Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
mwxZCB2H4p.exe

Overview

General Information

Sample name:mwxZCB2H4p.exe
renamed because original name is a hash value
Original sample name:0--caa9e43f3ef3c754ca7097afdc8e58b7ec5a7ad5.exe
Analysis ID:1546795
MD5:4177c8eec4bc090b5d40d78cb9b2997c
SHA1:caa9e43f3ef3c754ca7097afdc8e58b7ec5a7ad5
SHA256:23d262493fcf4d1c896754ba8748ca6b1186db3f17304bcfa28b0b737917f771
Tags:exeReversingLabsuser-NDA0E
Infos:

Detection

Score:52
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Machine Learning detection for sample
Found evasive API chain checking for process token information
Found large amount of non-executed APIs
PE file contains an invalid checksum
PE file contains sections with non-standard names
Program does not show much activity (idle)
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • mwxZCB2H4p.exe (PID: 5416 cmdline: "C:\Users\user\Desktop\mwxZCB2H4p.exe" MD5: 4177C8EEC4BC090B5D40D78CB9B2997C)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-11-01T15:55:35.388913+010020229301A Network Trojan was detected4.245.163.56443192.168.2.749763TCP
2024-11-01T15:56:14.806860+010020229301A Network Trojan was detected4.245.163.56443192.168.2.749972TCP

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: mwxZCB2H4p.exeReversingLabs: Detection: 52%
Source: mwxZCB2H4p.exeJoe Sandbox ML: detected
Source: mwxZCB2H4p.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: Binary string: PerformanceCounterInstaller.pdb source: mwxZCB2H4p.exe
Source: Binary string: D:\T\BuildResults\bin\Release_x64\WCChromeNativeMessagingHost.pdb source: mwxZCB2H4p.exe
Source: Binary string: mshta.pdb\/ source: mwxZCB2H4p.exe
Source: Binary string: dwtrig20.pdbsplab1\otools\BBT_TEMP\DWTRIG20O.pdb source: mwxZCB2H4p.exe, 00000003.00000002.1277743125.0000000030001000.00000020.00000001.01000000.00000003.sdmp, mwxZCB2H4p.exe, 00000003.00000000.1276930809.0000000030001000.00000020.00000001.01000000.00000003.sdmp
Source: Binary string: g:\Acro_root_at\Acrobat\Viewer\Win\output\acrobat\AcroRd32Exe.pdb source: mwxZCB2H4p.exe
Source: Binary string: dwtrig20.pdbsplab1\otools\BBT_TEMP\DWTRIG20O.pdbpe0Xe0 source: mwxZCB2H4p.exe
Source: Binary string: g:\acro_root_at\acrobat\systemsynchronizer\synchronizerapp\build\win\release\AdobeCollabSync.pdb source: mwxZCB2H4p.exe
Source: Binary string: dwtrig20.pdb source: mwxZCB2H4p.exe
Source: Binary string: dw20.pdb\devsplab1\otools\BBT_TEMP\DW20O.pdb source: mwxZCB2H4p.exe
Source: Binary string: g:\acro_root_at\acrobat\installers\bootstrapexe_small\release\Setup.pdb source: mwxZCB2H4p.exe
Source: Binary string: PerformanceCounterInstaller.pdbx2 source: mwxZCB2H4p.exe
Source: Binary string: dw20.pdb source: mwxZCB2H4p.exe
Source: Binary string: splab1\otools\BBT_TEMP\DWTRIG20O.pdb source: mwxZCB2H4p.exe
Source: Binary string: mshta.pdb source: mwxZCB2H4p.exe
Source: Binary string: D:\T\BuildResults\bin\Release_x64\WCChromeNativeMessagingHost.pdb888 source: mwxZCB2H4p.exe
Source: Binary string: \devsplab1\otools\BBT_TEMP\DW20O.pdb source: mwxZCB2H4p.exe
Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 4.245.163.56:443 -> 192.168.2.7:49763
Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 4.245.163.56:443 -> 192.168.2.7:49972
Source: mwxZCB2H4p.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
Source: mwxZCB2H4p.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
Source: mwxZCB2H4p.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: mwxZCB2H4p.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: mwxZCB2H4p.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: mwxZCB2H4p.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
Source: mwxZCB2H4p.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: mwxZCB2H4p.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: mwxZCB2H4p.exeString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
Source: mwxZCB2H4p.exeString found in binary or memory: http://ocsp.digicert.com0
Source: mwxZCB2H4p.exeString found in binary or memory: http://ocsp.digicert.com0A
Source: mwxZCB2H4p.exeString found in binary or memory: http://ocsp.digicert.com0C
Source: mwxZCB2H4p.exeString found in binary or memory: http://ocsp.digicert.com0X
Source: mwxZCB2H4p.exeString found in binary or memory: http://www.7-zip.org/8
Source: mwxZCB2H4p.exeString found in binary or memory: http://www.digicert.com/CPS0
Source: mwxZCB2H4p.exe, 00000003.00000002.1277761355.0000000030022000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamedwtrig20.exe vs mwxZCB2H4p.exe
Source: mwxZCB2H4p.exeBinary or memory string: OriginalFilenamedwtrig20.exe vs mwxZCB2H4p.exe
Source: mwxZCB2H4p.exeBinary or memory string: OriginalFilenameFirewall.exe vs mwxZCB2H4p.exe
Source: mwxZCB2H4p.exeBinary or memory string: OriginalFilenamePerformanceCounterInstaller.exeX vs mwxZCB2H4p.exe
Source: mwxZCB2H4p.exeBinary or memory string: OriginalFilenameMSHTA.EXEj% vs mwxZCB2H4p.exe
Source: mwxZCB2H4p.exeBinary or memory string: OriginalFilenameSetup.exeF vs mwxZCB2H4p.exe
Source: mwxZCB2H4p.exeBinary or memory string: OriginalFilenameAcroRd32.exeB vs mwxZCB2H4p.exe
Source: mwxZCB2H4p.exeBinary or memory string: OriginalFilenameDW20.Exel& vs mwxZCB2H4p.exe
Source: mwxZCB2H4p.exeBinary or memory string: OriginalFilenameAdobeCollabSync.exeb! vs mwxZCB2H4p.exe
Source: mwxZCB2H4p.exeBinary or memory string: OriginalFilenameWCChromeNativeMessagingHost.exeB vs mwxZCB2H4p.exe
Source: mwxZCB2H4p.exeBinary or memory string: OriginalFilename7zFM.exe, vs mwxZCB2H4p.exe
Source: mwxZCB2H4p.exeBinary or memory string: OriginalFilename7z.exe, vs mwxZCB2H4p.exe
Source: mwxZCB2H4p.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: mwxZCB2H4p.exeBinary or memory string: @p@*\AC:\Program Files\Microsoft Visual Studio\VB98\pjtbinder.vbp
Source: mwxZCB2H4p.exeBinary or memory string: B*\AC:\virus\ash\ash.vbp|$@"
Source: classification engineClassification label: mal52.winEXE@1/0@0/0
Source: C:\Users\user\Desktop\mwxZCB2H4p.exeCode function: 3_2_300026B1 CoCreateInstance,CoCreateInstance,SysAllocString,SysAllocString,SysAllocString,SysFreeString,SysFreeString,SysFreeString,CoCreateInstance,SysAllocString,SysFreeString,3_2_300026B1
Source: mwxZCB2H4p.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: mwxZCB2H4p.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.72%
Source: C:\Users\user\Desktop\mwxZCB2H4p.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: mwxZCB2H4p.exeReversingLabs: Detection: 52%
Source: mwxZCB2H4p.exeString found in binary or memory: -help
Source: mwxZCB2H4p.exeString found in binary or memory: Check charset encoding and -scs switch.Cannot find listfilebsobbbtbdba-helph?asut012sea0-SeLockMemoryPrivilegeSeCreateSymbolicLinkPrivilegeSeRestorePrivilege
Source: C:\Users\user\Desktop\mwxZCB2H4p.exeSection loaded: apphelp.dllJump to behavior
Source: mwxZCB2H4p.exeStatic file information: File size 6839806 > 1048576
Source: mwxZCB2H4p.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: PerformanceCounterInstaller.pdb source: mwxZCB2H4p.exe
Source: Binary string: D:\T\BuildResults\bin\Release_x64\WCChromeNativeMessagingHost.pdb source: mwxZCB2H4p.exe
Source: Binary string: mshta.pdb\/ source: mwxZCB2H4p.exe
Source: Binary string: dwtrig20.pdbsplab1\otools\BBT_TEMP\DWTRIG20O.pdb source: mwxZCB2H4p.exe, 00000003.00000002.1277743125.0000000030001000.00000020.00000001.01000000.00000003.sdmp, mwxZCB2H4p.exe, 00000003.00000000.1276930809.0000000030001000.00000020.00000001.01000000.00000003.sdmp
Source: Binary string: g:\Acro_root_at\Acrobat\Viewer\Win\output\acrobat\AcroRd32Exe.pdb source: mwxZCB2H4p.exe
Source: Binary string: dwtrig20.pdbsplab1\otools\BBT_TEMP\DWTRIG20O.pdbpe0Xe0 source: mwxZCB2H4p.exe
Source: Binary string: g:\acro_root_at\acrobat\systemsynchronizer\synchronizerapp\build\win\release\AdobeCollabSync.pdb source: mwxZCB2H4p.exe
Source: Binary string: dwtrig20.pdb source: mwxZCB2H4p.exe
Source: Binary string: dw20.pdb\devsplab1\otools\BBT_TEMP\DW20O.pdb source: mwxZCB2H4p.exe
Source: Binary string: g:\acro_root_at\acrobat\installers\bootstrapexe_small\release\Setup.pdb source: mwxZCB2H4p.exe
Source: Binary string: PerformanceCounterInstaller.pdbx2 source: mwxZCB2H4p.exe
Source: Binary string: dw20.pdb source: mwxZCB2H4p.exe
Source: Binary string: splab1\otools\BBT_TEMP\DWTRIG20O.pdb source: mwxZCB2H4p.exe
Source: Binary string: mshta.pdb source: mwxZCB2H4p.exe
Source: Binary string: D:\T\BuildResults\bin\Release_x64\WCChromeNativeMessagingHost.pdb888 source: mwxZCB2H4p.exe
Source: Binary string: \devsplab1\otools\BBT_TEMP\DW20O.pdb source: mwxZCB2H4p.exe
Source: mwxZCB2H4p.exeStatic PE information: real checksum: 0x11e87 should be: 0x694dde
Source: mwxZCB2H4p.exeStatic PE information: section name: .cdata
Source: C:\Users\user\Desktop\mwxZCB2H4p.exeCode function: 3_2_30006501 push ecx; ret 3_2_30006511
Source: C:\Users\user\Desktop\mwxZCB2H4p.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_3-2699
Source: C:\Users\user\Desktop\mwxZCB2H4p.exeAPI coverage: 8.0 %
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\mwxZCB2H4p.exeCode function: 3_2_300063F9 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_300063F9
Source: C:\Users\user\Desktop\mwxZCB2H4p.exeCode function: 3_2_30005916 LocalAlloc,LocalAlloc,LocalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,LocalFree,LocalFree,LocalFree,3_2_30005916
Source: C:\Users\user\Desktop\mwxZCB2H4p.exeCode function: 3_2_30002406 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,3_2_30002406
Source: C:\Users\user\Desktop\mwxZCB2H4p.exeCode function: 3_2_30006380 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,VirtualProtect,3_2_30006380
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
1
DLL Side-Loading
1
DLL Side-Loading
OS Credential Dumping1
System Time Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts1
Native API
Boot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Obfuscated Files or Information
LSASS Memory2
System Information Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
mwxZCB2H4p.exe53%ReversingLabsWin32.Trojan.Generic
mwxZCB2H4p.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://www.7-zip.org/8mwxZCB2H4p.exefalse
    unknown
    No contacted IP infos
    Joe Sandbox version:41.0.0 Charoite
    Analysis ID:1546795
    Start date and time:2024-11-01 15:54:14 +01:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 3m 59s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:15
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:mwxZCB2H4p.exe
    renamed because original name is a hash value
    Original Sample Name:0--caa9e43f3ef3c754ca7097afdc8e58b7ec5a7ad5.exe
    Detection:MAL
    Classification:mal52.winEXE@1/0@0/0
    EGA Information:
    • Successful, ratio: 100%
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 5
    • Number of non-executed functions: 31
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, sppsvc.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
    • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
    • Not all processes where analyzed, report is missing behavior information
    • VT rate limit hit for: mwxZCB2H4p.exe
    No simulations
    No context
    No context
    No context
    No context
    No context
    No created / dropped files found
    File type:PE32 executable (GUI) Intel 80386, for MS Windows
    Entropy (8bit):6.190037533947677
    TrID:
    • Win32 Executable (generic) Net Framework (10011505/4) 49.72%
    • Win32 Executable (generic) a (10002005/4) 49.68%
    • Windows ActiveX control (116523/4) 0.58%
    • Generic Win/DOS Executable (2004/3) 0.01%
    • DOS Executable Generic (2002/1) 0.01%
    File name:mwxZCB2H4p.exe
    File size:6'839'806 bytes
    MD5:4177c8eec4bc090b5d40d78cb9b2997c
    SHA1:caa9e43f3ef3c754ca7097afdc8e58b7ec5a7ad5
    SHA256:23d262493fcf4d1c896754ba8748ca6b1186db3f17304bcfa28b0b737917f771
    SHA512:aef89a7419bd2ee0a77f3b048e47d92a7bcf0fd73afb3018115a672fc91add7e621bf6df1993ff8c3910affa94abe04a9f17774393b5701bd8829e9955b039f9
    SSDEEP:98304:CZiwIDQcgYOXwnS4rVk7r7fkZc86Z6srX:SuQYIdzP86Z6IX
    TLSH:CB664B02A3658673D06790B1C4966749A6327FB01F32C7DB6E447A19BE337C2993237B
    File Content Preview:MZ......................@...................................0...........!..L.!This program cannot be run in DOS mode....$.........|.............k.........M.....K.........7.....B.O.....Y.......2.......Y.........r...............M.....u.M.......O............
    Icon Hash:00928e8e8686b000
    Entrypoint:0x30006139
    Entrypoint Section:.text
    Digitally signed:true
    Imagebase:0x30000000
    Subsystem:windows gui
    Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
    DLL Characteristics:DYNAMIC_BASE
    Time Stamp:0x45F723E6 [Tue Mar 13 22:21:26 2007 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:4
    OS Version Minor:0
    File Version Major:4
    File Version Minor:0
    Subsystem Version Major:4
    Subsystem Version Minor:0
    Import Hash:590291a24e818bb78c2fe32d715f214a
    Signature Valid:
    Signature Issuer:
    Signature Validation Error:
    Error Number:
    Not Before, Not After
      Subject Chain
        Version:
        Thumbprint MD5:
        Thumbprint SHA-1:
        Thumbprint SHA-256:
        Serial:
        Instruction
        push 00000028h
        push 300017B0h
        call 00007FDE151F60E6h
        xor edi, edi
        push edi
        call dword ptr [300010CCh]
        cmp word ptr [eax], 5A4Dh
        jne 00007FDE151F5D81h
        mov ecx, dword ptr [eax+3Ch]
        add ecx, eax
        cmp dword ptr [ecx], 00004550h
        jne 00007FDE151F5D74h
        movzx eax, word ptr [ecx+18h]
        cmp eax, 0000010Bh
        je 00007FDE151F5D81h
        cmp eax, 0000020Bh
        je 00007FDE151F5D67h
        mov dword ptr [ebp-1Ch], edi
        jmp 00007FDE151F5D89h
        cmp dword ptr [ecx+00000084h], 0Eh
        jbe 00007FDE151F5D54h
        xor eax, eax
        cmp dword ptr [ecx+000000F8h], edi
        jmp 00007FDE151F5D70h
        cmp dword ptr [ecx+74h], 0Eh
        jbe 00007FDE151F5D44h
        xor eax, eax
        cmp dword ptr [ecx+000000E8h], edi
        setne al
        mov dword ptr [ebp-1Ch], eax
        mov dword ptr [ebp-04h], edi
        push 00000001h
        call dword ptr [30001190h]
        pop ecx
        or dword ptr [300201E4h], FFFFFFFFh
        or dword ptr [300201E8h], FFFFFFFFh
        call dword ptr [3000118Ch]
        mov ecx, dword ptr [300201CCh]
        mov dword ptr [eax], ecx
        call dword ptr [30001188h]
        mov ecx, dword ptr [300201C8h]
        mov dword ptr [eax], ecx
        mov eax, dword ptr [30001184h]
        mov eax, dword ptr [eax]
        mov dword ptr [300201E0h], eax
        call 00007FDE151F5FBCh
        call 00007FDE151F60C4h
        cmp dword ptr [300080C0h], edi
        jne 00007FDE151F5D6Eh
        push 30006548h
        call dword ptr [30001180h]
        pop ecx
        Programming Language:
        • [LNK] VS98 (6.0) imp/exp build 8168
        • [ C ] VS98 (6.0) build 8168
        • [C++] VS2003 (.NET) build 3077
        • [ASM] VS2003 (.NET) build 3077
        • [ C ] VS2003 (.NET) build 3077
        • [RES] VS2003 (.NET) build 3077
        • [LNK] VS2003 (.NET) build 3077
        NameVirtual AddressVirtual Size Is in Section
        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IMPORT0x68640xa0.text
        IMAGE_DIRECTORY_ENTRY_RESOURCE0x220000x580.rsrc
        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
        IMAGE_DIRECTORY_ENTRY_SECURITY0x74000x2560
        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
        IMAGE_DIRECTORY_ENTRY_DEBUG0x737c0x38.text
        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IAT0x10000x1f0.text
        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x67ec0x40.text
        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
        .text0x10000x64020x6600273f7f15956851f838164d5df593f6d7False0.5850949754901961data6.426240935560888IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        .data0x80000x181ec0x200cc485967ab028b459b4881bca5c07be6False0.177734375data1.1612375377911652IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        .cdata0x210000x40x2001fd62ec5648b0294c196045987fa1c25False0.033203125ISO-8859 text, with no line terminators0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        .rsrc0x220000x5800x6008c6a160cff0e06a0654fd8276419303bFalse0.3287760416666667data3.129925877837548IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        NameRVASizeTypeLanguageCountryZLIB Complexity
        RT_VERSION0x220600x51cdataEnglishUnited States0.35932721712538224
        DLLImport
        ADVAPI32.dllRegCloseKey, RegSetValueExW, RegCreateKeyExW, RegDeleteKeyW, RegEnumKeyExW, RegOpenKeyExW, RegQueryValueExA, RegOpenKeyExA, FreeSid, CheckTokenMembership, AllocateAndInitializeSid, RegEnumValueW, RegQueryInfoKeyW, RegQueryValueExW, ConvertSidToStringSidA, AddAce, ConvertStringSecurityDescriptorToSecurityDescriptorW, GetSecurityDescriptorDacl, InitializeSecurityDescriptor, SetSecurityDescriptorDacl, OpenThreadToken, OpenProcessToken, GetTokenInformation, CopySid, IsValidSid, InitializeAcl, AddAccessDeniedAce, AddAccessAllowedAce, GetLengthSid
        KERNEL32.dllEnterCriticalSection, LoadLibraryA, InterlockedExchange, FreeLibrary, GetSystemTimeAsFileTime, GetCurrentProcessId, GetCurrentThreadId, GetTickCount, QueryPerformanceCounter, VirtualProtect, SetUnhandledExceptionFilter, UnhandledExceptionFilter, TerminateProcess, GetCurrentThread, LocalAlloc, LocalFree, GetModuleFileNameA, GetShortPathNameA, OpenMutexA, CreateMutexA, GetCurrentProcess, GetModuleHandleA, GetProcAddress, MultiByteToWideChar, Sleep, GlobalAlloc, GlobalFree, CreateProcessW, CloseHandle, GetShortPathNameW, GetLongPathNameW, lstrcmpiW, GetSystemWindowsDirectoryW, GetLastError, GetFileAttributesW, WaitForSingleObject, GetModuleFileNameW, CreateEventW, lstrlenW, InterlockedDecrement, SetEvent, InterlockedIncrement, RaiseException, LeaveCriticalSection, SetLastError, VirtualFree, VirtualAlloc, InitializeCriticalSectionAndSpinCount, TlsAlloc, GetSystemDefaultLCID, TlsFree, DeleteCriticalSection, TlsSetValue, TlsGetValue
        MSVCRT.dll_wtol, _except_handler3, memmove, _c_exit, _XcptFilter, _cexit, exit, __p___winitenv, _amsg_exit, __wgetmainargs, _initterm, __setusermatherr, _adjust_fdiv, __p__commode, __p__fmode, __set_app_type, __dllonexit, _onexit, _controlfp, _exit
        ole32.dllStringFromCLSID, CoUninitialize, CoInitializeEx, CoRegisterClassObject, StringFromIID, CoCreateInstance, CoRevokeClassObject, CoTaskMemFree
        OLEAUT32.dllSysAllocString, SysFreeString, LoadRegTypeLib, LoadTypeLib
        SHELL32.dllSHGetSpecialFolderPathW
        USER32.dllSystemParametersInfoW
        Language of compilation systemCountry where language is spokenMap
        EnglishUnited States
        No network behavior found

        Click to jump to process

        Click to jump to process

        Target ID:3
        Start time:10:55:16
        Start date:01/11/2024
        Path:C:\Users\user\Desktop\mwxZCB2H4p.exe
        Wow64 process (32bit):true
        Commandline:"C:\Users\user\Desktop\mwxZCB2H4p.exe"
        Imagebase:0x30000000
        File size:6'839'806 bytes
        MD5 hash:4177C8EEC4BC090B5D40D78CB9B2997C
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low
        Has exited:true

        Reset < >

          Execution Graph

          Execution Coverage:3.7%
          Dynamic/Decrypted Code Coverage:61.3%
          Signature Coverage:5.5%
          Total number of Nodes:762
          Total number of Limit Nodes:3
          execution_graph 1939 30006380 1940 30006396 GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 1939->1940 1941 3000638f 1939->1941 1943 300063e3 VirtualProtect 1940->1943 1944 300063d9 1940->1944 1941->1940 1942 300063f7 1941->1942 1943->1942 1944->1943 2787 30001b41 InterlockedDecrement 2788 30001b59 2787->2788 2789 30001b6e 2787->2789 2790 300048b8 13 API calls 2788->2790 2790->2789 2791 30001ac1 2792 300035e9 183 API calls 2791->2792 2793 30001acc 2792->2793 2794 30001943 2795 3000196b 2794->2795 2796 30004904 33 API calls 2795->2796 2797 3000197b 2795->2797 2796->2797 2798 300019c4 2797->2798 2799 300019b9 InterlockedIncrement 2797->2799 2799->2798 2800 30001844 2801 3000184c InterlockedIncrement 2800->2801 2802 300019cb 2803 300019d7 InterlockedIncrement 2802->2803 2804 300019df InterlockedDecrement InterlockedIncrement 2802->2804 2805 300019f5 2803->2805 2807 3000189d InterlockedDecrement 2804->2807 2808 300018c0 2807->2808 2809 300018ac 2807->2809 2808->2805 2809->2808 2810 300018b4 SetEvent 2809->2810 2810->2808 2811 3000184c InterlockedIncrement 2842 300062ac 2843 300062b8 _exit 2842->2843 2844 300062bf _c_exit 2842->2844 2843->2844 2845 300062c5 2844->2845 2846 30006570 2847 3000655f 2846->2847 2848 30006577 10 API calls 2847->2848 2849 3000656c 2848->2849 2812 30001911 InterlockedDecrement 2813 30001929 2812->2813 2814 3000193a 2812->2814 2815 3000189d 2 API calls 2813->2815 2816 3000192e 2815->2816 2817 300048b8 13 API calls 2816->2817 2817->2814 2818 30006558 2819 3000655f 2818->2819 2822 30006577 2819->2822 2823 300065dc RaiseException 2822->2823 2824 300065fb 2822->2824 2826 3000656c 2823->2826 2825 30006670 LoadLibraryA 2824->2825 2824->2826 2827 300066c0 InterlockedExchange 2824->2827 2829 300066e2 2824->2829 2825->2827 2828 3000667f GetLastError 2825->2828 2832 300066f4 FreeLibrary 2827->2832 2833 300066ce 2827->2833 2831 3000669f RaiseException 2828->2831 2836 30006691 2828->2836 2829->2826 2830 30006746 GetProcAddress 2829->2830 2830->2826 2834 30006756 GetLastError 2830->2834 2831->2826 2832->2829 2833->2829 2835 300066d4 LocalAlloc 2833->2835 2837 30006768 2834->2837 2835->2829 2836->2827 2836->2831 2837->2826 2838 30006776 RaiseException 2837->2838 2838->2826 2839 30006298 _XcptFilter 1945 30006139 1965 300064c6 1945->1965 1947 30006145 GetModuleHandleA 1949 30006155 __set_app_type __p__fmode __p__commode 1947->1949 1950 300061e7 1949->1950 1951 30006200 1950->1951 1952 300061f4 __setusermatherr 1950->1952 1966 30006536 _controlfp 1951->1966 1952->1951 1954 30006205 _initterm 1967 3000642c 1954->1967 1957 30006254 _initterm 1959 30006269 1957->1959 1958 3000624c _amsg_exit 1958->1957 1970 30002101 1959->1970 1962 30006290 _cexit 1964 300062c5 1962->1964 1963 30006289 exit 1963->1962 1965->1947 1966->1954 1994 30006406 1967->1994 1969 3000621e __wgetmainargs 1969->1957 1969->1958 1997 30001e4d 1970->1997 1975 300021d9 1975->1962 1975->1963 1977 300021a7 2007 3000496f DeleteCriticalSection 1977->2007 1980 300021b1 1982 30002181 1980->1982 1983 300021b6 _wtol 1980->1983 1981 3000216d 1984 30002185 1981->1984 1985 30002177 1981->1985 1988 3000217a 1981->1988 2031 300035e9 1982->2031 1983->1982 2010 30001d53 CoInitializeEx 1984->2010 1985->1982 1985->1988 1988->1977 2024 300020c2 CoInitializeEx 1988->2024 1991 30002192 WaitForSingleObject 1992 3000219f 1991->1992 2020 30001dff 1992->2020 1995 30006415 __dllonexit 1994->1995 1996 3000640f _onexit 1994->1996 1995->1969 1996->1995 2042 30002221 RegOpenKeyExA 1997->2042 2000 30004930 GetSystemDefaultLCID TlsAlloc 2001 30004956 InitializeCriticalSectionAndSpinCount 2000->2001 2002 3000211c 2000->2002 2001->2002 2002->1975 2003 30004996 2002->2003 2004 300049a0 TlsGetValue 2003->2004 2005 30002129 2003->2005 2004->2005 2006 300049ab VirtualFree TlsSetValue 2004->2006 2005->1975 2005->1977 2005->1980 2005->1981 2005->1982 2006->2005 2008 30004992 2007->2008 2009 30004984 TlsFree 2007->2009 2008->1975 2009->2008 2011 30001df8 2010->2011 2012 30001d69 LoadRegTypeLib 2010->2012 2011->1991 2011->1992 2013 30001d82 LoadTypeLib 2012->2013 2014 30001d94 2012->2014 2013->2011 2013->2014 2014->2011 2015 30001daf CreateEventW 2014->2015 2015->2011 2016 30001dc2 2015->2016 2047 30004904 2016->2047 2018 30001de2 CoRegisterClassObject 2018->2011 2019 30001dc9 2019->2011 2019->2018 2021 30001e08 CoRevokeClassObject 2020->2021 2022 30001e14 CoUninitialize 2020->2022 2021->2022 2022->1977 2025 300020d0 2024->2025 2026 300020fe 2024->2026 2187 30001e79 StringFromCLSID 2025->2187 2026->1977 2029 300020f8 CoUninitialize 2029->2026 2307 30002479 2031->2307 2034 3000363b 2036 30003648 2034->2036 2332 30002f3a 2034->2332 2036->1977 2039 3000362b 2039->2036 2041 30003061 21 API calls 2039->2041 2041->2034 2043 30001e69 2042->2043 2044 3000224f RegQueryValueExA 2042->2044 2043->2000 2045 3000226a 2044->2045 2046 3000226c RegCloseKey 2044->2046 2045->2046 2046->2043 2048 3000491d 2047->2048 2049 3000490d 2047->2049 2048->2019 2051 300047fd 2049->2051 2052 30004806 EnterCriticalSection 2051->2052 2053 3000483e 2051->2053 2058 30003f7d 2052->2058 2053->2048 2055 30004821 2056 30004844 LeaveCriticalSection 2055->2056 2057 30004828 SetLastError LeaveCriticalSection 2055->2057 2056->2048 2057->2053 2059 30003f90 2058->2059 2060 30003fd2 VirtualAlloc 2059->2060 2073 30004094 2059->2073 2076 3000408a 2059->2076 2061 30004006 VirtualAlloc 2060->2061 2060->2076 2062 30004015 2061->2062 2063 3000407c VirtualFree 2061->2063 2079 30005188 2062->2079 2063->2076 2064 30004298 2067 30004354 VirtualAlloc 2064->2067 2078 300042b3 2064->2078 2069 30004384 VirtualAlloc 2067->2069 2067->2078 2068 30004060 2068->2055 2069->2078 2070 3000414d 2070->2064 2070->2076 2089 30003eb4 2070->2089 2073->2070 2073->2076 2085 300038ac 2073->2085 2074 30004485 2075 30003eb4 5 API calls 2074->2075 2074->2076 2075->2074 2076->2055 2077 300038ac memmove 2077->2078 2078->2074 2078->2076 2078->2077 2080 30005192 2079->2080 2081 300051a4 2079->2081 2093 30005106 2080->2093 2084 30004055 2081->2084 2100 30004f21 2081->2100 2084->2063 2084->2068 2086 300038c2 2085->2086 2088 30003950 2086->2088 2183 300051f3 2086->2183 2088->2073 2090 30003ed7 2089->2090 2091 30003a99 5 API calls 2090->2091 2092 30003ef9 2090->2092 2091->2092 2092->2070 2094 300047fd 33 API calls 2093->2094 2095 30005118 2094->2095 2096 30005146 2095->2096 2107 30004e3e 2095->2107 2096->2081 2102 30004f33 2100->2102 2101 30004f93 2101->2084 2102->2101 2103 30004fa7 2102->2103 2104 30004f89 2102->2104 2149 30004858 2103->2149 2105 300047fd 33 API calls 2104->2105 2105->2101 2108 30004e8e 2107->2108 2109 30004e7d 2107->2109 2108->2096 2111 30003b96 2108->2111 2109->2108 2110 300047fd 33 API calls 2109->2110 2110->2108 2112 30003d52 2111->2112 2113 30003baf EnterCriticalSection 2111->2113 2112->2096 2115 30003bc1 2113->2115 2114 30003bca LeaveCriticalSection 2114->2096 2115->2114 2116 30003beb 2115->2116 2117 30003c0d 2116->2117 2123 30003c56 2116->2123 2127 300051cd 2117->2127 2120 30003d44 LeaveCriticalSection 2120->2112 2121 30003d05 2132 3000377d EnterCriticalSection VirtualFree LeaveCriticalSection 2121->2132 2122 30003d59 2126 30003d0b 2122->2126 2133 30003a99 EnterCriticalSection 2122->2133 2123->2121 2123->2122 2123->2126 2126->2120 2141 30004fff 2127->2141 2132->2126 2134 30003b83 LeaveCriticalSection 2133->2134 2135 30003ab6 2133->2135 2134->2126 2135->2134 2136 30003b03 VirtualFree 2135->2136 2137 30003b1b 2135->2137 2138 30003b17 LeaveCriticalSection 2136->2138 2137->2138 2140 30003b4d VirtualAlloc 2137->2140 2138->2126 2140->2134 2140->2138 2142 30005022 2141->2142 2143 300050b6 2142->2143 2144 3000509e memmove 2142->2144 2145 300050c2 2143->2145 2144->2143 2146 30003c3f VirtualFree 2145->2146 2147 300050cd 2145->2147 2146->2120 2147->2146 2148 30003b96 13 API calls 2147->2148 2148->2146 2150 30004861 EnterCriticalSection 2149->2150 2151 3000489e 2149->2151 2156 30004697 2150->2156 2151->2101 2153 30004881 2154 300048a4 LeaveCriticalSection 2153->2154 2155 30004888 SetLastError LeaveCriticalSection 2153->2155 2154->2101 2155->2151 2157 300046af 2156->2157 2160 300046ca 2156->2160 2158 300046bf 2157->2158 2165 300046d9 2157->2165 2170 30003da4 2158->2170 2160->2153 2161 3000478d 2162 30003f7d 32 API calls 2161->2162 2163 3000479d 2162->2163 2164 300047a4 2163->2164 2168 30003b96 13 API calls 2163->2168 2164->2153 2165->2161 2166 300046e6 2165->2166 2167 3000473e VirtualAlloc 2165->2167 2166->2153 2167->2161 2169 30004761 2167->2169 2168->2166 2169->2153 2171 30003db4 2170->2171 2172 30003ead 2170->2172 2171->2172 2173 30003dc1 EnterCriticalSection 2171->2173 2172->2160 2174 30003df8 2173->2174 2175 30003e6b 2174->2175 2176 30003dfc 2174->2176 2177 30003e93 2175->2177 2178 30003e7e LeaveCriticalSection 2175->2178 2179 30003e39 LeaveCriticalSection 2176->2179 2180 30003e29 VirtualFree 2176->2180 2181 30003b96 13 API calls 2177->2181 2178->2160 2179->2160 2180->2179 2182 30003e9a LeaveCriticalSection 2181->2182 2182->2160 2184 3000520e 2183->2184 2186 30005216 2183->2186 2185 300052a1 memmove 2184->2185 2184->2186 2185->2184 2186->2086 2188 30002098 CoTaskMemFree CoTaskMemFree 2187->2188 2189 30001efb 2187->2189 2241 300063f9 2188->2241 2190 30001f06 StringFromCLSID 2189->2190 2191 30001f40 2189->2191 2190->2188 2193 30001f1e GetModuleFileNameW 2190->2193 2196 30001f93 2191->2196 2197 30001fb8 2191->2197 2193->2191 2195 30001f36 2193->2195 2194 300020bb 2194->2029 2216 30002b25 2194->2216 2195->2188 2223 30001c68 RegOpenKeyExW 2196->2223 2232 30001b8d RegCreateKeyExW 2197->2232 2202 30001c68 9 API calls 2202->2195 2205 30001b8d 5 API calls 2206 30002014 2205->2206 2206->2188 2207 3000201a RegCloseKey 2206->2207 2208 30001b8d 5 API calls 2207->2208 2209 30002045 2208->2209 2209->2188 2210 3000204b RegCloseKey RegCloseKey 2209->2210 2211 30001b8d 5 API calls 2210->2211 2212 3000206f 2211->2212 2212->2188 2213 30001c29 2 API calls 2212->2213 2214 3000208a 2213->2214 2214->2188 2215 30002090 RegCloseKey 2214->2215 2215->2188 2245 30002991 StringFromIID 2216->2245 2218 30002b68 2218->2029 2226 30001cb9 2223->2226 2231 30001ca4 2223->2231 2224 30001cd5 RegEnumKeyExW 2224->2226 2227 30001cf5 RegCloseKey RegDeleteKeyW 2224->2227 2225 300063f9 4 API calls 2228 30001d49 2225->2228 2226->2224 2229 30001c68 4 API calls 2226->2229 2230 30001d20 RegCloseKey 2226->2230 2227->2231 2228->2188 2228->2202 2229->2226 2230->2231 2231->2225 2233 30001bc3 2232->2233 2234 30001bb5 2232->2234 2235 30001bc9 lstrlenW RegSetValueExW 2233->2235 2236 30001c0a 2233->2236 2234->2188 2239 30001c29 lstrlenW RegSetValueExW 2234->2239 2235->2236 2238 30001bed RegCloseKey 2235->2238 2236->2234 2237 30001c11 RegCloseKey 2236->2237 2237->2234 2238->2234 2240 30001c54 2239->2240 2240->2188 2240->2205 2242 300062d1 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 2241->2242 2243 30006405 2241->2243 2244 30006377 2242->2244 2243->2194 2244->2194 2246 300029c2 SysAllocString 2245->2246 2267 30002ac6 2245->2267 2248 300029d7 SysAllocString 2246->2248 2246->2267 2247 30002916 10 API calls 2249 30002b1b 2247->2249 2250 300029e7 2248->2250 2248->2267 2249->2218 2271 300026b1 CoCreateInstance 2249->2271 2251 30002a18 2250->2251 2252 30002a00 StringFromIID 2250->2252 2253 300029f3 CoTaskMemFree 2250->2253 2254 30002a2b StringFromIID 2251->2254 2255 30002a1e CoTaskMemFree 2251->2255 2252->2251 2252->2267 2253->2252 2256 30002a43 SysAllocString 2254->2256 2254->2267 2255->2254 2257 30002a4f SysAllocString 2256->2257 2256->2267 2258 30002a5b 2257->2258 2257->2267 2259 30002a61 CoTaskMemFree 2258->2259 2260 30002a6e StringFromIID 2258->2260 2259->2260 2261 30002a86 SysAllocString 2260->2261 2260->2267 2262 30002a92 2261->2262 2261->2267 2263 30002aa5 SysAllocString 2262->2263 2264 30002aaf 2262->2264 2263->2264 2263->2267 2265 30002abc SysAllocString 2264->2265 2266 30002acf 2264->2266 2265->2266 2265->2267 2266->2267 2268 30002ae8 StringFromIID 2266->2268 2269 30002adb CoTaskMemFree 2266->2269 2267->2247 2267->2249 2268->2267 2270 30002afc SysAllocString 2268->2270 2269->2268 2270->2267 2272 30002732 2271->2272 2273 300026f8 2271->2273 2276 300063f9 4 API calls 2272->2276 2274 30002700 SysAllocString 2273->2274 2275 3000276a CoCreateInstance 2273->2275 2274->2272 2279 3000273c SysAllocString 2274->2279 2275->2272 2282 30002787 2275->2282 2278 3000290c 2276->2278 2286 30002916 2278->2286 2279->2272 2280 30002748 SysFreeString SysFreeString 2279->2280 2280->2272 2282->2272 2283 300028b7 SysAllocString 2282->2283 2283->2272 2284 300028cc SysFreeString 2283->2284 2284->2272 2287 30002929 SysFreeString 2286->2287 2288 3000292c 2286->2288 2287->2288 2289 30002933 SysFreeString 2288->2289 2290 30002936 2288->2290 2289->2290 2291 30002940 2290->2291 2292 3000293d SysFreeString 2290->2292 2293 30002947 SysFreeString 2291->2293 2294 3000294a 2291->2294 2292->2291 2293->2294 2295 30002951 SysFreeString 2294->2295 2296 30002954 2294->2296 2295->2296 2297 3000295b SysFreeString 2296->2297 2298 3000295e 2296->2298 2297->2298 2299 30002965 SysFreeString 2298->2299 2300 30002968 2298->2300 2299->2300 2301 30002972 2300->2301 2302 3000296f SysFreeString 2300->2302 2303 30002978 SysFreeString 2301->2303 2304 3000297b 2301->2304 2302->2301 2303->2304 2305 30002982 SysFreeString 2304->2305 2306 30002985 2304->2306 2305->2306 2306->2218 2308 30002483 2307->2308 2309 3000248f 2307->2309 2346 300023e2 2308->2346 2349 30002322 2309->2349 2312 3000248d 2363 30002406 AllocateAndInitializeSid 2312->2363 2315 300024bc 2315->2034 2320 300035ac 2315->2320 2316 300024b2 2318 300023e2 3 API calls 2316->2318 2317 300024be 2319 30002322 10 API calls 2317->2319 2318->2315 2319->2315 2387 3000344f 2320->2387 2325 30003061 2461 30002ce3 RegOpenKeyExA 2325->2461 2328 300030b3 2330 300063f9 4 API calls 2328->2330 2331 300030bb 2330->2331 2331->2039 2495 300025bc 2332->2495 2335 30003047 2337 300063f9 4 API calls 2335->2337 2336 30002fa7 2339 30002ce3 18 API calls 2336->2339 2340 30003057 2337->2340 2338 30002fa0 Sleep 2338->2336 2341 30002fb9 2339->2341 2340->2036 2341->2335 2342 30002fe4 SystemParametersInfoW 2341->2342 2343 30002ff9 2342->2343 2343->2335 2344 30003012 CreateProcessW 2343->2344 2344->2335 2345 30003033 CloseHandle CloseHandle 2344->2345 2345->2335 2347 30002221 3 API calls 2346->2347 2348 300023fb 2347->2348 2348->2312 2350 30002347 GetSystemWindowsDirectoryW 2349->2350 2351 3000235f SHGetSpecialFolderPathW 2349->2351 2352 30002353 2350->2352 2353 30002357 GetLastError 2350->2353 2357 30002373 2351->2357 2362 3000236f 2351->2362 2352->2353 2352->2357 2353->2362 2354 300063f9 4 API calls 2355 300023de 2354->2355 2355->2312 2356 3000239b 2358 30002293 7 API calls 2356->2358 2357->2356 2370 30002293 2357->2370 2360 300023b3 2358->2360 2361 30002293 7 API calls 2360->2361 2361->2362 2362->2354 2364 3000246b 2363->2364 2365 3000244e CheckTokenMembership 2363->2365 2368 300063f9 4 API calls 2364->2368 2366 30002462 FreeSid 2365->2366 2367 3000245f 2365->2367 2366->2364 2367->2366 2369 30002477 2368->2369 2369->2315 2369->2316 2369->2317 2377 30004b60 2370->2377 2372 300022d4 2382 3000227c GetFileAttributesW 2372->2382 2374 30002314 2375 300063f9 4 API calls 2374->2375 2376 3000231e 2375->2376 2376->2356 2378 30004b68 2377->2378 2379 30004b6f 2377->2379 2378->2372 2383 30004ac0 2379->2383 2381 30004b7f 2381->2372 2382->2374 2384 30004acc 2383->2384 2385 30004af2 memmove 2384->2385 2386 30004ad7 memmove 2384->2386 2385->2381 2386->2381 2388 30003479 2387->2388 2389 300034c0 2387->2389 2411 3000338b 2388->2411 2391 3000338b 52 API calls 2389->2391 2392 300034ea 2391->2392 2394 30003507 2392->2394 2396 300033da 3 API calls 2392->2396 2395 30003556 2394->2395 2399 3000338b 52 API calls 2394->2399 2398 3000338b 52 API calls 2395->2398 2396->2394 2400 30003580 2398->2400 2401 30003537 2399->2401 2402 300035a0 2400->2402 2404 300033da 3 API calls 2400->2404 2401->2395 2406 300033da 3 API calls 2401->2406 2403 300063f9 4 API calls 2402->2403 2405 300035a8 2403->2405 2404->2402 2407 30002b6c 2405->2407 2406->2395 2408 30002b78 2407->2408 2409 30002baf 2407->2409 2408->2409 2410 300047e6 13 API calls 2408->2410 2409->2034 2409->2039 2409->2325 2410->2408 2412 300033a0 2411->2412 2413 300033a4 RegOpenKeyExA 2412->2413 2414 300033d6 2412->2414 2413->2414 2415 300033bf 2413->2415 2414->2389 2418 300033da 2414->2418 2425 300030bf 2415->2425 2419 300033f0 2418->2419 2420 300033f4 RegOpenKeyExA 2419->2420 2421 3000344b 2419->2421 2420->2421 2422 3000340f RegQueryValueExW 2420->2422 2421->2389 2423 30003441 RegCloseKey 2422->2423 2424 30003438 2422->2424 2423->2421 2424->2423 2439 30003653 2425->2439 2427 300030d6 2428 30003259 RegCloseKey 2427->2428 2429 30003251 2427->2429 2431 30003132 RegOpenKeyExA 2427->2431 2432 30003237 RegCloseKey 2427->2432 2433 30003279 RegQueryValueExA 2427->2433 2434 30002bb5 35 API calls 2427->2434 2435 300031c3 MultiByteToWideChar 2427->2435 2437 300031e9 MultiByteToWideChar 2427->2437 2454 300047e6 2427->2454 2428->2414 2457 3000374e 2429->2457 2431->2427 2432->2427 2433->2427 2434->2427 2450 300048d1 2435->2450 2437->2427 2440 3000367a TlsGetValue 2439->2440 2441 3000366d 2439->2441 2442 30003693 VirtualAlloc 2440->2442 2443 300036f8 2440->2443 2441->2427 2444 300036c9 SetLastError 2442->2444 2445 300036a9 VirtualAlloc 2442->2445 2443->2444 2446 30003731 2443->2446 2447 3000371c VirtualAlloc 2443->2447 2444->2427 2448 300036bc VirtualFree 2445->2448 2449 300036dd TlsSetValue 2445->2449 2446->2427 2447->2444 2447->2446 2448->2444 2449->2443 2451 300048ed 2450->2451 2452 300048da 2450->2452 2451->2427 2453 300047fd 33 API calls 2452->2453 2453->2451 2455 30003b96 13 API calls 2454->2455 2456 300047fa 2455->2456 2456->2427 2458 30003757 GetLastError TlsGetValue 2457->2458 2459 30003778 2457->2459 2458->2459 2460 30003771 SetLastError 2458->2460 2459->2428 2460->2459 2462 30002d73 RegQueryInfoKeyW 2461->2462 2463 30002ef1 2461->2463 2462->2463 2464 30002d98 GlobalAlloc 2462->2464 2465 30002f08 2463->2465 2466 30002eff RegCloseKey 2463->2466 2464->2463 2467 30002db3 GlobalAlloc 2464->2467 2468 30002f13 GlobalFree 2465->2468 2469 30002f18 2465->2469 2466->2465 2467->2463 2470 30002dc7 2467->2470 2468->2469 2471 30002f1c GlobalFree 2469->2471 2472 30002f1f 2469->2472 2470->2463 2473 30002ec2 2470->2473 2474 30002dd3 RegEnumValueW 2470->2474 2471->2472 2475 300063f9 4 API calls 2472->2475 2473->2463 2477 30002ecc GetModuleFileNameW 2473->2477 2474->2470 2476 30002f30 2475->2476 2476->2328 2480 300025fb 2476->2480 2477->2463 2478 30002ee2 2477->2478 2487 300024da GetShortPathNameW 2478->2487 2481 3000263d 2480->2481 2482 3000269a 2481->2482 2484 30002666 CreateProcessW 2481->2484 2483 300063f9 4 API calls 2482->2483 2485 300026a7 2483->2485 2484->2482 2486 3000268a CloseHandle CloseHandle 2484->2486 2485->2328 2486->2482 2488 3000253a GetShortPathNameW 2487->2488 2489 3000254b GetLongPathNameW 2487->2489 2488->2489 2490 30002573 lstrcmpiW 2488->2490 2489->2490 2491 30002562 GetLongPathNameW 2489->2491 2493 300063f9 4 API calls 2490->2493 2491->2490 2494 3000259e 2493->2494 2494->2463 2500 30004e13 2495->2500 2498 300025ef GetLastError 2499 300025ea 2498->2499 2499->2335 2499->2336 2499->2338 2503 30004c3b 2500->2503 2504 30004d5d 2503->2504 2505 30004c59 2503->2505 2506 300063f9 4 API calls 2504->2506 2505->2504 2516 30005e72 2505->2516 2508 300025e0 2506->2508 2508->2498 2508->2499 2509 30004c89 2510 30004c9d OpenMutexA 2509->2510 2513 30004cd6 CreateMutexA GetLastError 2509->2513 2514 30004d1b 2509->2514 2536 30006033 2509->2536 2510->2509 2556 30005e1a 2513->2556 2514->2504 2565 30004b82 2514->2565 2517 30005e87 2516->2517 2518 30005ea3 2516->2518 2517->2509 2518->2517 2519 30005ed8 2518->2519 2520 30005ec9 2518->2520 2521 30005ef4 2519->2521 2523 30005ee8 2519->2523 2522 30004b82 2 API calls 2520->2522 2526 30005f2e 2521->2526 2574 300056a2 2521->2574 2535 30005ed3 2522->2535 2570 30005b29 2523->2570 2527 30004b82 2 API calls 2526->2527 2533 30005f45 2527->2533 2528 30005fa8 LocalFree 2528->2517 2529 30005eed 2530 30005f1c 2529->2530 2531 30005f0d ConvertSidToStringSidA 2529->2531 2530->2526 2532 30005f25 GlobalFree 2530->2532 2531->2530 2532->2526 2533->2535 2578 30004d81 2533->2578 2535->2517 2535->2528 2537 3000604c 2536->2537 2555 30006045 2536->2555 2538 300060af 2537->2538 2539 30006065 2537->2539 2540 3000606c 2537->2540 2552 3000606a 2538->2552 2640 30005af8 2538->2640 2542 30005b29 32 API calls 2539->2542 2543 30006074 2540->2543 2544 3000607b 2540->2544 2542->2552 2626 30005b3d 2543->2626 2546 30006083 2544->2546 2547 3000608a 2544->2547 2630 30005b51 2546->2630 2548 300060a2 2547->2548 2549 30006092 2547->2549 2548->2552 2637 3000601e 2548->2637 2634 30005e00 2549->2634 2553 30006101 LocalAlloc 2552->2553 2552->2555 2553->2555 2555->2509 2557 30005e31 2556->2557 2558 30005e26 2556->2558 2560 30005e39 2557->2560 2563 30005e45 2557->2563 2768 30005e0d 2558->2768 2771 30005b65 2560->2771 2561 30005e2f 2561->2509 2563->2561 2564 30005e64 LocalFree 2563->2564 2564->2561 2566 30004b8a 2565->2566 2567 30004b8f 2565->2567 2566->2504 2783 30004b12 2567->2783 2569 30004b9f 2569->2504 2571 30005b32 2570->2571 2572 30005b37 2570->2572 2583 30005893 2571->2583 2572->2529 2575 300056a9 2574->2575 2576 300056ad 2574->2576 2575->2529 2605 3000547b 2576->2605 2579 30004da3 GetModuleFileNameA GetShortPathNameA 2578->2579 2582 30004dcf 2578->2582 2579->2582 2580 300063f9 4 API calls 2581 30004e0b 2580->2581 2581->2535 2582->2580 2592 300055ea 2583->2592 2586 300058b8 2587 3000590d 2586->2587 2588 300058c0 InitializeSecurityDescriptor 2586->2588 2598 30005846 2587->2598 2588->2587 2590 300058cd SetSecurityDescriptorDacl 2588->2590 2590->2587 2591 300058e6 2590->2591 2591->2572 2593 300055f7 2592->2593 2594 30005603 2592->2594 2595 3000547b 19 API calls 2593->2595 2596 30005380 7 API calls 2594->2596 2597 3000562a LocalAlloc 2594->2597 2595->2594 2596->2597 2597->2586 2597->2587 2599 30005856 LocalFree 2598->2599 2600 30005859 2598->2600 2599->2600 2601 30005862 LocalFree 2600->2601 2602 30005865 2600->2602 2601->2602 2603 30005876 2602->2603 2604 3000586f GlobalFree 2602->2604 2603->2591 2604->2603 2606 300054a3 2605->2606 2607 300054aa 2605->2607 2608 300063f9 4 API calls 2606->2608 2607->2606 2609 300054d8 GetCurrentThread OpenThreadToken 2607->2609 2610 300054fd 2607->2610 2612 300055e2 2608->2612 2613 300054f0 GetLastError 2609->2613 2614 30005522 GetTokenInformation GetLastError 2609->2614 2611 30005507 GetCurrentProcess OpenProcessToken 2610->2611 2610->2614 2611->2614 2625 300055ac 2611->2625 2612->2575 2613->2610 2613->2625 2615 3000553d 2614->2615 2614->2625 2616 30005551 GlobalAlloc 2615->2616 2617 3000554c 2615->2617 2620 30005561 GetTokenInformation 2616->2620 2616->2625 2617->2620 2618 300055c3 2618->2606 2621 300055c9 GlobalFree 2618->2621 2619 300055ba CloseHandle 2619->2618 2622 30005574 GetLengthSid GlobalAlloc 2620->2622 2620->2625 2621->2606 2623 30005590 CopySid 2622->2623 2622->2625 2624 300055a0 IsValidSid 2623->2624 2623->2625 2624->2625 2625->2618 2625->2619 2627 30005b46 2626->2627 2628 30005b4b 2626->2628 2646 30005a45 ConvertStringSecurityDescriptorToSecurityDescriptorW 2627->2646 2628->2552 2631 30005b5a 2630->2631 2632 30005b5f 2630->2632 2653 30005aae ConvertStringSecurityDescriptorToSecurityDescriptorW 2631->2653 2632->2552 2660 30005916 2634->2660 2682 30005fbb 2637->2682 2641 30005b00 2640->2641 2642 30005b14 2640->2642 2644 30005b0d 2641->2644 2733 30005740 2641->2733 2642->2644 2742 300057c3 2642->2742 2644->2552 2647 30005a86 2646->2647 2648 30005a64 2646->2648 2650 30005a26 2647->2650 2648->2628 2651 30005a36 2650->2651 2652 30005a2f LocalFree 2650->2652 2651->2648 2652->2651 2654 30005aef 2653->2654 2655 30005acd 2653->2655 2657 30005a8f 2654->2657 2655->2632 2658 30005a98 LocalFree 2657->2658 2659 30005a9f 2657->2659 2658->2659 2659->2655 2661 30005989 2660->2661 2662 3000592d LocalAlloc 2660->2662 2661->2552 2662->2661 2663 30005946 2662->2663 2674 3000562e 2663->2674 2666 3000599b 2667 300059a1 LocalFree 2666->2667 2668 300059aa 2666->2668 2667->2668 2669 300059b5 LocalFree 2668->2669 2671 300059ae LocalFree 2668->2671 2669->2661 2670 3000595d LocalAlloc 2670->2666 2672 30005969 InitializeSecurityDescriptor 2670->2672 2671->2669 2672->2666 2673 30005978 SetSecurityDescriptorDacl 2672->2673 2673->2661 2673->2666 2675 3000563f 2674->2675 2681 3000563b 2674->2681 2676 3000547b 19 API calls 2675->2676 2677 30005654 2676->2677 2678 30005677 2677->2678 2679 30005380 7 API calls 2677->2679 2680 30005688 GlobalFree 2678->2680 2678->2681 2679->2678 2680->2681 2681->2666 2681->2669 2681->2670 2683 30005fe1 2682->2683 2691 30005fdd 2682->2691 2692 30005c8e GetCurrentProcess OpenProcessToken 2683->2692 2686 300063f9 4 API calls 2687 3000601c 2686->2687 2687->2538 2691->2686 2693 30005ccb GetTokenInformation 2692->2693 2694 30005cbd GetLastError 2692->2694 2695 30004904 33 API calls 2693->2695 2708 30005cee 2694->2708 2698 30005ce7 2695->2698 2696 30005de0 2702 300048b8 13 API calls 2696->2702 2704 30005df5 2696->2704 2697 30005dd7 CloseHandle 2697->2696 2699 30005cfa GetTokenInformation 2698->2699 2698->2708 2700 30005d18 2699->2700 2701 30005d0d GetLastError 2699->2701 2705 30005d3d CopySid 2700->2705 2706 30005d3b 2700->2706 2701->2708 2702->2704 2703 300048b8 13 API calls 2707 30005d4d 2703->2707 2704->2691 2720 30005b7c GetLengthSid 2704->2720 2705->2706 2706->2703 2707->2708 2709 30004904 33 API calls 2707->2709 2708->2696 2708->2697 2710 30005d69 2709->2710 2710->2708 2711 30005d77 GetTokenInformation 2710->2711 2711->2708 2712 30005d89 GetLastError 2711->2712 2712->2708 2713 30005d99 2712->2713 2714 300048b8 13 API calls 2713->2714 2715 30005da0 2714->2715 2716 30004904 33 API calls 2715->2716 2717 30005da9 2716->2717 2717->2708 2718 30005db8 GetTokenInformation 2717->2718 2718->2708 2719 30005dc9 GetLastError 2718->2719 2719->2708 2721 30004904 33 API calls 2720->2721 2722 30005ba9 2721->2722 2723 30005bb3 2722->2723 2724 30005bba CopySid AddAce CopySid AddAce 2722->2724 2727 300063f9 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 2723->2727 2725 30005c31 CopySid AddAce 2724->2725 2726 30005c52 InitializeSecurityDescriptor SetSecurityDescriptorDacl 2724->2726 2725->2726 2726->2723 2728 30005c8a 2727->2728 2729 300048b8 2728->2729 2730 300048d0 2729->2730 2731 300048c0 2729->2731 2730->2691 2732 30003b96 13 API calls 2731->2732 2732->2730 2751 3000542a 2733->2751 2736 30005765 2737 300057ba 2736->2737 2738 3000576d InitializeSecurityDescriptor 2736->2738 2756 300056bd 2737->2756 2738->2737 2740 3000577a SetSecurityDescriptorDacl 2738->2740 2740->2737 2741 30005793 2740->2741 2741->2644 2743 3000542a 8 API calls 2742->2743 2744 300057d0 LocalAlloc 2743->2744 2745 300057e8 2744->2745 2746 3000583d 2744->2746 2745->2746 2747 300057f0 InitializeSecurityDescriptor 2745->2747 2763 3000570a 2746->2763 2747->2746 2749 300057fd SetSecurityDescriptorDacl 2747->2749 2749->2746 2750 30005816 2749->2750 2750->2644 2752 30005457 2751->2752 2753 30005439 AllocateAndInitializeSid 2751->2753 2755 30005380 7 API calls 2752->2755 2753->2752 2754 30005476 LocalAlloc 2753->2754 2754->2736 2754->2737 2755->2754 2757 300056d0 2756->2757 2758 300056cd LocalFree 2756->2758 2759 300056d9 LocalFree 2757->2759 2760 300056dc 2757->2760 2758->2757 2759->2760 2761 300056e6 FreeSid 2760->2761 2762 300056ed 2760->2762 2761->2762 2762->2741 2764 3000571a LocalFree 2763->2764 2765 3000571d 2763->2765 2764->2765 2766 30005726 LocalFree 2765->2766 2767 30005729 2765->2767 2766->2767 2767->2750 2775 300059ca 2768->2775 2772 30005b75 2771->2772 2773 30005b6f 2771->2773 2772->2561 2774 300048b8 13 API calls 2773->2774 2774->2772 2776 30005a23 2775->2776 2777 300059d7 2775->2777 2776->2561 2777->2776 2778 30005a18 LocalFree 2777->2778 2779 300059ed GetSecurityDescriptorDacl 2777->2779 2778->2776 2780 30005a04 2779->2780 2781 30005a15 LocalFree 2779->2781 2780->2781 2782 30005a10 LocalFree 2780->2782 2781->2778 2782->2781 2784 30004b1e 2783->2784 2785 30004b43 memmove 2784->2785 2786 30004b2b memmove 2784->2786 2785->2569 2786->2569 2850 300067ba 2851 3000642c 2 API calls 2850->2851 2852 300067c4 2851->2852

          Control-flow Graph

          APIs
          • GetSystemTimeAsFileTime.KERNEL32(?), ref: 3000639B
          • GetCurrentProcessId.KERNEL32 ref: 300063A7
          • GetCurrentThreadId.KERNEL32 ref: 300063AF
          • GetTickCount.KERNEL32 ref: 300063B7
          • QueryPerformanceCounter.KERNEL32(?), ref: 300063C3
          • VirtualProtect.KERNELBASE(30021000,00000004,00000002,?), ref: 300063F0
          Memory Dump Source
          • Source File: 00000003.00000002.1277743125.0000000030001000.00000020.00000001.01000000.00000003.sdmp, Offset: 30000000, based on PE: true
          • Associated: 00000003.00000002.1277729671.0000000030000000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000003.00000002.1277761355.0000000030022000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_30000000_mwxZCB2H4p.jbxd
          Similarity
          • API ID: CurrentTime$CountCounterFilePerformanceProcessProtectQuerySystemThreadTickVirtual
          • String ID:
          • API String ID: 3578144274-0
          • Opcode ID: 8fac02294d54af2d6f7fee8b6c82b2f61af91592e7622bcf66e16aa843629162
          • Instruction ID: 11df260ceae8b29d6280bedb760e1141b5dfc48cdb500731cde6777480af3357
          • Opcode Fuzzy Hash: 8fac02294d54af2d6f7fee8b6c82b2f61af91592e7622bcf66e16aa843629162
          • Instruction Fuzzy Hash: F1014F75C101549BFB109BB8DD48BDEB7F8BB0C381F814561E541F7110DBB0DA418BA0

          Control-flow Graph

          APIs
          Memory Dump Source
          • Source File: 00000003.00000002.1277743125.0000000030001000.00000020.00000001.01000000.00000003.sdmp, Offset: 30000000, based on PE: true
          • Associated: 00000003.00000002.1277729671.0000000030000000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000003.00000002.1277761355.0000000030022000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_30000000_mwxZCB2H4p.jbxd
          Similarity
          • API ID: _initterm$HandleModule__p__commode__p__fmode__set_app_type__setusermatherr__wgetmainargs_amsg_exit_cexitexit
          • String ID:
          • API String ID: 1764406085-0
          • Opcode ID: bade154c849e238a6eab98550b20835f2f85d151cc917bf1df54a5e3934e8471
          • Instruction ID: bf6d202744bdbe36a2cf98fbac99a3166b0b65f14fa59b0b048f0dbf8e54f7d3
          • Opcode Fuzzy Hash: bade154c849e238a6eab98550b20835f2f85d151cc917bf1df54a5e3934e8471
          • Instruction Fuzzy Hash: 9741AF78800604DFFB159FA4CD489DD3BB2FB48312F2441EAE111B72A2DB318A86CF21

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 39 30002221-30002249 RegOpenKeyExA 40 3000224b-3000224d 39->40 41 3000224f-30002268 RegQueryValueExA 39->41 42 30002277-30002279 40->42 43 3000226a 41->43 44 3000226c-30002275 RegCloseKey 41->44 43->44 44->42
          APIs
          • RegOpenKeyExA.KERNELBASE(?,?,00000000,00020019,?,?,?,?,30001E69,80000001,Software\Microsoft\PCHealth\ErrorReporting\DW\Debug,DWSensDebugBreak,?,?,?,3000210F), ref: 30002241
          • RegQueryValueExA.ADVAPI32(?,3000627C,00000000,00000000,?,00000004,?,?,?,30001E69,80000001,Software\Microsoft\PCHealth\ErrorReporting\DW\Debug,DWSensDebugBreak,?,?), ref: 30002260
          • RegCloseKey.ADVAPI32(?,?,?,?,30001E69,80000001,Software\Microsoft\PCHealth\ErrorReporting\DW\Debug,DWSensDebugBreak,?,?,?,3000210F,00000000,?,?), ref: 3000226F
          Memory Dump Source
          • Source File: 00000003.00000002.1277743125.0000000030001000.00000020.00000001.01000000.00000003.sdmp, Offset: 30000000, based on PE: true
          • Associated: 00000003.00000002.1277729671.0000000030000000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000003.00000002.1277761355.0000000030022000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_30000000_mwxZCB2H4p.jbxd
          Similarity
          • API ID: CloseOpenQueryValue
          • String ID:
          • API String ID: 3677997916-0
          • Opcode ID: 98c5e58a032f2d10550f57ea51bbc8b568a3ed8696bcb13358c3998ac9c2ea1c
          • Instruction ID: e72310d2c5e027731adb2fe810c3166e07e7f25ed01ed102e14c04f490b609a7
          • Opcode Fuzzy Hash: 98c5e58a032f2d10550f57ea51bbc8b568a3ed8696bcb13358c3998ac9c2ea1c
          • Instruction Fuzzy Hash: AAF05475200218BFFF219FA5DC09FDA7BA8EF04791F108011BE05E50A0D7B1DA10EBA0

          Control-flow Graph

          Memory Dump Source
          • Source File: 00000003.00000002.1277743125.0000000030001000.00000020.00000001.01000000.00000003.sdmp, Offset: 30000000, based on PE: true
          • Associated: 00000003.00000002.1277729671.0000000030000000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000003.00000002.1277761355.0000000030022000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_30000000_mwxZCB2H4p.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 159a93b04ac6c9aba3a3ed6f4735b27782104efed9755a7ebdcefb46e9b5410c
          • Instruction ID: 44a0a38db409ce3025e8bfd26ec9bd1331b2172f26250e15b5dee6f97fd0f933
          • Opcode Fuzzy Hash: 159a93b04ac6c9aba3a3ed6f4735b27782104efed9755a7ebdcefb46e9b5410c
          • Instruction Fuzzy Hash: DE21277D200205B5FA245738CF46DEF26A9EBE2782FA080E5FF04C5496DA30CD82DE21

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 91 3000496f-30004982 DeleteCriticalSection 92 30004992-30004995 91->92 93 30004984-3000498b TlsFree 91->93 93->92
          APIs
          • DeleteCriticalSection.KERNEL32(300200F8,300021D9,00000000,00000000,?,?,?,3000627C,?,?,?), ref: 30004974
          • TlsFree.KERNELBASE(?,?,?,?,3000627C,?,?,?), ref: 30004985
          Memory Dump Source
          • Source File: 00000003.00000002.1277743125.0000000030001000.00000020.00000001.01000000.00000003.sdmp, Offset: 30000000, based on PE: true
          • Associated: 00000003.00000002.1277729671.0000000030000000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000003.00000002.1277761355.0000000030022000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_30000000_mwxZCB2H4p.jbxd
          Similarity
          • API ID: CriticalDeleteFreeSection
          • String ID:
          • API String ID: 3112490556-0
          • Opcode ID: 6dc21dcaa5d283431ffb9faf0a306f403c0327d64e99780780a8aa4b7ec5096c
          • Instruction ID: 56ce12f3485064a29cf6532e5026a44930fe97a4008e76d8c96593b9546f4703
          • Opcode Fuzzy Hash: 6dc21dcaa5d283431ffb9faf0a306f403c0327d64e99780780a8aa4b7ec5096c
          • Instruction Fuzzy Hash: 01C012744716044FF244573CCC8D5C53694B7013327500790F2B2F14F0D72048278B04

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 281 300026b1-300026f2 CoCreateInstance 282 300028e2-300028e7 281->282 283 300026f8-300026fe 281->283 284 300028e9-300028eb 282->284 285 300028ef-300028f4 282->285 286 30002700-30002730 SysAllocString 283->286 287 3000276a-30002781 CoCreateInstance 283->287 284->285 289 300028f6-300028f8 285->289 290 300028fc-30002913 call 300063f9 285->290 295 30002732-30002737 286->295 296 3000273c-30002746 SysAllocString 286->296 287->282 288 30002787-3000279c 287->288 288->282 298 300027a2-300027b2 288->298 289->290 295->282 296->295 297 30002748-30002765 SysFreeString * 2 296->297 297->282 298->282 301 300027b8-300027bd 298->301 302 300027d3-300027d8 301->302 303 300027bf-300027cd 301->303 304 300027da-300027e8 302->304 305 300027ee-300027f3 302->305 303->282 303->302 304->282 304->305 306 300027f5-30002803 305->306 307 30002809-30002819 305->307 306->282 306->307 307->282 312 3000281f-30002832 307->312 312->282 314 30002838-3000283d 312->314 315 30002853-30002858 314->315 316 3000283f-3000284d 314->316 317 3000286a-3000286f 315->317 318 3000285a-30002868 315->318 316->282 316->315 319 30002881-30002891 317->319 320 30002871-3000287f 317->320 318->282 318->317 319->282 325 30002893-300028a3 319->325 320->282 320->319 325->282 327 300028a5-300028b5 325->327 327->282 329 300028b7-300028c6 SysAllocString 327->329 329->295 330 300028cc-300028dc SysFreeString 329->330 330->282
          APIs
          • CoCreateInstance.OLE32(3000184C,00000000,00000015,3000186C,?,00000000), ref: 300026EC
          • SysAllocString.OLEAUT32(EventSystem.EventSubscription), ref: 3000272A
          • SysAllocString.OLEAUT32(?), ref: 30002740
          • SysFreeString.OLEAUT32(00000000), ref: 30002760
          • SysFreeString.OLEAUT32(00000000), ref: 30002763
          • CoCreateInstance.OLE32(3000183C,00000000,00000015,3000185C,?), ref: 3000277B
          Strings
          Memory Dump Source
          • Source File: 00000003.00000002.1277743125.0000000030001000.00000020.00000001.01000000.00000003.sdmp, Offset: 30000000, based on PE: true
          • Associated: 00000003.00000002.1277729671.0000000030000000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000003.00000002.1277761355.0000000030022000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_30000000_mwxZCB2H4p.jbxd
          Similarity
          • API ID: String$AllocCreateFreeInstance
          • String ID: EventSystem.EventSubscription$SubscriptionID=%s
          • API String ID: 391255401-1836528183
          • Opcode ID: 3d83a76a255706bcf4abe030a4f0e3d6d2d9a5bd4cd4973a09a8126a1786b128
          • Instruction ID: 41227285faa855c304defb8b0a60703584d52200c6c4e97aef916ce77eb8d749
          • Opcode Fuzzy Hash: 3d83a76a255706bcf4abe030a4f0e3d6d2d9a5bd4cd4973a09a8126a1786b128
          • Instruction Fuzzy Hash: E281307ED002159FEB24EFB4C88899DB7B9BF48350B6546A8E915EB211DB31AC41CF90
          APIs
          • LocalAlloc.KERNEL32(00000040,0000000C,00000400,00000010,00001000,?,?,00002000,30005E09,00000001,30006098,00000010,00000010,?,00000000,00000000), ref: 30005939
          • LocalAlloc.KERNEL32(00000040,00000014,00000001,0012FFFF,?,?,00002000,30005E09,00000001,30006098,00000010,00000010,?,00000000,00000000), ref: 30005961
          • InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,?,00002000,30005E09,00000001,30006098,00000010,00000010,?,00000000,00000000,?,30004CD2,00000010), ref: 3000596E
          • SetSecurityDescriptorDacl.ADVAPI32(00000000,00000001,00000001,00000000,?,?,00002000,30005E09,00000001,30006098,00000010,00000010,?,00000000,00000000), ref: 3000597F
          • LocalFree.KERNEL32(00000000,00000001,0012FFFF,?,?,00002000,30005E09,00000001,30006098,00000010,00000010,?,00000000,00000000,?,30004CD2), ref: 300059A4
          • LocalFree.KERNEL32(00000000,00000001,0012FFFF,?,?,00002000,30005E09,00000001,30006098,00000010,00000010,?,00000000,00000000,?,30004CD2), ref: 300059AF
          • LocalFree.KERNEL32(00000000,00000001,0012FFFF,?,?,00002000,30005E09,00000001,30006098,00000010,00000010,?,00000000,00000000,?,30004CD2), ref: 300059B6
          Memory Dump Source
          • Source File: 00000003.00000002.1277743125.0000000030001000.00000020.00000001.01000000.00000003.sdmp, Offset: 30000000, based on PE: true
          • Associated: 00000003.00000002.1277729671.0000000030000000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000003.00000002.1277761355.0000000030022000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_30000000_mwxZCB2H4p.jbxd
          Similarity
          • API ID: Local$Free$AllocDescriptorSecurity$DaclInitialize
          • String ID:
          • API String ID: 3712409113-0
          • Opcode ID: c9b30897d8f73feb94afa50b6bcbe7dce1d5b194bd30bbd92d12ba6daf4119d9
          • Instruction ID: 6d4717670917b20b00d179ea403995bc306a8d0698cdd6a4691411a470fbc4be
          • Opcode Fuzzy Hash: c9b30897d8f73feb94afa50b6bcbe7dce1d5b194bd30bbd92d12ba6daf4119d9
          • Instruction Fuzzy Hash: 59218EF9600305EBFB109FEACD85B9BBBF8AF44753F5040A9F605A6190D7B48A41CE60
          APIs
          • SetUnhandledExceptionFilter.KERNEL32(00000000,00000000), ref: 3000634A
          • UnhandledExceptionFilter.KERNEL32(?), ref: 30006354
          • GetCurrentProcess.KERNEL32(00000502), ref: 3000635F
          • TerminateProcess.KERNEL32(00000000), ref: 30006366
          Memory Dump Source
          • Source File: 00000003.00000002.1277743125.0000000030001000.00000020.00000001.01000000.00000003.sdmp, Offset: 30000000, based on PE: true
          • Associated: 00000003.00000002.1277729671.0000000030000000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000003.00000002.1277761355.0000000030022000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_30000000_mwxZCB2H4p.jbxd
          Similarity
          • API ID: ExceptionFilterProcessUnhandled$CurrentTerminate
          • String ID:
          • API String ID: 3231755760-0
          • Opcode ID: 354abe4cd6caa003a76a7c6f5ba21e04975700cd376a9c4fd06629e8243cf827
          • Instruction ID: 126451782bbc3afa6ae03666b403dad4e627d47f2bead6f40a3433848d8bdfe1
          • Opcode Fuzzy Hash: 354abe4cd6caa003a76a7c6f5ba21e04975700cd376a9c4fd06629e8243cf827
          • Instruction Fuzzy Hash: 88111C75A1024C9FEB20DFA4CC49BDCBBB8FF09305F50442AE945AB250EBB49689CF51
          APIs
          • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,3000627C,?,?), ref: 30002441
          • CheckTokenMembership.ADVAPI32(00000000,?,3000627C,?,?,3000627C,?,?,?), ref: 30002456
          • FreeSid.ADVAPI32(?,00000000,?,3000627C,?,?,3000627C,?,?,?), ref: 30002465
          Memory Dump Source
          • Source File: 00000003.00000002.1277743125.0000000030001000.00000020.00000001.01000000.00000003.sdmp, Offset: 30000000, based on PE: true
          • Associated: 00000003.00000002.1277729671.0000000030000000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000003.00000002.1277761355.0000000030022000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_30000000_mwxZCB2H4p.jbxd
          Similarity
          • API ID: AllocateCheckFreeInitializeMembershipToken
          • String ID:
          • API String ID: 3429775523-0
          • Opcode ID: ea2cfc3c73d68b84c06b954f5b3b13817875cf840121ff583ff09447ae00360f
          • Instruction ID: 922f03299b2fbd1e9620aff8536e5e6cf7a744abbef11a0a434deb26c152cfa3
          • Opcode Fuzzy Hash: ea2cfc3c73d68b84c06b954f5b3b13817875cf840121ff583ff09447ae00360f
          • Instruction Fuzzy Hash: E9012175D0028DFEEB01DBE8CD85AEEBBB9BB18244F5440A9E551B3242D2709A04CB65

          Control-flow Graph

          APIs
          • StringFromCLSID.OLE32(?,?,00000000), ref: 30001EEF
          • StringFromCLSID.OLE32(3000180C,?), ref: 30001F12
          • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 30001F2C
          • RegCloseKey.ADVAPI32(?,?,LocalServer32,?,?,?,AppID,?,80000000,?,?,?), ref: 30002026
          • RegCloseKey.ADVAPI32(?,?,TypeLib,?,?), ref: 30002051
          • RegCloseKey.ADVAPI32(?), ref: 30002059
          • RegCloseKey.ADVAPI32(?,?,RunAs,Interactive User,80000000,?,?,?), ref: 30002096
          • CoTaskMemFree.OLE32(?), ref: 300020A4
          • CoTaskMemFree.OLE32(?), ref: 300020AC
          Strings
          Memory Dump Source
          • Source File: 00000003.00000002.1277743125.0000000030001000.00000020.00000001.01000000.00000003.sdmp, Offset: 30000000, based on PE: true
          • Associated: 00000003.00000002.1277729671.0000000030000000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000003.00000002.1277761355.0000000030022000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_30000000_mwxZCB2H4p.jbxd
          Similarity
          • API ID: Close$FreeFromStringTask$FileModuleName
          • String ID: "%s" -%c$AppID$AppID\%s$CLSID\%s$Interactive User$LocalServer32$RunAs$TypeLib
          • API String ID: 1964612919-1905851544
          • Opcode ID: 73fb0a845f269581708e1bdb3888685a042ec97372d097ec8d42131a2a167bb2
          • Instruction ID: b300817e288bff7ed11fea64dd388b2d1021db49372a0b9b3e5193d1c86140d8
          • Opcode Fuzzy Hash: 73fb0a845f269581708e1bdb3888685a042ec97372d097ec8d42131a2a167bb2
          • Instruction Fuzzy Hash: 9451407980061DAAFB219F78CC40EDA77BAAB88254F5045E5E51CE3212DB32DEA5CF50

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 137 30002991-300029bc StringFromIID 138 300029c2-300029d1 SysAllocString 137->138 139 30002b15-30002b16 call 30002916 137->139 141 30002ac6-30002acd 138->141 142 300029d7-300029e1 SysAllocString 138->142 143 30002b1b-30002b22 139->143 141->139 142->141 144 300029e7-300029eb 142->144 145 30002a18-30002a1c 144->145 146 300029ed-300029f1 144->146 149 30002a2b-30002a3d StringFromIID 145->149 150 30002a1e-30002a27 CoTaskMemFree 145->150 147 30002a00-30002a12 StringFromIID 146->147 148 300029f3-300029fc CoTaskMemFree 146->148 147->139 147->145 148->147 149->139 151 30002a43-30002a4d SysAllocString 149->151 150->149 151->141 152 30002a4f-30002a59 SysAllocString 151->152 152->141 153 30002a5b-30002a5f 152->153 154 30002a61-30002a6a CoTaskMemFree 153->154 155 30002a6e-30002a80 StringFromIID 153->155 154->155 155->139 156 30002a86-30002a90 SysAllocString 155->156 156->141 157 30002a92-30002aa3 156->157 158 30002aa5-30002aad SysAllocString 157->158 159 30002aaf-30002aba 157->159 158->141 158->159 160 30002abc-30002ac4 SysAllocString 159->160 161 30002acf-30002ad3 159->161 160->141 160->161 162 30002ad5-30002ad9 161->162 163 30002b0f-30002b13 161->163 164 30002ae8-30002afa StringFromIID 162->164 165 30002adb-30002ae4 CoTaskMemFree 162->165 163->139 163->143 164->139 166 30002afc-30002b06 SysAllocString 164->166 165->164 166->163 167 30002b08 166->167 167->163
          APIs
          • StringFromIID.OLE32(00000000,00000000,00000000,?,?,0000000C,?,30002B48,00000000,300014D4), ref: 300029B1
          • SysAllocString.OLEAUT32(00000000), ref: 300029CB
          • SysAllocString.OLEAUT32(?), ref: 300029DA
          • CoTaskMemFree.OLE32(00000000,?,?,0000000C,?,30002B48,00000000,300014D4), ref: 300029F6
          • StringFromIID.OLE32(?,300014DC,?,?,0000000C,?,30002B48,00000000,300014D4), ref: 30002A07
          • CoTaskMemFree.OLE32(00000000,?,?,0000000C,?,30002B48,00000000,300014D4), ref: 30002A21
          • StringFromIID.OLE32(?,00000000,?,?,0000000C,?,30002B48,00000000,300014D4), ref: 30002A32
          • SysAllocString.OLEAUT32(00000000), ref: 30002A46
          • SysAllocString.OLEAUT32(?), ref: 30002A52
          • CoTaskMemFree.OLE32(00000000,?,?,0000000C,?,30002B48,00000000,300014D4), ref: 30002A64
          • StringFromIID.OLE32(?,00000000,?,?,0000000C,?,30002B48,00000000,300014D4), ref: 30002A75
          • SysAllocString.OLEAUT32(00000000), ref: 30002A89
          • SysAllocString.OLEAUT32(?), ref: 30002AA6
          • SysAllocString.OLEAUT32(?), ref: 30002ABD
          • CoTaskMemFree.OLE32(00000000,?,?,0000000C,?,30002B48,00000000,300014D4), ref: 30002ADE
          • StringFromIID.OLE32(?,00000000,?,?,0000000C,?,30002B48,00000000,300014D4), ref: 30002AEF
          • SysAllocString.OLEAUT32(00000000), ref: 30002AFF
          Memory Dump Source
          • Source File: 00000003.00000002.1277743125.0000000030001000.00000020.00000001.01000000.00000003.sdmp, Offset: 30000000, based on PE: true
          • Associated: 00000003.00000002.1277729671.0000000030000000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000003.00000002.1277761355.0000000030022000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_30000000_mwxZCB2H4p.jbxd
          Similarity
          • API ID: String$Alloc$From$FreeTask
          • String ID:
          • API String ID: 3125492871-0
          • Opcode ID: 021122a8d56543e6e2df7d89bcae87e04d228ca40fa73a6b8810de708ac65a38
          • Instruction ID: c67b52a70400e4d944c63056fdd597d3a4f8cc821544d1cc9237e83584b3cf1f
          • Opcode Fuzzy Hash: 021122a8d56543e6e2df7d89bcae87e04d228ca40fa73a6b8810de708ac65a38
          • Instruction Fuzzy Hash: D9513DB9600209EFEB21DF64C984BDA7BF8FF44781F6081A9E804E6160DB31DA50DF61

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 168 3000547b-300054a1 169 300054a3-300054a5 168->169 170 300054aa-300054c1 168->170 171 300055d7-300055e9 call 300063f9 169->171 172 300054c3-300054c6 170->172 173 300054cc-300054d6 170->173 172->173 175 300055d2-300055d6 172->175 176 300054d8-300054ee GetCurrentThread OpenThreadToken 173->176 177 300054ff-30005501 173->177 175->171 181 300054f0-300054f7 GetLastError 176->181 182 30005522-3000553b GetTokenInformation GetLastError 176->182 178 30005503-30005505 177->178 179 30005507-3000551c GetCurrentProcess OpenProcessToken 177->179 178->179 178->182 179->182 183 300055b3-300055b8 179->183 181->183 185 300054fd 181->185 182->183 184 3000553d-3000554a 182->184 188 300055c3-300055c7 183->188 189 300055ba-300055bd CloseHandle 183->189 186 30005551-3000555f GlobalAlloc 184->186 187 3000554c-3000554f 184->187 185->177 186->183 190 30005561-30005572 GetTokenInformation 186->190 187->190 188->175 191 300055c9-300055cc GlobalFree 188->191 189->188 190->183 192 30005574-3000558e GetLengthSid GlobalAlloc 190->192 191->175 192->183 193 30005590-3000559e CopySid 192->193 193->183 194 300055a0-300055aa IsValidSid 193->194 194->183 195 300055ac 194->195 195->183
          APIs
          • GetCurrentThread.KERNEL32 ref: 300054DF
          • OpenThreadToken.ADVAPI32(00000000), ref: 300054E6
          • GetLastError.KERNEL32 ref: 300054F0
          • GetCurrentProcess.KERNEL32(00000008,?,?,?,00000000), ref: 3000550D
          • OpenProcessToken.ADVAPI32(00000000), ref: 30005514
          • GetTokenInformation.ADVAPI32(?,00000001(TokenIntegrityLevel),00000000,00000000,?), ref: 30005534
          • GetLastError.KERNEL32 ref: 30005536
          • GetTokenInformation.ADVAPI32(?,00000001(TokenIntegrityLevel),00000000,?,?), ref: 3000556E
          • GetLengthSid.ADVAPI32(00000000), ref: 30005576
          • GlobalAlloc.KERNEL32(00000000,00000000), ref: 30005582
          • CopySid.ADVAPI32(?,00000000,00000000), ref: 30005596
          • IsValidSid.ADVAPI32(?), ref: 300055A2
          • CloseHandle.KERNEL32(?), ref: 300055BD
          • GlobalFree.KERNEL32(?), ref: 300055CC
          Memory Dump Source
          • Source File: 00000003.00000002.1277743125.0000000030001000.00000020.00000001.01000000.00000003.sdmp, Offset: 30000000, based on PE: true
          • Associated: 00000003.00000002.1277729671.0000000030000000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000003.00000002.1277761355.0000000030022000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_30000000_mwxZCB2H4p.jbxd
          Similarity
          • API ID: Token$CurrentErrorGlobalInformationLastOpenProcessThread$AllocCloseCopyFreeHandleLengthValid
          • String ID:
          • API String ID: 1685494056-0
          • Opcode ID: bbacf4f8acd7ce60d5bd72377cc8d1dd0b7b52da9aaada4d9a0b4e366bafaa94
          • Instruction ID: 8038317eac703001a456c8241b2f5e933bba7c6799a77b8165797cddf32350fe
          • Opcode Fuzzy Hash: bbacf4f8acd7ce60d5bd72377cc8d1dd0b7b52da9aaada4d9a0b4e366bafaa94
          • Instruction Fuzzy Hash: B3413CB9A006489FFF208FE9CD54BDE7BBAAB04343F610469E545E3151DB719985CF10

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 196 30006577-300065da 197 300065fb-3000661f 196->197 198 300065dc-300065f6 RaiseException 196->198 200 30006621-3000662a 197->200 201 3000662c-30006632 197->201 199 300067b3-300067b7 198->199 202 30006635-3000663e 200->202 201->202 203 30006640-3000664b 202->203 204 30006651-30006653 202->204 203->204 212 30006796-3000679d 203->212 205 30006659-30006660 204->205 206 300066fb-30006705 204->206 210 30006670-3000667d LoadLibraryA 205->210 211 30006662-3000666e 205->211 208 30006711-30006713 206->208 209 30006707-3000670f 206->209 213 30006791-30006794 208->213 214 30006715-30006718 208->214 209->208 215 300066c0-300066cc InterlockedExchange 210->215 216 3000667f-3000668f GetLastError 210->216 211->210 211->215 218 300067b1 212->218 219 3000679f-300067ac 212->219 213->212 221 30006746-30006754 GetProcAddress 214->221 222 3000671a-3000671d 214->222 225 300066f4-300066f5 FreeLibrary 215->225 226 300066ce-300066d2 215->226 223 30006691-3000669d 216->223 224 3000669f-300066bb RaiseException 216->224 218->199 219->218 221->213 228 30006756-30006766 GetLastError 221->228 222->221 227 3000671f-3000672a 222->227 223->215 223->224 224->199 225->206 226->206 229 300066d4-300066e0 LocalAlloc 226->229 227->221 230 3000672c-30006732 227->230 232 30006772-30006774 228->232 233 30006768-30006770 228->233 229->206 234 300066e2-300066f2 229->234 230->221 236 30006734-30006737 230->236 232->213 235 30006776-3000678e RaiseException 232->235 233->232 234->206 235->213 236->221 238 30006739-30006744 236->238 238->213 238->221
          APIs
          • RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 300065EE
          • LoadLibraryA.KERNEL32(?), ref: 30006673
          • GetLastError.KERNEL32 ref: 3000667F
          • RaiseException.KERNEL32(C06D007E,00000000,00000001,?), ref: 300066B2
          Strings
          Memory Dump Source
          • Source File: 00000003.00000002.1277743125.0000000030001000.00000020.00000001.01000000.00000003.sdmp, Offset: 30000000, based on PE: true
          • Associated: 00000003.00000002.1277729671.0000000030000000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000003.00000002.1277761355.0000000030022000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_30000000_mwxZCB2H4p.jbxd
          Similarity
          • API ID: ExceptionRaise$ErrorLastLibraryLoad
          • String ID: $
          • API String ID: 948315288-3993045852
          • Opcode ID: e7b789e35a34ee0a92999283306c252fc26b4138143675a569f446f0ab1bf1a6
          • Instruction ID: 53b0dd82f978d45a4b28bee5d92a36e5cbf81014aa6f1ff23b0c3757a4ab81ce
          • Opcode Fuzzy Hash: e7b789e35a34ee0a92999283306c252fc26b4138143675a569f446f0ab1bf1a6
          • Instruction Fuzzy Hash: DC8139B8A10706AFEB10CFA8C984A9DB7F6AF48345F108069E945E7250EB70E945CF60

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 239 30005c8e-30005cbb GetCurrentProcess OpenProcessToken 240 30005ccb-30005cec GetTokenInformation call 30004904 239->240 241 30005cbd-30005cc6 GetLastError 239->241 249 30005cfa-30005d0b GetTokenInformation 240->249 250 30005cee-30005cf5 240->250 242 30005dcf-30005dd5 241->242 244 30005de0-30005de4 242->244 245 30005dd7-30005dda CloseHandle 242->245 247 30005de6-30005ded 244->247 248 30005dfa 244->248 245->244 252 30005df6-30005df8 247->252 253 30005def-30005df5 call 300048b8 247->253 251 30005dfc-30005dfd 248->251 255 30005d18-30005d23 249->255 256 30005d0d-30005d13 GetLastError 249->256 254 30005dce 250->254 252->251 253->252 254->242 258 30005d25 255->258 259 30005d47-30005d51 call 300048b8 255->259 257 30005dcb 256->257 257->254 261 30005d28-30005d2e 258->261 268 30005d62-30005d71 call 30004904 259->268 269 30005d53-30005d60 259->269 264 30005d30-30005d39 261->264 265 30005d3d-30005d41 CopySid 261->265 264->261 267 30005d3b 264->267 265->259 267->259 268->250 272 30005d77-30005d87 GetTokenInformation 268->272 269->254 272->254 273 30005d89-30005d97 GetLastError 272->273 273->254 274 30005d99-30005db2 call 300048b8 call 30004904 273->274 274->250 279 30005db8-30005dc7 GetTokenInformation 274->279 279->254 280 30005dc9 GetLastError 279->280 280->257
          APIs
          • GetCurrentProcess.KERNEL32(00020008,3002019C,3002019C,00000000,?,00000010,3002019C,00001000,00000010,?,00000400,00000000,00000010,?,?), ref: 30005CAC
          • OpenProcessToken.ADVAPI32(00000000), ref: 30005CB3
          • GetLastError.KERNEL32 ref: 30005CBD
          • GetTokenInformation.ADVAPI32(?,00000002,00000000,00000000,?,00000400), ref: 30005CDD
          • CloseHandle.KERNEL32(?), ref: 30005DDA
          Memory Dump Source
          • Source File: 00000003.00000002.1277743125.0000000030001000.00000020.00000001.01000000.00000003.sdmp, Offset: 30000000, based on PE: true
          • Associated: 00000003.00000002.1277729671.0000000030000000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000003.00000002.1277761355.0000000030022000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_30000000_mwxZCB2H4p.jbxd
          Similarity
          • API ID: ProcessToken$CloseCurrentErrorHandleInformationLastOpen
          • String ID:
          • API String ID: 2078281146-0
          • Opcode ID: 8e0ceb67c9a3d0f612141c2c8957e0c46e9518817d706d51946e9e830ab5325c
          • Instruction ID: 688bee735191ca4cf46520ddbc36f584c11d40eca48ab4514dacb7e9af604686
          • Opcode Fuzzy Hash: 8e0ceb67c9a3d0f612141c2c8957e0c46e9518817d706d51946e9e830ab5325c
          • Instruction Fuzzy Hash: 00411AB990030AEFFB219BE4CD49B9F7BB9EF44392F5080A6E501A6150DB709A41DF64

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 332 30002ce3-30002d6d RegOpenKeyExA 333 30002d73-30002d92 RegQueryInfoKeyW 332->333 334 30002efa-30002efd 332->334 333->334 335 30002d98-30002dad GlobalAlloc 333->335 336 30002f08-30002f11 334->336 337 30002eff-30002f02 RegCloseKey 334->337 335->334 338 30002db3-30002dc1 GlobalAlloc 335->338 339 30002f13-30002f16 GlobalFree 336->339 340 30002f18-30002f1a 336->340 337->336 338->334 341 30002dc7-30002dcd 338->341 339->340 342 30002f1c-30002f1d GlobalFree 340->342 343 30002f1f-30002f37 call 300063f9 340->343 344 30002ec2-30002eca 341->344 345 30002dd3-30002dfe RegEnumValueW 341->345 342->343 350 30002ef3 344->350 351 30002ecc-30002ee0 GetModuleFileNameW 344->351 347 30002eb3-30002ebc 345->347 348 30002e04-30002e08 345->348 347->344 347->345 348->347 352 30002e0e-30002e12 348->352 350->334 351->350 353 30002ee2-30002ef1 call 300024da 351->353 352->347 354 30002e18-30002e1c 352->354 353->350 354->347 356 30002e22-30002e27 354->356 356->347 358 30002e2d-30002e39 call 300025a2 356->358 358->347 361 30002e3b-30002e47 call 300025a2 358->361 361->347 364 30002e49-30002e55 call 300025a2 361->364 364->347 367 30002e57-30002e63 call 300025a2 364->367 367->347 370 30002e65-30002e8d 367->370 370->347 371 30002e8f-30002e9d 370->371 371->334 372 30002e9f-30002eae call 30002ccd 371->372 372->347
          APIs
          • RegOpenKeyExA.ADVAPI32(80000002,Software\Microsoft\PCHealth\ErrorReporting\DW\Installed,00000000,00020019,?,?,?,00000000), ref: 30002D65
          • RegQueryInfoKeyW.ADVAPI32(?,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,00000000,00000000), ref: 30002D8A
          • GlobalAlloc.KERNEL32(00000040,?), ref: 30002DA6
          • GlobalAlloc.KERNEL32(00000040,?), ref: 30002DBB
          • RegEnumValueW.ADVAPI32(?,?,00000000,?,00000000,?,?,?), ref: 30002DF6
          • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 30002ED8
          • RegCloseKey.ADVAPI32(?), ref: 30002F02
          • GlobalFree.KERNEL32(?), ref: 30002F16
          • GlobalFree.KERNEL32(00000000), ref: 30002F1D
          Strings
          • Software\Microsoft\PCHealth\ErrorReporting\DW\Installed, xrefs: 30002D3B
          Memory Dump Source
          • Source File: 00000003.00000002.1277743125.0000000030001000.00000020.00000001.01000000.00000003.sdmp, Offset: 30000000, based on PE: true
          • Associated: 00000003.00000002.1277729671.0000000030000000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000003.00000002.1277761355.0000000030022000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_30000000_mwxZCB2H4p.jbxd
          Similarity
          • API ID: Global$AllocFree$CloseEnumFileInfoModuleNameOpenQueryValue
          • String ID: Software\Microsoft\PCHealth\ErrorReporting\DW\Installed
          • API String ID: 1931873285-2133074477
          • Opcode ID: f662a505219e7f4d2a257bcecd217b9e473783f98f83704c02b632d910dddbed
          • Instruction ID: 3507eca0f8456b23bc5a46b6c30e138068266594023367426bc09d4a0f2510e4
          • Opcode Fuzzy Hash: f662a505219e7f4d2a257bcecd217b9e473783f98f83704c02b632d910dddbed
          • Instruction Fuzzy Hash: 14615779D002689BEB11DFA8CD81AEEBBF9FF48741F10406AE909EB241D7708941CF50

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 374 30002916-30002927 375 30002929-3000292a SysFreeString 374->375 376 3000292c-30002931 374->376 375->376 377 30002933-30002934 SysFreeString 376->377 378 30002936-3000293b 376->378 377->378 379 30002940-30002945 378->379 380 3000293d-3000293e SysFreeString 378->380 381 30002947-30002948 SysFreeString 379->381 382 3000294a-3000294f 379->382 380->379 381->382 383 30002951-30002952 SysFreeString 382->383 384 30002954-30002959 382->384 383->384 385 3000295b-3000295c SysFreeString 384->385 386 3000295e-30002963 384->386 385->386 387 30002965-30002966 SysFreeString 386->387 388 30002968-3000296d 386->388 387->388 389 30002972-30002976 388->389 390 3000296f-30002970 SysFreeString 388->390 391 30002978-30002979 SysFreeString 389->391 392 3000297b-30002980 389->392 390->389 391->392 393 30002982-30002983 SysFreeString 392->393 394 30002985-3000298e 392->394 393->394
          APIs
          • SysFreeString.OLEAUT32(?), ref: 3000292A
          • SysFreeString.OLEAUT32(?), ref: 30002934
          • SysFreeString.OLEAUT32(?), ref: 3000293E
          • SysFreeString.OLEAUT32(?), ref: 30002948
          • SysFreeString.OLEAUT32(?), ref: 30002952
          • SysFreeString.OLEAUT32(?), ref: 3000295C
          • SysFreeString.OLEAUT32(?), ref: 30002966
          • SysFreeString.OLEAUT32(?), ref: 30002970
          • SysFreeString.OLEAUT32(?), ref: 30002979
          • SysFreeString.OLEAUT32(?), ref: 30002983
          Memory Dump Source
          • Source File: 00000003.00000002.1277743125.0000000030001000.00000020.00000001.01000000.00000003.sdmp, Offset: 30000000, based on PE: true
          • Associated: 00000003.00000002.1277729671.0000000030000000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000003.00000002.1277761355.0000000030022000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_30000000_mwxZCB2H4p.jbxd
          Similarity
          • API ID: FreeString
          • String ID:
          • API String ID: 3341692771-0
          • Opcode ID: c00f409bc2b23f6e3adb3d0b6cc0e7478bed45dd5d19d85d8190bca927cda8dc
          • Instruction ID: d221ab350e67c414e6d36e4c5208e979429c06a0f8ed8f4d733d77d93c573bf7
          • Opcode Fuzzy Hash: c00f409bc2b23f6e3adb3d0b6cc0e7478bed45dd5d19d85d8190bca927cda8dc
          • Instruction Fuzzy Hash: 8701A5B9B2062667EA04DE7ACC44E17A7ECBF18691F404967A904E3640DB74E851CEB0
          APIs
          • GetLengthSid.ADVAPI32(3002019C,00000400,3002019C,00000000), ref: 30005B97
          • CopySid.ADVAPI32(0000000C,?,30001780), ref: 30005BED
          • AddAce.ADVAPI32(00000000,00000002,00000000,00000000,00000014), ref: 30005C03
          • CopySid.ADVAPI32(?,?,3002019C), ref: 30005C19
          • AddAce.ADVAPI32(00000000,00000002,00000001,00000000,00000014), ref: 30005C29
          • CopySid.ADVAPI32(00000014,?,00000000), ref: 30005C40
          • AddAce.ADVAPI32(00000000,00000002,00000002,00000000,0000001C), ref: 30005C50
          • InitializeSecurityDescriptor.ADVAPI32(?,00000001), ref: 30005C5B
          • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,00000000,00000000), ref: 30005C67
          Memory Dump Source
          • Source File: 00000003.00000002.1277743125.0000000030001000.00000020.00000001.01000000.00000003.sdmp, Offset: 30000000, based on PE: true
          • Associated: 00000003.00000002.1277729671.0000000030000000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000003.00000002.1277761355.0000000030022000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_30000000_mwxZCB2H4p.jbxd
          Similarity
          • API ID: Copy$DescriptorSecurity$DaclInitializeLength
          • String ID:
          • API String ID: 2245498950-0
          • Opcode ID: 639bbe6597734c5f74fbb1456c11c0a5bcc8447c3d67d951aac975840b28cc5a
          • Instruction ID: 67b798cd6c03a02faf8c424ad62b1f5c0467c3b13d8f09795df420a43be88894
          • Opcode Fuzzy Hash: 639bbe6597734c5f74fbb1456c11c0a5bcc8447c3d67d951aac975840b28cc5a
          • Instruction Fuzzy Hash: F1313976900258AEEB10DBE8CC85FEEB7B9FF08704F004019F644AB294D7B4A945CBA4
          APIs
          • Sleep.KERNEL32(?,WatsonLaunchQueuedReportingInstanceVerification,00000000,?,00000000), ref: 30002FA1
          • SystemParametersInfoW.USER32(00000072,00000000,?,00000000), ref: 30002FEF
          • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,04000020,00000000,00000000,?,?), ref: 30003029
          • CloseHandle.KERNEL32(?), ref: 3000303C
          • CloseHandle.KERNEL32(?), ref: 30003041
          Strings
          • "%s" -%c %u, xrefs: 30002FD0
          • WatsonLaunchQueuedReportingInstanceVerification, xrefs: 30002F7B
          Memory Dump Source
          • Source File: 00000003.00000002.1277743125.0000000030001000.00000020.00000001.01000000.00000003.sdmp, Offset: 30000000, based on PE: true
          • Associated: 00000003.00000002.1277729671.0000000030000000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000003.00000002.1277761355.0000000030022000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_30000000_mwxZCB2H4p.jbxd
          Similarity
          • API ID: CloseHandle$CreateInfoParametersProcessSleepSystem
          • String ID: "%s" -%c %u$WatsonLaunchQueuedReportingInstanceVerification
          • API String ID: 814004605-2471467298
          • Opcode ID: 07d88c0d3db1c50fefa6e5078cac2ef5d0e52874d3c0daa446c7954740091923
          • Instruction ID: e4668d9b24eb9e519d74748c4eb0d9f513fc3556074953cb048c2130cceabf1e
          • Opcode Fuzzy Hash: 07d88c0d3db1c50fefa6e5078cac2ef5d0e52874d3c0daa446c7954740091923
          • Instruction Fuzzy Hash: 253181B6900249ABFB219FA8CC80FEEB7BCFB44785F004076FA14E6050D7749A458F61
          APIs
          • GetSystemWindowsDirectoryW.KERNEL32(?,00000104), ref: 30002349
          • GetLastError.KERNEL32 ref: 30002357
          • SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001C,00000001,00000000,00000000), ref: 30002365
          Strings
          Memory Dump Source
          • Source File: 00000003.00000002.1277743125.0000000030001000.00000020.00000001.01000000.00000003.sdmp, Offset: 30000000, based on PE: true
          • Associated: 00000003.00000002.1277729671.0000000030000000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000003.00000002.1277761355.0000000030022000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_30000000_mwxZCB2H4p.jbxd
          Similarity
          • API ID: DirectoryErrorFolderLastPathSpecialSystemWindows
          • String ID: QHeadles$QRegular$QSignoff$\PCHealth\ErrorRep\
          • API String ID: 1271361848-655368766
          • Opcode ID: 536bd71dacbe62af0b2105a362e94b31f11d990e2154188139f3f6b363005a17
          • Instruction ID: 89d0300be4e9681b0d304a197570d96af9c4878eaa698e89a0132c3bfcb723bb
          • Opcode Fuzzy Hash: 536bd71dacbe62af0b2105a362e94b31f11d990e2154188139f3f6b363005a17
          • Instruction Fuzzy Hash: 941191BDA00214AAFB20DBA5CD49EDF77ADAB80381F5440F1FA54E2051D778CB828E61
          APIs
          • TlsGetValue.KERNEL32(?,?,?,00000400,%s\%s,300030D6,?,?,?,?,?,?,300034EA,?,?,00000007), ref: 30003682
          • VirtualAlloc.KERNEL32(00000000,00010000,00002000,00000001,?,?,?,00000400,%s\%s,300030D6,?,?,?), ref: 300036A1
          • VirtualAlloc.KERNEL32(00000000,00001000,00001000,00000004,?,00000400,%s\%s,300030D6,?,?,?,?,?,?,300034EA,?), ref: 300036B6
          • VirtualFree.KERNEL32(00000000,00000000,00008000,?,00000400,%s\%s,300030D6,?,?,?,?,?,?,300034EA,?,?), ref: 300036C3
          • SetLastError.KERNEL32(E004000E,?,?,?,00000400,%s\%s,300030D6,?,?,?,?,?,?,300034EA,?,?), ref: 300036CE
          Strings
          Memory Dump Source
          • Source File: 00000003.00000002.1277743125.0000000030001000.00000020.00000001.01000000.00000003.sdmp, Offset: 30000000, based on PE: true
          • Associated: 00000003.00000002.1277729671.0000000030000000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000003.00000002.1277761355.0000000030022000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_30000000_mwxZCB2H4p.jbxd
          Similarity
          • API ID: Virtual$Alloc$ErrorFreeLastValue
          • String ID: %s\%s
          • API String ID: 4245389849-4073750446
          • Opcode ID: 9524400c63249e0ee33b440f964f39d0508656bb1c4c019a257f82fcc06b6753
          • Instruction ID: b9f88ce34c395662b239ff648255eb491fb56056d1d5681c363ea2ccccd03411
          • Opcode Fuzzy Hash: 9524400c63249e0ee33b440f964f39d0508656bb1c4c019a257f82fcc06b6753
          • Instruction Fuzzy Hash: 1F21B67A3517016BE3218F78CC45B96B7D8FF887A1F108429F685E7384D7B1E8518B58
          APIs
          • RegOpenKeyExA.ADVAPI32(300034EA,?,00000000,00020019,?,00000400,%s\%s,?,?,?,?,?,?,300034EA,?,?), ref: 30003140
          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000,?,?,?,?,00000001,?,?), ref: 300031CC
          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000,00000001,00000106,?,?,?,300034EA,?,?,00000007), ref: 300031F4
          • RegCloseKey.ADVAPI32(300034EA,?,?,?,300034EA,?,?,00000007), ref: 30003238
          • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,?,?,?), ref: 3000328E
          Strings
          Memory Dump Source
          • Source File: 00000003.00000002.1277743125.0000000030001000.00000020.00000001.01000000.00000003.sdmp, Offset: 30000000, based on PE: true
          • Associated: 00000003.00000002.1277729671.0000000030000000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000003.00000002.1277761355.0000000030022000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_30000000_mwxZCB2H4p.jbxd
          Similarity
          • API ID: ByteCharMultiWide$CloseOpenQueryValue
          • String ID: %s\%s
          • API String ID: 2332129513-4073750446
          • Opcode ID: 150e814412e7ab463edfcb51dfc0dd6e459caf32c0aab5c59e2d8622d6e7dfe8
          • Instruction ID: 255e06dd66fd44ab97a1a15d1bdc8021275e37874a56ea5387ae4d6888743505
          • Opcode Fuzzy Hash: 150e814412e7ab463edfcb51dfc0dd6e459caf32c0aab5c59e2d8622d6e7dfe8
          • Instruction Fuzzy Hash: 4D514DB9900209AFFB12DFA4CD80AAEBBBDFF44381F5045A9E911A7241D7709A41CF94
          APIs
          • LocalFree.KERNEL32(00000000,00000010,?,?,Global\,?,?,00000010,00000000,00000000,00000010,00000010,?,30004C89,?,00000400), ref: 30005FAB
          Strings
          Memory Dump Source
          • Source File: 00000003.00000002.1277743125.0000000030001000.00000020.00000001.01000000.00000003.sdmp, Offset: 30000000, based on PE: true
          • Associated: 00000003.00000002.1277729671.0000000030000000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000003.00000002.1277761355.0000000030022000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_30000000_mwxZCB2H4p.jbxd
          Similarity
          • API ID: FreeLocal
          • String ID: 1108160$Global\$Local\
          • API String ID: 2826327444-498314252
          • Opcode ID: 01c80c257b6c1ffe170beffa19e21cced68ca84e4a3cd4397e78a4506520511a
          • Instruction ID: eda10ca7200ed2fa86937721c4ebc3f2d022d212f419d58223fac26495087823
          • Opcode Fuzzy Hash: 01c80c257b6c1ffe170beffa19e21cced68ca84e4a3cd4397e78a4506520511a
          • Instruction Fuzzy Hash: 5C3191FC50520AEAFB108B95CE45FEF7BAC9F81393F5040E5B84596191D7788E40CE60
          APIs
          • CoInitializeEx.OLE32(00000000,00000000,00000000,?,3000218E,?,00000000,00000000,?,?,?,3000627C,?,?,?), ref: 30001D59
          • LoadRegTypeLib.OLEAUT32(3000180C,00000001,00000000,00000000,300080D8), ref: 30001D78
          • LoadTypeLib.OLEAUT32(SENS.DLL,300080D8), ref: 30001D88
          • CreateEventW.KERNEL32(00000000,00000000,00000000,00000000,?,3000218E,?,00000000,00000000,?,?,?,3000627C,?,?,?), ref: 30001DB3
          • CoRegisterClassObject.OLE32(300014B4,00000000,00000004,00000001,?,?,3000218E,?,00000000,00000000,?,?,?,3000627C,?,?), ref: 30001DF0
          Strings
          Memory Dump Source
          • Source File: 00000003.00000002.1277743125.0000000030001000.00000020.00000001.01000000.00000003.sdmp, Offset: 30000000, based on PE: true
          • Associated: 00000003.00000002.1277729671.0000000030000000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000003.00000002.1277761355.0000000030022000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_30000000_mwxZCB2H4p.jbxd
          Similarity
          • API ID: LoadType$ClassCreateEventInitializeObjectRegister
          • String ID: SENS.DLL
          • API String ID: 3188726877-4135673654
          • Opcode ID: 8b01ec1562faf7c9d63de80ac13c8446097a3c8949171a2ecb4b21d5e5c7b226
          • Instruction ID: 1556beaa34c13070fd5aba915cdacb4635af489b079b3a71bc8aa5fdbdc433ac
          • Opcode Fuzzy Hash: 8b01ec1562faf7c9d63de80ac13c8446097a3c8949171a2ecb4b21d5e5c7b226
          • Instruction Fuzzy Hash: 3811C83D6002516BF320276ECC8CEDB6AA8FBC5752B1005EAF616F3151DA304C42CF61
          APIs
          • RegOpenKeyExW.ADVAPI32(?,?,00000000,0002000E,?,77331A70), ref: 30001C9A
          • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?,00000000,80000000), ref: 30001CEF
          • RegCloseKey.ADVAPI32(?), ref: 30001CF8
          • RegDeleteKeyW.ADVAPI32(?,?), ref: 30001D0A
          Memory Dump Source
          • Source File: 00000003.00000002.1277743125.0000000030001000.00000020.00000001.01000000.00000003.sdmp, Offset: 30000000, based on PE: true
          • Associated: 00000003.00000002.1277729671.0000000030000000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000003.00000002.1277761355.0000000030022000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_30000000_mwxZCB2H4p.jbxd
          Similarity
          • API ID: CloseDeleteEnumOpen
          • String ID:
          • API String ID: 4142876296-0
          • Opcode ID: 28eb97eb10d64a9cf1504055db17c6f866e193078e21b00a78a699924d4b62f2
          • Instruction ID: eb9f555dfa9584b00647773d30ffff7018d7e5b68c84de5dd35ab6f47b657501
          • Opcode Fuzzy Hash: 28eb97eb10d64a9cf1504055db17c6f866e193078e21b00a78a699924d4b62f2
          • Instruction Fuzzy Hash: E621BE3A550018ABFB328B99CC44EEE7BBAFB45381F20013AF144E2050C6758A448FA1
          APIs
            • Part of subcall function 3000532C: GetLengthSid.ADVAPI32(00000010,00000400,00000000,?,?,30005397,?,00000000,00000400,?,00000000,00000000,00000000,?,3000562A,00000000), ref: 3000534D
            • Part of subcall function 3000532C: GetLengthSid.ADVAPI32(00000000,00000400,00000000,?,?,30005397,?,00000000,00000400,?,00000000,00000000,00000000,?,3000562A,00000000), ref: 3000536B
          • LocalAlloc.KERNEL32(00000040,00000000,?,?,00000000), ref: 3000539F
          • InitializeAcl.ADVAPI32(00000000,00000000,00000002), ref: 300053B0
          • AddAccessDeniedAce.ADVAPI32(?,00000002,?,00000400), ref: 300053D1
          • AddAccessAllowedAce.ADVAPI32(?,00000002,?,00000000), ref: 30005400
          • LocalFree.KERNEL32(?), ref: 3000541B
          Memory Dump Source
          • Source File: 00000003.00000002.1277743125.0000000030001000.00000020.00000001.01000000.00000003.sdmp, Offset: 30000000, based on PE: true
          • Associated: 00000003.00000002.1277729671.0000000030000000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000003.00000002.1277761355.0000000030022000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_30000000_mwxZCB2H4p.jbxd
          Similarity
          • API ID: AccessLengthLocal$AllocAllowedDeniedFreeInitialize
          • String ID:
          • API String ID: 3760554596-0
          • Opcode ID: c3788279623d67b87988b983ba2f9ba8256efb3afb3f68182881f4a39f09d575
          • Instruction ID: 200db9d3af4f875376c74cd1e556da70e245ef8de6150f9a68792405cccb7285
          • Opcode Fuzzy Hash: c3788279623d67b87988b983ba2f9ba8256efb3afb3f68182881f4a39f09d575
          • Instruction Fuzzy Hash: 79216D7A600209EBEB108F99DD45ECF3BA5FF44396F508064FA05A6051D771DE90DFA0
          APIs
          • GetShortPathNameW.KERNEL32(?,00000000,00000104), ref: 30002534
          • GetShortPathNameW.KERNEL32(30002EF1,00000000,00000104), ref: 30002545
          • GetLongPathNameW.KERNEL32(?,00000000,00000104), ref: 3000255C
          • GetLongPathNameW.KERNEL32(30002EF1,00000000,00000104), ref: 3000256D
          • lstrcmpiW.KERNEL32(?,30002EF1), ref: 30002589
          Memory Dump Source
          • Source File: 00000003.00000002.1277743125.0000000030001000.00000020.00000001.01000000.00000003.sdmp, Offset: 30000000, based on PE: true
          • Associated: 00000003.00000002.1277729671.0000000030000000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000003.00000002.1277761355.0000000030022000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_30000000_mwxZCB2H4p.jbxd
          Similarity
          • API ID: NamePath$LongShort$lstrcmpi
          • String ID:
          • API String ID: 246120216-0
          • Opcode ID: 681f5e6c64611c32aba7e03da15d2b8581963916148ab956dcdf59028344d6a9
          • Instruction ID: 0ef3a4fea0816cdb84ab855972c836ae1f07a1650c2eb8ea0b92b99d898f47c9
          • Opcode Fuzzy Hash: 681f5e6c64611c32aba7e03da15d2b8581963916148ab956dcdf59028344d6a9
          • Instruction Fuzzy Hash: 67211AB690011DBAEF10DB68CC00EDA77BDAB84791F1081B1AA09E2151D7719F968FA4
          APIs
          • RegCreateKeyExW.ADVAPI32(?,?,00000000,00000000,00000000,00020006,00000000,?,00000000,00000000,?,?,30001FCC,80000000,?,?), ref: 30001BAB
          • lstrlenW.KERNEL32(80000000,77331A70,?,?,30001FCC,80000000,?,?,?), ref: 30001BCC
          • RegSetValueExW.ADVAPI32(?,00000000,00000000,00000001,80000000,?,?,?,30001FCC,80000000,?,?,?), ref: 30001BE1
          • RegCloseKey.ADVAPI32(?,?,?,30001FCC,80000000,?,?,?), ref: 30001BF0
          Memory Dump Source
          • Source File: 00000003.00000002.1277743125.0000000030001000.00000020.00000001.01000000.00000003.sdmp, Offset: 30000000, based on PE: true
          • Associated: 00000003.00000002.1277729671.0000000030000000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000003.00000002.1277761355.0000000030022000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_30000000_mwxZCB2H4p.jbxd
          Similarity
          • API ID: CloseCreateValuelstrlen
          • String ID:
          • API String ID: 1356686001-0
          • Opcode ID: 7d46ea247ac5aee40a05e76a2a2bea65ee6952422e1f9ada60124291dfa35c86
          • Instruction ID: 916e8b37f432a8e7600be89b34e6340481100b41d0f624dbd16db17707b5ec0a
          • Opcode Fuzzy Hash: 7d46ea247ac5aee40a05e76a2a2bea65ee6952422e1f9ada60124291dfa35c86
          • Instruction Fuzzy Hash: 3A118C7A890245FFFB229F49CD49EDF7ABAFB85742F2005A4F901A2060D371CE50EA50
          APIs
          • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,04000020,00000000,00000000,?,?), ref: 30002680
          • CloseHandle.KERNEL32(?), ref: 30002693
          • CloseHandle.KERNEL32(?), ref: 30002698
          Strings
          Memory Dump Source
          • Source File: 00000003.00000002.1277743125.0000000030001000.00000020.00000001.01000000.00000003.sdmp, Offset: 30000000, based on PE: true
          • Associated: 00000003.00000002.1277729671.0000000030000000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000003.00000002.1277761355.0000000030022000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_30000000_mwxZCB2H4p.jbxd
          Similarity
          • API ID: CloseHandle$CreateProcess
          • String ID: "%s" -%c %u
          • API String ID: 2922976086-3398570252
          • Opcode ID: b8046e4fc200d74aa5204b274180d38b6f27edaa3ac3e17843fbbde8a947b1bd
          • Instruction ID: 87cb4e9514ecaa785e5d434f5ef3247a1c3dfa5b67e6179cf5ee4315f3ccb75c
          • Opcode Fuzzy Hash: b8046e4fc200d74aa5204b274180d38b6f27edaa3ac3e17843fbbde8a947b1bd
          • Instruction Fuzzy Hash: 24118E72D40158BBEB219F98DC44BDEBBBCEF08310F00042AFA09B2090DA715649CF95
          APIs
          • RegOpenKeyExA.ADVAPI32(?,?,00000000,00020019,?,?,?,?,300035A0,?,?,?), ref: 30003405
          • RegQueryValueExW.ADVAPI32(?,DWReporteeName,00000000,?,?,?,?), ref: 3000342E
          • RegCloseKey.ADVAPI32(?), ref: 30003444
          Strings
          Memory Dump Source
          • Source File: 00000003.00000002.1277743125.0000000030001000.00000020.00000001.01000000.00000003.sdmp, Offset: 30000000, based on PE: true
          • Associated: 00000003.00000002.1277729671.0000000030000000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000003.00000002.1277761355.0000000030022000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_30000000_mwxZCB2H4p.jbxd
          Similarity
          • API ID: CloseOpenQueryValue
          • String ID: DWReporteeName
          • API String ID: 3677997916-1508577061
          • Opcode ID: d977a4c8ee013e26ca43423e26bfa5e68c1eeef2e4ee7c73f1beebc4b1840256
          • Instruction ID: a984096e3261fa005aa707964966b4786dee8c5b9d15361142fa8b44361b1762
          • Opcode Fuzzy Hash: d977a4c8ee013e26ca43423e26bfa5e68c1eeef2e4ee7c73f1beebc4b1840256
          • Instruction Fuzzy Hash: 2301047A900118BBEB02DFA4CC44BEEBBBCFF04681F0040A6FA05E9050E370EA559F95
          APIs
          • EnterCriticalSection.KERNEL32(300200F8,?,0000FFFF,?,?,?,00000000), ref: 30003DC7
          • VirtualFree.KERNEL32(?,?,00004000,?,?,?,300037C6), ref: 30003E33
            • Part of subcall function 30003B96: EnterCriticalSection.KERNEL32(300200F8,?,?,?,?,?,?,0000FFFF,?,?,00000000), ref: 30003BB5
            • Part of subcall function 30003B96: LeaveCriticalSection.KERNEL32(300200F8,?,?,?,?,?,?,?,0000FFFF,?,?,00000000), ref: 30003BCF
          • LeaveCriticalSection.KERNEL32(300200F8,?,?,?,300037C6), ref: 30003E5D
          • LeaveCriticalSection.KERNEL32(300200F8,?,?,?,300037C6), ref: 30003E85
          • LeaveCriticalSection.KERNEL32(300200F8,?,?,?,?,?,300037C6), ref: 30003E9F
          Memory Dump Source
          • Source File: 00000003.00000002.1277743125.0000000030001000.00000020.00000001.01000000.00000003.sdmp, Offset: 30000000, based on PE: true
          • Associated: 00000003.00000002.1277729671.0000000030000000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000003.00000002.1277761355.0000000030022000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_30000000_mwxZCB2H4p.jbxd
          Similarity
          • API ID: CriticalSection$Leave$Enter$FreeVirtual
          • String ID:
          • API String ID: 2516882-0
          • Opcode ID: 0c052424f8d9f771545d40fe34cc270a0bd482952c98fb90f340fc28b759a1e0
          • Instruction ID: f2db9b200dcc5711f0ea08f19900ffda23a02e18175b4ef754c55ceae3e05013
          • Opcode Fuzzy Hash: 0c052424f8d9f771545d40fe34cc270a0bd482952c98fb90f340fc28b759a1e0
          • Instruction Fuzzy Hash: BA21D57A6106018FE310CB2CDD84ADA73A8FBC4721F5446AEE99593691DB30E90ECF95
          APIs
          • EnterCriticalSection.KERNEL32(300200F8,?,00000000,?,30003EF9,00000000,?,?,?,00000000,?,300044C0,?,?,00000000), ref: 30003AA1
          • VirtualFree.KERNEL32(?,?,00004000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 30003B0D
          • VirtualAlloc.KERNEL32(?,?,00001000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 30003B58
          • LeaveCriticalSection.KERNEL32(300200F8,?,?,?,?,?,?,?,?,?,?,00000000), ref: 30003B77
          • LeaveCriticalSection.KERNEL32(300200F8,?,?,?,?,?,?,?,?,?,?,00000000), ref: 30003B8A
          Memory Dump Source
          • Source File: 00000003.00000002.1277743125.0000000030001000.00000020.00000001.01000000.00000003.sdmp, Offset: 30000000, based on PE: true
          • Associated: 00000003.00000002.1277729671.0000000030000000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000003.00000002.1277761355.0000000030022000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_30000000_mwxZCB2H4p.jbxd
          Similarity
          • API ID: CriticalSection$LeaveVirtual$AllocEnterFree
          • String ID:
          • API String ID: 863552159-0
          • Opcode ID: fca38df62bfb575a71c16dd66f06b67a695b7b4d00753fc22c4ab5b9f5456a2a
          • Instruction ID: e00e603d9185e8abf18b530c6392621ff5f1d3204beb55f3e7e74f52507c0826
          • Opcode Fuzzy Hash: fca38df62bfb575a71c16dd66f06b67a695b7b4d00753fc22c4ab5b9f5456a2a
          • Instruction Fuzzy Hash: 0321257A71021247F7124B38CD88BE9328DFF84685F1080B9F641DA686CB28C8448B98
          APIs
          • GetSecurityDescriptorDacl.ADVAPI32(?,00000010,00000010,30004D02,00000000,00000000,00000010,30004D02,00000010,00000010), ref: 300059FA
          • LocalFree.KERNEL32(00000000), ref: 30005A13
          • LocalFree.KERNEL32(?), ref: 30005A16
          • LocalFree.KERNEL32(00000010,00000000,00000000,00000010,30004D02,00000010,00000010), ref: 30005A19
          Memory Dump Source
          • Source File: 00000003.00000002.1277743125.0000000030001000.00000020.00000001.01000000.00000003.sdmp, Offset: 30000000, based on PE: true
          • Associated: 00000003.00000002.1277729671.0000000030000000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000003.00000002.1277761355.0000000030022000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_30000000_mwxZCB2H4p.jbxd
          Similarity
          • API ID: FreeLocal$DaclDescriptorSecurity
          • String ID:
          • API String ID: 3714201794-0
          • Opcode ID: e0306ccd0b35fc2a301d882c1de5dbd9e6b4d16a5a20948f9d55c1e3b7a5d8b1
          • Instruction ID: e40335537097e2948b3b2103fdde71d335907b32a0e4c0076524392238cf5652
          • Opcode Fuzzy Hash: e0306ccd0b35fc2a301d882c1de5dbd9e6b4d16a5a20948f9d55c1e3b7a5d8b1
          • Instruction Fuzzy Hash: 81F062B9A10108ABEB01CB98CCC0BDBBBFCAB49252F5001A6A504A2050D774DA40CEA1
          APIs
          • CoInitializeEx.OLE32(00000000,00000000,300021AF,00000000,00000000,00000000,?,?,?,3000627C,?,?,?), ref: 300020C6
            • Part of subcall function 30001E79: StringFromCLSID.OLE32(?,?,00000000), ref: 30001EEF
            • Part of subcall function 30001E79: StringFromCLSID.OLE32(3000180C,?), ref: 30001F12
            • Part of subcall function 30001E79: GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 30001F2C
            • Part of subcall function 30001E79: CoTaskMemFree.OLE32(?), ref: 300020A4
            • Part of subcall function 30001E79: CoTaskMemFree.OLE32(?), ref: 300020AC
          • CoUninitialize.OLE32(300014B4,Watson subscriber for SENS Network Events,?,?,?,?,3000627C,?,?,?), ref: 300020F8
          Strings
          • Watson subscriber for SENS Network Events, xrefs: 300020D4
          Memory Dump Source
          • Source File: 00000003.00000002.1277743125.0000000030001000.00000020.00000001.01000000.00000003.sdmp, Offset: 30000000, based on PE: true
          • Associated: 00000003.00000002.1277729671.0000000030000000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000003.00000002.1277761355.0000000030022000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_30000000_mwxZCB2H4p.jbxd
          Similarity
          • API ID: FreeFromStringTask$FileInitializeModuleNameUninitialize
          • String ID: Watson subscriber for SENS Network Events
          • API String ID: 1584965148-3738983962
          • Opcode ID: e2c056d69706eed87d56bfe5b39b6b2400910484a65b79807fd0323d1efeebec
          • Instruction ID: af8331119152a650146a984f67a689676209e4a95b598227ff06697a7a212e6c
          • Opcode Fuzzy Hash: e2c056d69706eed87d56bfe5b39b6b2400910484a65b79807fd0323d1efeebec
          • Instruction Fuzzy Hash: D1D0173D698381AAF6545BB8CF09BDA39986F84B81F4084A47B01E51A2DA60C100EE22
          APIs
          • EnterCriticalSection.KERNEL32(300200F8,?,?,?,?,?,?,0000FFFF,?,?,00000000), ref: 30003BB5
          • LeaveCriticalSection.KERNEL32(300200F8,?,?,?,?,?,?,?,0000FFFF,?,?,00000000), ref: 30003BCF
          • VirtualFree.KERNEL32(?,00000000,00008000,?,?,00000001,?,?,?,300037BA,?,?), ref: 30003C4B
          • LeaveCriticalSection.KERNEL32(300200F8,?,?,?,?,?,?,?,?,?,0000FFFF,?,?,00000000), ref: 30003D49
          Memory Dump Source
          • Source File: 00000003.00000002.1277743125.0000000030001000.00000020.00000001.01000000.00000003.sdmp, Offset: 30000000, based on PE: true
          • Associated: 00000003.00000002.1277729671.0000000030000000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000003.00000002.1277761355.0000000030022000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_30000000_mwxZCB2H4p.jbxd
          Similarity
          • API ID: CriticalSection$Leave$EnterFreeVirtual
          • String ID:
          • API String ID: 2267935342-0
          • Opcode ID: 728efe143e63cd5dfd6e68cbe10b2b6f022ad2a7308aaab29b8a7bf41c000f84
          • Instruction ID: bd478a78a7565fdd4c45ed8706c6630f9bb78b3eb0a33067e612b5ce2d464e0f
          • Opcode Fuzzy Hash: 728efe143e63cd5dfd6e68cbe10b2b6f022ad2a7308aaab29b8a7bf41c000f84
          • Instruction Fuzzy Hash: 375137B98043019BF3018F24DC84F6EB3E8BF84342F1485AEF995A7190E735A959CF69
          APIs
          • EnterCriticalSection.KERNEL32(300200F8,00007FFF,30004FB9,?,?,?,?,00000000,?,771AF3C0,300051C2,?,00002002,?,30004055,300080DC), ref: 30004866
          • SetLastError.KERNEL32(E004000E,?,?,?,00000000,?,?,?,?,?,?,?,?,?,?,30004821), ref: 3000488D
          • LeaveCriticalSection.KERNEL32(300200F8,?,?,?,00000000,?,?,?,?,?,?,?,?,?,?,30004821), ref: 30004898
          • LeaveCriticalSection.KERNEL32(300200F8,?,?,?,00000000,?,?,?,?,?,?,?,?,?,?,30004821), ref: 300048A9
          Memory Dump Source
          • Source File: 00000003.00000002.1277743125.0000000030001000.00000020.00000001.01000000.00000003.sdmp, Offset: 30000000, based on PE: true
          • Associated: 00000003.00000002.1277729671.0000000030000000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000003.00000002.1277761355.0000000030022000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_30000000_mwxZCB2H4p.jbxd
          Similarity
          • API ID: CriticalSection$Leave$EnterErrorLast
          • String ID:
          • API String ID: 3832147951-0
          • Opcode ID: a547c38d3e82fc0d5d929008011d36a543578d0ac5cd688d511cab043366c5d6
          • Instruction ID: 50d2b7a500fdcc1b773caceb70cb364f6da780d052c4965e054e9844c57b8fb4
          • Opcode Fuzzy Hash: a547c38d3e82fc0d5d929008011d36a543578d0ac5cd688d511cab043366c5d6
          • Instruction Fuzzy Hash: BBF0A7791143116FF3109B68DD4CBDB37D8EF88210F008C85F955A6A01EA709C918F66
          APIs
          • EnterCriticalSection.KERNEL32(300200F8,?,3000491D,?,?,00000002,7686E690,30005CE7,?), ref: 3000480B
            • Part of subcall function 30003F7D: VirtualAlloc.KERNEL32(00000000,?,00002000,00000001,00000400,?,?,00000000), ref: 30003FFA
            • Part of subcall function 30003F7D: VirtualAlloc.KERNEL32(00000000,?,00001000,00000004,?,00000000), ref: 3000400F
          • SetLastError.KERNEL32(E004000E), ref: 3000482D
          • LeaveCriticalSection.KERNEL32(300200F8), ref: 30004838
          • LeaveCriticalSection.KERNEL32(300200F8), ref: 30004849
          Memory Dump Source
          • Source File: 00000003.00000002.1277743125.0000000030001000.00000020.00000001.01000000.00000003.sdmp, Offset: 30000000, based on PE: true
          • Associated: 00000003.00000002.1277729671.0000000030000000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000003.00000002.1277761355.0000000030022000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_3_2_30000000_mwxZCB2H4p.jbxd
          Similarity
          • API ID: CriticalSection$AllocLeaveVirtual$EnterErrorLast
          • String ID:
          • API String ID: 2428549816-0
          • Opcode ID: 138df1b8d120d82784380a66f96753ddfc1e43fd5c63ff8117a9bd88dce38967
          • Instruction ID: e7934647f06a53e503a8da4eda335cd5142fcf1bed391f07ad14e7b5b9de489f
          • Opcode Fuzzy Hash: 138df1b8d120d82784380a66f96753ddfc1e43fd5c63ff8117a9bd88dce38967
          • Instruction Fuzzy Hash: 45E06D7A514311ABF2149B68EE48FCB37D8AF98211F014895FA54A6A01DA309895CF65