Edit tour

Windows Analysis Report
wfdrproxy.dll

Overview

General Information

Sample name:wfdrproxy.dll
Analysis ID:1584174
MD5:d0aec875dd42dceebc1a480b6aac1654
SHA1:69670ae930e294c6587547e3c98a943e271dde20
SHA256:e493d38dcca74cc9d8309c966728e71bb3a93b342ab77ab50b4fa3ef7890d0da
Tags:dlluser-zhuzhu0009
Infos:

Detection

Score:52
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
PE file contains sections with non-standard names
Program does not show much activity (idle)
Sample execution stops while process was sleeping (likely an evasion)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • loaddll32.exe (PID: 3864 cmdline: loaddll32.exe "C:\Users\user\Desktop\wfdrproxy.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 2696 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 3752 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\wfdrproxy.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 4520 cmdline: rundll32.exe "C:\Users\user\Desktop\wfdrproxy.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 2472 cmdline: rundll32.exe C:\Users\user\Desktop\wfdrproxy.dll,DestroyFolderWatcher MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 4312 cmdline: rundll32.exe C:\Users\user\Desktop\wfdrproxy.dll,DestroyUpload MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 6664 cmdline: rundll32.exe C:\Users\user\Desktop\wfdrproxy.dll,GetAllBypass MD5: 889B99C52A60DD49227C5E485A016679)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: wfdrproxy.dllReversingLabs: Detection: 58%
Source: wfdrproxy.dllVirustotal: Detection: 56%Perma Link
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
Source: wfdrproxy.dllStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
Source: wfdrproxy.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
Source: Binary string: C:\DSAJKLDSJLAJKSAJFKSAJKFSAJKSAJFKSAJKFAFF\Debug\wfdrproxy.pdb source: loaddll32.exe, 00000000.00000002.1800706037.000000006CE5C000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000003.00000002.1710634407.000000006CBCC000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.1710838785.000000006CBCC000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000005.00000002.1740661966.000000006CBCC000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000006.00000002.1770784581.000000006CBCC000.00000002.00000001.01000000.00000003.sdmp, wfdrproxy.dll
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CDB019A FindFirstFileExW,0_2_6CDB019A
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CE21660 FindFirstFileExW,FindNextFileW,0_2_6CE21660
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CE21200 FindFirstFileExW,FindNextFileW,0_2_6CE21200
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CB2019A FindFirstFileExW,3_2_6CB2019A
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CB91660 FindFirstFileExW,FindNextFileW,3_2_6CB91660
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CB91200 FindFirstFileExW,FindNextFileW,3_2_6CB91200
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CE3BE800_2_6CE3BE80
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CBABE803_2_6CBABE80
Source: C:\Windows\System32\loaddll32.exeCode function: String function: 6CDB3197 appears 377 times
Source: C:\Windows\System32\loaddll32.exeCode function: String function: 6CDB11C1 appears 108 times
Source: C:\Windows\System32\loaddll32.exeCode function: String function: 6CE1F1D0 appears 34 times
Source: C:\Windows\System32\loaddll32.exeCode function: String function: 6CDB0BB8 appears 454 times
Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 6CB23197 appears 422 times
Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 6CB8F1D0 appears 34 times
Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 6CB20BB8 appears 507 times
Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 6CB211C1 appears 108 times
Source: wfdrproxy.dllStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
Source: classification engineClassification label: mal52.winDLL@12/0@0/0
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2696:120:WilError_03
Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\wfdrproxy.dll,DestroyFolderWatcher
Source: wfdrproxy.dllReversingLabs: Detection: 58%
Source: wfdrproxy.dllVirustotal: Detection: 56%
Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\wfdrproxy.dll"
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\wfdrproxy.dll",#1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\wfdrproxy.dll,DestroyFolderWatcher
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\wfdrproxy.dll",#1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\wfdrproxy.dll,DestroyUpload
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\wfdrproxy.dll,GetAllBypass
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\wfdrproxy.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\wfdrproxy.dll,DestroyFolderWatcherJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\wfdrproxy.dll,DestroyUploadJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\wfdrproxy.dll,GetAllBypassJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\wfdrproxy.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
Source: wfdrproxy.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: wfdrproxy.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: wfdrproxy.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: wfdrproxy.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: wfdrproxy.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: wfdrproxy.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: wfdrproxy.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
Source: wfdrproxy.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\DSAJKLDSJLAJKSAJFKSAJKFSAJKSAJFKSAJKFAFF\Debug\wfdrproxy.pdb source: loaddll32.exe, 00000000.00000002.1800706037.000000006CE5C000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000003.00000002.1710634407.000000006CBCC000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.1710838785.000000006CBCC000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000005.00000002.1740661966.000000006CBCC000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000006.00000002.1770784581.000000006CBCC000.00000002.00000001.01000000.00000003.sdmp, wfdrproxy.dll
Source: wfdrproxy.dllStatic PE information: section name: .textbss
Source: wfdrproxy.dllStatic PE information: section name: .msvcjmc
Source: wfdrproxy.dllStatic PE information: section name: .00cfg
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CDB0B54 push ecx; ret 0_2_6CE55013
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CB20B54 push ecx; ret 3_2_6CBC5013
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\loaddll32.exeAPI coverage: 4.1 %
Source: C:\Windows\SysWOW64\rundll32.exeAPI coverage: 4.2 %
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CDB019A FindFirstFileExW,0_2_6CDB019A
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CE21660 FindFirstFileExW,FindNextFileW,0_2_6CE21660
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CE21200 FindFirstFileExW,FindNextFileW,0_2_6CE21200
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CB2019A FindFirstFileExW,3_2_6CB2019A
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CB91660 FindFirstFileExW,FindNextFileW,3_2_6CB91660
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CB91200 FindFirstFileExW,FindNextFileW,3_2_6CB91200
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CE10E40 GetSystemInfo,0_2_6CE10E40
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CDC0C20 MultiByteToWideChar,MultiByteToWideChar,DebuggerProbe,DebuggerRuntime,IsDebuggerPresent,WideCharToMultiByte,WideCharToMultiByte,0_2_6CDC0C20
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CE1BD90 OutputDebugStringW,OutputDebugStringW,OutputDebugStringW,OutputDebugStringW,OutputDebugStringW,GetFileType,WriteConsoleW,GetLastError,WriteFile,WriteFile,OutputDebugStringW,0_2_6CE1BD90
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CDD83B0 mov eax, dword ptr fs:[00000030h]0_2_6CDD83B0
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CE19D10 mov ecx, dword ptr fs:[00000030h]0_2_6CE19D10
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CE19C40 mov ecx, dword ptr fs:[00000030h]0_2_6CE19C40
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CE19AA0 mov ecx, dword ptr fs:[00000030h]0_2_6CE19AA0
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CE19B70 mov ecx, dword ptr fs:[00000030h]0_2_6CE19B70
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CDBD3B0 mov eax, dword ptr fs:[00000030h]0_2_6CDBD3B0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CB483B0 mov eax, dword ptr fs:[00000030h]3_2_6CB483B0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CB89D10 mov ecx, dword ptr fs:[00000030h]3_2_6CB89D10
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CB89C40 mov ecx, dword ptr fs:[00000030h]3_2_6CB89C40
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CB89AA0 mov ecx, dword ptr fs:[00000030h]3_2_6CB89AA0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CB89B70 mov ecx, dword ptr fs:[00000030h]3_2_6CB89B70
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CB2D3B0 mov eax, dword ptr fs:[00000030h]3_2_6CB2D3B0
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CDC24C0 VirtualQuery,GetProcAddress,GetProcessHeap,HeapFree,GetProcessHeap,HeapAlloc,0_2_6CDC24C0
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CDBF5F0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_6CDBF5F0
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CDD8810 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_6CDD8810
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CDB013B SetUnhandledExceptionFilter,0_2_6CDB013B
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CDC1690 SetUnhandledExceptionFilter,0_2_6CDC1690
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CDC13E0 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_6CDC13E0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CB2F5F0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_6CB2F5F0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CB48810 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_6CB48810
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CB2013B SetUnhandledExceptionFilter,3_2_6CB2013B
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CB31690 SetUnhandledExceptionFilter,3_2_6CB31690
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CB313E0 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_6CB313E0
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\wfdrproxy.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll32.exeCode function: GetLocaleInfoW,GetACP,GetLocaleInfoW,0_2_6CE42E60
Source: C:\Windows\System32\loaddll32.exeCode function: GetLocaleInfoW,0_2_6CE42FA0
Source: C:\Windows\System32\loaddll32.exeCode function: EnumSystemLocalesW,0_2_6CE1EA90
Source: C:\Windows\System32\loaddll32.exeCode function: GetLocaleInfoW,0_2_6CE42B60
Source: C:\Windows\System32\loaddll32.exeCode function: EnumSystemLocalesW,0_2_6CE42450
Source: C:\Windows\System32\loaddll32.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_6CE425A0
Source: C:\Windows\System32\loaddll32.exeCode function: GetLocaleInfoW,0_2_6CE420D0
Source: C:\Windows\System32\loaddll32.exeCode function: EnumSystemLocalesW,0_2_6CE42260
Source: C:\Windows\System32\loaddll32.exeCode function: EnumSystemLocalesW,0_2_6CE42330
Source: C:\Windows\System32\loaddll32.exeCode function: GetLocaleInfoW,0_2_6CE1FA50
Source: C:\Windows\System32\loaddll32.exeCode function: IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_6CE430F0
Source: C:\Windows\System32\loaddll32.exeCode function: GetLocaleInfoW,0_2_6CDB0ED8
Source: C:\Windows\System32\loaddll32.exeCode function: EnumSystemLocalesW,0_2_6CDB3679
Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoW,GetACP,GetLocaleInfoW,3_2_6CBB2E60
Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoW,3_2_6CBB2FA0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: EnumSystemLocalesW,3_2_6CB8EA90
Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoW,3_2_6CBB2B60
Source: C:\Windows\SysWOW64\rundll32.exeCode function: EnumSystemLocalesW,3_2_6CBB2450
Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,3_2_6CBB25A0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoW,3_2_6CBB20D0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: EnumSystemLocalesW,3_2_6CBB2260
Source: C:\Windows\SysWOW64\rundll32.exeCode function: EnumSystemLocalesW,3_2_6CBB2330
Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoW,3_2_6CB8FA50
Source: C:\Windows\SysWOW64\rundll32.exeCode function: IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,3_2_6CBB30F0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: EnumSystemLocalesW,3_2_6CB23679
Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoW,3_2_6CB20ED8
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CE1FAD0 GetSystemTimeAsFileTime,0_2_6CE1FAD0
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
11
Process Injection
1
Rundll32
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
11
Process Injection
LSASS Memory3
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Deobfuscate/Decode Files or Information
Security Account Manager1
File and Directory Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDS13
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
Obfuscated Files or Information
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1584174 Sample: wfdrproxy.dll Startdate: 04/01/2025 Architecture: WINDOWS Score: 52 19 Multi AV Scanner detection for submitted file 2->19 21 AI detected suspicious sample 2->21 7 loaddll32.exe 1 2->7         started        process3 process4 9 cmd.exe 1 7->9         started        11 conhost.exe 7->11         started        13 rundll32.exe 7->13         started        15 2 other processes 7->15 process5 17 rundll32.exe 9->17         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
wfdrproxy.dll58%ReversingLabsWin32.PUA.SoftCnapp
wfdrproxy.dll56%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1584174
Start date and time:2025-01-04 14:55:09 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 3m 23s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:7
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:wfdrproxy.dll
Detection:MAL
Classification:mal52.winDLL@12/0@0/0
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 19
  • Number of non-executed functions: 118
Cookbook Comments:
  • Found application associated with file extension: .dll
  • Stop behavior analysis, all processes terminated
  • Not all processes where analyzed, report is missing behavior information
No simulations
No context
No context
No context
No context
No context
No created / dropped files found
File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
Entropy (8bit):5.521939918620145
TrID:
  • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
  • Generic Win/DOS Executable (2004/3) 0.20%
  • DOS Executable Generic (2002/1) 0.20%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:wfdrproxy.dll
File size:898'048 bytes
MD5:d0aec875dd42dceebc1a480b6aac1654
SHA1:69670ae930e294c6587547e3c98a943e271dde20
SHA256:e493d38dcca74cc9d8309c966728e71bb3a93b342ab77ab50b4fa3ef7890d0da
SHA512:9c4967e957e62e5fe17c36c261d74aabb7930acbf4c354c6da166e71b3e7957bf0e5c510b884c4851307bf4cf6272d9a86d790c9dbda6e50870f23638223b2f5
SSDEEP:12288:asb15PYW9E5OSii3uuYqdB2kCiF3FGUpT7tMtIuQI/aTQXa:f5PYW9EHBFF3FGU57tuoT
TLSH:B715E801BBA05118FDFB25FA45FE20A8993DB9E11724D0CB52C42AEDDA25AF0BD31717
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........b!...O...O...O..hL...O..hJ.A.O..hK...O.m.K...O.m.L...O.m.J...O..hN...O...N...O..~J...O..~O...O..~....O..~M...O.Rich..O........
Icon Hash:7ae282899bbab082
Entrypoint:0x100530e8
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x10000000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
DLL Characteristics:DYNAMIC_BASE, NX_COMPAT
Time Stamp:0x6498F797 [Mon Jun 26 02:27:35 2023 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:6
OS Version Minor:0
File Version Major:6
File Version Minor:0
Subsystem Version Major:6
Subsystem Version Minor:0
Import Hash:817c7ef98bce85754d2d8fd28197419f
Instruction
jmp 00007FF0112665E8h
jmp 00007FF0112DF013h
jmp 00007FF01126A3FEh
jmp 00007FF011284359h
jmp 00007FF0112EAF14h
jmp 00007FF0112FA9C3h
jmp 00007FF011291CCAh
jmp 00007FF01127E6D5h
jmp 00007FF0112B0D60h
jmp 00007FF0112678FBh
jmp 00007FF0112FA7D6h
jmp 00007FF01128B931h
jmp 00007FF0112B266Ch
jmp 00007FF0112D1327h
jmp 00007FF0112BF352h
jmp 00007FF0112D087Dh
jmp 00007FF01127DC28h
jmp 00007FF011265273h
jmp 00007FF0112A594Eh
jmp 00007FF0112B0D59h
jmp 00007FF0112F8674h
jmp 00007FF01127CDFFh
jmp 00007FF01126D47Ah
jmp 00007FF011286325h
jmp 00007FF011297AB0h
jmp 00007FF0112A5A5Bh
jmp 00007FF011295DB6h
jmp 00007FF011262041h
jmp 00007FF011264F6Ch
jmp 00007FF0112F0DD7h
jmp 00007FF01129CE62h
jmp 00007FF0112A589Dh
jmp 00007FF011296348h
jmp 00007FF0112967D3h
jmp 00007FF01129693Eh
jmp 00007FF01127EF59h
jmp 00007FF01127EA44h
jmp 00007FF0112CC40Fh
jmp 00007FF0112E30CAh
jmp 00007FF0112D2565h
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x122a700x5ee.rdata
IMAGE_DIRECTORY_ENTRY_IMPORT0x1271d00x28.idata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x12a0000x326.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x12b0000x4cec.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x11fe100x38.rdata
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x11fd280x40.rdata
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x1270000x1d0.idata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.textbss0x10000x4e6110x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.text0x500000xab3e20xab400c537e886d5301fcaeb22fc8216ab7a48False0.2747405337591241data5.435745159215184IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0xfc0000x2705e0x27200726ddab222c7dd2d87d8b0b65d3c59a7False0.17937549920127796data3.5123293933529056IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x1240000x29280x1200969404309de01c1df85568310d693ca4False0.1384548611111111data2.1223147255687507IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.idata0x1270000xbf20xc0098f69aaeba8fca22da1ed122fd411ff7False0.3662109375data4.6611104062121385IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.msvcjmc0x1280000x8dc0xa000c946249f1e8f9bf9fc4fcd52bcbc638False0.017578125Targa image data - Map (257-257) 257 x 257 x 1 +257 +257 - 1-bit alpha "\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001"0.9294509089963453IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.00cfg0x1290000x10e0x200c78b312853a2d9a75aaa372d1e38d894False0.037109375data0.14736507530476972IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.rsrc0x12a0000x3260x400cc3043b41049f3a78d87cff769711f0cFalse0.171875data1.4441586203433472IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x12b0000x5b7f0x5c00d64f126ffff19a2179cf8d56bc088f01False0.6370584239130435data6.094474279045823IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_MANIFEST0x12a1700x91XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.8689655172413793
DLLImport
KERNEL32.dllCloseHandle, GetFileAttributesW, GetModuleFileNameW, lstrlenW, GetLastError, CreateEventA, DecodePointer, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionEx, DeleteCriticalSection, GetCurrentThreadId, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, IsProcessorFeaturePresent, IsDebuggerPresent, RaiseException, MultiByteToWideChar, WideCharToMultiByte, QueryPerformanceCounter, GetCurrentProcessId, GetSystemTimeAsFileTime, InitializeSListHead, GetStartupInfoW, GetModuleHandleW, HeapAlloc, HeapFree, GetProcessHeap, VirtualQuery, FreeLibrary, GetProcAddress, RtlUnwind, InterlockedPushEntrySList, InterlockedFlushSList, LoadLibraryExW, SetLastError, EncodePointer, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, ExitProcess, GetModuleHandleExW, HeapValidate, GetSystemInfo, GetCurrentThread, GetStdHandle, GetFileType, WriteFile, OutputDebugStringW, WriteConsoleW, SetConsoleCtrlHandler, GetDateFormatW, GetTimeFormatW, CompareStringW, LCMapStringW, GetLocaleInfoW, IsValidLocale, GetUserDefaultLCID, EnumSystemLocalesW, FindClose, FindFirstFileExW, FindNextFileW, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableW, HeapReAlloc, HeapSize, HeapQueryInformation, GetStringTypeW, SetStdHandle, GetFileSizeEx, SetFilePointerEx, FlushFileBuffers, GetConsoleOutputCP, GetConsoleMode, ReadFile, ReadConsoleW, CreateFileW
NameOrdinalAddress
DestroyFolderWatcher10x10051662
DestroyUpload20x10053043
GetAllBypass30x100531fb
GetAllWhiteList40x10051513
GetDevicePathAndDeviceDescAndInstanceId50x10050a2d
GetDownLoadSettingsLatestSucceedTime60x1005020d
GetLangMain70x10051c20
GetLatestLoginErrorCode80x100508f7
GetLoginLatestSucceedTime90x10050a19
GetLoginLatestTime100x10052b57
GetSetupValue110x1005229c
GetUseIEProxy120x1005160d
HASUKY130x100527bf
InitDLL140x10052b7f
InitFolderWatcher150x10051fd1
InitUpload160x100505cd
InsertDemandWhiteUSB170x1005236e
InsertUSBDeviceConnected180x10051ec8
InsertUSBDeviceDisConnected190x1005012c
InsertUploadWhiteUSB200x1005055a
IsDemoVersion210x10050f00
ModifyAdminPwd220x10051a18
PassComputerUniqueID230x10051fe0
RemoveWhiteList240x10051842
STSPD250x100523e1
SVUKY260x10050e51
SetLangMain270x100517d4
SetSetupValue280x10050294
SetUseIEProxy290x100501f4
StartSpecifiedFolderWatcher300x10050037
StopAllFolderWatcher310x10051b30
StopSpecifiedFolderWatcher320x10050749
TryClientLogin330x10051d47
VerifyNetworkConnectExpired340x1005184c
VerifySoftwareExpired350x10050096
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
No network behavior found
Target ID:0
Start time:08:56:05
Start date:04/01/2025
Path:C:\Windows\System32\loaddll32.exe
Wow64 process (32bit):true
Commandline:loaddll32.exe "C:\Users\user\Desktop\wfdrproxy.dll"
Imagebase:0x9b0000
File size:126'464 bytes
MD5 hash:51E6071F9CBA48E79F10C84515AAE618
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:1
Start time:08:56:05
Start date:04/01/2025
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7699e0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:2
Start time:08:56:05
Start date:04/01/2025
Path:C:\Windows\SysWOW64\cmd.exe
Wow64 process (32bit):true
Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\wfdrproxy.dll",#1
Imagebase:0x240000
File size:236'544 bytes
MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:3
Start time:08:56:05
Start date:04/01/2025
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe C:\Users\user\Desktop\wfdrproxy.dll,DestroyFolderWatcher
Imagebase:0x560000
File size:61'440 bytes
MD5 hash:889B99C52A60DD49227C5E485A016679
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:4
Start time:08:56:05
Start date:04/01/2025
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe "C:\Users\user\Desktop\wfdrproxy.dll",#1
Imagebase:0x560000
File size:61'440 bytes
MD5 hash:889B99C52A60DD49227C5E485A016679
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:5
Start time:08:56:08
Start date:04/01/2025
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe C:\Users\user\Desktop\wfdrproxy.dll,DestroyUpload
Imagebase:0x560000
File size:61'440 bytes
MD5 hash:889B99C52A60DD49227C5E485A016679
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:6
Start time:08:56:11
Start date:04/01/2025
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe C:\Users\user\Desktop\wfdrproxy.dll,GetAllBypass
Imagebase:0x560000
File size:61'440 bytes
MD5 hash:889B99C52A60DD49227C5E485A016679
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Execution Graph

Execution Coverage

Dynamic/Packed Code Coverage

Signature Coverage

Execution Coverage:0.7%
Dynamic/Decrypted Code Coverage:0%
Signature Coverage:6.2%
Total number of Nodes:96
Total number of Limit Nodes:11
Show Legend
Hide Nodes/Edges
execution_graph 54045 6ce13a60 54048 6ce10960 54045->54048 54047 6ce13a7a 54050 6ce1096d 54048->54050 54051 6ce109a2 54050->54051 54052 6ce10a00 54050->54052 54051->54047 54053 6ce10a40 __wcstombs_l 54052->54053 54054 6ce10b7a RtlAllocateHeap 54053->54054 54055 6ce10aad __wcstombs_l 54053->54055 54054->54055 54055->54050 54056 6ce1f5a0 54059 6ce1eb10 54056->54059 54058 6ce1f5ad 54062 6ce1f1d0 54059->54062 54061 6ce1eb2b 54061->54058 54063 6ce1f1e8 54062->54063 54065 6ce1f201 54063->54065 54066 6ce1f4a0 54063->54066 54065->54061 54071 6ce1f170 54066->54071 54069 6ce1f4c3 GetProcAddress 54070 6ce1f4bf 54069->54070 54070->54065 54074 6ce1f180 54071->54074 54072 6ce1f1a8 54072->54069 54072->54070 54074->54072 54075 6ce1f350 54074->54075 54076 6ce1f368 54075->54076 54078 6ce1f374 54076->54078 54081 6ce1f4f0 LoadLibraryExW 54076->54081 54078->54074 54079 6ce1f441 FreeLibrary 54079->54078 54080 6ce1f399 54080->54078 54080->54079 54082 6ce1f510 54081->54082 54083 6ce1f515 GetLastError 54081->54083 54082->54080 54083->54082 54084 6ce1f520 54083->54084 54084->54082 54085 6ce1f54e LoadLibraryExW 54084->54085 54085->54082 54141 6ce19ef0 54144 6ce19d10 GetPEB 54141->54144 54143 6ce19efc 54145 6ce19d30 54144->54145 54145->54143 54086 6ce26420 54087 6ce26437 54086->54087 54088 6ce26430 54086->54088 54087->54088 54090 6ce262f0 54087->54090 54091 6ce26329 54090->54091 54094 6ce26345 54091->54094 54096 6ce25fd0 GetStartupInfoW 54091->54096 54094->54087 54097 6ce25ff0 54096->54097 54098 6ce25fea 54096->54098 54100 6ce26150 54097->54100 54098->54097 54099 6ce260b7 GetFileType 54098->54099 54099->54098 54101 6ce26161 54100->54101 54102 6ce261c4 GetStdHandle 54101->54102 54105 6ce26204 54101->54105 54103 6ce261d7 54102->54103 54104 6ce261f5 GetFileType 54103->54104 54103->54105 54104->54105 54105->54094 54106 6cdbfa10 54107 6cdbfa22 54106->54107 54109 6cdbfa3e 54106->54109 54108 6cdbfa2c dllmain_crt_process_attach 54107->54108 54107->54109 54108->54109 54146 6cdbfdc0 54147 6cdbfdf9 54146->54147 54148 6cdbfe42 dllmain_crt_dispatch 54147->54148 54149 6cdbfe61 54147->54149 54152 6cdbfe02 54147->54152 54148->54149 54148->54152 54150 6cdbfeae 54149->54150 54153 6cdbfe90 dllmain_crt_dispatch 54149->54153 54151 6cdbfeba dllmain_crt_dispatch 54150->54151 54150->54152 54151->54152 54153->54150 54154 6cdbd800 54155 6cdbd825 54154->54155 54156 6cdbd839 CreateEventA 54155->54156 54158 6cdbd837 54155->54158 54159 6cdbd853 54156->54159 54157 6cdbd863 GetLastError 54160 6cdbd872 54157->54160 54159->54157 54160->54158 54161 6cdbd879 CloseHandle 54160->54161 54161->54158 54110 6cdc0030 54111 6cdc003e dllmain_dispatch 54110->54111 54112 6cdc0039 54110->54112 54112->54111 54113 6cdd85d0 54116 6cdd81c0 54113->54116 54117 6cdd81ce 54116->54117 54122 6cdd81e6 54116->54122 54132 6cdd8300 GetModuleHandleW 54117->54132 54119 6cdd81d3 54119->54122 54133 6cdd8410 54119->54133 54121 6cdd81e3 54121->54122 54124 6cdd8230 54122->54124 54125 6cdd8260 54122->54125 54137 6cdd83b0 54125->54137 54128 6cdd8271 GetCurrentProcess TerminateProcess 54129 6cdd8282 54128->54129 54130 6cdd8410 GetModuleHandleExW 54129->54130 54131 6cdd828b ExitProcess 54130->54131 54132->54119 54134 6cdd841d 54133->54134 54135 6cdd842e GetModuleHandleExW 54134->54135 54136 6cdd8440 54135->54136 54136->54121 54138 6cdd83bb 54137->54138 54139 6cdd83c4 GetPEB 54138->54139 54140 6cdd826a 54138->54140 54139->54140 54140->54128 54140->54129

Executed Functions

Memory Dump Source
  • Source File: 00000000.00000002.1800636456.000000006CDB9000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CD60000, based on PE: true
  • Associated: 00000000.00000002.1800618530.000000006CD60000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CDB0000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CE59000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800706037.000000006CE5C000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800724654.000000006CE84000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800735219.000000006CE87000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800744992.000000006CE8A000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_6cd60000_loaddll32.jbxd
Similarity
  • API ID:
  • String ID:
  • API String ID:
  • Opcode ID: e42fea7762a687a22cf2d6112516f2d1a25df828811d9156d6ed8d7143b856e2
  • Instruction ID: 6c9badefb8dab69c84f04b2384ea165f41c1ec573c8d96fdf751597bd518c60e
  • Opcode Fuzzy Hash: e42fea7762a687a22cf2d6112516f2d1a25df828811d9156d6ed8d7143b856e2
  • Instruction Fuzzy Hash: 3FE0A020C4C2C8A6CB038B6988427AE7B689B03308F0520C6C48887A62C5BBA509D3E1
Memory Dump Source
  • Source File: 00000000.00000002.1800636456.000000006CDB9000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CD60000, based on PE: true
  • Associated: 00000000.00000002.1800618530.000000006CD60000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CDB0000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CE59000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800706037.000000006CE5C000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800724654.000000006CE84000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800735219.000000006CE87000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800744992.000000006CE8A000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_6cd60000_loaddll32.jbxd
Similarity
  • API ID:
  • String ID:
  • API String ID:
  • Opcode ID: 444943a13ae2ffb8ab67dbbfae9924854bd6ff28f0f721fd2be7c0ad30b87760
  • Instruction ID: b857c1cb5c82b109d78e0903f7b5bea40c73dcf5b7f5d19878051d20210956b2
  • Opcode Fuzzy Hash: 444943a13ae2ffb8ab67dbbfae9924854bd6ff28f0f721fd2be7c0ad30b87760
  • Instruction Fuzzy Hash: 4DE048F6D14248ABCB04CF55D441A9AB775E744215F344658EC094BB01D635EF25C691

Control-flow Graph

Strings
Memory Dump Source
  • Source File: 00000000.00000002.1800636456.000000006CDB9000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CD60000, based on PE: true
  • Associated: 00000000.00000002.1800618530.000000006CD60000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CDB0000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CE59000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800706037.000000006CE5C000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800724654.000000006CE84000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800735219.000000006CE87000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800744992.000000006CE8A000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_6cd60000_loaddll32.jbxd
Similarity
  • API ID:
  • String ID: %ls$cached_handle == INVALID_HANDLE_VALUE$cached_handle == new_handle$minkernel\crts\ucrt\src\appcrt\internal\winapi_thunks.cpp
  • API String ID: 0-442401637
  • Opcode ID: ba454c427f98a18bb7750eba1390cd44b8270b12f7f02a0d2c257423a160c108
  • Instruction ID: 08e324cd971bfc5310e19a22b689977acc6cb3876d0c480f5dea23a8055a6263
  • Opcode Fuzzy Hash: ba454c427f98a18bb7750eba1390cd44b8270b12f7f02a0d2c257423a160c108
  • Instruction Fuzzy Hash: 0A2191B0E05249EBCF10DBA5CC45BAE7775AB0631CF304A54E41667EC0D738A665CB92

Control-flow Graph

APIs
  • LoadLibraryExW.KERNEL32(6CE1F399,00000000,00000800,?,?,6CE1F399,00000000), ref: 6CE1F501
  • GetLastError.KERNEL32(?,?,6CE1F399), ref: 6CE1F515
  • LoadLibraryExW.KERNEL32(6CE1F399,00000000,00000000,?,?,?,?,6CE1F399), ref: 6CE1F556
Strings
Memory Dump Source
  • Source File: 00000000.00000002.1800636456.000000006CDB9000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CD60000, based on PE: true
  • Associated: 00000000.00000002.1800618530.000000006CD60000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CDB0000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CE59000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800706037.000000006CE5C000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800724654.000000006CE84000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800735219.000000006CE87000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800744992.000000006CE8A000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_6cd60000_loaddll32.jbxd
Similarity
  • API ID: LibraryLoad$ErrorLast
  • String ID: api-ms-$ext-ms-
  • API String ID: 3177248105-537541572
  • Opcode ID: b39b7bf745be99a5aefe467c2b10361e0defaedae95c23a4ab765765bfec6e2e
  • Instruction ID: befce1eebd1ef3e81ff3d36c7faf9ec642fd7d48705dfacd9dc5c321a04fda6e
  • Opcode Fuzzy Hash: b39b7bf745be99a5aefe467c2b10361e0defaedae95c23a4ab765765bfec6e2e
  • Instruction Fuzzy Hash: F4016DB1A49209BBDB00CEA4CD09B9A3775AB11719F304410FA289BA80DA79EE1187A0

Control-flow Graph

APIs
  • RtlAllocateHeap.NTDLL(01310000,00000000,?), ref: 6CE10B8F
Strings
  • Client hook allocation failure., xrefs: 6CE10AD8
  • Error: memory allocation: bad memory block type., xrefs: 6CE10B5A
  • Client hook allocation failure at file %hs line %d., xrefs: 6CE10ABB
Memory Dump Source
  • Source File: 00000000.00000002.1800636456.000000006CDB9000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CD60000, based on PE: true
  • Associated: 00000000.00000002.1800618530.000000006CD60000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CDB0000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CE59000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800706037.000000006CE5C000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800724654.000000006CE84000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800735219.000000006CE87000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800744992.000000006CE8A000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_6cd60000_loaddll32.jbxd
Similarity
  • API ID: AllocateHeap
  • String ID: Client hook allocation failure at file %hs line %d.$Client hook allocation failure.$Error: memory allocation: bad memory block type.
  • API String ID: 1279760036-2973468218
  • Opcode ID: 9f437b71bec49b7738add46ca10e9a0ed20b2aa22e9a1ffe4e680a402645e7b2
  • Instruction ID: 1b1165b157fd8873a383ee96e22e7df3ea172af89cf1ffcad3383b5ab2baddab
  • Opcode Fuzzy Hash: 9f437b71bec49b7738add46ca10e9a0ed20b2aa22e9a1ffe4e680a402645e7b2
  • Instruction Fuzzy Hash: BAB181B0A05249DFDB04CF54C890FDEB7B5FB4A318F208219E915ABB80D775A961CFA1

Control-flow Graph

APIs
  • CreateEventA.KERNEL32(00000000,00000001,00000001,VerifyNetworkConnectExpired), ref: 6CDBD846
  • GetLastError.KERNEL32 ref: 6CDBD865
  • CloseHandle.KERNEL32(00000000), ref: 6CDBD87F
Strings
  • VerifyNetworkConnectExpired, xrefs: 6CDBD83B
Memory Dump Source
  • Source File: 00000000.00000002.1800636456.000000006CDB9000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CD60000, based on PE: true
  • Associated: 00000000.00000002.1800618530.000000006CD60000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CDB0000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CE59000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800706037.000000006CE5C000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800724654.000000006CE84000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800735219.000000006CE87000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800744992.000000006CE8A000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_6cd60000_loaddll32.jbxd
Similarity
  • API ID: CloseCreateErrorEventHandleLast
  • String ID: VerifyNetworkConnectExpired
  • API String ID: 937152468-916440064
  • Opcode ID: ddf8d3e1d03bda505f5c7068510252c0286d26705835650a9d6febb1b1b17c4e
  • Instruction ID: 25843f3f8eef4847d40ef4ea5b7ed2122f51b536374cc5246dd5b4d3672e8b1f
  • Opcode Fuzzy Hash: ddf8d3e1d03bda505f5c7068510252c0286d26705835650a9d6febb1b1b17c4e
  • Instruction Fuzzy Hash: 7E11C8B6E05614ABDA207BA88845BCCB7329B01329F400552FA1E77790C7754984C6F2

Control-flow Graph

APIs
  • GetCurrentProcess.KERNEL32(6CDD8230,?,6CDD8230,?), ref: 6CDD8275
  • TerminateProcess.KERNEL32(00000000,?,6CDD8230,?), ref: 6CDD827C
  • ExitProcess.KERNEL32 ref: 6CDD8292
Memory Dump Source
  • Source File: 00000000.00000002.1800636456.000000006CDB9000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CD60000, based on PE: true
  • Associated: 00000000.00000002.1800618530.000000006CD60000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CDB0000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CE59000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800706037.000000006CE5C000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800724654.000000006CE84000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800735219.000000006CE87000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800744992.000000006CE8A000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_6cd60000_loaddll32.jbxd
Similarity
  • API ID: Process$CurrentExitTerminate
  • String ID:
  • API String ID: 1703294689-0
  • Opcode ID: ea8859b2524b1873918b623d4366b63b87711270ace13e9b21af271ee347dcbd
  • Instruction ID: 496e49c328b4b010aaf408fdba25c828509096c8b7c96342bb19ea7c23c30e4e
  • Opcode Fuzzy Hash: ea8859b2524b1873918b623d4366b63b87711270ace13e9b21af271ee347dcbd
  • Instruction Fuzzy Hash: 70E012B5B01204ABCF01ABB1CC4889F3B7DAB452457114415BD0ACB251DE34F544C7F1

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 186 6ce26150-6ce2615f 187 6ce2616a-6ce2616e 186->187 188 6ce26174-6ce26194 187->188 189 6ce26299-6ce2629c 187->189 190 6ce26196-6ce2619d 188->190 191 6ce261b4-6ce261d5 call 6ce25f80 GetStdHandle 188->191 190->191 192 6ce2619f-6ce261b2 190->192 196 6ce261e3 191->196 197 6ce261d7-6ce261db 191->197 192->187 199 6ce261e7-6ce261f3 196->199 197->196 198 6ce261dd-6ce261e1 197->198 198->199 200 6ce26204 199->200 201 6ce261f5-6ce26202 GetFileType 199->201 202 6ce2620b-6ce26215 200->202 201->202 203 6ce26217-6ce2622c 202->203 204 6ce2625f-6ce26280 202->204 205 6ce26240-6ce2624b 203->205 206 6ce2622e-6ce2623e 203->206 207 6ce26282-6ce2628d 204->207 208 6ce26294 204->208 209 6ce2625d 205->209 210 6ce2624d-6ce2625a 205->210 206->209 207->208 208->189 209->208 210->209
APIs
  • GetStdHandle.KERNEL32(00000000), ref: 6CE261C8
  • GetFileType.KERNELBASE(000000FF), ref: 6CE261F9
Memory Dump Source
  • Source File: 00000000.00000002.1800636456.000000006CDB9000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CD60000, based on PE: true
  • Associated: 00000000.00000002.1800618530.000000006CD60000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CDB0000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CE59000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800706037.000000006CE5C000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800724654.000000006CE84000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800735219.000000006CE87000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800744992.000000006CE8A000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_6cd60000_loaddll32.jbxd
Similarity
  • API ID: FileHandleType
  • String ID:
  • API String ID: 3000768030-0
  • Opcode ID: 92190de92d31e91a7f28175807b4544ec25b6636ccff23f64b5cfafadf5bf345
  • Instruction ID: 1f628629f44a99f60c1d15375cbea7e138a50cf687534fd27a60a4cc51f6c9a9
  • Opcode Fuzzy Hash: 92190de92d31e91a7f28175807b4544ec25b6636ccff23f64b5cfafadf5bf345
  • Instruction Fuzzy Hash: 0D419075D05289DFDB04CF94C4817ADBB75BF46328F344388C4A5AB782C338AA82CB90

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 211 6ce1f4a0-6ce1f4ae call 6ce1f170 213 6ce1f4b3-6ce1f4bd 211->213 214 6ce1f4c3-6ce1f4cb GetProcAddress 213->214 215 6ce1f4bf-6ce1f4c1 213->215 216 6ce1f4d1-6ce1f4d4 214->216 215->216
APIs
  • GetProcAddress.KERNEL32(00000000,?), ref: 6CE1F4CB
Memory Dump Source
  • Source File: 00000000.00000002.1800636456.000000006CDB9000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CD60000, based on PE: true
  • Associated: 00000000.00000002.1800618530.000000006CD60000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CDB0000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CE59000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800706037.000000006CE5C000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800724654.000000006CE84000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800735219.000000006CE87000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800744992.000000006CE8A000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_6cd60000_loaddll32.jbxd
Similarity
  • API ID: AddressProc
  • String ID:
  • API String ID: 190572456-0
  • Opcode ID: 6a7fbf0f4bd604c84febcbe2c99641186191209ab94edb24a1af5ed876e7a29e
  • Instruction ID: a7f905b5901a28d49e8010d97865ca41a1a06ded6f800a26ffac7bbe2ea4f2e9
  • Opcode Fuzzy Hash: 6a7fbf0f4bd604c84febcbe2c99641186191209ab94edb24a1af5ed876e7a29e
  • Instruction Fuzzy Hash: 7BE04F76A0820CFBCB00CFA5DC04D9E77B8EB8A314F204658FD0CD3600E635DA1087A0

Non-executed Functions

APIs
  • OutputDebugStringW.KERNEL32(Second Chance Assertion Failed: File ), ref: 6CE1BEB4
  • OutputDebugStringW.KERNEL32(6CE7062C), ref: 6CE1BEDC
  • OutputDebugStringW.KERNEL32(, Line ), ref: 6CE1BEE7
  • OutputDebugStringW.KERNEL32(?), ref: 6CE1BEF4
  • OutputDebugStringW.KERNEL32(6CE70664), ref: 6CE1BEFF
Strings
Memory Dump Source
  • Source File: 00000000.00000002.1800636456.000000006CDB9000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CD60000, based on PE: true
  • Associated: 00000000.00000002.1800618530.000000006CD60000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CDB0000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CE59000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800706037.000000006CE5C000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800724654.000000006CE84000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800735219.000000006CE87000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800744992.000000006CE8A000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_6cd60000_loaddll32.jbxd
Similarity
  • API ID: DebugOutputString
  • String ID: %ls(%d) : %ls$(*_errno())$, Line $P$Second Chance Assertion Failed: File $_CrtDbgReport: String too long or IO Error$_CrtDbgReport: String too long or Invalid characters in String$_VCrtDbgReportW$_itow_s(nLine, szLineMessage, 4096, 10)$minkernel\crts\ucrt\src\appcrt\misc\dbgrptt.cpp$strcpy_s(szOutMessage2, 4096, "_CrtDbgReport: String too long or Invalid characters in String")$wcscat_s(szLineMessage, 4096, L"\n")$wcscat_s(szLineMessage, 4096, L"\r")$wcscat_s(szLineMessage, 4096, szUserMessage)$wcscpy_s(szLineMessage, 4096, szFormat ? L"Assertion failed: " : L"Assertion failed!")$wcscpy_s(szOutMessage, 4096, L"_CrtDbgReport: String too long or IO Error")$wcscpy_s(szOutMessage, 4096, szLineMessage)$wcscpy_s(szUserMessage, 4096, L"_CrtDbgReport: String too long or IO Error")$wcstombs_s(&ret, szaOutMessage, 4096, szOutMessage, ((size_t)-1))$wcstombs_s(nullptr, szOutMessage2, 4096, szOutMessage, ((size_t)-1))
  • API String ID: 1166629820-796398028
  • Opcode ID: bf9a7dca1757525694f2f1339ba2a6894e781001603ca4778b86aeddcdb6dcbf
  • Instruction ID: d4d1ae05a2ca84dcef81d5de76f179b040eb0c5e30ee43600459b12d1e41ba08
  • Opcode Fuzzy Hash: bf9a7dca1757525694f2f1339ba2a6894e781001603ca4778b86aeddcdb6dcbf
  • Instruction Fuzzy Hash: E332F6B1E40248EBEB60DF50CC45FDE7774BB09348F208594F549B6A80DB74AA98CF65
APIs
  • VirtualQuery.KERNEL32(?,?,0000001C), ref: 6CDC24E5
  • GetProcAddress.KERNEL32(00000000,PDBOpenValidate5), ref: 6CDC25AF
  • GetProcessHeap.KERNEL32(00000000,00000000), ref: 6CDC270C
  • HeapFree.KERNEL32(00000000), ref: 6CDC2713
  • GetProcessHeap.KERNEL32 ref: 6CDC2784
  • HeapAlloc.KERNEL32(00000000,00000000,?), ref: 6CDC278E
Strings
Memory Dump Source
  • Source File: 00000000.00000002.1800636456.000000006CDB9000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CD60000, based on PE: true
  • Associated: 00000000.00000002.1800618530.000000006CD60000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CDB0000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CE59000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800706037.000000006CE5C000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800724654.000000006CE84000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800735219.000000006CE87000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800744992.000000006CE8A000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_6cd60000_loaddll32.jbxd
Similarity
  • API ID: Heap$Process$AddressAllocFreeProcQueryVirtual
  • String ID: PDBOpenValidate5
  • API String ID: 1898765391-413491164
  • Opcode ID: 53d6bb7413b079e0df2cfcea7ba84f3027b25eb7ec6f37091ba839fbce1691df
  • Instruction ID: a5e7a049dd3c934ebef131282456f3efe72b9aee617d42d925dc520d5f5ab800
  • Opcode Fuzzy Hash: 53d6bb7413b079e0df2cfcea7ba84f3027b25eb7ec6f37091ba839fbce1691df
  • Instruction Fuzzy Hash: 30B16D75B01219DFDF01DFA4C898BAE7B7ABF49718F240055E912A7390DB31E912CB92
APIs
  • GetLocaleInfoW.KERNEL32(?,20001004,?,00000002), ref: 6CE42E9D
  • GetACP.KERNEL32 ref: 6CE42EB1
  • GetLocaleInfoW.KERNEL32(?,2000000B,?,00000002), ref: 6CE42EE2
Strings
Memory Dump Source
  • Source File: 00000000.00000002.1800636456.000000006CDB9000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CD60000, based on PE: true
  • Associated: 00000000.00000002.1800618530.000000006CD60000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CDB0000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CE59000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800706037.000000006CE5C000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800724654.000000006CE84000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800735219.000000006CE87000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800744992.000000006CE8A000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_6cd60000_loaddll32.jbxd
Similarity
  • API ID: InfoLocale
  • String ID: ACP$OCP
  • API String ID: 2299586839-711371036
  • Opcode ID: 99f6a16f5550c023c6dc95a4afe17eed9bd6a0ddaa8cc52961c77766d6cc9841
  • Instruction ID: ed4358b018813aa46c8ae7fc312f07fe0eb9e5cd590edd0a29aff9cb4899708f
  • Opcode Fuzzy Hash: 99f6a16f5550c023c6dc95a4afe17eed9bd6a0ddaa8cc52961c77766d6cc9841
  • Instruction Fuzzy Hash: 47118E75600105EBDB00CF62D849F9A3778AB5634CF20C518FD06DBA00E731DA41CB61
APIs
  • IsValidCodePage.KERNEL32(00000000), ref: 6CE432AE
    • Part of subcall function 6CE422E0: GetUserDefaultLCID.KERNEL32 ref: 6CE422F6
  • IsValidLocale.KERNEL32(00000000,00000001), ref: 6CE432C8
  • GetLocaleInfoW.KERNEL32(00000000,00001001,00000000,00000040,00000000,-00000120,00000055,00000000,00000000,?,00000055,00000000), ref: 6CE43331
Memory Dump Source
  • Source File: 00000000.00000002.1800636456.000000006CDB9000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CD60000, based on PE: true
  • Associated: 00000000.00000002.1800618530.000000006CD60000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CDB0000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CE59000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800706037.000000006CE5C000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800724654.000000006CE84000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800735219.000000006CE87000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800744992.000000006CE8A000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_6cd60000_loaddll32.jbxd
Similarity
  • API ID: LocaleValid$CodeDefaultInfoPageUser
  • String ID:
  • API String ID: 334263767-0
  • Opcode ID: 15b2e34d2cf20099d7b6fd185cdd7ac8c89b6e1a46e115e437c3a2f2cea83732
  • Instruction ID: c916a88bb48341102f3a5972c183d2d7c5f7ea7c3fb9f4b0f8a9c21ba94d63f9
  • Opcode Fuzzy Hash: 15b2e34d2cf20099d7b6fd185cdd7ac8c89b6e1a46e115e437c3a2f2cea83732
  • Instruction Fuzzy Hash: A5914CB1A01205DBEB04CFA4D885BAFB7B6EF49309F24C118E505AB780D735E946CBA5
APIs
  • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 6CDC13EB
  • IsDebuggerPresent.KERNEL32 ref: 6CDC14BB
  • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 6CDC14E7
  • UnhandledExceptionFilter.KERNEL32(?), ref: 6CDC14F1
Memory Dump Source
  • Source File: 00000000.00000002.1800636456.000000006CDB9000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CD60000, based on PE: true
  • Associated: 00000000.00000002.1800618530.000000006CD60000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CDB0000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CE59000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800706037.000000006CE5C000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800724654.000000006CE84000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800735219.000000006CE87000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800744992.000000006CE8A000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_6cd60000_loaddll32.jbxd
Similarity
  • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
  • String ID:
  • API String ID: 254469556-0
  • Opcode ID: e63b9b375ee64aedd9b45a0ae40be761bf6043f0738f79a9a9c12482f7c7caa0
  • Instruction ID: bfc363df6d1991ac57ae989f7b59eef81b6264f888e7e99f993b9fda9718904a
  • Opcode Fuzzy Hash: e63b9b375ee64aedd9b45a0ae40be761bf6043f0738f79a9a9c12482f7c7caa0
  • Instruction Fuzzy Hash: B13107B4E152289BDB11DF64C8497DDBBB4AF09304F1481D9E80D6B290E7759A88CF51
APIs
  • GetLocaleInfoW.KERNEL32(?,00001002,?,00000078), ref: 6CE4261F
  • GetLocaleInfoW.KERNEL32(?,00001001,?,00000078), ref: 6CE42699
    • Part of subcall function 6CE42FA0: GetLocaleInfoW.KERNEL32(00000000,20000001,?,00000002,?,?,00000000,?), ref: 6CE42FDB
  • GetLocaleInfoW.KERNEL32(?,00001001,?,00000078), ref: 6CE42835
Memory Dump Source
  • Source File: 00000000.00000002.1800636456.000000006CDB9000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CD60000, based on PE: true
  • Associated: 00000000.00000002.1800618530.000000006CD60000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CDB0000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CE59000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800706037.000000006CE5C000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800724654.000000006CE84000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800735219.000000006CE87000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800744992.000000006CE8A000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_6cd60000_loaddll32.jbxd
Similarity
  • API ID: InfoLocale
  • String ID:
  • API String ID: 2299586839-0
  • Opcode ID: b33919f70b1f2a8ffda6b0978d29f41a9fa06872ccfd89050b20e5d7792e2d03
  • Instruction ID: cb17801d8ef4da88db98c13211a27c6be8c5fc850b1411d67d1789b34ac57509
  • Opcode Fuzzy Hash: b33919f70b1f2a8ffda6b0978d29f41a9fa06872ccfd89050b20e5d7792e2d03
  • Instruction Fuzzy Hash: B2D11D74A4021ACBDB64CF14D884BE9B3B5BB59308F21C1E8D559ABB40EB70AEC5DF50
APIs
  • IsDebuggerPresent.KERNEL32 ref: 6CDD8910
  • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 6CDD891E
  • UnhandledExceptionFilter.KERNEL32(?), ref: 6CDD892B
Memory Dump Source
  • Source File: 00000000.00000002.1800636456.000000006CDB9000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CD60000, based on PE: true
  • Associated: 00000000.00000002.1800618530.000000006CD60000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CDB0000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CE59000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800706037.000000006CE5C000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800724654.000000006CE84000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800735219.000000006CE87000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800744992.000000006CE8A000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_6cd60000_loaddll32.jbxd
Similarity
  • API ID: ExceptionFilterUnhandled$DebuggerPresent
  • String ID:
  • API String ID: 3906539128-0
  • Opcode ID: ecc86e32a6408c1748ea6d3c8a59eb6ac88683b58985ae8a54acda5eea46fecf
  • Instruction ID: d80df96b8be99c565e74104fe82776ec55a39f4f2e78447f2a20b6f018f5224b
  • Opcode Fuzzy Hash: ecc86e32a6408c1748ea6d3c8a59eb6ac88683b58985ae8a54acda5eea46fecf
  • Instruction Fuzzy Hash: BB41E5B5D11228DBCB25DF24D8887D9B7B4BF08314F5042DAE80DA6290E7309B89CF95
Strings
  • %ls, xrefs: 6CE3BEB9
  • minkernel\crts\ucrt\inc\corecrt_internal_big_integer.h, xrefs: 6CE3BEC5
  • ("Division by zero", false), xrefs: 6CE3BEB4
Memory Dump Source
  • Source File: 00000000.00000002.1800636456.000000006CDB9000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CD60000, based on PE: true
  • Associated: 00000000.00000002.1800618530.000000006CD60000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CDB0000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CE59000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800706037.000000006CE5C000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800724654.000000006CE84000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800735219.000000006CE87000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800744992.000000006CE8A000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_6cd60000_loaddll32.jbxd
Similarity
  • API ID:
  • String ID: %ls$("Division by zero", false)$minkernel\crts\ucrt\inc\corecrt_internal_big_integer.h
  • API String ID: 0-226933
  • Opcode ID: eff7d11370f3bb5fba32e8f625b4e99b251a2bbb4aa94e4ec84311719ae9bff8
  • Instruction ID: aaa99f0de189d23d42fb1f03147a596c1418d612756f97a7f9a3e7c0749d7b30
  • Opcode Fuzzy Hash: eff7d11370f3bb5fba32e8f625b4e99b251a2bbb4aa94e4ec84311719ae9bff8
  • Instruction Fuzzy Hash: C962A974E049288FDB64DF18CD94B9AB7B2BB89356F1092D9D80DA7744DB34AE81CF40
Strings
  • %ls, xrefs: 6CE19CB8
  • minkernel\crts\ucrt\src\appcrt\internal\win_policies.cpp, xrefs: 6CE19CC1
  • cached_state == static_cast<long>(policyValue), xrefs: 6CE19CB3
Memory Dump Source
  • Source File: 00000000.00000002.1800636456.000000006CDB9000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CD60000, based on PE: true
  • Associated: 00000000.00000002.1800618530.000000006CD60000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CDB0000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CE59000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800706037.000000006CE5C000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800724654.000000006CE84000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800735219.000000006CE87000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800744992.000000006CE8A000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_6cd60000_loaddll32.jbxd
Similarity
  • API ID:
  • String ID: %ls$cached_state == static_cast<long>(policyValue)$minkernel\crts\ucrt\src\appcrt\internal\win_policies.cpp
  • API String ID: 0-2042085565
  • Opcode ID: afcb949b6828f3167c9a752999c300ea0033045a4c7361934ab1cf1d9b9c050a
  • Instruction ID: e56a37c50bc25c39931a978bc734f7d2a17ed6416fdc6ed698702eb5cf861931
  • Opcode Fuzzy Hash: afcb949b6828f3167c9a752999c300ea0033045a4c7361934ab1cf1d9b9c050a
  • Instruction Fuzzy Hash: FD1182B5D45208EBDB00DB95C941B9DB7F4BB44308F304698D41A6BF80E775AA65CBC1
Strings
  • %ls, xrefs: 6CE19B18
  • minkernel\crts\ucrt\src\appcrt\internal\win_policies.cpp, xrefs: 6CE19B21
  • cached_state == static_cast<long>(policyValue), xrefs: 6CE19B13
Memory Dump Source
  • Source File: 00000000.00000002.1800636456.000000006CDB9000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CD60000, based on PE: true
  • Associated: 00000000.00000002.1800618530.000000006CD60000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CDB0000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CE59000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800706037.000000006CE5C000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800724654.000000006CE84000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800735219.000000006CE87000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800744992.000000006CE8A000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_6cd60000_loaddll32.jbxd
Similarity
  • API ID:
  • String ID: %ls$cached_state == static_cast<long>(policyValue)$minkernel\crts\ucrt\src\appcrt\internal\win_policies.cpp
  • API String ID: 0-2042085565
  • Opcode ID: 641785cbccf0d7eb8ad7378f327a6833013778336f96585d77668f4642fb5504
  • Instruction ID: 9c199a21d8a02cb6fb032b8b73606905587d10052848645318993c02ed2360a8
  • Opcode Fuzzy Hash: 641785cbccf0d7eb8ad7378f327a6833013778336f96585d77668f4642fb5504
  • Instruction Fuzzy Hash: D411C2B4D15208EBDB00DBA5C842F9EB3B0AB04308F304698D4196BF80E734EB64CB81
Strings
  • %ls, xrefs: 6CE19BE8
  • minkernel\crts\ucrt\src\appcrt\internal\win_policies.cpp, xrefs: 6CE19BF1
  • cached_state == static_cast<long>(policyValue), xrefs: 6CE19BE3
Memory Dump Source
  • Source File: 00000000.00000002.1800636456.000000006CDB9000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CD60000, based on PE: true
  • Associated: 00000000.00000002.1800618530.000000006CD60000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CDB0000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CE59000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800706037.000000006CE5C000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800724654.000000006CE84000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800735219.000000006CE87000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800744992.000000006CE8A000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_6cd60000_loaddll32.jbxd
Similarity
  • API ID:
  • String ID: %ls$cached_state == static_cast<long>(policyValue)$minkernel\crts\ucrt\src\appcrt\internal\win_policies.cpp
  • API String ID: 0-2042085565
  • Opcode ID: ff10486fbf3b7490106e06cc252495d52b37084abdeadff758a237c20d07ce06
  • Instruction ID: 3126536a8822e72a387a97a9fc128e3521baf72621485b747bc4f5c1878de022
  • Opcode Fuzzy Hash: ff10486fbf3b7490106e06cc252495d52b37084abdeadff758a237c20d07ce06
  • Instruction Fuzzy Hash: F41182B5D45208ABDB00DF95C941B9DB7B0AB44308F344AA8D81A6BF80E775AB64CB81
APIs
  • FindFirstFileExW.KERNEL32(00000000,00000000,?), ref: 6CE21773
  • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,00000000), ref: 6CE21915
Memory Dump Source
  • Source File: 00000000.00000002.1800636456.000000006CDB9000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CD60000, based on PE: true
  • Associated: 00000000.00000002.1800618530.000000006CD60000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CDB0000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CE59000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800706037.000000006CE5C000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800724654.000000006CE84000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800735219.000000006CE87000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800744992.000000006CE8A000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_6cd60000_loaddll32.jbxd
Similarity
  • API ID: FileFind$FirstNext
  • String ID:
  • API String ID: 1690352074-0
  • Opcode ID: 4d60a4d972bcdb814794c8d9f3f9aefbd12c0d9148c63ef18a101a44cf0d5003
  • Instruction ID: e0b7f837be8a676f7a10d260a5953eee8763809b98edd152ac9b34f617eeeba1
  • Opcode Fuzzy Hash: 4d60a4d972bcdb814794c8d9f3f9aefbd12c0d9148c63ef18a101a44cf0d5003
  • Instruction Fuzzy Hash: 36A14E71A042289BCB24DF64CC98BED73B5AF85308F2041D9E44A6B690DF35AF89CF50
APIs
  • FindFirstFileExW.KERNEL32(00000000,00000000,?), ref: 6CE21311
  • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,00000000), ref: 6CE214B3
Memory Dump Source
  • Source File: 00000000.00000002.1800636456.000000006CDB9000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CD60000, based on PE: true
  • Associated: 00000000.00000002.1800618530.000000006CD60000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CDB0000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CE59000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800706037.000000006CE5C000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800724654.000000006CE84000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800735219.000000006CE87000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800744992.000000006CE8A000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_6cd60000_loaddll32.jbxd
Similarity
  • API ID: FileFind$FirstNext
  • String ID:
  • API String ID: 1690352074-0
  • Opcode ID: 613d461007fb9c44fccc015debf851af98bb51209d16dd4223fd9de401c1d153
  • Instruction ID: 209d1e31b7854025e5b393e38ec938aa071c83568070496e98d3491c74a3c855
  • Opcode Fuzzy Hash: 613d461007fb9c44fccc015debf851af98bb51209d16dd4223fd9de401c1d153
  • Instruction Fuzzy Hash: 1DA17E719042689BDB24DF64CC98BEE7775AF45308F2041D9E40A6BA90DF35AF88CF50
APIs
  • GetLocaleInfoW.KERNEL32(?,00001001,?,00000078), ref: 6CE42BDF
    • Part of subcall function 6CE42FA0: GetLocaleInfoW.KERNEL32(00000000,20000001,?,00000002,?,?,00000000,?), ref: 6CE42FDB
Memory Dump Source
  • Source File: 00000000.00000002.1800636456.000000006CDB9000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CD60000, based on PE: true
  • Associated: 00000000.00000002.1800618530.000000006CD60000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CDB0000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CE59000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800706037.000000006CE5C000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800724654.000000006CE84000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800735219.000000006CE87000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800744992.000000006CE8A000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_6cd60000_loaddll32.jbxd
Similarity
  • API ID: InfoLocale
  • String ID:
  • API String ID: 2299586839-0
  • Opcode ID: 3f622d1905ad23e4af0ec0221f7f3ef83c768e9d7bda4dadf08c3ff015e5f25c
  • Instruction ID: 8b300d050d299c18631630f2d7e84c9f059d714238f715d5fa1c347fc2eb4e1e
  • Opcode Fuzzy Hash: 3f622d1905ad23e4af0ec0221f7f3ef83c768e9d7bda4dadf08c3ff015e5f25c
  • Instruction Fuzzy Hash: 58511FB5E4021A8BDB64CF14D884BE9B3B5AB58308F11C1E8D80DA7B40E771AEC5DF50
APIs
  • GetSystemInfo.KERNEL32(?,91CE9983), ref: 6CE10E96
Memory Dump Source
  • Source File: 00000000.00000002.1800636456.000000006CDB9000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CD60000, based on PE: true
  • Associated: 00000000.00000002.1800618530.000000006CD60000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CDB0000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CE59000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800706037.000000006CE5C000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800724654.000000006CE84000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800735219.000000006CE87000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800744992.000000006CE8A000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_6cd60000_loaddll32.jbxd
Similarity
  • API ID: InfoSystem
  • String ID:
  • API String ID: 31276548-0
  • Opcode ID: 6fec0062dea64b36bb47005d2d5a20e841f9e195babb46e18a0fa8014dbcb9c8
  • Instruction ID: a253d81e280a9f1b58e615dab88d05702743971e2fb4d7e0e50387b6f8a420ca
  • Opcode Fuzzy Hash: 6fec0062dea64b36bb47005d2d5a20e841f9e195babb46e18a0fa8014dbcb9c8
  • Instruction Fuzzy Hash: FC31DD75D09258DFCF10CFA8C981ADEBBB1BB4A320F20826AE419B3A40D3356951CB64
APIs
  • GetLocaleInfoW.KERNEL32(?,00001002,?,00000078), ref: 6CE4214F
Memory Dump Source
  • Source File: 00000000.00000002.1800636456.000000006CDB9000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CD60000, based on PE: true
  • Associated: 00000000.00000002.1800618530.000000006CD60000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CDB0000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CE59000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800706037.000000006CE5C000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800724654.000000006CE84000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800735219.000000006CE87000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800744992.000000006CE8A000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_6cd60000_loaddll32.jbxd
Similarity
  • API ID: InfoLocale
  • String ID:
  • API String ID: 2299586839-0
  • Opcode ID: 47dc104ddc41fba0b69fb92663c1a9188cff5026ad6cbe8589324307fa4409cc
  • Instruction ID: fb24a08f570213eae72ce0e9139329bf04d76d7ef739dc91207cb921589c612e
  • Opcode Fuzzy Hash: 47dc104ddc41fba0b69fb92663c1a9188cff5026ad6cbe8589324307fa4409cc
  • Instruction Fuzzy Hash: 373159B1E0021ACBDB24CF14DC84BEAB7B4AB18304F1181E9D909A7740EB70AEC4DF50
APIs
  • EnumSystemLocalesW.KERNEL32(6CE425A0,00000001), ref: 6CE423D9
Memory Dump Source
  • Source File: 00000000.00000002.1800636456.000000006CDB9000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CD60000, based on PE: true
  • Associated: 00000000.00000002.1800618530.000000006CD60000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CDB0000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CE59000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800706037.000000006CE5C000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800724654.000000006CE84000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800735219.000000006CE87000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800744992.000000006CE8A000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_6cd60000_loaddll32.jbxd
Similarity
  • API ID: EnumLocalesSystem
  • String ID:
  • API String ID: 2099609381-0
  • Opcode ID: ecc079373d14fe796ad84fc27fa02a513fdbcfe110aac374d8243fb90f59cc9d
  • Instruction ID: e7875b5ad6a2d535d1b5318a002a550c4c2c80281e8bbb4bcf82bf257fe666d9
  • Opcode Fuzzy Hash: ecc079373d14fe796ad84fc27fa02a513fdbcfe110aac374d8243fb90f59cc9d
  • Instruction Fuzzy Hash: 38212AB5A00209EFDB04CF94D488B9EBBB2FB59308F208598D8159B791D775EE85CB81
APIs
  • GetLocaleInfoW.KERNEL32(00000000,20000001,?,00000002,?,?,00000000,?), ref: 6CE42FDB
Memory Dump Source
  • Source File: 00000000.00000002.1800636456.000000006CDB9000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CD60000, based on PE: true
  • Associated: 00000000.00000002.1800618530.000000006CD60000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CDB0000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CE59000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800706037.000000006CE5C000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800724654.000000006CE84000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800735219.000000006CE87000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800744992.000000006CE8A000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_6cd60000_loaddll32.jbxd
Similarity
  • API ID: InfoLocale
  • String ID:
  • API String ID: 2299586839-0
  • Opcode ID: e02b421bac2f9fa11dc73ba3eec4fcb69d6e8c469f5f6da22fead2ba9471b1c0
  • Instruction ID: dffd6f4117b36845daa13239d2b4990dadddc31779d9c138e29598f8e68374e9
  • Opcode Fuzzy Hash: e02b421bac2f9fa11dc73ba3eec4fcb69d6e8c469f5f6da22fead2ba9471b1c0
  • Instruction Fuzzy Hash: 1701B5B2D00114ABDB10DBA5E885BBE77B9AB44309F20C665E815DB780E635EE409BA1
APIs
  • EnumSystemLocalesW.KERNEL32(6CE42B60,00000001), ref: 6CE424C2
Memory Dump Source
  • Source File: 00000000.00000002.1800636456.000000006CDB9000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CD60000, based on PE: true
  • Associated: 00000000.00000002.1800618530.000000006CD60000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CDB0000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CE59000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800706037.000000006CE5C000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800724654.000000006CE84000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800735219.000000006CE87000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800744992.000000006CE8A000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_6cd60000_loaddll32.jbxd
Similarity
  • API ID: EnumLocalesSystem
  • String ID:
  • API String ID: 2099609381-0
  • Opcode ID: 8f96f54b95935e429005b98c38ca58438640180460d0b9ad02d61672c3e769dd
  • Instruction ID: f17f1059e87b7657933cd2170b40ee9947364b7b419ee86380a10073260b4af1
  • Opcode Fuzzy Hash: 8f96f54b95935e429005b98c38ca58438640180460d0b9ad02d61672c3e769dd
  • Instruction Fuzzy Hash: 031169B4E00208EFDB00CF94D488B9DBBB2FB99308F208598D815AB740D775AE85CF81
APIs
  • GetLocaleInfoW.KERNEL32(00000000,?,00000000,?,?,?), ref: 6CE1FAA2
Memory Dump Source
  • Source File: 00000000.00000002.1800636456.000000006CDB9000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CD60000, based on PE: true
  • Associated: 00000000.00000002.1800618530.000000006CD60000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CDB0000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CE59000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800706037.000000006CE5C000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800724654.000000006CE84000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800735219.000000006CE87000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800744992.000000006CE8A000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_6cd60000_loaddll32.jbxd
Similarity
  • API ID: InfoLocale
  • String ID:
  • API String ID: 2299586839-0
  • Opcode ID: 8af8e50885f0fc0164b2b9a7981d5920a5f16f48bafd3e28e32ef4e6929feb96
  • Instruction ID: 1433f1d988c09430dcd0c62f0e6fd5b3766f717af75c36de4b53b9b75ce6a83d
  • Opcode Fuzzy Hash: 8af8e50885f0fc0164b2b9a7981d5920a5f16f48bafd3e28e32ef4e6929feb96
  • Instruction Fuzzy Hash: 8B01EC75A04108FFCB04DF98D858EAF77B9EF89301F208558F91997650D734AE51CBA1
APIs
  • EnumSystemLocalesW.KERNEL32(Function_000E20D0,00000001), ref: 6CE422A7
Memory Dump Source
  • Source File: 00000000.00000002.1800636456.000000006CDB9000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CD60000, based on PE: true
  • Associated: 00000000.00000002.1800618530.000000006CD60000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CDB0000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CE59000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800706037.000000006CE5C000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800724654.000000006CE84000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800735219.000000006CE87000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800744992.000000006CE8A000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_6cd60000_loaddll32.jbxd
Similarity
  • API ID: EnumLocalesSystem
  • String ID:
  • API String ID: 2099609381-0
  • Opcode ID: f44681dde674df501fee042bb0477f23805f48ebff572e917d17eb9dd7955b8a
  • Instruction ID: 37b8f7ef89624785ddd40f4722b5ac739585f362584fe4025ca5a074881c94e8
  • Opcode Fuzzy Hash: f44681dde674df501fee042bb0477f23805f48ebff572e917d17eb9dd7955b8a
  • Instruction Fuzzy Hash: B8F054B5E00208EFDB00DF94D888B8E7BB1EB45318F248594E8099B740D771EE84CBD1
APIs
  • EnumSystemLocalesW.KERNEL32(00000000,00000001), ref: 6CE1EAB9
Memory Dump Source
  • Source File: 00000000.00000002.1800636456.000000006CDB9000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CD60000, based on PE: true
  • Associated: 00000000.00000002.1800618530.000000006CD60000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CDB0000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CE59000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800706037.000000006CE5C000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800724654.000000006CE84000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800735219.000000006CE87000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800744992.000000006CE8A000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_6cd60000_loaddll32.jbxd
Similarity
  • API ID: EnumLocalesSystem
  • String ID:
  • API String ID: 2099609381-0
  • Opcode ID: 13cf7eeb61f0655139d0dc89fcab583503d57a455fa759b04ef70e5b04cba093
  • Instruction ID: e168a9ae6c5c97030deb492e77a150d2cdc6acd0743fdaedf22c301771005ad0
  • Opcode Fuzzy Hash: 13cf7eeb61f0655139d0dc89fcab583503d57a455fa759b04ef70e5b04cba093
  • Instruction Fuzzy Hash: C7F012B1D093486BDF00DFA4D84AADE7F749B15244F0440A9E80AA7780EA71AA1CCB62
APIs
  • GetSystemTimeAsFileTime.KERNEL32(?), ref: 6CE1FB02
Memory Dump Source
  • Source File: 00000000.00000002.1800636456.000000006CDB9000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CD60000, based on PE: true
  • Associated: 00000000.00000002.1800618530.000000006CD60000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CDB0000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CE59000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800706037.000000006CE5C000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800724654.000000006CE84000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800735219.000000006CE87000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800744992.000000006CE8A000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_6cd60000_loaddll32.jbxd
Similarity
  • API ID: Time$FileSystem
  • String ID:
  • API String ID: 2086374402-0
  • Opcode ID: 439751679031f8997756e972d6c91ed9f92d59cb7cd611009c4e3dd038f0ed22
  • Instruction ID: 203f2fb26a409c5b79009336a81f056a4933b40853be60808641c62d04be5cd5
  • Opcode Fuzzy Hash: 439751679031f8997756e972d6c91ed9f92d59cb7cd611009c4e3dd038f0ed22
  • Instruction Fuzzy Hash: 2AE01275905108EBCB00DFA8C4489DDBF75EB85301F208169F90597B40DB345F55DB91
APIs
  • SetUnhandledExceptionFilter.KERNEL32(6CDB2EA4), ref: 6CDC1698
Memory Dump Source
  • Source File: 00000000.00000002.1800636456.000000006CDB9000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CD60000, based on PE: true
  • Associated: 00000000.00000002.1800618530.000000006CD60000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CDB0000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CE59000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800706037.000000006CE5C000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800724654.000000006CE84000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800735219.000000006CE87000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800744992.000000006CE8A000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_6cd60000_loaddll32.jbxd
Similarity
  • API ID: ExceptionFilterUnhandled
  • String ID:
  • API String ID: 3192549508-0
  • Opcode ID: e1436ea85442fc5830459ce4ef2753163e364948392d06a61b49ec2310b0a991
  • Instruction ID: e34eecfeee6d7da34a5816e362718ceed7b725ee8676a089b4aec941ff84a6a1
  • Opcode Fuzzy Hash: e1436ea85442fc5830459ce4ef2753163e364948392d06a61b49ec2310b0a991
  • Instruction Fuzzy Hash: 35A022B220220CAB0A0033C3A80C8203B3CCA030A83000080FA0E088200B22A80000F3
Strings
Memory Dump Source
  • Source File: 00000000.00000002.1800636456.000000006CDB9000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CD60000, based on PE: true
  • Associated: 00000000.00000002.1800618530.000000006CD60000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CDB0000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CE59000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800706037.000000006CE5C000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800724654.000000006CE84000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800735219.000000006CE87000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800744992.000000006CE8A000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_6cd60000_loaddll32.jbxd
Similarity
  • API ID:
  • String ID: 0
  • API String ID: 0-4108050209
  • Opcode ID: 298c53da0bea7c7aea81ee972b8ad5dccbfc9b8249e86a434f1a5563ba5210f3
  • Instruction ID: 9eae4c703e9004db62b9e915cb1cd7b3244719370ffde9d1da53793f31230dd3
  • Opcode Fuzzy Hash: 298c53da0bea7c7aea81ee972b8ad5dccbfc9b8249e86a434f1a5563ba5210f3
  • Instruction Fuzzy Hash: 6A21D2B5E01208DFCB04CF98D594AEDFBB5FB49314F10406AE80ABBB64D734A945CBA1
Memory Dump Source
  • Source File: 00000000.00000002.1800636456.000000006CDB0000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CD60000, based on PE: true
  • Associated: 00000000.00000002.1800618530.000000006CD60000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CDB9000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CE59000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800706037.000000006CE5C000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800724654.000000006CE84000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800735219.000000006CE87000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800744992.000000006CE8A000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_6cd60000_loaddll32.jbxd
Similarity
  • API ID:
  • String ID:
  • API String ID:
  • Opcode ID: 51bde81ecb97f5faec1888add91adb6984f6402456a2f311ca70219574dafe0a
  • Instruction ID: d5fa17da0a90752c8a50682aac3312c6ada422a56d37f5b3b010c91c1eb183cf
  • Opcode Fuzzy Hash: 51bde81ecb97f5faec1888add91adb6984f6402456a2f311ca70219574dafe0a
  • Instruction Fuzzy Hash:
Memory Dump Source
  • Source File: 00000000.00000002.1800636456.000000006CDB0000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CD60000, based on PE: true
  • Associated: 00000000.00000002.1800618530.000000006CD60000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CDB9000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CE59000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800706037.000000006CE5C000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800724654.000000006CE84000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800735219.000000006CE87000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800744992.000000006CE8A000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_6cd60000_loaddll32.jbxd
Similarity
  • API ID:
  • String ID:
  • API String ID:
  • Opcode ID: 2680a777aee5739fa26acd961692cb3e0ea7db0d2bb2725d31725b4632fc1eb6
  • Instruction ID: 7613f45f7c81b4d6f0b429c86eecba375c121f2f7f981deefb9d399fca50e3bc
  • Opcode Fuzzy Hash: 2680a777aee5739fa26acd961692cb3e0ea7db0d2bb2725d31725b4632fc1eb6
  • Instruction Fuzzy Hash:
Memory Dump Source
  • Source File: 00000000.00000002.1800636456.000000006CDB0000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CD60000, based on PE: true
  • Associated: 00000000.00000002.1800618530.000000006CD60000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CDB9000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CE59000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800706037.000000006CE5C000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800724654.000000006CE84000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800735219.000000006CE87000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800744992.000000006CE8A000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_6cd60000_loaddll32.jbxd
Similarity
  • API ID:
  • String ID:
  • API String ID:
  • Opcode ID: f96ec4d85f0ae5d25d511165f6e49977c588385641b28382695bcff3dc60fdac
  • Instruction ID: 8df3cd9a4c0b9ab967d7e5b5e4614ffa0ace237ae96bc1caeb1c6b3f611089a9
  • Opcode Fuzzy Hash: f96ec4d85f0ae5d25d511165f6e49977c588385641b28382695bcff3dc60fdac
  • Instruction Fuzzy Hash:
Memory Dump Source
  • Source File: 00000000.00000002.1800636456.000000006CDB0000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CD60000, based on PE: true
  • Associated: 00000000.00000002.1800618530.000000006CD60000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CDB9000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CE59000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800706037.000000006CE5C000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800724654.000000006CE84000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800735219.000000006CE87000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800744992.000000006CE8A000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_6cd60000_loaddll32.jbxd
Similarity
  • API ID:
  • String ID:
  • API String ID:
  • Opcode ID: f705626199d356711a944149a4bfafe2969aa4768b69521a559410c4e830581a
  • Instruction ID: c4632f29725b87659d9d76dc622997f8ecaa74a56e919c2d64210e365425eed9
  • Opcode Fuzzy Hash: f705626199d356711a944149a4bfafe2969aa4768b69521a559410c4e830581a
  • Instruction Fuzzy Hash:
APIs
  • GetModuleHandleExW.KERNEL32(00000006,?,00000000), ref: 6CDDA840
Strings
  • @, xrefs: 6CDDA90C
  • traits::tcscpy_s(program_name, (sizeof(*__countof_helper(program_name)) + 0), get_program_name_unknown_text(Character())), xrefs: 6CDDA8C0
  • _CrtDbgReport: String too long or IO Error, xrefs: 6CDDAC50
  • minkernel\crts\ucrt\src\appcrt\misc\dbgrpt.cpp, xrefs: 6CDDA8B6, 6CDDAC01, 6CDDAC41
  • wcscpy_s(message_buffer, 4096, L"_CrtDbgReport: String too long or IO Error"), xrefs: 6CDDAC4B
  • common_message_window, xrefs: 6CDDA8BB, 6CDDAC06, 6CDDAC46
  • @, xrefs: 6CDDA9AF
  • ..., xrefs: 6CDDAB1E
  • (*_errno()), xrefs: 6CDDAC0B
  • Microsoft Visual C++ Runtime Library, xrefs: 6CDDAC77
Memory Dump Source
  • Source File: 00000000.00000002.1800636456.000000006CDB9000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CD60000, based on PE: true
  • Associated: 00000000.00000002.1800618530.000000006CD60000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CDB0000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CE59000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800706037.000000006CE5C000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800724654.000000006CE84000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800735219.000000006CE87000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800744992.000000006CE8A000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_6cd60000_loaddll32.jbxd
Similarity
  • API ID: HandleModule
  • String ID: (*_errno())$...$@$@$Microsoft Visual C++ Runtime Library$_CrtDbgReport: String too long or IO Error$common_message_window$minkernel\crts\ucrt\src\appcrt\misc\dbgrpt.cpp$traits::tcscpy_s(program_name, (sizeof(*__countof_helper(program_name)) + 0), get_program_name_unknown_text(Character()))$wcscpy_s(message_buffer, 4096, L"_CrtDbgReport: String too long or IO Error")
  • API String ID: 4139908857-1633980848
  • Opcode ID: 312f9412fa9ca37f7ceb4d5f40ab176da204299f7164342b48a64edf3ed015fb
  • Instruction ID: 29874a0997c18cc8cc8cf607f4994ba7f95d14d8496639410a16bc35ce8e3343
  • Opcode Fuzzy Hash: 312f9412fa9ca37f7ceb4d5f40ab176da204299f7164342b48a64edf3ed015fb
  • Instruction Fuzzy Hash: 20D190B1E41229EBDB24DF94CC89BDAB374AB44304F1181D9E40D67AA0D774ABC5CF91
APIs
  • GetModuleHandleExW.KERNEL32(00000006,?,00000000), ref: 6CDDA220
Strings
  • @, xrefs: 6CDDA2EC
  • traits::tcscpy_s(program_name, (sizeof(*__countof_helper(program_name)) + 0), get_program_name_unknown_text(Character())), xrefs: 6CDDA2A0
  • _CrtDbgReport: String too long or IO Error, xrefs: 6CDDA621
  • minkernel\crts\ucrt\src\appcrt\misc\dbgrpt.cpp, xrefs: 6CDDA296, 6CDDA5D2, 6CDDA612
  • wcscpy_s(message_buffer, 4096, L"_CrtDbgReport: String too long or IO Error"), xrefs: 6CDDA61C
  • common_message_window, xrefs: 6CDDA29B, 6CDDA5D7, 6CDDA617
  • ..., xrefs: 6CDDA4EF
  • (*_errno()), xrefs: 6CDDA5DC
  • @, xrefs: 6CDDA380
  • Microsoft Visual C++ Runtime Library, xrefs: 6CDDA648
Memory Dump Source
  • Source File: 00000000.00000002.1800636456.000000006CDB9000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CD60000, based on PE: true
  • Associated: 00000000.00000002.1800618530.000000006CD60000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CDB0000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CE59000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800706037.000000006CE5C000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800724654.000000006CE84000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800735219.000000006CE87000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800744992.000000006CE8A000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_6cd60000_loaddll32.jbxd
Similarity
  • API ID: HandleModule
  • String ID: (*_errno())$...$@$@$Microsoft Visual C++ Runtime Library$_CrtDbgReport: String too long or IO Error$common_message_window$minkernel\crts\ucrt\src\appcrt\misc\dbgrpt.cpp$traits::tcscpy_s(program_name, (sizeof(*__countof_helper(program_name)) + 0), get_program_name_unknown_text(Character()))$wcscpy_s(message_buffer, 4096, L"_CrtDbgReport: String too long or IO Error")
  • API String ID: 4139908857-1633980848
  • Opcode ID: 74b0917a639993a8cc48015ae6fcd3818dd3af91321d2bd9b78a40729698ac31
  • Instruction ID: f8251b74e0c6161985480b60b24db1a6ecbd7faf586db7a644cbddb97fdede13
  • Opcode Fuzzy Hash: 74b0917a639993a8cc48015ae6fcd3818dd3af91321d2bd9b78a40729698ac31
  • Instruction Fuzzy Hash: A6D1CCB0D00268CBDB24CF50CC4EBDAB775AB69304F2181D9E60D67AA0D770AAD5CF91
Strings
  • wcscpy_s(progname, progname_size, L"<program name unknown>"), xrefs: 6CE305B8
  • wcsncpy_s(pch, progname_size - (pch - progname), L"...", 3), xrefs: 6CE30616
  • minkernel\crts\ucrt\src\appcrt\internal\report_runtime_error.cpp, xrefs: 6CE3054F, 6CE305AE, 6CE3060C, 6CE3064C, 6CE30682
  • wcscpy_s(outmsg, (sizeof(*__countof_helper(outmsg)) + 0), L"Runtime Error!\n\nProgram: "), xrefs: 6CE30559
  • wcscat_s(outmsg, (sizeof(*__countof_helper(outmsg)) + 0), message), xrefs: 6CE3068C
  • wcscat_s(outmsg, (sizeof(*__countof_helper(outmsg)) + 0), L"\n\n"), xrefs: 6CE30656
  • ..., xrefs: 6CE3061D
  • Runtime Error!Program: , xrefs: 6CE3055E
  • <program name unknown>, xrefs: 6CE305BD
  • Microsoft Visual C++ Runtime Library, xrefs: 6CE306B5
  • __acrt_report_runtime_error, xrefs: 6CE30554, 6CE305B3, 6CE30611, 6CE30651, 6CE30687
Memory Dump Source
  • Source File: 00000000.00000002.1800636456.000000006CDB9000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CD60000, based on PE: true
  • Associated: 00000000.00000002.1800618530.000000006CD60000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CDB0000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CE59000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800706037.000000006CE5C000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800724654.000000006CE84000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800735219.000000006CE87000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800744992.000000006CE8A000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_6cd60000_loaddll32.jbxd
Similarity
  • API ID:
  • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program: $__acrt_report_runtime_error$minkernel\crts\ucrt\src\appcrt\internal\report_runtime_error.cpp$wcscat_s(outmsg, (sizeof(*__countof_helper(outmsg)) + 0), L"\n\n")$wcscat_s(outmsg, (sizeof(*__countof_helper(outmsg)) + 0), message)$wcscpy_s(outmsg, (sizeof(*__countof_helper(outmsg)) + 0), L"Runtime Error!\n\nProgram: ")$wcscpy_s(progname, progname_size, L"<program name unknown>")$wcsncpy_s(pch, progname_size - (pch - progname), L"...", 3)
  • API String ID: 0-4242594854
  • Opcode ID: ee8fcacb7606052a0ac22a032da5ef91cea0be0aaaa6447251241fe9fbdfc9c0
  • Instruction ID: e09a329587055b7cfc9c63ad1ab6c7b8ae6484a62f37a9fcfeab942adb27c497
  • Opcode Fuzzy Hash: ee8fcacb7606052a0ac22a032da5ef91cea0be0aaaa6447251241fe9fbdfc9c0
  • Instruction Fuzzy Hash: 3A4105F2E41204B7EB14E7A48D42FAE37795B40308F704959F50DBAB92EA30AA04C6B5
APIs
  • failwithmessage.LIBCMTD ref: 6CDC093D
    • Part of subcall function 6CDC0C20: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,6CDC09D2,000000FF,00000000,00000000,?), ref: 6CDC0C81
    • Part of subcall function 6CDC0C20: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,6CDC09D2,000000FF,?,00000000), ref: 6CDC0CA0
    • Part of subcall function 6CDC0C20: DebuggerProbe.LIBCMTD ref: 6CDC0CBA
    • Part of subcall function 6CDC0C20: DebuggerRuntime.LIBCMTD ref: 6CDC0CD6
    • Part of subcall function 6CDC0C20: IsDebuggerPresent.KERNEL32 ref: 6CDC0CFF
  • _getMemBlockDataString.LIBCMTD ref: 6CDC0969
  • failwithmessage.LIBCMTD ref: 6CDC09CD
Strings
  • Data: <, xrefs: 6CDC0983
  • Stack area around _alloca memory reserved by this function is corrupted, xrefs: 6CDC0934
  • Address: 0x, xrefs: 6CDC099A
  • Stack area around _alloca memory reserved by this function is corrupted, xrefs: 6CDC099F
  • Allocation number within this function: , xrefs: 6CDC098E
  • Size: , xrefs: 6CDC0994
  • %s%s%p%s%zd%s%d%s%s%s%s%s, xrefs: 6CDC09A4
Memory Dump Source
  • Source File: 00000000.00000002.1800636456.000000006CDB9000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CD60000, based on PE: true
  • Associated: 00000000.00000002.1800618530.000000006CD60000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CDB0000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CE59000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800706037.000000006CE5C000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800724654.000000006CE84000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800735219.000000006CE87000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800744992.000000006CE8A000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_6cd60000_loaddll32.jbxd
Similarity
  • API ID: Debugger$ByteCharMultiWidefailwithmessage$BlockDataPresentProbeRuntimeString_get
  • String ID: Address: 0x$Allocation number within this function: $Data: <$Size: $%s%s%p%s%zd%s%d%s%s%s%s%s$Stack area around _alloca memory reserved by this function is corrupted$Stack area around _alloca memory reserved by this function is corrupted
  • API String ID: 4067135985-3301296223
  • Opcode ID: 08d61120fa61d77e165a73f71ecbb302cef11656e6aa5fc856d8d83f26009731
  • Instruction ID: cb606990fefefffb735e5043b7a56e25558f83f85b215b661efac60113ae243b
  • Opcode Fuzzy Hash: 08d61120fa61d77e165a73f71ecbb302cef11656e6aa5fc856d8d83f26009731
  • Instruction Fuzzy Hash: 1321D7B6A00108BBCB10CFA5CD84EEEB7BCEB08314F540656FA0DA7550D631A6598761
Strings
Memory Dump Source
  • Source File: 00000000.00000002.1800636456.000000006CDB9000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CD60000, based on PE: true
  • Associated: 00000000.00000002.1800618530.000000006CD60000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CDB0000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CE59000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800706037.000000006CE5C000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800724654.000000006CE84000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800735219.000000006CE87000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800744992.000000006CE8A000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_6cd60000_loaddll32.jbxd
Similarity
  • API ID:
  • String ID: "$"$%ls$("Buffer too small", 0)$*$*$_wctomb_s_l$destination_count <= INT_MAX$destination_count > 0$minkernel\crts\ucrt\src\appcrt\convert\wctomb.cpp
  • API String ID: 0-2198373435
  • Opcode ID: 7663175df4526f3f4807833324a9ca71849413998423e554804e33582ab6336e
  • Instruction ID: b72fc7a64a314f6b1c46a43ad8582b7e210be29cc6f83d02489e2df4bb5eb164
  • Opcode Fuzzy Hash: 7663175df4526f3f4807833324a9ca71849413998423e554804e33582ab6336e
  • Instruction Fuzzy Hash: BFB14CB1D00208EFDB14DF90D895BEE77B0BB0531CF308519E4116BB90D779AA89CBA1
APIs
  • _cmpDWORD.LIBCMTD ref: 6CE55E6C
    • Part of subcall function 6CE55560: _cmpBYTE.LIBCMTD ref: 6CE55596
  • _cmpDWORD.LIBCMTD ref: 6CE55E93
Memory Dump Source
  • Source File: 00000000.00000002.1800636456.000000006CDB9000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CD60000, based on PE: true
  • Associated: 00000000.00000002.1800618530.000000006CD60000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CDB0000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CE59000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800706037.000000006CE5C000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800724654.000000006CE84000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800735219.000000006CE87000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800744992.000000006CE8A000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_6cd60000_loaddll32.jbxd
Similarity
  • API ID: _cmp
  • String ID:
  • API String ID: 2028851527-0
  • Opcode ID: dcf5647540f9869c7e8f67cfd3f3416951bda7d1ccddd060f364bd93f6ce725b
  • Instruction ID: 52d790fdcd16ef6bafc9d4821a1d15189565c19ce76c9aaef2177742562cfe79
  • Opcode Fuzzy Hash: dcf5647540f9869c7e8f67cfd3f3416951bda7d1ccddd060f364bd93f6ce725b
  • Instruction Fuzzy Hash: 51510AB1902108EFCB04CFBCDA45A9D7BB5AB41308FB08558F419AB749EB32AB54DB50
APIs
  • std::exception::exception.LIBCMTD ref: 6CE20875
Strings
Memory Dump Source
  • Source File: 00000000.00000002.1800636456.000000006CDB9000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CD60000, based on PE: true
  • Associated: 00000000.00000002.1800618530.000000006CD60000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CDB0000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CE59000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800706037.000000006CE5C000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800724654.000000006CE84000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800735219.000000006CE87000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800744992.000000006CE8A000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_6cd60000_loaddll32.jbxd
Similarity
  • API ID: std::exception::exception
  • String ID: %ls$*$?$common_expand_argv_wildcards$minkernel\crts\ucrt\src\appcrt\startup\argv_wildcards.cpp$result != nullptr$traits::tcsncpy_s( character_it, character_count - (character_it - character_first), *it, count)
  • API String ID: 2807920213-976376051
  • Opcode ID: 3bb576866edb291e51630d0cd27c148eed3a5c977c8aa58a8f82a63cc56eef2b
  • Instruction ID: cde1880a821df2b5d416bab2843a95830d7cac828b3ee7e548352cbe0f459319
  • Opcode Fuzzy Hash: 3bb576866edb291e51630d0cd27c148eed3a5c977c8aa58a8f82a63cc56eef2b
  • Instruction Fuzzy Hash: 48913DB1D00249EFDB04DFD4C9A4BEEB7B4AF54308F204519E4167B790EB78AA49CB61
APIs
Strings
  • wcsncpy_s(lpOutStr->szCodePage, (sizeof(*__countof_helper(lpOutStr->szCodePage)) + 0), L"utf8", 5), xrefs: 6CE41FAE
  • minkernel\crts\ucrt\src\appcrt\locale\get_qualified_locale.cpp, xrefs: 6CE41EA6, 6CE41FA4
  • utf8, xrefs: 6CE41FB5
  • wcsncpy_s(lpOutStr->szLocaleName, (sizeof(*__countof_helper(lpOutStr->szLocaleName)) + 0), _psetloc_data->_cacheLocaleName, wcslen, xrefs: 6CE41EB0
  • __acrt_get_qualified_locale, xrefs: 6CE41EAB, 6CE41FA9
Memory Dump Source
  • Source File: 00000000.00000002.1800636456.000000006CDB9000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CD60000, based on PE: true
  • Associated: 00000000.00000002.1800618530.000000006CD60000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CDB0000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CE59000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800706037.000000006CE5C000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800724654.000000006CE84000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800735219.000000006CE87000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800744992.000000006CE8A000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_6cd60000_loaddll32.jbxd
Similarity
  • API ID: CodePageValid
  • String ID: __acrt_get_qualified_locale$minkernel\crts\ucrt\src\appcrt\locale\get_qualified_locale.cpp$utf8$wcsncpy_s(lpOutStr->szCodePage, (sizeof(*__countof_helper(lpOutStr->szCodePage)) + 0), L"utf8", 5)$wcsncpy_s(lpOutStr->szLocaleName, (sizeof(*__countof_helper(lpOutStr->szLocaleName)) + 0), _psetloc_data->_cacheLocaleName, wcslen
  • API String ID: 1911128615-3002009667
  • Opcode ID: 10a13d569ba75e86416b896657a302caeaac2471c916811468087000d103a937
  • Instruction ID: c3c7b6ed6eb2e6ceb01e56dcb7dc74ed4fa9220329fddc070c8b250475b1b72a
  • Opcode Fuzzy Hash: 10a13d569ba75e86416b896657a302caeaac2471c916811468087000d103a937
  • Instruction Fuzzy Hash: 7591D3B5A00204ABEF04CFA4DC46FAA73B5AF4530DF34C568E805AB781E775EA61C764
APIs
  • HeapSize.KERNEL32(01310000,00000000,00000000), ref: 6CE2F505
  • HeapReAlloc.KERNEL32(01310000,00000010,00000000,?), ref: 6CE2F53A
Strings
Memory Dump Source
  • Source File: 00000000.00000002.1800636456.000000006CDB9000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CD60000, based on PE: true
  • Associated: 00000000.00000002.1800618530.000000006CD60000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CDB0000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CE59000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800706037.000000006CE5C000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800724654.000000006CE84000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800735219.000000006CE87000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800744992.000000006CE8A000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_6cd60000_loaddll32.jbxd
Similarity
  • API ID: Heap$AllocSize
  • String ID: %ls$_expand_base$block != nullptr$minkernel\crts\ucrt\src\appcrt\heap\expand.cpp
  • API String ID: 3906553864-3244948836
  • Opcode ID: 6e2928dbe3c18d0bf650401c01841e5677b1bb0225c6ce1aeb8282541b8b43f6
  • Instruction ID: 52b52451cadeb1fbe819d8f9f106db797566433309ad8efe5cbcec418adbaf2e
  • Opcode Fuzzy Hash: 6e2928dbe3c18d0bf650401c01841e5677b1bb0225c6ce1aeb8282541b8b43f6
  • Instruction Fuzzy Hash: 0331C4B0D40269AFEB00DFA4C844B9E77B5EB45309F308514E511ABB80D7BCD980CBA0
APIs
  • _cmpDWORD.LIBCMTD ref: 6CE55C14
    • Part of subcall function 6CE55560: _cmpBYTE.LIBCMTD ref: 6CE55596
  • _cmpDWORD.LIBCMTD ref: 6CE55C3B
Memory Dump Source
  • Source File: 00000000.00000002.1800636456.000000006CDB9000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CD60000, based on PE: true
  • Associated: 00000000.00000002.1800618530.000000006CD60000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CDB0000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CE59000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800706037.000000006CE5C000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800724654.000000006CE84000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800735219.000000006CE87000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800744992.000000006CE8A000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_6cd60000_loaddll32.jbxd
Similarity
  • API ID: _cmp
  • String ID:
  • API String ID: 2028851527-0
  • Opcode ID: 2640301d4570daf9c888c71c09274a33e47595d280c6422622a01629a6ba161a
  • Instruction ID: b3e339ec4586169710e05554125cb10175105bf4237eff4ec218f34844962cd7
  • Opcode Fuzzy Hash: 2640301d4570daf9c888c71c09274a33e47595d280c6422622a01629a6ba161a
  • Instruction Fuzzy Hash: 47313C71902108EFCB04DFBCDA88A9D7B75AB41308FF08559E419AB709E732AB54DB90
APIs
  • _cmpDWORD.LIBCMTD ref: 6CE55D40
    • Part of subcall function 6CE55560: _cmpBYTE.LIBCMTD ref: 6CE55596
  • _cmpDWORD.LIBCMTD ref: 6CE55D67
Memory Dump Source
  • Source File: 00000000.00000002.1800636456.000000006CDB9000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CD60000, based on PE: true
  • Associated: 00000000.00000002.1800618530.000000006CD60000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CDB0000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CE59000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800706037.000000006CE5C000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800724654.000000006CE84000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800735219.000000006CE87000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800744992.000000006CE8A000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_6cd60000_loaddll32.jbxd
Similarity
  • API ID: _cmp
  • String ID:
  • API String ID: 2028851527-0
  • Opcode ID: cab4e5dea73df74ae65bb80adee57d74dc798646feee793aae844ddc1c4fb3b9
  • Instruction ID: 66169842f85f7ec63e9489f61684d7c9d52d70958b4531ca4eaf36ffa6c271d9
  • Opcode Fuzzy Hash: cab4e5dea73df74ae65bb80adee57d74dc798646feee793aae844ddc1c4fb3b9
  • Instruction Fuzzy Hash: 3F31F871902108EFCB04DFBCDA48A9E7B75AB41349FB08158E409AB749DB32AB54DB90
APIs
  • Is_bad_exception_allowed.LIBVCRUNTIMED ref: 6CDC60D5
  • CatchIt.LIBCMTD ref: 6CDC62CB
Strings
Memory Dump Source
  • Source File: 00000000.00000002.1800636456.000000006CDB9000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CD60000, based on PE: true
  • Associated: 00000000.00000002.1800618530.000000006CD60000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CDB0000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CE59000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800706037.000000006CE5C000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800724654.000000006CE84000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800735219.000000006CE87000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800744992.000000006CE8A000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_6cd60000_loaddll32.jbxd
Similarity
  • API ID: CatchIs_bad_exception_allowed
  • String ID: csm$csm$csm
  • API String ID: 974221251-393685449
  • Opcode ID: afd3f527901a7c6c43230666276314416fd2046b272f582ab56d50fe39fbb032
  • Instruction ID: 82616ec16b01019f4e7daf7ccca0d4bde1be22fa860be4267bc25c56b3211bf8
  • Opcode Fuzzy Hash: afd3f527901a7c6c43230666276314416fd2046b272f582ab56d50fe39fbb032
  • Instruction Fuzzy Hash: CBF185F5A04209DFCB04CFA5C8809EF7779BF44308F148159E915ABB61DB35EA46CBA2
APIs
Strings
Memory Dump Source
  • Source File: 00000000.00000002.1800636456.000000006CDB9000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CD60000, based on PE: true
  • Associated: 00000000.00000002.1800618530.000000006CD60000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CDB0000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CE59000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800706037.000000006CE5C000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800724654.000000006CE84000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800735219.000000006CE87000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800744992.000000006CE8A000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_6cd60000_loaddll32.jbxd
Similarity
  • API ID: und_strncmp
  • String ID: `generic-type-$`template-parameter-$generic-type-$template-parameter-
  • API String ID: 2034953485-3207858774
  • Opcode ID: d1394afa589d48134038a8d4567e515297b9213216a8400754ba7f5a172e385d
  • Instruction ID: f26bbf1907eeaabe3b919bf98c04ee8a6e70d4c3fcc7bebc8000b824d6738f99
  • Opcode Fuzzy Hash: d1394afa589d48134038a8d4567e515297b9213216a8400754ba7f5a172e385d
  • Instruction Fuzzy Hash: 639141B1E05248DBDF04DFE4CC90AEEB7B5AF49304F144529E416B7764EB34AA09CBA1
APIs
  • std::exception::exception.LIBCMTD ref: 6CE20C0F
Strings
Memory Dump Source
  • Source File: 00000000.00000002.1800636456.000000006CDB9000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CD60000, based on PE: true
  • Associated: 00000000.00000002.1800618530.000000006CD60000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CDB0000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CE59000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800706037.000000006CE5C000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800724654.000000006CE84000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800735219.000000006CE87000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800744992.000000006CE8A000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_6cd60000_loaddll32.jbxd
Similarity
  • API ID: std::exception::exception
  • String ID: %ls$common_expand_argv_wildcards$minkernel\crts\ucrt\src\appcrt\startup\argv_wildcards.cpp$result != nullptr$traits::tcsncpy_s( character_it, character_count - (character_it - character_first), *it, count)
  • API String ID: 2807920213-1103401458
  • Opcode ID: dd82dba07e64b017c5419fa42045b1a4bd7044304f16ce16290692b6b92e9424
  • Instruction ID: 997c3f37aa7efd72c23510d6b6b735c5bef10dbb09a5b9b5e16c6b592c901a7c
  • Opcode Fuzzy Hash: dd82dba07e64b017c5419fa42045b1a4bd7044304f16ce16290692b6b92e9424
  • Instruction Fuzzy Hash: 9DA108B1D002499FDB04DFD4C9A5BEEB7B5BF55308F204529E0067B790EB39AA49CB60
Strings
Memory Dump Source
  • Source File: 00000000.00000002.1800636456.000000006CDB9000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CD60000, based on PE: true
  • Associated: 00000000.00000002.1800618530.000000006CD60000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CDB0000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CE59000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800706037.000000006CE5C000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800724654.000000006CE84000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800735219.000000006CE87000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800744992.000000006CE8A000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_6cd60000_loaddll32.jbxd
Similarity
  • API ID:
  • String ID: %ls$HZl$common_configure_argv$minkernel\crts\ucrt\src\appcrt\startup\argv_parsing.cpp$mode == _crt_argv_expanded_arguments || mode == _crt_argv_unexpanded_arguments
  • API String ID: 0-335035211
  • Opcode ID: cd8f7e5dcdeff599c50d6a896d177332fec36949b224d59d6dee47d11326aff8
  • Instruction ID: 74f3ca6f1dc11997cf7f3bf87341544128ae32158a2010b3e568146b1e5d23b3
  • Opcode Fuzzy Hash: cd8f7e5dcdeff599c50d6a896d177332fec36949b224d59d6dee47d11326aff8
  • Instruction Fuzzy Hash: 48716FF1D40209EBDF04EF94D995BEEB7B4AF44308F114169D1067BAA0EB746A48CBB1
Strings
Memory Dump Source
  • Source File: 00000000.00000002.1800636456.000000006CDB9000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CD60000, based on PE: true
  • Associated: 00000000.00000002.1800618530.000000006CD60000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CDB0000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CE59000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800706037.000000006CE5C000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800724654.000000006CE84000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800735219.000000006CE87000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800744992.000000006CE8A000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_6cd60000_loaddll32.jbxd
Similarity
  • API ID:
  • String ID: %ls$C:\Windows\system32\loaddll32.exe$common_configure_argv$minkernel\crts\ucrt\src\appcrt\startup\argv_parsing.cpp$mode == _crt_argv_expanded_arguments || mode == _crt_argv_unexpanded_arguments
  • API String ID: 0-1914081238
  • Opcode ID: 5d15556f485508b9df8d4e88b326b60a7e7c67aafdbca211e9d9a2edc93c7c33
  • Instruction ID: 076a14a4d9d971fb4dc81b41bd53ecfdab9f9925e0f0b7d29056c3fed95e762c
  • Opcode Fuzzy Hash: 5d15556f485508b9df8d4e88b326b60a7e7c67aafdbca211e9d9a2edc93c7c33
  • Instruction Fuzzy Hash: 7A7151F1D40208EFDF04DF94D895BEEB7B4AF45308F114569D5067BAA0EB706A48CBA1
Strings
Memory Dump Source
  • Source File: 00000000.00000002.1800636456.000000006CDB9000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CD60000, based on PE: true
  • Associated: 00000000.00000002.1800618530.000000006CD60000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CDB0000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CE59000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800706037.000000006CE5C000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800724654.000000006CE84000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800735219.000000006CE87000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800744992.000000006CE8A000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_6cd60000_loaddll32.jbxd
Similarity
  • API ID:
  • String ID: %ls$(_osfile(fh) & FOPEN)$(fh >= 0 && (unsigned)fh < (unsigned)_nhandle)$_close$minkernel\crts\ucrt\src\appcrt\lowio\close.cpp
  • API String ID: 0-1433886027
  • Opcode ID: 8a1e74a3612b8400fadff3772f52b9815958faf98f5b22dd741256d9b79c9161
  • Instruction ID: a2a2850402a61857fe42104a4d7582e781f250549303616e25d76bc78ae4111b
  • Opcode Fuzzy Hash: 8a1e74a3612b8400fadff3772f52b9815958faf98f5b22dd741256d9b79c9161
  • Instruction Fuzzy Hash: B131C5B0844204AFEB24DF95DD55F8D3A70AB0276DF308A48E0152BED1D778A645C7B5
Strings
Memory Dump Source
  • Source File: 00000000.00000002.1800636456.000000006CDB9000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CD60000, based on PE: true
  • Associated: 00000000.00000002.1800618530.000000006CD60000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CDB0000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CE59000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800706037.000000006CE5C000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800724654.000000006CE84000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800735219.000000006CE87000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800744992.000000006CE8A000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_6cd60000_loaddll32.jbxd
Similarity
  • API ID:
  • String ID: %ls$(_osfile(fh) & FOPEN)$(fh >= 0 && (unsigned)fh < (unsigned)_nhandle)$_commit$minkernel\crts\ucrt\src\appcrt\lowio\commit.cpp
  • API String ID: 0-1026578051
  • Opcode ID: 8bb48c7409db8bf85d3afd0fc53ff145287496345ffc204340adfa43bba23cc1
  • Instruction ID: e73b2e486dd410609035d40ec00849748d8b5135f230a1ae83ba751464157127
  • Opcode Fuzzy Hash: 8bb48c7409db8bf85d3afd0fc53ff145287496345ffc204340adfa43bba23cc1
  • Instruction Fuzzy Hash: 7D31B2B1941208AFEB20CF54DC85BDD7B74BB0231CF308A49E1153BAD1D7B4A685CBA1
APIs
  • _cmpDWORD.LIBCMTD ref: 6CE55AFC
    • Part of subcall function 6CE55560: _cmpBYTE.LIBCMTD ref: 6CE55596
  • _cmpDWORD.LIBCMTD ref: 6CE55B23
Memory Dump Source
  • Source File: 00000000.00000002.1800636456.000000006CDB9000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CD60000, based on PE: true
  • Associated: 00000000.00000002.1800618530.000000006CD60000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CDB0000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CE59000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800706037.000000006CE5C000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800724654.000000006CE84000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800735219.000000006CE87000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800744992.000000006CE8A000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_6cd60000_loaddll32.jbxd
Similarity
  • API ID: _cmp
  • String ID:
  • API String ID: 2028851527-0
  • Opcode ID: 886a3d6f066865c6bb5d327980fe2796885dd27cc38c0e45858bb95054f92fe6
  • Instruction ID: f2ec4c6ddad7bb5552f32ef4d7586a6c778ebf9396a816257a8f72df9c30c18e
  • Opcode Fuzzy Hash: 886a3d6f066865c6bb5d327980fe2796885dd27cc38c0e45858bb95054f92fe6
  • Instruction Fuzzy Hash: 9C313D71D02108EFCB00DFBCCA48A9D7BB5AB51309FB08158E409BB749D732AB54DBA0
APIs
  • std::_Fac_node::_Fac_node.LIBCPMTD ref: 6CDDAF48
Strings
Memory Dump Source
  • Source File: 00000000.00000002.1800636456.000000006CDB9000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CD60000, based on PE: true
  • Associated: 00000000.00000002.1800618530.000000006CD60000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CDB0000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CE59000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800706037.000000006CE5C000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800724654.000000006CE84000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800735219.000000006CE87000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800744992.000000006CE8A000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_6cd60000_loaddll32.jbxd
Similarity
  • API ID: Fac_nodeFac_node::_std::_
  • String ID: %ls$common_set_report_hook$minkernel\crts\ucrt\src\appcrt\misc\dbgrpt.cpp$mode == _CRT_RPTHOOK_INSTALL || mode == _CRT_RPTHOOK_REMOVE$new_hook != nullptr
  • API String ID: 1114552684-2008714909
  • Opcode ID: 2b291e328d981b55c60bee776be60bd044826b4e8843233734659a5536f64395
  • Instruction ID: cad854b1ae87eae67b2581318cda5fb14034296458fdb3fb87566d9367ab32e4
  • Opcode Fuzzy Hash: 2b291e328d981b55c60bee776be60bd044826b4e8843233734659a5536f64395
  • Instruction Fuzzy Hash: E921E6B1D44209FBDB109B90CC06B9E3670AB01319F618A44F5183AEE1D7BAA198C7B6
APIs
  • std::_Fac_node::_Fac_node.LIBCPMTD ref: 6CDDB0B8
Strings
Memory Dump Source
  • Source File: 00000000.00000002.1800636456.000000006CDB9000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CD60000, based on PE: true
  • Associated: 00000000.00000002.1800618530.000000006CD60000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CDB0000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CE59000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800706037.000000006CE5C000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800724654.000000006CE84000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800735219.000000006CE87000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800744992.000000006CE8A000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_6cd60000_loaddll32.jbxd
Similarity
  • API ID: Fac_nodeFac_node::_std::_
  • String ID: %ls$common_set_report_hook$minkernel\crts\ucrt\src\appcrt\misc\dbgrpt.cpp$mode == _CRT_RPTHOOK_INSTALL || mode == _CRT_RPTHOOK_REMOVE$new_hook != nullptr
  • API String ID: 1114552684-2008714909
  • Opcode ID: e28bfe7db14b8ab340a7fee93538ec1779330ddd9f0dd398aa2695df60bbed90
  • Instruction ID: e33fd5ffc622a6811b176c791cf2519aa2d88f36620dcd813c11646d22451152
  • Opcode Fuzzy Hash: e28bfe7db14b8ab340a7fee93538ec1779330ddd9f0dd398aa2695df60bbed90
  • Instruction Fuzzy Hash: A021B6B0D40208FBEB209B91CC05BAE7774AB0631DF614644F5243AEE1D7BA6198C7A6
Strings
  • %ls, xrefs: 6CE452FB
  • cchCount1==0 && cchCount2==1 || cchCount1==1 && cchCount2==0, xrefs: 6CE452F6
  • minkernel\crts\ucrt\src\appcrt\locale\comparestringa.cpp, xrefs: 6CE45304
  • minkernel\crts\ucrt\src\appcrt\locale\comparestringa.cpp, xrefs: 6CE45491, 6CE45592
Memory Dump Source
  • Source File: 00000000.00000002.1800636456.000000006CDB9000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CD60000, based on PE: true
  • Associated: 00000000.00000002.1800618530.000000006CD60000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CDB0000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CE59000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800706037.000000006CE5C000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800724654.000000006CE84000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800735219.000000006CE87000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800744992.000000006CE8A000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_6cd60000_loaddll32.jbxd
Similarity
  • API ID:
  • String ID: %ls$cchCount1==0 && cchCount2==1 || cchCount1==1 && cchCount2==0$minkernel\crts\ucrt\src\appcrt\locale\comparestringa.cpp$minkernel\crts\ucrt\src\appcrt\locale\comparestringa.cpp
  • API String ID: 0-1085474390
  • Opcode ID: 1cd455faba828fbbb1e0a0f03271c9109ac3e23491bbdece17a568fa6f9c4e4f
  • Instruction ID: 384a0ee3a3d450a61dc05ec9ae17d58c369fd54d5f9d2fd1b7603c2686a7ffae
  • Opcode Fuzzy Hash: 1cd455faba828fbbb1e0a0f03271c9109ac3e23491bbdece17a568fa6f9c4e4f
  • Instruction Fuzzy Hash: ADE1D0B1E01109DBDB04CF94D890BEE77B1AF4A308F208169F412BBB90D779E945CBA1
APIs
  • GetStdHandle.KERNEL32(000000F5), ref: 6CE1B0B3
  • GetStdHandle.KERNEL32(000000F4), ref: 6CE1B0CD
Strings
Memory Dump Source
  • Source File: 00000000.00000002.1800636456.000000006CDB9000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CD60000, based on PE: true
  • Associated: 00000000.00000002.1800618530.000000006CD60000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CDB0000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CE59000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800706037.000000006CE5C000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800724654.000000006CE84000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800735219.000000006CE87000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800744992.000000006CE8A000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_6cd60000_loaddll32.jbxd
Similarity
  • API ID: Handle
  • String ID: %ls$_CrtSetReportFile$minkernel\crts\ucrt\src\appcrt\misc\dbgrptt.cpp$nRptType >= 0 && nRptType < _CRT_ERRCNT
  • API String ID: 2519475695-1451859211
  • Opcode ID: 85b83b137c267ca8c8dbc20c2de5f0a21866c8b5d56bce49668581ae8b005235
  • Instruction ID: 04872c0707d99bf8addb529a3d1ba1d1e43bfe60b8f1d7013e41f1207534a1ee
  • Opcode Fuzzy Hash: 85b83b137c267ca8c8dbc20c2de5f0a21866c8b5d56bce49668581ae8b005235
  • Instruction Fuzzy Hash: DA216BB4A48208FFCB10DF69C854B897BB4EB47368F30824AFA645BFC0D3359695CA45
APIs
Strings
Memory Dump Source
  • Source File: 00000000.00000002.1800636456.000000006CDB9000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CD60000, based on PE: true
  • Associated: 00000000.00000002.1800618530.000000006CD60000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CDB0000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CE59000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800706037.000000006CE5C000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800724654.000000006CE84000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800735219.000000006CE87000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800744992.000000006CE8A000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_6cd60000_loaddll32.jbxd
Similarity
  • API ID: _fix_grouping
  • String ID: %ls$minkernel\crts\ucrt\src\appcrt\locale\initnum.cpp$minkernel\crts\ucrt\src\appcrt\locale\initnum.cpp$ploci->lconv_num_refcount > 0
  • API String ID: 3906328105-162942574
  • Opcode ID: 7a2401f54834143b9ed4eb09ce2ad3670d1ec233ad29f7acafb54f3513d94358
  • Instruction ID: 9d9ae38a046772b7d882530834a6fc15dd1b5862d79f55d1e529eae06c625aa0
  • Opcode Fuzzy Hash: 7a2401f54834143b9ed4eb09ce2ad3670d1ec233ad29f7acafb54f3513d94358
  • Instruction Fuzzy Hash: 54C181B1E00218ABDB00CF94C855BEEB7B1FF44308F148598E9597B791D7B9AA45CBA0
APIs
  • GetPdbDllFromInstallPath.LIBCMTD ref: 6CDC1F47
    • Part of subcall function 6CDC20C0: GetLastError.KERNEL32 ref: 6CDC2109
    • Part of subcall function 6CDC20C0: GetProcAddress.KERNEL32(00000000,RegOpenKeyExW), ref: 6CDC212F
    • Part of subcall function 6CDC20C0: GetProcAddress.KERNEL32(00000000,RegQueryValueExW), ref: 6CDC2141
    • Part of subcall function 6CDC20C0: GetProcAddress.KERNEL32(00000000,RegCloseKey), ref: 6CDC2153
    • Part of subcall function 6CDC20C0: FreeLibrary.KERNEL32(00000000), ref: 6CDC2187
  • GetLastError.KERNEL32 ref: 6CDC1FBB
  • GetLastError.KERNEL32 ref: 6CDC1FF5
Strings
Memory Dump Source
  • Source File: 00000000.00000002.1800636456.000000006CDB9000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CD60000, based on PE: true
  • Associated: 00000000.00000002.1800618530.000000006CD60000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CDB0000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CE59000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800706037.000000006CE5C000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800724654.000000006CE84000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800735219.000000006CE87000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800744992.000000006CE8A000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_6cd60000_loaddll32.jbxd
Similarity
  • API ID: AddressErrorLastProc$FreeFromInstallLibraryPath
  • String ID: MSPDB140$VCRUNTIME140D.dll
  • API String ID: 3575457754-1916464790
  • Opcode ID: 2950ddfd47c3c843f2d2916091ff8c7742c59bb2ac4539ddc20cc9d76b6dc5f3
  • Instruction ID: 1806583ba0c468783ba9c37d3f93d0b0ece5f24ca43f42bd5604bc26774b9e11
  • Opcode Fuzzy Hash: 2950ddfd47c3c843f2d2916091ff8c7742c59bb2ac4539ddc20cc9d76b6dc5f3
  • Instruction Fuzzy Hash: 3231A4F1B01208A6EB1097628C4ABDA33BC9B00308F5005B6EE1AE79D1FB70D64DD677
Strings
Memory Dump Source
  • Source File: 00000000.00000002.1800636456.000000006CDB9000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CD60000, based on PE: true
  • Associated: 00000000.00000002.1800618530.000000006CD60000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CDB0000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CE59000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800706037.000000006CE5C000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800724654.000000006CE84000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800735219.000000006CE87000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800744992.000000006CE8A000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_6cd60000_loaddll32.jbxd
Similarity
  • API ID:
  • String ID: %ls$D:\a\_work\1\s\src\vctools\crt\vcruntime\src\internal\winapi_downlevel.cpp$cached_fp == invalid_function_sentinel()$cached_fp == new_fp
  • API String ID: 0-3288861829
  • Opcode ID: 2c5831611b80519d6dd8aecdce611f7994e45814d4067536be1700a08c638625
  • Instruction ID: 5490c42515aeb6b66a31c870af793a3604978c3ec3c9913b56f487052b5d2a60
  • Opcode Fuzzy Hash: 2c5831611b80519d6dd8aecdce611f7994e45814d4067536be1700a08c638625
  • Instruction Fuzzy Hash: 2221D7B0D01208FBDF00EFA4CD41BDE7B74BB05309F6248A9E51566A64E735F658CB61
APIs
  • std::_Timevec::_Timevec.LIBCPMTD ref: 6CE2D35E
Strings
Memory Dump Source
  • Source File: 00000000.00000002.1800636456.000000006CDB9000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CD60000, based on PE: true
  • Associated: 00000000.00000002.1800618530.000000006CD60000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CDB0000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CE59000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800706037.000000006CE5C000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800724654.000000006CE84000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800735219.000000006CE87000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800744992.000000006CE8A000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_6cd60000_loaddll32.jbxd
Similarity
  • API ID: TimevecTimevec::_std::_
  • String ID: %ls$LC_MIN <= _category && _category <= LC_MAX$_wsetlocale$minkernel\crts\ucrt\src\appcrt\locale\wsetlocale.cpp
  • API String ID: 4219598475-2399076032
  • Opcode ID: 1385d9740f602155e85ff1813873edbe3e6ae646eacb7c77678ec2b21d957e73
  • Instruction ID: 46a021a0a0a3941a6ad5719fd3bd1565e50eb7d8ceff82be78f1a94dab859839
  • Opcode Fuzzy Hash: 1385d9740f602155e85ff1813873edbe3e6ae646eacb7c77678ec2b21d957e73
  • Instruction Fuzzy Hash: 9A211DB6C0020CABDB10DBD0CD45BDE7774AF05309F308959E60676A80E779A749CBA5
APIs
  • FlushFileBuffers.KERNEL32(00000000), ref: 6CE45A23
  • GetLastError.KERNEL32 ref: 6CE45A31
Strings
  • %ls, xrefs: 6CE45A54
  • ("Invalid file descriptor. File possibly closed by a different thread",0), xrefs: 6CE45A4F
  • minkernel\crts\ucrt\src\appcrt\lowio\commit.cpp, xrefs: 6CE45A5D
Memory Dump Source
  • Source File: 00000000.00000002.1800636456.000000006CDB9000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CD60000, based on PE: true
  • Associated: 00000000.00000002.1800618530.000000006CD60000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CDB0000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CE59000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800706037.000000006CE5C000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800724654.000000006CE84000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800735219.000000006CE87000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800744992.000000006CE8A000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_6cd60000_loaddll32.jbxd
Similarity
  • API ID: BuffersErrorFileFlushLast
  • String ID: %ls$("Invalid file descriptor. File possibly closed by a different thread",0)$minkernel\crts\ucrt\src\appcrt\lowio\commit.cpp
  • API String ID: 1917127615-1268643607
  • Opcode ID: a95cc88591f8e038f65e52f0f859dea8f69bda524d547d2ba28d062143b48deb
  • Instruction ID: eabc9f2124cf4ecaee383d6ef80bd7256b4d102427e1c98b795ecb0f2b9502eb
  • Opcode Fuzzy Hash: a95cc88591f8e038f65e52f0f859dea8f69bda524d547d2ba28d062143b48deb
  • Instruction Fuzzy Hash: AA1182B16012009FCB04DB64DD85E5A3375EB0A318F344589F516ABB90E735ED019760
APIs
Strings
  • strncpy_s(*char_result, local_length, local_buffer, local_length - 1), xrefs: 6CE485CF
  • minkernel\crts\ucrt\src\appcrt\locale\getlocaleinfoa.cpp, xrefs: 6CE48570, 6CE48651, 6CE48772
  • __acrt_GetLocaleInfoA, xrefs: 6CE485CA
  • minkernel\crts\ucrt\src\appcrt\locale\getlocaleinfoa.cpp, xrefs: 6CE485C5
Memory Dump Source
  • Source File: 00000000.00000002.1800636456.000000006CDB9000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CD60000, based on PE: true
  • Associated: 00000000.00000002.1800618530.000000006CD60000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CDB0000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CE59000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800706037.000000006CE5C000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800724654.000000006CE84000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800735219.000000006CE87000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800744992.000000006CE8A000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_6cd60000_loaddll32.jbxd
Similarity
  • API ID: ErrorLast
  • String ID: __acrt_GetLocaleInfoA$minkernel\crts\ucrt\src\appcrt\locale\getlocaleinfoa.cpp$minkernel\crts\ucrt\src\appcrt\locale\getlocaleinfoa.cpp$strncpy_s(*char_result, local_length, local_buffer, local_length - 1)
  • API String ID: 1452528299-34002772
  • Opcode ID: 9176e781b0b7123a038231b2da84286723620d9c86bd2da9b18acbc6a152871a
  • Instruction ID: 11e9bd78506bb9912e4041cc21c466c586bbe5aad7fa52ef541689a63b333397
  • Opcode Fuzzy Hash: 9176e781b0b7123a038231b2da84286723620d9c86bd2da9b18acbc6a152871a
  • Instruction Fuzzy Hash: C2A13AB1900218DBDB64DF24DC44FDA7374BF45318F6086D9E51AA7AD0DB30AA89CFA1
APIs
  • SetFilePointerEx.KERNEL32(?,00000000,?,?,00000001), ref: 6CE4B216
  • GetLastError.KERNEL32 ref: 6CE4B220
  • SetFilePointerEx.KERNEL32(00000000,00000000,?,00000000,00000000), ref: 6CE4B26D
  • GetLastError.KERNEL32 ref: 6CE4B277
Memory Dump Source
  • Source File: 00000000.00000002.1800636456.000000006CDB9000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CD60000, based on PE: true
  • Associated: 00000000.00000002.1800618530.000000006CD60000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CDB0000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CE59000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800706037.000000006CE5C000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800724654.000000006CE84000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800735219.000000006CE87000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800744992.000000006CE8A000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_6cd60000_loaddll32.jbxd
Similarity
  • API ID: ErrorFileLastPointer
  • String ID:
  • API String ID: 2976181284-0
  • Opcode ID: de6665021ae205d10a60588a4881549410ec3cf40ab37db1748cb98c089291fd
  • Instruction ID: 2b89bb4afca1482a201a5c8c4e45c6d069287dcebb23e837d752c5866312d042
  • Opcode Fuzzy Hash: de6665021ae205d10a60588a4881549410ec3cf40ab37db1748cb98c089291fd
  • Instruction Fuzzy Hash: 212153B1E00509ABDB00CFE9DD45BEFBBB8BF49314F208659F529E3690DB7095448B61
APIs
  • _ValidateLocalCookies.LIBCMTD ref: 6CDC450D
  • _ValidateLocalCookies.LIBCMTD ref: 6CDC4640
  • _ValidateLocalCookies.LIBCMTD ref: 6CDC4693
Strings
Memory Dump Source
  • Source File: 00000000.00000002.1800636456.000000006CDB9000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CD60000, based on PE: true
  • Associated: 00000000.00000002.1800618530.000000006CD60000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CDB0000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CE59000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800706037.000000006CE5C000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800724654.000000006CE84000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800735219.000000006CE87000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800744992.000000006CE8A000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_6cd60000_loaddll32.jbxd
Similarity
  • API ID: CookiesLocalValidate
  • String ID: csm
  • API String ID: 2268201637-1018135373
  • Opcode ID: f5993c078db7fe7f2bbca69ebd59bfecbd1062c0dd52246c8b1300f39dcfd708
  • Instruction ID: 042b862719e43c0522d058f7a5f5a8205c265401f866bf8fdf6e11f9b3ba4da6
  • Opcode Fuzzy Hash: f5993c078db7fe7f2bbca69ebd59bfecbd1062c0dd52246c8b1300f39dcfd708
  • Instruction Fuzzy Hash: 1351FDB4E00209DFCB04CF94D890AEEBBB5BF49318F208259D4156B754D735EA85CBA6
APIs
  • LoadLibraryExW.KERNEL32(6CDD7507,00000000,00000800,?,?,6CDD7507,00000000), ref: 6CDD764F
  • GetLastError.KERNEL32(?,?,6CDD7507), ref: 6CDD7663
  • LoadLibraryExW.KERNEL32(6CDD7507,00000000,00000000,?,6CDD7507), ref: 6CDD768D
Strings
Memory Dump Source
  • Source File: 00000000.00000002.1800636456.000000006CDB9000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CD60000, based on PE: true
  • Associated: 00000000.00000002.1800618530.000000006CD60000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CDB0000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CE59000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800706037.000000006CE5C000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800724654.000000006CE84000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800735219.000000006CE87000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800744992.000000006CE8A000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_6cd60000_loaddll32.jbxd
Similarity
  • API ID: LibraryLoad$ErrorLast
  • String ID: api-ms-
  • API String ID: 3177248105-2084034818
  • Opcode ID: 4e9f313700c83f28e459612b910e75d877cf6788f2cb6f2e1f6ff353053ddc25
  • Instruction ID: 7380475bd16a10b3c746d3841225a0ab61dd86a8c1ba96598d1594a9d82a6de9
  • Opcode Fuzzy Hash: 4e9f313700c83f28e459612b910e75d877cf6788f2cb6f2e1f6ff353053ddc25
  • Instruction Fuzzy Hash: E2F05E74B45304FBDB408FA8CC4AB9E3B74AB02705F224594F9199B6D4F775EA008B90
APIs
  • WriteConsoleW.KERNEL32(?,?,?,00000000), ref: 6CE505D0
  • GetLastError.KERNEL32 ref: 6CE505DC
  • ___initconout.LIBCMT ref: 6CE505EC
    • Part of subcall function 6CE5066A: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,6CE505F1), ref: 6CE5067D
  • WriteConsoleW.KERNEL32(?,?,?,00000000), ref: 6CE50600
Memory Dump Source
  • Source File: 00000000.00000002.1800636456.000000006CDB9000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CD60000, based on PE: true
  • Associated: 00000000.00000002.1800618530.000000006CD60000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CDB0000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CE59000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800706037.000000006CE5C000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800724654.000000006CE84000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800735219.000000006CE87000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800744992.000000006CE8A000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_6cd60000_loaddll32.jbxd
Similarity
  • API ID: ConsoleWrite$CreateErrorFileLast___initconout
  • String ID:
  • API String ID: 3431868840-0
  • Opcode ID: 9dfa13790a3e6ea3aa657ec7bbe31b3a0e91efb0fb4b8164589ae38e3ac151a0
  • Instruction ID: b83c5ecb5ff4b6be52db5d75a54ca557849b40ef098820134fb5952dd4367115
  • Opcode Fuzzy Hash: 9dfa13790a3e6ea3aa657ec7bbe31b3a0e91efb0fb4b8164589ae38e3ac151a0
  • Instruction Fuzzy Hash: DDF0823A201500ABCF621BDADC04D467FB6FFCB3157240519FA9A92A60DB3294209F20
APIs
  • WriteConsoleW.KERNEL32(?,?,?,00000000), ref: 6CE506E9
  • GetLastError.KERNEL32 ref: 6CE506F5
  • ___initconout.LIBCMT ref: 6CE50705
    • Part of subcall function 6CE5066A: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,6CE505F1), ref: 6CE5067D
  • WriteConsoleW.KERNEL32(?,?,?,00000000), ref: 6CE5071A
Memory Dump Source
  • Source File: 00000000.00000002.1800636456.000000006CDB9000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CD60000, based on PE: true
  • Associated: 00000000.00000002.1800618530.000000006CD60000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CDB0000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CE59000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800706037.000000006CE5C000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800724654.000000006CE84000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800735219.000000006CE87000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800744992.000000006CE8A000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_6cd60000_loaddll32.jbxd
Similarity
  • API ID: ConsoleWrite$CreateErrorFileLast___initconout
  • String ID:
  • API String ID: 3431868840-0
  • Opcode ID: 3eb4a60d418007813009c199594e71937236557082e8c5aee7abdec8d1a3d4ce
  • Instruction ID: 93bacf9c95b9e32e6682c39989a05ca7bc45c594f4326f198f92aa046250374d
  • Opcode Fuzzy Hash: 3eb4a60d418007813009c199594e71937236557082e8c5aee7abdec8d1a3d4ce
  • Instruction Fuzzy Hash: 3FF01C36601255BBCF521FD5DC04DCA3F7AFB0A3A9B544254FE1999620D7328830AFA0
APIs
  • DecodePointer.KERNEL32(?), ref: 6CE4E467
Strings
Memory Dump Source
  • Source File: 00000000.00000002.1800636456.000000006CDB9000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CD60000, based on PE: true
  • Associated: 00000000.00000002.1800618530.000000006CD60000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CDB0000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CE59000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800706037.000000006CE5C000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800724654.000000006CE84000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800735219.000000006CE87000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800744992.000000006CE8A000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_6cd60000_loaddll32.jbxd
Similarity
  • API ID: DecodePointer
  • String ID: $l$;
  • API String ID: 3527080286-2507470238
  • Opcode ID: dd0ee162e0c4b0fc267b99164069e7a41149ca2b5002e6f7f04518b0b6a5eab1
  • Instruction ID: fa1eb9756942bf17926ccbc77ac02970e8e95e58785857ea2104b6a512f986bd
  • Opcode Fuzzy Hash: dd0ee162e0c4b0fc267b99164069e7a41149ca2b5002e6f7f04518b0b6a5eab1
  • Instruction Fuzzy Hash: 23E1EA70A00A4DDBDF00DF94E8896DDBF71FF46304F618094D8956F2A8CB31996ACB95
APIs
  • GetCPInfo.KERNEL32(0000FDE9,?), ref: 6CE23453
Strings
Memory Dump Source
  • Source File: 00000000.00000002.1800636456.000000006CDB9000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CD60000, based on PE: true
  • Associated: 00000000.00000002.1800618530.000000006CD60000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CDB0000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CE59000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800706037.000000006CE5C000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800724654.000000006CE84000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800735219.000000006CE87000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800744992.000000006CE8A000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_6cd60000_loaddll32.jbxd
Similarity
  • API ID: Info
  • String ID: $z
  • API String ID: 1807457897-2251613814
  • Opcode ID: 15cca76bec27eaaf596bcb94a8e6ca41fe88b3467215b42d265936530e55d462
  • Instruction ID: 56cfd7c3661a8a22fb60911fdcb22c790a3bda0fea1b8b2737e2665ffdc26f69
  • Opcode Fuzzy Hash: 15cca76bec27eaaf596bcb94a8e6ca41fe88b3467215b42d265936530e55d462
  • Instruction Fuzzy Hash: C4A17F70A4825C9FDB26CF48C891BE9BB75EF45308F1481D9D94D5B782C278AB92CF90
APIs
  • SetConsoleCtrlHandler.KERNEL32(Function_000BDA80,00000001), ref: 6CE1E4B7
Strings
  • minkernel\crts\ucrt\src\appcrt\misc\signal.cpp, xrefs: 6CE1E5A6
Memory Dump Source
  • Source File: 00000000.00000002.1800636456.000000006CDB9000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CD60000, based on PE: true
  • Associated: 00000000.00000002.1800618530.000000006CD60000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CDB0000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CE59000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800706037.000000006CE5C000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800724654.000000006CE84000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800735219.000000006CE87000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800744992.000000006CE8A000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_6cd60000_loaddll32.jbxd
Similarity
  • API ID: ConsoleCtrlHandler
  • String ID: minkernel\crts\ucrt\src\appcrt\misc\signal.cpp
  • API String ID: 1513847179-3244217075
  • Opcode ID: b378fe27f3607bccf2bf530ee1892e49768ff655bb4cc0fb9b512f69f7e9ca9c
  • Instruction ID: dffc17a1d4941db317836adaf19a582163287a4910135f0bd65eaa3c43b5f5e4
  • Opcode Fuzzy Hash: b378fe27f3607bccf2bf530ee1892e49768ff655bb4cc0fb9b512f69f7e9ca9c
  • Instruction Fuzzy Hash: E47182B5A08248DFDB01CF95D884ADE77B5AF4A30CF248628F8156BF50D731DA54CBA1
Strings
Memory Dump Source
  • Source File: 00000000.00000002.1800636456.000000006CDB9000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CD60000, based on PE: true
  • Associated: 00000000.00000002.1800618530.000000006CD60000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CDB0000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CE59000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800706037.000000006CE5C000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800724654.000000006CE84000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800735219.000000006CE87000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800744992.000000006CE8A000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_6cd60000_loaddll32.jbxd
Similarity
  • API ID:
  • String ID: MOC$RCC
  • API String ID: 0-2084237596
  • Opcode ID: b2dc3ac64752cbd06419b0413ee9f0bf834f750fe9aca944e03664c59c7f7e1e
  • Instruction ID: 1766bc80b341580da8f60e722c27f0f2aacc7fb23aa6a1a9f288d419f6047c13
  • Opcode Fuzzy Hash: b2dc3ac64752cbd06419b0413ee9f0bf834f750fe9aca944e03664c59c7f7e1e
  • Instruction Fuzzy Hash: E15155B1A40109EBCB04DF94C990EFE77BDAF48308F148259E916E76A0DB34ED56CB61
APIs
  • GetEnvironmentStringsW.KERNEL32(?,?,?,?,?,6CDDDFE4,?,?,6CDDDF74,6CDDE98A), ref: 6CE24FA0
  • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 6CE2501C
Strings
  • minkernel\crts\ucrt\src\desktopcrt\env\get_environment_from_os.cpp, xrefs: 6CE24FD3
Memory Dump Source
  • Source File: 00000000.00000002.1800636456.000000006CDB9000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CD60000, based on PE: true
  • Associated: 00000000.00000002.1800618530.000000006CD60000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CDB0000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CE59000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800706037.000000006CE5C000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800724654.000000006CE84000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800735219.000000006CE87000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800744992.000000006CE8A000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_6cd60000_loaddll32.jbxd
Similarity
  • API ID: EnvironmentStrings$Free
  • String ID: minkernel\crts\ucrt\src\desktopcrt\env\get_environment_from_os.cpp
  • API String ID: 3328510275-170101930
  • Opcode ID: 67caebd923c99f66db54f0b49ae45afcd1674f6ffbbcb0ced858ca9e20ce8b30
  • Instruction ID: 457c462aea006e74f1afe2dfdc2896ee77fd1f285328205006d2c12731be186c
  • Opcode Fuzzy Hash: 67caebd923c99f66db54f0b49ae45afcd1674f6ffbbcb0ced858ca9e20ce8b30
  • Instruction Fuzzy Hash: 2C012BA3A033103BF32105660D8DE7B787DCBC6E5CB200018F91197744FE69CC0181B0
APIs
  • std::_Timevec::_Timevec.LIBCPMTD ref: 6CE2CEC6
  • std::_Timevec::_Timevec.LIBCPMTD ref: 6CE2CEDD
Strings
  • minkernel\crts\ucrt\src\appcrt\locale\wsetlocale.cpp, xrefs: 6CE2CE55
Memory Dump Source
  • Source File: 00000000.00000002.1800636456.000000006CDB9000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CD60000, based on PE: true
  • Associated: 00000000.00000002.1800618530.000000006CD60000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CDB0000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CE59000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800706037.000000006CE5C000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800724654.000000006CE84000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800735219.000000006CE87000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800744992.000000006CE8A000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_6cd60000_loaddll32.jbxd
Similarity
  • API ID: TimevecTimevec::_std::_
  • String ID: minkernel\crts\ucrt\src\appcrt\locale\wsetlocale.cpp
  • API String ID: 4219598475-2192260110
  • Opcode ID: a8ed5f18df816b572a81e00c2acab2618dff1e01475df5e9edd1d0754ebe8958
  • Instruction ID: 05186821ec9472e0cb181c863d85d1816076709d6e659685a29ebae7ed0d1751
  • Opcode Fuzzy Hash: a8ed5f18df816b572a81e00c2acab2618dff1e01475df5e9edd1d0754ebe8958
  • Instruction Fuzzy Hash: A321F1B5D40108ABD704EF94C996AEEB774AF10208F604199950777BA1EF706F09DB61
APIs
  • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 6CDBF63B
Strings
Memory Dump Source
  • Source File: 00000000.00000002.1800636456.000000006CDB9000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CD60000, based on PE: true
  • Associated: 00000000.00000002.1800618530.000000006CD60000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CDB0000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CE59000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800706037.000000006CE5C000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800724654.000000006CE84000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800735219.000000006CE87000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800744992.000000006CE8A000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_6cd60000_loaddll32.jbxd
Similarity
  • API ID: FeaturePresentProcessor
  • String ID: |f1n$Ql8Rl
  • API String ID: 2325560087-736391129
  • Opcode ID: 898d5284facad0635bdeed272579f123f4ee51dfd330aa67a07ede8073bef51a
  • Instruction ID: 52638b611c27b3c2cc36e96bedc2bf6227fa2fba4ae04952548d229be25a5abf
  • Opcode Fuzzy Hash: 898d5284facad0635bdeed272579f123f4ee51dfd330aa67a07ede8073bef51a
  • Instruction Fuzzy Hash: 8821C0B97036058BFB05CF19D1847487BF4FB0B318F60416AE91A9B3A1EFB559818F85
APIs
  • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,00000000,?,6CDD8230,?), ref: 6CDD8436
Strings
Memory Dump Source
  • Source File: 00000000.00000002.1800636456.000000006CDB9000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CD60000, based on PE: true
  • Associated: 00000000.00000002.1800618530.000000006CD60000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CDB0000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CE59000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800706037.000000006CE5C000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800724654.000000006CE84000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800735219.000000006CE87000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800744992.000000006CE8A000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_6cd60000_loaddll32.jbxd
Similarity
  • API ID: HandleModule
  • String ID: CorExitProcess$mscoree.dll
  • API String ID: 4139908857-1276376045
  • Opcode ID: 1809f524262c775f51f8c563d69ce4fcadff78deedc7e7e19d712ab7d3475093
  • Instruction ID: 838be7a99e030bb94a919c068f266bc51215f23a978c38c32c474c1a34c52dd1
  • Opcode Fuzzy Hash: 1809f524262c775f51f8c563d69ce4fcadff78deedc7e7e19d712ab7d3475093
  • Instruction Fuzzy Hash: 86014FB1D04108FBCB04EBA5CD59ADD7B79AF11309F5040A9E40772A70EF346B08CBA1
APIs
  • GetEnvironmentStringsW.KERNEL32(?,?,6CDDE04E,?,?,6CDDDFAB,6CDDE9A3), ref: 6CE25051
  • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 6CE2509E
Strings
  • minkernel\crts\ucrt\src\desktopcrt\env\get_environment_from_os.cpp, xrefs: 6CE2506C
Memory Dump Source
  • Source File: 00000000.00000002.1800636456.000000006CDB9000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CD60000, based on PE: true
  • Associated: 00000000.00000002.1800618530.000000006CD60000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CDB0000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800636456.000000006CE59000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800706037.000000006CE5C000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800724654.000000006CE84000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800735219.000000006CE87000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1800744992.000000006CE8A000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_6cd60000_loaddll32.jbxd
Similarity
  • API ID: EnvironmentStrings$Free
  • String ID: minkernel\crts\ucrt\src\desktopcrt\env\get_environment_from_os.cpp
  • API String ID: 3328510275-170101930
  • Opcode ID: 0c1a6b8c3c502001947bfea56148f595c2bf8eda30eb0caa4db47bd7d3962225
  • Instruction ID: b46251dbb3c919e95715d8a75b2cebbf4c8a7d1c91c29ffe0e57478ca53d0b75
  • Opcode Fuzzy Hash: 0c1a6b8c3c502001947bfea56148f595c2bf8eda30eb0caa4db47bd7d3962225
  • Instruction Fuzzy Hash: D0F02E5374561136E32112351C8DFAB35799BC6E7CF250211F61566BC5AF688C0200F0

Execution Graph

Execution Coverage

Dynamic/Packed Code Coverage

Signature Coverage

Execution Coverage:0.7%
Dynamic/Decrypted Code Coverage:0%
Signature Coverage:0%
Total number of Nodes:114
Total number of Limit Nodes:16
Show Legend
Hide Nodes/Edges
execution_graph 55760 6cb2fa10 55761 6cb2fa22 55760->55761 55762 6cb2fa3e 55760->55762 55761->55762 55763 6cb2fa2c dllmain_crt_process_attach 55761->55763 55763->55762 55800 6cb2d800 55801 6cb2d825 55800->55801 55802 6cb2d839 CreateEventA 55801->55802 55803 6cb2d837 55801->55803 55805 6cb2d853 55802->55805 55804 6cb2d863 GetLastError 55806 6cb2d872 55804->55806 55805->55804 55806->55803 55807 6cb2d879 CloseHandle 55806->55807 55807->55803 55808 6cb2fdc0 55809 6cb2fdf9 55808->55809 55810 6cb2fe42 dllmain_crt_dispatch 55809->55810 55811 6cb2fe61 55809->55811 55814 6cb2fe02 55809->55814 55810->55811 55810->55814 55812 6cb2feae 55811->55812 55815 6cb2fe90 dllmain_crt_dispatch 55811->55815 55813 6cb2feba dllmain_crt_dispatch 55812->55813 55812->55814 55813->55814 55815->55812 55764 6cb30030 55765 6cb30039 55764->55765 55766 6cb3003e dllmain_dispatch 55764->55766 55765->55766 55767 6cb485d0 55770 6cb481c0 55767->55770 55771 6cb481ce 55770->55771 55776 6cb481e6 55770->55776 55786 6cb48300 GetModuleHandleW 55771->55786 55773 6cb481d3 55773->55776 55787 6cb48410 55773->55787 55775 6cb481e3 55775->55776 55777 6cb48230 55776->55777 55779 6cb48260 55776->55779 55791 6cb483b0 55779->55791 55782 6cb48271 GetCurrentProcess TerminateProcess 55783 6cb48282 55782->55783 55784 6cb48410 GetModuleHandleExW 55783->55784 55785 6cb4828b ExitProcess 55784->55785 55786->55773 55788 6cb4841d 55787->55788 55789 6cb4842e GetModuleHandleExW 55788->55789 55790 6cb48440 55789->55790 55790->55775 55792 6cb483bb 55791->55792 55793 6cb483c4 GetPEB 55792->55793 55794 6cb4826a 55792->55794 55793->55794 55794->55782 55794->55783 55795 6cb89ef0 55798 6cb89d10 GetPEB 55795->55798 55797 6cb89efc 55799 6cb89d30 55798->55799 55799->55797 55816 6cb8f5a0 55819 6cb8eb10 55816->55819 55818 6cb8f5ad 55822 6cb8f1d0 55819->55822 55821 6cb8eb2b 55821->55818 55823 6cb8f1e8 55822->55823 55825 6cb8f201 55823->55825 55826 6cb8f4a0 55823->55826 55825->55821 55831 6cb8f170 55826->55831 55829 6cb8f4bf 55829->55825 55830 6cb8f4c3 GetProcAddress 55830->55829 55833 6cb8f180 55831->55833 55832 6cb8f1a8 55832->55829 55832->55830 55833->55832 55835 6cb8f350 55833->55835 55836 6cb8f368 55835->55836 55838 6cb8f374 55836->55838 55841 6cb8f4f0 LoadLibraryExW 55836->55841 55838->55833 55839 6cb8f441 FreeLibrary 55839->55838 55840 6cb8f399 55840->55838 55840->55839 55842 6cb8f510 55841->55842 55843 6cb8f515 GetLastError 55841->55843 55842->55840 55843->55842 55844 6cb8f520 55843->55844 55844->55842 55845 6cb8f54e LoadLibraryExW 55844->55845 55845->55842 55846 6cb83a60 55849 6cb80960 55846->55849 55848 6cb83a7a 55851 6cb8096d 55849->55851 55852 6cb809a2 55851->55852 55853 6cb80a00 55851->55853 55852->55848 55854 6cb80a40 __wcstombs_l 55853->55854 55855 6cb80b7a RtlAllocateHeap 55854->55855 55856 6cb80aad __wcstombs_l 55854->55856 55855->55856 55856->55851 55857 6cb96420 55858 6cb96437 55857->55858 55859 6cb96430 55857->55859 55858->55859 55861 6cb93c20 55858->55861 55862 6cb93cb4 55861->55862 55863 6cb93c37 55861->55863 55862->55858 55863->55862 55865 6cb93870 55863->55865 55866 6cb93887 55865->55866 55869 6cb93160 55866->55869 55868 6cb93893 std::_Fac_node::_Fac_node 55868->55863 55870 6cb9317b 55869->55870 55871 6cb9318b GetOEMCP 55870->55871 55872 6cb931ad 55870->55872 55874 6cb931a6 55871->55874 55873 6cb931b3 GetACP 55872->55873 55872->55874 55873->55874 55874->55868 55875 6cba57c0 55876 6cba57d4 55875->55876 55877 6cba5949 GetStringTypeW 55876->55877 55878 6cba5833 55876->55878 55877->55878 55879 6cb93ea4 55880 6cb93ead 55879->55880 55881 6cb94026 55880->55881 55889 6cb93eca 55880->55889 55882 6cb9403a IsValidCodePage 55881->55882 55885 6cb9401c 55881->55885 55883 6cb94051 55882->55883 55882->55885 55884 6cb940e2 GetCPInfo 55883->55884 55886 6cb9405e 55883->55886 55884->55885 55891 6cb940f8 55884->55891 55887 6cb93420 GetCPInfo 55886->55887 55887->55885 55888 6cb93420 GetCPInfo 55888->55885 55889->55888 55892 6cb93420 55891->55892 55893 6cb93445 GetCPInfo 55892->55893 55894 6cb93461 55892->55894 55893->55894 55894->55885

Executed Functions

Control-flow Graph

Strings
Memory Dump Source
  • Source File: 00000003.00000002.1710502824.000000006CB29000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CAD0000, based on PE: true
  • Associated: 00000003.00000002.1710471540.000000006CAD0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CB20000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CBC9000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710634407.000000006CBCC000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710670869.000000006CBF4000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710694621.000000006CBF7000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710716056.000000006CBFA000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_3_2_6cad0000_rundll32.jbxd
Similarity
  • API ID:
  • String ID: %ls$cached_handle == INVALID_HANDLE_VALUE$cached_handle == new_handle$minkernel\crts\ucrt\src\appcrt\internal\winapi_thunks.cpp
  • API String ID: 0-442401637
  • Opcode ID: b0c243636c1cf9466b2f24552680a586e931768eed65f6689f4823a79a055f8c
  • Instruction ID: c57494d6bae173f22591742e88e20fc4c7a983ca98677478dacfe1c8080a0b09
  • Opcode Fuzzy Hash: b0c243636c1cf9466b2f24552680a586e931768eed65f6689f4823a79a055f8c
  • Instruction Fuzzy Hash: BC21E470E02289EBCF10DBB4DC45FAE7774EB05329F244A55E525A7A80D734A644CB92

Control-flow Graph

APIs
  • LoadLibraryExW.KERNEL32(6CB8F399,00000000,00000800,?,?,6CB8F399,00000000), ref: 6CB8F501
  • GetLastError.KERNEL32(?,?,6CB8F399), ref: 6CB8F515
  • LoadLibraryExW.KERNEL32(6CB8F399,00000000,00000000,?,?,?,?,6CB8F399), ref: 6CB8F556
Strings
Memory Dump Source
  • Source File: 00000003.00000002.1710502824.000000006CB29000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CAD0000, based on PE: true
  • Associated: 00000003.00000002.1710471540.000000006CAD0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CB20000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CBC9000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710634407.000000006CBCC000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710670869.000000006CBF4000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710694621.000000006CBF7000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710716056.000000006CBFA000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_3_2_6cad0000_rundll32.jbxd
Similarity
  • API ID: LibraryLoad$ErrorLast
  • String ID: api-ms-$ext-ms-
  • API String ID: 3177248105-537541572
  • Opcode ID: dd3f0a3495b0d03c39cdfd3d971c031e70834f4565921616dc60ff0f685fc211
  • Instruction ID: e07e1b1abd637c2e36d971415a5482a3ceaa191605fbe5a6a27d5a3471e32dba
  • Opcode Fuzzy Hash: dd3f0a3495b0d03c39cdfd3d971c031e70834f4565921616dc60ff0f685fc211
  • Instruction Fuzzy Hash: F2018174A52249FBDB00CFA4DD0AFDE3778AB05714F104450FA18ABAC0D7B5EE008791

Control-flow Graph

APIs
  • RtlAllocateHeap.NTDLL(02DF0000,00000000,?), ref: 6CB80B8F
Strings
  • Client hook allocation failure at file %hs line %d., xrefs: 6CB80ABB
  • Error: memory allocation: bad memory block type., xrefs: 6CB80B5A
  • Client hook allocation failure., xrefs: 6CB80AD8
Memory Dump Source
  • Source File: 00000003.00000002.1710502824.000000006CB29000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CAD0000, based on PE: true
  • Associated: 00000003.00000002.1710471540.000000006CAD0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CB20000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CBC9000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710634407.000000006CBCC000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710670869.000000006CBF4000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710694621.000000006CBF7000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710716056.000000006CBFA000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_3_2_6cad0000_rundll32.jbxd
Similarity
  • API ID: AllocateHeap
  • String ID: Client hook allocation failure at file %hs line %d.$Client hook allocation failure.$Error: memory allocation: bad memory block type.
  • API String ID: 1279760036-2973468218
  • Opcode ID: 6a86d0632f8ae3ada7d47dbf138b43d0ab2a3be09446d2f6f304a560e4f560ee
  • Instruction ID: 1716c554afbdb60ae051e996dd8322be1f56479e1efb9178c4b495f7e7e4a40d
  • Opcode Fuzzy Hash: 6a86d0632f8ae3ada7d47dbf138b43d0ab2a3be09446d2f6f304a560e4f560ee
  • Instruction Fuzzy Hash: 12B19174A02289EFDF00CF94EC90B9EB7B5FB49318F148219E9256B780D735A944CFA5

Control-flow Graph

APIs
  • CreateEventA.KERNEL32(00000000,00000001,00000001,VerifyNetworkConnectExpired), ref: 6CB2D846
  • GetLastError.KERNEL32 ref: 6CB2D865
  • CloseHandle.KERNEL32(00000000), ref: 6CB2D87F
Strings
  • VerifyNetworkConnectExpired, xrefs: 6CB2D83B
Memory Dump Source
  • Source File: 00000003.00000002.1710502824.000000006CB29000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CAD0000, based on PE: true
  • Associated: 00000003.00000002.1710471540.000000006CAD0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CB20000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CBC9000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710634407.000000006CBCC000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710670869.000000006CBF4000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710694621.000000006CBF7000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710716056.000000006CBFA000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_3_2_6cad0000_rundll32.jbxd
Similarity
  • API ID: CloseCreateErrorEventHandleLast
  • String ID: VerifyNetworkConnectExpired
  • API String ID: 937152468-916440064
  • Opcode ID: c31e0188ac006d822259373a0eef1ba2d8b07fd95e30fb97d65b67522a3774f8
  • Instruction ID: 83be3a0d1d119eb9a34a1055b35df1333224da9febf680fc4e11c177caf1e515
  • Opcode Fuzzy Hash: c31e0188ac006d822259373a0eef1ba2d8b07fd95e30fb97d65b67522a3774f8
  • Instruction Fuzzy Hash: C211A531E54154ABDB2067B8E84ABEC7625DF01326F400551EA1CBBB80C7BD4845C6E3

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 135 6cb93420-6cb9343f 136 6cb936ab-6cb936b5 135->136 137 6cb93445-6cb9345b GetCPInfo 135->137 138 6cb936c6-6cb936d0 136->138 137->136 139 6cb93461-6cb9346b 137->139 140 6cb9377b-6cb93788 call 6cb2140a 138->140 141 6cb936d6-6cb936dd 138->141 142 6cb9347c-6cb93486 139->142 146 6cb936df-6cb936e6 141->146 147 6cb9371e-6cb93725 141->147 143 6cb93488-6cb9349b 142->143 144 6cb9349d-6cb934c2 142->144 143->142 152 6cb934d3-6cb934de 144->152 146->147 148 6cb936e8-6cb9371c 146->148 150 6cb93727-6cb9372e 147->150 151 6cb93766-6cb9376f 147->151 154 6cb93776 148->154 150->151 155 6cb93730-6cb93764 150->155 151->154 156 6cb93530-6cb93550 call 6cb201c7 152->156 157 6cb934e0-6cb934ef 152->157 154->138 155->154 163 6cb93555-6cb935d6 call 6cb2304d * 2 156->163 159 6cb93500-6cb93510 157->159 161 6cb9352e 159->161 162 6cb93512-6cb9351c 159->162 161->152 162->161 164 6cb9351e-6cb9352c 162->164 171 6cb935e7-6cb935f1 163->171 164->159 172 6cb935f7-6cb93608 171->172 173 6cb936a6 171->173 174 6cb9360a-6cb93642 172->174 175 6cb93644-6cb93655 172->175 173->140 176 6cb936a1 174->176 177 6cb93691-6cb9369a 175->177 178 6cb93657-6cb9368f 175->178 176->171 177->176 178->176
APIs
  • GetCPInfo.KERNEL32(0000FDE9,?), ref: 6CB93453
Strings
Memory Dump Source
  • Source File: 00000003.00000002.1710502824.000000006CB29000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CAD0000, based on PE: true
  • Associated: 00000003.00000002.1710471540.000000006CAD0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CB20000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CBC9000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710634407.000000006CBCC000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710670869.000000006CBF4000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710694621.000000006CBF7000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710716056.000000006CBFA000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_3_2_6cad0000_rundll32.jbxd
Similarity
  • API ID: Info
  • String ID: $z
  • API String ID: 1807457897-2251613814
  • Opcode ID: 59349737c538c9b6442bad421697826955b0a502dc3c85cb2807939b79494536
  • Instruction ID: 55b46bde282ba1ded2a67186f4bacec3efeed1f1bc41f5a8528dd2eb48c3392c
  • Opcode Fuzzy Hash: 59349737c538c9b6442bad421697826955b0a502dc3c85cb2807939b79494536
  • Instruction Fuzzy Hash: FEA15D74A4829C9FDB16CF48C891BE9BB71EF45308F0481E9D94D5B382C278AA91CF91

Control-flow Graph

APIs
  • GetCurrentProcess.KERNEL32(6CB48230,?,6CB48230,?), ref: 6CB48275
  • TerminateProcess.KERNEL32(00000000,?,6CB48230,?), ref: 6CB4827C
  • ExitProcess.KERNEL32 ref: 6CB48292
Memory Dump Source
  • Source File: 00000003.00000002.1710502824.000000006CB29000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CAD0000, based on PE: true
  • Associated: 00000003.00000002.1710471540.000000006CAD0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CB20000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CBC9000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710634407.000000006CBCC000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710670869.000000006CBF4000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710694621.000000006CBF7000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710716056.000000006CBFA000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_3_2_6cad0000_rundll32.jbxd
Similarity
  • API ID: Process$CurrentExitTerminate
  • String ID:
  • API String ID: 1703294689-0
  • Opcode ID: 23ef8954ced2e4195da524762edad83012a2f1d1c1314ab9b5aff1bb87c31837
  • Instruction ID: 3bb18ffc8e248824742ccce813baa7284c278a46837ebf17b751b8b82ffba6d3
  • Opcode Fuzzy Hash: 23ef8954ced2e4195da524762edad83012a2f1d1c1314ab9b5aff1bb87c31837
  • Instruction Fuzzy Hash: 1CE012B5604244BBCF40ABB1E84CCAF3B7DAF442457008451B919CB345DE75D554D7F5

Control-flow Graph

APIs
  • GetStringTypeW.KERNEL32(?,00000000,00000000,?,?,?,?,?,?,?,?,?,00000000), ref: 6CBA594E
Strings
  • minkernel\crts\ucrt\src\appcrt\locale\getstringtypea.cpp, xrefs: 6CBA5863
Memory Dump Source
  • Source File: 00000003.00000002.1710502824.000000006CB29000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CAD0000, based on PE: true
  • Associated: 00000003.00000002.1710471540.000000006CAD0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CB20000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CBC9000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710634407.000000006CBCC000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710670869.000000006CBF4000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710694621.000000006CBF7000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710716056.000000006CBFA000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_3_2_6cad0000_rundll32.jbxd
Similarity
  • API ID: StringType
  • String ID: minkernel\crts\ucrt\src\appcrt\locale\getstringtypea.cpp
  • API String ID: 4177115715-24854585
  • Opcode ID: 38ea8ff777cb29a3a5478b8eadb8e7241ad380d1e5bc863eb10ac3f937f3e0ec
  • Instruction ID: c2e4d7681dbc4c5d7ad5723493814a06ec40f1b32b113fe1347edb7e14de8b12
  • Opcode Fuzzy Hash: 38ea8ff777cb29a3a5478b8eadb8e7241ad380d1e5bc863eb10ac3f937f3e0ec
  • Instruction Fuzzy Hash: E0514971D10188EBDB04DF94C895BEEB774EF54308F104158E519BB680DB79AE49CB91

Control-flow Graph

Strings
  • minkernel\crts\ucrt\src\appcrt\mbstring\mbctype.cpp, xrefs: 6CB938B3
Memory Dump Source
  • Source File: 00000003.00000002.1710502824.000000006CB29000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CAD0000, based on PE: true
  • Associated: 00000003.00000002.1710471540.000000006CAD0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CB20000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CBC9000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710634407.000000006CBCC000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710670869.000000006CBF4000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710694621.000000006CBF7000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710716056.000000006CBFA000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_3_2_6cad0000_rundll32.jbxd
Similarity
  • API ID:
  • String ID: minkernel\crts\ucrt\src\appcrt\mbstring\mbctype.cpp
  • API String ID: 0-426720447
  • Opcode ID: 0890551dfc0aaad8b2daf597ab07b040a77b91268ca631460cf4d265bc310860
  • Instruction ID: 99b68b9f4d542e86f664aff3ed93972e9f5dfb835fac145e5acfdc0fc8a26c1d
  • Opcode Fuzzy Hash: 0890551dfc0aaad8b2daf597ab07b040a77b91268ca631460cf4d265bc310860
  • Instruction Fuzzy Hash: 3851B4B1900289DBCB04DFA4CC91AEEB774FF45318F144568E429AB790EB35DE09CB51

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 350 6cb93e60-6cb93e86 call 6cb93160 353 6cb93e88-6cb93e96 call 6cb93310 350->353 354 6cb93e9b-6cb93eb1 350->354 360 6cb94253-6cb94261 call 6cb2140a 353->360 358 6cb9402b-6cb9402f 354->358 359 6cb93eb7-6cb93ec4 354->359 361 6cb94049-6cb9404c 358->361 362 6cb94031-6cb94038 358->362 363 6cb93eca-6cb93ed1 359->363 364 6cb94026 359->364 361->360 362->361 365 6cb9403a-6cb94047 IsValidCodePage 362->365 366 6cb93edc-6cb93ee3 363->366 364->358 365->361 368 6cb94051-6cb94058 365->368 369 6cb93ef1-6cb93ef8 366->369 370 6cb93ee5-6cb93eef 366->370 372 6cb9405e-6cb9407c 368->372 373 6cb940e2-6cb940f2 GetCPInfo 368->373 374 6cb93f03-6cb93f07 369->374 370->366 378 6cb94087-6cb9408b 372->378 376 6cb940f8-6cb940ff 373->376 377 6cb94237-6cb9423e 373->377 379 6cb93f0d-6cb93f1e 374->379 380 6cb93fb4-6cb93fe6 call 6cb93000 374->380 381 6cb9410a-6cb94111 376->381 382 6cb94250 377->382 383 6cb94240-6cb9424e call 6cb93310 377->383 385 6cb94099-6cb940aa 378->385 386 6cb9408d-6cb94097 378->386 387 6cb93f29-6cb93f3a 379->387 402 6cb93ff1-6cb93ff5 380->402 388 6cb9411f-6cb94139 381->388 389 6cb94113-6cb9411d 381->389 382->360 383->360 393 6cb940b5-6cb940b9 385->393 386->378 394 6cb93f3c-6cb93f4d 387->394 395 6cb93faf 387->395 399 6cb9413f-6cb94145 388->399 400 6cb941f6-6cb941f9 388->400 389->381 403 6cb940bb-6cb940c8 393->403 404 6cb940ca-6cb940d8 call 6cb93420 393->404 394->395 396 6cb93f4f-6cb93f61 394->396 395->374 406 6cb93f6c-6cb93f7e 396->406 407 6cb94150-6cb94158 399->407 408 6cb94200-6cb94207 400->408 409 6cb94013-6cb94021 call 6cb93420 402->409 410 6cb93ff7-6cb94011 402->410 403->393 404->360 413 6cb93faa 406->413 414 6cb93f80-6cb93f87 406->414 416 6cb9415a-6cb94163 407->416 417 6cb9419f-6cb941a6 407->417 415 6cb94212-6cb94216 408->415 409->360 410->402 413->387 414->413 421 6cb93f89-6cb93fa8 414->421 423 6cb94218-6cb94225 415->423 424 6cb94227-6cb9422b call 6cb93420 415->424 416->417 425 6cb94165-6cb9416e 416->425 420 6cb941b1-6cb941b8 417->420 427 6cb941ba-6cb941d0 420->427 428 6cb941d2-6cb941f4 call 6cb93000 420->428 421->406 423->415 437 6cb94230-6cb94235 424->437 431 6cb94179-6cb94183 425->431 427->420 428->408 435 6cb9419d 431->435 436 6cb94185-6cb9419b 431->436 435->407 436->431 437->360 437->377
Memory Dump Source
  • Source File: 00000003.00000002.1710502824.000000006CB29000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CAD0000, based on PE: true
  • Associated: 00000003.00000002.1710471540.000000006CAD0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CB20000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CBC9000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710634407.000000006CBCC000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710670869.000000006CBF4000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710694621.000000006CBF7000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710716056.000000006CBFA000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_3_2_6cad0000_rundll32.jbxd
Similarity
  • API ID:
  • String ID:
  • API String ID:
  • Opcode ID: 795b7896290ec0dfee3160cddf8126b6d13b2bb7b0034195d9095aeef24bdcea
  • Instruction ID: c8eeb5d12bf3cb7173a9fef058c4cfc9b2a623012e05a97741f9b01cfc9a9b3c
  • Opcode Fuzzy Hash: 795b7896290ec0dfee3160cddf8126b6d13b2bb7b0034195d9095aeef24bdcea
  • Instruction Fuzzy Hash: 5ED13774A04189DBDB04CFA8C494BAEBBB1FF4A308F14C16AD8296B741D339DA45CF91

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 441 6cb8f4a0-6cb8f4ae call 6cb8f170 443 6cb8f4b3-6cb8f4bd 441->443 444 6cb8f4bf-6cb8f4c1 443->444 445 6cb8f4c3-6cb8f4cb GetProcAddress 443->445 446 6cb8f4d1-6cb8f4d4 444->446 445->446
APIs
  • GetProcAddress.KERNEL32(00000000,?), ref: 6CB8F4CB
Memory Dump Source
  • Source File: 00000003.00000002.1710502824.000000006CB29000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CAD0000, based on PE: true
  • Associated: 00000003.00000002.1710471540.000000006CAD0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CB20000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CBC9000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710634407.000000006CBCC000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710670869.000000006CBF4000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710694621.000000006CBF7000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710716056.000000006CBFA000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_3_2_6cad0000_rundll32.jbxd
Similarity
  • API ID: AddressProc
  • String ID:
  • API String ID: 190572456-0
  • Opcode ID: ebf96b598931c03067c1bde03a2a7698e24e29057f6263e31277a45696fa190a
  • Instruction ID: cf5c58f0449c39d09c7db34d621b33ea3665c023fb1bf25ea67902dfe81a6240
  • Opcode Fuzzy Hash: ebf96b598931c03067c1bde03a2a7698e24e29057f6263e31277a45696fa190a
  • Instruction Fuzzy Hash: AAE046B6A0524CFBCB00DFA9D804E9E77BCEB89314F148599FE0DD3200E631DA008BA4

Non-executed Functions

APIs
  • GetLocaleInfoW.KERNEL32(?,20001004,?,00000002), ref: 6CBB2E9D
  • GetACP.KERNEL32 ref: 6CBB2EB1
  • GetLocaleInfoW.KERNEL32(?,2000000B,?,00000002), ref: 6CBB2EE2
Strings
Memory Dump Source
  • Source File: 00000003.00000002.1710502824.000000006CB29000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CAD0000, based on PE: true
  • Associated: 00000003.00000002.1710471540.000000006CAD0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CB20000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CBC9000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710634407.000000006CBCC000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710670869.000000006CBF4000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710694621.000000006CBF7000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710716056.000000006CBFA000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_3_2_6cad0000_rundll32.jbxd
Similarity
  • API ID: InfoLocale
  • String ID: ACP$OCP
  • API String ID: 2299586839-711371036
  • Opcode ID: 298e6de0f2b6521416e1250be522086baddde57ca9edb8f334d86459bb80567d
  • Instruction ID: b7ad790da0ba50b6a61cae7f19b7dcc112ef40acf6bdc6ea2982a26a9deee0a3
  • Opcode Fuzzy Hash: 298e6de0f2b6521416e1250be522086baddde57ca9edb8f334d86459bb80567d
  • Instruction Fuzzy Hash: 36118E75600184EBEB04CF66C888AAB3378EB45358F108558FD09EAA00EB71EA41CB53
APIs
  • IsValidCodePage.KERNEL32(00000000), ref: 6CBB32AE
    • Part of subcall function 6CBB22E0: GetUserDefaultLCID.KERNEL32 ref: 6CBB22F6
  • IsValidLocale.KERNEL32(00000000,00000001), ref: 6CBB32C8
  • GetLocaleInfoW.KERNEL32(00000000,00001001,00000000,00000040,00000000,-00000120,00000055,00000000,00000000,?,00000055,00000000), ref: 6CBB3331
Memory Dump Source
  • Source File: 00000003.00000002.1710502824.000000006CB29000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CAD0000, based on PE: true
  • Associated: 00000003.00000002.1710471540.000000006CAD0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CB20000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CBC9000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710634407.000000006CBCC000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710670869.000000006CBF4000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710694621.000000006CBF7000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710716056.000000006CBFA000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_3_2_6cad0000_rundll32.jbxd
Similarity
  • API ID: LocaleValid$CodeDefaultInfoPageUser
  • String ID:
  • API String ID: 334263767-0
  • Opcode ID: f54d12b940791622d8736aec977cdf8602f857fb206ec73202fdbbfdc0f27bcc
  • Instruction ID: 14fea0dbc9c266fdc8f6b312cf4eb226340da8d085d1220780bff4d3d97ce81f
  • Opcode Fuzzy Hash: f54d12b940791622d8736aec977cdf8602f857fb206ec73202fdbbfdc0f27bcc
  • Instruction Fuzzy Hash: 87914CB4A002459BEB04CFA4C995BBFB7B5EF49309F248118E505BB780DF35E945CBA2
APIs
  • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 6CB313EB
  • IsDebuggerPresent.KERNEL32 ref: 6CB314BB
  • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 6CB314E7
  • UnhandledExceptionFilter.KERNEL32(?), ref: 6CB314F1
Memory Dump Source
  • Source File: 00000003.00000002.1710502824.000000006CB29000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CAD0000, based on PE: true
  • Associated: 00000003.00000002.1710471540.000000006CAD0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CB20000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CBC9000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710634407.000000006CBCC000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710670869.000000006CBF4000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710694621.000000006CBF7000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710716056.000000006CBFA000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_3_2_6cad0000_rundll32.jbxd
Similarity
  • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
  • String ID:
  • API String ID: 254469556-0
  • Opcode ID: 7f2d5453c56474d4d62ea90a60c495a7ce3cd4a512271e61895833fc964d9bcd
  • Instruction ID: 0cdcae5795cbf8f5a98af41a3764aaae988b03f2e06fa50947ebd28812438b03
  • Opcode Fuzzy Hash: 7f2d5453c56474d4d62ea90a60c495a7ce3cd4a512271e61895833fc964d9bcd
  • Instruction Fuzzy Hash: C2311778D052689BDF11DF60C8497DDBBB8AF18304F1491D9E40D6B380E7B59A88CF42
APIs
  • GetModuleHandleExW.KERNEL32(00000006,?,00000000), ref: 6CB4A840
Strings
  • traits::tcscpy_s(program_name, (sizeof(*__countof_helper(program_name)) + 0), get_program_name_unknown_text(Character())), xrefs: 6CB4A8C0
  • Microsoft Visual C++ Runtime Library, xrefs: 6CB4AC77
  • _CrtDbgReport: String too long or IO Error, xrefs: 6CB4AC50
  • ..., xrefs: 6CB4AB1E
  • minkernel\crts\ucrt\src\appcrt\misc\dbgrpt.cpp, xrefs: 6CB4A8B6, 6CB4AC01, 6CB4AC41
  • (*_errno()), xrefs: 6CB4AC0B
  • @, xrefs: 6CB4A90C
  • common_message_window, xrefs: 6CB4A8BB, 6CB4AC06, 6CB4AC46
  • wcscpy_s(message_buffer, 4096, L"_CrtDbgReport: String too long or IO Error"), xrefs: 6CB4AC4B
  • @, xrefs: 6CB4A9AF
Memory Dump Source
  • Source File: 00000003.00000002.1710502824.000000006CB29000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CAD0000, based on PE: true
  • Associated: 00000003.00000002.1710471540.000000006CAD0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CB20000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CBC9000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710634407.000000006CBCC000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710670869.000000006CBF4000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710694621.000000006CBF7000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710716056.000000006CBFA000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_3_2_6cad0000_rundll32.jbxd
Similarity
  • API ID: HandleModule
  • String ID: (*_errno())$...$@$@$Microsoft Visual C++ Runtime Library$_CrtDbgReport: String too long or IO Error$common_message_window$minkernel\crts\ucrt\src\appcrt\misc\dbgrpt.cpp$traits::tcscpy_s(program_name, (sizeof(*__countof_helper(program_name)) + 0), get_program_name_unknown_text(Character()))$wcscpy_s(message_buffer, 4096, L"_CrtDbgReport: String too long or IO Error")
  • API String ID: 4139908857-1633980848
  • Opcode ID: 1709790748645fc3ae85b690183302418328917b41dddaf26293596fbd3c6c4c
  • Instruction ID: f7b9f42c2aa41fef8a3049265a0c07de65a3261496941925032af3442712c7a7
  • Opcode Fuzzy Hash: 1709790748645fc3ae85b690183302418328917b41dddaf26293596fbd3c6c4c
  • Instruction Fuzzy Hash: EED1BFB19482A9FBDB24DF90CC89BEEB374EB54304F1081E9E40867694D3349AC5DF92
APIs
  • GetModuleHandleExW.KERNEL32(00000006,?,00000000), ref: 6CB4A220
Strings
  • traits::tcscpy_s(program_name, (sizeof(*__countof_helper(program_name)) + 0), get_program_name_unknown_text(Character())), xrefs: 6CB4A2A0
  • Microsoft Visual C++ Runtime Library, xrefs: 6CB4A648
  • _CrtDbgReport: String too long or IO Error, xrefs: 6CB4A621
  • ..., xrefs: 6CB4A4EF
  • minkernel\crts\ucrt\src\appcrt\misc\dbgrpt.cpp, xrefs: 6CB4A296, 6CB4A5D2, 6CB4A612
  • (*_errno()), xrefs: 6CB4A5DC
  • @, xrefs: 6CB4A2EC
  • common_message_window, xrefs: 6CB4A29B, 6CB4A5D7, 6CB4A617
  • wcscpy_s(message_buffer, 4096, L"_CrtDbgReport: String too long or IO Error"), xrefs: 6CB4A61C
  • @, xrefs: 6CB4A380
Memory Dump Source
  • Source File: 00000003.00000002.1710502824.000000006CB29000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CAD0000, based on PE: true
  • Associated: 00000003.00000002.1710471540.000000006CAD0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CB20000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CBC9000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710634407.000000006CBCC000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710670869.000000006CBF4000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710694621.000000006CBF7000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710716056.000000006CBFA000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_3_2_6cad0000_rundll32.jbxd
Similarity
  • API ID: HandleModule
  • String ID: (*_errno())$...$@$@$Microsoft Visual C++ Runtime Library$_CrtDbgReport: String too long or IO Error$common_message_window$minkernel\crts\ucrt\src\appcrt\misc\dbgrpt.cpp$traits::tcscpy_s(program_name, (sizeof(*__countof_helper(program_name)) + 0), get_program_name_unknown_text(Character()))$wcscpy_s(message_buffer, 4096, L"_CrtDbgReport: String too long or IO Error")
  • API String ID: 4139908857-1633980848
  • Opcode ID: 87590b99eaab195444c369246a90897cb474fa9dbe8e040c356bc9c340a77ea8
  • Instruction ID: fb410bd827f61f60bc2b896142f44fc12c6737f88fb8fd348c74192626686d78
  • Opcode Fuzzy Hash: 87590b99eaab195444c369246a90897cb474fa9dbe8e040c356bc9c340a77ea8
  • Instruction Fuzzy Hash: 25D1AFB09042A8DBDB24CF14CC49BDEB775EB69304F1081E9E60867784D374AAC5DF92
Strings
  • wcscpy_s(progname, progname_size, L"<program name unknown>"), xrefs: 6CBA05B8
  • wcsncpy_s(pch, progname_size - (pch - progname), L"...", 3), xrefs: 6CBA0616
  • wcscat_s(outmsg, (sizeof(*__countof_helper(outmsg)) + 0), message), xrefs: 6CBA068C
  • Microsoft Visual C++ Runtime Library, xrefs: 6CBA06B5
  • wcscpy_s(outmsg, (sizeof(*__countof_helper(outmsg)) + 0), L"Runtime Error!\n\nProgram: "), xrefs: 6CBA0559
  • ..., xrefs: 6CBA061D
  • __acrt_report_runtime_error, xrefs: 6CBA0554, 6CBA05B3, 6CBA0611, 6CBA0651, 6CBA0687
  • Runtime Error!Program: , xrefs: 6CBA055E
  • wcscat_s(outmsg, (sizeof(*__countof_helper(outmsg)) + 0), L"\n\n"), xrefs: 6CBA0656
  • <program name unknown>, xrefs: 6CBA05BD
  • minkernel\crts\ucrt\src\appcrt\internal\report_runtime_error.cpp, xrefs: 6CBA054F, 6CBA05AE, 6CBA060C, 6CBA064C, 6CBA0682
Memory Dump Source
  • Source File: 00000003.00000002.1710502824.000000006CB29000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CAD0000, based on PE: true
  • Associated: 00000003.00000002.1710471540.000000006CAD0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CB20000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CBC9000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710634407.000000006CBCC000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710670869.000000006CBF4000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710694621.000000006CBF7000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710716056.000000006CBFA000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_3_2_6cad0000_rundll32.jbxd
Similarity
  • API ID:
  • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program: $__acrt_report_runtime_error$minkernel\crts\ucrt\src\appcrt\internal\report_runtime_error.cpp$wcscat_s(outmsg, (sizeof(*__countof_helper(outmsg)) + 0), L"\n\n")$wcscat_s(outmsg, (sizeof(*__countof_helper(outmsg)) + 0), message)$wcscpy_s(outmsg, (sizeof(*__countof_helper(outmsg)) + 0), L"Runtime Error!\n\nProgram: ")$wcscpy_s(progname, progname_size, L"<program name unknown>")$wcsncpy_s(pch, progname_size - (pch - progname), L"...", 3)
  • API String ID: 0-4242594854
  • Opcode ID: b446e36b5198863465bb2e24079c9d29922d996f6455f3c536bd219d8f648ec7
  • Instruction ID: 53ac76f3f2bca2f6d4a5ba3773edd2ff17b148e3357873c6170135cb046b50ab
  • Opcode Fuzzy Hash: b446e36b5198863465bb2e24079c9d29922d996f6455f3c536bd219d8f648ec7
  • Instruction Fuzzy Hash: 6E418EB9E402C477E700EAF49C52FEE37689B48718F444914F909BBB82E731DB19479A
APIs
  • failwithmessage.LIBCMTD ref: 6CB3093D
    • Part of subcall function 6CB30C20: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,6CB309D2,000000FF,00000000,00000000,?), ref: 6CB30C81
    • Part of subcall function 6CB30C20: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,6CB309D2,000000FF,?,00000000), ref: 6CB30CA0
    • Part of subcall function 6CB30C20: DebuggerProbe.LIBCMTD ref: 6CB30CBA
    • Part of subcall function 6CB30C20: DebuggerRuntime.LIBCMTD ref: 6CB30CD6
    • Part of subcall function 6CB30C20: IsDebuggerPresent.KERNEL32 ref: 6CB30CFF
  • _getMemBlockDataString.LIBCMTD ref: 6CB30969
  • failwithmessage.LIBCMTD ref: 6CB309CD
Strings
  • Size: , xrefs: 6CB30994
  • Address: 0x, xrefs: 6CB3099A
  • Stack area around _alloca memory reserved by this function is corrupted, xrefs: 6CB30934
  • Data: <, xrefs: 6CB30983
  • Allocation number within this function: , xrefs: 6CB3098E
  • %s%s%p%s%zd%s%d%s%s%s%s%s, xrefs: 6CB309A4
  • Stack area around _alloca memory reserved by this function is corrupted, xrefs: 6CB3099F
Memory Dump Source
  • Source File: 00000003.00000002.1710502824.000000006CB29000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CAD0000, based on PE: true
  • Associated: 00000003.00000002.1710471540.000000006CAD0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CB20000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CBC9000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710634407.000000006CBCC000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710670869.000000006CBF4000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710694621.000000006CBF7000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710716056.000000006CBFA000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_3_2_6cad0000_rundll32.jbxd
Similarity
  • API ID: Debugger$ByteCharMultiWidefailwithmessage$BlockDataPresentProbeRuntimeString_get
  • String ID: Address: 0x$Allocation number within this function: $Data: <$Size: $%s%s%p%s%zd%s%d%s%s%s%s%s$Stack area around _alloca memory reserved by this function is corrupted$Stack area around _alloca memory reserved by this function is corrupted
  • API String ID: 4067135985-3301296223
  • Opcode ID: 235ef4bf56ab7eb695cfc38e170d218c04444f0f440615db8c57eb27b5b7175c
  • Instruction ID: ec1bfc87cb7867f855019256ac0f9251e3eac269480dca10b5703435aa1b28a5
  • Opcode Fuzzy Hash: 235ef4bf56ab7eb695cfc38e170d218c04444f0f440615db8c57eb27b5b7175c
  • Instruction Fuzzy Hash: E421C97AE401987BCB10CEB9EC84DEEB7BCEF48325F400556FA1DE7A40D63099498B51
Strings
Memory Dump Source
  • Source File: 00000003.00000002.1710502824.000000006CB29000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CAD0000, based on PE: true
  • Associated: 00000003.00000002.1710471540.000000006CAD0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CB20000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CBC9000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710634407.000000006CBCC000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710670869.000000006CBF4000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710694621.000000006CBF7000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710716056.000000006CBFA000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_3_2_6cad0000_rundll32.jbxd
Similarity
  • API ID:
  • String ID: "$"$%ls$("Buffer too small", 0)$*$*$_wctomb_s_l$destination_count <= INT_MAX$destination_count > 0$minkernel\crts\ucrt\src\appcrt\convert\wctomb.cpp
  • API String ID: 0-2198373435
  • Opcode ID: 0905134bdc92367caadbd917a662f812c100274efecb5bf119dc9036810d39ce
  • Instruction ID: e66ece5e7d1d8c7ac8757e5c8fd68ee84564af384960b91df5d2def5efeab9a5
  • Opcode Fuzzy Hash: 0905134bdc92367caadbd917a662f812c100274efecb5bf119dc9036810d39ce
  • Instruction Fuzzy Hash: 8AB15EB4D40288EFDB14CF90C855BED77F4EF06318F208528E4157BAA0D7B99A49CB92
APIs
  • _cmpDWORD.LIBCMTD ref: 6CBC5E6C
    • Part of subcall function 6CBC5560: _cmpBYTE.LIBCMTD ref: 6CBC5596
  • _cmpDWORD.LIBCMTD ref: 6CBC5E93
Memory Dump Source
  • Source File: 00000003.00000002.1710502824.000000006CB29000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CAD0000, based on PE: true
  • Associated: 00000003.00000002.1710471540.000000006CAD0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CB20000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CBC9000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710634407.000000006CBCC000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710670869.000000006CBF4000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710694621.000000006CBF7000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710716056.000000006CBFA000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_3_2_6cad0000_rundll32.jbxd
Similarity
  • API ID: _cmp
  • String ID:
  • API String ID: 2028851527-0
  • Opcode ID: dcf5647540f9869c7e8f67cfd3f3416951bda7d1ccddd060f364bd93f6ce725b
  • Instruction ID: b9a01a90b31d1b0273e768c60f1e67d9e88d60c5bb228d03f9aa64974505c655
  • Opcode Fuzzy Hash: dcf5647540f9869c7e8f67cfd3f3416951bda7d1ccddd060f364bd93f6ce725b
  • Instruction Fuzzy Hash: CF510AB1A11188EFCB04CFBCDA44A9D7BB5EB40309F508558F419AB645EB309F48EB56
APIs
  • std::exception::exception.LIBCMTD ref: 6CB90875
Strings
Memory Dump Source
  • Source File: 00000003.00000002.1710502824.000000006CB29000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CAD0000, based on PE: true
  • Associated: 00000003.00000002.1710471540.000000006CAD0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CB20000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CBC9000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710634407.000000006CBCC000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710670869.000000006CBF4000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710694621.000000006CBF7000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710716056.000000006CBFA000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_3_2_6cad0000_rundll32.jbxd
Similarity
  • API ID: std::exception::exception
  • String ID: %ls$*$?$common_expand_argv_wildcards$minkernel\crts\ucrt\src\appcrt\startup\argv_wildcards.cpp$result != nullptr$traits::tcsncpy_s( character_it, character_count - (character_it - character_first), *it, count)
  • API String ID: 2807920213-976376051
  • Opcode ID: f8aad47e90e6dae42c2f2bfb25a6b01e674d1c6cc4a1990f4de64c04da7bbdbf
  • Instruction ID: 17d2e2d280c46b894058448d2bb9ecf1c99029de456267e44b5f8510344d9621
  • Opcode Fuzzy Hash: f8aad47e90e6dae42c2f2bfb25a6b01e674d1c6cc4a1990f4de64c04da7bbdbf
  • Instruction Fuzzy Hash: 0C913CB0D00289EFDB04DFD4D894BEEB7B5AF59304F244529D415BB780EB34AA48CB91
APIs
  • VirtualQuery.KERNEL32(?,?,0000001C), ref: 6CB324E5
  • GetProcAddress.KERNEL32(00000000,PDBOpenValidate5), ref: 6CB325AF
  • GetProcessHeap.KERNEL32(00000000,00000000), ref: 6CB3270C
  • HeapFree.KERNEL32(00000000), ref: 6CB32713
  • GetProcessHeap.KERNEL32 ref: 6CB32784
  • HeapAlloc.KERNEL32(00000000,00000000,?), ref: 6CB3278E
Strings
Memory Dump Source
  • Source File: 00000003.00000002.1710502824.000000006CB29000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CAD0000, based on PE: true
  • Associated: 00000003.00000002.1710471540.000000006CAD0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CB20000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CBC9000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710634407.000000006CBCC000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710670869.000000006CBF4000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710694621.000000006CBF7000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710716056.000000006CBFA000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_3_2_6cad0000_rundll32.jbxd
Similarity
  • API ID: Heap$Process$AddressAllocFreeProcQueryVirtual
  • String ID: PDBOpenValidate5
  • API String ID: 1898765391-413491164
  • Opcode ID: 16deb34161f56d96e3fdb6620c00f9935343efa4d9dd65e0da67ddf8450fe6f6
  • Instruction ID: f06ffd6a9a283fcf379d77066b20ac6697fa041c2f9c0ce467e319f103f2d2b9
  • Opcode Fuzzy Hash: 16deb34161f56d96e3fdb6620c00f9935343efa4d9dd65e0da67ddf8450fe6f6
  • Instruction Fuzzy Hash: 1AB15835B002299BDF049FA4C858BAE7BBAFF48714F254055E925A7781DB31AD02CBD2
APIs
Strings
  • minkernel\crts\ucrt\src\appcrt\locale\get_qualified_locale.cpp, xrefs: 6CBB1EA6, 6CBB1FA4
  • utf8, xrefs: 6CBB1FB5
  • __acrt_get_qualified_locale, xrefs: 6CBB1EAB, 6CBB1FA9
  • wcsncpy_s(lpOutStr->szLocaleName, (sizeof(*__countof_helper(lpOutStr->szLocaleName)) + 0), _psetloc_data->_cacheLocaleName, wcslen, xrefs: 6CBB1EB0
  • wcsncpy_s(lpOutStr->szCodePage, (sizeof(*__countof_helper(lpOutStr->szCodePage)) + 0), L"utf8", 5), xrefs: 6CBB1FAE
Memory Dump Source
  • Source File: 00000003.00000002.1710502824.000000006CB29000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CAD0000, based on PE: true
  • Associated: 00000003.00000002.1710471540.000000006CAD0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CB20000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CBC9000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710634407.000000006CBCC000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710670869.000000006CBF4000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710694621.000000006CBF7000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710716056.000000006CBFA000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_3_2_6cad0000_rundll32.jbxd
Similarity
  • API ID: CodePageValid
  • String ID: __acrt_get_qualified_locale$minkernel\crts\ucrt\src\appcrt\locale\get_qualified_locale.cpp$utf8$wcsncpy_s(lpOutStr->szCodePage, (sizeof(*__countof_helper(lpOutStr->szCodePage)) + 0), L"utf8", 5)$wcsncpy_s(lpOutStr->szLocaleName, (sizeof(*__countof_helper(lpOutStr->szLocaleName)) + 0), _psetloc_data->_cacheLocaleName, wcslen
  • API String ID: 1911128615-3002009667
  • Opcode ID: bbd1ef434f747672fd0685210414be4a8118fc8d542a3460aa25d8697e0c5011
  • Instruction ID: 0fa2fc90abf3f71327b7fa4aeadb6bde491570beea1c58e8a4a4d05aa9cc3c00
  • Opcode Fuzzy Hash: bbd1ef434f747672fd0685210414be4a8118fc8d542a3460aa25d8697e0c5011
  • Instruction Fuzzy Hash: 90918DB4A00284ABEB04DF64CD45BBE73B5EF44708F188568F804BB781EB79EA54C795
APIs
  • HeapSize.KERNEL32(02DF0000,00000000,00000000), ref: 6CB9F505
  • HeapReAlloc.KERNEL32(02DF0000,00000010,00000000,?), ref: 6CB9F53A
Strings
Memory Dump Source
  • Source File: 00000003.00000002.1710502824.000000006CB29000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CAD0000, based on PE: true
  • Associated: 00000003.00000002.1710471540.000000006CAD0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CB20000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CBC9000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710634407.000000006CBCC000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710670869.000000006CBF4000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710694621.000000006CBF7000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710716056.000000006CBFA000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_3_2_6cad0000_rundll32.jbxd
Similarity
  • API ID: Heap$AllocSize
  • String ID: %ls$_expand_base$block != nullptr$minkernel\crts\ucrt\src\appcrt\heap\expand.cpp
  • API String ID: 3906553864-3244948836
  • Opcode ID: 22d2aea797a3f5e78b094d9becef73c4465b289d331e4dc549dad19d31c88cef
  • Instruction ID: 4f1f8636a74dd7f8131eb9595f0bc3af585926fe6a6c147002414d3a32f8db57
  • Opcode Fuzzy Hash: 22d2aea797a3f5e78b094d9becef73c4465b289d331e4dc549dad19d31c88cef
  • Instruction Fuzzy Hash: 823182B0E44288EFDB00DFA4C845BDE77B5EB4A325F108564F514ABB80D7B5DA44CB92
APIs
  • _cmpDWORD.LIBCMTD ref: 6CBC5C14
    • Part of subcall function 6CBC5560: _cmpBYTE.LIBCMTD ref: 6CBC5596
  • _cmpDWORD.LIBCMTD ref: 6CBC5C3B
Memory Dump Source
  • Source File: 00000003.00000002.1710502824.000000006CB29000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CAD0000, based on PE: true
  • Associated: 00000003.00000002.1710471540.000000006CAD0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CB20000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CBC9000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710634407.000000006CBCC000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710670869.000000006CBF4000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710694621.000000006CBF7000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710716056.000000006CBFA000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_3_2_6cad0000_rundll32.jbxd
Similarity
  • API ID: _cmp
  • String ID:
  • API String ID: 2028851527-0
  • Opcode ID: 2640301d4570daf9c888c71c09274a33e47595d280c6422622a01629a6ba161a
  • Instruction ID: 20fd35f97242420a9b546ae67eb5f7f7b25045a5367b958e0374165f3e798750
  • Opcode Fuzzy Hash: 2640301d4570daf9c888c71c09274a33e47595d280c6422622a01629a6ba161a
  • Instruction Fuzzy Hash: 983154B1A11188EFCB04DFBCDA44A9D7B75AB50308F908158F419AB605EB309F48EB96
APIs
  • _cmpDWORD.LIBCMTD ref: 6CBC5D40
    • Part of subcall function 6CBC5560: _cmpBYTE.LIBCMTD ref: 6CBC5596
  • _cmpDWORD.LIBCMTD ref: 6CBC5D67
Memory Dump Source
  • Source File: 00000003.00000002.1710502824.000000006CB29000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CAD0000, based on PE: true
  • Associated: 00000003.00000002.1710471540.000000006CAD0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CB20000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CBC9000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710634407.000000006CBCC000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710670869.000000006CBF4000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710694621.000000006CBF7000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710716056.000000006CBFA000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_3_2_6cad0000_rundll32.jbxd
Similarity
  • API ID: _cmp
  • String ID:
  • API String ID: 2028851527-0
  • Opcode ID: cab4e5dea73df74ae65bb80adee57d74dc798646feee793aae844ddc1c4fb3b9
  • Instruction ID: 72147c9449740e0ca49625c6e235c475adbbd3b1abd043e0d8d6e9d271af3000
  • Opcode Fuzzy Hash: cab4e5dea73df74ae65bb80adee57d74dc798646feee793aae844ddc1c4fb3b9
  • Instruction Fuzzy Hash: 323125B1E11188EFCB04DFBCDA48A9D7B75AB50349F50C158F409A7605DB309F48EB5A
Strings
Memory Dump Source
  • Source File: 00000003.00000002.1710502824.000000006CB29000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CAD0000, based on PE: true
  • Associated: 00000003.00000002.1710471540.000000006CAD0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CB20000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CBC9000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710634407.000000006CBCC000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710670869.000000006CBF4000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710694621.000000006CBF7000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710716056.000000006CBFA000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_3_2_6cad0000_rundll32.jbxd
Similarity
  • API ID:
  • String ID: %ls$_wcstombs_l_helper$minkernel\crts\ucrt\src\appcrt\convert\wcstombs.cpp$pwcs != nullptr
  • API String ID: 0-287901994
  • Opcode ID: e3fc6e407935ed411af4c94cd89a61af97ff78ec7409fced7d7330f9b8022234
  • Instruction ID: 5edc8bbf4fe66414ba134afe728a07ed0057061b7fcf5527d5f1085fc88a4b2f
  • Opcode Fuzzy Hash: e3fc6e407935ed411af4c94cd89a61af97ff78ec7409fced7d7330f9b8022234
  • Instruction Fuzzy Hash: B3121970914298EFDB14CF98D894BEDB771FF05328F208259E8696B6D0D734AA46CF41
APIs
  • Is_bad_exception_allowed.LIBVCRUNTIMED ref: 6CB360D5
  • CatchIt.LIBCMTD ref: 6CB362CB
Strings
Memory Dump Source
  • Source File: 00000003.00000002.1710502824.000000006CB29000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CAD0000, based on PE: true
  • Associated: 00000003.00000002.1710471540.000000006CAD0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CB20000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CBC9000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710634407.000000006CBCC000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710670869.000000006CBF4000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710694621.000000006CBF7000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710716056.000000006CBFA000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_3_2_6cad0000_rundll32.jbxd
Similarity
  • API ID: CatchIs_bad_exception_allowed
  • String ID: csm$csm$csm
  • API String ID: 974221251-393685449
  • Opcode ID: afe80ce9b5eb19ff7632915b33f20f477810cc94887881300b222c55b3b8b19f
  • Instruction ID: 21f55d6af79a256d89f22f6b30c7977abcd3aa2fec94e6589bc5d0dde418001d
  • Opcode Fuzzy Hash: afe80ce9b5eb19ff7632915b33f20f477810cc94887881300b222c55b3b8b19f
  • Instruction Fuzzy Hash: 7AF193B59002999FCB04CFA4C890AEF7779FF54308F149158E81D9BB41DB35EA49CBA2
APIs
Strings
Memory Dump Source
  • Source File: 00000003.00000002.1710502824.000000006CB29000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CAD0000, based on PE: true
  • Associated: 00000003.00000002.1710471540.000000006CAD0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CB20000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CBC9000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710634407.000000006CBCC000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710670869.000000006CBF4000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710694621.000000006CBF7000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710716056.000000006CBFA000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_3_2_6cad0000_rundll32.jbxd
Similarity
  • API ID: und_strncmp
  • String ID: `generic-type-$`template-parameter-$generic-type-$template-parameter-
  • API String ID: 2034953485-3207858774
  • Opcode ID: 6572f9c6a42491adeff06c86282cfbcfa5e256a61b13cb6c2ee581ffab6c3cef
  • Instruction ID: d9a9b99a2e57a4f848c2f050f9e9c5dc0041596d56bc49ace22406ce24f30849
  • Opcode Fuzzy Hash: 6572f9c6a42491adeff06c86282cfbcfa5e256a61b13cb6c2ee581ffab6c3cef
  • Instruction Fuzzy Hash: 669164B1E042C8ABDF04DFA4D890AEEB7B5AF49304F148129E419A7754EB359A48CB61
APIs
  • std::exception::exception.LIBCMTD ref: 6CB90C0F
Strings
Memory Dump Source
  • Source File: 00000003.00000002.1710502824.000000006CB29000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CAD0000, based on PE: true
  • Associated: 00000003.00000002.1710471540.000000006CAD0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CB20000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CBC9000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710634407.000000006CBCC000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710670869.000000006CBF4000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710694621.000000006CBF7000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710716056.000000006CBFA000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_3_2_6cad0000_rundll32.jbxd
Similarity
  • API ID: std::exception::exception
  • String ID: %ls$common_expand_argv_wildcards$minkernel\crts\ucrt\src\appcrt\startup\argv_wildcards.cpp$result != nullptr$traits::tcsncpy_s( character_it, character_count - (character_it - character_first), *it, count)
  • API String ID: 2807920213-1103401458
  • Opcode ID: 2b040785e985b3d0081b58998ef1eedc8b1ee14d72b4aabbbc8e314d8063d7ca
  • Instruction ID: 35adba5d8f019103268ba049aabbcfc60b05fd58ab5c6388145d02f06acef6da
  • Opcode Fuzzy Hash: 2b040785e985b3d0081b58998ef1eedc8b1ee14d72b4aabbbc8e314d8063d7ca
  • Instruction Fuzzy Hash: F1A148B0D002899FDB04DFE4D895BEEB7B5EF49308F244529E415BB780EB34AA49CB51
Strings
Memory Dump Source
  • Source File: 00000003.00000002.1710502824.000000006CB29000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CAD0000, based on PE: true
  • Associated: 00000003.00000002.1710471540.000000006CAD0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CB20000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CBC9000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710634407.000000006CBCC000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710670869.000000006CBF4000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710694621.000000006CBF7000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710716056.000000006CBFA000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_3_2_6cad0000_rundll32.jbxd
Similarity
  • API ID:
  • String ID: %ls$C:\Windows\SysWOW64\rundll32.exe$common_configure_argv$minkernel\crts\ucrt\src\appcrt\startup\argv_parsing.cpp$mode == _crt_argv_expanded_arguments || mode == _crt_argv_unexpanded_arguments
  • API String ID: 0-445158968
  • Opcode ID: ce5a8349694b080315aa9ec555b5d05907777d3e663ec7d78fe00880346caa29
  • Instruction ID: 5e0e3e5d0ed6ae3735fbf7947deba03c50fee92895014410f9b2b2e75e80a6f3
  • Opcode Fuzzy Hash: ce5a8349694b080315aa9ec555b5d05907777d3e663ec7d78fe00880346caa29
  • Instruction Fuzzy Hash: B27181B1D04288EBDB04EFE4D855BEEB774AF04708F108558D505BB784DB745A4CDBA2
Strings
Memory Dump Source
  • Source File: 00000003.00000002.1710502824.000000006CB29000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CAD0000, based on PE: true
  • Associated: 00000003.00000002.1710471540.000000006CAD0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CB20000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CBC9000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710634407.000000006CBCC000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710670869.000000006CBF4000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710694621.000000006CBF7000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710716056.000000006CBFA000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_3_2_6cad0000_rundll32.jbxd
Similarity
  • API ID:
  • String ID: %ls$(_osfile(fh) & FOPEN)$(fh >= 0 && (unsigned)fh < (unsigned)_nhandle)$_close$minkernel\crts\ucrt\src\appcrt\lowio\close.cpp
  • API String ID: 0-1433886027
  • Opcode ID: ed9ea40668168f19f02f422b9248b4dea873edf5247132c51d2834726bffd238
  • Instruction ID: afe49db0ceccad7081fa03e6fa8cd5de9b231faa5b59546703209f284207837b
  • Opcode Fuzzy Hash: ed9ea40668168f19f02f422b9248b4dea873edf5247132c51d2834726bffd238
  • Instruction Fuzzy Hash: 503122BC8402C4ABEB109F94CC51BBD3B74AF06369F140A44F0283AEC1DBB49644CB96
Strings
Memory Dump Source
  • Source File: 00000003.00000002.1710502824.000000006CB29000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CAD0000, based on PE: true
  • Associated: 00000003.00000002.1710471540.000000006CAD0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CB20000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CBC9000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710634407.000000006CBCC000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710670869.000000006CBF4000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710694621.000000006CBF7000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710716056.000000006CBFA000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_3_2_6cad0000_rundll32.jbxd
Similarity
  • API ID:
  • String ID: %ls$(_osfile(fh) & FOPEN)$(fh >= 0 && (unsigned)fh < (unsigned)_nhandle)$_commit$minkernel\crts\ucrt\src\appcrt\lowio\commit.cpp
  • API String ID: 0-1026578051
  • Opcode ID: 57ec90ad992d9fa95316e4fc42f3ead125a2f46a12b8da4d17b8fd20c9ce61a8
  • Instruction ID: 4ab74c34c30ce08a667d3ff4951bb667b95ee697e8e6ddd6ed545c515b5dc6b1
  • Opcode Fuzzy Hash: 57ec90ad992d9fa95316e4fc42f3ead125a2f46a12b8da4d17b8fd20c9ce61a8
  • Instruction Fuzzy Hash: CA31E6B49402C8ABDB308F94CC42BAC7B74EB05769F144A45E5247AAC1DBB4964CCB9B
APIs
  • _cmpDWORD.LIBCMTD ref: 6CBC5AFC
    • Part of subcall function 6CBC5560: _cmpBYTE.LIBCMTD ref: 6CBC5596
  • _cmpDWORD.LIBCMTD ref: 6CBC5B23
Memory Dump Source
  • Source File: 00000003.00000002.1710502824.000000006CB29000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CAD0000, based on PE: true
  • Associated: 00000003.00000002.1710471540.000000006CAD0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CB20000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CBC9000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710634407.000000006CBCC000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710670869.000000006CBF4000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710694621.000000006CBF7000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710716056.000000006CBFA000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_3_2_6cad0000_rundll32.jbxd
Similarity
  • API ID: _cmp
  • String ID:
  • API String ID: 2028851527-0
  • Opcode ID: 886a3d6f066865c6bb5d327980fe2796885dd27cc38c0e45858bb95054f92fe6
  • Instruction ID: 38d3a956c1ba275b7be4048d3ac295b03b035353a55ebafec42b62c184d3f532
  • Opcode Fuzzy Hash: 886a3d6f066865c6bb5d327980fe2796885dd27cc38c0e45858bb95054f92fe6
  • Instruction Fuzzy Hash: 813110B1A11188EFCB04DFBCCA44B9D7B759B50309F508158E409B7649DB349F48EB56
APIs
  • std::_Fac_node::_Fac_node.LIBCPMTD ref: 6CB4AF48
Strings
Memory Dump Source
  • Source File: 00000003.00000002.1710502824.000000006CB29000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CAD0000, based on PE: true
  • Associated: 00000003.00000002.1710471540.000000006CAD0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CB20000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CBC9000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710634407.000000006CBCC000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710670869.000000006CBF4000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710694621.000000006CBF7000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710716056.000000006CBFA000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_3_2_6cad0000_rundll32.jbxd
Similarity
  • API ID: Fac_nodeFac_node::_std::_
  • String ID: %ls$common_set_report_hook$minkernel\crts\ucrt\src\appcrt\misc\dbgrpt.cpp$mode == _CRT_RPTHOOK_INSTALL || mode == _CRT_RPTHOOK_REMOVE$new_hook != nullptr
  • API String ID: 1114552684-2008714909
  • Opcode ID: e5ad3daa68931cf481920fe6d17de3724324af798ab4401ed3e19e017f6b3f7c
  • Instruction ID: 9fedbdea32c77487096fa9b1e75dd32513e0bbf432f3c15f273b46907a9256f5
  • Opcode Fuzzy Hash: e5ad3daa68931cf481920fe6d17de3724324af798ab4401ed3e19e017f6b3f7c
  • Instruction Fuzzy Hash: 3F21D8B4E882C9FADF109A90CC05FDE7770EB01729F20C9A5E52829DC5D3B55188DE93
APIs
  • std::_Fac_node::_Fac_node.LIBCPMTD ref: 6CB4B0B8
Strings
Memory Dump Source
  • Source File: 00000003.00000002.1710502824.000000006CB29000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CAD0000, based on PE: true
  • Associated: 00000003.00000002.1710471540.000000006CAD0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CB20000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CBC9000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710634407.000000006CBCC000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710670869.000000006CBF4000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710694621.000000006CBF7000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710716056.000000006CBFA000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_3_2_6cad0000_rundll32.jbxd
Similarity
  • API ID: Fac_nodeFac_node::_std::_
  • String ID: %ls$common_set_report_hook$minkernel\crts\ucrt\src\appcrt\misc\dbgrpt.cpp$mode == _CRT_RPTHOOK_INSTALL || mode == _CRT_RPTHOOK_REMOVE$new_hook != nullptr
  • API String ID: 1114552684-2008714909
  • Opcode ID: 7a2bfec4f77251af77b784958f660962e5615e3d5812cf9c8f30d7f540cd5f09
  • Instruction ID: 3638af62f0c97369924fd547a674620392513e4b3c45a6b2437bcd1eca5b8521
  • Opcode Fuzzy Hash: 7a2bfec4f77251af77b784958f660962e5615e3d5812cf9c8f30d7f540cd5f09
  • Instruction Fuzzy Hash: D321D674E482C8FAEF209A90CC05BDE7774EF0132BF10C695E62429EC5D3B55288DA97
Strings
  • minkernel\crts\ucrt\src\appcrt\locale\comparestringa.cpp, xrefs: 6CBB5304
  • minkernel\crts\ucrt\src\appcrt\locale\comparestringa.cpp, xrefs: 6CBB5491, 6CBB5592
  • cchCount1==0 && cchCount2==1 || cchCount1==1 && cchCount2==0, xrefs: 6CBB52F6
  • %ls, xrefs: 6CBB52FB
Memory Dump Source
  • Source File: 00000003.00000002.1710502824.000000006CB29000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CAD0000, based on PE: true
  • Associated: 00000003.00000002.1710471540.000000006CAD0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CB20000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CBC9000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710634407.000000006CBCC000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710670869.000000006CBF4000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710694621.000000006CBF7000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710716056.000000006CBFA000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_3_2_6cad0000_rundll32.jbxd
Similarity
  • API ID:
  • String ID: %ls$cchCount1==0 && cchCount2==1 || cchCount1==1 && cchCount2==0$minkernel\crts\ucrt\src\appcrt\locale\comparestringa.cpp$minkernel\crts\ucrt\src\appcrt\locale\comparestringa.cpp
  • API String ID: 0-1085474390
  • Opcode ID: f47e2852cefec3960616543e78e13867e714676c576e250e71e306ff1667b40f
  • Instruction ID: 000a535d60871961e5f29d242b2df49fd208dde2661a87ddf2a3bff95fe85154
  • Opcode Fuzzy Hash: f47e2852cefec3960616543e78e13867e714676c576e250e71e306ff1667b40f
  • Instruction Fuzzy Hash: 81E1B271E001899BDB04CF94C8A0BFE7775EF49308F144129E916BBB80DB79D949CBA6
APIs
  • GetStdHandle.KERNEL32(000000F5), ref: 6CB8B0B3
  • GetStdHandle.KERNEL32(000000F4), ref: 6CB8B0CD
Strings
Memory Dump Source
  • Source File: 00000003.00000002.1710502824.000000006CB29000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CAD0000, based on PE: true
  • Associated: 00000003.00000002.1710471540.000000006CAD0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CB20000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CBC9000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710634407.000000006CBCC000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710670869.000000006CBF4000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710694621.000000006CBF7000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710716056.000000006CBFA000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_3_2_6cad0000_rundll32.jbxd
Similarity
  • API ID: Handle
  • String ID: %ls$_CrtSetReportFile$minkernel\crts\ucrt\src\appcrt\misc\dbgrptt.cpp$nRptType >= 0 && nRptType < _CRT_ERRCNT
  • API String ID: 2519475695-1451859211
  • Opcode ID: 4b081e2761c12b5f45532bc8843668a76beebc130b1043a0c6d54b11702d46dd
  • Instruction ID: 7c7c9c0fec2bd52d18ad974b012a1cd7bb63e02fa24a94264ac18ce0953acf32
  • Opcode Fuzzy Hash: 4b081e2761c12b5f45532bc8843668a76beebc130b1043a0c6d54b11702d46dd
  • Instruction Fuzzy Hash: 67216D78905289FBCB208E78DC44B4C7BB8EB06368F148245EA745BBC0D371A684CF46
APIs
Strings
Memory Dump Source
  • Source File: 00000003.00000002.1710502824.000000006CB29000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CAD0000, based on PE: true
  • Associated: 00000003.00000002.1710471540.000000006CAD0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CB20000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CBC9000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710634407.000000006CBCC000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710670869.000000006CBF4000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710694621.000000006CBF7000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710716056.000000006CBFA000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_3_2_6cad0000_rundll32.jbxd
Similarity
  • API ID: _fix_grouping
  • String ID: %ls$minkernel\crts\ucrt\src\appcrt\locale\initnum.cpp$minkernel\crts\ucrt\src\appcrt\locale\initnum.cpp$ploci->lconv_num_refcount > 0
  • API String ID: 3906328105-162942574
  • Opcode ID: 99f02b8ab04408d55638a2380cd3a795f2fc21aa2b669a8d4a34166730247fed
  • Instruction ID: e7c1d4f6d91c3a3cee92110395603d06134d71922a24a34a49e8cd6685a95a07
  • Opcode Fuzzy Hash: 99f02b8ab04408d55638a2380cd3a795f2fc21aa2b669a8d4a34166730247fed
  • Instruction Fuzzy Hash: 7FC1C3B4E04248AFDB00CF94C855FEEBBB1FF44314F048558E958AB781D7B6AA85CB91
Strings
  • mode == _crt_argv_expanded_arguments || mode == _crt_argv_unexpanded_arguments, xrefs: 6CB4CC6E, 6CB4CCB6
  • %ls, xrefs: 6CB4CC73
  • common_configure_argv, xrefs: 6CB4CCB1
  • minkernel\crts\ucrt\src\appcrt\startup\argv_parsing.cpp, xrefs: 6CB4CC7F, 6CB4CCAC
Memory Dump Source
  • Source File: 00000003.00000002.1710502824.000000006CB29000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CAD0000, based on PE: true
  • Associated: 00000003.00000002.1710471540.000000006CAD0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CB20000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CBC9000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710634407.000000006CBCC000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710670869.000000006CBF4000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710694621.000000006CBF7000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710716056.000000006CBFA000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_3_2_6cad0000_rundll32.jbxd
Similarity
  • API ID:
  • String ID: %ls$common_configure_argv$minkernel\crts\ucrt\src\appcrt\startup\argv_parsing.cpp$mode == _crt_argv_expanded_arguments || mode == _crt_argv_unexpanded_arguments
  • API String ID: 0-3792389471
  • Opcode ID: 5d756aef5c398e6d8ba8696e9a24d4d3f55e8d42c6657a36c2d8f2bd4439b972
  • Instruction ID: d1c0aab03232145f1a1a3b4bbd20888940cfac46e2487cfd5d826493c9f9eab9
  • Opcode Fuzzy Hash: 5d756aef5c398e6d8ba8696e9a24d4d3f55e8d42c6657a36c2d8f2bd4439b972
  • Instruction Fuzzy Hash: A4718FB1D04188EBDB04EFA4D895BEEB774EF04708F108158E5056B785EB746A0CDBA2
APIs
  • GetPdbDllFromInstallPath.LIBCMTD ref: 6CB31F47
    • Part of subcall function 6CB320C0: GetLastError.KERNEL32 ref: 6CB32109
    • Part of subcall function 6CB320C0: GetProcAddress.KERNEL32(00000000,RegOpenKeyExW), ref: 6CB3212F
    • Part of subcall function 6CB320C0: GetProcAddress.KERNEL32(00000000,RegQueryValueExW), ref: 6CB32141
    • Part of subcall function 6CB320C0: GetProcAddress.KERNEL32(00000000,RegCloseKey), ref: 6CB32153
    • Part of subcall function 6CB320C0: FreeLibrary.KERNEL32(00000000), ref: 6CB32187
  • GetLastError.KERNEL32 ref: 6CB31FBB
  • GetLastError.KERNEL32 ref: 6CB31FF5
Strings
Memory Dump Source
  • Source File: 00000003.00000002.1710502824.000000006CB29000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CAD0000, based on PE: true
  • Associated: 00000003.00000002.1710471540.000000006CAD0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CB20000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CBC9000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710634407.000000006CBCC000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710670869.000000006CBF4000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710694621.000000006CBF7000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710716056.000000006CBFA000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_3_2_6cad0000_rundll32.jbxd
Similarity
  • API ID: AddressErrorLastProc$FreeFromInstallLibraryPath
  • String ID: MSPDB140$VCRUNTIME140D.dll
  • API String ID: 3575457754-1916464790
  • Opcode ID: b96afffd17ec557b0728e1330a02ad694b952f3dd40b52c2de5d59520d99e79c
  • Instruction ID: c23ec89388dbd23a624588db4dc675df11294f90e0a7aa53893f152f370b191f
  • Opcode Fuzzy Hash: b96afffd17ec557b0728e1330a02ad694b952f3dd40b52c2de5d59520d99e79c
  • Instruction Fuzzy Hash: CE31D6B1A0429866EB1096719C4AFDE33AC9F04308F5405A1EE1DE6AC2FB75D64CC693
Strings
Memory Dump Source
  • Source File: 00000003.00000002.1710502824.000000006CB29000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CAD0000, based on PE: true
  • Associated: 00000003.00000002.1710471540.000000006CAD0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CB20000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CBC9000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710634407.000000006CBCC000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710670869.000000006CBF4000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710694621.000000006CBF7000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710716056.000000006CBFA000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_3_2_6cad0000_rundll32.jbxd
Similarity
  • API ID:
  • String ID: %ls$D:\a\_work\1\s\src\vctools\crt\vcruntime\src\internal\winapi_downlevel.cpp$cached_fp == invalid_function_sentinel()$cached_fp == new_fp
  • API String ID: 0-3288861829
  • Opcode ID: 4074bc572848ecf33a957ca863fe269e3c259f31b9ff4cc9ae4974650c1be0b0
  • Instruction ID: 6721e25c5b866fba165ec142f92e488468c03a450086e62bec15ae6efb186b9d
  • Opcode Fuzzy Hash: 4074bc572848ecf33a957ca863fe269e3c259f31b9ff4cc9ae4974650c1be0b0
  • Instruction Fuzzy Hash: 5921C370E14188EBCF10DFA4CC45BAD7B74EB05309F10C965E514B7A84E7B4A658DB92
APIs
  • std::_Timevec::_Timevec.LIBCPMTD ref: 6CB9D35E
Strings
Memory Dump Source
  • Source File: 00000003.00000002.1710502824.000000006CB29000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CAD0000, based on PE: true
  • Associated: 00000003.00000002.1710471540.000000006CAD0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CB20000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CBC9000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710634407.000000006CBCC000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710670869.000000006CBF4000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710694621.000000006CBF7000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710716056.000000006CBFA000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_3_2_6cad0000_rundll32.jbxd
Similarity
  • API ID: TimevecTimevec::_std::_
  • String ID: %ls$LC_MIN <= _category && _category <= LC_MAX$_wsetlocale$minkernel\crts\ucrt\src\appcrt\locale\wsetlocale.cpp
  • API String ID: 4219598475-2399076032
  • Opcode ID: e53dd7dff161c978c92fab49831a9376907df10b10a9f7abd7e19026108bf4e5
  • Instruction ID: 674f14f0999f43328ad0a9dfde64a8571c1e04256404f3b01a68ad51ef1b3094
  • Opcode Fuzzy Hash: e53dd7dff161c978c92fab49831a9376907df10b10a9f7abd7e19026108bf4e5
  • Instruction Fuzzy Hash: FF21B0B6C0028CBBDB00DFE0DC45BEF7778AF06719F108965E50567A80E775A648CBA2
APIs
  • FlushFileBuffers.KERNEL32(00000000), ref: 6CBB5A23
  • GetLastError.KERNEL32 ref: 6CBB5A31
Strings
  • ("Invalid file descriptor. File possibly closed by a different thread",0), xrefs: 6CBB5A4F
  • minkernel\crts\ucrt\src\appcrt\lowio\commit.cpp, xrefs: 6CBB5A5D
  • %ls, xrefs: 6CBB5A54
Memory Dump Source
  • Source File: 00000003.00000002.1710502824.000000006CB29000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CAD0000, based on PE: true
  • Associated: 00000003.00000002.1710471540.000000006CAD0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CB20000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CBC9000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710634407.000000006CBCC000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710670869.000000006CBF4000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710694621.000000006CBF7000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710716056.000000006CBFA000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_3_2_6cad0000_rundll32.jbxd
Similarity
  • API ID: BuffersErrorFileFlushLast
  • String ID: %ls$("Invalid file descriptor. File possibly closed by a different thread",0)$minkernel\crts\ucrt\src\appcrt\lowio\commit.cpp
  • API String ID: 1917127615-1268643607
  • Opcode ID: f75a9460bebe6f3571a03c4a135608916aae2f9426dedea21d0eb2c1c645b6df
  • Instruction ID: c0d7cf6a4f6743729c04a154257d46dc6a08268e1cedde50114709773518147b
  • Opcode Fuzzy Hash: f75a9460bebe6f3571a03c4a135608916aae2f9426dedea21d0eb2c1c645b6df
  • Instruction Fuzzy Hash: A0110470A40280AFCB04CB74DC95E6E3379EB0A315F240988F525FBB90EB74ED048796
Strings
Memory Dump Source
  • Source File: 00000003.00000002.1710502824.000000006CB29000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CAD0000, based on PE: true
  • Associated: 00000003.00000002.1710471540.000000006CAD0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CB20000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CBC9000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710634407.000000006CBCC000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710670869.000000006CBF4000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710694621.000000006CBF7000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710716056.000000006CBFA000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_3_2_6cad0000_rundll32.jbxd
Similarity
  • API ID:
  • String ID: %ls$_mbstowcs_l_helper$minkernel\crts\ucrt\src\appcrt\convert\mbstowcs.cpp$s != nullptr
  • API String ID: 0-454128329
  • Opcode ID: 65024372dce95e0ac8c85eb24668fcdff55c33bf1c9522857dce13a1101b6115
  • Instruction ID: 77489ed48f206d76b6f22ece23f27a338b52fd09a3fd84673a52fc4aaa4b2cb5
  • Opcode Fuzzy Hash: 65024372dce95e0ac8c85eb24668fcdff55c33bf1c9522857dce13a1101b6115
  • Instruction Fuzzy Hash: 44C16C70904288EFCB14CF95C898BEDB771FF45318F248259E859ABB90D734AE45CB42
APIs
Strings
  • strncpy_s(*char_result, local_length, local_buffer, local_length - 1), xrefs: 6CBB85CF
  • minkernel\crts\ucrt\src\appcrt\locale\getlocaleinfoa.cpp, xrefs: 6CBB85C5
  • __acrt_GetLocaleInfoA, xrefs: 6CBB85CA
  • minkernel\crts\ucrt\src\appcrt\locale\getlocaleinfoa.cpp, xrefs: 6CBB8570, 6CBB8651, 6CBB8772
Memory Dump Source
  • Source File: 00000003.00000002.1710502824.000000006CB29000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CAD0000, based on PE: true
  • Associated: 00000003.00000002.1710471540.000000006CAD0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CB20000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CBC9000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710634407.000000006CBCC000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710670869.000000006CBF4000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710694621.000000006CBF7000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710716056.000000006CBFA000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_3_2_6cad0000_rundll32.jbxd
Similarity
  • API ID: ErrorLast
  • String ID: __acrt_GetLocaleInfoA$minkernel\crts\ucrt\src\appcrt\locale\getlocaleinfoa.cpp$minkernel\crts\ucrt\src\appcrt\locale\getlocaleinfoa.cpp$strncpy_s(*char_result, local_length, local_buffer, local_length - 1)
  • API String ID: 1452528299-34002772
  • Opcode ID: 75abe06ccd3e4f2d6ab51e044c183d5b5ac6138488d83cac83231616058f1b87
  • Instruction ID: 740fe2a4d101c8bf9f096a001758572932c5685ba9d963ee95b9577d7fc76dba
  • Opcode Fuzzy Hash: 75abe06ccd3e4f2d6ab51e044c183d5b5ac6138488d83cac83231616058f1b87
  • Instruction Fuzzy Hash: 91A125709002999BDB64DF28CC50FAEB3B4AF54318F108699E51DA76C0DB359E89CF61
APIs
  • SetFilePointerEx.KERNEL32(?,00000000,?,?,00000001), ref: 6CBBB216
  • GetLastError.KERNEL32 ref: 6CBBB220
  • SetFilePointerEx.KERNEL32(00000000,00000000,?,00000000,00000000), ref: 6CBBB26D
  • GetLastError.KERNEL32 ref: 6CBBB277
Memory Dump Source
  • Source File: 00000003.00000002.1710502824.000000006CB29000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CAD0000, based on PE: true
  • Associated: 00000003.00000002.1710471540.000000006CAD0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CB20000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CBC9000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710634407.000000006CBCC000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710670869.000000006CBF4000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710694621.000000006CBF7000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710716056.000000006CBFA000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_3_2_6cad0000_rundll32.jbxd
Similarity
  • API ID: ErrorFileLastPointer
  • String ID:
  • API String ID: 2976181284-0
  • Opcode ID: 8e2462ccab13b2fdfbee245613863a50d4136df03e9a94f5a84f9bbf32a5f6dd
  • Instruction ID: 6241fda90041cdf93961b0f55a5509bafa4b6e812e5e692ffc0d4e95a198e579
  • Opcode Fuzzy Hash: 8e2462ccab13b2fdfbee245613863a50d4136df03e9a94f5a84f9bbf32a5f6dd
  • Instruction Fuzzy Hash: A3212FB1E10548ABDB00CFE9CC85BAEBBB8BF49314F108659F528E3290DBB496048B51
APIs
  • _ValidateLocalCookies.LIBCMTD ref: 6CB3450D
  • _ValidateLocalCookies.LIBCMTD ref: 6CB34640
  • _ValidateLocalCookies.LIBCMTD ref: 6CB34693
Strings
Memory Dump Source
  • Source File: 00000003.00000002.1710502824.000000006CB29000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CAD0000, based on PE: true
  • Associated: 00000003.00000002.1710471540.000000006CAD0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CB20000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CBC9000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710634407.000000006CBCC000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710670869.000000006CBF4000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710694621.000000006CBF7000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710716056.000000006CBFA000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_3_2_6cad0000_rundll32.jbxd
Similarity
  • API ID: CookiesLocalValidate
  • String ID: csm
  • API String ID: 2268201637-1018135373
  • Opcode ID: bc1518713084720fe58f237af8a20f6b9a7a944227231d0be631df721becb5f1
  • Instruction ID: 0921d56277df44488e18c6311bc3fea710bf92e67faedb9e26179dde7bb8e6d8
  • Opcode Fuzzy Hash: bc1518713084720fe58f237af8a20f6b9a7a944227231d0be631df721becb5f1
  • Instruction Fuzzy Hash: 35512F74E00259DFCB04CF98D890AEEBBB1FF49318F108199D8296B750D735AA85CFA1
APIs
  • LoadLibraryExW.KERNEL32(6CB47507,00000000,00000800,?,?,6CB47507,00000000), ref: 6CB4764F
  • GetLastError.KERNEL32(?,?,6CB47507), ref: 6CB47663
  • LoadLibraryExW.KERNEL32(6CB47507,00000000,00000000,?,6CB47507), ref: 6CB4768D
Strings
Memory Dump Source
  • Source File: 00000003.00000002.1710502824.000000006CB29000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CAD0000, based on PE: true
  • Associated: 00000003.00000002.1710471540.000000006CAD0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CB20000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CBC9000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710634407.000000006CBCC000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710670869.000000006CBF4000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710694621.000000006CBF7000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710716056.000000006CBFA000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_3_2_6cad0000_rundll32.jbxd
Similarity
  • API ID: LibraryLoad$ErrorLast
  • String ID: api-ms-
  • API String ID: 3177248105-2084034818
  • Opcode ID: edc804e12e423edc51f4dcae33237915c8c252f0cf268a075deccf6d1d57d390
  • Instruction ID: 34fc7c3735958b4dd3f1e9c5b939135eae07e5e1be9d576911eb5d43d988df16
  • Opcode Fuzzy Hash: edc804e12e423edc51f4dcae33237915c8c252f0cf268a075deccf6d1d57d390
  • Instruction Fuzzy Hash: 90F05EB4A58244FBDB008FB8DC49B9E3B7AAB01704F108554F919BB6C4D6F5EA00DB95
APIs
  • WriteConsoleW.KERNEL32(?,?,?,00000000), ref: 6CBC05D0
  • GetLastError.KERNEL32 ref: 6CBC05DC
  • ___initconout.LIBCMT ref: 6CBC05EC
    • Part of subcall function 6CBC066A: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,6CBC05F1), ref: 6CBC067D
  • WriteConsoleW.KERNEL32(?,?,?,00000000), ref: 6CBC0600
Memory Dump Source
  • Source File: 00000003.00000002.1710502824.000000006CB29000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CAD0000, based on PE: true
  • Associated: 00000003.00000002.1710471540.000000006CAD0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CB20000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CBC9000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710634407.000000006CBCC000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710670869.000000006CBF4000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710694621.000000006CBF7000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710716056.000000006CBFA000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_3_2_6cad0000_rundll32.jbxd
Similarity
  • API ID: ConsoleWrite$CreateErrorFileLast___initconout
  • String ID:
  • API String ID: 3431868840-0
  • Opcode ID: f173b4fb0a70f5357944862188271ceb4d11fc5af31fa10e1b1573298a4c76c0
  • Instruction ID: 7b7b8e82bb0aa8a0b9f861f3fc0bced1b3c3d00d6a0a4199a47c8ce0b04fa37e
  • Opcode Fuzzy Hash: f173b4fb0a70f5357944862188271ceb4d11fc5af31fa10e1b1573298a4c76c0
  • Instruction Fuzzy Hash: A1F05E36200140ABCB221F9AEC04D467BBAEFCA3157140465F6AAD3B20CB7194209F25
APIs
  • WriteConsoleW.KERNEL32(?,?,?,00000000), ref: 6CBC06E9
  • GetLastError.KERNEL32 ref: 6CBC06F5
  • ___initconout.LIBCMT ref: 6CBC0705
    • Part of subcall function 6CBC066A: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,6CBC05F1), ref: 6CBC067D
  • WriteConsoleW.KERNEL32(?,?,?,00000000), ref: 6CBC071A
Memory Dump Source
  • Source File: 00000003.00000002.1710502824.000000006CB29000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CAD0000, based on PE: true
  • Associated: 00000003.00000002.1710471540.000000006CAD0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CB20000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CBC9000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710634407.000000006CBCC000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710670869.000000006CBF4000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710694621.000000006CBF7000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710716056.000000006CBFA000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_3_2_6cad0000_rundll32.jbxd
Similarity
  • API ID: ConsoleWrite$CreateErrorFileLast___initconout
  • String ID:
  • API String ID: 3431868840-0
  • Opcode ID: 121d6b1bc265db21275dde2ceff1cd703208be7f30de7ceb0a1a8bfa67b5a5c8
  • Instruction ID: 97d4fcc0e3b9d58c3881ebbc5143c9d9af358d9f4defe14f99e5d46e9d6ecd76
  • Opcode Fuzzy Hash: 121d6b1bc265db21275dde2ceff1cd703208be7f30de7ceb0a1a8bfa67b5a5c8
  • Instruction Fuzzy Hash: E9F09836604194BBCF121FA5AC0498A3E7AFF4A3A5B044555FA29A6620CB72D8309F95
APIs
  • SetConsoleCtrlHandler.KERNEL32(Function_000BDA80,00000001), ref: 6CB8E4B7
Strings
  • minkernel\crts\ucrt\src\appcrt\misc\signal.cpp, xrefs: 6CB8E5A6
Memory Dump Source
  • Source File: 00000003.00000002.1710502824.000000006CB29000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CAD0000, based on PE: true
  • Associated: 00000003.00000002.1710471540.000000006CAD0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CB20000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CBC9000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710634407.000000006CBCC000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710670869.000000006CBF4000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710694621.000000006CBF7000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710716056.000000006CBFA000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_3_2_6cad0000_rundll32.jbxd
Similarity
  • API ID: ConsoleCtrlHandler
  • String ID: minkernel\crts\ucrt\src\appcrt\misc\signal.cpp
  • API String ID: 1513847179-3244217075
  • Opcode ID: f820739d0972f25db84b34acabd4d52412369ce140bfe89e22045ea86f29a6b8
  • Instruction ID: 6898b6968ca002c4e9bd484b90b0570d031c2c8984d3ce741aaad5ebe44e5b05
  • Opcode Fuzzy Hash: f820739d0972f25db84b34acabd4d52412369ce140bfe89e22045ea86f29a6b8
  • Instruction Fuzzy Hash: 447161B9A062C8EFDB00CF64D880EDD77B5EB49318F148529E8196BB50D735D944CFA2
Strings
Memory Dump Source
  • Source File: 00000003.00000002.1710502824.000000006CB29000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CAD0000, based on PE: true
  • Associated: 00000003.00000002.1710471540.000000006CAD0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CB20000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CBC9000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710634407.000000006CBCC000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710670869.000000006CBF4000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710694621.000000006CBF7000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710716056.000000006CBFA000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_3_2_6cad0000_rundll32.jbxd
Similarity
  • API ID:
  • String ID: MOC$RCC
  • API String ID: 0-2084237596
  • Opcode ID: b2dc3ac64752cbd06419b0413ee9f0bf834f750fe9aca944e03664c59c7f7e1e
  • Instruction ID: 6182ae98d60e6659b90d9f88d2e6c7c1521d568ebe7e9da64d003570215652d0
  • Opcode Fuzzy Hash: b2dc3ac64752cbd06419b0413ee9f0bf834f750fe9aca944e03664c59c7f7e1e
  • Instruction Fuzzy Hash: 27516E71A00159EBCB04CF94C990EEE73B9FF58348F148258E919E7690DB35EE05CBA2
APIs
  • GetEnvironmentStringsW.KERNEL32(?,?,?,?,?,6CB4DFE4,?,?,6CB4DF74,6CB4E98A), ref: 6CB94FA0
  • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 6CB9501C
Strings
  • minkernel\crts\ucrt\src\desktopcrt\env\get_environment_from_os.cpp, xrefs: 6CB94FD3
Memory Dump Source
  • Source File: 00000003.00000002.1710502824.000000006CB29000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CAD0000, based on PE: true
  • Associated: 00000003.00000002.1710471540.000000006CAD0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CB20000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CBC9000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710634407.000000006CBCC000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710670869.000000006CBF4000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710694621.000000006CBF7000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710716056.000000006CBFA000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_3_2_6cad0000_rundll32.jbxd
Similarity
  • API ID: EnvironmentStrings$Free
  • String ID: minkernel\crts\ucrt\src\desktopcrt\env\get_environment_from_os.cpp
  • API String ID: 3328510275-170101930
  • Opcode ID: 81960b785f960524ed4c45bcfe28af156be12e874f731bfac1e60eb5d9cac723
  • Instruction ID: b46bf312d0c6ae13f2ba70a3b47c523aebe732cf98493a23efac78d44cd87dac
  • Opcode Fuzzy Hash: 81960b785f960524ed4c45bcfe28af156be12e874f731bfac1e60eb5d9cac723
  • Instruction Fuzzy Hash: 1E014962A816D13BB72105B60C8DEBF386CCBCBB99B100234F919D7640FA69CD05C1F2
APIs
  • std::_Timevec::_Timevec.LIBCPMTD ref: 6CB9CEC6
  • std::_Timevec::_Timevec.LIBCPMTD ref: 6CB9CEDD
Strings
  • minkernel\crts\ucrt\src\appcrt\locale\wsetlocale.cpp, xrefs: 6CB9CE55
Memory Dump Source
  • Source File: 00000003.00000002.1710502824.000000006CB29000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CAD0000, based on PE: true
  • Associated: 00000003.00000002.1710471540.000000006CAD0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CB20000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CBC9000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710634407.000000006CBCC000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710670869.000000006CBF4000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710694621.000000006CBF7000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710716056.000000006CBFA000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_3_2_6cad0000_rundll32.jbxd
Similarity
  • API ID: TimevecTimevec::_std::_
  • String ID: minkernel\crts\ucrt\src\appcrt\locale\wsetlocale.cpp
  • API String ID: 4219598475-2192260110
  • Opcode ID: 8cf4ae352c53333cd403a35e20be3756181e3f601651ff45f4bc113308b24417
  • Instruction ID: 5488e29ed4c9ad7c6e8f4b6890e1b5ed3bef5702fe1235fa60c283bb57eefc68
  • Opcode Fuzzy Hash: 8cf4ae352c53333cd403a35e20be3756181e3f601651ff45f4bc113308b24417
  • Instruction Fuzzy Hash: F5216075950188ABCB04EF94C956AFEB374AF11708F1040A5990AA7790EF356F0DCB51
APIs
  • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,00000000,?,6CB48230,?), ref: 6CB48436
Strings
Memory Dump Source
  • Source File: 00000003.00000002.1710502824.000000006CB29000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CAD0000, based on PE: true
  • Associated: 00000003.00000002.1710471540.000000006CAD0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CB20000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CBC9000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710634407.000000006CBCC000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710670869.000000006CBF4000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710694621.000000006CBF7000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710716056.000000006CBFA000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_3_2_6cad0000_rundll32.jbxd
Similarity
  • API ID: HandleModule
  • String ID: CorExitProcess$mscoree.dll
  • API String ID: 4139908857-1276376045
  • Opcode ID: 767ebd5f286004f6541b8f1aa58620bbc4daf14b89017b7b647f9f9a052a39d5
  • Instruction ID: 06975a1870112f603e7f36e8dff7e39e76df3804c0f9140a81c49bfe6ffe0c01
  • Opcode Fuzzy Hash: 767ebd5f286004f6541b8f1aa58620bbc4daf14b89017b7b647f9f9a052a39d5
  • Instruction Fuzzy Hash: A0012C30D0418CFBCB04EFA4D859AEDB739AF10318F5480A5E40AB3A50DB395F08DB92
APIs
  • GetEnvironmentStringsW.KERNEL32(?,?,6CB4E04E,?,?,6CB4DFAB,6CB4E9A3), ref: 6CB95051
  • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 6CB9509E
Strings
  • minkernel\crts\ucrt\src\desktopcrt\env\get_environment_from_os.cpp, xrefs: 6CB9506C
Memory Dump Source
  • Source File: 00000003.00000002.1710502824.000000006CB29000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CAD0000, based on PE: true
  • Associated: 00000003.00000002.1710471540.000000006CAD0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CB20000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710502824.000000006CBC9000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710634407.000000006CBCC000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710670869.000000006CBF4000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710694621.000000006CBF7000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000003.00000002.1710716056.000000006CBFA000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_3_2_6cad0000_rundll32.jbxd
Similarity
  • API ID: EnvironmentStrings$Free
  • String ID: minkernel\crts\ucrt\src\desktopcrt\env\get_environment_from_os.cpp
  • API String ID: 3328510275-170101930
  • Opcode ID: 70ad741f90aa52e83045b4c03a88355632d144414e61788309de31959b927de0
  • Instruction ID: 1a72d66a0fa2e527beca93c89200aeb611cad167388ad838fa5f7bb89712cbf4
  • Opcode Fuzzy Hash: 70ad741f90aa52e83045b4c03a88355632d144414e61788309de31959b927de0
  • Instruction Fuzzy Hash: 12F02E126C465136E22211352C8DFEF155DCBC6B75F150320F52DA6B81AF584D0940E3