Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
WW15vnG9EY.dll

Overview

General Information

Sample name:WW15vnG9EY.dll
renamed because original name is a hash value
Original sample name:70ebafe5935dc5fa81a5e82e5f9ed83c7862e3d785f6b52351703d44e644dbfa.dll
Analysis ID:1544792
MD5:4da91b21a75c396b98219ddf500051b7
SHA1:c84478746587c5bef9f1d2550629660197cd0b7b
SHA256:70ebafe5935dc5fa81a5e82e5f9ed83c7862e3d785f6b52351703d44e644dbfa
Tags:2024bankerdllgolangloadermekotiouser-johnk3r
Infos:

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

AI detected suspicious sample
Contains functionality to registers a callback to get notified when the system is suspended or resumed (often done by Miners)
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
One or more processes crash
PE file contains an invalid checksum
PE file contains sections with non-standard names
Program does not show much activity (idle)
Sample execution stops while process was sleeping (likely an evasion)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • loaddll32.exe (PID: 5500 cmdline: loaddll32.exe "C:\Users\user\Desktop\WW15vnG9EY.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 1080 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 2436 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\WW15vnG9EY.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 4800 cmdline: rundll32.exe "C:\Users\user\Desktop\WW15vnG9EY.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
        • WerFault.exe (PID: 2024 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 4800 -s 836 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • rundll32.exe (PID: 1476 cmdline: rundll32.exe C:\Users\user\Desktop\WW15vnG9EY.dll,BarCreate MD5: 889B99C52A60DD49227C5E485A016679)
      • WerFault.exe (PID: 6552 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 1476 -s 828 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • rundll32.exe (PID: 5324 cmdline: rundll32.exe C:\Users\user\Desktop\WW15vnG9EY.dll,BarDestroy MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 3428 cmdline: rundll32.exe C:\Users\user\Desktop\WW15vnG9EY.dll,BarFreeRec MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 6496 cmdline: rundll32.exe "C:\Users\user\Desktop\WW15vnG9EY.dll",BarCreate MD5: 889B99C52A60DD49227C5E485A016679)
      • WerFault.exe (PID: 1708 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6496 -s 864 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • rundll32.exe (PID: 2992 cmdline: rundll32.exe "C:\Users\user\Desktop\WW15vnG9EY.dll",BarDestroy MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 5256 cmdline: rundll32.exe "C:\Users\user\Desktop\WW15vnG9EY.dll",BarFreeRec MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 1832 cmdline: rundll32.exe "C:\Users\user\Desktop\WW15vnG9EY.dll",_cgo_dummy_export MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 3004 cmdline: rundll32.exe "C:\Users\user\Desktop\WW15vnG9EY.dll",SpellSpell MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 4232 cmdline: rundll32.exe "C:\Users\user\Desktop\WW15vnG9EY.dll",SpellInit MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 4876 cmdline: rundll32.exe "C:\Users\user\Desktop\WW15vnG9EY.dll",SpellFree MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 5588 cmdline: rundll32.exe "C:\Users\user\Desktop\WW15vnG9EY.dll",SignalInitializeCrashReporting MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 4416 cmdline: rundll32.exe "C:\Users\user\Desktop\WW15vnG9EY.dll",GetInstallDetailsPayload MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 4064 cmdline: rundll32.exe "C:\Users\user\Desktop\WW15vnG9EY.dll",BarRecognize MD5: 889B99C52A60DD49227C5E485A016679)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.8% probability

Bitcoin Miner

barindex
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D0C1830 3_2_6D0C1830
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_6D101830 13_2_6D101830
Source: WW15vnG9EY.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED, DLL
Source: WW15vnG9EY.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4x nop then mov dword ptr [esp+0Ch], eax3_2_6D092CA0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4x nop then mov dword ptr [esp+0Ch], eax3_2_6D092CA6
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4x nop then mov dword ptr [esp], edx3_2_6D0ACEC0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4x nop then shr ebp, 0Dh3_2_6D0B9030
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4x nop then shr ecx, 0Dh3_2_6D0BA360
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4x nop then mov dword ptr [esp+0Ch], eax13_2_6D0D2CA6
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4x nop then mov dword ptr [esp+0Ch], eax13_2_6D0D2CA0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4x nop then mov dword ptr [esp], edx13_2_6D0ECEC0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4x nop then shr ebp, 0Dh13_2_6D0F9030
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4x nop then shr ecx, 0Dh13_2_6D0FA360
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D0C1A70 NtCreateWaitCompletionPacket,3_2_6D0C1A70
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D0C2A90 NtCreateWaitCompletionPacket,3_2_6D0C2A90
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D0C1570 NtCreateWaitCompletionPacket,NtAssociateWaitCompletionPacket,NtCancelWaitCompletionPacket,RtlGetCurrentPeb,RtlGetVersion,3_2_6D0C1570
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D0C11F0 NtCancelWaitCompletionPacket,NtAssociateWaitCompletionPacket,3_2_6D0C11F0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_6D101A70 NtCreateWaitCompletionPacket,13_2_6D101A70
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_6D102A90 NtCreateWaitCompletionPacket,13_2_6D102A90
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_6D101570 NtCreateWaitCompletionPacket,NtAssociateWaitCompletionPacket,NtCancelWaitCompletionPacket,RtlGetCurrentPeb,RtlGetVersion,13_2_6D101570
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_6D1011F0 NtCancelWaitCompletionPacket,NtAssociateWaitCompletionPacket,13_2_6D1011F0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D0EBD403_2_6D0EBD40
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D116D403_2_6D116D40
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D0BAD503_2_6D0BAD50
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D092CA03_2_6D092CA0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D092CA63_2_6D092CA6
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D122F903_2_6D122F90
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D0CCF903_2_6D0CCF90
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D0E5FF03_2_6D0E5FF0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D114E403_2_6D114E40
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D09BE903_2_6D09BE90
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D0FA9923_2_6D0FA992
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D0BD9C53_2_6D0BD9C5
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D0A59F03_2_6D0A59F0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D0ED8003_2_6D0ED800
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D10E8603_2_6D10E860
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D1168603_2_6D116860
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D127B103_2_6D127B10
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D0BBB103_2_6D0BBB10
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D09FBC03_2_6D09FBC0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D0BCA303_2_6D0BCA30
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D115AF03_2_6D115AF0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D0A0AF03_2_6D0A0AF0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D0B34003_2_6D0B3400
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D0F344F3_2_6D0F344F
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D0B14403_2_6D0B1440
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D0D64703_2_6D0D6470
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D0B66303_2_6D0B6630
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D1126803_2_6D112680
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D0E86903_2_6D0E8690
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D1196C03_2_6D1196C0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D0BC6D03_2_6D0BC6D0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D10D0103_2_6D10D010
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D0C60103_2_6D0C6010
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D0BD0403_2_6D0BD040
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D0BC0803_2_6D0BC080
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D0A80A03_2_6D0A80A0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D0990F03_2_6D0990F0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D0CA3203_2_6D0CA320
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D1233503_2_6D123350
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D0F73A03_2_6D0F73A0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D0B93F03_2_6D0B93F0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D0CE2403_2_6D0CE240
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D0932A03_2_6D0932A0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D0BB2D03_2_6D0BB2D0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_6D12BD4013_2_6D12BD40
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_6D156D4013_2_6D156D40
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_6D0FAD5013_2_6D0FAD50
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_6D0D2CA613_2_6D0D2CA6
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_6D0D2CA013_2_6D0D2CA0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_6D10CF9013_2_6D10CF90
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_6D162F9013_2_6D162F90
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_6D125FF013_2_6D125FF0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_6D154E4013_2_6D154E40
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_6D0DBE9013_2_6D0DBE90
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_6D13A99213_2_6D13A992
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_6D0FD9C513_2_6D0FD9C5
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_6D0E59F013_2_6D0E59F0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_6D12D80013_2_6D12D800
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_6D14E86013_2_6D14E860
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_6D15686013_2_6D156860
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_6D167B1013_2_6D167B10
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_6D0FBB1013_2_6D0FBB10
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_6D0DFBC013_2_6D0DFBC0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_6D0FCA3013_2_6D0FCA30
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_6D155AF013_2_6D155AF0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_6D0E0AF013_2_6D0E0AF0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_6D0F340013_2_6D0F3400
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_6D0F144013_2_6D0F1440
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_6D13344F13_2_6D13344F
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_6D11647013_2_6D116470
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_6D0F663013_2_6D0F6630
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_6D12869013_2_6D128690
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_6D15268013_2_6D152680
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_6D1596C013_2_6D1596C0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_6D0FC6D013_2_6D0FC6D0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_6D10601013_2_6D106010
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_6D14D01013_2_6D14D010
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_6D0FD04013_2_6D0FD040
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_6D0FC08013_2_6D0FC080
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_6D0E80A013_2_6D0E80A0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_6D0D90F013_2_6D0D90F0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_6D10A32013_2_6D10A320
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_6D16335013_2_6D163350
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_6D1373A013_2_6D1373A0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_6D0F93F013_2_6D0F93F0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_6D10E24013_2_6D10E240
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_6D0D32A013_2_6D0D32A0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_6D0FB2D013_2_6D0FB2D0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 6D136BB0 appears 482 times
Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 6D107410 appears 693 times
Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 6D0C7410 appears 693 times
Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 6D0F6BB0 appears 482 times
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 1476 -s 828
Source: WW15vnG9EY.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED, DLL
Source: classification engineClassification label: mal48.mine.winDLL@35/0@0/0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D125CF0 GetLastError,FormatMessageA,LocalFree,3_2_6D125CF0
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1080:120:WilError_03
Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\c6458ac8-0653-452c-82ed-4dcac49bf54cJump to behavior
Source: WW15vnG9EY.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\WW15vnG9EY.dll,BarCreate
Source: rundll32.exeString found in binary or memory: /gc/limiter/last-enabled:gc-cycle/memory/classes/heap/stacks:bytes/memory/classes/heap/unused:bytes/sched/pauses/stopping/gc:seconds/sched/pauses/total/other:secondsmin must be a non-zero power of 2runtime: failed mSpanList.insert runtime: castogscanstatus old
Source: rundll32.exeString found in binary or memory: /gc/limiter/last-enabled:gc-cycle/memory/classes/heap/stacks:bytes/memory/classes/heap/unused:bytes/sched/pauses/stopping/gc:seconds/sched/pauses/total/other:secondsmin must be a non-zero power of 2runtime: failed mSpanList.insert runtime: castogscanstatus old
Source: rundll32.exeString found in binary or memory: /memory/classes/heap/stacks:bytes/memory/classes/heap/unused:bytes/sched/pauses/stopping/gc:seconds/sched/pauses/total/other:secondsmin must be a non-zero power of 2runtime: failed mSpanList.insert runtime: castogscanstatus oldval=stoplockedm: inconsistent loc
Source: rundll32.exeString found in binary or memory: /memory/classes/heap/stacks:bytes/memory/classes/heap/unused:bytes/sched/pauses/stopping/gc:seconds/sched/pauses/total/other:secondsmin must be a non-zero power of 2runtime: failed mSpanList.insert runtime: castogscanstatus oldval=stoplockedm: inconsistent loc
Source: rundll32.exeString found in binary or memory: /memory/classes/heap/unused:bytes/sched/pauses/stopping/gc:seconds/sched/pauses/total/other:secondsmin must be a non-zero power of 2runtime: failed mSpanList.insert runtime: castogscanstatus oldval=stoplockedm: inconsistent lockingfindrunnable: negative nmspin
Source: rundll32.exeString found in binary or memory: /memory/classes/heap/unused:bytes/sched/pauses/stopping/gc:seconds/sched/pauses/total/other:secondsmin must be a non-zero power of 2runtime: failed mSpanList.insert runtime: castogscanstatus oldval=stoplockedm: inconsistent lockingfindrunnable: negative nmspin
Source: rundll32.exeString found in binary or memory: /sched/pauses/stopping/gc:seconds/sched/pauses/total/other:secondsmin must be a non-zero power of 2runtime: failed mSpanList.insert runtime: castogscanstatus oldval=stoplockedm: inconsistent lockingfindrunnable: negative nmspinningfreeing stack not in a stack
Source: rundll32.exeString found in binary or memory: /sched/pauses/stopping/gc:seconds/sched/pauses/total/other:secondsmin must be a non-zero power of 2runtime: failed mSpanList.insert runtime: castogscanstatus oldval=stoplockedm: inconsistent lockingfindrunnable: negative nmspinningfreeing stack not in a stack
Source: rundll32.exeString found in binary or memory: hed/pauses/stopping/gc:seconds/sched/pauses/total/other:secondsmin must be a non-zero power of 2runtime: failed mSpanList.insert runtime: castogscanstatus oldval=stoplockedm: inconsistent lockingfindrunnable: negative nmspinningfreeing stack not in a stack spa
Source: rundll32.exeString found in binary or memory: hed/pauses/stopping/gc:seconds/sched/pauses/total/other:secondsmin must be a non-zero power of 2runtime: failed mSpanList.insert runtime: castogscanstatus oldval=stoplockedm: inconsistent lockingfindrunnable: negative nmspinningfreeing stack not in a stack spa
Source: rundll32.exeString found in binary or memory: concurrent map read and map writeruntime: failed to decommit pages/cpu/classes/gc/pause:cpu-seconds/cpu/classes/gc/total:cpu-seconds/gc/limiter/last-enabled:gc-cycle/memory/classes/heap/stacks:bytes/memory/classes/heap/unused:bytes/sched/pauses/stopping/gc:sec
Source: rundll32.exeString found in binary or memory: concurrent map read and map writeruntime: failed to decommit pages/cpu/classes/gc/pause:cpu-seconds/cpu/classes/gc/total:cpu-seconds/gc/limiter/last-enabled:gc-cycle/memory/classes/heap/stacks:bytes/memory/classes/heap/unused:bytes/sched/pauses/stopping/gc:sec
Source: rundll32.exeString found in binary or memory: runtime: failed to decommit pages/cpu/classes/gc/pause:cpu-seconds/cpu/classes/gc/total:cpu-seconds/gc/limiter/last-enabled:gc-cycle/memory/classes/heap/stacks:bytes/memory/classes/heap/unused:bytes/sched/pauses/stopping/gc:seconds/sched/pauses/total/other:sec
Source: rundll32.exeString found in binary or memory: runtime: failed to decommit pages/cpu/classes/gc/pause:cpu-seconds/cpu/classes/gc/total:cpu-seconds/gc/limiter/last-enabled:gc-cycle/memory/classes/heap/stacks:bytes/memory/classes/heap/unused:bytes/sched/pauses/stopping/gc:seconds/sched/pauses/total/other:sec
Source: rundll32.exeString found in binary or memory: /cpu/classes/gc/pause:cpu-seconds/cpu/classes/gc/total:cpu-seconds/gc/limiter/last-enabled:gc-cycle/memory/classes/heap/stacks:bytes/memory/classes/heap/unused:bytes/sched/pauses/stopping/gc:seconds/sched/pauses/total/other:secondsmin must be a non-zero power
Source: rundll32.exeString found in binary or memory: /cpu/classes/gc/pause:cpu-seconds/cpu/classes/gc/total:cpu-seconds/gc/limiter/last-enabled:gc-cycle/memory/classes/heap/stacks:bytes/memory/classes/heap/unused:bytes/sched/pauses/stopping/gc:seconds/sched/pauses/total/other:secondsmin must be a non-zero power
Source: rundll32.exeString found in binary or memory: /cpu/classes/gc/total:cpu-seconds/gc/limiter/last-enabled:gc-cycle/memory/classes/heap/stacks:bytes/memory/classes/heap/unused:bytes/sched/pauses/stopping/gc:seconds/sched/pauses/total/other:secondsmin must be a non-zero power of 2runtime: failed mSpanList.ins
Source: rundll32.exeString found in binary or memory: /cpu/classes/gc/total:cpu-seconds/gc/limiter/last-enabled:gc-cycle/memory/classes/heap/stacks:bytes/memory/classes/heap/unused:bytes/sched/pauses/stopping/gc:seconds/sched/pauses/total/other:secondsmin must be a non-zero power of 2runtime: failed mSpanList.ins
Source: rundll32.exeString found in binary or memory: runtime: invalid typeBitsBulkBarrieruncaching span but s.allocCount == 0/memory/classes/metadata/other:bytes/sched/pauses/stopping/other:secondsuser arena span is on the wrong listruntime: marked free object in span runtime: unblock on closing polldescUnable t
Source: rundll32.exeString found in binary or memory: runtime: invalid typeBitsBulkBarrieruncaching span but s.allocCount == 0/memory/classes/metadata/other:bytes/sched/pauses/stopping/other:secondsuser arena span is on the wrong listruntime: marked free object in span runtime: unblock on closing polldescUnable t
Source: rundll32.exeString found in binary or memory: uncaching span but s.allocCount == 0/memory/classes/metadata/other:bytes/sched/pauses/stopping/other:secondsuser arena span is on the wrong listruntime: marked free object in span runtime: unblock on closing polldescUnable to determine system directoryruntime:
Source: rundll32.exeString found in binary or memory: uncaching span but s.allocCount == 0/memory/classes/metadata/other:bytes/sched/pauses/stopping/other:secondsuser arena span is on the wrong listruntime: marked free object in span runtime: unblock on closing polldescUnable to determine system directoryruntime:
Source: rundll32.exeString found in binary or memory: /memory/classes/metadata/other:bytes/sched/pauses/stopping/other:secondsuser arena span is on the wrong listruntime: marked free object in span runtime: unblock on closing polldescUnable to determine system directoryruntime: VirtualQuery failed; errno=runtime:
Source: rundll32.exeString found in binary or memory: /memory/classes/metadata/other:bytes/sched/pauses/stopping/other:secondsuser arena span is on the wrong listruntime: marked free object in span runtime: unblock on closing polldescUnable to determine system directoryruntime: VirtualQuery failed; errno=runtime:
Source: rundll32.exeString found in binary or memory: /sched/pauses/stopping/other:secondsuser arena span is on the wrong listruntime: marked free object in span runtime: unblock on closing polldescUnable to determine system directoryruntime: VirtualQuery failed; errno=runtime: sudog with non-nil waitlinkruntime:
Source: rundll32.exeString found in binary or memory: /sched/pauses/stopping/other:secondsuser arena span is on the wrong listruntime: marked free object in span runtime: unblock on closing polldescUnable to determine system directoryruntime: VirtualQuery failed; errno=runtime: sudog with non-nil waitlinkruntime:
Source: rundll32.exeString found in binary or memory: 00accessing a corrupted shared librarylfstack node allocated from the heap) is larger than maximum page size (runtime: invalid typeBitsBulkBarrieruncaching span but s.allocCount == 0/memory/classes/metadata/other:bytes/sched/pauses/stopping/other:secondsuser a
Source: rundll32.exeString found in binary or memory: 00accessing a corrupted shared librarylfstack node allocated from the heap) is larger than maximum page size (runtime: invalid typeBitsBulkBarrieruncaching span but s.allocCount == 0/memory/classes/metadata/other:bytes/sched/pauses/stopping/other:secondsuser a
Source: rundll32.exeString found in binary or memory: lfstack node allocated from the heap) is larger than maximum page size (runtime: invalid typeBitsBulkBarrieruncaching span but s.allocCount == 0/memory/classes/metadata/other:bytes/sched/pauses/stopping/other:secondsuser arena span is on the wrong listruntime:
Source: rundll32.exeString found in binary or memory: lfstack node allocated from the heap) is larger than maximum page size (runtime: invalid typeBitsBulkBarrieruncaching span but s.allocCount == 0/memory/classes/metadata/other:bytes/sched/pauses/stopping/other:secondsuser arena span is on the wrong listruntime:
Source: rundll32.exeString found in binary or memory: ) is larger than maximum page size (runtime: invalid typeBitsBulkBarrieruncaching span but s.allocCount == 0/memory/classes/metadata/other:bytes/sched/pauses/stopping/other:secondsuser arena span is on the wrong listruntime: marked free object in span runtime:
Source: rundll32.exeString found in binary or memory: ) is larger than maximum page size (runtime: invalid typeBitsBulkBarrieruncaching span but s.allocCount == 0/memory/classes/metadata/other:bytes/sched/pauses/stopping/other:secondsuser arena span is on the wrong listruntime: marked free object in span runtime:
Source: rundll32.exeString found in binary or memory: /gc/limiter/last-enabled:gc-cycle/memory/classes/heap/stacks:bytes/memory/classes/heap/unused:bytes/sched/pauses/stopping/gc:seconds/sched/pauses/total/other:secondsmin must be a non-zero power of 2runtime: failed mSpanList.insert runtime: castogscanstatus old
Source: rundll32.exeString found in binary or memory: /gc/limiter/last-enabled:gc-cycle/memory/classes/heap/stacks:bytes/memory/classes/heap/unused:bytes/sched/pauses/stopping/gc:seconds/sched/pauses/total/other:secondsmin must be a non-zero power of 2runtime: failed mSpanList.insert runtime: castogscanstatus old
Source: rundll32.exeString found in binary or memory: /memory/classes/heap/stacks:bytes/memory/classes/heap/unused:bytes/sched/pauses/stopping/gc:seconds/sched/pauses/total/other:secondsmin must be a non-zero power of 2runtime: failed mSpanList.insert runtime: castogscanstatus oldval=stoplockedm: inconsistent loc
Source: rundll32.exeString found in binary or memory: /memory/classes/heap/stacks:bytes/memory/classes/heap/unused:bytes/sched/pauses/stopping/gc:seconds/sched/pauses/total/other:secondsmin must be a non-zero power of 2runtime: failed mSpanList.insert runtime: castogscanstatus oldval=stoplockedm: inconsistent loc
Source: rundll32.exeString found in binary or memory: /memory/classes/heap/unused:bytes/sched/pauses/stopping/gc:seconds/sched/pauses/total/other:secondsmin must be a non-zero power of 2runtime: failed mSpanList.insert runtime: castogscanstatus oldval=stoplockedm: inconsistent lockingfindrunnable: negative nmspin
Source: rundll32.exeString found in binary or memory: /memory/classes/heap/unused:bytes/sched/pauses/stopping/gc:seconds/sched/pauses/total/other:secondsmin must be a non-zero power of 2runtime: failed mSpanList.insert runtime: castogscanstatus oldval=stoplockedm: inconsistent lockingfindrunnable: negative nmspin
Source: rundll32.exeString found in binary or memory: /sched/pauses/stopping/gc:seconds/sched/pauses/total/other:secondsmin must be a non-zero power of 2runtime: failed mSpanList.insert runtime: castogscanstatus oldval=stoplockedm: inconsistent lockingfindrunnable: negative nmspinningfreeing stack not in a stack
Source: rundll32.exeString found in binary or memory: /sched/pauses/stopping/gc:seconds/sched/pauses/total/other:secondsmin must be a non-zero power of 2runtime: failed mSpanList.insert runtime: castogscanstatus oldval=stoplockedm: inconsistent lockingfindrunnable: negative nmspinningfreeing stack not in a stack
Source: rundll32.exeString found in binary or memory: hed/pauses/stopping/gc:seconds/sched/pauses/total/other:secondsmin must be a non-zero power of 2runtime: failed mSpanList.insert runtime: castogscanstatus oldval=stoplockedm: inconsistent lockingfindrunnable: negative nmspinningfreeing stack not in a stack spa
Source: rundll32.exeString found in binary or memory: hed/pauses/stopping/gc:seconds/sched/pauses/total/other:secondsmin must be a non-zero power of 2runtime: failed mSpanList.insert runtime: castogscanstatus oldval=stoplockedm: inconsistent lockingfindrunnable: negative nmspinningfreeing stack not in a stack spa
Source: rundll32.exeString found in binary or memory: concurrent map read and map writeruntime: failed to decommit pages/cpu/classes/gc/pause:cpu-seconds/cpu/classes/gc/total:cpu-seconds/gc/limiter/last-enabled:gc-cycle/memory/classes/heap/stacks:bytes/memory/classes/heap/unused:bytes/sched/pauses/stopping/gc:sec
Source: rundll32.exeString found in binary or memory: concurrent map read and map writeruntime: failed to decommit pages/cpu/classes/gc/pause:cpu-seconds/cpu/classes/gc/total:cpu-seconds/gc/limiter/last-enabled:gc-cycle/memory/classes/heap/stacks:bytes/memory/classes/heap/unused:bytes/sched/pauses/stopping/gc:sec
Source: rundll32.exeString found in binary or memory: runtime: failed to decommit pages/cpu/classes/gc/pause:cpu-seconds/cpu/classes/gc/total:cpu-seconds/gc/limiter/last-enabled:gc-cycle/memory/classes/heap/stacks:bytes/memory/classes/heap/unused:bytes/sched/pauses/stopping/gc:seconds/sched/pauses/total/other:sec
Source: rundll32.exeString found in binary or memory: runtime: failed to decommit pages/cpu/classes/gc/pause:cpu-seconds/cpu/classes/gc/total:cpu-seconds/gc/limiter/last-enabled:gc-cycle/memory/classes/heap/stacks:bytes/memory/classes/heap/unused:bytes/sched/pauses/stopping/gc:seconds/sched/pauses/total/other:sec
Source: rundll32.exeString found in binary or memory: /cpu/classes/gc/pause:cpu-seconds/cpu/classes/gc/total:cpu-seconds/gc/limiter/last-enabled:gc-cycle/memory/classes/heap/stacks:bytes/memory/classes/heap/unused:bytes/sched/pauses/stopping/gc:seconds/sched/pauses/total/other:secondsmin must be a non-zero power
Source: rundll32.exeString found in binary or memory: /cpu/classes/gc/pause:cpu-seconds/cpu/classes/gc/total:cpu-seconds/gc/limiter/last-enabled:gc-cycle/memory/classes/heap/stacks:bytes/memory/classes/heap/unused:bytes/sched/pauses/stopping/gc:seconds/sched/pauses/total/other:secondsmin must be a non-zero power
Source: rundll32.exeString found in binary or memory: /cpu/classes/gc/total:cpu-seconds/gc/limiter/last-enabled:gc-cycle/memory/classes/heap/stacks:bytes/memory/classes/heap/unused:bytes/sched/pauses/stopping/gc:seconds/sched/pauses/total/other:secondsmin must be a non-zero power of 2runtime: failed mSpanList.ins
Source: rundll32.exeString found in binary or memory: /cpu/classes/gc/total:cpu-seconds/gc/limiter/last-enabled:gc-cycle/memory/classes/heap/stacks:bytes/memory/classes/heap/unused:bytes/sched/pauses/stopping/gc:seconds/sched/pauses/total/other:secondsmin must be a non-zero power of 2runtime: failed mSpanList.ins
Source: rundll32.exeString found in binary or memory: runtime: invalid typeBitsBulkBarrieruncaching span but s.allocCount == 0/memory/classes/metadata/other:bytes/sched/pauses/stopping/other:secondsuser arena span is on the wrong listruntime: marked free object in span runtime: unblock on closing polldescUnable t
Source: rundll32.exeString found in binary or memory: runtime: invalid typeBitsBulkBarrieruncaching span but s.allocCount == 0/memory/classes/metadata/other:bytes/sched/pauses/stopping/other:secondsuser arena span is on the wrong listruntime: marked free object in span runtime: unblock on closing polldescUnable t
Source: rundll32.exeString found in binary or memory: uncaching span but s.allocCount == 0/memory/classes/metadata/other:bytes/sched/pauses/stopping/other:secondsuser arena span is on the wrong listruntime: marked free object in span runtime: unblock on closing polldescUnable to determine system directoryruntime:
Source: rundll32.exeString found in binary or memory: uncaching span but s.allocCount == 0/memory/classes/metadata/other:bytes/sched/pauses/stopping/other:secondsuser arena span is on the wrong listruntime: marked free object in span runtime: unblock on closing polldescUnable to determine system directoryruntime:
Source: rundll32.exeString found in binary or memory: /memory/classes/metadata/other:bytes/sched/pauses/stopping/other:secondsuser arena span is on the wrong listruntime: marked free object in span runtime: unblock on closing polldescUnable to determine system directoryruntime: VirtualQuery failed; errno=runtime:
Source: rundll32.exeString found in binary or memory: /memory/classes/metadata/other:bytes/sched/pauses/stopping/other:secondsuser arena span is on the wrong listruntime: marked free object in span runtime: unblock on closing polldescUnable to determine system directoryruntime: VirtualQuery failed; errno=runtime:
Source: rundll32.exeString found in binary or memory: /sched/pauses/stopping/other:secondsuser arena span is on the wrong listruntime: marked free object in span runtime: unblock on closing polldescUnable to determine system directoryruntime: VirtualQuery failed; errno=runtime: sudog with non-nil waitlinkruntime:
Source: rundll32.exeString found in binary or memory: /sched/pauses/stopping/other:secondsuser arena span is on the wrong listruntime: marked free object in span runtime: unblock on closing polldescUnable to determine system directoryruntime: VirtualQuery failed; errno=runtime: sudog with non-nil waitlinkruntime:
Source: rundll32.exeString found in binary or memory: 00accessing a corrupted shared librarylfstack node allocated from the heap) is larger than maximum page size (runtime: invalid typeBitsBulkBarrieruncaching span but s.allocCount == 0/memory/classes/metadata/other:bytes/sched/pauses/stopping/other:secondsuser a
Source: rundll32.exeString found in binary or memory: 00accessing a corrupted shared librarylfstack node allocated from the heap) is larger than maximum page size (runtime: invalid typeBitsBulkBarrieruncaching span but s.allocCount == 0/memory/classes/metadata/other:bytes/sched/pauses/stopping/other:secondsuser a
Source: rundll32.exeString found in binary or memory: lfstack node allocated from the heap) is larger than maximum page size (runtime: invalid typeBitsBulkBarrieruncaching span but s.allocCount == 0/memory/classes/metadata/other:bytes/sched/pauses/stopping/other:secondsuser arena span is on the wrong listruntime:
Source: rundll32.exeString found in binary or memory: lfstack node allocated from the heap) is larger than maximum page size (runtime: invalid typeBitsBulkBarrieruncaching span but s.allocCount == 0/memory/classes/metadata/other:bytes/sched/pauses/stopping/other:secondsuser arena span is on the wrong listruntime:
Source: rundll32.exeString found in binary or memory: ) is larger than maximum page size (runtime: invalid typeBitsBulkBarrieruncaching span but s.allocCount == 0/memory/classes/metadata/other:bytes/sched/pauses/stopping/other:secondsuser arena span is on the wrong listruntime: marked free object in span runtime:
Source: rundll32.exeString found in binary or memory: ) is larger than maximum page size (runtime: invalid typeBitsBulkBarrieruncaching span but s.allocCount == 0/memory/classes/metadata/other:bytes/sched/pauses/stopping/other:secondsuser arena span is on the wrong listruntime: marked free object in span runtime:
Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\WW15vnG9EY.dll"
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\WW15vnG9EY.dll",#1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\WW15vnG9EY.dll,BarCreate
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\WW15vnG9EY.dll",#1
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 1476 -s 828
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 4800 -s 836
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\WW15vnG9EY.dll,BarDestroy
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\WW15vnG9EY.dll,BarFreeRec
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\WW15vnG9EY.dll",BarCreate
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\WW15vnG9EY.dll",BarDestroy
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\WW15vnG9EY.dll",BarFreeRec
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\WW15vnG9EY.dll",_cgo_dummy_export
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6496 -s 864
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\WW15vnG9EY.dll",SpellSpell
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\WW15vnG9EY.dll",SpellInit
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\WW15vnG9EY.dll",SpellFree
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\WW15vnG9EY.dll",SignalInitializeCrashReporting
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\WW15vnG9EY.dll",GetInstallDetailsPayload
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\WW15vnG9EY.dll",BarRecognize
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\WW15vnG9EY.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\WW15vnG9EY.dll,BarCreateJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\WW15vnG9EY.dll,BarDestroyJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\WW15vnG9EY.dll,BarFreeRecJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\WW15vnG9EY.dll",BarCreateJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\WW15vnG9EY.dll",BarDestroyJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\WW15vnG9EY.dll",BarFreeRecJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\WW15vnG9EY.dll",_cgo_dummy_exportJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\WW15vnG9EY.dll",SpellSpellJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\WW15vnG9EY.dll",SpellInitJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\WW15vnG9EY.dll",SpellFreeJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\WW15vnG9EY.dll",SignalInitializeCrashReportingJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\WW15vnG9EY.dll",GetInstallDetailsPayloadJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\WW15vnG9EY.dll",BarRecognizeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\WW15vnG9EY.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
Source: WW15vnG9EY.dllStatic PE information: Image base 0x6d8c0000 > 0x60000000
Source: WW15vnG9EY.dllStatic file information: File size 1397248 > 1048576
Source: WW15vnG9EY.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D0913E0 GetModuleHandleA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,3_2_6D0913E0
Source: WW15vnG9EY.dllStatic PE information: real checksum: 0x15d76d should be: 0x16140a
Source: WW15vnG9EY.dllStatic PE information: section name: .eh_fram
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_0103AF38 push eax; retf 0_2_0103AF39
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_01080353 push 49A291CCh; ret 0_2_01080358
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_0503C884 push edx; ret 4_2_0503C885
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_04C8042D push dword ptr [eax+52D9574Bh]; iretd 11_2_04C80436
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_0443D248 push dword ptr [esi+291909C3h]; iretd 12_2_0443D26F
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 14_2_0503AF59 push eax; retf 14_2_0503AF61
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 16_2_0503AF38 push eax; retf 16_2_0503AF39
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 16_2_05080336 push eax; retf 16_2_0508035D
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 19_2_0483D229 pushfd ; retf 19_2_0483D22C
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 19_2_0483AF38 push eax; retf 19_2_0483AF39
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 20_2_0443AF38 push eax; retf 20_2_0443AF39
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 21_2_0483AF38 push eax; retf 21_2_0483AF39
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 22_2_0483AF60 push eax; retf 22_2_0483AF61
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 22_2_0483C87D pushfd ; iretd 22_2_0483C88A
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 22_2_04880353 push esi; iretd 22_2_04880376
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 23_2_0543D7C5 push ds; retf 23_2_0543D7F2
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 24_2_0503D253 push ebp; retf 24_2_0503D254
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 24_2_0503D2F3 push esp; retf 24_2_0503D2F4
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 24_2_0503AF38 push eax; retf 24_2_0503AF39
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 24_2_05080411 pushad ; retf 24_2_05080413
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 24_2_0510443E pushad ; ret 24_2_0510443F
Source: C:\Windows\System32\loaddll32.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D0FC1E0 rdtscp 3_2_6D0FC1E0
Source: C:\Windows\SysWOW64\rundll32.exeAPI coverage: 0.8 %
Source: C:\Windows\SysWOW64\rundll32.exeAPI coverage: 1.0 %
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D0FC1E0 rdtscp 3_2_6D0FC1E0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D0913E0 GetModuleHandleA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,3_2_6D0913E0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D124FE0 free,free,GetProcessHeap,HeapFree,3_2_6D124FE0
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\WW15vnG9EY.dll",#1Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D0C1C90 RtlGetVersion,RtlGetCurrentPeb,3_2_6D0C1C90
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
11
Process Injection
1
Rundll32
OS Credential Dumping3
Security Software Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts1
Native API
Boot or Logon Initialization Scripts1
DLL Side-Loading
11
Virtualization/Sandbox Evasion
LSASS Memory11
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
Process Injection
Security Account Manager2
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Deobfuscate/Decode Files or Information
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts3
Obfuscated Files or Information
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1544792 Sample: WW15vnG9EY.dll Startdate: 29/10/2024 Architecture: WINDOWS Score: 48 27 AI detected suspicious sample 2->27 8 loaddll32.exe 1 2->8         started        process3 process4 10 rundll32.exe 8->10         started        13 cmd.exe 1 8->13         started        15 rundll32.exe 8->15         started        17 12 other processes 8->17 signatures5 29 Contains functionality to registers a callback to get notified when the system is suspended or resumed (often done by Miners) 10->29 19 WerFault.exe 2 10->19         started        21 rundll32.exe 13->21         started        23 WerFault.exe 2 15->23         started        process6 process7 25 WerFault.exe 2 21->25         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
WW15vnG9EY.dll5%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1544792
Start date and time:2024-10-29 18:51:08 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 6m 33s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:27
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:WW15vnG9EY.dll
renamed because original name is a hash value
Original Sample Name:70ebafe5935dc5fa81a5e82e5f9ed83c7862e3d785f6b52351703d44e644dbfa.dll
Detection:MAL
Classification:mal48.mine.winDLL@35/0@0/0
EGA Information:
  • Successful, ratio: 13.3%
HCA Information:
  • Successful, ratio: 67%
  • Number of executed functions: 6
  • Number of non-executed functions: 108
Cookbook Comments:
  • Found application associated with file extension: .dll
  • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
  • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
  • Execution Graph export aborted for target loaddll32.exe, PID 5500 because there are no executed function
  • Execution Graph export aborted for target rundll32.exe, PID 1832 because there are no executed function
  • Execution Graph export aborted for target rundll32.exe, PID 2992 because there are no executed function
  • Execution Graph export aborted for target rundll32.exe, PID 3004 because there are no executed function
  • Execution Graph export aborted for target rundll32.exe, PID 3428 because there are no executed function
  • Execution Graph export aborted for target rundll32.exe, PID 4064 because there are no executed function
  • Execution Graph export aborted for target rundll32.exe, PID 4232 because there are no executed function
  • Execution Graph export aborted for target rundll32.exe, PID 4416 because there are no executed function
  • Execution Graph export aborted for target rundll32.exe, PID 4800 because there are no executed function
  • Execution Graph export aborted for target rundll32.exe, PID 4876 because there are no executed function
  • Execution Graph export aborted for target rundll32.exe, PID 5256 because there are no executed function
  • Execution Graph export aborted for target rundll32.exe, PID 5324 because there are no executed function
  • Execution Graph export aborted for target rundll32.exe, PID 5588 because there are no executed function
  • Not all processes where analyzed, report is missing behavior information
  • Report size exceeded maximum capacity and may have missing behavior information.
  • VT rate limit hit for: WW15vnG9EY.dll
TimeTypeDescription
13:52:17API Interceptor1x Sleep call for process: loaddll32.exe modified
No context
No context
No context
No context
No context
No created / dropped files found
File type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
Entropy (8bit):6.289973116921106
TrID:
  • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
  • Generic Win/DOS Executable (2004/3) 0.20%
  • DOS Executable Generic (2002/1) 0.20%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:WW15vnG9EY.dll
File size:1'397'248 bytes
MD5:4da91b21a75c396b98219ddf500051b7
SHA1:c84478746587c5bef9f1d2550629660197cd0b7b
SHA256:70ebafe5935dc5fa81a5e82e5f9ed83c7862e3d785f6b52351703d44e644dbfa
SHA512:3d47e53d5fdacc5a4d75c09776235cc4d7b9f7d4c81d3467b67ecef0a8503ee8967c57434678aceda32eefe5a05bf4dcf6468211ef1a530884fd75368f0aa96b
SSDEEP:24576:mb2QHDFnfLnvQ1BsXlTm4IW35sPdyVPLiftn80OnMgy8:mDlS06U9N5
TLSH:03552900FD8744F1E003263285A7A2AF63256D094F31DBD7FB48BA7DFA736950936296
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#...*.....N...N.................m................................m.....@... ...................... ..-..
Icon Hash:7ae282899bbab082
Entrypoint:0x6d8c1390
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x6d8c0000
Subsystem:windows cui
Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED, DLL
DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Time Stamp:0x0 [Thu Jan 1 00:00:00 1970 UTC]
TLS Callbacks:0x6d95b710, 0x6d95b6c0
CLR (.Net) Version:
OS Version Major:6
OS Version Minor:1
File Version Major:6
File Version Minor:1
Subsystem Version Major:6
Subsystem Version Minor:1
Import Hash:fc4278e40a172f1e8b037cb3d2809e66
Instruction
sub esp, 0Ch
mov dword ptr [6DA31D9Ch], 00000000h
mov ecx, dword ptr [esp+18h]
mov edx, dword ptr [esp+14h]
mov eax, dword ptr [esp+10h]
call 00007F57408D6FE7h
add esp, 0Ch
retn 000Ch
lea esi, dword ptr [esi+00000000h]
lea esi, dword ptr [esi+00h]
nop
sub esp, 1Ch
mov eax, dword ptr [esp+20h]
mov dword ptr [esp], 6DA0D000h
mov dword ptr [esp+04h], eax
call 00007F574097257Eh
add esp, 1Ch
ret
nop
nop
nop
nop
nop
push ebp
mov ebp, esp
push edi
push esi
push ebx
sub esp, 1Ch
mov dword ptr [esp], 6D964000h
call dword ptr [6DA33224h]
sub esp, 04h
test eax, eax
je 00007F57408D7205h
mov ebx, eax
mov dword ptr [esp], 6D964000h
call dword ptr [6DA3326Ch]
mov edi, dword ptr [6DA33230h]
sub esp, 04h
mov dword ptr [6DA0D010h], eax
mov dword ptr [esp+04h], 6D964013h
mov dword ptr [esp], ebx
call edi
sub esp, 08h
mov esi, eax
mov dword ptr [esp+04h], 6D964029h
mov dword ptr [esp], ebx
call edi
sub esp, 08h
mov dword ptr [6D95D004h], eax
test esi, esi
je 00007F57408D71A3h
mov dword ptr [esp+04h], 6DA0D014h
mov dword ptr [esp], 6DA0B124h
call esi
mov dword ptr [eax+eax], 00000000h
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x1720000x12d.edata
IMAGE_DIRECTORY_ENTRY_IMPORT0x1730000xbb0.idata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x1760000x882c.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x14a4440x18.rdata
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x1731dc0x1a0.idata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x9be780x9c00032caff48218a21e80281b0eeed21f4a5False0.47325877654246795data6.302901230623459IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.data0x9d0000x67ec0x68008f2cbca174bb83a0a86355f0728b3c41False0.42101111778846156dBase III DBT, version number 0, next free block index 1, 1st item ""4.459575171219113IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rdata0xa40000xa68cc0xa6a000a17213743277c78d381b4e780203da1False0.43165820752063017data5.601603835374281IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.eh_fram0x14b0000x1e940x2000b3586cda6a9f1266d88c9bd57736d705False0.3330078125data4.772055814218093IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.bss0x14d0000x24df00x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.edata0x1720000x12d0x200c87fc8f8787817a98c6f2502635f9f1eFalse0.462890625data3.4271057556060756IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.idata0x1730000xbb00xc00f9325c52db82893fba8d59d311b3a681False0.408203125data5.213100684276811IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.CRT0x1740000x2c0x20039d753f3f872fc69a1bf3c2eedf6fbbdFalse0.056640625data0.2069200177871819IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.tls0x1750000x80x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.reloc0x1760000x882c0x8a00b74fd00ee9b0319a1fe064eeff43efa8False0.6625339673913043data6.627412753213743IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
DLLImport
KERNEL32.dllAddVectoredExceptionHandler, CloseHandle, CreateEventA, CreateIoCompletionPort, CreateThread, CreateWaitableTimerExW, DeleteCriticalSection, DuplicateHandle, EnterCriticalSection, ExitProcess, FormatMessageA, FreeEnvironmentStringsW, FreeLibrary, GetConsoleMode, GetCurrentThreadId, GetEnvironmentStringsW, GetErrorMode, GetLastError, GetModuleHandleA, GetModuleHandleW, GetNativeSystemInfo, GetProcAddress, GetProcessAffinityMask, GetProcessHeap, GetQueuedCompletionStatusEx, GetStdHandle, GetSystemDirectoryA, GetSystemInfo, GetThreadContext, GetThreadLocale, HeapAlloc, HeapFree, InitializeCriticalSection, IsBadReadPtr, IsDBCSLeadByteEx, LeaveCriticalSection, LoadLibraryA, LoadLibraryExW, LoadLibraryW, LocalFree, MultiByteToWideChar, PostQueuedCompletionStatus, RaiseFailFastException, ResumeThread, SetConsoleCtrlHandler, SetErrorMode, SetEvent, SetLastError, SetProcessPriorityBoost, SetThreadContext, SetUnhandledExceptionFilter, SetWaitableTimer, Sleep, SuspendThread, SwitchToThread, TlsAlloc, TlsGetValue, VirtualAlloc, VirtualFree, VirtualProtect, VirtualQuery, WaitForMultipleObjects, WaitForSingleObject, WerGetFlags, WerSetFlags, WideCharToMultiByte, WriteConsoleW, WriteFile, lstrlenA
msvcrt.dll__mb_cur_max, _amsg_exit, _beginthread, _errno, _initterm, _iob, _lock, _unlock, _wcsnicmp, abort, atoi, bsearch, calloc, fputc, free, fwrite, localeconv, malloc, mbstowcs, memcpy, memset, qsort, realloc, setlocale, strchr, strcmp, strerror, strlen, strncmp, strtol, vfprintf, wcslen, wcstombs
NameOrdinalAddress
BarCreate10x6d9546f0
BarDestroy20x6d954970
BarFreeRec30x6d954920
BarRecognize40x6d9548d0
GetInstallDetailsPayload50x6d954830
SignalInitializeCrashReporting60x6d954880
SpellFree70x6d954740
SpellInit80x6d954790
SpellSpell90x6d9547e0
_cgo_dummy_export100x6da313a8
No network behavior found

Click to jump to process

Click to jump to process

Click to jump to process

Target ID:0
Start time:13:52:06
Start date:29/10/2024
Path:C:\Windows\System32\loaddll32.exe
Wow64 process (32bit):true
Commandline:loaddll32.exe "C:\Users\user\Desktop\WW15vnG9EY.dll"
Imagebase:0xc0000
File size:126'464 bytes
MD5 hash:51E6071F9CBA48E79F10C84515AAE618
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:1
Start time:13:52:06
Start date:29/10/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff66e660000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:2
Start time:13:52:06
Start date:29/10/2024
Path:C:\Windows\SysWOW64\cmd.exe
Wow64 process (32bit):true
Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\WW15vnG9EY.dll",#1
Imagebase:0x1c0000
File size:236'544 bytes
MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:3
Start time:13:52:06
Start date:29/10/2024
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe C:\Users\user\Desktop\WW15vnG9EY.dll,BarCreate
Imagebase:0xc10000
File size:61'440 bytes
MD5 hash:889B99C52A60DD49227C5E485A016679
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:4
Start time:13:52:06
Start date:29/10/2024
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe "C:\Users\user\Desktop\WW15vnG9EY.dll",#1
Imagebase:0xc10000
File size:61'440 bytes
MD5 hash:889B99C52A60DD49227C5E485A016679
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:9
Start time:13:52:07
Start date:29/10/2024
Path:C:\Windows\SysWOW64\WerFault.exe
Wow64 process (32bit):true
Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 1476 -s 828
Imagebase:0x350000
File size:483'680 bytes
MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:10
Start time:13:52:07
Start date:29/10/2024
Path:C:\Windows\SysWOW64\WerFault.exe
Wow64 process (32bit):true
Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 4800 -s 836
Imagebase:0x350000
File size:483'680 bytes
MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:11
Start time:13:52:09
Start date:29/10/2024
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe C:\Users\user\Desktop\WW15vnG9EY.dll,BarDestroy
Imagebase:0xc10000
File size:61'440 bytes
MD5 hash:889B99C52A60DD49227C5E485A016679
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:12
Start time:13:52:12
Start date:29/10/2024
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe C:\Users\user\Desktop\WW15vnG9EY.dll,BarFreeRec
Imagebase:0xc10000
File size:61'440 bytes
MD5 hash:889B99C52A60DD49227C5E485A016679
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:13
Start time:13:52:16
Start date:29/10/2024
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe "C:\Users\user\Desktop\WW15vnG9EY.dll",BarCreate
Imagebase:0xc10000
File size:61'440 bytes
MD5 hash:889B99C52A60DD49227C5E485A016679
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:14
Start time:13:52:16
Start date:29/10/2024
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe "C:\Users\user\Desktop\WW15vnG9EY.dll",BarDestroy
Imagebase:0xc10000
File size:61'440 bytes
MD5 hash:889B99C52A60DD49227C5E485A016679
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:16
Start time:13:52:16
Start date:29/10/2024
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe "C:\Users\user\Desktop\WW15vnG9EY.dll",BarFreeRec
Imagebase:0xc10000
File size:61'440 bytes
MD5 hash:889B99C52A60DD49227C5E485A016679
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:17
Start time:13:52:16
Start date:29/10/2024
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe "C:\Users\user\Desktop\WW15vnG9EY.dll",_cgo_dummy_export
Imagebase:0xc10000
File size:61'440 bytes
MD5 hash:889B99C52A60DD49227C5E485A016679
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:18
Start time:13:52:16
Start date:29/10/2024
Path:C:\Windows\SysWOW64\WerFault.exe
Wow64 process (32bit):true
Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6496 -s 864
Imagebase:0x350000
File size:483'680 bytes
MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:19
Start time:13:52:16
Start date:29/10/2024
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe "C:\Users\user\Desktop\WW15vnG9EY.dll",SpellSpell
Imagebase:0xc10000
File size:61'440 bytes
MD5 hash:889B99C52A60DD49227C5E485A016679
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:20
Start time:13:52:16
Start date:29/10/2024
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe "C:\Users\user\Desktop\WW15vnG9EY.dll",SpellInit
Imagebase:0xc10000
File size:61'440 bytes
MD5 hash:889B99C52A60DD49227C5E485A016679
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:21
Start time:13:52:16
Start date:29/10/2024
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe "C:\Users\user\Desktop\WW15vnG9EY.dll",SpellFree
Imagebase:0xc10000
File size:61'440 bytes
MD5 hash:889B99C52A60DD49227C5E485A016679
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:22
Start time:13:52:17
Start date:29/10/2024
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe "C:\Users\user\Desktop\WW15vnG9EY.dll",SignalInitializeCrashReporting
Imagebase:0xc10000
File size:61'440 bytes
MD5 hash:889B99C52A60DD49227C5E485A016679
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:23
Start time:13:52:17
Start date:29/10/2024
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe "C:\Users\user\Desktop\WW15vnG9EY.dll",GetInstallDetailsPayload
Imagebase:0xc10000
File size:61'440 bytes
MD5 hash:889B99C52A60DD49227C5E485A016679
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:24
Start time:13:52:17
Start date:29/10/2024
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe "C:\Users\user\Desktop\WW15vnG9EY.dll",BarRecognize
Imagebase:0xc10000
File size:61'440 bytes
MD5 hash:889B99C52A60DD49227C5E485A016679
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Reset < >

    Execution Graph

    Execution Coverage:0%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:0%
    Total number of Nodes:14
    Total number of Limit Nodes:1
    execution_graph 60699 6d1261f6 60700 6d126170 60699->60700 60701 6d126187 _beginthread 60700->60701 60702 6d1261a1 _errno 60701->60702 60703 6d1261d8 60701->60703 60704 6d1261e0 Sleep 60702->60704 60705 6d1261a8 _errno 60702->60705 60704->60701 60706 6d1261f4 60704->60706 60707 6d1261b9 60705->60707 60706->60705 60710 6d125e60 39 API calls 60707->60710 60709 6d1261cd abort 60709->60703 60710->60709 60711 6d0fcfc0 60712 6d0fcfd9 60711->60712 60713 6d0fcfe8 WriteFile 60711->60713 60712->60713

    Control-flow Graph

    APIs
    Strings
    • runtime: failed to create new OS thread (%d), xrefs: 6D1261B9
    Memory Dump Source
    • Source File: 00000003.00000002.2212531983.000000006D091000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D090000, based on PE: true
    • Associated: 00000003.00000002.2212515659.000000006D090000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212599577.000000006D12D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212619894.000000006D12E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212640649.000000006D12F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212661061.000000006D134000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212792942.000000006D1DD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212938204.000000006D1FB000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212957971.000000006D202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212978463.000000006D203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2213008790.000000006D206000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6d090000_rundll32.jbxd
    Similarity
    • API ID: _errno$Sleep_beginthreadabort
    • String ID: runtime: failed to create new OS thread (%d)
    • API String ID: 3675047324-3231778263
    • Opcode ID: 6494f717dbe32f1551345bb903f8e5f56cd8c08963544e89be5f26b508073c39
    • Instruction ID: f1d510a78f609dc2341d4d31b4c9da2bec820917200f86ead2fdaee495b1a6a8
    • Opcode Fuzzy Hash: 6494f717dbe32f1551345bb903f8e5f56cd8c08963544e89be5f26b508073c39
    • Instruction Fuzzy Hash: 0E016DB54093189FD700BF68D88972EBBF4FF85364F42491DE58983256C772A880DBA7

    Control-flow Graph

    APIs
    Strings
    • runtime: failed to create new OS thread (%d), xrefs: 6D1261B9
    Memory Dump Source
    • Source File: 00000003.00000002.2212531983.000000006D091000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D090000, based on PE: true
    • Associated: 00000003.00000002.2212515659.000000006D090000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212599577.000000006D12D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212619894.000000006D12E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212640649.000000006D12F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212661061.000000006D134000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212792942.000000006D1DD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212938204.000000006D1FB000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212957971.000000006D202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212978463.000000006D203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2213008790.000000006D206000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6d090000_rundll32.jbxd
    Similarity
    • API ID: _errno$Sleep_beginthreadabort
    • String ID: runtime: failed to create new OS thread (%d)
    • API String ID: 3675047324-3231778263
    • Opcode ID: 93d49675a8e1a4873c41ee3390d20c2dcbecf16d84c86b01146170eb86a8f70c
    • Instruction ID: 1178d61f657ead21665ccf993ad6df26e8fc70b1b8f86b36c1f5b555a87aeefc
    • Opcode Fuzzy Hash: 93d49675a8e1a4873c41ee3390d20c2dcbecf16d84c86b01146170eb86a8f70c
    • Instruction Fuzzy Hash: 81014FB5409314DFC700AF68D88976AFBF4FF8A365F42491CE68853255C775A880CBA2

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 21 6d0fcfc0-6d0fcfd7 22 6d0fcfd9-6d0fcfe6 21->22 23 6d0fcfe8-6d0fd000 WriteFile 21->23 22->23
    APIs
    Memory Dump Source
    • Source File: 00000003.00000002.2212531983.000000006D091000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D090000, based on PE: true
    • Associated: 00000003.00000002.2212515659.000000006D090000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212599577.000000006D12D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212619894.000000006D12E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212640649.000000006D12F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212661061.000000006D134000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212792942.000000006D1DD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212938204.000000006D1FB000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212957971.000000006D202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212978463.000000006D203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2213008790.000000006D206000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6d090000_rundll32.jbxd
    Similarity
    • API ID: FileWrite
    • String ID:
    • API String ID: 3934441357-0
    • Opcode ID: a2cfa61b4501b04a2c5f40c8367aff7a2baaadd22eedac0d36916a775c4c6aab
    • Instruction ID: 83cfa5fc3b8677a28bab34e91b49d7d3f2e2041ae8fee30c9a0b70584cdff009
    • Opcode Fuzzy Hash: a2cfa61b4501b04a2c5f40c8367aff7a2baaadd22eedac0d36916a775c4c6aab
    • Instruction Fuzzy Hash: C5E0E571505600CFDB15DF18C2C171ABBE1EB48A00F0485A8DE098F74AD734ED14CB92

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1128 6d0a59f0-6d0a5a05 1129 6d0a5a0b-6d0a5a31 call 6d100aa0 1128->1129 1130 6d0a6c61-6d0a6c66 call 6d0faf70 1128->1130 1135 6d0a5a3a-6d0a5a3d 1129->1135 1136 6d0a5a33-6d0a5a38 1129->1136 1130->1128 1137 6d0a5a40-6d0a5aa7 call 6d100ad0 call 6d0fd110 1135->1137 1136->1137 1142 6d0a5aa9-6d0a5ab1 call 6d0fc380 1137->1142 1143 6d0a5ab3-6d0a5b83 call 6d0c9e30 call 6d0fae80 * 2 call 6d0c9a20 1137->1143 1142->1143 1154 6d0a5b8b-6d0a5b93 call 6d0e9cc0 1143->1154 1155 6d0a5b85-6d0a5b89 1143->1155 1156 6d0a5b97-6d0a5b99 1154->1156 1155->1156 1158 6d0a5b9b-6d0a5bca call 6d0ea260 call 6d0e9df0 1156->1158 1159 6d0a5bcf-6d0a5be5 1156->1159 1158->1159 1162 6d0a5bf1-6d0a5c00 1159->1162 1163 6d0a5be7-6d0a5bef call 6d0fc380 1159->1163 1166 6d0a6c4a-6d0a6c60 call 6d0f6bb0 1162->1166 1167 6d0a5c06-6d0a5f1c call 6d100ad0 call 6d0fae80 call 6d0fd110 call 6d0fd170 call 6d100af0 * 2 call 6d0bfc30 call 6d0ef930 * 2 call 6d100910 * 3 1162->1167 1163->1162 1166->1130 1196 6d0a5f1e 1167->1196 1197 6d0a5f24-6d0a5fc2 call 6d09a4e0 call 6d0ced60 call 6d09a700 call 6d0b1f00 call 6d0a85c0 call 6d0bce30 call 6d0b29f0 1167->1197 1196->1197 1212 6d0a5fd0-6d0a5fd2 1197->1212 1213 6d0a5fc4-6d0a5fc6 1197->1213 1216 6d0a5fd8-6d0a6095 call 6d0fc596 call 6d0fca6a call 6d0fae80 call 6d0bd3f0 call 6d0b5470 call 6d0fae80 * 2 1212->1216 1217 6d0a6c1e-6d0a6c2f call 6d0f6bb0 1212->1217 1214 6d0a5fcc-6d0a5fce 1213->1214 1215 6d0a6c34-6d0a6c45 call 6d0f6bb0 1213->1215 1214->1212 1214->1216 1215->1166 1234 6d0a6097-6d0a60af call 6d0b2a70 1216->1234 1235 6d0a60b4-6d0a60bc 1216->1235 1217->1215 1234->1235 1237 6d0a6abf-6d0a6b05 call 6d09a4e0 1235->1237 1238 6d0a60c2-6d0a6130 call 6d0fc59a call 6d0c6bb0 call 6d0efb70 1235->1238 1243 6d0a6b07-6d0a6b12 call 6d0fc380 1237->1243 1244 6d0a6b14-6d0a6b30 call 6d09a700 1237->1244 1256 6d0a6140-6d0a615e 1238->1256 1243->1244 1253 6d0a6b55-6d0a6b5e 1244->1253 1254 6d0a6b32-6d0a6b54 call 6d0943c0 1253->1254 1255 6d0a6b60-6d0a6b8b call 6d0aed90 1253->1255 1254->1253 1269 6d0a6b9b-6d0a6bf2 call 6d0d8b70 * 2 1255->1269 1270 6d0a6b8d-6d0a6b96 call 6d0fae80 1255->1270 1257 6d0a6169-6d0a61ec 1256->1257 1258 6d0a6160-6d0a6163 1256->1258 1263 6d0a61f2-6d0a61fc 1257->1263 1264 6d0a6c14-6d0a6c19 call 6d0fc400 1257->1264 1258->1257 1262 6d0a6216-6d0a621c 1258->1262 1271 6d0a6c0a-6d0a6c0f call 6d0fc400 1262->1271 1272 6d0a6222-6d0a63bc call 6d0f7ff0 call 6d0c6bb0 call 6d0c7410 call 6d0c7100 call 6d0c7410 * 3 call 6d0c7230 call 6d0c7410 call 6d0c6c10 call 6d0fc59a 1262->1272 1267 6d0a61fe-6d0a620a 1263->1267 1268 6d0a620f-6d0a6211 1263->1268 1264->1217 1274 6d0a6132-6d0a613e 1267->1274 1268->1274 1285 6d0a6c03-6d0a6c09 1269->1285 1286 6d0a6bf4-6d0a6bfa 1269->1286 1270->1269 1271->1264 1305 6d0a645e-6d0a6461 1272->1305 1274->1256 1286->1285 1288 6d0a6bfc 1286->1288 1288->1285 1306 6d0a64e7-6d0a6690 call 6d0c6bb0 call 6d0c7410 call 6d0c6c10 call 6d100950 * 4 call 6d0fc596 1305->1306 1307 6d0a6467-6d0a6484 1305->1307 1342 6d0a6717-6d0a671a 1306->1342 1309 6d0a648a-6d0a64e2 call 6d0c6bb0 call 6d0c7410 call 6d0c6c10 1307->1309 1310 6d0a63c1-6d0a6457 call 6d0a80a0 call 6d0f7ff0 call 6d0c6bb0 call 6d0c7410 call 6d0c6c10 1307->1310 1309->1310 1310->1305 1343 6d0a67c0-6d0a6a5a call 6d100ad0 * 2 call 6d0c6bb0 call 6d0c7410 call 6d0c7100 call 6d0c7410 call 6d0c7100 call 6d0c7410 call 6d0c7100 call 6d0c7410 call 6d0c7100 call 6d0c7410 call 6d0c7100 call 6d0c7410 call 6d0c7100 call 6d0c7410 call 6d0c7230 call 6d0c7410 call 6d0c6c10 1342->1343 1344 6d0a6720-6d0a6744 1342->1344 1410 6d0a6a7c-6d0a6aad call 6d0c6bb0 call 6d0c6db0 call 6d0c6c10 1343->1410 1411 6d0a6a5c-6d0a6a77 call 6d0c6bb0 call 6d0c7410 call 6d0c6c10 1343->1411 1346 6d0a674b-6d0a6779 call 6d0c6bb0 call 6d0c7410 call 6d0c6c10 1344->1346 1347 6d0a6746-6d0a6749 1344->1347 1354 6d0a6695-6d0a6716 call 6d0a80a0 call 6d0f7ff0 call 6d0c6bb0 call 6d0c7410 call 6d0c6c10 1346->1354 1347->1346 1348 6d0a677e-6d0a6780 1347->1348 1353 6d0a6786-6d0a67bb call 6d0c6bb0 call 6d0c7410 call 6d0c6c10 1348->1353 1348->1354 1353->1354 1354->1342 1410->1237 1423 6d0a6aaf-6d0a6aba call 6d09a700 1410->1423 1411->1410 1423->1237
    Strings
    • ms clock, nBSSRoots=runtime: P exp.) for minTrigger=GOMEMLIMIT=bad m value, elemsize= freeindex= span.list=, npages = p->status= in status idleprocs= gcwaiting= schedtick= timerslen= mallocing=bad timedivfloat64nan1float64nan2float64nan3float32nan2GOTRACE, xrefs: 6D0A64EC
    • MB globals, work.nproc= work.nwait= nStackRoots= flushedWork double unlock s.spanclass= MB) workers=min too large-byte block (runtime: val=runtime: seq=fatal error: idlethreads= syscalltick=load64 failedxadd64 failedxchg64 failednil stackbase}sched={pc:, xrefs: 6D0A6A06
    • gc %: gp *(in n= ) - NaN P m= MPC= < end > ...]:???pc= GEOF\\.\\?\??MayUTCEET+00+01CATWATEATGMTHSTHDT-03-04-05ESTCSTCDTMSTMDT-02EDTASTADTPSTPDTNSTNDT+06+03+04+07IST+09+08IDT+12PKT+11KST+05JST+10-01-11-12-08-09+13CETBSTMSK-06+14StdDltadxaesshaavxfmaintma, xrefs: 6D0A629A
    • 5, xrefs: 6D0A6C27
    • ., xrefs: 6D0A61FE
    • MB goal, s.state = s.base()= heapGoal=GOMEMLIMIT KiB now, pages at sweepgen= sweepgen , bound = , limit = exitThreadBad varintGC forced runqueue= stopwait= runqsize= gfreecnt= throwing= spinning=atomicand8float64nanfloat32nanException ptrSize= targetpc=, xrefs: 6D0A699C
    • gc done but gcphase != _GCoffruntime: p.gcMarkWorkerMode= scanobject of a noscan objectruntime: marking free object addspecial on invalid pointerruntime: summary max pages = runtime: levelShift[level] = doRecordGoroutineProfile gp1=NtCreateWaitCompletionPacket, xrefs: 6D0A6C4A
    • gcing MB, got= ... max=scav ptr ] = (usagefalseinit ms, fault and tab= top=[...], fp:MarchApril+0530+0430+0545+0630+0330+0845+1030+1245+1345-0930Localsse41sse42ssse3int16int32int64uint8arraysliceGreeklistensocketsysmontimersefenceselect, not object next= , xrefs: 6D0A5ABA
    • +:(1/=,-[<{}_My: ??M , [("")) ) @s -> Pn=][}]i)> +"osLlLtLuMnfinptrnilobjgc %: gp *(in n= ) - NaN P m= MPC= < end > ...]:???pc= GEOF\\.\\?\??MayUTCEET+00+01CATWATEATGMTHSTHDT-03-04-05ESTCSTCDTMSTMDT-02EDTASTADTPSTPDTNSTNDT+06+03+04+07IST+09+08, xrefs: 6D0A64A4, 6D0A678B
    • failed to set sweep barrierwork.nwait was > work.nproc not in stack roots range [allocated pages below zero?address not a stack addressmspan.sweep: bad span stateinvalid profile bucket typeruntime: corrupted polldescruntime: netpollinit failedruntime: asyncPre, xrefs: 6D0A6C34
    • non-concurrent sweep failed to drain all sweep queuesruntime: NtCancelWaitCompletionPacket failed; errno= exited a goroutine internally locked to the OS threadcompileCallback: argument size is larger than uintptrmin size of malloc header is not a size class bo, xrefs: 6D0A6C1E
    • , xrefs: 6D0A606A
    • @s -> Pn=][}]i)> +"osLlLtLuMnfinptrnilobjgc %: gp *(in n= ) - NaN P m= MPC= < end > ...]:???pc= GEOF\\.\\?\??MayUTCEET+00+01CATWATEATGMTHSTHDT-03-04-05ESTCSTCDTMSTMDT-02EDTASTADTPSTPDTNSTNDT+06+03+04+07IST+09+08IDT+12PKT+11KST+05JST+10-01-11-12, xrefs: 6D0A62C7
    • ms cpu, (forced) wbuf1.n= wbuf2.n= s.limit= s.state= B work ( B exp.) marked unmarked in use), size = , tail = recover: not in [ctxt != 0, oldval=, newval= threads=: status= blocked= lockedg=atomicor8 runtime= m->curg=(unknown)traceback} stack=[ gp.goid, xrefs: 6D0A68DC
    Memory Dump Source
    • Source File: 00000003.00000002.2212531983.000000006D091000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D090000, based on PE: true
    • Associated: 00000003.00000002.2212515659.000000006D090000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212599577.000000006D12D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212619894.000000006D12E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212640649.000000006D12F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212661061.000000006D134000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212792942.000000006D1DD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212938204.000000006D1FB000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212957971.000000006D202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212978463.000000006D203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2213008790.000000006D206000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6d090000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID: $ @s -> Pn=][}]i)> +"osLlLtLuMnfinptrnilobjgc %: gp *(in n= ) - NaN P m= MPC= < end > ...]:???pc= GEOF\\.\\?\??MayUTCEET+00+01CATWATEATGMTHSTHDT-03-04-05ESTCSTCDTMSTMDT-02EDTASTADTPSTPDTNSTNDT+06+03+04+07IST+09+08IDT+12PKT+11KST+05JST+10-01-11-12$ MB globals, work.nproc= work.nwait= nStackRoots= flushedWork double unlock s.spanclass= MB) workers=min too large-byte block (runtime: val=runtime: seq=fatal error: idlethreads= syscalltick=load64 failedxadd64 failedxchg64 failednil stackbase}sched={pc:$ MB goal, s.state = s.base()= heapGoal=GOMEMLIMIT KiB now, pages at sweepgen= sweepgen , bound = , limit = exitThreadBad varintGC forced runqueue= stopwait= runqsize= gfreecnt= throwing= spinning=atomicand8float64nanfloat32nanException ptrSize= targetpc=$ ms clock, nBSSRoots=runtime: P exp.) for minTrigger=GOMEMLIMIT=bad m value, elemsize= freeindex= span.list=, npages = p->status= in status idleprocs= gcwaiting= schedtick= timerslen= mallocing=bad timedivfloat64nan1float64nan2float64nan3float32nan2GOTRACE$ ms cpu, (forced) wbuf1.n= wbuf2.n= s.limit= s.state= B work ( B exp.) marked unmarked in use), size = , tail = recover: not in [ctxt != 0, oldval=, newval= threads=: status= blocked= lockedg=atomicor8 runtime= m->curg=(unknown)traceback} stack=[ gp.goid$+:(1/=,-[<{}_My: ??M , [("")) ) @s -> Pn=][}]i)> +"osLlLtLuMnfinptrnilobjgc %: gp *(in n= ) - NaN P m= MPC= < end > ...]:???pc= GEOF\\.\\?\??MayUTCEET+00+01CATWATEATGMTHSTHDT-03-04-05ESTCSTCDTMSTMDT-02EDTASTADTPSTPDTNSTNDT+06+03+04+07IST+09+08$.$5$failed to set sweep barrierwork.nwait was > work.nproc not in stack roots range [allocated pages below zero?address not a stack addressmspan.sweep: bad span stateinvalid profile bucket typeruntime: corrupted polldescruntime: netpollinit failedruntime: asyncPre$gc %: gp *(in n= ) - NaN P m= MPC= < end > ...]:???pc= GEOF\\.\\?\??MayUTCEET+00+01CATWATEATGMTHSTHDT-03-04-05ESTCSTCDTMSTMDT-02EDTASTADTPSTPDTNSTNDT+06+03+04+07IST+09+08IDT+12PKT+11KST+05JST+10-01-11-12-08-09+13CETBSTMSK-06+14StdDltadxaesshaavxfmaintma$gc done but gcphase != _GCoffruntime: p.gcMarkWorkerMode= scanobject of a noscan objectruntime: marking free object addspecial on invalid pointerruntime: summary max pages = runtime: levelShift[level] = doRecordGoroutineProfile gp1=NtCreateWaitCompletionPacket$gcing MB, got= ... max=scav ptr ] = (usagefalseinit ms, fault and tab= top=[...], fp:MarchApril+0530+0430+0545+0630+0330+0845+1030+1245+1345-0930Localsse41sse42ssse3int16int32int64uint8arraysliceGreeklistensocketsysmontimersefenceselect, not object next= $non-concurrent sweep failed to drain all sweep queuesruntime: NtCancelWaitCompletionPacket failed; errno= exited a goroutine internally locked to the OS threadcompileCallback: argument size is larger than uintptrmin size of malloc header is not a size class bo
    • API String ID: 0-2575422049
    • Opcode ID: 6291a8e6b5640cc77e6ddf27220370e7b941761639cb6c2739985ea7f6dfc23d
    • Instruction ID: dc44b1305a0a5ce5526d23c14e27a01b9ae582b4f3d896ba1fe0a9c819a2a584
    • Opcode Fuzzy Hash: 6291a8e6b5640cc77e6ddf27220370e7b941761639cb6c2739985ea7f6dfc23d
    • Instruction Fuzzy Hash: 6FB2F5B46093408FD724EF68D190BAEBBF5BBC9304F56892ED98987351DB709844CF92

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1520 6d0b93f0-6d0b9402 1521 6d0b9408-6d0b9450 1520->1521 1522 6d0b9f94-6d0b9f99 call 6d0faf70 1520->1522 1523 6d0b9476-6d0b947d 1521->1523 1522->1520 1525 6d0b957b-6d0b9581 1523->1525 1526 6d0b9483-6d0b94ed 1523->1526 1530 6d0b97f9-6d0b9800 call 6d0fc410 1525->1530 1531 6d0b9587-6d0b95b3 call 6d0bc5d0 1525->1531 1528 6d0b9f8c-6d0b9f93 call 6d0fc440 1526->1528 1529 6d0b94f3-6d0b94f5 1526->1529 1528->1522 1533 6d0b94fb-6d0b9545 1529->1533 1534 6d0b9f85-6d0b9f87 call 6d0fc460 1529->1534 1537 6d0b9805-6d0b980c 1530->1537 1545 6d0b9621-6d0b9631 1531->1545 1546 6d0b95b5-6d0b9620 call 6d0b9360 1531->1546 1538 6d0b9552-6d0b9556 1533->1538 1539 6d0b9547-6d0b9550 1533->1539 1534->1528 1543 6d0b9810-6d0b9812 1537->1543 1544 6d0b9558-6d0b9576 1538->1544 1539->1544 1549 6d0b9818 1543->1549 1550 6d0b99fd 1543->1550 1544->1543 1547 6d0b9637-6d0b9648 1545->1547 1548 6d0b97f4 call 6d0fc400 1545->1548 1553 6d0b964e-6d0b9653 1547->1553 1554 6d0b97e1-6d0b97e9 1547->1554 1548->1530 1555 6d0b9f7e-6d0b9f80 call 6d0fc400 1549->1555 1556 6d0b981e-6d0b984c 1549->1556 1552 6d0b9a01-6d0b9a0a 1550->1552 1559 6d0b9d72-6d0b9de0 call 6d0b9360 1552->1559 1560 6d0b9a10-6d0b9a16 1552->1560 1561 6d0b9659-6d0b9666 1553->1561 1562 6d0b97c6-6d0b97d6 1553->1562 1554->1548 1555->1534 1564 6d0b984e-6d0b9854 1556->1564 1565 6d0b9856-6d0b98af 1556->1565 1579 6d0b9ee5-6d0b9eeb 1559->1579 1567 6d0b9a1c-6d0b9a26 1560->1567 1568 6d0b9d53-6d0b9d71 1560->1568 1569 6d0b97b8-6d0b97c1 1561->1569 1570 6d0b966c-6d0b97b3 call 6d0c6bb0 call 6d0c7410 call 6d0c7230 call 6d0c7410 call 6d0c7230 call 6d0c7410 call 6d0c7100 call 6d0c7410 call 6d0c7100 call 6d0c7410 call 6d0c7100 call 6d0c7410 call 6d0c6c10 call 6d0c6bb0 call 6d0c7410 call 6d0c7100 call 6d0c6db0 call 6d0c6c10 call 6d0f6bb0 1561->1570 1562->1554 1564->1537 1580 6d0b98bf-6d0b98c8 1565->1580 1581 6d0b98b1-6d0b98bd 1565->1581 1572 6d0b9a28-6d0b9a3f 1567->1572 1573 6d0b9a41-6d0b9a55 1567->1573 1570->1569 1577 6d0b9a5c 1572->1577 1573->1577 1582 6d0b9a5e-6d0b9a6f 1577->1582 1583 6d0b9a71-6d0b9a91 1577->1583 1585 6d0b9f68-6d0b9f79 call 6d0f6bb0 1579->1585 1586 6d0b9eed-6d0b9f02 1579->1586 1587 6d0b98ce-6d0b98e0 1580->1587 1581->1587 1591 6d0b9a98 1582->1591 1583->1591 1585->1555 1593 6d0b9f0b-6d0b9f1d 1586->1593 1594 6d0b9f04-6d0b9f09 1586->1594 1588 6d0b99c8-6d0b99ca 1587->1588 1589 6d0b98e6-6d0b98eb 1587->1589 1601 6d0b99cc-6d0b99e0 1588->1601 1602 6d0b99e2 1588->1602 1595 6d0b98ed-6d0b98f2 1589->1595 1596 6d0b98f4-6d0b9908 1589->1596 1597 6d0b9a9a-6d0b9a9f 1591->1597 1598 6d0b9aa1-6d0b9aa4 1591->1598 1600 6d0b9f1f 1593->1600 1594->1600 1604 6d0b990f-6d0b9911 1595->1604 1596->1604 1605 6d0b9aaa-6d0b9d4e call 6d0c6bb0 call 6d0c7410 call 6d0c7230 call 6d0c7410 call 6d0c7230 call 6d0c7410 call 6d0c7100 call 6d0c7410 call 6d0c7100 call 6d0c7410 call 6d0c7100 call 6d0c6db0 call 6d0c6c10 call 6d0c6bb0 call 6d0c7410 call 6d0c7230 call 6d0c7410 call 6d0c7100 call 6d0c7410 call 6d0c7230 call 6d0c6db0 call 6d0c6c10 call 6d0c6bb0 call 6d0c7410 call 6d0c72a0 call 6d0c7410 call 6d0c7230 call 6d0c6db0 call 6d0c6c10 call 6d0c6bb0 call 6d0c7410 call 6d0c7100 call 6d0c7410 call 6d0c7100 call 6d0c6db0 call 6d0c6c10 1597->1605 1598->1605 1607 6d0b9f28-6d0b9f40 1600->1607 1608 6d0b9f21-6d0b9f26 1600->1608 1603 6d0b99e6-6d0b99fb 1601->1603 1602->1603 1603->1552 1610 6d0b9452-6d0b946f 1604->1610 1611 6d0b9917-6d0b9919 1604->1611 1605->1579 1609 6d0b9f42-6d0b9f4e 1607->1609 1608->1609 1616 6d0b9f5a-6d0b9f5d 1609->1616 1617 6d0b9f50-6d0b9f55 1609->1617 1610->1523 1614 6d0b991b-6d0b9920 1611->1614 1615 6d0b9922-6d0b993d 1611->1615 1621 6d0b994b 1614->1621 1622 6d0b993f-6d0b9944 1615->1622 1623 6d0b99a7-6d0b99c3 1615->1623 1616->1585 1627 6d0b995e-6d0b996d 1621->1627 1628 6d0b994d-6d0b995c 1621->1628 1622->1621 1623->1537 1631 6d0b9970-6d0b99a2 1627->1631 1628->1631 1631->1537
    Strings
    • ] = (usagefalseinit ms, fault and tab= top=[...], fp:MarchApril+0530+0430+0545+0630+0330+0845+1030+1245+1345-0930Localsse41sse42ssse3int16int32int64uint8arraysliceGreeklistensocketsysmontimersefenceselect, not object next= jobs= goid sweep B -> % util alloc, xrefs: 6D0B96CD
    • runtime: npages = invalid skip valueruntime: range = {index out of rangeruntime: gp: gp=runtime: getg: g=forEachP: not done in async preemptbad manualFreeListruntime: textAddr frames elided..., locked to threadruntime.semacreateruntime.semawakeupQuerySer, xrefs: 6D0B976B
    • runtime: levelShift[level] = doRecordGoroutineProfile gp1=NtCreateWaitCompletionPacket, xrefs: 6D0B9CE8
    • , levelBits[level] = runtime: searchIdx = panic on system stackasync stack too largestartm: m is spinningstartlockedm: m has pfindrunnable: wrong ppreempt at unknown pcreleasep: invalid argcheckdead: runnable gruntime: newstack at runtime: newstack sp=runtime:, xrefs: 6D0B9D15
    • , j0 = head = panic: nmsys= locks= dying= allocsGODEBUG m->g0= pad1= pad2= text= minpc= value= (scan)types : type float32float64\\.\UNCTuesdayJanuaryOctoberMUI_StdMUI_Dltavx512finvaliduintptros/execruntimetls3desno anodeCancelIoReadFileAcceptExWSAIoctlshu, xrefs: 6D0B9C04
    • bad summary dataruntime: addr = runtime: base = runtime: head = timeBeginPeriod, xrefs: 6D0B97A2, 6D0B9F68
    • , [("")) ) @s -> Pn=][}]i)> +"osLlLtLuMnfinptrnilobjgc %: gp *(in n= ) - NaN P m= MPC= < end > ...]:???pc= GEOF\\.\\?\??MayUTCEET+00+01CATWATEATGMTHSTHDT-03-04-05ESTCSTCDTMSTMDT-02EDTASTADTPSTPDTNSTNDT+06+03+04+07IST+09+08IDT+12PKT+11KST+05JST, xrefs: 6D0B96F7, 6D0B9721, 6D0B9B44, 6D0B9B6E
    • runtime: p.searchAddr = range partially overlapsstack trace unavailablebindm in unexpected GOOSruntime: mp.lockedInt = runqsteal: runq overflowdouble traceGCSweepStartbad use of trace.seqlockSA Pacific Standard TimeSA Eastern Standard TimeUS Eastern Standard , xrefs: 6D0B9C5B
    • , npages = p->status= in status idleprocs= gcwaiting= schedtick= timerslen= mallocing=bad timedivfloat64nan1float64nan2float64nan3float32nan2GOTRACEBACK) at entry+ (targetpc= , plugin: runtime: g : frame.sp=created by short writeProcessPrngMoveFileExWNetShar, xrefs: 6D0B9BD7
    • ] = pc=true+Inf-Inf: p=cas1cas2cas3cas4cas5cas6 at m= sp= sp: lr: fp= gp= mp=) m=JuneJulyEESTSASTAKSTAKDTACSTACDTAESTAEDTAWSTCESTNZSTNZDTermssse3avx2bmi1bmi2boolint8uintchanfunctimentohswriteclosedefersweeptestRtestWexecWhchanexecRschedsudogtimergscanmheapt, xrefs: 6D0B9B1A
    • ][}]i)> +"osLlLtLuMnfinptrnilobjgc %: gp *(in n= ) - NaN P m= MPC= < end > ...]:???pc= GEOF\\.\\?\??MayUTCEET+00+01CATWATEATGMTHSTHDT-03-04-05ESTCSTCDTMSTMDT-02EDTASTADTPSTPDTNSTNDT+06+03+04+07IST+09+08IDT+12PKT+11KST+05JST+10-01-11-12-08-09+13C, xrefs: 6D0B96A4, 6D0B9AED
    • runtime: summary[runtime: level = , p.searchAddr = RtlGetCurrentPeb, xrefs: 6D0B967A, 6D0B9AB3
    • , i = code= addr= m->p= p->m=SCHED curg= ctxt: min= max= bad ts(...) m=nil base stringGetACPSundayMondayFridayAugustUTC-11UTC-02UTC-08UTC-09UTC+12UTC+13rdtscppopcntuint16uint32uint64structcmd/gonetdnsCommonCopySidWSARecvWSASendconnectconsoleforcegcallocmWc, xrefs: 6D0B9C88
    Memory Dump Source
    • Source File: 00000003.00000002.2212531983.000000006D091000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D090000, based on PE: true
    • Associated: 00000003.00000002.2212515659.000000006D090000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212599577.000000006D12D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212619894.000000006D12E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212640649.000000006D12F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212661061.000000006D134000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212792942.000000006D1DD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212938204.000000006D1FB000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212957971.000000006D202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212978463.000000006D203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2213008790.000000006D206000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6d090000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID: , [("")) ) @s -> Pn=][}]i)> +"osLlLtLuMnfinptrnilobjgc %: gp *(in n= ) - NaN P m= MPC= < end > ...]:???pc= GEOF\\.\\?\??MayUTCEET+00+01CATWATEATGMTHSTHDT-03-04-05ESTCSTCDTMSTMDT-02EDTASTADTPSTPDTNSTNDT+06+03+04+07IST+09+08IDT+12PKT+11KST+05JST$, i = code= addr= m->p= p->m=SCHED curg= ctxt: min= max= bad ts(...) m=nil base stringGetACPSundayMondayFridayAugustUTC-11UTC-02UTC-08UTC-09UTC+12UTC+13rdtscppopcntuint16uint32uint64structcmd/gonetdnsCommonCopySidWSARecvWSASendconnectconsoleforcegcallocmWc$, j0 = head = panic: nmsys= locks= dying= allocsGODEBUG m->g0= pad1= pad2= text= minpc= value= (scan)types : type float32float64\\.\UNCTuesdayJanuaryOctoberMUI_StdMUI_Dltavx512finvaliduintptros/execruntimetls3desno anodeCancelIoReadFileAcceptExWSAIoctlshu$, levelBits[level] = runtime: searchIdx = panic on system stackasync stack too largestartm: m is spinningstartlockedm: m has pfindrunnable: wrong ppreempt at unknown pcreleasep: invalid argcheckdead: runnable gruntime: newstack at runtime: newstack sp=runtime:$, npages = p->status= in status idleprocs= gcwaiting= schedtick= timerslen= mallocing=bad timedivfloat64nan1float64nan2float64nan3float32nan2GOTRACEBACK) at entry+ (targetpc= , plugin: runtime: g : frame.sp=created by short writeProcessPrngMoveFileExWNetShar$] = pc=true+Inf-Inf: p=cas1cas2cas3cas4cas5cas6 at m= sp= sp: lr: fp= gp= mp=) m=JuneJulyEESTSASTAKSTAKDTACSTACDTAESTAEDTAWSTCESTNZSTNZDTermssse3avx2bmi1bmi2boolint8uintchanfunctimentohswriteclosedefersweeptestRtestWexecWhchanexecRschedsudogtimergscanmheapt$] = (usagefalseinit ms, fault and tab= top=[...], fp:MarchApril+0530+0430+0545+0630+0330+0845+1030+1245+1345-0930Localsse41sse42ssse3int16int32int64uint8arraysliceGreeklistensocketsysmontimersefenceselect, not object next= jobs= goid sweep B -> % util alloc$][}]i)> +"osLlLtLuMnfinptrnilobjgc %: gp *(in n= ) - NaN P m= MPC= < end > ...]:???pc= GEOF\\.\\?\??MayUTCEET+00+01CATWATEATGMTHSTHDT-03-04-05ESTCSTCDTMSTMDT-02EDTASTADTPSTPDTNSTNDT+06+03+04+07IST+09+08IDT+12PKT+11KST+05JST+10-01-11-12-08-09+13C$bad summary dataruntime: addr = runtime: base = runtime: head = timeBeginPeriod$runtime: levelShift[level] = doRecordGoroutineProfile gp1=NtCreateWaitCompletionPacket$runtime: npages = invalid skip valueruntime: range = {index out of rangeruntime: gp: gp=runtime: getg: g=forEachP: not done in async preemptbad manualFreeListruntime: textAddr frames elided..., locked to threadruntime.semacreateruntime.semawakeupQuerySer$runtime: p.searchAddr = range partially overlapsstack trace unavailablebindm in unexpected GOOSruntime: mp.lockedInt = runqsteal: runq overflowdouble traceGCSweepStartbad use of trace.seqlockSA Pacific Standard TimeSA Eastern Standard TimeUS Eastern Standard $runtime: summary[runtime: level = , p.searchAddr = RtlGetCurrentPeb
    • API String ID: 0-566501290
    • Opcode ID: baa2fc7f1d7078900f056ae94b620c916b3b717c327e1c0b8ec16ae00297ee55
    • Instruction ID: b8a01d7d0cbb489d2043ae2c256d0cd1272fbb5b0c2d263b5e0bce899abfb893
    • Opcode Fuzzy Hash: baa2fc7f1d7078900f056ae94b620c916b3b717c327e1c0b8ec16ae00297ee55
    • Instruction Fuzzy Hash: 24523575A1C7458FE320DF68D48076EBBE1BF89304F52892DEA9887350D775A884CB93

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1880 6d0c1570-6d0c157e 1881 6d0c181e-6d0c1823 call 6d0faf70 1880->1881 1882 6d0c1584-6d0c15b6 call 6d0c32a0 1880->1882 1881->1880 1887 6d0c15bc-6d0c15ea call 6d0c1470 1882->1887 1888 6d0c1807-6d0c181d call 6d0f6bb0 1882->1888 1893 6d0c15fc-6d0c1631 call 6d0c32a0 1887->1893 1894 6d0c15ec-6d0c15f9 call 6d0fc390 1887->1894 1888->1881 1899 6d0c1637-6d0c1669 call 6d0c1470 1893->1899 1900 6d0c17f1-6d0c1802 call 6d0f6bb0 1893->1900 1894->1893 1904 6d0c167b-6d0c1683 1899->1904 1905 6d0c166b-6d0c1678 call 6d0fc390 1899->1905 1900->1888 1907 6d0c172d-6d0c175f call 6d0c1470 1904->1907 1908 6d0c1689-6d0c16bb call 6d0c1470 1904->1908 1905->1904 1914 6d0c1771-6d0c17a9 call 6d0c1470 1907->1914 1915 6d0c1761-6d0c176e call 6d0fc390 1907->1915 1916 6d0c16cd-6d0c16d5 1908->1916 1917 6d0c16bd-6d0c16ca call 6d0fc390 1908->1917 1928 6d0c17bb-6d0c17c4 1914->1928 1929 6d0c17ab-6d0c17b8 call 6d0fc390 1914->1929 1915->1914 1920 6d0c17db-6d0c17ec call 6d0f6bb0 1916->1920 1921 6d0c16db-6d0c170d call 6d0c1470 1916->1921 1917->1916 1920->1900 1932 6d0c171f-6d0c1727 1921->1932 1933 6d0c170f-6d0c171c call 6d0fc390 1921->1933 1929->1928 1932->1907 1936 6d0c17c5-6d0c17d6 call 6d0f6bb0 1932->1936 1933->1932 1936->1920
    Strings
    • , xrefs: 6D0C16A2
    • RtlGetCurrentPeb, xrefs: 6D0C1734
    • NtCreateWaitCompletionPacket, xrefs: 6D0C163E
    • ProcessPrng, xrefs: 6D0C15BF
    • NtAssociateWaitCompletionPacket, xrefs: 6D0C1690
    • , xrefs: 6D0C169A
    • NtCancelWaitCompletionPacket, xrefs: 6D0C16E2
    • NtCreateWaitCompletionPacket exists but NtCancelWaitCompletionPacket does notcannot convert slice with length %y to array or pointer to array with length %xNtCreateWaitCompletionPacket exists but NtAssociateWaitCompletionPacket does notcgocheck > 1 mode is no , xrefs: 6D0C17C5
    • bcryptprimitives.dll, xrefs: 6D0C158D
    • ntdll.dll, xrefs: 6D0C1608
    • P, xrefs: 6D0C17E4
    • bcryptprimitives.dll not foundpanic called with nil argumentcheckdead: inconsistent countsrunqputslow: queue is not fullruntime: bad pointer in frame invalid pointer found on stack locals stack map entries for abi mismatch detected between runtime: impossible , xrefs: 6D0C1807
    • RtlGetVersion, xrefs: 6D0C177E
    Memory Dump Source
    • Source File: 00000003.00000002.2212531983.000000006D091000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D090000, based on PE: true
    • Associated: 00000003.00000002.2212515659.000000006D090000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212599577.000000006D12D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212619894.000000006D12E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212640649.000000006D12F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212661061.000000006D134000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212792942.000000006D1DD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212938204.000000006D1FB000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212957971.000000006D202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212978463.000000006D203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2213008790.000000006D206000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6d090000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID: $ $NtAssociateWaitCompletionPacket$NtCancelWaitCompletionPacket$NtCreateWaitCompletionPacket$NtCreateWaitCompletionPacket exists but NtCancelWaitCompletionPacket does notcannot convert slice with length %y to array or pointer to array with length %xNtCreateWaitCompletionPacket exists but NtAssociateWaitCompletionPacket does notcgocheck > 1 mode is no $P$ProcessPrng$RtlGetCurrentPeb$RtlGetVersion$bcryptprimitives.dll$bcryptprimitives.dll not foundpanic called with nil argumentcheckdead: inconsistent countsrunqputslow: queue is not fullruntime: bad pointer in frame invalid pointer found on stack locals stack map entries for abi mismatch detected between runtime: impossible $ntdll.dll
    • API String ID: 0-2332038095
    • Opcode ID: 248e187ca0c9823b1c6843dae2462b85d59856dc256a1270d4bd4ee584367a1e
    • Instruction ID: c8adb2e65d00a0c35b412daeafe81c6aabbeeac46a866e779c02c4252c6059a9
    • Opcode Fuzzy Hash: 248e187ca0c9823b1c6843dae2462b85d59856dc256a1270d4bd4ee584367a1e
    • Instruction Fuzzy Hash: E971A5B450A3029FEB04DF68E19076ABBF0BB8A344F11882DE99987340D7B4D449CF97
    Strings
    • mspan.sweep: m is not lockedfound pointer to free objectmheap.freeSpanLocked - span runtime.semasleep unexpectedfatal: morestack on gsignalruntime: casgstatus: oldval=gcstopm: negative nmspinningfindrunnable: netpoll with psave on system g not allowednewproc1, xrefs: 6D0B41A9
    • nalloc= nfreed=runtime.[signal reflect. newval= mcount= bytes, stack=[ minLC= maxpc= stack=[ minutes status= etypes wsaioctlThursdaySaturdayFebruaryNovemberDecember%!Month(avx512bwavx512vlgo/typesnet/httpgo/buildnetedns0tlskyberx509sha1FindCloseLocalFreeMo, xrefs: 6D0B3D81
    • , xrefs: 6D0B3E12
    • mheap.sweepgen=runtime: nelems=workbuf is emptymSpanList.removemSpanList.insertbad special kindbad summary dataruntime: addr = runtime: base = runtime: head = timeBeginPeriod, xrefs: 6D0B3CE2, 6D0B4156
    • mspan.sweep: bad span stateinvalid profile bucket typeruntime: corrupted polldescruntime: netpollinit failedruntime: asyncPreemptStack=runtime: thread ID overflowstopTheWorld: holding locksgcstopm: not waiting for gcruntime: checkdead: nmidle=runtime: checkdea, xrefs: 6D0B418A
    • sweepgen= sweepgen , bound = , limit = exitThreadBad varintGC forced runqueue= stopwait= runqsize= gfreecnt= throwing= spinning=atomicand8float64nanfloat32nanException ptrSize= targetpc= until pc=unknown pcruntime: ggoroutine LockFileExWSASocketWunixpacket, xrefs: 6D0B3CB8, 6D0B412C
    • sweep: tried to preserve a user arena spanruntime: blocked write on closing polldescacquireSudog: found s.elem != nil in cachefatal error: cgo callback before cgo callon a locked thread with no template threadunexpected signal during runtime executiontraceSto, xrefs: 6D0B3C4F
    • previous allocCount=, levelBits[level] = runtime: searchIdx = panic on system stackasync stack too largestartm: m is spinningstartlockedm: m has pfindrunnable: wrong ppreempt at unknown pcreleasep: invalid argcheckdead: runnable gruntime: newstack at runtime:, xrefs: 6D0B3DAB
    • mspan.sweep: bad span state after sweepruntime: blocked write on free polldescPowerRegisterSuspendResumeNotification, xrefs: 6D0B3D16
    • swept cached spanmarkBits overflowruntime: summary[runtime: level = , p.searchAddr = RtlGetCurrentPeb, xrefs: 6D0B3C65
    • sweep increased allocation countremovespecial on invalid pointerruntime: root level max pages = NtAssociateWaitCompletionPacket, xrefs: 6D0B3E09
    Memory Dump Source
    • Source File: 00000003.00000002.2212531983.000000006D091000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D090000, based on PE: true
    • Associated: 00000003.00000002.2212515659.000000006D090000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212599577.000000006D12D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212619894.000000006D12E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212640649.000000006D12F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212661061.000000006D134000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212792942.000000006D1DD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212938204.000000006D1FB000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212957971.000000006D202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212978463.000000006D203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2213008790.000000006D206000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6d090000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID: $ mheap.sweepgen=runtime: nelems=workbuf is emptymSpanList.removemSpanList.insertbad special kindbad summary dataruntime: addr = runtime: base = runtime: head = timeBeginPeriod$ nalloc= nfreed=runtime.[signal reflect. newval= mcount= bytes, stack=[ minLC= maxpc= stack=[ minutes status= etypes wsaioctlThursdaySaturdayFebruaryNovemberDecember%!Month(avx512bwavx512vlgo/typesnet/httpgo/buildnetedns0tlskyberx509sha1FindCloseLocalFreeMo$ previous allocCount=, levelBits[level] = runtime: searchIdx = panic on system stackasync stack too largestartm: m is spinningstartlockedm: m has pfindrunnable: wrong ppreempt at unknown pcreleasep: invalid argcheckdead: runnable gruntime: newstack at runtime:$ sweepgen= sweepgen , bound = , limit = exitThreadBad varintGC forced runqueue= stopwait= runqsize= gfreecnt= throwing= spinning=atomicand8float64nanfloat32nanException ptrSize= targetpc= until pc=unknown pcruntime: ggoroutine LockFileExWSASocketWunixpacket$mspan.sweep: bad span state after sweepruntime: blocked write on free polldescPowerRegisterSuspendResumeNotification$mspan.sweep: bad span stateinvalid profile bucket typeruntime: corrupted polldescruntime: netpollinit failedruntime: asyncPreemptStack=runtime: thread ID overflowstopTheWorld: holding locksgcstopm: not waiting for gcruntime: checkdead: nmidle=runtime: checkdea$mspan.sweep: m is not lockedfound pointer to free objectmheap.freeSpanLocked - span runtime.semasleep unexpectedfatal: morestack on gsignalruntime: casgstatus: oldval=gcstopm: negative nmspinningfindrunnable: netpoll with psave on system g not allowednewproc1$sweep increased allocation countremovespecial on invalid pointerruntime: root level max pages = NtAssociateWaitCompletionPacket$sweep: tried to preserve a user arena spanruntime: blocked write on closing polldescacquireSudog: found s.elem != nil in cachefatal error: cgo callback before cgo callon a locked thread with no template threadunexpected signal during runtime executiontraceSto$swept cached spanmarkBits overflowruntime: summary[runtime: level = , p.searchAddr = RtlGetCurrentPeb
    • API String ID: 0-893999930
    • Opcode ID: cdb9c63c8e435b13590e5a712b510eec3c000adbf88878b9b5c564e9e5eb6914
    • Instruction ID: 98a4b3847e8c28bcc9e07fa07ca6a5979d8f3273034f778afa91f522e2219c80
    • Opcode Fuzzy Hash: cdb9c63c8e435b13590e5a712b510eec3c000adbf88878b9b5c564e9e5eb6914
    • Instruction Fuzzy Hash: 3E8212B450C3958FE351DF28C080B6EBBE1BF89708F51886DE9D88B391DB719945CB92
    Strings
    • runtime.minit: duplicatehandle failed_cgo_notify_runtime_init_done missingstartTheWorld: inconsistent mp->nextpruntime: unexpected SPWRITE function all goroutines are asleep - deadlock!internal error: unknown network type godebug: unexpected IncNonDefault of b, xrefs: 6D0C2F31
    • CreateWaitableTimerEx when creating timer failedruntime.preemptM: duplicatehandle failed; errno=runtime: malformed profBuf buffer - invalid sizeattempt to trace invalid or unsupported P statusruntime: waitforsingleobject wait_failed; errno=invalid or incomplet, xrefs: 6D0C2E7B, 6D0C2ED6
    • ,-[<{}_My: ??M , [("")) ) @s -> Pn=][}]i)> +"osLlLtLuMnfinptrnilobjgc %: gp *(in n= ) - NaN P m= MPC= < end > ...]:???pc= GEOF\\.\\?\??MayUTCEET+00+01CATWATEATGMTHSTHDT-03-04-05ESTCSTCDTMSTMDT-02EDTASTADTPSTPDTNSTNDT+06+03+04+07IST+09+08IDT+12, xrefs: 6D0C2D29
    • runtime: VirtualQuery failed; errno=runtime: sudog with non-nil waitlinkruntime: mcall called on m->g0 stackstartm: P required for spinning=true) is not Grunnable or Gscanrunnableruntime: bad notifyList size - sync=accessed data from freed user arena runtime:, xrefs: 6D0C2D95
    • VirtualQuery for stack base failedforEachP: sched.safePointWait != 0schedule: spinning with local workentersyscallblock inconsistent bp entersyscallblock inconsistent sp runtime: g is running but p is notunexpected runtime.netpoll error: network dropped connec, xrefs: 6D0C2DC9
    • %, xrefs: 6D0C2F3A
    • runtime: NtCreateWaitCompletionPacket failed; errno=casfrom_Gscanstatus: gp->status is not in scan statenon-concurrent sweep failed to drain all sweep queuesruntime: NtCancelWaitCompletionPacket failed; errno= exited a goroutine internally locked to the OS thr, xrefs: 6D0C2DEC
    • NtCreateWaitCompletionPacket failedfindrunnable: netpoll with spinningpidleput: P has non-empty run queuetraceback did not unwind completelyruntime: createevent failed; errno=file type does not support deadline2006-01-02T15:04:05.999999999Z07:00accessing a cor, xrefs: 6D0C2E20
    • runtime.minit: duplicatehandle failed; errno=runtime: CreateWaitableTimerEx failed; errno=exitsyscall: syscall frame is no longer validunsafe.String: ptr is nil and len is not zerociphertext is not a multiple of the block sizeslice bounds out of range [:%x] wi, xrefs: 6D0C2EFD
    • bad g0 stackself-preempt [recovered]bad recoverybad g statusentersyscallwirep: p->m=) p->status=releasep: m= sysmonwait= preemptoff=cas64 failed m->gsignal=-byte limitruntime: sp=abi mismatchwrong timersOpenServiceWRevertToSelfCreateEventWGetConsoleCPUnlockFi, xrefs: 6D0C2D6E
    • runtime: CreateWaitableTimerEx failed; errno=exitsyscall: syscall frame is no longer validunsafe.String: ptr is nil and len is not zerociphertext is not a multiple of the block sizeslice bounds out of range [:%x] with length %ypanicwrap: unexpected string afte, xrefs: 6D0C2E47, 6D0C2EA2
    Memory Dump Source
    • Source File: 00000003.00000002.2212531983.000000006D091000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D090000, based on PE: true
    • Associated: 00000003.00000002.2212515659.000000006D090000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212599577.000000006D12D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212619894.000000006D12E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212640649.000000006D12F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212661061.000000006D134000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212792942.000000006D1DD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212938204.000000006D1FB000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212957971.000000006D202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212978463.000000006D203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2213008790.000000006D206000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6d090000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID: %$,-[<{}_My: ??M , [("")) ) @s -> Pn=][}]i)> +"osLlLtLuMnfinptrnilobjgc %: gp *(in n= ) - NaN P m= MPC= < end > ...]:???pc= GEOF\\.\\?\??MayUTCEET+00+01CATWATEATGMTHSTHDT-03-04-05ESTCSTCDTMSTMDT-02EDTASTADTPSTPDTNSTNDT+06+03+04+07IST+09+08IDT+12$CreateWaitableTimerEx when creating timer failedruntime.preemptM: duplicatehandle failed; errno=runtime: malformed profBuf buffer - invalid sizeattempt to trace invalid or unsupported P statusruntime: waitforsingleobject wait_failed; errno=invalid or incomplet$NtCreateWaitCompletionPacket failedfindrunnable: netpoll with spinningpidleput: P has non-empty run queuetraceback did not unwind completelyruntime: createevent failed; errno=file type does not support deadline2006-01-02T15:04:05.999999999Z07:00accessing a cor$VirtualQuery for stack base failedforEachP: sched.safePointWait != 0schedule: spinning with local workentersyscallblock inconsistent bp entersyscallblock inconsistent sp runtime: g is running but p is notunexpected runtime.netpoll error: network dropped connec$bad g0 stackself-preempt [recovered]bad recoverybad g statusentersyscallwirep: p->m=) p->status=releasep: m= sysmonwait= preemptoff=cas64 failed m->gsignal=-byte limitruntime: sp=abi mismatchwrong timersOpenServiceWRevertToSelfCreateEventWGetConsoleCPUnlockFi$runtime.minit: duplicatehandle failed; errno=runtime: CreateWaitableTimerEx failed; errno=exitsyscall: syscall frame is no longer validunsafe.String: ptr is nil and len is not zerociphertext is not a multiple of the block sizeslice bounds out of range [:%x] wi$runtime.minit: duplicatehandle failed_cgo_notify_runtime_init_done missingstartTheWorld: inconsistent mp->nextpruntime: unexpected SPWRITE function all goroutines are asleep - deadlock!internal error: unknown network type godebug: unexpected IncNonDefault of b$runtime: CreateWaitableTimerEx failed; errno=exitsyscall: syscall frame is no longer validunsafe.String: ptr is nil and len is not zerociphertext is not a multiple of the block sizeslice bounds out of range [:%x] with length %ypanicwrap: unexpected string afte$runtime: NtCreateWaitCompletionPacket failed; errno=casfrom_Gscanstatus: gp->status is not in scan statenon-concurrent sweep failed to drain all sweep queuesruntime: NtCancelWaitCompletionPacket failed; errno= exited a goroutine internally locked to the OS thr$runtime: VirtualQuery failed; errno=runtime: sudog with non-nil waitlinkruntime: mcall called on m->g0 stackstartm: P required for spinning=true) is not Grunnable or Gscanrunnableruntime: bad notifyList size - sync=accessed data from freed user arena runtime:
    • API String ID: 0-2809656213
    • Opcode ID: aed1290d5cd95fb67e03ea63ef3837a3386a66f350d0c6d2e297ddf410e9ea20
    • Instruction ID: c9955fbfbd963404ce03a9da9f768c752ed440d59577a1f99e431bc0f8ced688
    • Opcode Fuzzy Hash: aed1290d5cd95fb67e03ea63ef3837a3386a66f350d0c6d2e297ddf410e9ea20
    • Instruction Fuzzy Hash: 61C1CFB45083018FE710EF68C19476EBBF4AF89708F42896CE99887350D7B59989DF93
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.2212531983.000000006D091000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D090000, based on PE: true
    • Associated: 00000003.00000002.2212515659.000000006D090000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212599577.000000006D12D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212619894.000000006D12E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212640649.000000006D12F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212661061.000000006D134000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212792942.000000006D1DD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212938204.000000006D1FB000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212957971.000000006D202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212978463.000000006D203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2213008790.000000006D206000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6d090000_rundll32.jbxd
    Similarity
    • API ID: AddressProc$HandleLibraryLoadModule
    • String ID: __deregister_frame_info$__register_frame_info$libgcc_s_dw2-1.dll
    • API String ID: 384173800-1835852900
    • Opcode ID: a7a62d8de81c60550c94b2ebf41b97aa636d2c1242ebccec74b838b050a155d0
    • Instruction ID: 10cee5d43e0f013f6d7b29f67d2365c8430de8cebf30b48b875902505c44c3c5
    • Opcode Fuzzy Hash: a7a62d8de81c60550c94b2ebf41b97aa636d2c1242ebccec74b838b050a155d0
    • Instruction Fuzzy Hash: 390121B1A093109FD700BFB8E64935EBEF8BB8A255F02552DD9849B208D7718804DBA3
    Strings
    • mallocgc called with gcphase == _GCmarkterminationrecursive call during initialization - linker skewattempt to execute system stack code on user stackcompileCallback: function argument frame too largelimiterEvent.stop: invalid limiter event type foundpotential, xrefs: 6D0F3E67
    • !"#$%%&&''((()))*++,,,,,------....//////0001123333333333444444444455666677777888888888889999999999::::::;;;;;;;;;;;;;;;;<<<<<<<<<<<<<<<<=====>>>>>>>>>>>??????????@@@@@@@@@@@@@@@@@@@@@@AAAAAAAAAAAAAAAAAAAAABBBBBBBBBBBCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC, xrefs: 6D0F381F
    • 4, xrefs: 6D0F3E2E
    • malloc deadlockruntime error: with GC progscan missed a gmisaligned maskruntime: min = runtime: inUse=runtime: max = requested skip=bad panic stackrecovery failedstopm holding pstartm: m has ppreempt SPWRITEmissing mcache?ms: gomaxprocs=randinit missed]mo, xrefs: 6D0F3E51
    • mallocgc called without a P or outside bootstrappingruntime.SetFinalizer: pointer not in allocated blockruntime: use of FixAlloc_Alloc before FixAlloc_Initspan set block with unpopped elements found in resetruntime: GetQueuedCompletionStatusEx failed (errno= , xrefs: 6D0F3E25
    • malloc during signalclose of nil channelnotetsleep not on g0bad system page size to unallocated span/gc/scan/stack:bytes/gc/scan/total:bytes/gc/heap/frees:bytes/gc/gomemlimit:bytesp mcache not flushed markroot jobs donepacer: assist ratio=workbuf is not empty, xrefs: 6D0F3E3B
    • p, xrefs: 6D0F3E7E
    • 3-, xrefs: 6D0F3E78
    • 2, xrefs: 6D0F3E70
    Memory Dump Source
    • Source File: 00000003.00000002.2212531983.000000006D091000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D090000, based on PE: true
    • Associated: 00000003.00000002.2212515659.000000006D090000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212599577.000000006D12D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212619894.000000006D12E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212640649.000000006D12F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212661061.000000006D134000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212792942.000000006D1DD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212938204.000000006D1FB000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212957971.000000006D202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212978463.000000006D203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2213008790.000000006D206000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6d090000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID: !"#$%%&&''((()))*++,,,,,------....//////0001123333333333444444444455666677777888888888889999999999::::::;;;;;;;;;;;;;;;;<<<<<<<<<<<<<<<<=====>>>>>>>>>>>??????????@@@@@@@@@@@@@@@@@@@@@@AAAAAAAAAAAAAAAAAAAAABBBBBBBBBBBCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC$2$4$malloc deadlockruntime error: with GC progscan missed a gmisaligned maskruntime: min = runtime: inUse=runtime: max = requested skip=bad panic stackrecovery failedstopm holding pstartm: m has ppreempt SPWRITEmissing mcache?ms: gomaxprocs=randinit missed]mo$malloc during signalclose of nil channelnotetsleep not on g0bad system page size to unallocated span/gc/scan/stack:bytes/gc/scan/total:bytes/gc/heap/frees:bytes/gc/gomemlimit:bytesp mcache not flushed markroot jobs donepacer: assist ratio=workbuf is not empty$mallocgc called with gcphase == _GCmarkterminationrecursive call during initialization - linker skewattempt to execute system stack code on user stackcompileCallback: function argument frame too largelimiterEvent.stop: invalid limiter event type foundpotential$mallocgc called without a P or outside bootstrappingruntime.SetFinalizer: pointer not in allocated blockruntime: use of FixAlloc_Alloc before FixAlloc_Initspan set block with unpopped elements found in resetruntime: GetQueuedCompletionStatusEx failed (errno= $3-$p
    • API String ID: 0-234616912
    • Opcode ID: b1fe1fa45d4e3dfff86e52ac2a4c51baff3cd173d0a66052ec800c2e7409f481
    • Instruction ID: 7e965f8e7cc0ee24847762114e0896f9618eff3d39f17fdff80959b371bcb861
    • Opcode Fuzzy Hash: b1fe1fa45d4e3dfff86e52ac2a4c51baff3cd173d0a66052ec800c2e7409f481
    • Instruction Fuzzy Hash: F262AD756083418FE714CF29C09072ABBF1BF89724F25896DE9948B392D775E846CF82
    Strings
    • !, xrefs: 6D10D20C
    • invalid pattern syntax (+ after -): cannot exec a shared library directlyvalue too large for defined data typeruntime: allocation size out of range) is smaller than minimum page size (/cpu/classes/gc/mark/idle:cpu-secondssetprofilebucket: profile already setfa, xrefs: 6D10D783
    • pattern bits too long: runtime: C malloc failedconnection reset by peerlevel 2 not synchronizedlink number out of rangeout of streams resourcesfunction not implementedstructure needs cleaningnot supported by windowsCertFreeCertificateChainCreateToolhelp32Snaps, xrefs: 6D10D8A5
    • y: ??M , [("")) ) @s -> Pn=][}]i)> +"osLlLtLuMnfinptrnilobjgc %: gp *(in n= ) - NaN P m= MPC= < end > ...]:???pc= GEOF\\.\\?\??MayUTCEET+00+01CATWATEATGMTHSTHDT-03-04-05ESTCSTCDTMSTMDT-02EDTASTADTPSTPDTNSTNDT+06+03+04+07IST+09+08IDT+12PKT+11KS, xrefs: 6D10D2E5
    • invalid pattern syntax: resource deadlock avoidedoperation now in progressno buffer space availableno such device or addresssocket type not supportedinvalid cross-device linkGetFinalPathNameByHandleWGetQueuedCompletionStatusUpdateProcThreadAttributegoroutine p, xrefs: 6D10D095, 6D10D188, 6D10D258, 6D10D814, 6D10D936, 6D10D9C7, 6D10DA58, 6D10DAED
    • v, xrefs: 6D10D145
    • n, xrefs: 6D10D2D1
    • $, xrefs: 6D10D78D
    Memory Dump Source
    • Source File: 00000003.00000002.2212531983.000000006D091000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D090000, based on PE: true
    • Associated: 00000003.00000002.2212515659.000000006D090000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212599577.000000006D12D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212619894.000000006D12E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212640649.000000006D12F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212661061.000000006D134000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212792942.000000006D1DD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212938204.000000006D1FB000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212957971.000000006D202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212978463.000000006D203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2213008790.000000006D206000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6d090000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID: !$$$invalid pattern syntax (+ after -): cannot exec a shared library directlyvalue too large for defined data typeruntime: allocation size out of range) is smaller than minimum page size (/cpu/classes/gc/mark/idle:cpu-secondssetprofilebucket: profile already setfa$invalid pattern syntax: resource deadlock avoidedoperation now in progressno buffer space availableno such device or addresssocket type not supportedinvalid cross-device linkGetFinalPathNameByHandleWGetQueuedCompletionStatusUpdateProcThreadAttributegoroutine p$n$pattern bits too long: runtime: C malloc failedconnection reset by peerlevel 2 not synchronizedlink number out of rangeout of streams resourcesfunction not implementedstructure needs cleaningnot supported by windowsCertFreeCertificateChainCreateToolhelp32Snaps$v$y: ??M , [("")) ) @s -> Pn=][}]i)> +"osLlLtLuMnfinptrnilobjgc %: gp *(in n= ) - NaN P m= MPC= < end > ...]:???pc= GEOF\\.\\?\??MayUTCEET+00+01CATWATEATGMTHSTHDT-03-04-05ESTCSTCDTMSTMDT-02EDTASTADTPSTPDTNSTNDT+06+03+04+07IST+09+08IDT+12PKT+11KS
    • API String ID: 0-3686076665
    • Opcode ID: c12cdb8e74d0dfc6a433a9bebc375507c4ccce9ff435dc672d3cff8bd5b1c296
    • Instruction ID: 96d5857e4ecfc35076920d88b789a9c63fddb5acdd807552f16e0d5196b977e1
    • Opcode Fuzzy Hash: c12cdb8e74d0dfc6a433a9bebc375507c4ccce9ff435dc672d3cff8bd5b1c296
    • Instruction Fuzzy Hash: 437233B4A083458FD314EF29D18075AFBF1BBC9704F558A2EE99887341DBB4A944CF92
    Strings
    • %!Month(avx512bwavx512vlgo/typesnet/httpgo/buildnetedns0tlskyberx509sha1FindCloseLocalFreeMoveFileWWriteFileWSASendTod.nx != 0timerSendpollCacheprofBlockstackpoolhchanLeafwbufSpansGC (idle)mSpanDeadinittracescavtracepanicwaitchan sendpreemptedcoroutinecopystac, xrefs: 6D1140F9, 6D1143DB
    • 0, xrefs: 6D113270
    • )]+:(1/=,-[<{}_My: ??M , [("")) ) @s -> Pn=][}]i)> +"osLlLtLuMnfinptrnilobjgc %: gp *(in n= ) - NaN P m= MPC= < end > ...]:???pc= GEOF\\.\\?\??MayUTCEET+00+01CATWATEATGMTHSTHDT-03-04-05ESTCSTCDTMSTMDT-02EDTASTADTPSTPDTNSTNDT+06+03+04+07IST+09+, xrefs: 6D113D04, 6D113FCF, 6D114113, 6D1143F5
    • 0, xrefs: 6D113464
    • 0, xrefs: 6D113387
    • 0, xrefs: 6D1131D1
    • %!Weekday(complex128execerrdothttp2debugcrypto/tlsMessageBoxWSleepyCardsbroken pipebad messagefile existsbad addressRegCloseKeyCloseHandleCreateFileWDeleteFileWExitProcessFreeLibraryGetFileTypeOpenProcessSetFileTimeVirtualLockWSARecvFromclosesocketgetpeernameg, xrefs: 6D113CEA, 6D113FB5
    Memory Dump Source
    • Source File: 00000003.00000002.2212531983.000000006D091000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D090000, based on PE: true
    • Associated: 00000003.00000002.2212515659.000000006D090000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212599577.000000006D12D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212619894.000000006D12E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212640649.000000006D12F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212661061.000000006D134000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212792942.000000006D1DD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212938204.000000006D1FB000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212957971.000000006D202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212978463.000000006D203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2213008790.000000006D206000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6d090000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID: %!Month(avx512bwavx512vlgo/typesnet/httpgo/buildnetedns0tlskyberx509sha1FindCloseLocalFreeMoveFileWWriteFileWSASendTod.nx != 0timerSendpollCacheprofBlockstackpoolhchanLeafwbufSpansGC (idle)mSpanDeadinittracescavtracepanicwaitchan sendpreemptedcoroutinecopystac$%!Weekday(complex128execerrdothttp2debugcrypto/tlsMessageBoxWSleepyCardsbroken pipebad messagefile existsbad addressRegCloseKeyCloseHandleCreateFileWDeleteFileWExitProcessFreeLibraryGetFileTypeOpenProcessSetFileTimeVirtualLockWSARecvFromclosesocketgetpeernameg$)]+:(1/=,-[<{}_My: ??M , [("")) ) @s -> Pn=][}]i)> +"osLlLtLuMnfinptrnilobjgc %: gp *(in n= ) - NaN P m= MPC= < end > ...]:???pc= GEOF\\.\\?\??MayUTCEET+00+01CATWATEATGMTHSTHDT-03-04-05ESTCSTCDTMSTMDT-02EDTASTADTPSTPDTNSTNDT+06+03+04+07IST+09+$0$0$0$0
    • API String ID: 0-2334823967
    • Opcode ID: b9b7cddb6b7f9b652ceca678fc59284d988b0ade161cbd5c83d12a1353b24e53
    • Instruction ID: 7438d2db8c8027e2427348c76de2dc77758235729eb39e4cec10cf279f713776
    • Opcode Fuzzy Hash: b9b7cddb6b7f9b652ceca678fc59284d988b0ade161cbd5c83d12a1353b24e53
    • Instruction Fuzzy Hash: 6203F374A0D3828FC329CF18C49079EFBE1BBC9304F15892EE99997355D7B0A945CB92
    Strings
    • (1/=,-[<{}_My: ??M , [("")) ) @s -> Pn=][}]i)> +"osLlLtLuMnfinptrnilobjgc %: gp *(in n= ) - NaN P m= MPC= < end > ...]:???pc= GEOF\\.\\?\??MayUTCEET+00+01CATWATEATGMTHSTHDT-03-04-05ESTCSTCDTMSTMDT-02EDTASTADTPSTPDTNSTNDT+06+03+04+07IST+09+08ID, xrefs: 6D0E6440
    • :(1/=,-[<{}_My: ??M , [("")) ) @s -> Pn=][}]i)> +"osLlLtLuMnfinptrnilobjgc %: gp *(in n= ) - NaN P m= MPC= < end > ...]:???pc= GEOF\\.\\?\??MayUTCEET+00+01CATWATEATGMTHSTHDT-03-04-05ESTCSTCDTMSTMDT-02EDTASTADTPSTPDTNSTNDT+06+03+04+07IST+09+08I, xrefs: 6D0E651D
    • non-Go function at pc=RtlLookupFunctionEntryCreateEnvironmentBlockWSAGetOverlappedResultSao Tome Standard TimeAleutian Standard TimeParaguay Standard TimeMountain Standard TimeAtlantic Standard TimePakistan Standard TimeSakhalin Standard TimeGeorgian Standard , xrefs: 6D0E67E5
    • pc=true+Inf-Inf: p=cas1cas2cas3cas4cas5cas6 at m= sp= sp: lr: fp= gp= mp=) m=JuneJulyEESTSASTAKSTAKDTACSTACDTAESTAEDTAWSTCESTNZSTNZDTermssse3avx2bmi1bmi2boolint8uintchanfunctimentohswriteclosedefersweeptestRtestWexecWhchanexecRschedsudogtimergscanmheaptrace, xrefs: 6D0E66B3
    • , xrefs: 6D0E6151
    • sp= sp: lr: fp= gp= mp=) m=JuneJulyEESTSASTAKSTAKDTACSTACDTAESTAEDTAWSTCESTNZSTNZDTermssse3avx2bmi1bmi2boolint8uintchanfunctimentohswriteclosedefersweeptestRtestWexecWhchanexecRschedsudogtimergscanmheaptracepanicsleepgcing MB, got= ... max=scav ptr ] = (us, xrefs: 6D0E6686
    • , xrefs: 6D0E6159
    • fp= gp= mp=) m=JuneJulyEESTSASTAKSTAKDTACSTACDTAESTAEDTAWSTCESTNZSTNZDTermssse3avx2bmi1bmi2boolint8uintchanfunctimentohswriteclosedefersweeptestRtestWexecWhchanexecRschedsudogtimergscanmheaptracepanicsleepgcing MB, got= ... max=scav ptr ] = (usagefalseinit, xrefs: 6D0E6659
    Memory Dump Source
    • Source File: 00000003.00000002.2212531983.000000006D091000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D090000, based on PE: true
    • Associated: 00000003.00000002.2212515659.000000006D090000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212599577.000000006D12D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212619894.000000006D12E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212640649.000000006D12F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212661061.000000006D134000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212792942.000000006D1DD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212938204.000000006D1FB000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212957971.000000006D202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212978463.000000006D203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2213008790.000000006D206000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6d090000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID: $ $ fp= gp= mp=) m=JuneJulyEESTSASTAKSTAKDTACSTACDTAESTAEDTAWSTCESTNZSTNZDTermssse3avx2bmi1bmi2boolint8uintchanfunctimentohswriteclosedefersweeptestRtestWexecWhchanexecRschedsudogtimergscanmheaptracepanicsleepgcing MB, got= ... max=scav ptr ] = (usagefalseinit$ pc=true+Inf-Inf: p=cas1cas2cas3cas4cas5cas6 at m= sp= sp: lr: fp= gp= mp=) m=JuneJulyEESTSASTAKSTAKDTACSTACDTAESTAEDTAWSTCESTNZSTNZDTermssse3avx2bmi1bmi2boolint8uintchanfunctimentohswriteclosedefersweeptestRtestWexecWhchanexecRschedsudogtimergscanmheaptrace$ sp= sp: lr: fp= gp= mp=) m=JuneJulyEESTSASTAKSTAKDTACSTACDTAESTAEDTAWSTCESTNZSTNZDTermssse3avx2bmi1bmi2boolint8uintchanfunctimentohswriteclosedefersweeptestRtestWexecWhchanexecRschedsudogtimergscanmheaptracepanicsleepgcing MB, got= ... max=scav ptr ] = (us$(1/=,-[<{}_My: ??M , [("")) ) @s -> Pn=][}]i)> +"osLlLtLuMnfinptrnilobjgc %: gp *(in n= ) - NaN P m= MPC= < end > ...]:???pc= GEOF\\.\\?\??MayUTCEET+00+01CATWATEATGMTHSTHDT-03-04-05ESTCSTCDTMSTMDT-02EDTASTADTPSTPDTNSTNDT+06+03+04+07IST+09+08ID$:(1/=,-[<{}_My: ??M , [("")) ) @s -> Pn=][}]i)> +"osLlLtLuMnfinptrnilobjgc %: gp *(in n= ) - NaN P m= MPC= < end > ...]:???pc= GEOF\\.\\?\??MayUTCEET+00+01CATWATEATGMTHSTHDT-03-04-05ESTCSTCDTMSTMDT-02EDTASTADTPSTPDTNSTNDT+06+03+04+07IST+09+08I$non-Go function at pc=RtlLookupFunctionEntryCreateEnvironmentBlockWSAGetOverlappedResultSao Tome Standard TimeAleutian Standard TimeParaguay Standard TimeMountain Standard TimeAtlantic Standard TimePakistan Standard TimeSakhalin Standard TimeGeorgian Standard
    • API String ID: 0-3830612415
    • Opcode ID: 64fbc0d1360d6ee84a46f1feb43674fa94e73946f22631450bb0963e58f07365
    • Instruction ID: 8e444c3200d6fa234d97bebee058e5488ba6363a5168f4e335f6b6d7ffbcdea3
    • Opcode Fuzzy Hash: 64fbc0d1360d6ee84a46f1feb43674fa94e73946f22631450bb0963e58f07365
    • Instruction Fuzzy Hash: A432D17460C3818FE365DF65D1807AEBBE1AFC9344F858D2EEAC887351D730A8459B92
    Strings
    • &, xrefs: 6D0C1C3D
    • winmm.dll, xrefs: 6D0C1AF3
    • runtime: GetProcAddress failed; errno=runtime: sudog with non-false isSelectarg size to reflect.call more than 1GBv could not fit in traceBytesPerNumbertime: missing Location in call to Datetransport endpoint is already connectedmismatched count during itab ta, xrefs: 6D0C1BD9
    • runtime: LoadLibraryExW failed; errno=runtime: GetProcAddress failed; errno=runtime: sudog with non-false isSelectarg size to reflect.call more than 1GBv could not fit in traceBytesPerNumbertime: missing Location in call to Datetransport endpoint is already co, xrefs: 6D0C1C34
    • timeEndPeriod, xrefs: 6D0C1B73
    • timeBegin/EndPeriod not foundruntime: sudog with non-nil centersyscall inconsistent bp entersyscall inconsistent sp gfput: bad status (not Gdead)LockOSThread nesting overflowsemacquire not on the G stackruntime: split stack overflowstring concatenation too lon, xrefs: 6D0C1C0D
    • timeBeginPeriod, xrefs: 6D0C1B29
    Memory Dump Source
    • Source File: 00000003.00000002.2212531983.000000006D091000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D090000, based on PE: true
    • Associated: 00000003.00000002.2212515659.000000006D090000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212599577.000000006D12D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212619894.000000006D12E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212640649.000000006D12F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212661061.000000006D134000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212792942.000000006D1DD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212938204.000000006D1FB000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212957971.000000006D202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212978463.000000006D203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2213008790.000000006D206000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6d090000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID: &$runtime: GetProcAddress failed; errno=runtime: sudog with non-false isSelectarg size to reflect.call more than 1GBv could not fit in traceBytesPerNumbertime: missing Location in call to Datetransport endpoint is already connectedmismatched count during itab ta$runtime: LoadLibraryExW failed; errno=runtime: GetProcAddress failed; errno=runtime: sudog with non-false isSelectarg size to reflect.call more than 1GBv could not fit in traceBytesPerNumbertime: missing Location in call to Datetransport endpoint is already co$timeBegin/EndPeriod not foundruntime: sudog with non-nil centersyscall inconsistent bp entersyscall inconsistent sp gfput: bad status (not Gdead)LockOSThread nesting overflowsemacquire not on the G stackruntime: split stack overflowstring concatenation too lon$timeBeginPeriod$timeEndPeriod$winmm.dll
    • API String ID: 0-424793872
    • Opcode ID: acdfabcd9a34eb6bbe29038aab496cdad66383ac82aeacfa57eb4ac023fe59ff
    • Instruction ID: 5fcb494fbde0390829223f1d10ac40fd204c59cbcc0a5325b050b7b1a91fc72c
    • Opcode Fuzzy Hash: acdfabcd9a34eb6bbe29038aab496cdad66383ac82aeacfa57eb4ac023fe59ff
    • Instruction Fuzzy Hash: 5751A4B46093019FEB04EF69E19476EBBF0BB89308F01881DE59887740DBB59489DF93
    Strings
    • findrunnable: negative nmspinningfreeing stack not in a stack spanstackalloc not on scheduler stackruntime: goroutine stack exceeds runtime: text offset out of rangetimer period must be non-negativetoo many concurrent timer firingsruntime: name offset out of r, xrefs: 6D0CE0D5
    • global runq empty with non-zero runqsizemust be able to track idle limiter eventruntime: SyscallN has too many argumentsgoroutine stack size is not a power of 2runtime: typeBitsBulkBarrier without type/memory/classes/metadata/mspan/free:bytesruntime.SetFinaliz, xrefs: 6D0CE093
    • !, xrefs: 6D0CE0DE
    • findrunnable: netpoll with psave on system g not allowednewproc1: newg missing stacknewproc1: new g is not GdeadFixedStack is not power-of-2missing stack in shrinkstack args stack map entries for invalid runtime symbol tableruntime: no module data for [origina, xrefs: 6D0CE0BF
    • findrunnable: wrong ppreempt at unknown pcreleasep: invalid argcheckdead: runnable gruntime: newstack at runtime: newstack sp=runtime: confused by pcHeader.textStart= timer data corruptionAdjustTokenPrivilegesLookupPrivilegeValueWNetUserGetLocalGroupsGetProfi, xrefs: 6D0CE0EB
    • findrunnable: netpoll with spinningpidleput: P has non-empty run queuetraceback did not unwind completelyruntime: createevent failed; errno=file type does not support deadline2006-01-02T15:04:05.999999999Z07:00accessing a corrupted shared librarylfstack node a, xrefs: 6D0CE0A9
    Memory Dump Source
    • Source File: 00000003.00000002.2212531983.000000006D091000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D090000, based on PE: true
    • Associated: 00000003.00000002.2212515659.000000006D090000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212599577.000000006D12D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212619894.000000006D12E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212640649.000000006D12F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212661061.000000006D134000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212792942.000000006D1DD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212938204.000000006D1FB000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212957971.000000006D202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212978463.000000006D203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2213008790.000000006D206000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6d090000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID: !$findrunnable: negative nmspinningfreeing stack not in a stack spanstackalloc not on scheduler stackruntime: goroutine stack exceeds runtime: text offset out of rangetimer period must be non-negativetoo many concurrent timer firingsruntime: name offset out of r$findrunnable: netpoll with psave on system g not allowednewproc1: newg missing stacknewproc1: new g is not GdeadFixedStack is not power-of-2missing stack in shrinkstack args stack map entries for invalid runtime symbol tableruntime: no module data for [origina$findrunnable: netpoll with spinningpidleput: P has non-empty run queuetraceback did not unwind completelyruntime: createevent failed; errno=file type does not support deadline2006-01-02T15:04:05.999999999Z07:00accessing a corrupted shared librarylfstack node a$findrunnable: wrong ppreempt at unknown pcreleasep: invalid argcheckdead: runnable gruntime: newstack at runtime: newstack sp=runtime: confused by pcHeader.textStart= timer data corruptionAdjustTokenPrivilegesLookupPrivilegeValueWNetUserGetLocalGroupsGetProfi$global runq empty with non-zero runqsizemust be able to track idle limiter eventruntime: SyscallN has too many argumentsgoroutine stack size is not a power of 2runtime: typeBitsBulkBarrier without type/memory/classes/metadata/mspan/free:bytesruntime.SetFinaliz
    • API String ID: 0-3082151594
    • Opcode ID: 384c01c075c8d54092224b4270ba44d2394ebc368a5b5a3800d9e547a5c7c527
    • Instruction ID: bc20c61e4aaa15da97d2e0eef87d6c06e373daa048511d9ee786e3bb2a7ce042
    • Opcode Fuzzy Hash: 384c01c075c8d54092224b4270ba44d2394ebc368a5b5a3800d9e547a5c7c527
    • Instruction Fuzzy Hash: D6A2BBB464D3419FE724DF69D090B6EBBF0BB8A744F01882DE9D887380EB759844DB52
    Strings
    • runtime: SetWaitableTimer failed; errno= stopTheWorld: not stopped (stopwait != 0)strconv: illegal AppendInt/FormatInt basehash mismatch: data integrity check failedpersistentalloc: align is not a power of 2out of memory allocating checkmarks bitmap/cpu/classe, xrefs: 6D0C13C4
    • runtime: netpoll failedpanic during preemptoffnanotime returning zerofatal: morestack on g0the current g is not g0schedule: holding locksprocresize: invalid argspan has no free stacksstack growth after forkshrinkstack at bad timereflect.methodValueCallDestroy, xrefs: 6D0C139D, 6D0C13F8, 6D0C144B
    • 5, xrefs: 6D0C1420
    • d, xrefs: 6D0C1276
    • runtime: NtAssociateWaitCompletionPacket failed; errno= runtime: checkmarks found unexpected unmarked object obj=tried to trace goroutine with invalid or unsupported statusmanual span allocation called with non-manually-managed typeaddr range base and limit ar, xrefs: 6D0C1369
    • runtime: NtCancelWaitCompletionPacket failed; errno= exited a goroutine internally locked to the OS threadcompileCallback: argument size is larger than uintptrmin size of malloc header is not a size class boundarygcControllerState.findRunnable: blackening not , xrefs: 6D0C1417
    Memory Dump Source
    • Source File: 00000003.00000002.2212531983.000000006D091000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D090000, based on PE: true
    • Associated: 00000003.00000002.2212515659.000000006D090000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212599577.000000006D12D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212619894.000000006D12E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212640649.000000006D12F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212661061.000000006D134000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212792942.000000006D1DD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212938204.000000006D1FB000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212957971.000000006D202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212978463.000000006D203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2213008790.000000006D206000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6d090000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID: 5$d$runtime: NtAssociateWaitCompletionPacket failed; errno= runtime: checkmarks found unexpected unmarked object obj=tried to trace goroutine with invalid or unsupported statusmanual span allocation called with non-manually-managed typeaddr range base and limit ar$runtime: NtCancelWaitCompletionPacket failed; errno= exited a goroutine internally locked to the OS threadcompileCallback: argument size is larger than uintptrmin size of malloc header is not a size class boundarygcControllerState.findRunnable: blackening not $runtime: SetWaitableTimer failed; errno= stopTheWorld: not stopped (stopwait != 0)strconv: illegal AppendInt/FormatInt basehash mismatch: data integrity check failedpersistentalloc: align is not a power of 2out of memory allocating checkmarks bitmap/cpu/classe$runtime: netpoll failedpanic during preemptoffnanotime returning zerofatal: morestack on g0the current g is not g0schedule: holding locksprocresize: invalid argspan has no free stacksstack growth after forkshrinkstack at bad timereflect.methodValueCallDestroy
    • API String ID: 0-2414937731
    • Opcode ID: 3e7d2e1cbcfe4604333c744f741adaccb3299ca594203fe47c8b091cb85fab55
    • Instruction ID: cdcaee133acc8692ed85dc72c7bd79d15bbd2c1030176eb83ccb0ebe41a80c8e
    • Opcode Fuzzy Hash: 3e7d2e1cbcfe4604333c744f741adaccb3299ca594203fe47c8b091cb85fab55
    • Instruction Fuzzy Hash: ED51ACB450D3019FE740EF68C19476EBBF4AF89708F41882DE99887360D7759988DBA3
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.2212531983.000000006D091000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D090000, based on PE: true
    • Associated: 00000003.00000002.2212515659.000000006D090000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212599577.000000006D12D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212619894.000000006D12E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212640649.000000006D12F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212661061.000000006D134000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212792942.000000006D1DD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212938204.000000006D1FB000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212957971.000000006D202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212978463.000000006D203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2213008790.000000006D206000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6d090000_rundll32.jbxd
    Similarity
    • API ID: ErrorFormatFreeLastLocalMessage
    • String ID: Erro: %s
    • API String ID: 1365068426-2412703935
    • Opcode ID: 93c1e5caf33870a774d88ef029beeffbb8d4e75650951c47ebfce4a9646006a1
    • Instruction ID: 33f5abf10d2a3aa686367881b41f07b2781592cf67c160de90453d15f8f77cf3
    • Opcode Fuzzy Hash: 93c1e5caf33870a774d88ef029beeffbb8d4e75650951c47ebfce4a9646006a1
    • Instruction Fuzzy Hash: 53018CB04083019FE700AF64C19D71ABBF0BB88349F41891DE8989A258E7B98588CF93
    Strings
    • min must be a non-zero power of 2runtime: failed mSpanList.insert runtime: castogscanstatus oldval=stoplockedm: inconsistent lockingfindrunnable: negative nmspinningfreeing stack not in a stack spanstackalloc not on scheduler stackruntime: goroutine stack exce, xrefs: 6D0B1A0F
    • min too large-byte block (runtime: val=runtime: seq=fatal error: idlethreads= syscalltick=load64 failedxadd64 failedxchg64 failednil stackbase}sched={pc:, gp->status= pluginpath= : unknown pc called from runtime: pid=dalTLDpSugct?GetTempPath2WModule32NextW, xrefs: 6D0B19C0
    • !, xrefs: 6D0B1A18
    • runtime: min = runtime: inUse=runtime: max = requested skip=bad panic stackrecovery failedstopm holding pstartm: m has ppreempt SPWRITEmissing mcache?ms: gomaxprocs=randinit missed]morebuf={pc:: no frame (sp=runtime: frame ts set in timertraceback stuckrunti, xrefs: 6D0B198C, 6D0B19DB
    Memory Dump Source
    • Source File: 00000003.00000002.2212531983.000000006D091000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D090000, based on PE: true
    • Associated: 00000003.00000002.2212515659.000000006D090000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212599577.000000006D12D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212619894.000000006D12E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212640649.000000006D12F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212661061.000000006D134000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212792942.000000006D1DD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212938204.000000006D1FB000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212957971.000000006D202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212978463.000000006D203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2213008790.000000006D206000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6d090000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID: !$min must be a non-zero power of 2runtime: failed mSpanList.insert runtime: castogscanstatus oldval=stoplockedm: inconsistent lockingfindrunnable: negative nmspinningfreeing stack not in a stack spanstackalloc not on scheduler stackruntime: goroutine stack exce$min too large-byte block (runtime: val=runtime: seq=fatal error: idlethreads= syscalltick=load64 failedxadd64 failedxchg64 failednil stackbase}sched={pc:, gp->status= pluginpath= : unknown pc called from runtime: pid=dalTLDpSugct?GetTempPath2WModule32NextW$runtime: min = runtime: inUse=runtime: max = requested skip=bad panic stackrecovery failedstopm holding pstartm: m has ppreempt SPWRITEmissing mcache?ms: gomaxprocs=randinit missed]morebuf={pc:: no frame (sp=runtime: frame ts set in timertraceback stuckrunti
    • API String ID: 0-967014423
    • Opcode ID: d4e04e52e20989c49fc837f9a9d68bbfff1dd5f68783ac76849b1391837ca119
    • Instruction ID: c8aee8edf096e6512a584dedbabcc742a093706b5356af0a5ac1488713081294
    • Opcode Fuzzy Hash: d4e04e52e20989c49fc837f9a9d68bbfff1dd5f68783ac76849b1391837ca119
    • Instruction Fuzzy Hash: F9F1CF3264D3268FE715DE9884C071EB7E2FBC8348F55893CD9948B385EB72A845C6C2
    Strings
    • stopTheWorld: holding locksgcstopm: not waiting for gcruntime: checkdead: nmidle=runtime: checkdead: find g runlock of unlocked rwmutexsigsend: inconsistent statemakeslice: len out of rangemakeslice: cap out of rangegrowslice: len out of rangestack size not a , xrefs: 6D0CA843
    • stopTheWorld: not stopped (stopwait != 0)strconv: illegal AppendInt/FormatInt basehash mismatch: data integrity check failedpersistentalloc: align is not a power of 2out of memory allocating checkmarks bitmap/cpu/classes/gc/mark/dedicated:cpu-seconds/memory/cl, xrefs: 6D0CA690
    • stopTheWorld: broken CPU time accountingglobal runq empty with non-zero runqsizemust be able to track idle limiter eventruntime: SyscallN has too many argumentsgoroutine stack size is not a power of 2runtime: typeBitsBulkBarrier without type/memory/classes/met, xrefs: 6D0CA7EB
    • stopTheWorld: not stopped (status != _Pgcstop)signal arrived during external code executionruntime: name offset base pointer out of rangeruntime: type offset base pointer out of rangeruntime: text offset base pointer out of rangeattempting to link in too many, xrefs: 6D0CA7B0
    Memory Dump Source
    • Source File: 00000003.00000002.2212531983.000000006D091000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D090000, based on PE: true
    • Associated: 00000003.00000002.2212515659.000000006D090000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212599577.000000006D12D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212619894.000000006D12E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212640649.000000006D12F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212661061.000000006D134000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212792942.000000006D1DD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212938204.000000006D1FB000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212957971.000000006D202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212978463.000000006D203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2213008790.000000006D206000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6d090000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID: stopTheWorld: broken CPU time accountingglobal runq empty with non-zero runqsizemust be able to track idle limiter eventruntime: SyscallN has too many argumentsgoroutine stack size is not a power of 2runtime: typeBitsBulkBarrier without type/memory/classes/met$stopTheWorld: holding locksgcstopm: not waiting for gcruntime: checkdead: nmidle=runtime: checkdead: find g runlock of unlocked rwmutexsigsend: inconsistent statemakeslice: len out of rangemakeslice: cap out of rangegrowslice: len out of rangestack size not a $stopTheWorld: not stopped (status != _Pgcstop)signal arrived during external code executionruntime: name offset base pointer out of rangeruntime: type offset base pointer out of rangeruntime: text offset base pointer out of rangeattempting to link in too many$stopTheWorld: not stopped (stopwait != 0)strconv: illegal AppendInt/FormatInt basehash mismatch: data integrity check failedpersistentalloc: align is not a power of 2out of memory allocating checkmarks bitmap/cpu/classes/gc/mark/dedicated:cpu-seconds/memory/cl
    • API String ID: 0-2039697367
    • Opcode ID: 21e13fd260bf149b8c48077b13bf1bfcb1bd855ef933670c61a48686ea1b95e3
    • Instruction ID: 9c1456d753c0f67fa73cb8211571bca408cf3b1171a8a0e009ac6a58d4d51162
    • Opcode Fuzzy Hash: 21e13fd260bf149b8c48077b13bf1bfcb1bd855ef933670c61a48686ea1b95e3
    • Instruction Fuzzy Hash: ACF1DF74A0D3418FE708CF69D190A6AFBF1BB89704F61892EE99887351DB70E945CF42
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.2212531983.000000006D091000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D090000, based on PE: true
    • Associated: 00000003.00000002.2212515659.000000006D090000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212599577.000000006D12D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212619894.000000006D12E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212640649.000000006D12F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212661061.000000006D134000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212792942.000000006D1DD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212938204.000000006D1FB000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212957971.000000006D202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212978463.000000006D203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2213008790.000000006D206000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6d090000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID: .$@$gfff$gfff
    • API String ID: 0-2633265772
    • Opcode ID: 8459d8207e057e620cf1d9af03855443049108a225ce8fe639410900789573df
    • Instruction ID: 1bea68cb9c5a7ac38e80fd794098c59119af2d09e253c04ebdf17acc6fad3473
    • Opcode Fuzzy Hash: 8459d8207e057e620cf1d9af03855443049108a225ce8fe639410900789573df
    • Instruction Fuzzy Hash: 9FD1A471A083468BD704CE29C48036BB7E1BF95354F05C92EE8988B35DE7B2DD89C792
    APIs
    Memory Dump Source
    • Source File: 00000003.00000002.2212531983.000000006D091000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D090000, based on PE: true
    • Associated: 00000003.00000002.2212515659.000000006D090000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212599577.000000006D12D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212619894.000000006D12E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212640649.000000006D12F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212661061.000000006D134000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212792942.000000006D1DD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212938204.000000006D1FB000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212957971.000000006D202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212978463.000000006D203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2213008790.000000006D206000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6d090000_rundll32.jbxd
    Similarity
    • API ID: Heapfree$FreeProcess
    • String ID:
    • API String ID: 3425746932-0
    • Opcode ID: 9818b2ebce2333a5a49be1b21f16e135bc26345105e372babf5276a6dc141ba8
    • Instruction ID: 7c5d9b3b9b5f2fd0794d34756075c5564f1e8ac543a581c196d0b216d0c1ee12
    • Opcode Fuzzy Hash: 9818b2ebce2333a5a49be1b21f16e135bc26345105e372babf5276a6dc141ba8
    • Instruction Fuzzy Hash: 8021E5B0A083018BEB009F64C4C8B2ABBF0BF94704F55C96CD8898B20DD776D885CB91
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.2212531983.000000006D091000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D090000, based on PE: true
    • Associated: 00000003.00000002.2212515659.000000006D090000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212599577.000000006D12D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212619894.000000006D12E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212640649.000000006D12F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212661061.000000006D134000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212792942.000000006D1DD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212938204.000000006D1FB000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212957971.000000006D202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212978463.000000006D203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2213008790.000000006D206000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6d090000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID: '$'$PowerRegisterSuspendResumeNotification$powrprof.dll
    • API String ID: 0-4026319467
    • Opcode ID: 31da5e9c6716520b06c0f9efecf5f0b3486f9039ee11217efd9eef0f7cb4ef59
    • Instruction ID: bca37b9b9eb1f1d898c36104cc95e011d0ffd269b51a4ef2785736943bfe4ab6
    • Opcode Fuzzy Hash: 31da5e9c6716520b06c0f9efecf5f0b3486f9039ee11217efd9eef0f7cb4ef59
    • Instruction Fuzzy Hash: CA21ADB45083429FE704CF25D094B5ABBF0BB89748F50891EE49987350E7B5AA89CF83
    Strings
    • <, xrefs: 6D0D6A0D
    • runtime: malformed profBuf buffer - tag and data out of syncabiRegArgsType needs GC Prog, update methodValueCallFrameObjsfound bad pointer in Go heap (incorrect use of unsafe or cgo?)limiterEvent.stop: found wrong event in p's limiter event slotruntime: intern, xrefs: 6D0D6A04
    • runtime: malformed profBuf buffer - invalid sizeattempt to trace invalid or unsupported P statusruntime: waitforsingleobject wait_failed; errno=invalid or incomplete multibyte or wide characterslice bounds out of range [::%x] with capacity %yinvalid memory add, xrefs: 6D0D69D7
    Memory Dump Source
    • Source File: 00000003.00000002.2212531983.000000006D091000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D090000, based on PE: true
    • Associated: 00000003.00000002.2212515659.000000006D090000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212599577.000000006D12D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212619894.000000006D12E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212640649.000000006D12F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212661061.000000006D134000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212792942.000000006D1DD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212938204.000000006D1FB000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212957971.000000006D202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212978463.000000006D203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2213008790.000000006D206000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6d090000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID: <$runtime: malformed profBuf buffer - invalid sizeattempt to trace invalid or unsupported P statusruntime: waitforsingleobject wait_failed; errno=invalid or incomplete multibyte or wide characterslice bounds out of range [::%x] with capacity %yinvalid memory add$runtime: malformed profBuf buffer - tag and data out of syncabiRegArgsType needs GC Prog, update methodValueCallFrameObjsfound bad pointer in Go heap (incorrect use of unsafe or cgo?)limiterEvent.stop: found wrong event in p's limiter event slotruntime: intern
    • API String ID: 0-450027851
    • Opcode ID: e29470bcce2e7ea9963e0dceebbddd70742b06dec5f101055e594084602a4ac5
    • Instruction ID: cd095e86ee966a25c594ea2afd4a270ac90846cd3361adc2ad75676f36fdbe6c
    • Opcode Fuzzy Hash: e29470bcce2e7ea9963e0dceebbddd70742b06dec5f101055e594084602a4ac5
    • Instruction Fuzzy Hash: EB025970A087098FE354DF69C19071ABBE1BFC8704F95892EE99987354EB71E845CF82
    Strings
    • ', xrefs: 6D0C64AC
    • suspendG from non-preemptible goroutineruntime: casfrom_Gscanstatus failed gp=stack growth not allowed in system calltraceback: unexpected SPWRITE function traceRegion: alloc with concurrent drop2006-01-02 15:04:05.999999999 -0700 MSTaddress family not support, xrefs: 6D0C64A3
    • invalid g statuscastogscanstatusbad g transitionschedule: in cgoreflect mismatch untyped locals missing stackmapbad symbol tablenon-Go function not in ranges:DuplicateTokenExGetCurrentThreadRtlVirtualUnwindGODEBUG: value "[bisect-match 0xpermission deniedwro, xrefs: 6D0C648D
    Memory Dump Source
    • Source File: 00000003.00000002.2212531983.000000006D091000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D090000, based on PE: true
    • Associated: 00000003.00000002.2212515659.000000006D090000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212599577.000000006D12D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212619894.000000006D12E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212640649.000000006D12F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212661061.000000006D134000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212792942.000000006D1DD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212938204.000000006D1FB000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212957971.000000006D202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212978463.000000006D203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2213008790.000000006D206000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6d090000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID: '$invalid g statuscastogscanstatusbad g transitionschedule: in cgoreflect mismatch untyped locals missing stackmapbad symbol tablenon-Go function not in ranges:DuplicateTokenExGetCurrentThreadRtlVirtualUnwindGODEBUG: value "[bisect-match 0xpermission deniedwro$suspendG from non-preemptible goroutineruntime: casfrom_Gscanstatus failed gp=stack growth not allowed in system calltraceback: unexpected SPWRITE function traceRegion: alloc with concurrent drop2006-01-02 15:04:05.999999999 -0700 MSTaddress family not support
    • API String ID: 0-3278438963
    • Opcode ID: 1dc937d6fa23f13bf8ffccf7a89f7129e93f5b682ecf4ea31acc15e1eaf91e77
    • Instruction ID: ee092e86a8749ed4debe544acea2f761ce75c0738b37ada9085d4a034fd87df6
    • Opcode Fuzzy Hash: 1dc937d6fa23f13bf8ffccf7a89f7129e93f5b682ecf4ea31acc15e1eaf91e77
    • Instruction Fuzzy Hash: 67D12F7460C3418BE715CF25C090A2EBBF2AF8A708F85886DE9C5973A1D735E945CB93
    Strings
    • grew heap, but no adequate free space foundroot level max pages doesn't fit in summaryruntime: releaseSudog with non-nil gp.paramunknown runnable goroutine during bootstrapruntime: casfrom_Gscanstatus bad oldval gp=runtime:stoplockedm: lockedg (atomicstatus=me, xrefs: 6D0B6D4E
    • +, xrefs: 6D0B6D57
    Memory Dump Source
    • Source File: 00000003.00000002.2212531983.000000006D091000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D090000, based on PE: true
    • Associated: 00000003.00000002.2212515659.000000006D090000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212599577.000000006D12D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212619894.000000006D12E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212640649.000000006D12F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212661061.000000006D134000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212792942.000000006D1DD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212938204.000000006D1FB000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212957971.000000006D202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212978463.000000006D203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2213008790.000000006D206000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6d090000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID: +$grew heap, but no adequate free space foundroot level max pages doesn't fit in summaryruntime: releaseSudog with non-nil gp.paramunknown runnable goroutine during bootstrapruntime: casfrom_Gscanstatus bad oldval gp=runtime:stoplockedm: lockedg (atomicstatus=me
    • API String ID: 0-3347251187
    • Opcode ID: 2cf8704e832e3a06bdde9528adb0169a6d405c11f276d56a096fa8e4b0227e77
    • Instruction ID: ac6b99384bfa014922fc27163b79169e5563a667d982e2c89fc3f23a24ee0881
    • Opcode Fuzzy Hash: 2cf8704e832e3a06bdde9528adb0169a6d405c11f276d56a096fa8e4b0227e77
    • Instruction Fuzzy Hash: 6C22EE7460C3419FE314DF29C190B6ABBE1BF89744F51892DE9D98B350DB76E8448B82
    Strings
    • @, xrefs: 6D0BB4FB
    • bad summary dataruntime: addr = runtime: base = runtime: head = timeBeginPeriod, xrefs: 6D0BB60F
    Memory Dump Source
    • Source File: 00000003.00000002.2212531983.000000006D091000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D090000, based on PE: true
    • Associated: 00000003.00000002.2212515659.000000006D090000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212599577.000000006D12D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212619894.000000006D12E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212640649.000000006D12F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212661061.000000006D134000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212792942.000000006D1DD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212938204.000000006D1FB000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212957971.000000006D202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212978463.000000006D203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2213008790.000000006D206000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6d090000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID: @$bad summary dataruntime: addr = runtime: base = runtime: head = timeBeginPeriod
    • API String ID: 0-1191861649
    • Opcode ID: 58d437a6803647a92b529681dffe10e872c46b4d9b9d9326c57e8cbec7f42ac0
    • Instruction ID: 5b6d9e800459527df94b5a47cb1357f7bff661b28254f3b79c0181bcc076739c
    • Opcode Fuzzy Hash: 58d437a6803647a92b529681dffe10e872c46b4d9b9d9326c57e8cbec7f42ac0
    • Instruction Fuzzy Hash: 1BA1B175A0870A8FD304CF18C8C065AB7E1FFC8318F558A2DE9959B351DB35E95ACB82
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.2212531983.000000006D091000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D090000, based on PE: true
    • Associated: 00000003.00000002.2212515659.000000006D090000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212599577.000000006D12D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212619894.000000006D12E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212640649.000000006D12F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212661061.000000006D134000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212792942.000000006D1DD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212938204.000000006D1FB000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212957971.000000006D202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212978463.000000006D203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2213008790.000000006D206000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6d090000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID: $@
    • API String ID: 0-1077428164
    • Opcode ID: 28c0b169336063d9fea398cdf799eeb8efe7166cecce6eb2470f94cb94f15c96
    • Instruction ID: 9895f51040c60abd55502ca30e370794ac17e1d9d94ab0fbb38da508fdd56dc7
    • Opcode Fuzzy Hash: 28c0b169336063d9fea398cdf799eeb8efe7166cecce6eb2470f94cb94f15c96
    • Instruction Fuzzy Hash: 4451A220C1CF9B65E6330ABDC5027663B606EB3140B01D76FFDD6B54B2E7536944BA22
    Strings
    • ,, xrefs: 6D0ACFAA
    • gcmarknewobject called while doing checkmarkactive sweepers found at start of mark phaseno P available, write barriers are forbiddencompileCallback: float results not supportedcannot trace user goroutine on its own stackcannot send after transport endpoint shu, xrefs: 6D0ACFA1
    Memory Dump Source
    • Source File: 00000003.00000002.2212531983.000000006D091000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D090000, based on PE: true
    • Associated: 00000003.00000002.2212515659.000000006D090000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212599577.000000006D12D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212619894.000000006D12E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212640649.000000006D12F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212661061.000000006D134000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212792942.000000006D1DD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212938204.000000006D1FB000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212957971.000000006D202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212978463.000000006D203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2213008790.000000006D206000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6d090000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID: ,$gcmarknewobject called while doing checkmarkactive sweepers found at start of mark phaseno P available, write barriers are forbiddencompileCallback: float results not supportedcannot trace user goroutine on its own stackcannot send after transport endpoint shu
    • API String ID: 0-27675022
    • Opcode ID: 0fc05aeeeb709222ae009952531c3811c681e729369d64e340db73a13a04a9b7
    • Instruction ID: 830e86476089ae1e79aad3ef300a761adc21df18bec84755e33b7fbbeb6b5415
    • Opcode Fuzzy Hash: 0fc05aeeeb709222ae009952531c3811c681e729369d64e340db73a13a04a9b7
    • Instruction Fuzzy Hash: CD31CE75A093968FD305DF14D490B69B7F2BB86608F4981BDDC884F383CB31A84ACB85
    Strings
    • ,M3.2.0,M11.1.0jstmpllitinterptarinsecurepathx509keypairleafx509usepolicieszipinsecurepathRegCreateKeyExWRegDeleteValueWstring too large0123456789abcdefinvalid exchangeno route to hostinvalid argumentmessage too longobject is remoteremote I/O errorSetFilePoint, xrefs: 6D115C8E
    Memory Dump Source
    • Source File: 00000003.00000002.2212531983.000000006D091000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D090000, based on PE: true
    • Associated: 00000003.00000002.2212515659.000000006D090000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212599577.000000006D12D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212619894.000000006D12E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212640649.000000006D12F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212661061.000000006D134000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212792942.000000006D1DD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212938204.000000006D1FB000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212957971.000000006D202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212978463.000000006D203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2213008790.000000006D206000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6d090000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID: ,M3.2.0,M11.1.0jstmpllitinterptarinsecurepathx509keypairleafx509usepolicieszipinsecurepathRegCreateKeyExWRegDeleteValueWstring too large0123456789abcdefinvalid exchangeno route to hostinvalid argumentmessage too longobject is remoteremote I/O errorSetFilePoint
    • API String ID: 0-1364986362
    • Opcode ID: 7a62e25d4adc84973bb51b64aea8a9abd825deb6ec7b2940e47f5dec90da8fd7
    • Instruction ID: ba7a13dc81bc6aee7382a8b02fe9047fd87f95f1b04b1ba35e122937e5037304
    • Opcode Fuzzy Hash: 7a62e25d4adc84973bb51b64aea8a9abd825deb6ec7b2940e47f5dec90da8fd7
    • Instruction Fuzzy Hash: 3E5217B190C3858FD334CF19C5903DEBBE1ABD5304F45892DDAD897391E7B5A9448B82
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.2212531983.000000006D091000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D090000, based on PE: true
    • Associated: 00000003.00000002.2212515659.000000006D090000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212599577.000000006D12D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212619894.000000006D12E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212640649.000000006D12F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212661061.000000006D134000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212792942.000000006D1DD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212938204.000000006D1FB000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212957971.000000006D202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212978463.000000006D203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2213008790.000000006D206000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6d090000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID: 4
    • API String ID: 0-4088798008
    • Opcode ID: fab3b57f347e7a06c6e8badeb58ad8b51067727217116a5bf8d5345e1acfdfb9
    • Instruction ID: 32806b107175ea91a65d091a944893c74ea1843ecf589753886f357084613a91
    • Opcode Fuzzy Hash: fab3b57f347e7a06c6e8badeb58ad8b51067727217116a5bf8d5345e1acfdfb9
    • Instruction Fuzzy Hash: 0F22CC7460D3468FE334DE58C4C476EB7E1AFCA344F548A2DD9998B391DB70A805CB82
    Strings
    • span has no free objectsruntime: found obj at *(runtime: VirtualFree of /cgo/go-to-c-calls:calls/gc/heap/objects:objects/sched/latencies:secondsqueuefinalizer during GCupdate during transitionruntime: markroot index can't scan our own stackgcDrainN phase incor, xrefs: 6D0A0D52
    Memory Dump Source
    • Source File: 00000003.00000002.2212531983.000000006D091000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D090000, based on PE: true
    • Associated: 00000003.00000002.2212515659.000000006D090000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212599577.000000006D12D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212619894.000000006D12E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212640649.000000006D12F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212661061.000000006D134000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212792942.000000006D1DD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212938204.000000006D1FB000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212957971.000000006D202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212978463.000000006D203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2213008790.000000006D206000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6d090000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID: span has no free objectsruntime: found obj at *(runtime: VirtualFree of /cgo/go-to-c-calls:calls/gc/heap/objects:objects/sched/latencies:secondsqueuefinalizer during GCupdate during transitionruntime: markroot index can't scan our own stackgcDrainN phase incor
    • API String ID: 0-1712010102
    • Opcode ID: b2c8b00bba3ec7fdbe93239b6937a3176639cced772e6046a0f11fc3748e8bc4
    • Instruction ID: b22a1e7e482df4eac175e353723ab7ff98613bd7849a9c85c83f4f882f63bfcc
    • Opcode Fuzzy Hash: b2c8b00bba3ec7fdbe93239b6937a3176639cced772e6046a0f11fc3748e8bc4
    • Instruction Fuzzy Hash: 4DD154B460C34A9FE704DF69C08066EBBE0BF89748F45892EE8D987342E735D945CB42
    Strings
    • runtime: cannot allocate memorycheckmark found unmarked objectruntime: failed to commit pages/memory/classes/heap/free:bytes/memory/classes/os-stacks:bytespacer: sweep done at heap size non in-use span in unswept listcasgstatus: bad incoming valuesresetspinnin, xrefs: 6D0BD3CB
    Memory Dump Source
    • Source File: 00000003.00000002.2212531983.000000006D091000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D090000, based on PE: true
    • Associated: 00000003.00000002.2212515659.000000006D090000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212599577.000000006D12D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212619894.000000006D12E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212640649.000000006D12F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212661061.000000006D134000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212792942.000000006D1DD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212938204.000000006D1FB000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212957971.000000006D202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212978463.000000006D203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2213008790.000000006D206000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6d090000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID: runtime: cannot allocate memorycheckmark found unmarked objectruntime: failed to commit pages/memory/classes/heap/free:bytes/memory/classes/os-stacks:bytespacer: sweep done at heap size non in-use span in unswept listcasgstatus: bad incoming valuesresetspinnin
    • API String ID: 0-429552053
    • Opcode ID: 9c70621e346953eb57b3b18843dd4c0b3e46fc01d11693fc14c7b056e6969635
    • Instruction ID: b7dc100cd44e1fb99e6fc9271fa7b43486768c250d88cbefea4bbe7b7fb2618f
    • Opcode Fuzzy Hash: 9c70621e346953eb57b3b18843dd4c0b3e46fc01d11693fc14c7b056e6969635
    • Instruction Fuzzy Hash: 29B1EF78A0D3469FD704DF68C080A2AFBF1BBC9744F52982DE99687310E771E845CB92
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.2212531983.000000006D091000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D090000, based on PE: true
    • Associated: 00000003.00000002.2212515659.000000006D090000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212599577.000000006D12D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212619894.000000006D12E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212640649.000000006D12F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212661061.000000006D134000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212792942.000000006D1DD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212938204.000000006D1FB000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212957971.000000006D202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212978463.000000006D203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2213008790.000000006D206000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6d090000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID: ;
    • API String ID: 0-1661535913
    • Opcode ID: 46290f54545af768be44785e033e11cb9a08dd87f0bf752820f652f96a1f281b
    • Instruction ID: 5c3542ec54872ccb60c213cda1cd38ef98c62d51bca01c2d2e72ddb18b85760b
    • Opcode Fuzzy Hash: 46290f54545af768be44785e033e11cb9a08dd87f0bf752820f652f96a1f281b
    • Instruction Fuzzy Hash: 27A19371B083054FD70CDE5DD99131AFAE2ABC8304F05CA3DE599CB7A8E674D9098B86
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.2212531983.000000006D091000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D090000, based on PE: true
    • Associated: 00000003.00000002.2212515659.000000006D090000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212599577.000000006D12D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212619894.000000006D12E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212640649.000000006D12F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212661061.000000006D134000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212792942.000000006D1DD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212938204.000000006D1FB000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212957971.000000006D202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212978463.000000006D203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2213008790.000000006D206000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6d090000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID: @
    • API String ID: 0-2766056989
    • Opcode ID: e4fbb487f9c49781586d11bc74d9c51c7a4bd9f14e4a4e5484a081d11418f410
    • Instruction ID: 6b2137f8e8918118263b3eb099e8d86559b85db9ebd55c4db6e792d4131ae3b6
    • Opcode Fuzzy Hash: e4fbb487f9c49781586d11bc74d9c51c7a4bd9f14e4a4e5484a081d11418f410
    • Instruction Fuzzy Hash: 9D910EB5A0D3059FD344CF28C080A5ABBE1FF88744F91992EE99987341E775E985CF82
    Memory Dump Source
    • Source File: 00000003.00000002.2212531983.000000006D091000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D090000, based on PE: true
    • Associated: 00000003.00000002.2212515659.000000006D090000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212599577.000000006D12D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212619894.000000006D12E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212640649.000000006D12F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212661061.000000006D134000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212792942.000000006D1DD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212938204.000000006D1FB000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212957971.000000006D202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212978463.000000006D203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2213008790.000000006D206000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6d090000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: ab19f82ca6d87b46d8601c03f73dbf118d9ff1f20fa77173b925bd0ec46d5c8b
    • Instruction ID: 487cba85fd232105b53378db3763169e8ce2a4bcc6e91b68f666714673292418
    • Opcode Fuzzy Hash: ab19f82ca6d87b46d8601c03f73dbf118d9ff1f20fa77173b925bd0ec46d5c8b
    • Instruction Fuzzy Hash: 58824F75A083458BC738DE09C59079AF7E2BBDD300F56892ED599D3354EBB0AE05CB82
    Memory Dump Source
    • Source File: 00000003.00000002.2212531983.000000006D091000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D090000, based on PE: true
    • Associated: 00000003.00000002.2212515659.000000006D090000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212599577.000000006D12D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212619894.000000006D12E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212640649.000000006D12F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212661061.000000006D134000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212792942.000000006D1DD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212938204.000000006D1FB000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212957971.000000006D202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212978463.000000006D203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2213008790.000000006D206000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6d090000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: de4bd759018d9bedcb0b21ba6c66e24a5bd92395e5890dc29a9a09b5f665e8a0
    • Instruction ID: b9db28e0c7e78022737bdd8a79e387fcac0a4ba82c72babb3a249b53b1401eb9
    • Opcode Fuzzy Hash: de4bd759018d9bedcb0b21ba6c66e24a5bd92395e5890dc29a9a09b5f665e8a0
    • Instruction Fuzzy Hash: 95226071A1C34ACFD724CE65C89036FB7E2BB95304F55883DE98587345EBB1A909CB82
    Memory Dump Source
    • Source File: 00000003.00000002.2212531983.000000006D091000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D090000, based on PE: true
    • Associated: 00000003.00000002.2212515659.000000006D090000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212599577.000000006D12D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212619894.000000006D12E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212640649.000000006D12F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212661061.000000006D134000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212792942.000000006D1DD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212938204.000000006D1FB000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212957971.000000006D202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212978463.000000006D203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2213008790.000000006D206000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6d090000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: ebdc2fe8315ec4e024cc0cfe2c286bb43791fddbbc2d5b09573738e12148e93a
    • Instruction ID: 96bbcf0f3ba764431cf8549b0f30d92352f4d14a1357ec040366f2c81e225c50
    • Opcode Fuzzy Hash: ebdc2fe8315ec4e024cc0cfe2c286bb43791fddbbc2d5b09573738e12148e93a
    • Instruction Fuzzy Hash: 11128872A087098FD324DE5DCD8124AF7E6BBC4704F55CA3DD9588B359EBB0E9058B82
    Memory Dump Source
    • Source File: 00000003.00000002.2212531983.000000006D091000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D090000, based on PE: true
    • Associated: 00000003.00000002.2212515659.000000006D090000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212599577.000000006D12D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212619894.000000006D12E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212640649.000000006D12F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212661061.000000006D134000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212792942.000000006D1DD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212938204.000000006D1FB000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212957971.000000006D202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212978463.000000006D203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2213008790.000000006D206000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6d090000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: f95905949820edeec9d3ee25cd1304233b97ffe132cb3a7d1375959b4c6dd846
    • Instruction ID: 468a37c7807742c7ef8d02e361ba3eab36edf559997bc08b56b8e0fdcfa50351
    • Opcode Fuzzy Hash: f95905949820edeec9d3ee25cd1304233b97ffe132cb3a7d1375959b4c6dd846
    • Instruction Fuzzy Hash: E3E11532B5D71A4BE315DDBD88C035EB2D2ABC8344F49863CDD649B380FA76990A86C5
    Memory Dump Source
    • Source File: 00000003.00000002.2212531983.000000006D091000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D090000, based on PE: true
    • Associated: 00000003.00000002.2212515659.000000006D090000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212599577.000000006D12D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212619894.000000006D12E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212640649.000000006D12F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212661061.000000006D134000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212792942.000000006D1DD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212938204.000000006D1FB000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212957971.000000006D202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212978463.000000006D203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2213008790.000000006D206000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6d090000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 34c921b0bc75f59bbce33cfd34b81bbd5c85344561f82a6a95d12423c05b14a5
    • Instruction ID: cc5187d88be723fffa9328637152c3d12a854045550126ac3e4daf5a3b105bbc
    • Opcode Fuzzy Hash: 34c921b0bc75f59bbce33cfd34b81bbd5c85344561f82a6a95d12423c05b14a5
    • Instruction Fuzzy Hash: 78027F756083468FE324CE68C4C066EFBE1BFC9348F55892DE9998B341D731E845CB96
    Memory Dump Source
    • Source File: 00000003.00000002.2212531983.000000006D091000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D090000, based on PE: true
    • Associated: 00000003.00000002.2212515659.000000006D090000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212599577.000000006D12D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212619894.000000006D12E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212640649.000000006D12F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212661061.000000006D134000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212792942.000000006D1DD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212938204.000000006D1FB000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212957971.000000006D202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212978463.000000006D203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2213008790.000000006D206000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6d090000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: ba39a2d94e0e9a9e7858d58ceac45df22bde3fe14062c1699f37e57b8373149f
    • Instruction ID: 1ed7bf899d2abca33535d11657199f198a5b75dff6d42ab00befa8f11fdf6375
    • Opcode Fuzzy Hash: ba39a2d94e0e9a9e7858d58ceac45df22bde3fe14062c1699f37e57b8373149f
    • Instruction Fuzzy Hash: 6BE1D433E2872507E3149E58CC80249B2D2ABC8670F4EC73DED959B781E9B5ED5987C2
    Memory Dump Source
    • Source File: 00000003.00000002.2212531983.000000006D091000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D090000, based on PE: true
    • Associated: 00000003.00000002.2212515659.000000006D090000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212599577.000000006D12D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212619894.000000006D12E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212640649.000000006D12F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212661061.000000006D134000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212792942.000000006D1DD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212938204.000000006D1FB000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212957971.000000006D202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212978463.000000006D203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2213008790.000000006D206000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6d090000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 26c36d6a8fcaf3a77a4fdf43d68845abcd40b3320fe6f4a3cfc1280a56ac6eb3
    • Instruction ID: f895a06fe023d423c6c913dfeaa40bbd6204d48acb003b47bb0f5a0ace991d9d
    • Opcode Fuzzy Hash: 26c36d6a8fcaf3a77a4fdf43d68845abcd40b3320fe6f4a3cfc1280a56ac6eb3
    • Instruction Fuzzy Hash: 66E1A272A0C3698BC705CF25889031EFBE2BBD5704F45897DE8958B245E7B29909CBC6
    Memory Dump Source
    • Source File: 00000003.00000002.2212531983.000000006D091000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D090000, based on PE: true
    • Associated: 00000003.00000002.2212515659.000000006D090000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212599577.000000006D12D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212619894.000000006D12E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212640649.000000006D12F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212661061.000000006D134000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212792942.000000006D1DD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212938204.000000006D1FB000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212957971.000000006D202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212978463.000000006D203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2213008790.000000006D206000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6d090000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 583567786b4e6800410b4258a9f6d325d9bc64553ba0d4724e678071da7a1fe1
    • Instruction ID: be5b1b4d270206e5a979d9ced56bb542d97a87425111556a6c307474c777ebe5
    • Opcode Fuzzy Hash: 583567786b4e6800410b4258a9f6d325d9bc64553ba0d4724e678071da7a1fe1
    • Instruction Fuzzy Hash: C2C1E332B483264FD709DE6CC89071EB7E2ABC8304F59863DE9559B3A5E774EC068781
    Memory Dump Source
    • Source File: 00000003.00000002.2212531983.000000006D091000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D090000, based on PE: true
    • Associated: 00000003.00000002.2212515659.000000006D090000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212599577.000000006D12D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212619894.000000006D12E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212640649.000000006D12F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212661061.000000006D134000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212792942.000000006D1DD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212938204.000000006D1FB000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212957971.000000006D202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212978463.000000006D203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2213008790.000000006D206000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6d090000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 01102f6ca95c295bb9f788ccf8f614b58e4d77107ed3cdde2843e7f33485d433
    • Instruction ID: 4162ecf41c0285e915bc2a5874613f1a9c535a0641052e5b00973dbd8f4b57f7
    • Opcode Fuzzy Hash: 01102f6ca95c295bb9f788ccf8f614b58e4d77107ed3cdde2843e7f33485d433
    • Instruction Fuzzy Hash: 1DE1A03150C3568FD315DF29C4C0A2AFBE1EFCA244F15896EE9958B392D730E905DBA2
    Memory Dump Source
    • Source File: 00000003.00000002.2212531983.000000006D091000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D090000, based on PE: true
    • Associated: 00000003.00000002.2212515659.000000006D090000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212599577.000000006D12D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212619894.000000006D12E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212640649.000000006D12F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212661061.000000006D134000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212792942.000000006D1DD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212938204.000000006D1FB000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212957971.000000006D202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212978463.000000006D203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2213008790.000000006D206000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6d090000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: ae5226584c0f830d2fc306fc8b2edd10a2ea9cf00361825fc45a828d33b7197d
    • Instruction ID: 6c5a8d645a32dbb6462df6db87577c9b9e9b23811aa47e311a888d755badd30c
    • Opcode Fuzzy Hash: ae5226584c0f830d2fc306fc8b2edd10a2ea9cf00361825fc45a828d33b7197d
    • Instruction Fuzzy Hash: 4AF1BE7460D3918FD365CF29C090B5EBBE2BBC9204F54892EE9D887351EB71A845CB53
    Memory Dump Source
    • Source File: 00000003.00000002.2212531983.000000006D091000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D090000, based on PE: true
    • Associated: 00000003.00000002.2212515659.000000006D090000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212599577.000000006D12D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212619894.000000006D12E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212640649.000000006D12F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212661061.000000006D134000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212792942.000000006D1DD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212938204.000000006D1FB000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212957971.000000006D202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212978463.000000006D203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2213008790.000000006D206000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6d090000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 13041c5e5001cd59dc11fc8d1f630024580fdabbc3202fb2794c9f2e86fd9a86
    • Instruction ID: 13bc23174e46587c8d5f324ae12cc92bb282578afa3c4588c8931a395fefb61a
    • Opcode Fuzzy Hash: 13041c5e5001cd59dc11fc8d1f630024580fdabbc3202fb2794c9f2e86fd9a86
    • Instruction Fuzzy Hash: 74C1627060432A4FC251CE5EDCC0A6A73D1AB8821DF91866D9644CF7C3DA3AF46B97E4
    Memory Dump Source
    • Source File: 00000003.00000002.2212531983.000000006D091000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D090000, based on PE: true
    • Associated: 00000003.00000002.2212515659.000000006D090000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212599577.000000006D12D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212619894.000000006D12E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212640649.000000006D12F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212661061.000000006D134000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212792942.000000006D1DD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212938204.000000006D1FB000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212957971.000000006D202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212978463.000000006D203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2213008790.000000006D206000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6d090000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 16c99145df3cd9448de078b0548ea786860be560809d1fd0af4e8d931e89e95c
    • Instruction ID: 3bb491f7d94bd67f7d68a517213a02e83104aba5d33e9e88852904d5cd74ac9d
    • Opcode Fuzzy Hash: 16c99145df3cd9448de078b0548ea786860be560809d1fd0af4e8d931e89e95c
    • Instruction Fuzzy Hash: 10C1527060432A4FC251CE5EDCC0A6A73D1AB4821DF91866D9644CF7C3DA3AF46B97A4
    Memory Dump Source
    • Source File: 00000003.00000002.2212531983.000000006D091000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D090000, based on PE: true
    • Associated: 00000003.00000002.2212515659.000000006D090000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212599577.000000006D12D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212619894.000000006D12E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212640649.000000006D12F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212661061.000000006D134000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212792942.000000006D1DD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212938204.000000006D1FB000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212957971.000000006D202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212978463.000000006D203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2213008790.000000006D206000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6d090000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 28ea84094a5811db662dec80700ffbfd72b975c2551d231003a76ac088956676
    • Instruction ID: 7591b923ba66610c8e59d064a1047a8a88396db489b8e3c0d14fa43ec080b22d
    • Opcode Fuzzy Hash: 28ea84094a5811db662dec80700ffbfd72b975c2551d231003a76ac088956676
    • Instruction Fuzzy Hash: F291463264C7164FE319CEADC4D061EB3E2FBC8348F55873CD9694B380EB76A9098685
    Memory Dump Source
    • Source File: 00000003.00000002.2212531983.000000006D091000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D090000, based on PE: true
    • Associated: 00000003.00000002.2212515659.000000006D090000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212599577.000000006D12D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212619894.000000006D12E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212640649.000000006D12F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212661061.000000006D134000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212792942.000000006D1DD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212938204.000000006D1FB000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212957971.000000006D202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212978463.000000006D203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2213008790.000000006D206000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6d090000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 965e0edb81f405fe7eb9d983c44d0d0a8674fed9c13d850ff1cfad21d2660f68
    • Instruction ID: bcf57e147eb06e0681e9548e18fc74f78780018c27aad99b976a06e281c3bb31
    • Opcode Fuzzy Hash: 965e0edb81f405fe7eb9d983c44d0d0a8674fed9c13d850ff1cfad21d2660f68
    • Instruction Fuzzy Hash: 3D814737A4C72A4FE312CDA888D075D32D2ABC8318F59463CDD748B3C5EBB6A80586C5
    Memory Dump Source
    • Source File: 00000003.00000002.2212531983.000000006D091000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D090000, based on PE: true
    • Associated: 00000003.00000002.2212515659.000000006D090000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212599577.000000006D12D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212619894.000000006D12E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212640649.000000006D12F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212661061.000000006D134000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212792942.000000006D1DD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212938204.000000006D1FB000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212957971.000000006D202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212978463.000000006D203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2213008790.000000006D206000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6d090000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 6683fe743c04af60dd630f28e76e009f2850abfaac095e1739a28ee3271d8ee3
    • Instruction ID: 4b96432bf95e62d563cec97fe10667f7f3090fb9247ae2736130cb1e898b882a
    • Opcode Fuzzy Hash: 6683fe743c04af60dd630f28e76e009f2850abfaac095e1739a28ee3271d8ee3
    • Instruction Fuzzy Hash: 0E91C676A187184BD304DE59CCC0659B3D2BBC8324F49C63CECA89B345E675EE49CB82
    Memory Dump Source
    • Source File: 00000003.00000002.2212531983.000000006D091000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D090000, based on PE: true
    • Associated: 00000003.00000002.2212515659.000000006D090000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212599577.000000006D12D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212619894.000000006D12E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212640649.000000006D12F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212661061.000000006D134000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212792942.000000006D1DD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212938204.000000006D1FB000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212957971.000000006D202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212978463.000000006D203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2213008790.000000006D206000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6d090000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: c5598305615de8944a7ad53e3e6344f188005c9dc0635cb8c1f0adb198492c38
    • Instruction ID: f746a725f7223b9a27287e71ca0f2fc2871c38d7ea33cf69ba720e08a46ebbed
    • Opcode Fuzzy Hash: c5598305615de8944a7ad53e3e6344f188005c9dc0635cb8c1f0adb198492c38
    • Instruction Fuzzy Hash: DC81D6B2A183108FC314DF19D88095AF7E2BFC9758F46892DF988D7311E771E9158B86
    Memory Dump Source
    • Source File: 00000003.00000002.2212531983.000000006D091000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D090000, based on PE: true
    • Associated: 00000003.00000002.2212515659.000000006D090000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212599577.000000006D12D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212619894.000000006D12E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212640649.000000006D12F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212661061.000000006D134000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212792942.000000006D1DD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212938204.000000006D1FB000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212957971.000000006D202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212978463.000000006D203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2213008790.000000006D206000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6d090000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: b9a672fa4666f95a5b9ce75f7ecf03663e43826c66368779d91bd4aedbd507b3
    • Instruction ID: 40862725fa767dd467b6e52e4d259b2da9c408d33dbbe0bc65047f369502ae9c
    • Opcode Fuzzy Hash: b9a672fa4666f95a5b9ce75f7ecf03663e43826c66368779d91bd4aedbd507b3
    • Instruction Fuzzy Hash: 2991A9B8A0D3419FC308CF28C090A1ABBE0FF89748F519A6EE99997351D731E945CF46
    Memory Dump Source
    • Source File: 00000003.00000002.2212531983.000000006D091000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D090000, based on PE: true
    • Associated: 00000003.00000002.2212515659.000000006D090000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212599577.000000006D12D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212619894.000000006D12E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212640649.000000006D12F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212661061.000000006D134000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212792942.000000006D1DD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212938204.000000006D1FB000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212957971.000000006D202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212978463.000000006D203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2213008790.000000006D206000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6d090000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: a74e3cdcd30a4e377c87d22d140c510c8f9e31ee98ac193ba90d7c9e73e1ccf2
    • Instruction ID: 5e0ce31e371c3dc6d0a15bfacbdb05b3a7a7325d46e1d8a08d269fb91b36d32b
    • Opcode Fuzzy Hash: a74e3cdcd30a4e377c87d22d140c510c8f9e31ee98ac193ba90d7c9e73e1ccf2
    • Instruction Fuzzy Hash: 3651667090C3A44AE3158F6F48D412EFFE16FC6301F884A6EF5E443392D5B89515DB6A
    Memory Dump Source
    • Source File: 00000003.00000002.2212531983.000000006D091000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D090000, based on PE: true
    • Associated: 00000003.00000002.2212515659.000000006D090000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212599577.000000006D12D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212619894.000000006D12E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212640649.000000006D12F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212661061.000000006D134000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212792942.000000006D1DD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212938204.000000006D1FB000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212957971.000000006D202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212978463.000000006D203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2213008790.000000006D206000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6d090000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 64ce7b6036805578b6991b028fb468c3a93c7cdad0ff80843793c936bf34bf2a
    • Instruction ID: 8b2b9c72097f5abe2e7412962f31b47347dcbea9df98ef54d6241b445118c22d
    • Opcode Fuzzy Hash: 64ce7b6036805578b6991b028fb468c3a93c7cdad0ff80843793c936bf34bf2a
    • Instruction Fuzzy Hash: 1451567090C3A44AE3158F6F48D412AFFF1AFCA301F884A6EF5E443392D5B89515DB6A
    Memory Dump Source
    • Source File: 00000003.00000002.2212531983.000000006D091000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D090000, based on PE: true
    • Associated: 00000003.00000002.2212515659.000000006D090000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212599577.000000006D12D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212619894.000000006D12E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212640649.000000006D12F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212661061.000000006D134000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212792942.000000006D1DD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212938204.000000006D1FB000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212957971.000000006D202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212978463.000000006D203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2213008790.000000006D206000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6d090000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 7e9464670720d5cec7526170a97f241d3b547c0ee32cac8b16ea87d274058f23
    • Instruction ID: 13443566d20afebcf7f558c713cb3c515e555504103dc96b0771c299d1e44281
    • Opcode Fuzzy Hash: 7e9464670720d5cec7526170a97f241d3b547c0ee32cac8b16ea87d274058f23
    • Instruction Fuzzy Hash: 4F5138B56093128FD318DF69C590B1AFBE0BB88604F05857CED599B392D731E846CBD2
    Memory Dump Source
    • Source File: 00000003.00000002.2212531983.000000006D091000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D090000, based on PE: true
    • Associated: 00000003.00000002.2212515659.000000006D090000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212599577.000000006D12D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212619894.000000006D12E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212640649.000000006D12F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212661061.000000006D134000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212792942.000000006D1DD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212938204.000000006D1FB000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212957971.000000006D202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212978463.000000006D203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2213008790.000000006D206000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6d090000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 1dba37b4972703f4739d467c4656cacdebc54675d7b98e01084d2c320e1d1333
    • Instruction ID: a7544d988bdc32732cc20f0226cc2f9696fba4a8ae2b467710201d59dc2b7224
    • Opcode Fuzzy Hash: 1dba37b4972703f4739d467c4656cacdebc54675d7b98e01084d2c320e1d1333
    • Instruction Fuzzy Hash: B241D570918F058FD346DE39C49031AB7E5BFCA384F54872DE94A6B352EB719882DB42
    Memory Dump Source
    • Source File: 00000003.00000002.2212531983.000000006D091000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D090000, based on PE: true
    • Associated: 00000003.00000002.2212515659.000000006D090000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212599577.000000006D12D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212619894.000000006D12E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212640649.000000006D12F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212661061.000000006D134000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212792942.000000006D1DD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212938204.000000006D1FB000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212957971.000000006D202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212978463.000000006D203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2213008790.000000006D206000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6d090000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: d44a0ba2c71ca78464b99a01e6cfa7b0ae73f3339fee209901e82cdce1d36072
    • Instruction ID: dbae596c9463201ef97d4621c0660d85bf29f3abcc4d49eddf52deb0ec2a0606
    • Opcode Fuzzy Hash: d44a0ba2c71ca78464b99a01e6cfa7b0ae73f3339fee209901e82cdce1d36072
    • Instruction Fuzzy Hash: 513161B381971D8BD300AF498C40249F7E6AFC0B20F5E8A5ED9A417301DBB0AA15DBC7
    Memory Dump Source
    • Source File: 00000003.00000002.2212531983.000000006D091000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D090000, based on PE: true
    • Associated: 00000003.00000002.2212515659.000000006D090000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212599577.000000006D12D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212619894.000000006D12E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212640649.000000006D12F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212661061.000000006D134000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212792942.000000006D1DD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212938204.000000006D1FB000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212957971.000000006D202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212978463.000000006D203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2213008790.000000006D206000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6d090000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: c70cdc72330989ad26bbd1340e7e1c0023d235a9c394c49b3d8970e4908e7eb7
    • Instruction ID: e608767248543574acd512b9136e3577b1e31c8eb0ffdb12d51a15e510c36d33
    • Opcode Fuzzy Hash: c70cdc72330989ad26bbd1340e7e1c0023d235a9c394c49b3d8970e4908e7eb7
    • Instruction Fuzzy Hash: C121C2317042128FEB08CE39E8E032AB7F3BBCA710B59956CD555CB6A4DA74A809C746
    Memory Dump Source
    • Source File: 00000003.00000002.2212531983.000000006D091000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D090000, based on PE: true
    • Associated: 00000003.00000002.2212515659.000000006D090000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212599577.000000006D12D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212619894.000000006D12E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212640649.000000006D12F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212661061.000000006D134000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212792942.000000006D1DD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212938204.000000006D1FB000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212957971.000000006D202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212978463.000000006D203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2213008790.000000006D206000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6d090000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 5c9eb18f8659ae61d3002e51e556e238b179dc98e7ca26403c853313e46c1f0c
    • Instruction ID: 9e02c18b1d42112021bca0000d406f39ae227f85dc13955064a7259a80819a8f
    • Opcode Fuzzy Hash: 5c9eb18f8659ae61d3002e51e556e238b179dc98e7ca26403c853313e46c1f0c
    • Instruction Fuzzy Hash: 72112B746083418FE705CF24D0A0769B7F1AB8A308F55485CE9994B391D7769859CB43
    Memory Dump Source
    • Source File: 00000003.00000002.2212531983.000000006D091000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D090000, based on PE: true
    • Associated: 00000003.00000002.2212515659.000000006D090000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212599577.000000006D12D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212619894.000000006D12E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212640649.000000006D12F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212661061.000000006D134000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212792942.000000006D1DD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212938204.000000006D1FB000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212957971.000000006D202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212978463.000000006D203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2213008790.000000006D206000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6d090000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 799b950aafab46995c3184c5c2b6a7d2aa658c3b306eef246b812ae6a4d0cebf
    • Instruction ID: d1988ad7a5db4db12248e876f95502df2590b4a1ea7001fbcf0a30669530ab9f
    • Opcode Fuzzy Hash: 799b950aafab46995c3184c5c2b6a7d2aa658c3b306eef246b812ae6a4d0cebf
    • Instruction Fuzzy Hash: BA11EDB4600B118FD398DF59C0D4E65B3E1FB8C200B4A81BDDB0E8B766C670A855DB85
    Memory Dump Source
    • Source File: 00000003.00000002.2212531983.000000006D091000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D090000, based on PE: true
    • Associated: 00000003.00000002.2212515659.000000006D090000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212599577.000000006D12D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212619894.000000006D12E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212640649.000000006D12F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212661061.000000006D134000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212792942.000000006D1DD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212938204.000000006D1FB000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212957971.000000006D202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212978463.000000006D203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2213008790.000000006D206000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6d090000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: e62e9b40b8889283369c733b4b486c010c6db68c8fd548765d833781fa73bc97
    • Instruction ID: 0bc26c6664960f52180617576eb815a8b66e3a5b49fb24c006be91fbd9a3d53d
    • Opcode Fuzzy Hash: e62e9b40b8889283369c733b4b486c010c6db68c8fd548765d833781fa73bc97
    • Instruction Fuzzy Hash: AFC04CB081E3529DF751CB1C918135ABEE5AB87340F94C49DA54883144C37596A1A619

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1425 6d12b7c0-6d12b830 call 6d12c560 fwrite call 6d12c560 vfprintf abort 1431 6d12b940-6d12b942 1425->1431 1432 6d12b836-6d12b83d 1425->1432 1434 6d12b85e-6d12b86a call 6d12c010 1431->1434 1433 6d12b840-6d12b844 1432->1433 1435 6d12b846-6d12b84e 1433->1435 1436 6d12b854-6d12b85c 1433->1436 1440 6d12b870-6d12b8b6 call 6d12c150 VirtualQuery 1434->1440 1441 6d12b967-6d12b991 call 6d12b7c0 1434->1441 1435->1436 1438 6d12b8d7-6d12b8dd 1435->1438 1436->1433 1436->1434 1447 6d12b947-6d12b95e 1440->1447 1448 6d12b8bc-6d12b8c6 1440->1448 1451 6d12b993-6d12b99a 1441->1451 1452 6d12b9a0-6d12b9e9 call 6d12c090 call 6d12c450 1441->1452 1447->1441 1453 6d12b962 call 6d12b7c0 1447->1453 1449 6d12b8d0 1448->1449 1450 6d12b8c8-6d12b8ce 1448->1450 1449->1438 1450->1449 1454 6d12b8e0-6d12b91e VirtualProtect 1450->1454 1451->1452 1452->1451 1462 6d12b9eb-6d12b9f4 1452->1462 1453->1441 1454->1449 1456 6d12b920-6d12b93d GetLastError call 6d12b7c0 1454->1456 1456->1431 1463 6d12bab0-6d12bab2 1462->1463 1464 6d12b9fa 1462->1464 1465 6d12bc28 1463->1465 1466 6d12bab8-6d12baca 1463->1466 1467 6d12b9ff-6d12ba03 1464->1467 1469 6d12bc2d-6d12bc33 1465->1469 1466->1467 1468 6d12bad0-6d12bad5 1466->1468 1467->1469 1470 6d12ba09 1467->1470 1471 6d12ba0c-6d12ba0e 1468->1471 1469->1451 1472 6d12bc39-6d12bc3c 1469->1472 1470->1471 1471->1469 1474 6d12ba14-6d12ba1a 1471->1474 1473 6d12bc40-6d12bc65 call 6d12b820 1472->1473 1482 6d12bc67-6d12bc6a 1473->1482 1476 6d12ba20-6d12ba29 1474->1476 1477 6d12bc6f-6d12bc7f call 6d12b7c0 1474->1477 1476->1451 1480 6d12ba2f-6d12ba32 1476->1480 1483 6d12ba38-6d12ba5e 1480->1483 1484 6d12bb00-6d12bb10 1483->1484 1485 6d12ba64-6d12ba67 1483->1485 1486 6d12bb12 1484->1486 1487 6d12bb17-6d12bb20 1484->1487 1488 6d12bae0-6d12bae3 1485->1488 1489 6d12ba69-6d12ba7c 1485->1489 1486->1487 1492 6d12bb22-6d12bb28 1487->1492 1493 6d12bb3a-6d12bb42 call 6d12b820 1487->1493 1490 6d12bbc0-6d12bbcf 1488->1490 1491 6d12bae9-6d12baf9 call 6d12b7c0 1488->1491 1494 6d12ba82-6d12ba84 1489->1494 1495 6d12bc10-6d12bc1e call 6d12b820 1489->1495 1498 6d12bbd1 1490->1498 1499 6d12bbd6-6d12bbdf 1490->1499 1491->1484 1500 6d12ba8a-6d12baac call 6d12b7c0 1492->1500 1501 6d12bb2e-6d12bb34 1492->1501 1510 6d12bb49-6d12bb52 1493->1510 1494->1495 1494->1500 1495->1510 1498->1499 1505 6d12bbe1-6d12bbe7 1499->1505 1506 6d12bbf6-6d12bc06 call 6d12b820 1499->1506 1500->1463 1501->1493 1501->1500 1505->1500 1511 6d12bbed-6d12bbf0 1505->1511 1506->1495 1506->1510 1510->1483 1513 6d12bb58-6d12bb63 1510->1513 1511->1500 1511->1506 1513->1451 1515 6d12bb69-6d12bb72 1513->1515 1516 6d12bb78-6d12bb88 1515->1516 1517 6d12bba4-6d12bbad 1516->1517 1518 6d12bb8a-6d12bba1 VirtualProtect 1516->1518 1517->1516 1519 6d12bbaf-6d12bbb6 1517->1519 1518->1517
    APIs
    Strings
    • VirtualQuery failed for %d bytes at address %p, xrefs: 6D12B957
    • Mingw-w64 runtime failure:, xrefs: 6D12B7E8
    • Address %p has no image-section, xrefs: 6D12B96B
    • VirtualProtect failed with code 0x%x, xrefs: 6D12B926
    Memory Dump Source
    • Source File: 00000003.00000002.2212531983.000000006D091000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D090000, based on PE: true
    • Associated: 00000003.00000002.2212515659.000000006D090000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212599577.000000006D12D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212619894.000000006D12E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212640649.000000006D12F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212661061.000000006D134000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212792942.000000006D1DD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212938204.000000006D1FB000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212957971.000000006D202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212978463.000000006D203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2213008790.000000006D206000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6d090000_rundll32.jbxd
    Similarity
    • API ID: QueryVirtualabortfwritevfprintf
    • String ID: VirtualProtect failed with code 0x%x$ VirtualQuery failed for %d bytes at address %p$Address %p has no image-section$Mingw-w64 runtime failure:
    • API String ID: 2513968241-1534286854
    • Opcode ID: a6abef6a8b6bfa60f45143dafad1712c300c460fada4cfb2576381f1f8c43d18
    • Instruction ID: eb5936229b3819d2f67253dd5a012c94e9babdfce004f609be842f61c83e5f52
    • Opcode Fuzzy Hash: a6abef6a8b6bfa60f45143dafad1712c300c460fada4cfb2576381f1f8c43d18
    • Instruction Fuzzy Hash: 05517CB19083059FCB00DF28C58975AFBF1FF84318F45891DE9889B248D776E884CB92
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.2212531983.000000006D091000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D090000, based on PE: true
    • Associated: 00000003.00000002.2212515659.000000006D090000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212599577.000000006D12D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212619894.000000006D12E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212640649.000000006D12F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212661061.000000006D134000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212792942.000000006D1DD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212938204.000000006D1FB000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212957971.000000006D202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212978463.000000006D203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2213008790.000000006D206000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6d090000_rundll32.jbxd
    Similarity
    • API ID: ErrorLast_wcsnicmpfreelstrlenmallocmbstowcsstrlenstrtol
    • String ID: #
    • API String ID: 533997002-1885708031
    • Opcode ID: 653bfa6757344b04779a1cbede6b40e4da135fbc133987db4e13f3687f2bb836
    • Instruction ID: 30bb9c05c20e561587382e490f4b0b2eb180a4f23fca968217fc3b9604e525cc
    • Opcode Fuzzy Hash: 653bfa6757344b04779a1cbede6b40e4da135fbc133987db4e13f3687f2bb836
    • Instruction Fuzzy Hash: E3519C71A083198FD310DF29D08065AB7E5FFEC314F41892EE998D7204E7B6E985CB92
    APIs
    Strings
    • unexpected cgo_bindm on Windows, xrefs: 6D126070
    • runtime: failed to signal runtime initialization complete., xrefs: 6D1260E8
    Memory Dump Source
    • Source File: 00000003.00000002.2212531983.000000006D091000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D090000, based on PE: true
    • Associated: 00000003.00000002.2212515659.000000006D090000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212599577.000000006D12D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212619894.000000006D12E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212640649.000000006D12F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212661061.000000006D134000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212792942.000000006D1DD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212938204.000000006D1FB000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212957971.000000006D202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212978463.000000006D203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2213008790.000000006D206000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6d090000_rundll32.jbxd
    Similarity
    • API ID: CriticalSection$EnterLeaveabort$Event
    • String ID: runtime: failed to signal runtime initialization complete.$unexpected cgo_bindm on Windows
    • API String ID: 123483900-760755518
    • Opcode ID: f3b388ceb493c56899f599b315d8249b54657dcc969db56f70be8e9cb4b7fa7b
    • Instruction ID: d1bafbc65bc62a67d0bb34298407b5921f1f6ee0d5e00d0e1d97c2d5a067d674
    • Opcode Fuzzy Hash: f3b388ceb493c56899f599b315d8249b54657dcc969db56f70be8e9cb4b7fa7b
    • Instruction Fuzzy Hash: 0B11BCB18086148FDB01BFB8914E36EBBB4BB42308F82095CD98597609EB75A499CB57
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.2212531983.000000006D091000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D090000, based on PE: true
    • Associated: 00000003.00000002.2212515659.000000006D090000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212599577.000000006D12D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212619894.000000006D12E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212640649.000000006D12F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212661061.000000006D134000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212792942.000000006D1DD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212938204.000000006D1FB000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212957971.000000006D202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212978463.000000006D203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2213008790.000000006D206000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6d090000_rundll32.jbxd
    Similarity
    • API ID: Heap$AllocInfoNativeProcessReadSystemmemcpymemsetrealloc
    • String ID: @
    • API String ID: 3801555102-2766056989
    • Opcode ID: d4b4892e3e5a5bf1ad6002d2e93d5ce561a3bac04f2790462a68e2a30d3e57a0
    • Instruction ID: bb3307a6ded4e80f94bf12d90e3ccef7aaa39576710540d0dc5aca037176e68e
    • Opcode Fuzzy Hash: d4b4892e3e5a5bf1ad6002d2e93d5ce561a3bac04f2790462a68e2a30d3e57a0
    • Instruction Fuzzy Hash: 4CA1D0B0A087029FD710CF29C58476AFBE0BF88314F45892DE89997304E7B5E995CF82
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.2212531983.000000006D091000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D090000, based on PE: true
    • Associated: 00000003.00000002.2212515659.000000006D090000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212599577.000000006D12D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212619894.000000006D12E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212640649.000000006D12F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212661061.000000006D134000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212792942.000000006D1DD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212938204.000000006D1FB000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212957971.000000006D202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212978463.000000006D203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2213008790.000000006D206000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6d090000_rundll32.jbxd
    Similarity
    • API ID: memset
    • String ID: 0$o
    • API String ID: 2221118986-4157579757
    • Opcode ID: ebefbe6945bd7e9b28a0da70524577bbcc1c22ea509cf173d45d016b6e072430
    • Instruction ID: 7fe9782eb800270bad326c8aac3c0cd3b96440e272506be1860e32cb0775e942
    • Opcode Fuzzy Hash: ebefbe6945bd7e9b28a0da70524577bbcc1c22ea509cf173d45d016b6e072430
    • Instruction Fuzzy Hash: 22F16071A0824D8FCB05CF68C48079DBBF2BF89360F15C229D994AB399D775E985CB90
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.2212531983.000000006D091000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D090000, based on PE: true
    • Associated: 00000003.00000002.2212515659.000000006D090000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212599577.000000006D12D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212619894.000000006D12E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212640649.000000006D12F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212661061.000000006D134000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212792942.000000006D1DD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212938204.000000006D1FB000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212957971.000000006D202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212978463.000000006D203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2213008790.000000006D206000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6d090000_rundll32.jbxd
    Similarity
    • API ID: _errno
    • String ID: @$Inf$NaN
    • API String ID: 2918714741-141429178
    • Opcode ID: 20a74dc6001b2d351fde91c993480563cf70f1b28de554b52a1690da559eb187
    • Instruction ID: cf5f11ca25e1d4a13c13eebbc9b94c3d2176e2c81c097ad4de4f9a7fc4804655
    • Opcode Fuzzy Hash: 20a74dc6001b2d351fde91c993480563cf70f1b28de554b52a1690da559eb187
    • Instruction Fuzzy Hash: 71F1E47160C3828BD7218F24C49079BBBE1BFC5314F158A2DD9DC97389D7B69986CB82
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.2212531983.000000006D091000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D090000, based on PE: true
    • Associated: 00000003.00000002.2212515659.000000006D090000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212599577.000000006D12D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212619894.000000006D12E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212640649.000000006D12F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212661061.000000006D134000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212792942.000000006D1DD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212938204.000000006D1FB000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212957971.000000006D202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212978463.000000006D203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2213008790.000000006D206000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6d090000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID: 0$@
    • API String ID: 0-1545510068
    • Opcode ID: db53b3412e21b14b64fd966cdfaba44a868fe3b057c10bed8708d4ee68713ec0
    • Instruction ID: 1f485f4e391e8dfeeb97d55023c128a7a84c13c592fc87de707e3cd3e066beef
    • Opcode Fuzzy Hash: db53b3412e21b14b64fd966cdfaba44a868fe3b057c10bed8708d4ee68713ec0
    • Instruction Fuzzy Hash: E9C17171E0421A8FDB05CF68C48079EBBF1BF99314F15825ADC54AB389D3B6E885CB94
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.2212531983.000000006D091000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D090000, based on PE: true
    • Associated: 00000003.00000002.2212515659.000000006D090000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212599577.000000006D12D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212619894.000000006D12E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212640649.000000006D12F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212661061.000000006D134000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212792942.000000006D1DD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212938204.000000006D1FB000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212957971.000000006D202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212978463.000000006D203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2213008790.000000006D206000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6d090000_rundll32.jbxd
    Similarity
    • API ID: AddressProc$HandleModule
    • String ID: ___lc_codepage_func$__lc_codepage$msvcrt.dll
    • API String ID: 667068680-1145701848
    • Opcode ID: b793a20fc13de4808c2c95d65af2bb2a9fef36d86ead19fe30b689a995d77004
    • Instruction ID: a47eb9b1acd81847e49ceedd00c511d60516aec9e376d02a94c3b93d69ad311f
    • Opcode Fuzzy Hash: b793a20fc13de4808c2c95d65af2bb2a9fef36d86ead19fe30b689a995d77004
    • Instruction Fuzzy Hash: 35F049B19852098BDB40BF3D594935ABEF4BB15210B41453EE989DB208E7B2D490CBE3
    APIs
    • Sleep.KERNEL32(?,?,?,6D091281,?,?,?,?,?,?,6D0913AE), ref: 6D091057
    • _amsg_exit.MSVCRT ref: 6D091086
    Memory Dump Source
    • Source File: 00000003.00000002.2212531983.000000006D091000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D090000, based on PE: true
    • Associated: 00000003.00000002.2212515659.000000006D090000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212599577.000000006D12D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212619894.000000006D12E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212640649.000000006D12F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212661061.000000006D134000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212792942.000000006D1DD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212938204.000000006D1FB000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212957971.000000006D202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212978463.000000006D203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2213008790.000000006D206000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6d090000_rundll32.jbxd
    Similarity
    • API ID: Sleep_amsg_exit
    • String ID:
    • API String ID: 1015461914-0
    • Opcode ID: 68b1e46db9a09d48c65e488adb47a4075adb5b64f87cab3c4cc277e521772e42
    • Instruction ID: cca9ca0bc23db77902f314e14f85a4589bb17035f61c40ea666e15b2e929ed4e
    • Opcode Fuzzy Hash: 68b1e46db9a09d48c65e488adb47a4075adb5b64f87cab3c4cc277e521772e42
    • Instruction Fuzzy Hash: 35315B70B082428BEB02AF69C58872B77F9EBC6748F41852DD5448F644D7B6D881EBC3
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.2212531983.000000006D091000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D090000, based on PE: true
    • Associated: 00000003.00000002.2212515659.000000006D090000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212599577.000000006D12D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212619894.000000006D12E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212640649.000000006D12F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212661061.000000006D134000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212792942.000000006D1DD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212938204.000000006D1FB000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212957971.000000006D202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212978463.000000006D203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2213008790.000000006D206000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6d090000_rundll32.jbxd
    Similarity
    • API ID: fputc$memset
    • String ID: 0$o
    • API String ID: 2944404495-4157579757
    • Opcode ID: 554f7f9faea69a16024aefb5dd32d29328ec9af7303e668e9847430315f7532b
    • Instruction ID: bc4b164e716f6c82d7d59bd9710e5afca554b3b2e12644b40a220cea179e9b40
    • Opcode Fuzzy Hash: 554f7f9faea69a16024aefb5dd32d29328ec9af7303e668e9847430315f7532b
    • Instruction Fuzzy Hash: 02316D71A083098FCB01CF68C5D479AB7F1BF48354F118529DA95AB389E7B6E880CF90
    APIs
    • bsearch.MSVCRT ref: 6D124ECF
    • SetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,?,?,?,6D125DAF), ref: 6D124F0F
    • malloc.MSVCRT ref: 6D124F44
    • qsort.MSVCRT ref: 6D124FB4
    Memory Dump Source
    • Source File: 00000003.00000002.2212531983.000000006D091000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D090000, based on PE: true
    • Associated: 00000003.00000002.2212515659.000000006D090000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212599577.000000006D12D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212619894.000000006D12E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212640649.000000006D12F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212661061.000000006D134000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212792942.000000006D1DD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212938204.000000006D1FB000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212957971.000000006D202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212978463.000000006D203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2213008790.000000006D206000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6d090000_rundll32.jbxd
    Similarity
    • API ID: ErrorLastbsearchmallocqsort
    • String ID:
    • API String ID: 1451747280-0
    • Opcode ID: 61d57a99e1a71eb6b3d22c7f6cecef2cb37fd125c5512ece1f845ff2c9c3a6a3
    • Instruction ID: 2134e80477beec2d0eee8badb10d9a08f6ffc194181be39455144c76ce1e2543
    • Opcode Fuzzy Hash: 61d57a99e1a71eb6b3d22c7f6cecef2cb37fd125c5512ece1f845ff2c9c3a6a3
    • Instruction Fuzzy Hash: C3416C716183018FD310CF29D48462AB7F5BFD9314F46892DE8899B358D7B6E885CB82
    APIs
    Memory Dump Source
    • Source File: 00000003.00000002.2212531983.000000006D091000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D090000, based on PE: true
    • Associated: 00000003.00000002.2212515659.000000006D090000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212599577.000000006D12D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212619894.000000006D12E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212640649.000000006D12F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212661061.000000006D134000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212792942.000000006D1DD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212938204.000000006D1FB000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212957971.000000006D202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212978463.000000006D203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2213008790.000000006D206000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6d090000_rundll32.jbxd
    Similarity
    • API ID: ErrorLastLocaleThread
    • String ID:
    • API String ID: 1348403374-0
    • Opcode ID: b539952f101a75f6b5690ac0a2cb3bb101deeaae0df000b25f4e17b6a796b7c5
    • Instruction ID: c416d38d96b1b34b5cbd666bf7800dd3de0ac8e3fe48a76942804a54a1e3d0a0
    • Opcode Fuzzy Hash: b539952f101a75f6b5690ac0a2cb3bb101deeaae0df000b25f4e17b6a796b7c5
    • Instruction Fuzzy Hash: BC21D9716142018FE7009B39D8C9667B7F1BF95324F09C629D599C73C8EB72E894CB91
    APIs
    Memory Dump Source
    • Source File: 00000003.00000002.2212531983.000000006D091000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D090000, based on PE: true
    • Associated: 00000003.00000002.2212515659.000000006D090000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212599577.000000006D12D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212619894.000000006D12E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212640649.000000006D12F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212661061.000000006D134000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212792942.000000006D1DD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212938204.000000006D1FB000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212957971.000000006D202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212978463.000000006D203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2213008790.000000006D206000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6d090000_rundll32.jbxd
    Similarity
    • API ID: _lock_unlockcalloc
    • String ID:
    • API String ID: 3876498383-0
    • Opcode ID: 01cfb712d85b6e4d619ce68922cd4ea2a4d205ce6739300ed457df455a6d115e
    • Instruction ID: 2208be232fbdcddfd4de721b571527249f6f29c75eeacf9421efcee4af9cf78d
    • Opcode Fuzzy Hash: 01cfb712d85b6e4d619ce68922cd4ea2a4d205ce6739300ed457df455a6d115e
    • Instruction Fuzzy Hash: 271160716082018FD740DF28C48075ABBE1FF89310F16C669DA98CF249EBB5C884CBA2
    APIs
    • WaitForSingleObject.KERNEL32 ref: 6D125FF0
    • EnterCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,6D1246F9), ref: 6D125FFC
    • LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,6D1246F9), ref: 6D12600E
    • EnterCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,6D1246F9), ref: 6D12601E
    • LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,6D1246F9), ref: 6D126030
    Memory Dump Source
    • Source File: 00000003.00000002.2212531983.000000006D091000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D090000, based on PE: true
    • Associated: 00000003.00000002.2212515659.000000006D090000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212599577.000000006D12D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212619894.000000006D12E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212640649.000000006D12F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212661061.000000006D134000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212792942.000000006D1DD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212938204.000000006D1FB000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212957971.000000006D202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212978463.000000006D203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2213008790.000000006D206000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6d090000_rundll32.jbxd
    Similarity
    • API ID: CriticalSection$EnterLeave$ObjectSingleWait
    • String ID:
    • API String ID: 1755037574-0
    • Opcode ID: 3cf8d3a7be72c9dec8dae7252a0f475b29843d1c242eaca5f117aa3185ab9dee
    • Instruction ID: 7a249a0b4d66b77259949d2c169a2c700fb8d91352c43b9707fb7f65d95cc00c
    • Opcode Fuzzy Hash: 3cf8d3a7be72c9dec8dae7252a0f475b29843d1c242eaca5f117aa3185ab9dee
    • Instruction Fuzzy Hash: F8014071504709CFDB00BF7D95CA62BFBBCAB86218F01062DE99487648E770A498CB93
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.2212531983.000000006D091000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D090000, based on PE: true
    • Associated: 00000003.00000002.2212515659.000000006D090000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212599577.000000006D12D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212619894.000000006D12E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212640649.000000006D12F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212661061.000000006D134000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212792942.000000006D1DD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212938204.000000006D1FB000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212957971.000000006D202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212978463.000000006D203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2213008790.000000006D206000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6d090000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID: (null)$@
    • API String ID: 0-1380778734
    • Opcode ID: a7f97fb10b5aebdee99f5b22295e291c9b8d6cd3b139bc47fb1e9c480b72151c
    • Instruction ID: fa7ec6bc6bf9c80fa2dc061fbcaedcfbffed896c97e8e8e4b674b54507beb4f9
    • Opcode Fuzzy Hash: a7f97fb10b5aebdee99f5b22295e291c9b8d6cd3b139bc47fb1e9c480b72151c
    • Instruction Fuzzy Hash: 6FA1A47160C3968BD721CF24C4907ABBBE1BF85304F118A1DD9D897389D7B6D985CB82
    Strings
    • Unknown pseudo relocation bit size %d., xrefs: 6D12BAED
    • %d bit pseudo relocation at %p out of range, targeting %p, yielding the value %p., xrefs: 6D12BAA0
    • Unknown pseudo relocation protocol version %d., xrefs: 6D12BC73
    Memory Dump Source
    • Source File: 00000003.00000002.2212531983.000000006D091000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D090000, based on PE: true
    • Associated: 00000003.00000002.2212515659.000000006D090000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212599577.000000006D12D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212619894.000000006D12E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212640649.000000006D12F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212661061.000000006D134000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212792942.000000006D1DD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212938204.000000006D1FB000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212957971.000000006D202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212978463.000000006D203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2213008790.000000006D206000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6d090000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID: Unknown pseudo relocation bit size %d.$ Unknown pseudo relocation protocol version %d.$%d bit pseudo relocation at %p out of range, targeting %p, yielding the value %p.
    • API String ID: 0-1286557213
    • Opcode ID: 5ac9a57765888f3bb39d11d5df942cbdea910d5a28bc109d103c677ac158973a
    • Instruction ID: d94622653ab4e68e07d8a084f9622d2d5358b3f35682ffe0453b86ff8b394eab
    • Opcode Fuzzy Hash: 5ac9a57765888f3bb39d11d5df942cbdea910d5a28bc109d103c677ac158973a
    • Instruction Fuzzy Hash: 26718F71E186068FCB00CF69DA80B9EB7F1FF95304F158529D954AB24CD3B2A891CBD2
    APIs
    • malloc.MSVCRT ref: 6D12625F
    • abort.MSVCRT ref: 6D1262A2
    • free.MSVCRT ref: 6D1262C5
      • Part of subcall function 6D126170: _beginthread.MSVCRT ref: 6D126196
      • Part of subcall function 6D126170: _errno.MSVCRT ref: 6D1261A1
      • Part of subcall function 6D126170: _errno.MSVCRT ref: 6D1261A8
      • Part of subcall function 6D126170: abort.MSVCRT ref: 6D1261CD
    Strings
    • runtime/cgo: out of memory in thread_start, xrefs: 6D126292
    Memory Dump Source
    • Source File: 00000003.00000002.2212531983.000000006D091000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D090000, based on PE: true
    • Associated: 00000003.00000002.2212515659.000000006D090000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212599577.000000006D12D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212619894.000000006D12E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212640649.000000006D12F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212661061.000000006D134000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212792942.000000006D1DD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212938204.000000006D1FB000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212957971.000000006D202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212978463.000000006D203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2213008790.000000006D206000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6d090000_rundll32.jbxd
    Similarity
    • API ID: _errnoabort$_beginthreadfreemalloc
    • String ID: runtime/cgo: out of memory in thread_start
    • API String ID: 2078976911-3894583329
    • Opcode ID: 8cbb22305f053a83b39138e7bfd7f2a28449725fae467bd531b13b04d614a0fd
    • Instruction ID: 1404a1b5dbac1db0e44b9fe0489c30ae87c1e20965aaa990bcb8db1b269e42ce
    • Opcode Fuzzy Hash: 8cbb22305f053a83b39138e7bfd7f2a28449725fae467bd531b13b04d614a0fd
    • Instruction Fuzzy Hash: BB211DB59087448FC700EF68D58451AFBF5FF89304F46899DEA889B319D375E880CB92
    APIs
    • CreateEventA.KERNEL32 ref: 6D125EB2
    • InitializeCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,6D125F65), ref: 6D125ECB
    • abort.MSVCRT ref: 6D125EF5
    Strings
    • runtime: failed to create runtime initialization wait event., xrefs: 6D125EE5
    Memory Dump Source
    • Source File: 00000003.00000002.2212531983.000000006D091000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D090000, based on PE: true
    • Associated: 00000003.00000002.2212515659.000000006D090000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212599577.000000006D12D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212619894.000000006D12E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212640649.000000006D12F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212661061.000000006D134000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212792942.000000006D1DD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212938204.000000006D1FB000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212957971.000000006D202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212978463.000000006D203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2213008790.000000006D206000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6d090000_rundll32.jbxd
    Similarity
    • API ID: CreateCriticalEventInitializeSectionabort
    • String ID: runtime: failed to create runtime initialization wait event.
    • API String ID: 3843693739-3277801083
    • Opcode ID: b7adac9b97cab6ce378ef1825a76c22b9018c5478a3fd2c7e21c8e96adaaf75a
    • Instruction ID: 32cf320b931d9860a4fb76ed7d5cb7e122ead2a3d7f5be4cd81611105cb32904
    • Opcode Fuzzy Hash: b7adac9b97cab6ce378ef1825a76c22b9018c5478a3fd2c7e21c8e96adaaf75a
    • Instruction Fuzzy Hash: 35F01DB14087018FEB00BF78C15D36EBAF4BB41318F81885CD59586648EBB9C084CB53
    APIs
    • IsDBCSLeadByteEx.KERNEL32 ref: 6D12C942
    • MultiByteToWideChar.KERNEL32 ref: 6D12C985
    Memory Dump Source
    • Source File: 00000003.00000002.2212531983.000000006D091000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D090000, based on PE: true
    • Associated: 00000003.00000002.2212515659.000000006D090000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212599577.000000006D12D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212619894.000000006D12E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212640649.000000006D12F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212661061.000000006D134000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212792942.000000006D1DD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212938204.000000006D1FB000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212957971.000000006D202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212978463.000000006D203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2213008790.000000006D206000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6d090000_rundll32.jbxd
    Similarity
    • API ID: Byte$CharLeadMultiWide
    • String ID:
    • API String ID: 2561704868-0
    • Opcode ID: 9a73f6b7830528ac94cece8773e092ec2bc07413332e6c39bfdd4679e4c5c399
    • Instruction ID: bb7d5a70922e87aca826780cd94f52479573ad2d4cc314e94ce1ab498f77cdf1
    • Opcode Fuzzy Hash: 9a73f6b7830528ac94cece8773e092ec2bc07413332e6c39bfdd4679e4c5c399
    • Instruction Fuzzy Hash: EC31F7B15093428FDB00DF29D48475ABBF1BF96314F00891EE9D487258E3B6D988CB43
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.2212531983.000000006D091000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D090000, based on PE: true
    • Associated: 00000003.00000002.2212515659.000000006D090000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212599577.000000006D12D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212619894.000000006D12E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212640649.000000006D12F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212661061.000000006D134000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212792942.000000006D1DD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212938204.000000006D1FB000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212957971.000000006D202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212978463.000000006D203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2213008790.000000006D206000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6d090000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID: @$u
    • API String ID: 0-1583100103
    • Opcode ID: 03ca6ec13e362cefde609118bed27ff3eddb710d294e12a51d4754b51bdd54b5
    • Instruction ID: ea79a148484ad32611c4ed20ce1d17869ea6ba68a43f849e576e2fe4630de7bc
    • Opcode Fuzzy Hash: 03ca6ec13e362cefde609118bed27ff3eddb710d294e12a51d4754b51bdd54b5
    • Instruction Fuzzy Hash: FBA1937160C3928BD721CF24C4903ABBBF1BF85308F158A1DD9D857299D7B6D985CB82
    APIs
    • wcslen.MSVCRT ref: 6D128AAE
      • Part of subcall function 6D126520: fputc.MSVCRT ref: 6D1265E8
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.2212531983.000000006D091000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D090000, based on PE: true
    • Associated: 00000003.00000002.2212515659.000000006D090000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212599577.000000006D12D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212619894.000000006D12E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212640649.000000006D12F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212661061.000000006D134000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212792942.000000006D1DD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212938204.000000006D1FB000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212957971.000000006D202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212978463.000000006D203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2213008790.000000006D206000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6d090000_rundll32.jbxd
    Similarity
    • API ID: fputcwcslen
    • String ID: (null)$@
    • API String ID: 1336801768-1380778734
    • Opcode ID: b9de63760a072585c5d6ba367ac287ae06c0bea925fd8181ba00582849597dc3
    • Instruction ID: c8bbcf382787066b9f0390e1dc77497fd9dcdb61922e59e325b248db6f27200a
    • Opcode Fuzzy Hash: b9de63760a072585c5d6ba367ac287ae06c0bea925fd8181ba00582849597dc3
    • Instruction Fuzzy Hash: 9C91937160C3968BD7218F24C4903ABBBF1BF85304F118A1DD9D897389D7B6D986CB82
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.2212531983.000000006D091000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D090000, based on PE: true
    • Associated: 00000003.00000002.2212515659.000000006D090000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212599577.000000006D12D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212619894.000000006D12E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212640649.000000006D12F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212661061.000000006D134000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212792942.000000006D1DD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212938204.000000006D1FB000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212957971.000000006D202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212978463.000000006D203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2213008790.000000006D206000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6d090000_rundll32.jbxd
    Similarity
    • API ID: fputc
    • String ID: NaN
    • API String ID: 1992160199-1757892521
    • Opcode ID: cf7614440ec6851ca82ea40031330610d20ebf86e678fa2553d9f1a1c36698a7
    • Instruction ID: af8f8f2efcccd7b523b77922b85f52fd8a94c14984435d341613793f27ba8921
    • Opcode Fuzzy Hash: cf7614440ec6851ca82ea40031330610d20ebf86e678fa2553d9f1a1c36698a7
    • Instruction Fuzzy Hash: AF4118B5A05219CBCB10CF18D484756B7E1BF95714B26C299DD488F38ED3B6D882CBD0
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.2212531983.000000006D091000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D090000, based on PE: true
    • Associated: 00000003.00000002.2212515659.000000006D090000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212599577.000000006D12D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212619894.000000006D12E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212640649.000000006D12F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212661061.000000006D134000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212792942.000000006D1DD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212938204.000000006D1FB000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212957971.000000006D202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212978463.000000006D203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2213008790.000000006D206000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6d090000_rundll32.jbxd
    Similarity
    • API ID: fputc$memset
    • String ID: o
    • API String ID: 2944404495-252678980
    • Opcode ID: 5083fe0debd9753e9b233b695f135e5a28ad9768abfd24fc6a55f8e7a69b9823
    • Instruction ID: 877fe9e046541077cf646aceff594c6f25da98fce9c30cfb0255e6c65ae5ec19
    • Opcode Fuzzy Hash: 5083fe0debd9753e9b233b695f135e5a28ad9768abfd24fc6a55f8e7a69b9823
    • Instruction Fuzzy Hash: DE317071A08209CFC701CF68C59079AB7F1BF48350F158659D999AB389E7B6E980CBC0
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.2212531983.000000006D091000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D090000, based on PE: true
    • Associated: 00000003.00000002.2212515659.000000006D090000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212599577.000000006D12D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212619894.000000006D12E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212640649.000000006D12F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212661061.000000006D134000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212792942.000000006D1DD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212938204.000000006D1FB000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212957971.000000006D202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212978463.000000006D203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2213008790.000000006D206000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6d090000_rundll32.jbxd
    Similarity
    • API ID: fputc
    • String ID: @
    • API String ID: 1992160199-2766056989
    • Opcode ID: ababd3f75690fbcba9bc1f60d79812ee9903b967bac2f6abc848a8bcbfc8c842
    • Instruction ID: d7255f86b1dfcdade91b63c6e6a2c8c50d60f86829018095557c74bdf10ec467
    • Opcode Fuzzy Hash: ababd3f75690fbcba9bc1f60d79812ee9903b967bac2f6abc848a8bcbfc8c842
    • Instruction Fuzzy Hash: AF110DB1D082018BCB01CFA8C1907567BB1BF96300F26865ADE995F24ED7B6E885CB59
    APIs
    • Sleep.KERNEL32(?,?,?,?,6D12A971,?,?,?,?,?,?,00000000,6D128C14), ref: 6D12A877
    • InitializeCriticalSection.KERNEL32(?,?,?,?,6D12A971,?,?,?,?,?,?,00000000,6D128C14), ref: 6D12A8B4
    • InitializeCriticalSection.KERNEL32(?,?,?,?,?,6D12A971,?,?,?,?,?,?,00000000,6D128C14), ref: 6D12A8C0
    • EnterCriticalSection.KERNEL32(?,?,?,?,6D12A971,?,?,?,?,?,?,00000000,6D128C14), ref: 6D12A8E8
    Memory Dump Source
    • Source File: 00000003.00000002.2212531983.000000006D091000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D090000, based on PE: true
    • Associated: 00000003.00000002.2212515659.000000006D090000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212599577.000000006D12D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212619894.000000006D12E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212640649.000000006D12F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212661061.000000006D134000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212792942.000000006D1DD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212938204.000000006D1FB000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212957971.000000006D202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212978463.000000006D203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2213008790.000000006D206000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6d090000_rundll32.jbxd
    Similarity
    • API ID: CriticalSection$Initialize$EnterSleep
    • String ID:
    • API String ID: 1117354567-0
    • Opcode ID: 7b213b8cb6ae501d959c0c5977980788118c6f0f1801d1e4b33d540f7e0dbeb2
    • Instruction ID: 17a262c4f8c178f21b018eb6a6cf859d41a052af341187d6b7b3448650e97ea5
    • Opcode Fuzzy Hash: 7b213b8cb6ae501d959c0c5977980788118c6f0f1801d1e4b33d540f7e0dbeb2
    • Instruction Fuzzy Hash: E81161B190410A8FDF02AB28948AB6A77F4FF66358F010429C852C7208E773D8C5D7D3
    APIs
    Memory Dump Source
    • Source File: 00000003.00000002.2212531983.000000006D091000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D090000, based on PE: true
    • Associated: 00000003.00000002.2212515659.000000006D090000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212599577.000000006D12D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212619894.000000006D12E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212640649.000000006D12F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212661061.000000006D134000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212792942.000000006D1DD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212816332.000000006D1E8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212938204.000000006D1FB000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212957971.000000006D202000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2212978463.000000006D203000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.2213008790.000000006D206000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6d090000_rundll32.jbxd
    Similarity
    • API ID: CriticalSection$EnterErrorLastLeaveValue
    • String ID:
    • API String ID: 682475483-0
    • Opcode ID: 2cecce9039be08b333e797f253616daef78af369d3019284e4d72ef21af54a78
    • Instruction ID: 648da44f8daf49d19592b1c139fe631c825b14d2a997d03a20e4abc1477935ab
    • Opcode Fuzzy Hash: 2cecce9039be08b333e797f253616daef78af369d3019284e4d72ef21af54a78
    • Instruction Fuzzy Hash: ECF081B59002168FCB00BF78D589A5BBB74BF56318B01052CDD4587309EB31E894CBE3

    Execution Graph

    Execution Coverage:0%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:0%
    Total number of Nodes:14
    Total number of Limit Nodes:1
    execution_graph 55772 6d1661f6 55773 6d166170 55772->55773 55774 6d166187 _beginthread 55773->55774 55775 6d1661a1 _errno 55774->55775 55776 6d1661d8 55774->55776 55777 6d1661e0 Sleep 55775->55777 55778 6d1661a8 _errno 55775->55778 55777->55774 55779 6d1661f4 55777->55779 55780 6d1661b9 55778->55780 55779->55778 55783 6d165e60 39 API calls 55780->55783 55782 6d1661cd abort 55782->55776 55783->55782 55784 6d13cfc0 55785 6d13cfd9 55784->55785 55786 6d13cfe8 WriteFile 55784->55786 55785->55786

    Control-flow Graph

    APIs
    Strings
    • runtime: failed to create new OS thread (%d), xrefs: 6D1661B9
    Memory Dump Source
    • Source File: 0000000D.00000002.2306237751.000000006D0D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D0D0000, based on PE: true
    • Associated: 0000000D.00000002.2306207495.000000006D0D0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306367024.000000006D16D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306394381.000000006D16E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306421468.000000006D16F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306451366.000000006D174000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306575386.000000006D21D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306692770.000000006D223000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306692770.000000006D228000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306742643.000000006D23B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306765691.000000006D242000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306862450.000000006D243000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306909258.000000006D246000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_6d0d0000_rundll32.jbxd
    Similarity
    • API ID: _errno$Sleep_beginthreadabort
    • String ID: runtime: failed to create new OS thread (%d)
    • API String ID: 3675047324-3231778263
    • Opcode ID: b4d6b54b2ed21a385bfeeba864446eb5fdf9002bd212b3f37c5e16bce05eacc1
    • Instruction ID: 884207954e5b8f95705a692fe1774288cc3b0547021670c9edbf0a8885091667
    • Opcode Fuzzy Hash: b4d6b54b2ed21a385bfeeba864446eb5fdf9002bd212b3f37c5e16bce05eacc1
    • Instruction Fuzzy Hash: 43017CB54083649FC700BF68D88862EBBF4FF85314F42485DE98943216C771A490DBA3

    Control-flow Graph

    APIs
    Strings
    • runtime: failed to create new OS thread (%d), xrefs: 6D1661B9
    Memory Dump Source
    • Source File: 0000000D.00000002.2306237751.000000006D0D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D0D0000, based on PE: true
    • Associated: 0000000D.00000002.2306207495.000000006D0D0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306367024.000000006D16D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306394381.000000006D16E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306421468.000000006D16F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306451366.000000006D174000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306575386.000000006D21D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306692770.000000006D223000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306692770.000000006D228000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306742643.000000006D23B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306765691.000000006D242000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306862450.000000006D243000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306909258.000000006D246000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_6d0d0000_rundll32.jbxd
    Similarity
    • API ID: _errno$Sleep_beginthreadabort
    • String ID: runtime: failed to create new OS thread (%d)
    • API String ID: 3675047324-3231778263
    • Opcode ID: 4a5b6c8ca54d74d0df4f0f4e943cbf3e83b13e02837cd23482a2c135bf1df30f
    • Instruction ID: af687e677f320c1543c84f9c198ed3d2fe3fb6178c611011a67a28cb37e664e4
    • Opcode Fuzzy Hash: 4a5b6c8ca54d74d0df4f0f4e943cbf3e83b13e02837cd23482a2c135bf1df30f
    • Instruction Fuzzy Hash: BD0181B54083649FC700AF64C88875ABBF4FF86355F42484CE58843212C770A450CBA2

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 21 6d13cfc0-6d13cfd7 22 6d13cfd9-6d13cfe6 21->22 23 6d13cfe8-6d13d000 WriteFile 21->23 22->23
    APIs
    Memory Dump Source
    • Source File: 0000000D.00000002.2306237751.000000006D0D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D0D0000, based on PE: true
    • Associated: 0000000D.00000002.2306207495.000000006D0D0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306367024.000000006D16D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306394381.000000006D16E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306421468.000000006D16F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306451366.000000006D174000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306575386.000000006D21D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306692770.000000006D223000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306692770.000000006D228000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306742643.000000006D23B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306765691.000000006D242000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306862450.000000006D243000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306909258.000000006D246000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_6d0d0000_rundll32.jbxd
    Similarity
    • API ID: FileWrite
    • String ID:
    • API String ID: 3934441357-0
    • Opcode ID: a2cfa61b4501b04a2c5f40c8367aff7a2baaadd22eedac0d36916a775c4c6aab
    • Instruction ID: 2e4f365649abfb779f7c8c0ba7e0cd91d305aa44d3558214610b25da9c58e564
    • Opcode Fuzzy Hash: a2cfa61b4501b04a2c5f40c8367aff7a2baaadd22eedac0d36916a775c4c6aab
    • Instruction Fuzzy Hash: C3E0E571505610CFCB15DF28C2C171ABBE1EB48A00F0485A8DE098F74AD774ED10CBD2

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1425 6d16b7c0-6d16b830 call 6d16c560 fwrite call 6d16c560 vfprintf abort 1431 6d16b836-6d16b83d 1425->1431 1432 6d16b940-6d16b942 1425->1432 1434 6d16b840-6d16b844 1431->1434 1433 6d16b85e-6d16b86a call 6d16c010 1432->1433 1440 6d16b967-6d16b991 call 6d16b7c0 1433->1440 1441 6d16b870-6d16b8b6 call 6d16c150 VirtualQuery 1433->1441 1435 6d16b846-6d16b84e 1434->1435 1436 6d16b854-6d16b85c 1434->1436 1435->1436 1438 6d16b8d7-6d16b8dd 1435->1438 1436->1433 1436->1434 1449 6d16b993-6d16b99a 1440->1449 1450 6d16b9a0-6d16b9e9 call 6d16c090 call 6d16c450 1440->1450 1447 6d16b947-6d16b95e 1441->1447 1448 6d16b8bc-6d16b8c6 1441->1448 1447->1440 1451 6d16b962 call 6d16b7c0 1447->1451 1452 6d16b8d0 1448->1452 1453 6d16b8c8-6d16b8ce 1448->1453 1450->1449 1462 6d16b9eb-6d16b9f4 1450->1462 1451->1440 1452->1438 1453->1452 1454 6d16b8e0-6d16b91e VirtualProtect 1453->1454 1454->1452 1456 6d16b920-6d16b93d GetLastError call 6d16b7c0 1454->1456 1456->1432 1463 6d16bab0-6d16bab2 1462->1463 1464 6d16b9fa 1462->1464 1466 6d16bc28 1463->1466 1467 6d16bab8-6d16baca 1463->1467 1465 6d16b9ff-6d16ba03 1464->1465 1468 6d16bc2d-6d16bc33 1465->1468 1469 6d16ba09 1465->1469 1466->1468 1467->1465 1470 6d16bad0-6d16bad5 1467->1470 1468->1449 1471 6d16bc39-6d16bc3c 1468->1471 1472 6d16ba0c-6d16ba0e 1469->1472 1470->1472 1473 6d16bc40-6d16bc65 call 6d16b820 1471->1473 1472->1468 1474 6d16ba14-6d16ba1a 1472->1474 1481 6d16bc67 1473->1481 1476 6d16ba20-6d16ba29 1474->1476 1477 6d16bc6f-6d16bc9f call 6d16b7c0 EnterCriticalSection 1474->1477 1476->1449 1479 6d16ba2f-6d16ba32 1476->1479 1486 6d16bcd5-6d16bcec LeaveCriticalSection 1477->1486 1487 6d16bca1-6d16bcad 1477->1487 1482 6d16ba38-6d16ba5e 1479->1482 1481->1477 1484 6d16ba64-6d16ba67 1482->1484 1485 6d16bb00-6d16bb10 1482->1485 1490 6d16bae0-6d16bae3 1484->1490 1491 6d16ba69-6d16ba7c 1484->1491 1488 6d16bb17-6d16bb20 1485->1488 1489 6d16bb12 1485->1489 1492 6d16bcb0-6d16bcc0 TlsGetValue GetLastError 1487->1492 1495 6d16bb22-6d16bb28 1488->1495 1496 6d16bb3a-6d16bb42 call 6d16b820 1488->1496 1489->1488 1493 6d16bbc0-6d16bbcf 1490->1493 1494 6d16bae9-6d16baf9 call 6d16b7c0 1490->1494 1497 6d16ba82-6d16ba84 1491->1497 1498 6d16bc10-6d16bc1e call 6d16b820 1491->1498 1499 6d16bcc2-6d16bcc4 1492->1499 1500 6d16bcce-6d16bcd3 1492->1500 1502 6d16bbd6-6d16bbdf 1493->1502 1503 6d16bbd1 1493->1503 1494->1485 1504 6d16bb2e-6d16bb34 1495->1504 1505 6d16ba8a-6d16baac call 6d16b7c0 1495->1505 1518 6d16bb49-6d16bb52 1496->1518 1497->1498 1497->1505 1498->1518 1499->1500 1508 6d16bcc6-6d16bcc9 1499->1508 1500->1486 1500->1492 1510 6d16bbf6-6d16bc06 call 6d16b820 1502->1510 1511 6d16bbe1-6d16bbe7 1502->1511 1503->1502 1504->1496 1504->1505 1505->1463 1508->1500 1510->1518 1511->1505 1515 6d16bbed-6d16bbf0 1511->1515 1515->1505 1515->1510 1518->1482 1520 6d16bb58-6d16bb63 1518->1520 1520->1449 1521 6d16bb69-6d16bb72 1520->1521 1522 6d16bb78-6d16bb88 1521->1522 1523 6d16bba4-6d16bbad 1522->1523 1524 6d16bb8a-6d16bba1 VirtualProtect 1522->1524 1523->1522 1525 6d16bbaf-6d16bbb6 1523->1525 1524->1523
    APIs
    Strings
    • VirtualQuery failed for %d bytes at address %p, xrefs: 6D16B957
    • Mingw-w64 runtime failure:, xrefs: 6D16B7E8
    • VirtualProtect failed with code 0x%x, xrefs: 6D16B926
    • Address %p has no image-section, xrefs: 6D16B96B
    Memory Dump Source
    • Source File: 0000000D.00000002.2306237751.000000006D0D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D0D0000, based on PE: true
    • Associated: 0000000D.00000002.2306207495.000000006D0D0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306367024.000000006D16D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306394381.000000006D16E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306421468.000000006D16F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306451366.000000006D174000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306575386.000000006D21D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306692770.000000006D223000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306692770.000000006D228000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306742643.000000006D23B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306765691.000000006D242000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306862450.000000006D243000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306909258.000000006D246000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_6d0d0000_rundll32.jbxd
    Similarity
    • API ID: QueryVirtualabortfwritevfprintf
    • String ID: VirtualProtect failed with code 0x%x$ VirtualQuery failed for %d bytes at address %p$Address %p has no image-section$Mingw-w64 runtime failure:
    • API String ID: 2513968241-1534286854
    • Opcode ID: 5a58bce057ced17e24957edee98d050f49b683750da538c1c891f71cd97a37ad
    • Instruction ID: d98de6657574f5259e006be59eb26a450e83f45a025ee6725074746e547b611c
    • Opcode Fuzzy Hash: 5a58bce057ced17e24957edee98d050f49b683750da538c1c891f71cd97a37ad
    • Instruction Fuzzy Hash: 17516EB19083459FCB00EF28C98865AFBF5FF84358F45C91DE9888B258D774D4A5CBA2
    APIs
    Strings
    Memory Dump Source
    • Source File: 0000000D.00000002.2306237751.000000006D0D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D0D0000, based on PE: true
    • Associated: 0000000D.00000002.2306207495.000000006D0D0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306367024.000000006D16D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306394381.000000006D16E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306421468.000000006D16F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306451366.000000006D174000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306575386.000000006D21D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306692770.000000006D223000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306692770.000000006D228000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306742643.000000006D23B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306765691.000000006D242000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306862450.000000006D243000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306909258.000000006D246000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_6d0d0000_rundll32.jbxd
    Similarity
    • API ID: ErrorLast_wcsnicmpfreelstrlenmallocmbstowcsstrlenstrtol
    • String ID: #
    • API String ID: 533997002-1885708031
    • Opcode ID: 5f47c7f06fd7964f20bc687c82be474ac9878c29c9d5fd7710825a15485c0a76
    • Instruction ID: 1070b37b2faa09f1c51c42fa19ae6d56d1ae5e8a4f64b3ad74620477962c9a7b
    • Opcode Fuzzy Hash: 5f47c7f06fd7964f20bc687c82be474ac9878c29c9d5fd7710825a15485c0a76
    • Instruction Fuzzy Hash: 3451A971A0C3558FC710DF29D09069AB7E5FFD8304F01892EE998D3244E7B4E955CBA2
    APIs
    Strings
    • unexpected cgo_bindm on Windows, xrefs: 6D166070
    • runtime: failed to signal runtime initialization complete., xrefs: 6D1660E8
    Memory Dump Source
    • Source File: 0000000D.00000002.2306237751.000000006D0D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D0D0000, based on PE: true
    • Associated: 0000000D.00000002.2306207495.000000006D0D0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306367024.000000006D16D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306394381.000000006D16E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306421468.000000006D16F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306451366.000000006D174000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306575386.000000006D21D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306692770.000000006D223000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306692770.000000006D228000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306742643.000000006D23B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306765691.000000006D242000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306862450.000000006D243000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306909258.000000006D246000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_6d0d0000_rundll32.jbxd
    Similarity
    • API ID: CriticalSection$EnterLeaveabort$Event
    • String ID: runtime: failed to signal runtime initialization complete.$unexpected cgo_bindm on Windows
    • API String ID: 123483900-760755518
    • Opcode ID: 685da469430bb571d527567790d786c9172c3e615fe794ca5e80e9ad37f59bf0
    • Instruction ID: 9c4413d5a1381d84d3bf504ffa220af28bd2f8fec4e2c3e25c2e7cdeeb96df4f
    • Opcode Fuzzy Hash: 685da469430bb571d527567790d786c9172c3e615fe794ca5e80e9ad37f59bf0
    • Instruction Fuzzy Hash: 7811B9B18486548FDB01BFB8D10E36EBEF0BB42308F82495CD98557605EB74A5A9CB63
    Strings
    • Unknown pseudo relocation bit size %d., xrefs: 6D16BAED
    • %d bit pseudo relocation at %p out of range, targeting %p, yielding the value %p., xrefs: 6D16BAA0
    • Unknown pseudo relocation protocol version %d., xrefs: 6D16BC73
    Memory Dump Source
    • Source File: 0000000D.00000002.2306237751.000000006D0D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D0D0000, based on PE: true
    • Associated: 0000000D.00000002.2306207495.000000006D0D0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306367024.000000006D16D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306394381.000000006D16E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306421468.000000006D16F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306451366.000000006D174000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306575386.000000006D21D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306692770.000000006D223000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306692770.000000006D228000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306742643.000000006D23B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306765691.000000006D242000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306862450.000000006D243000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306909258.000000006D246000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_6d0d0000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID: Unknown pseudo relocation bit size %d.$ Unknown pseudo relocation protocol version %d.$%d bit pseudo relocation at %p out of range, targeting %p, yielding the value %p.
    • API String ID: 0-1286557213
    • Opcode ID: 7f1ea414dffc40a194e41361e310f74fdd9be728a2606fe67e4bad2b16ed24dd
    • Instruction ID: 865b7970ea598bcdb54450f5372e577f59444c0b09140c90a42b94852add7891
    • Opcode Fuzzy Hash: 7f1ea414dffc40a194e41361e310f74fdd9be728a2606fe67e4bad2b16ed24dd
    • Instruction Fuzzy Hash: 2491A1B1D0825A9FCB00DF69DA807AEB7F4FF45304F05C529E958A724CD770A865CBA2
    APIs
    Strings
    Memory Dump Source
    • Source File: 0000000D.00000002.2306237751.000000006D0D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D0D0000, based on PE: true
    • Associated: 0000000D.00000002.2306207495.000000006D0D0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306367024.000000006D16D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306394381.000000006D16E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306421468.000000006D16F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306451366.000000006D174000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306575386.000000006D21D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306692770.000000006D223000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306692770.000000006D228000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306742643.000000006D23B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306765691.000000006D242000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306862450.000000006D243000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306909258.000000006D246000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_6d0d0000_rundll32.jbxd
    Similarity
    • API ID: Heap$AllocInfoNativeProcessReadSystemmemcpymemsetrealloc
    • String ID: @
    • API String ID: 3801555102-2766056989
    • Opcode ID: 71ca957877dea6ab127660e7f77f093436a67800e07dfe28dbce24cb9c75c6e1
    • Instruction ID: 1ebcb78700c565d2a5b3c14d39ecac184640b2a103d678930efa7cd06efd078c
    • Opcode Fuzzy Hash: 71ca957877dea6ab127660e7f77f093436a67800e07dfe28dbce24cb9c75c6e1
    • Instruction Fuzzy Hash: 1AA1EEB0A087429FD710CF29C58476AFBE0BF88318F45892DE89897701E7B4E955CF92
    APIs
    Strings
    Memory Dump Source
    • Source File: 0000000D.00000002.2306237751.000000006D0D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D0D0000, based on PE: true
    • Associated: 0000000D.00000002.2306207495.000000006D0D0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306367024.000000006D16D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306394381.000000006D16E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306421468.000000006D16F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306451366.000000006D174000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306575386.000000006D21D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306692770.000000006D223000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306692770.000000006D228000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306742643.000000006D23B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306765691.000000006D242000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306862450.000000006D243000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306909258.000000006D246000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_6d0d0000_rundll32.jbxd
    Similarity
    • API ID: memset
    • String ID: 0$o
    • API String ID: 2221118986-4157579757
    • Opcode ID: ebefbe6945bd7e9b28a0da70524577bbcc1c22ea509cf173d45d016b6e072430
    • Instruction ID: 716c7998374537bcbcbd1f489952195b35026346977966950bf79b8dc8fa1b02
    • Opcode Fuzzy Hash: ebefbe6945bd7e9b28a0da70524577bbcc1c22ea509cf173d45d016b6e072430
    • Instruction Fuzzy Hash: BCF1A471A04689CFCB01CF68C48069DBBF2BF89360F15C269D994AB349D774E955CBE0
    APIs
    Strings
    Memory Dump Source
    • Source File: 0000000D.00000002.2306237751.000000006D0D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D0D0000, based on PE: true
    • Associated: 0000000D.00000002.2306207495.000000006D0D0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306367024.000000006D16D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306394381.000000006D16E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306421468.000000006D16F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306451366.000000006D174000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306575386.000000006D21D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306692770.000000006D223000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306692770.000000006D228000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306742643.000000006D23B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306765691.000000006D242000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306862450.000000006D243000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306909258.000000006D246000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_6d0d0000_rundll32.jbxd
    Similarity
    • API ID: AddressProc$HandleLibraryLoadModule
    • String ID: __deregister_frame_info$__register_frame_info$libgcc_s_dw2-1.dll
    • API String ID: 384173800-1835852900
    • Opcode ID: abbaed3dc6efb5349fe48090748d15a23779224c6ba645007895aaec43cd1085
    • Instruction ID: 72127d893e1f2b4f1f4a21abe27c3daa7400eaa85e91e70d4d945998bac03d77
    • Opcode Fuzzy Hash: abbaed3dc6efb5349fe48090748d15a23779224c6ba645007895aaec43cd1085
    • Instruction Fuzzy Hash: 510171B19093049BD750BFB8E90D35EBFF4BB46254F02842ED98457208DB708844CBA3
    APIs
    Strings
    Memory Dump Source
    • Source File: 0000000D.00000002.2306237751.000000006D0D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D0D0000, based on PE: true
    • Associated: 0000000D.00000002.2306207495.000000006D0D0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306367024.000000006D16D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306394381.000000006D16E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306421468.000000006D16F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306451366.000000006D174000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306575386.000000006D21D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306692770.000000006D223000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306692770.000000006D228000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306742643.000000006D23B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306765691.000000006D242000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306862450.000000006D243000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306909258.000000006D246000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_6d0d0000_rundll32.jbxd
    Similarity
    • API ID: _errno
    • String ID: @$Inf$NaN
    • API String ID: 2918714741-141429178
    • Opcode ID: f4a57c7b05efce2915c9aabd71b47c9fbe6221af7144101e0da0eb4dc891ddce
    • Instruction ID: ac6e5af2eacd414c2dc7c74f26f5bf75a23fd30682470a7324c9f79d8511ca36
    • Opcode Fuzzy Hash: f4a57c7b05efce2915c9aabd71b47c9fbe6221af7144101e0da0eb4dc891ddce
    • Instruction Fuzzy Hash: CAF1E47160C3C28BD7218F24C49079BBBE1BB86314F058A2DD9DC573C9D7B59916CBA2
    Strings
    Memory Dump Source
    • Source File: 0000000D.00000002.2306237751.000000006D0D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D0D0000, based on PE: true
    • Associated: 0000000D.00000002.2306207495.000000006D0D0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306367024.000000006D16D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306394381.000000006D16E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306421468.000000006D16F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306451366.000000006D174000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306575386.000000006D21D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306692770.000000006D223000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306692770.000000006D228000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306742643.000000006D23B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306765691.000000006D242000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306862450.000000006D243000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306909258.000000006D246000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_6d0d0000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID: 0$@
    • API String ID: 0-1545510068
    • Opcode ID: db53b3412e21b14b64fd966cdfaba44a868fe3b057c10bed8708d4ee68713ec0
    • Instruction ID: 09796424e15bcf35ad8fc7f8d1af5a9aac191cbcdabd16aea774d3c5720ddac4
    • Opcode Fuzzy Hash: db53b3412e21b14b64fd966cdfaba44a868fe3b057c10bed8708d4ee68713ec0
    • Instruction Fuzzy Hash: 2AC18E71E1425A8BDB05CF6CC88079DBBF1BF89314F15825AEC54AB389D3B5E851CBA0
    APIs
    Strings
    Memory Dump Source
    • Source File: 0000000D.00000002.2306237751.000000006D0D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D0D0000, based on PE: true
    • Associated: 0000000D.00000002.2306207495.000000006D0D0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306367024.000000006D16D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306394381.000000006D16E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306421468.000000006D16F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306451366.000000006D174000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306575386.000000006D21D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306692770.000000006D223000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306692770.000000006D228000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306742643.000000006D23B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306765691.000000006D242000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306862450.000000006D243000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306909258.000000006D246000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_6d0d0000_rundll32.jbxd
    Similarity
    • API ID: AddressProc$HandleModule
    • String ID: ___lc_codepage_func$__lc_codepage$msvcrt.dll
    • API String ID: 667068680-1145701848
    • Opcode ID: 8f5341073f1946c80f8d689a4e16a08e5131b730df3682415e233f8787ba498f
    • Instruction ID: efeaf9c3a39442909fbfb474e2a4b76c588feda5c2695f4661f90abe1e45f780
    • Opcode Fuzzy Hash: 8f5341073f1946c80f8d689a4e16a08e5131b730df3682415e233f8787ba498f
    • Instruction Fuzzy Hash: 00F04FF19892559BDF00BF3D9D0925ABEF4BA05251F01453AE845DB208E7B1D464CBF3
    APIs
    • Sleep.KERNEL32(?,?,?,6D0D1281,?,?,?,?,?,?,6D0D13AE), ref: 6D0D1057
    • _amsg_exit.MSVCRT ref: 6D0D1086
    Memory Dump Source
    • Source File: 0000000D.00000002.2306237751.000000006D0D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D0D0000, based on PE: true
    • Associated: 0000000D.00000002.2306207495.000000006D0D0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306367024.000000006D16D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306394381.000000006D16E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306421468.000000006D16F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306451366.000000006D174000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306575386.000000006D21D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306692770.000000006D223000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306692770.000000006D228000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306742643.000000006D23B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306765691.000000006D242000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306862450.000000006D243000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306909258.000000006D246000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_6d0d0000_rundll32.jbxd
    Similarity
    • API ID: Sleep_amsg_exit
    • String ID:
    • API String ID: 1015461914-0
    • Opcode ID: 57116afab4b58d324b5d55b63b4289424bec77508f3f77734647ef8ad48dc410
    • Instruction ID: cdc53e00145ca3c6f0682dc8fe1cc6a8d280190deaec5eda139fc067f482ad9b
    • Opcode Fuzzy Hash: 57116afab4b58d324b5d55b63b4289424bec77508f3f77734647ef8ad48dc410
    • Instruction Fuzzy Hash: F43150B0648342CBEB41BF68C58931B7BF5EB86748F41842AD9548B204DBB6D4D1CB93
    APIs
    Strings
    Memory Dump Source
    • Source File: 0000000D.00000002.2306237751.000000006D0D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D0D0000, based on PE: true
    • Associated: 0000000D.00000002.2306207495.000000006D0D0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306367024.000000006D16D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306394381.000000006D16E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306421468.000000006D16F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306451366.000000006D174000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306575386.000000006D21D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306692770.000000006D223000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306692770.000000006D228000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306742643.000000006D23B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306765691.000000006D242000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306862450.000000006D243000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306909258.000000006D246000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_6d0d0000_rundll32.jbxd
    Similarity
    • API ID: fputc$memset
    • String ID: 0$o
    • API String ID: 2944404495-4157579757
    • Opcode ID: 554f7f9faea69a16024aefb5dd32d29328ec9af7303e668e9847430315f7532b
    • Instruction ID: 5862f3765f2e813e7a75c8033ea2ead77e2bb4c7b5d06e1fddabadc80bbed959
    • Opcode Fuzzy Hash: 554f7f9faea69a16024aefb5dd32d29328ec9af7303e668e9847430315f7532b
    • Instruction Fuzzy Hash: 4F316D71A08389CFCB00CF69C19479ABBF1BF49354F0585A9D995AB349D7B4E810CBA0
    APIs
    • bsearch.MSVCRT ref: 6D164ECF
    • SetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,?,?,?,6D165DAF), ref: 6D164F0F
    • malloc.MSVCRT ref: 6D164F44
    • qsort.MSVCRT ref: 6D164FB4
    Memory Dump Source
    • Source File: 0000000D.00000002.2306237751.000000006D0D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D0D0000, based on PE: true
    • Associated: 0000000D.00000002.2306207495.000000006D0D0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306367024.000000006D16D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306394381.000000006D16E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306421468.000000006D16F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306451366.000000006D174000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306575386.000000006D21D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306692770.000000006D223000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306692770.000000006D228000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306742643.000000006D23B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306765691.000000006D242000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306862450.000000006D243000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306909258.000000006D246000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_6d0d0000_rundll32.jbxd
    Similarity
    • API ID: ErrorLastbsearchmallocqsort
    • String ID:
    • API String ID: 1451747280-0
    • Opcode ID: 14f644bb386251c29df3357f2a0d954a5cf63e89b649388142d06d5ce80b4f58
    • Instruction ID: d6fb1490b872bd90b824915253df02350efbec141fb6d6f42fb9cd130efb8cfd
    • Opcode Fuzzy Hash: 14f644bb386251c29df3357f2a0d954a5cf63e89b649388142d06d5ce80b4f58
    • Instruction Fuzzy Hash: FC419A716083418FD300CF2DD49062ABBF1FF89304F06896DE8889B354E7B5E865CBA2
    APIs
    Memory Dump Source
    • Source File: 0000000D.00000002.2306237751.000000006D0D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D0D0000, based on PE: true
    • Associated: 0000000D.00000002.2306207495.000000006D0D0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306367024.000000006D16D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306394381.000000006D16E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306421468.000000006D16F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306451366.000000006D174000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306575386.000000006D21D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306692770.000000006D223000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306692770.000000006D228000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306742643.000000006D23B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306765691.000000006D242000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306862450.000000006D243000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306909258.000000006D246000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_6d0d0000_rundll32.jbxd
    Similarity
    • API ID: ErrorLastLocaleThread
    • String ID:
    • API String ID: 1348403374-0
    • Opcode ID: 976f2338b3617b8525f5b8f3a1d11c26b7852b9f0fa4a6ab6633cdc64d5578bf
    • Instruction ID: 7e82eea3f1ac82f03a153e27f319ea477cae5ced282191fc428066afa67d2bd0
    • Opcode Fuzzy Hash: 976f2338b3617b8525f5b8f3a1d11c26b7852b9f0fa4a6ab6633cdc64d5578bf
    • Instruction Fuzzy Hash: F12198716182018BE700EB39D884667B7F5BF85315F098628E999C73C5DB74E864CBA1
    APIs
    Memory Dump Source
    • Source File: 0000000D.00000002.2306237751.000000006D0D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D0D0000, based on PE: true
    • Associated: 0000000D.00000002.2306207495.000000006D0D0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306367024.000000006D16D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306394381.000000006D16E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306421468.000000006D16F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306451366.000000006D174000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306575386.000000006D21D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306692770.000000006D223000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306692770.000000006D228000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306742643.000000006D23B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306765691.000000006D242000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306862450.000000006D243000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306909258.000000006D246000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_6d0d0000_rundll32.jbxd
    Similarity
    • API ID: _lock_unlockcalloc
    • String ID:
    • API String ID: 3876498383-0
    • Opcode ID: 01cfb712d85b6e4d619ce68922cd4ea2a4d205ce6739300ed457df455a6d115e
    • Instruction ID: eef192b6136833fc69c2f2ef5a8a3e277afd84fb08bb2d6b4a209c21e908c9c2
    • Opcode Fuzzy Hash: 01cfb712d85b6e4d619ce68922cd4ea2a4d205ce6739300ed457df455a6d115e
    • Instruction Fuzzy Hash: F4114C716082918FDB509F28C48075ABFE5BF89310F06C569D998CF249EBB4C850CBB2
    APIs
    • WaitForSingleObject.KERNEL32 ref: 6D165FF0
    • EnterCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,6D1646F9), ref: 6D165FFC
    • LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,6D1646F9), ref: 6D16600E
    • EnterCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,6D1646F9), ref: 6D16601E
    • LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,6D1646F9), ref: 6D166030
    Memory Dump Source
    • Source File: 0000000D.00000002.2306237751.000000006D0D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D0D0000, based on PE: true
    • Associated: 0000000D.00000002.2306207495.000000006D0D0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306367024.000000006D16D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306394381.000000006D16E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306421468.000000006D16F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306451366.000000006D174000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306575386.000000006D21D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306692770.000000006D223000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306692770.000000006D228000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306742643.000000006D23B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306765691.000000006D242000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306862450.000000006D243000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306909258.000000006D246000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_6d0d0000_rundll32.jbxd
    Similarity
    • API ID: CriticalSection$EnterLeave$ObjectSingleWait
    • String ID:
    • API String ID: 1755037574-0
    • Opcode ID: e3e14f08fe14027ff96663a5cbfd023c7491335b66f115f80991947fbe9afa13
    • Instruction ID: 521bc9e2230bd222e5036c7403cffbf37d6b4eaa4e9c1d9f141ad30b43df8a2b
    • Opcode Fuzzy Hash: e3e14f08fe14027ff96663a5cbfd023c7491335b66f115f80991947fbe9afa13
    • Instruction Fuzzy Hash: CF019270544745CBDB00BF7DC58A61BFFB4AF82218F014629DC8443645E770A4A8CBA3
    APIs
    • malloc.MSVCRT ref: 6D16625F
    • abort.MSVCRT ref: 6D1662A2
    • free.MSVCRT ref: 6D1662C5
      • Part of subcall function 6D166170: _beginthread.MSVCRT ref: 6D166196
      • Part of subcall function 6D166170: _errno.MSVCRT ref: 6D1661A1
      • Part of subcall function 6D166170: _errno.MSVCRT ref: 6D1661A8
      • Part of subcall function 6D166170: abort.MSVCRT ref: 6D1661CD
    Strings
    • runtime/cgo: out of memory in thread_start, xrefs: 6D166292
    Memory Dump Source
    • Source File: 0000000D.00000002.2306237751.000000006D0D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D0D0000, based on PE: true
    • Associated: 0000000D.00000002.2306207495.000000006D0D0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306367024.000000006D16D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306394381.000000006D16E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306421468.000000006D16F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306451366.000000006D174000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306575386.000000006D21D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306692770.000000006D223000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306692770.000000006D228000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306742643.000000006D23B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306765691.000000006D242000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306862450.000000006D243000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306909258.000000006D246000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_6d0d0000_rundll32.jbxd
    Similarity
    • API ID: _errnoabort$_beginthreadfreemalloc
    • String ID: runtime/cgo: out of memory in thread_start
    • API String ID: 2078976911-3894583329
    • Opcode ID: 2d56005f4cd9a6fc2366fe4d5994039d2cf6281098303b901cdb248aaf12b0ae
    • Instruction ID: d35c6e8739b41608bca8d5f3bf57dcdf954ca2a5ecdab4d2affdad41f7ea8c38
    • Opcode Fuzzy Hash: 2d56005f4cd9a6fc2366fe4d5994039d2cf6281098303b901cdb248aaf12b0ae
    • Instruction Fuzzy Hash: FB211DB59087448FCB00EF28D58491AFBF4FF89304F46899DE9885B325D374A851CBE2
    APIs
    Strings
    Memory Dump Source
    • Source File: 0000000D.00000002.2306237751.000000006D0D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D0D0000, based on PE: true
    • Associated: 0000000D.00000002.2306207495.000000006D0D0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306367024.000000006D16D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306394381.000000006D16E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306421468.000000006D16F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306451366.000000006D174000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306575386.000000006D21D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306692770.000000006D223000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306692770.000000006D228000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306742643.000000006D23B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306765691.000000006D242000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306862450.000000006D243000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306909258.000000006D246000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_6d0d0000_rundll32.jbxd
    Similarity
    • API ID: ErrorFormatFreeLastLocalMessage
    • String ID: Erro: %s
    • API String ID: 1365068426-2412703935
    • Opcode ID: 5cddfcaa569b4aba81c01c55072f3f362e848811dda62cf7c98ab8c313b4886c
    • Instruction ID: b5efff4a04ba46124efd617762731ff107ff83af4d5d6d50169ea3492c2aaabb
    • Opcode Fuzzy Hash: 5cddfcaa569b4aba81c01c55072f3f362e848811dda62cf7c98ab8c313b4886c
    • Instruction Fuzzy Hash: 5A018CB04083019FE700AF64C58931ABBF0BB88349F40891DE9989A255D7B88598CF93
    APIs
    • CreateEventA.KERNEL32 ref: 6D165EB2
    • InitializeCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,6D165F65), ref: 6D165ECB
    • abort.MSVCRT ref: 6D165EF5
    Strings
    • runtime: failed to create runtime initialization wait event., xrefs: 6D165EE5
    Memory Dump Source
    • Source File: 0000000D.00000002.2306237751.000000006D0D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D0D0000, based on PE: true
    • Associated: 0000000D.00000002.2306207495.000000006D0D0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306367024.000000006D16D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306394381.000000006D16E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306421468.000000006D16F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306451366.000000006D174000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306575386.000000006D21D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306692770.000000006D223000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306692770.000000006D228000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306742643.000000006D23B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306765691.000000006D242000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306862450.000000006D243000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306909258.000000006D246000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_6d0d0000_rundll32.jbxd
    Similarity
    • API ID: CreateCriticalEventInitializeSectionabort
    • String ID: runtime: failed to create runtime initialization wait event.
    • API String ID: 3843693739-3277801083
    • Opcode ID: d7e6078e17f4dc02cbf9c793e6ad760ce3b170bf15b3347d3e31d307544895c8
    • Instruction ID: 0a59dfa614c33a9140dc8b040c7ddc3534dc6d706c38318b2849973c0fb6cccc
    • Opcode Fuzzy Hash: d7e6078e17f4dc02cbf9c793e6ad760ce3b170bf15b3347d3e31d307544895c8
    • Instruction Fuzzy Hash: E6F01DB14487118BEB00BF78C51D36EBEF0BB41304F81895CD89986245EBB980A4CB63
    APIs
    • IsDBCSLeadByteEx.KERNEL32 ref: 6D16C942
    • MultiByteToWideChar.KERNEL32 ref: 6D16C985
    Memory Dump Source
    • Source File: 0000000D.00000002.2306237751.000000006D0D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D0D0000, based on PE: true
    • Associated: 0000000D.00000002.2306207495.000000006D0D0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306367024.000000006D16D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306394381.000000006D16E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306421468.000000006D16F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306451366.000000006D174000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306575386.000000006D21D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306692770.000000006D223000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306692770.000000006D228000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306742643.000000006D23B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306765691.000000006D242000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306862450.000000006D243000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306909258.000000006D246000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_6d0d0000_rundll32.jbxd
    Similarity
    • API ID: Byte$CharLeadMultiWide
    • String ID:
    • API String ID: 2561704868-0
    • Opcode ID: 2307138fbe116b323e3cd9626363cf89d320e265f9545b4f5629194c484e2f6f
    • Instruction ID: 90d4547dff6952e64525341d645c934f6f5a6725d4f9e1f4d4bfa4149ecc8037
    • Opcode Fuzzy Hash: 2307138fbe116b323e3cd9626363cf89d320e265f9545b4f5629194c484e2f6f
    • Instruction Fuzzy Hash: 7931D3B15093928FDB00DF29D48435ABBF1BF96314F00891EE89487258E7B6D958CB62
    APIs
    Strings
    Memory Dump Source
    • Source File: 0000000D.00000002.2306237751.000000006D0D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D0D0000, based on PE: true
    • Associated: 0000000D.00000002.2306207495.000000006D0D0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306367024.000000006D16D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306394381.000000006D16E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306421468.000000006D16F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306451366.000000006D174000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306575386.000000006D21D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306692770.000000006D223000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306692770.000000006D228000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306742643.000000006D23B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306765691.000000006D242000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306862450.000000006D243000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306909258.000000006D246000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_6d0d0000_rundll32.jbxd
    Similarity
    • API ID: fputc
    • String ID: NaN
    • API String ID: 1992160199-1757892521
    • Opcode ID: cf7614440ec6851ca82ea40031330610d20ebf86e678fa2553d9f1a1c36698a7
    • Instruction ID: 1446e51d677f0a63e7825684db47d01d7c600bcca1297f726f924f5b8338f3a1
    • Opcode Fuzzy Hash: cf7614440ec6851ca82ea40031330610d20ebf86e678fa2553d9f1a1c36698a7
    • Instruction Fuzzy Hash: ED4118B5A052998BCB10CF18C484756B7E1BF95704F26C2A9DD488F34ED3B6D852CBE0
    APIs
    Strings
    Memory Dump Source
    • Source File: 0000000D.00000002.2306237751.000000006D0D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D0D0000, based on PE: true
    • Associated: 0000000D.00000002.2306207495.000000006D0D0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306367024.000000006D16D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306394381.000000006D16E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306421468.000000006D16F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306451366.000000006D174000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306575386.000000006D21D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306692770.000000006D223000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306692770.000000006D228000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306742643.000000006D23B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306765691.000000006D242000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306862450.000000006D243000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306909258.000000006D246000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_6d0d0000_rundll32.jbxd
    Similarity
    • API ID: fputc$memset
    • String ID: o
    • API String ID: 2944404495-252678980
    • Opcode ID: 5083fe0debd9753e9b233b695f135e5a28ad9768abfd24fc6a55f8e7a69b9823
    • Instruction ID: b82dadcb3b97a7d4b47496fba0a1a45efbccd4e0facdb23a9b8d094717c3fd33
    • Opcode Fuzzy Hash: 5083fe0debd9753e9b233b695f135e5a28ad9768abfd24fc6a55f8e7a69b9823
    • Instruction Fuzzy Hash: 46318471A08789CFC701CF68C190799BBF1BF48350F068699D989AB309E7B4E950CBE0
    APIs
    Strings
    Memory Dump Source
    • Source File: 0000000D.00000002.2306237751.000000006D0D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D0D0000, based on PE: true
    • Associated: 0000000D.00000002.2306207495.000000006D0D0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306367024.000000006D16D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306394381.000000006D16E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306421468.000000006D16F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306451366.000000006D174000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306575386.000000006D21D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306692770.000000006D223000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306692770.000000006D228000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306742643.000000006D23B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306765691.000000006D242000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306862450.000000006D243000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306909258.000000006D246000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_6d0d0000_rundll32.jbxd
    Similarity
    • API ID: fputc
    • String ID: @
    • API String ID: 1992160199-2766056989
    • Opcode ID: ababd3f75690fbcba9bc1f60d79812ee9903b967bac2f6abc848a8bcbfc8c842
    • Instruction ID: c64b2e02a536cefea7c1e8600dce969d495a33643ea444ae3ae8823198144950
    • Opcode Fuzzy Hash: ababd3f75690fbcba9bc1f60d79812ee9903b967bac2f6abc848a8bcbfc8c842
    • Instruction Fuzzy Hash: 42113DB1D18281CBCB01CFA8C1807557BB1BF96300F26865ADD985FA4ED3B5E811CB71
    APIs
    Memory Dump Source
    • Source File: 0000000D.00000002.2306237751.000000006D0D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D0D0000, based on PE: true
    • Associated: 0000000D.00000002.2306207495.000000006D0D0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306367024.000000006D16D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306394381.000000006D16E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306421468.000000006D16F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306451366.000000006D174000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306575386.000000006D21D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306692770.000000006D223000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306692770.000000006D228000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306742643.000000006D23B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306765691.000000006D242000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306862450.000000006D243000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306909258.000000006D246000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_6d0d0000_rundll32.jbxd
    Similarity
    • API ID: Heapfree$FreeProcess
    • String ID:
    • API String ID: 3425746932-0
    • Opcode ID: cad3d01592544eb18103612991c7784c7c8dd34eae3edf6f8514a8e8ba44fad8
    • Instruction ID: 62e2ff19f6f8e8a6524990acb1490950ba010063ae3c7cab6f46f2500dea31b5
    • Opcode Fuzzy Hash: cad3d01592544eb18103612991c7784c7c8dd34eae3edf6f8514a8e8ba44fad8
    • Instruction Fuzzy Hash: A821E5B06093418BEB00AF64C4D872ABBF0BF94304F55C96DD8898B20ED775D895CBA1
    APIs
    • Sleep.KERNEL32(?,?,?,?,6D16A971,?,?,?,?,?,?,00000000,6D168C14), ref: 6D16A877
    • InitializeCriticalSection.KERNEL32(?,?,?,?,6D16A971,?,?,?,?,?,?,00000000,6D168C14), ref: 6D16A8B4
    • InitializeCriticalSection.KERNEL32(?,?,?,?,?,6D16A971,?,?,?,?,?,?,00000000,6D168C14), ref: 6D16A8C0
    • EnterCriticalSection.KERNEL32(?,?,?,?,6D16A971,?,?,?,?,?,?,00000000,6D168C14), ref: 6D16A8E8
    Memory Dump Source
    • Source File: 0000000D.00000002.2306237751.000000006D0D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D0D0000, based on PE: true
    • Associated: 0000000D.00000002.2306207495.000000006D0D0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306367024.000000006D16D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306394381.000000006D16E000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306421468.000000006D16F000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306451366.000000006D174000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306575386.000000006D21D000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306692770.000000006D223000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306692770.000000006D228000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306742643.000000006D23B000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306765691.000000006D242000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306862450.000000006D243000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 0000000D.00000002.2306909258.000000006D246000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_6d0d0000_rundll32.jbxd
    Similarity
    • API ID: CriticalSection$Initialize$EnterSleep
    • String ID:
    • API String ID: 1117354567-0
    • Opcode ID: 100279e3b1bc34d673b8c862b15188e0576dd62c71db8c7727f6a085a6fc089b
    • Instruction ID: f38f5ce49fe611577765c475f8a4280b6937744cda9b6b4c2d72b9cfb63bbe99
    • Opcode Fuzzy Hash: 100279e3b1bc34d673b8c862b15188e0576dd62c71db8c7727f6a085a6fc089b
    • Instruction Fuzzy Hash: B4118EB19441658ADB02BB28D48AB6A77F8AB56354F120425CC52CB209E772D8F5C7A3