c2da905f5353009ac5ccd9dda881d43b69f60637a5
    • Instruction Fuzzy Hash: 17F012717156948ADBA58F29E842B5977D5E35C3C4F908429E68983F14D63C84618F04
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 002b5c2c0288fd80eb61bc9a6a559af48a8bceda51e53035310ef369e694fd57
    • Instruction ID: f7ca0a4b05b8661b9d616c23098a5898cd8f1a7098825a504a12a71ffc6f1302
    • Opcode Fuzzy Hash: 002b5c2c0288fd80eb61bc9a6a559af48a8bceda51e53035310ef369e694fd57
    • Instruction Fuzzy Hash: 1EA00231506C45E4E7469B43EC603D02331F798381F540416F30D434B09B388880D301
    APIs
    • try_get_function.LIBVCRUNTIME ref: 000000014003EED3
    • try_get_function.LIBVCRUNTIME ref: 000000014003EEF2
      • Part of subcall function 000000014003F014: GetProcAddress.KERNEL32(?,?,0000000100000008,000000014003EAD2,?,?,?,000000014003E0E3,?,?,?,0000000140034629), ref: 000000014003F16C
    • try_get_function.LIBVCRUNTIME ref: 000000014003EF11
      • Part of subcall function 000000014003F014: LoadLibraryExW.KERNEL32(?,?,0000000100000008,000000014003EAD2,?,?,?,000000014003E0E3,?,?,?,0000000140034629), ref: 000000014003F0B7
      • Part of subcall function 000000014003F014: GetLastError.KERNEL32(?,?,0000000100000008,000000014003EAD2,?,?,?,000000014003E0E3,?,?,?,0000000140034629), ref: 000000014003F0C5
      • Part of subcall function 000000014003F014: LoadLibraryExW.KERNEL32(?,?,0000000100000008,000000014003EAD2,?,?,?,000000014003E0E3,?,?,?,0000000140034629), ref: 000000014003F107
    • try_get_function.LIBVCRUNTIME ref: 000000014003EF30
      • Part of subcall function 000000014003F014: FreeLibrary.KERNEL32(?,?,0000000100000008,000000014003EAD2,?,?,?,000000014003E0E3,?,?,?,0000000140034629), ref: 000000014003F140
    • try_get_function.LIBVCRUNTIME ref: 000000014003EF4F
    • try_get_function.LIBVCRUNTIME ref: 000000014003EF6E
    • try_get_function.LIBVCRUNTIME ref: 000000014003EF8D
    • try_get_function.LIBVCRUNTIME ref: 000000014003EFAC
    • try_get_function.LIBVCRUNTIME ref: 000000014003EFCB
    • try_get_function.LIBVCRUNTIME ref: 000000014003EFEA
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: try_get_function$Library$Load$AddressErrorFreeLastProc
    • String ID: AreFileApisANSI$CompareStringEx$EnumSystemLocalesEx$GetDateFormatEx$GetLocaleInfoEx$GetTimeFormatEx$GetUserDefaultLocaleName$IsValidLocaleName$LCIDToLocaleName$LCMapStringEx$LocaleNameToLCID
    • API String ID: 3255926029-3252031757
    • Opcode ID: fcd4ac423e6f245f02eb0176da032fa2d8cb0e32db2b45cc89ac797d78cb2b26
    • Instruction ID: 306b3782ebd619ac6c314cacb11e0fe4983a5a6809e35d95b1e80edf744f0b4b
    • Opcode Fuzzy Hash: fcd4ac423e6f245f02eb0176da032fa2d8cb0e32db2b45cc89ac797d78cb2b26
    • Instruction Fuzzy Hash: CC314E78100A4AA1FA0BEF5AE851BF523A1E74E3C4FC05027B319171B6DF7E8649E391
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: Dload$Section$FunctionLockPointers$AccessWrite$ExceptionProtectRaiseRelease$AcquireErrorLastLibraryLoad
    • String ID: H$MZx
    • API String ID: 3582658894-3879308991
    • Opcode ID: 007f62e25ecfeaaea0e6bda599372a2bddc6bd666008d629e1e7a21ff3617a5e
    • Instruction ID: f057c435e7340d4ec6e569f62102e1389f3594af5a3802b17ade9c28a301cf6e
    • Opcode Fuzzy Hash: 007f62e25ecfeaaea0e6bda599372a2bddc6bd666008d629e1e7a21ff3617a5e
    • Instruction Fuzzy Hash: FD810832601B908AEB16DFA6E8843EC37A1B70CBD8F584429EF0957B64EB38D854C700
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: AddressProc$HandleModule$CountCreateCriticalEventInitializeSectionSpin
    • String ID: InitializeConditionVariable$SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
    • API String ID: 2179320429-1714406822
    • Opcode ID: f37d6bd26b8c1fb83fc5010bf1376ca8297aeebccbf8dbfc0064af4dce9d0f86
    • Instruction ID: a8cccffb675cb33f0988eae76eb40573b7ba90736cf9b37c37970a34ad66b910
    • Opcode Fuzzy Hash: f37d6bd26b8c1fb83fc5010bf1376ca8297aeebccbf8dbfc0064af4dce9d0f86
    • Instruction Fuzzy Hash: 22314E31201B0092FB169B26EC203D562A2AB8E7E1F591539AB1E477B4EF3CC949C214
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: Current$CountLocalProcessThreadTickTime_invalid_parameter_noinfo_noreturn
    • String ID: )] $../../chrome/elevation_service/elevation_service.cc$UNKNOWN$VERBOSE
    • API String ID: 1965730521-3791372713
    • Opcode ID: ceaf304e6cd5f3d46827d0923e8794e12d8c966c9a6fb709b4d84510979ab2ce
    • Instruction ID: 62dee3e82d7878e802802f88dcc8813efdf0bc3b05f5930420827d9e3e7340c5
    • Opcode Fuzzy Hash: ceaf304e6cd5f3d46827d0923e8794e12d8c966c9a6fb709b4d84510979ab2ce
    • Instruction Fuzzy Hash: 0AA18FB1711A4085FB06EB27E4A53ED2762AB8DBD8F448522FF1E477EADE38C0458350
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: Service$ErrorLastStatus$CtrlHandlerInitializeRegister
    • String ID: ../../chrome/elevation_service/service_main.cc$ChromeElevationService$Failed to initialize COM$RegisterServiceCtrlHandler failed
    • API String ID: 790579533-4046687200
    • Opcode ID: 325acf9a4caa992a862e0918961f82431ae96fa13d2f7fb0caa50a1230d9a009
    • Instruction ID: b95ac3bdb0eba166568bb0667f234ee4227bc8a2bb0ee02ee8969bca477c3399
    • Opcode Fuzzy Hash: 325acf9a4caa992a862e0918961f82431ae96fa13d2f7fb0caa50a1230d9a009
    • Instruction Fuzzy Hash: 6C413DB131464192FA26EB13F8553EA6361EB8D7C4F444026FB8A5B7B6DF3DD1068740
    APIs
    • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 000000014001A16B
      • Part of subcall function 0000000140029F90: Concurrency::cancel_current_task.LIBCPMT ref: 0000000140029FC0
      • Part of subcall function 0000000140029F90: Concurrency::cancel_current_task.LIBCPMT ref: 0000000140029FC6
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: Concurrency::cancel_current_task$_invalid_parameter_noinfo_noreturn
    • String ID: bucket_count$count$high$low$max$min$type
    • API String ID: 4131450254-2045534459
    • Opcode ID: bdfd84f6c9701a05742d9f42e6b2b60650ba66744531afc889ef059b2ffd0ea8
    • Instruction ID: 00a089d2e0e7017a43a6167fab8010f5cc726159f026ab3c7ac1f563223f0f0e
    • Opcode Fuzzy Hash: bdfd84f6c9701a05742d9f42e6b2b60650ba66744531afc889ef059b2ffd0ea8
    • Instruction Fuzzy Hash: CA918A32304B4482EB11DB26E4943AA67A1F78DFE4F508225EF9E47BA5DF39C485C740
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: NameTranslatewcschr$CodePageValid
    • String ID: utf8
    • API String ID: 1874385749-905460609
    • Opcode ID: 729325e871a85ce5f2c7f5f9a08a93aa37d56540deb5dba6b0678be02ca46773
    • Instruction ID: 91ca68c8140d280e589dafe57849d4974e34aaebb9faccefc4bec3967a44f2f9
    • Opcode Fuzzy Hash: 729325e871a85ce5f2c7f5f9a08a93aa37d56540deb5dba6b0678be02ca46773
    • Instruction Fuzzy Hash: D151CF3230074081FB66AB63D8517EA22A1B79CBC8F465131FF1957AF6EB79C9858309
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: std::_$Lockit$Lockit::_Lockit::~_$ExceptionFacet_RegisterThrowmessagesstd::bad_alloc::bad_alloc
    • String ID:
    • API String ID: 3381189198-0
    • Opcode ID: 76f9ef5c71c659f5f1f4834e2380bb2eb9c93cbd527c1338830184b00ed651b8
    • Instruction ID: 4079047e60921d5a4eacd1bfc8b8e4361d38bb245703b034bb5fad8123e31231
    • Opcode Fuzzy Hash: 76f9ef5c71c659f5f1f4834e2380bb2eb9c93cbd527c1338830184b00ed651b8
    • Instruction Fuzzy Hash: 92416D36624B4082EA179F27E8447D96761E78CBE4F68862AFB5D077B5DF38C846C700
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: CloseExclusiveHandleLockRelease$CurrentExceptionThreadThrowValuestd::invalid_argument::invalid_argument
    • String ID: list<T> too long
    • API String ID: 145395645-4027344264
    • Opcode ID: d6598243f5ff30b940fcc3f9f6892aab7a4abc6ebcfddea3a599001563179127
    • Instruction ID: 65adc52f25f702c6738f59a48c7cf5a3cbcba261d426c5e1efcb01001d287612
    • Opcode Fuzzy Hash: d6598243f5ff30b940fcc3f9f6892aab7a4abc6ebcfddea3a599001563179127
    • Instruction Fuzzy Hash: 04B19C72700A8495EB66EB26E9583EA3365F74DBD4F844426EF0E4B7A5CF38C542C340
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: _invalid_parameter_noinfo
    • String ID:
    • API String ID: 3215553584-0
    • Opcode ID: e3ac1d5e9ed4ac32e6b2b018d04df1d6b42878273c6c0e31cb2b30b93033a7b7
    • Instruction ID: 0d02d609397cf1b9d86cea3a92651cd1bfcdac7a35410420e0fa887e54e635b9
    • Opcode Fuzzy Hash: e3ac1d5e9ed4ac32e6b2b018d04df1d6b42878273c6c0e31cb2b30b93033a7b7
    • Instruction Fuzzy Hash: 38C1E33260468085EB639F73E4403EE6BA1F749BC4F560125FB46077B5EB39C845CB46
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: CallCatchCheckEncodePointerRangeTranslatorTrys__vcrt_getptd_noexit
    • String ID: MOC$RCC
    • API String ID: 4033425306-2084237596
    • Opcode ID: a592995cad47d52b8a55b5ae00bc6bb7a67d97ae6ea27a47576e431a27d71624
    • Instruction ID: e005243617e2d577d383369f18f3e8e313041bdd80a419c96b328e72f09c6749
    • Opcode Fuzzy Hash: a592995cad47d52b8a55b5ae00bc6bb7a67d97ae6ea27a47576e431a27d71624
    • Instruction Fuzzy Hash: 77619E32204AC096EF26DF16E4807EEB7A1F788BC8F45451AEB4E83BA5CB38D555C701
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
    • String ID: CONOUT$
    • API String ID: 3230265001-3130406586
    • Opcode ID: 4ea95f97eb49aa4939c551ce902c7b59029855f23d7bcdc886ab8c16c7f1fbe5
    • Instruction ID: 7431b52f088fb401e1fafba6754282c5e9de66c85996500712331e5ea32af496
    • Opcode Fuzzy Hash: 4ea95f97eb49aa4939c551ce902c7b59029855f23d7bcdc886ab8c16c7f1fbe5
    • Instruction Fuzzy Hash: E511DA32310A808AE752AB03EC643A9A3A1F38CBE5F240224FB5D837A0CF7CC8148740
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: Length$AuthorityCopyInitializeRequiredValid
    • String ID:
    • API String ID: 4248086415-0
    • Opcode ID: e3aaf5f443248a1a9dd90b6a0cbbb8c135624ca7fff00c2903f63cbc039e7cc1
    • Instruction ID: f7fa9a91afe40eaa7d20bd4e56aa78bb325bce024222a2882c9da7ee39f737ea
    • Opcode Fuzzy Hash: e3aaf5f443248a1a9dd90b6a0cbbb8c135624ca7fff00c2903f63cbc039e7cc1
    • Instruction Fuzzy Hash: 7E319EB2228A8082EB52EB22F8547ED27A5F7887C4F854425EB4D836B2DF3CC449C744
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: File$Create$CurrentDirectoryModuleName
    • String ID: debug.log
    • API String ID: 4120427848-600467936
    • Opcode ID: eaa3c89e03e8743818b7a375fa252fb9b5b091f5f26922d95015675013321713
    • Instruction ID: a8f2bc9e107df9cbf680e32319cd50c561e540ba3bba38b9dfe580de22cd6908
    • Opcode Fuzzy Hash: eaa3c89e03e8743818b7a375fa252fb9b5b091f5f26922d95015675013321713
    • Instruction Fuzzy Hash: 13B19BB2215B4092EB12CB12EA087E96361F789BC0F544626EB5E477B4DF7CC5A5C380
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: strstr
    • String ID: Collections of all histograms$Collections of histograms for %s
    • API String ID: 1392478783-1894274736
    • Opcode ID: 6a38db52d99570661431df614d1fa76ae44420b2a1313d61ac28fdc1a10416c0
    • Instruction ID: 18e4c61fa57ab8a671a39e7e54fc26b3cce6352a8a8e3b227f1a3748e26862af
    • Opcode Fuzzy Hash: 6a38db52d99570661431df614d1fa76ae44420b2a1313d61ac28fdc1a10416c0
    • Instruction Fuzzy Hash: AD61BEB6210A8081EA12EF13E4543EA6760F78DBC8F889112FF4E1B7A5DF79C585E300
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: _invalid_parameter_noinfo_noreturn$CloseDeleteFileHandle
    • String ID: vmodule$]
    • API String ID: 4078075412-393197275
    • Opcode ID: 458a696ecc4fedc3ace4e094e4b0da3d2e40976a4df703997200a64392c106fe
    • Instruction ID: 70b8e51237148cc4a2868020af47202c104ebdf182741b3ce0aa73bd74b5f146
    • Opcode Fuzzy Hash: 458a696ecc4fedc3ace4e094e4b0da3d2e40976a4df703997200a64392c106fe
    • Instruction Fuzzy Hash: D35167B2711A4085FA06DB63E9543ED23A2B74DBD8F540925EB1E4BBF6DF38C5858340
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: AddressFreeHandleLibraryModuleProc
    • String ID: CorExitProcess$mscoree.dll
    • API String ID: 4061214504-1276376045
    • Opcode ID: 49bea8142319ea412d631d54bdbc5441e5c5eafe40cc1d3c0e68bffafd1ce3b8
    • Instruction ID: 221ae9ca5d134b3330b421e37d4866d1721bfc3384aff5dd226d045a44ca6bd2
    • Opcode Fuzzy Hash: 49bea8142319ea412d631d54bdbc5441e5c5eafe40cc1d3c0e68bffafd1ce3b8
    • Instruction Fuzzy Hash: 8CF01CB1322B40C1FF5B9B62E8943E92361AB8CBD1F581829B65F87674DF78C598C710
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: _invalid_parameter_noinfo
    • String ID:
    • API String ID: 3215553584-0
    • Opcode ID: 9ecc53bb1b7fb3251e6413e2f774571122fb093c472ca1a89e23a17bd22217c4
    • Instruction ID: ec43d4fcb8152318b520dce10abbfc58bde0a832cf4e73b347d60944a2479698
    • Opcode Fuzzy Hash: 9ecc53bb1b7fb3251e6413e2f774571122fb093c472ca1a89e23a17bd22217c4
    • Instruction Fuzzy Hash: 1781AB3262065099FB63AFA3A8803EE6BA1B74DBC6F544115FF0A57BB5DB34C842C710
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: _set_statfp
    • String ID:
    • API String ID: 1156100317-0
    • Opcode ID: 01032c4e6f80079aaa0163cc4061c76cee70a41106028d5f9ce773fb58371ca6
    • Instruction ID: c93827035d380859f71fab8edc66e6afb27ecf047f62f52f2aba1b16f40f4aba
    • Opcode Fuzzy Hash: 01032c4e6f80079aaa0163cc4061c76cee70a41106028d5f9ce773fb58371ca6
    • Instruction Fuzzy Hash: 1251E536514D4485F6239F3AE854BEA6361BB483E0F568629BF5E2B5F1DF34C481C608
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 8bcab97e30e5d3b5d3c175338324b60c8ccdc4847c939da449d9d1d1adbf1604
    • Instruction ID: 5f9026a8de8196ee3fb803fcd9051761d0f4207d4d701bcfddae4215b1a8463f
    • Opcode Fuzzy Hash: 8bcab97e30e5d3b5d3c175338324b60c8ccdc4847c939da449d9d1d1adbf1604
    • Instruction Fuzzy Hash: 754182B2715A8141FB5BEB23B8653EA16959B8DBC0F18C428BB4E4B7F3DE38D4418341
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: Value$ExclusiveInit_thread_headerLockRelease
    • String ID:
    • API String ID: 1047916916-0
    • Opcode ID: 869f4b7815926199aab956de5f2697b90f2fd38dee0eab01114aef5e23c1cdc1
    • Instruction ID: fb1ff2217132ca7b52c4bcc360608883e2caa67f68411662646c81ae60cebe06
    • Opcode Fuzzy Hash: 869f4b7815926199aab956de5f2697b90f2fd38dee0eab01114aef5e23c1cdc1
    • Instruction Fuzzy Hash: F941EF7130154086FA26EB13E9503EA7392E78EBE0F544625FF1A4B7B5DE39C981C780
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Register
    • String ID:
    • API String ID: 459529453-0
    • Opcode ID: 4812b73ae06796cef755c0ccbe3446291c9315d5754afe408e2765dd677ff2c6
    • Instruction ID: d492af4a1242d271393f1479aee684e523e94e5ca67f37b166736a0ad7114083
    • Opcode Fuzzy Hash: 4812b73ae06796cef755c0ccbe3446291c9315d5754afe408e2765dd677ff2c6
    • Instruction Fuzzy Hash: 94319C72205A4081FE26EB13E9553E973A1FB9CBD8F598026AB4D07BB5DF39C946D300
    APIs
    • TlsFree.KERNEL32(028B0830,00000204,?,000000014001D462,00000204,?,?,?,000000014001D755,?,?,00000000,000000014001D957), ref: 000000014001D600
    • TlsFree.KERNEL32(028B0830,00000204,?,000000014001D462,00000204,?,?,?,000000014001D755,?,?,00000000,000000014001D957), ref: 000000014001D61A
    • TlsGetValue.KERNEL32(028B0830,00000204,?,000000014001D462,00000204,?,?,?,000000014001D755,?,?,00000000,000000014001D957), ref: 000000014001D628
    • TlsSetValue.KERNEL32(?,?,000000014001D755,?,?,00000000,000000014001D957,?,?,?,?,00000000,028B0830,00000000,000000014001DAE2,00000000), ref: 000000014001D64D
    • TlsSetValue.KERNEL32(?,?,000000014001D755,?,?,00000000,000000014001D957,?,?,?,?,00000000,028B0830,00000000,000000014001DAE2,00000000), ref: 000000014001D676
      • Part of subcall function 00000001400267E0: TlsAlloc.KERNEL32(028B0830,00000204,?,000000014001D462,00000204,?,?,?,000000014001D755,?,?,00000000,000000014001D957), ref: 00000001400267E8
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: Value$Free$Alloc
    • String ID:
    • API String ID: 4173863045-0
    • Opcode ID: 260cda8b93150db8185e1c9eaacd02b936848e04ff169c4ecd2c53a06053427d
    • Instruction ID: 5ae05deffcb046404fc52b5cf309c4f92fcfc2c68e5336b39db370b7d2932cc4
    • Opcode Fuzzy Hash: 260cda8b93150db8185e1c9eaacd02b936848e04ff169c4ecd2c53a06053427d
    • Instruction Fuzzy Hash: BC31BF31B005404AF66AEBB289117ED33629B8C7E8F504618BF1E1FBE5DE388D068240
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: std::_$Lockit$Lockit::~_$Facet_GetctypeLockit::_Register
    • String ID:
    • API String ID: 1838228655-0
    • Opcode ID: 5731ed39b5e534b82a173c049f94d7171117b38f5231929d98a57f03d514fe09
    • Instruction ID: 13811ad3c4311a3ffd31fe86599d81dd74af767cb4f31c7ada50147cb5d8ed17
    • Opcode Fuzzy Hash: 5731ed39b5e534b82a173c049f94d7171117b38f5231929d98a57f03d514fe09
    • Instruction Fuzzy Hash: 8931CE72205A4081FB22EB22E5543EA73A1FB9CBC4F058119EB4D03BB6EF38C981D340
    APIs
    • GetSecurityDescriptorControl.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,000000014000480A), ref: 0000000140004855
    • GetSecurityDescriptorOwner.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,000000014000480A), ref: 0000000140004885
    • GetSecurityDescriptorGroup.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,000000014000480A), ref: 00000001400048A2
    • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,000000014000480A), ref: 00000001400048C4
    • GetSecurityDescriptorSacl.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,000000014000480A), ref: 00000001400048EF
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: DescriptorSecurity$ControlDaclGroupOwnerSacl
    • String ID:
    • API String ID: 1158139820-0
    • Opcode ID: f532b273829567dfbc9fe9c56d968e40025db91d5bb5eb4e446e9836dfb3a2aa
    • Instruction ID: e3b7c209faba04e01b9c88fe7fda2d10ffd7859f9f703cf254e113f97d457f19
    • Opcode Fuzzy Hash: f532b273829567dfbc9fe9c56d968e40025db91d5bb5eb4e446e9836dfb3a2aa
    • Instruction Fuzzy Hash: CB210AB2204A8681EB11DF53F9547EBA361E789BC4F449012FB8E57AB9CF38C586D740
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: _set_statfp
    • String ID:
    • API String ID: 1156100317-0
    • Opcode ID: 957ff9fc767acefb1201c42b4cc893eb63bc4eaccbccbc47b6bc2eaae864688a
    • Instruction ID: f4c14f8190d932ae3cc72b094c4ad8df8dfdcc753cc42fb17640887478a4bd4c
    • Opcode Fuzzy Hash: 957ff9fc767acefb1201c42b4cc893eb63bc4eaccbccbc47b6bc2eaae864688a
    • Instruction Fuzzy Hash: 0211C636E10B1005FA662A3AD4423E511406B5C3F4F4F0A35FB7B0B3FBAB3488414A1A
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: _invalid_parameter_noinfo
    • String ID: -$e+000$gfff
    • API String ID: 3215553584-2620144452
    • Opcode ID: c33bfb3497739c1c153d770dd76b0a8cf9a6fe73c3b968890d656d9d337118c7
    • Instruction ID: b456f15578aa0d0b3228bb8d86f0c5889ccd7c58213d134bbf09c65441a8bdce
    • Opcode Fuzzy Hash: c33bfb3497739c1c153d770dd76b0a8cf9a6fe73c3b968890d656d9d337118c7
    • Instruction Fuzzy Hash: 9A6104727147C486E7268F36E9403D97791E399BD0F898235EBA847BEADB39C445C700
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: _invalid_parameter_noinfo
    • String ID: $*
    • API String ID: 3215553584-3982473090
    • Opcode ID: eedf139915a376f1688f8bfd5fe434b474aa0ba93430a1d5eeea7afcd662c7ab
    • Instruction ID: 0932e2c879d69d093859d60141680c21b95bb4b976f48e40ccf0854a7d6c1c34
    • Opcode Fuzzy Hash: eedf139915a376f1688f8bfd5fe434b474aa0ba93430a1d5eeea7afcd662c7ab
    • Instruction Fuzzy Hash: F8515C721066448EE77B8E2AC0653EE3BA0F30EB99F641625EB46476F9C779C581CB01
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: CreateDestructExceptionFrameInfoObject__except_validate_context_record
    • String ID: csm
    • API String ID: 146877497-1018135373
    • Opcode ID: e47b124cfe08c94bcfbc648c85ae479e4d478ed0c40c0e2fd9d91b3f2794d879
    • Instruction ID: 9351b86357ea298ac50d4699110ef244c1ae61dbe51141e20b64236156f02441
    • Opcode Fuzzy Hash: e47b124cfe08c94bcfbc648c85ae479e4d478ed0c40c0e2fd9d91b3f2794d879
    • Instruction Fuzzy Hash: 03515E76225A4082EA72DB62E540BAF77A4F78CBD4F141215EF8D87BA5CF34C4A2C704
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: _invalid_parameter_noinfo_noreturn
    • String ID: UMA.NegativeSamples.Histogram$UMA.NegativeSamples.Increment$UMA.NegativeSamples.Reason
    • API String ID: 3668304517-2026303189
    • Opcode ID: 2f96a78d121b2c02d1739ab812b9c4de60d5240caf380631e6d437b52701f41f
    • Instruction ID: 1ab0635f6fbb9dec2664796250aca18658d5eaea41bce2cd1c32bd531c482fb5
    • Opcode Fuzzy Hash: 2f96a78d121b2c02d1739ab812b9c4de60d5240caf380631e6d437b52701f41f
    • Instruction Fuzzy Hash: 0D319832300A0086EB26DB16E8503EA2762A79DBE8F104225FF5E477F5DE3DC9818700
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: _invalid_parameter_noinfo_noreturn
    • String ID: </PRE>$<PRE>$<br>
    • API String ID: 3668304517-4186555117
    • Opcode ID: 1d39f2e2bfdc6639cf831771faf3563d9b82d00fa31697b6ce6a59b3c2e540b8
    • Instruction ID: 1c342437767d1f29adfb8d114672c5e296407bd0c1b8ed7007bf18a54d60f921
    • Opcode Fuzzy Hash: 1d39f2e2bfdc6639cf831771faf3563d9b82d00fa31697b6ce6a59b3c2e540b8
    • Instruction Fuzzy Hash: 4631087221468482EB15CF22E4583DEB362F78DBC4F848115FB4A0BBA5DF7CD4818304
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: _invalid_parameter_noinfo_noreturn
    • String ID: </PRE>$<PRE>$<br>
    • API String ID: 3668304517-4186555117
    • Opcode ID: db0ab4fb01cb98913ec937c680cd62f70097bc38d4cb934e6004fb5544332502
    • Instruction ID: bd461fd786b1fb8604333b7d702e0fb9697e2827cc7cba3737c0052bc4cb4080
    • Opcode Fuzzy Hash: db0ab4fb01cb98913ec937c680cd62f70097bc38d4cb934e6004fb5544332502
    • Instruction Fuzzy Hash: 4B31A872214A8482EB25DF16E5583DEB362F79DBD4F809111FB5A0BBA9DF7DC1828304
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: Exception$DestructObject$Raise__vcrt_getptd_noexit
    • String ID: csm
    • API String ID: 2280078643-1018135373
    • Opcode ID: 8eb77453e360597db13ca8bfdc4094f1a4c681d4697f7193f2b3ce661c832256
    • Instruction ID: 5b25346a811018f5ab2de87346879d4de3c0d17ae187557b8159a01a7bd65268
    • Opcode Fuzzy Hash: 8eb77453e360597db13ca8bfdc4094f1a4c681d4697f7193f2b3ce661c832256
    • Instruction Fuzzy Hash: 1021277A21468086E672DF12E04179FB7A1F78CBE5F041215EF9983BA5CB39D896CB01
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: FileWrite$ConsoleErrorLast
    • String ID:
    • API String ID: 765721374-0
    • Opcode ID: b484540da893ce3f60eb248466d1d5446548579533a9d43ec1a64b44ad004b84
    • Instruction ID: 04820718e60021bfe332ca4c72e3f708913f3e8b6a7a49d763d097faf82a789d
    • Opcode Fuzzy Hash: b484540da893ce3f60eb248466d1d5446548579533a9d43ec1a64b44ad004b84
    • Instruction Fuzzy Hash: DF51BC32B10A9089E712DF76E8843DE3BB0F748B88F149515EF4A57BA5DB34C156C700
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: LockitYarnstd::_$EncodeLocimpLocimp::_Lockit::_Lockit::~_New_Pointerstd::locale::_
    • String ID:
    • API String ID: 4002550820-0
    • Opcode ID: 6dfd48ab791f7fa1d02d84773a632d048f90c95e930a5cd67147775ab62f23b2
    • Instruction ID: bd24c1c6cd242dcb2fa84b023521f00ba135106d7348547dab413066f60d6a59
    • Opcode Fuzzy Hash: 6dfd48ab791f7fa1d02d84773a632d048f90c95e930a5cd67147775ab62f23b2
    • Instruction Fuzzy Hash: 6D11C631200A4592EB129F26EC543D96762B74EBD4F694629EB5D473B6DF3CC889C304
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID:
    • String ID: gfffffff$gfffffff
    • API String ID: 0-161084747
    • Opcode ID: 6d15a5503dde6a9a9877c42e2de021fff651b7f9b39933c09bf4425d77bb2650
    • Instruction ID: 6a3bb84b5422b1cdd29ae0cfaa38cb5aa79d2de2390f2598ef1b521682f13c97
    • Opcode Fuzzy Hash: 6d15a5503dde6a9a9877c42e2de021fff651b7f9b39933c09bf4425d77bb2650
    • Instruction Fuzzy Hash: A2519DB2B11A8492EE158B16E98879D6690FB4CBF4F194725EF7E07BE0EE34C090C300
    APIs
    • Concurrency::cancel_current_task.LIBCPMT ref: 00000001400070C7
      • Part of subcall function 000000014002AF20: std::bad_alloc::bad_alloc.LIBCMT ref: 000000014002AF29
      • Part of subcall function 000000014002AF20: _CxxThrowException.LIBVCRUNTIME ref: 000000014002AF3A
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: Concurrency::cancel_current_taskExceptionThrowstd::bad_alloc::bad_alloc
    • String ID: false$true
    • API String ID: 1680350287-2658103896
    • Opcode ID: 978d4bb9d0162cf6d5ccc7ea78d9efdc1fa57f2a0f1c18e00ccbe7612d0ddab1
    • Instruction ID: a64c3aebb81d18948b8216bfa6aa155adaa8bcd5ed7f58db57b8746caebb0f7a
    • Opcode Fuzzy Hash: 978d4bb9d0162cf6d5ccc7ea78d9efdc1fa57f2a0f1c18e00ccbe7612d0ddab1
    • Instruction Fuzzy Hash: 5E41D672605B8481EA67DB27B5517EA3750975D7C0F484225EB8D07BA2EE3DC546C300
    APIs
    • _invalid_parameter_noinfo.LIBCMT ref: 0000000140033D4A
      • Part of subcall function 000000014003DD34: HeapFree.KERNEL32(?,?,?,000000014004391B,?,?,?,00000001400434C3,?,?,?,0000000140043E10,?,?,?,0000000140043D1B), ref: 000000014003DD4A
      • Part of subcall function 000000014003DD34: GetLastError.KERNEL32(?,?,?,000000014004391B,?,?,?,00000001400434C3,?,?,?,0000000140043E10,?,?,?,0000000140043D1B), ref: 000000014003DD5C
    • GetModuleFileNameW.KERNEL32(?,?,?,?,?,000000014002DC96), ref: 0000000140033D68
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: ErrorFileFreeHeapLastModuleName_invalid_parameter_noinfo
    • String ID: C:\Users\user\Desktop\3lOLt0TUE4.exe
    • API String ID: 3580290477-1849602671
    • Opcode ID: 9d8ff803844faf7c630714e7033d477acb144e7a54747c11ed1e3aa1343a756a
    • Instruction ID: 2d4d58bed62a85027691c5abd25b84b328c765bbd999de622c1ca60ff95a1307
    • Opcode Fuzzy Hash: 9d8ff803844faf7c630714e7033d477acb144e7a54747c11ed1e3aa1343a756a
    • Instruction Fuzzy Hash: C2415936201B5086EB17EF27E8813EA77A5E748BD4F55442AFB4A4BBA5DF38C4818300
    APIs
    • WriteFile.KERNEL32(?,?,00001010,00001010,00001010,0000000140035D60), ref: 000000014003638F
    • GetLastError.KERNEL32(?,?,00001010,00001010,00001010,0000000140035D60), ref: 00000001400363B1
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: ErrorFileLastWrite
    • String ID: U
    • API String ID: 442123175-4171548499
    • Opcode ID: bddbc8ad406f15b80bb6157fcdd3446ead256ecbf1be863d66aedaebb71ec528
    • Instruction ID: 7b5ffe6af83c96b0b87fc1e147cf42f9cb90fa3617bb97e028700c967ae7a9ee
    • Opcode Fuzzy Hash: bddbc8ad406f15b80bb6157fcdd3446ead256ecbf1be863d66aedaebb71ec528
    • Instruction Fuzzy Hash: 55419F32314A8086EB229F26E8447EA67A1F38C7D4F948025EF4D877A8DB38C501C740
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: _handle_errorf
    • String ID: "$powf
    • API String ID: 2315412904-603753351
    • Opcode ID: 829b591893e5008f8e335f31da3d531be945cb2b459a9d0dce0cc27c413e041c
    • Instruction ID: 188d31caac00246d88c1fda39f1867b5fa8f99f4dbd246e9185b6f4d8bff76d4
    • Opcode Fuzzy Hash: 829b591893e5008f8e335f31da3d531be945cb2b459a9d0dce0cc27c413e041c
    • Instruction Fuzzy Hash: 5B412173924680DFE370CF22E4847EEBAA0F39D788F112319F745029A8DB79C554AB44
    APIs
    • ReleaseSRWLockExclusive.KERNEL32 ref: 0000000140013FC3
      • Part of subcall function 000000014001D6F0: TlsGetValue.KERNEL32(?,?,00000000,?,0000000140014919,?,?,?,?,?,000000014000F85E), ref: 000000014001D702
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: ExclusiveLockReleaseValue
    • String ID: ActivityTracker.ThreadTrackers.Count$ActivityTracker.ThreadTrackers.MemLimitTrackerCount
    • API String ID: 3065551114-324972283
    • Opcode ID: 5775061a5afecb2115db08986a1b29ef5382e95547c2a9d2b08fb225f2a613b8
    • Instruction ID: 67449696d257c4c9cf5aac991ba5c2fa64811ff62e9c2359472728c9c9eeb2d7
    • Opcode Fuzzy Hash: 5775061a5afecb2115db08986a1b29ef5382e95547c2a9d2b08fb225f2a613b8
    • Instruction Fuzzy Hash: 89215C31301A4086EB629F17E9903DA62A5F38CBD4F504129EF4E8BBB1DF7ED6518741
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: _handle_error
    • String ID: "$pow
    • API String ID: 1757819995-713443511
    • Opcode ID: 3787674d59328094a88149cdf8d12cce7860cc7486e7b0e0c182d9fa44ef1dc7
    • Instruction ID: 27ae27021fd05bc4aff94b1fb3dfb32523a316740f8b85ec68c6229c868d3449
    • Opcode Fuzzy Hash: 3787674d59328094a88149cdf8d12cce7860cc7486e7b0e0c182d9fa44ef1dc7
    • Instruction Fuzzy Hash: 38212D72918AC487E371CF11E4447AFBAA0F7DE384F212715FB8506965D7BDC1859B04
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: _set_errno_from_matherr
    • String ID: pow
    • API String ID: 1187470696-2276729525
    • Opcode ID: 917cdf0490dccf3f4620b9dab4735aed81eeb179ef8d5f3284563aaa539fe56f
    • Instruction ID: dea15a066a8b1088c758d1a4ccaccafa0e1a65ee9085ad227d6c9241649b84e7
    • Opcode Fuzzy Hash: 917cdf0490dccf3f4620b9dab4735aed81eeb179ef8d5f3284563aaa539fe56f
    • Instruction Fuzzy Hash: 3B213076619684CBE761DF29E48079AB7A0F79D780F511625FB8D83B66DB3CC8408F04
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: Stringtry_get_function
    • String ID: LCMapStringEx
    • API String ID: 2588686239-3893581201
    • Opcode ID: 3884e0b63a8c96efe407d3432f9ddbc462819470e36a17f86fe60df43b273216
    • Instruction ID: 32921ae9604b6e7a91068b94d0e7bb4e28e5e3147340e8e0d8bc24defe51629a
    • Opcode Fuzzy Hash: 3884e0b63a8c96efe407d3432f9ddbc462819470e36a17f86fe60df43b273216
    • Instruction Fuzzy Hash: 3E11C436608B8086D761CB56B4803DAB7A5F7CDBD4F584126EF8D83B69CF38C5548B40
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: _handle_error
    • String ID: "$exp
    • API String ID: 1757819995-2878093337
    • Opcode ID: a6d7bfb3a6d47cfe190d8e7df2d7e6f097575f1f12928ecf6e72c9d0be14eb34
    • Instruction ID: 3e1030e6c8eede1e5b8d0290e4b7063840aae134a90d8a299bb3142af507c940
    • Opcode Fuzzy Hash: a6d7bfb3a6d47cfe190d8e7df2d7e6f097575f1f12928ecf6e72c9d0be14eb34
    • Instruction Fuzzy Hash: 59016D76A24A8886E221CF35A4493EABAA0FFEA744F602305F7411A674D779D4859F00
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: _invalid_parameter_noinfo_noreturn
    • String ID: Histogram.BadConstructionArguments$Histogram.MismatchedConstructionArguments
    • API String ID: 3668304517-1562091482
    • Opcode ID: d3f07b97601b995599a7c672edc3cd51021882322e7aec231143e27373290e56
    • Instruction ID: bc27cf14a5c30e382b19be256c059611988f9b21698056696276a34fb5f112ce
    • Opcode Fuzzy Hash: d3f07b97601b995599a7c672edc3cd51021882322e7aec231143e27373290e56
    • Instruction Fuzzy Hash: 58F0A76270004442FE7E969790583EC1202DB4DBF0F409610AB3D0FBE5DD79C8C18344
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: Lockitstd::_$Lockit::_Lockit::~_
    • String ID: MZx
    • API String ID: 593203224-2575928145
    • Opcode ID: 0748977e3b2f55a0288a3cff7ac831c52b695268794c44e5de3e63df36cf93f9
    • Instruction ID: 327dc8da4074a523da4e651eba584555fbfbebde33221c7dc872eacf5b5388b5
    • Opcode Fuzzy Hash: 0748977e3b2f55a0288a3cff7ac831c52b695268794c44e5de3e63df36cf93f9
    • Instruction Fuzzy Hash: 39F02472B2278046EF42DB02E8597E4A291E75CBC8F98402AAB4D073A5EB3CC955C380
    APIs
    • GetModuleHandleW.KERNEL32(?,?,?,?,000000014001469C,00000000,00000000,?,?,?,000000014000F8F3,?,?,00000000,000000014000F7D1), ref: 000000014001D8C0
    • GetProcAddress.KERNEL32(?,?,?,?,000000014001469C,00000000,00000000,?,?,?,000000014000F8F3,?,?,00000000,000000014000F7D1), ref: 000000014001D8D0
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: AddressHandleModuleProc
    • String ID: GetHandleVerifier
    • API String ID: 1646373207-1090674830
    • Opcode ID: 6442d51f2bd7f140e5c80bc8190d34017e336b51f9de3beae020d983c35a97aa
    • Instruction ID: 625ebb09b676e6bd4fbcb7e9adef5f11e465bbe67a205c45669491cb32323155
    • Opcode Fuzzy Hash: 6442d51f2bd7f140e5c80bc8190d34017e336b51f9de3beae020d983c35a97aa
    • Instruction Fuzzy Hash: 37F0123071660181FF5EDB27A8553E532926B8C7C0F54882BB60F473B0DE3A80458360
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: DefaultUsertry_get_function
    • String ID: GetUserDefaultLocaleName
    • API String ID: 3217810228-151340334
    • Opcode ID: 38115934365ac2b91385db30dd824bb08e78e3ee1b1ca3423f17699961fe7d81
    • Instruction ID: 4a69caa104e52205d9c3cb98012810ad93b3863fd0ffdbb213cd5739a6e59df3
    • Opcode Fuzzy Hash: 38115934365ac2b91385db30dd824bb08e78e3ee1b1ca3423f17699961fe7d81
    • Instruction Fuzzy Hash: 54F0373431458141FB179F57B9447FA6392AB4D7C4F545025BB0D47BB5CF39C4458700
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: CountCriticalInitializeSectionSpintry_get_function
    • String ID: InitializeCriticalSectionEx
    • API String ID: 539475747-3084827643
    • Opcode ID: ce3007e46195e6e95f029db1521970912dfba6121faffa4cef7bee6a34856249
    • Instruction ID: 6b0b1d677f8ba22b4523108f504932208e2309df771e299394aa8cee02130577
    • Opcode Fuzzy Hash: ce3007e46195e6e95f029db1521970912dfba6121faffa4cef7bee6a34856249
    • Instruction Fuzzy Hash: 88F05835214B8082FB069B43B8407EA2361AB8CBC0F589525FB4A03BA5CF39C986C750
    APIs
    • try_get_function.LIBVCRUNTIME ref: 000000014003DA4D
    • TlsSetValue.KERNEL32(?,?,?,000000014003C295,?,?,?,?,000000014002F15C,?,?,?,?,000000014002A4FB), ref: 000000014003DA64
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: Valuetry_get_function
    • String ID: FlsSetValue
    • API String ID: 738293619-3750699315
    • Opcode ID: 0bf3ebee11cad994176f0cb653be403563d196f2221c7de05fdab407c3f263ea
    • Instruction ID: 7ec5efc1aaed1997111329f75591f01e778e1b6eda0a38b19367794e7ccffa20
    • Opcode Fuzzy Hash: 0bf3ebee11cad994176f0cb653be403563d196f2221c7de05fdab407c3f263ea
    • Instruction Fuzzy Hash: 3FE0ED71605A40D2FB1B9B57F9447D97362A78CBC0F5C4426BB19476B5CE38CA848711
    APIs
    • try_get_function.LIBVCRUNTIME ref: 000000014003EACD
    • TlsSetValue.KERNEL32(?,?,?,000000014003E0E3,?,?,?,0000000140034629,?,?,?,?,000000014003D87A,?,?,00000000), ref: 000000014003EAE4
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: Valuetry_get_function
    • String ID: FlsSetValue
    • API String ID: 738293619-3750699315
    • Opcode ID: fbe1b1d18b61da2dcfad621472f8166ae1277451959b0802539174d15548c3d7
    • Instruction ID: d8b91e8c9cefe726aab317ba9c2b59223c998b511e20ba3ab6e03f3aa46ccf12
    • Opcode Fuzzy Hash: fbe1b1d18b61da2dcfad621472f8166ae1277451959b0802539174d15548c3d7
    • Instruction Fuzzy Hash: 5AE01275200A8091FB0B9B57F8447EA2362F78C7C0F584126BB19077B5CE3DD998C311
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1818271468.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1818256593.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818301544.000000014004C000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818321337.0000000140065000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818336146.000000014006A000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818352269.0000000140070000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818367665.0000000140071000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1818382089.0000000140072000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_3lOLt0TUE4.jbxd
    Similarity
    • API ID: DownlevelLocaleName__crttry_get_function
    • String ID: LocaleNameToLCID
    • API String ID: 404522899-2050040251
    • Opcode ID: 112d6606d29657f3bad817a362e59555f30022a7cbc2007681e9591e3bab0754
    • Instruction ID: 56b3432f105bab3165cd02585cadaedc199a8481abcc3611402fb17c63e541bf
    • Opcode Fuzzy Hash: 112d6606d29657f3bad817a362e59555f30022a7cbc2007681e9591e3bab0754
    • Instruction Fuzzy Hash: A2E0927120068081FA07EB5BF4403EA2321AB8C3C0F584825BB19073B1CF39D985D310