Edit tour

Windows Analysis Report
ForkieByKKosty4ka.exe

Overview

General Information

Sample name:ForkieByKKosty4ka.exe
Analysis ID:1670048
MD5:94ea622991260a77c641a89b0fdda267
SHA1:9193d2daf9efa2865a36155533603ca8b95c2be9
SHA256:284c8b2f5b187d6b221d60da2fe055cd3a0f083546cea9b122f4327eef477ed1
Tags:exeuser-FelloBoiYuuka
Infos:

Detection

Score:60
Range:0 - 100
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Contains functionality to access PhysicalDrive, possible boot sector overwrite
Contains functionality to infect the boot sector
Protects its processes via BreakOnTermination flag
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to dynamically determine API calls
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Enables debug privileges
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
PE file contains sections with non-standard names
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • ForkieByKKosty4ka.exe (PID: 6612 cmdline: "C:\Users\user\Desktop\ForkieByKKosty4ka.exe" MD5: 94EA622991260A77C641A89B0FDDA267)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: ForkieByKKosty4ka.exeVirustotal: Detection: 8%Perma Link
Source: ForkieByKKosty4ka.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: ForkieByKKosty4ka.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: \source\repos\Forkie\Debug\Forkie.pdb source: ForkieByKKosty4ka.exe
Source: C:\Users\user\Desktop\ForkieByKKosty4ka.exeCode function: 2_2_00AD92D0 FindFirstFileExW,FindNextFileW,2_2_00AD92D0
Source: C:\Users\user\Desktop\ForkieByKKosty4ka.exeCode function: 2_2_00A6EA81 FindFirstFileExW,2_2_00A6EA81
Source: C:\Users\user\Desktop\ForkieByKKosty4ka.exeCode function: 2_2_00AD9730 FindFirstFileExW,FindNextFileW,2_2_00AD9730

Operating System Destruction

barindex
Source: C:\Users\user\Desktop\ForkieByKKosty4ka.exeCode function: 2_2_00A73700 CreateFileA on filename \\.\PhysicalDrive02_2_00A73700
Source: C:\Users\user\Desktop\ForkieByKKosty4ka.exeProcess information set: 01 00 00 00 Jump to behavior
Source: C:\Users\user\Desktop\ForkieByKKosty4ka.exeCode function: 2_2_00AF68802_2_00AF6880
Source: C:\Users\user\Desktop\ForkieByKKosty4ka.exeCode function: String function: 00AE66C0 appears 34 times
Source: C:\Users\user\Desktop\ForkieByKKosty4ka.exeCode function: String function: 00A6EA63 appears 103 times
Source: C:\Users\user\Desktop\ForkieByKKosty4ka.exeCode function: String function: 00A701AB appears 422 times
Source: C:\Users\user\Desktop\ForkieByKKosty4ka.exeCode function: String function: 00A6DA05 appears 513 times
Source: ForkieByKKosty4ka.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: mal60.evad.winEXE@1/0@0/0
Source: C:\Users\user\Desktop\ForkieByKKosty4ka.exeCode function: 2_2_00A73930 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,CloseHandle,AdjustTokenPrivileges,CloseHandle,2_2_00A73930
Source: C:\Users\user\Desktop\ForkieByKKosty4ka.exeCode function: 2_2_00A6DA19 AdjustTokenPrivileges,2_2_00A6DA19
Source: C:\Users\user\Desktop\ForkieByKKosty4ka.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: ForkieByKKosty4ka.exeVirustotal: Detection: 8%
Source: C:\Users\user\Desktop\ForkieByKKosty4ka.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\ForkieByKKosty4ka.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\ForkieByKKosty4ka.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\ForkieByKKosty4ka.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\ForkieByKKosty4ka.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\ForkieByKKosty4ka.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\ForkieByKKosty4ka.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\ForkieByKKosty4ka.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\ForkieByKKosty4ka.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\ForkieByKKosty4ka.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\ForkieByKKosty4ka.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\ForkieByKKosty4ka.exeSection loaded: mspdb140.dllJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: ForkieByKKosty4ka.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: ForkieByKKosty4ka.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: ForkieByKKosty4ka.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: ForkieByKKosty4ka.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: ForkieByKKosty4ka.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: ForkieByKKosty4ka.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: ForkieByKKosty4ka.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: ForkieByKKosty4ka.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: \source\repos\Forkie\Debug\Forkie.pdb source: ForkieByKKosty4ka.exe
Source: C:\Users\user\Desktop\ForkieByKKosty4ka.exeCode function: 2_2_00A73BE0 MessageBoxA,MessageBoxA,ExitProcess,LoadLibraryA,GetProcAddress,RtlSetProcessIsCritical,CreateThread,2_2_00A73BE0
Source: ForkieByKKosty4ka.exeStatic PE information: section name: .textbss
Source: ForkieByKKosty4ka.exeStatic PE information: section name: .msvcjmc
Source: ForkieByKKosty4ka.exeStatic PE information: section name: .00cfg
Source: C:\Users\user\Desktop\ForkieByKKosty4ka.exeCode function: 2_2_00A6D0A0 push ecx; ret 2_2_00B09E76

Persistence and Installation Behavior

barindex
Source: C:\Users\user\Desktop\ForkieByKKosty4ka.exeCode function: CreateFileA,SetFilePointer,ReadFile,SetFilePointerEx,WriteFile, \\.\PhysicalDrive02_2_00A73700

Boot Survival

barindex
Source: C:\Users\user\Desktop\ForkieByKKosty4ka.exeCode function: CreateFileA,SetFilePointer,ReadFile,SetFilePointerEx,WriteFile, \\.\PhysicalDrive02_2_00A73700
Source: C:\Users\user\Desktop\ForkieByKKosty4ka.exeAPI coverage: 6.9 %
Source: C:\Users\user\Desktop\ForkieByKKosty4ka.exeCode function: 2_2_00AD92D0 FindFirstFileExW,FindNextFileW,2_2_00AD92D0
Source: C:\Users\user\Desktop\ForkieByKKosty4ka.exeCode function: 2_2_00A6EA81 FindFirstFileExW,2_2_00A6EA81
Source: C:\Users\user\Desktop\ForkieByKKosty4ka.exeCode function: 2_2_00AD9730 FindFirstFileExW,FindNextFileW,2_2_00AD9730
Source: C:\Users\user\Desktop\ForkieByKKosty4ka.exeCode function: 2_2_00ACC080 GetSystemInfo,2_2_00ACC080
Source: C:\Users\user\Desktop\ForkieByKKosty4ka.exeAPI call chain: ExitProcess graph end nodegraph_2-53887
Source: C:\Users\user\Desktop\ForkieByKKosty4ka.exeCode function: 2_2_00A74950 MultiByteToWideChar,MultiByteToWideChar,DebuggerProbe,DebuggerRuntime,IsDebuggerPresent,WideCharToMultiByte,WideCharToMultiByte,2_2_00A74950
Source: C:\Users\user\Desktop\ForkieByKKosty4ka.exeCode function: 2_2_00AD2AC0 OutputDebugStringW,OutputDebugStringW,OutputDebugStringW,OutputDebugStringW,OutputDebugStringW,GetFileType,WriteConsoleW,GetLastError,WriteFile,WriteFile,OutputDebugStringW,2_2_00AD2AC0
Source: C:\Users\user\Desktop\ForkieByKKosty4ka.exeCode function: 2_2_00A73BE0 MessageBoxA,MessageBoxA,ExitProcess,LoadLibraryA,GetProcAddress,RtlSetProcessIsCritical,CreateThread,2_2_00A73BE0
Source: C:\Users\user\Desktop\ForkieByKKosty4ka.exeCode function: 2_2_00A916C0 mov eax, dword ptr fs:[00000030h]2_2_00A916C0
Source: C:\Users\user\Desktop\ForkieByKKosty4ka.exeCode function: 2_2_00ADDEE0 mov ecx, dword ptr fs:[00000030h]2_2_00ADDEE0
Source: C:\Users\user\Desktop\ForkieByKKosty4ka.exeCode function: 2_2_00ADDE10 mov ecx, dword ptr fs:[00000030h]2_2_00ADDE10
Source: C:\Users\user\Desktop\ForkieByKKosty4ka.exeCode function: 2_2_00ADDFB0 mov ecx, dword ptr fs:[00000030h]2_2_00ADDFB0
Source: C:\Users\user\Desktop\ForkieByKKosty4ka.exeCode function: 2_2_00ADE080 mov ecx, dword ptr fs:[00000030h]2_2_00ADE080
Source: C:\Users\user\Desktop\ForkieByKKosty4ka.exeCode function: 2_2_00A767E0 VirtualQuery,GetPdbDll,GetProcAddress,GetProcessHeap,HeapFree,GetProcessHeap,HeapAlloc,2_2_00A767E0
Source: C:\Users\user\Desktop\ForkieByKKosty4ka.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\ForkieByKKosty4ka.exeCode function: 2_2_00A74DD0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_00A74DD0
Source: C:\Users\user\Desktop\ForkieByKKosty4ka.exeCode function: 2_2_00A6E1D0 SetUnhandledExceptionFilter,2_2_00A6E1D0
Source: C:\Users\user\Desktop\ForkieByKKosty4ka.exeCode function: 2_2_00AD18A0 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00AD18A0
Source: C:\Users\user\Desktop\ForkieByKKosty4ka.exeCode function: 2_2_00A75DA0 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00A75DA0
Source: C:\Users\user\Desktop\ForkieByKKosty4ka.exeCode function: 2_2_00A76050 SetUnhandledExceptionFilter,2_2_00A76050
Source: C:\Users\user\Desktop\ForkieByKKosty4ka.exeCode function: GetLocaleInfoW,2_2_00AE48A0
Source: C:\Users\user\Desktop\ForkieByKKosty4ka.exeCode function: EnumSystemLocalesW,2_2_00AE4A30
Source: C:\Users\user\Desktop\ForkieByKKosty4ka.exeCode function: EnumSystemLocalesW,2_2_00AE4B00
Source: C:\Users\user\Desktop\ForkieByKKosty4ka.exeCode function: EnumSystemLocalesW,2_2_00AE4C20
Source: C:\Users\user\Desktop\ForkieByKKosty4ka.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,2_2_00AE4D70
Source: C:\Users\user\Desktop\ForkieByKKosty4ka.exeCode function: EnumSystemLocalesW,2_2_00A6E58B
Source: C:\Users\user\Desktop\ForkieByKKosty4ka.exeCode function: GetLocaleInfoW,2_2_00A6D1F4
Source: C:\Users\user\Desktop\ForkieByKKosty4ka.exeCode function: GetLocaleInfoW,2_2_00AE5330
Source: C:\Users\user\Desktop\ForkieByKKosty4ka.exeCode function: GetLocaleInfoW,GetACP,GetLocaleInfoW,2_2_00AE5630
Source: C:\Users\user\Desktop\ForkieByKKosty4ka.exeCode function: GetLocaleInfoW,2_2_00AE5770
Source: C:\Users\user\Desktop\ForkieByKKosty4ka.exeCode function: IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,2_2_00AE58C0
Source: C:\Users\user\Desktop\ForkieByKKosty4ka.exeCode function: EnumSystemLocalesW,2_2_00AE5F80
Source: C:\Users\user\Desktop\ForkieByKKosty4ka.exeCode function: GetLocaleInfoW,2_2_00AE6F40
Source: C:\Users\user\Desktop\ForkieByKKosty4ka.exeCode function: 2_2_00A6E90F GetSystemTimeAsFileTime,2_2_00A6E90F
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Native API
2
Bootkit
1
Access Token Manipulation
2
Bootkit
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
DLL Side-Loading
1
DLL Side-Loading
1
Access Token Manipulation
LSASS Memory3
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Deobfuscate/Decode Files or Information
Security Account Manager1
File and Directory Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDS13
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
Obfuscated Files or Information
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1670048 Sample: ForkieByKKosty4ka.exe Startdate: 21/04/2025 Architecture: WINDOWS Score: 60 8 Multi AV Scanner detection for submitted file 2->8 5 ForkieByKKosty4ka.exe 2->5         started        process3 signatures4 10 Protects its processes via BreakOnTermination flag 5->10 12 Contains functionality to access PhysicalDrive, possible boot sector overwrite 5->12 14 Contains functionality to infect the boot sector 5->14

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
ForkieByKKosty4ka.exe8%VirustotalBrowse
ForkieByKKosty4ka.exe4%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox version:42.0.0 Malachite
Analysis ID:1670048
Start date and time:2025-04-21 04:12:14 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 53s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:8
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Critical Process Termination
Sample name:ForkieByKKosty4ka.exe
Detection:MAL
Classification:mal60.evad.winEXE@1/0@0/0
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 12
  • Number of non-executed functions: 74
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): dllhost.exe, SIHClient.exe, SgrmBroker.exe, svchost.exe
  • Excluded IPs from analysis (whitelisted): 184.29.183.29, 20.109.210.53
  • Excluded domains from analysis (whitelisted): fs.microsoft.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, prod.fs.microsoft.com.akadns.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, e16604.dscf.akamaiedge.net, c.pki.goog, dns.msftncsi.com, fe3cr.delivery.mp.microsoft.com
No simulations
No context
No context
No context
No context
No context
No created / dropped files found
File type:PE32 executable (GUI) Intel 80386, for MS Windows
Entropy (8bit):5.488603955904169
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.96%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:ForkieByKKosty4ka.exe
File size:972'288 bytes
MD5:94ea622991260a77c641a89b0fdda267
SHA1:9193d2daf9efa2865a36155533603ca8b95c2be9
SHA256:284c8b2f5b187d6b221d60da2fe055cd3a0f083546cea9b122f4327eef477ed1
SHA512:f6ad1ce37e917b3cb03800a13ca52ac691affe2ef4d558fd161406707dc86c9f7630038e8dc589f94bdecf97ac47d62a1ec1ed3cc5c360cff880e9505b3127df
SSDEEP:12288:DoSQzU9QWLWiiOuuXAu42Acd/oNTpRJ/PLDscuHcqS8n8:8pU9QWMumcd/oNTpTnLwZJn8
TLSH:EB25D502A7A43C54F8B626F957BF63E89B2DF8E01314D0CB51C01AED962DAE17C31796
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......k.../.../.../...;..."...;.......;...=...............>.......<...;...(.../...q.............L...../.$.............Rich/..........
Icon Hash:17170f6d2b2d2d13
Entrypoint:0x44ffdf
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Time Stamp:0x6039F43A [Sat Feb 27 07:26:50 2021 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:6
OS Version Minor:0
File Version Major:6
File Version Minor:0
Subsystem Version Major:6
Subsystem Version Minor:0
Import Hash:c3cb5b63856746e4235505d18ac02137
Instruction
jmp 00007FD3508FB651h
jmp 00007FD35092F8FCh
jmp 00007FD350934C57h
jmp 00007FD35097B392h
jmp 00007FD35096532Dh
jmp 00007FD3508FC398h
jmp 00007FD35090E913h
jmp 00007FD35094822Eh
jmp 00007FD35098CCB9h
jmp 00007FD3508FF824h
jmp 00007FD350978FFFh
jmp 00007FD350957C5Ah
jmp 00007FD350969BE5h
jmp 00007FD35090C800h
jmp 00007FD35099032Dh
jmp 00007FD350923E56h
jmp 00007FD350962D71h
jmp 00007FD350951E8Ch
jmp 00007FD35097B247h
jmp 00007FD35092D012h
jmp 00007FD35090464Dh
jmp 00007FD3508FADE6h
jmp 00007FD35094F603h
jmp 00007FD350906D6Eh
jmp 00007FD3509903F1h
jmp 00007FD35094BF04h
jmp 00007FD35092865Fh
jmp 00007FD3509077FAh
jmp 00007FD3508FFAA5h
jmp 00007FD3509558C0h
jmp 00007FD35092D0CBh
jmp 00007FD35098CB6Bh
jmp 00007FD350985801h
jmp 00007FD3509352DCh
jmp 00007FD35095DF07h
jmp 00007FD350961322h
jmp 00007FD35092930Dh
jmp 00007FD35096E358h
jmp 00007FD35092BDE3h
jmp 00007FD3508FD06Eh
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x11a2400x50.idata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x11d0000x1bdd3.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x1390000x4b10.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x1147f00x38.rdata
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x1148280x40.rdata
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x11a0000x240.idata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.textbss0x10000x4be950x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.text0x4d0000xa39970xa3a00a734d6070b2f2aa730251fa96f1c02d5False0.27788686497326204data5.454126167322379IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0xf10000x25a6a0x25c00da83f385f6ea407808982bafffe84705False0.17560663286423842data3.428532913864218IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x1170000x25b00x1000f8fe2ceaa14e754a052a9468d800a37aFalse0.123291015625data1.770321824723131IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.idata0x11a0000xd780xe007bf0bbd61d6d83007d7aea3f65b7a08fFalse0.3482142857142857data4.551611089189057IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.msvcjmc0x11b0000x1160x2001a9d52a62a070d7f046386b7c4039a8eFalse0.03125Targa image data - Map (257-257) 257 x 257 x 1 +257 +257 - 1-bit alpha "\001"0.2288780584184795IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.00cfg0x11c0000x1090x20011a8d5e1e06af3a6d0c38f68ccbf53a7False0.03515625data0.11055713125913882IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.rsrc0x11d0000x1bdd30x1be00432fcbc05562f115e27dbd1bd78809d9False0.099679442264574data3.6099294776359274IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x1390000x5a2f0x5c00d987c05411d734a182c1af845b223cc3False0.6224949048913043data6.014243707282866IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_ICON0x11d7800x115aPNG image data, 256 x 256, 8-bit colormap, non-interlacedRussianRussia0.33340837460603334
RT_ICON0x11e8e00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsRussianRussia0.09408315565031983
RT_ICON0x11f7880x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsRussianRussia0.11507220216606498
RT_ICON0x1200300x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsRussianRussia0.12427745664739884
RT_ICON0x1205980x90bPNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedRussianRussia0.791792656587473
RT_ICON0x120ea80x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896RussianRussia0.03235710911667454
RT_ICON0x1250d00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600RussianRussia0.04595435684647303
RT_ICON0x1276780x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224RussianRussia0.075046904315197
RT_ICON0x1287200x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088RussianRussia0.15070921985815602
RT_ICON0x128c100x115aPNG image data, 256 x 256, 8-bit colormap, non-interlacedRussianRussia0.33340837460603334
RT_ICON0x129d700xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsRussianRussia0.09408315565031983
RT_ICON0x12ac180x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsRussianRussia0.11507220216606498
RT_ICON0x12b4c00x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsRussianRussia0.12427745664739884
RT_ICON0x12ba280x90bPNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedRussianRussia0.791792656587473
RT_ICON0x12c3380x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896RussianRussia0.03235710911667454
RT_ICON0x1305600x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600RussianRussia0.04595435684647303
RT_ICON0x132b080x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224RussianRussia0.075046904315197
RT_ICON0x133bb00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088RussianRussia0.15070921985815602
RT_MENU0x1340a00x5cdataRussianRussia0.8913043478260869
RT_DIALOG0x1341100x120dataRussianRussia0.6180555555555556
RT_STRING0x1342300x38dataRussianRussia0.6607142857142857
RT_ACCELERATOR0x1341000x10dataRussianRussia1.25
RT_GROUP_ICON0x128b880x84dataRussianRussia0.6590909090909091
RT_GROUP_ICON0x1340180x84dataRussianRussia0.6515151515151515
RT_MANIFEST0x1342680x184XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5979381443298969
DLLImport
KERNEL32.dllWriteFile, CloseHandle, Sleep, GetCurrentProcess, ExitProcess, SetFilePointerEx, GetProcAddress, LoadLibraryA, ReadConsoleW, DecodePointer, FlushFileBuffers, GetConsoleMode, SetFilePointer, ReadFile, CreateThread, CreateFileA, GetCurrentThreadId, IsDebuggerPresent, RaiseException, MultiByteToWideChar, WideCharToMultiByte, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TerminateProcess, IsProcessorFeaturePresent, QueryPerformanceCounter, GetCurrentProcessId, GetSystemTimeAsFileTime, InitializeSListHead, GetStartupInfoW, GetModuleHandleW, GetLastError, HeapAlloc, HeapFree, GetProcessHeap, VirtualQuery, FreeLibrary, InterlockedPushEntrySList, InterlockedFlushSList, GetModuleFileNameW, LoadLibraryExW, RtlUnwind, SetLastError, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, EncodePointer, GetModuleHandleExW, GetStdHandle, HeapValidate, GetSystemInfo, GetFileType, OutputDebugStringW, WriteConsoleW, SetConsoleCtrlHandler, GetCurrentThread, FindClose, FindFirstFileExW, FindNextFileW, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableW, SetStdHandle, GetStringTypeW, GetLocaleInfoW, IsValidLocale, GetUserDefaultLCID, EnumSystemLocalesW, GetDateFormatW, GetTimeFormatW, CompareStringW, LCMapStringW, HeapReAlloc, HeapSize, HeapQueryInformation, GetFileSizeEx, GetConsoleOutputCP, CreateFileW
USER32.dllMessageBoxA, MessageBoxW
ADVAPI32.dllAdjustTokenPrivileges, OpenProcessToken, LookupPrivilegeValueA
Language of compilation systemCountry where language is spokenMap
RussianRussia
EnglishUnited States
No network behavior found
05101520s020406080100

Click to jump to process

05101520s0.00510MB

Click to jump to process

Target ID:2
Start time:22:13:17
Start date:20/04/2025
Path:C:\Users\user\Desktop\ForkieByKKosty4ka.exe
Wow64 process (32bit):true
Commandline:"C:\Users\user\Desktop\ForkieByKKosty4ka.exe"
Imagebase:0xa20000
File size:972'288 bytes
MD5 hash:94EA622991260A77C641A89B0FDDA267
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true
There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

Execution Graph

Execution Coverage

Dynamic/Packed Code Coverage

Signature Coverage

Execution Coverage:0.7%
Dynamic/Decrypted Code Coverage:0%
Signature Coverage:55.8%
Total number of Nodes:129
Total number of Limit Nodes:14
Show Legend
Hide Nodes/Edges
execution_graph 53883 a73be0 53884 a6efb8 53883->53884 53885 a73c08 MessageBoxA 53884->53885 53886 a73c28 53885->53886 53887 a73c52 ExitProcess 53886->53887 53888 a73c2d MessageBoxA 53886->53888 53889 a73c4d 53888->53889 53889->53887 53890 a73c63 53889->53890 53891 a73c6d LoadLibraryA 53890->53891 53892 a6f071 53891->53892 53893 a73c84 GetProcAddress 53892->53893 53894 a6f071 53893->53894 53895 a73c9f RtlSetProcessIsCritical 53894->53895 53896 a6f071 53895->53896 53897 a73cb4 CreateThread 53896->53897 53898 a73cd2 53897->53898 53899 a767e0 VirtualQuery 53900 a76b57 53899->53900 53901 a76813 53899->53901 53901->53900 53902 a768bb GetProcAddress 53901->53902 53911 a76250 53901->53911 53902->53900 53906 a768df 53902->53906 53905 a768ae 53905->53900 53905->53902 53906->53900 53907 a76a39 53906->53907 53909 a76aa1 GetProcessHeap HeapAlloc 53906->53909 53910 a76a27 GetProcessHeap HeapFree 53906->53910 53909->53907 53909->53910 53910->53907 53912 a76270 53911->53912 53914 a76330 GetPdbDllPathFromFilePath 53911->53914 53919 a763e0 53912->53919 53914->53905 53915 a762f6 53915->53914 53916 a76325 GetLastError 53915->53916 53916->53914 53917 a7627c GetPdbDllPathFromFilePath 53917->53914 53917->53915 53918 a762eb GetLastError 53917->53918 53918->53915 53922 a76407 53919->53922 53920 a76449 GetProcAddress 53921 a7645b GetProcAddress 53920->53921 53924 a764ad 53920->53924 53923 a7646d GetProcAddress 53921->53923 53921->53924 53922->53920 53925 a76429 GetLastError 53922->53925 53923->53924 53926 a76483 RegOpenKeyExW 53923->53926 53924->53917 53925->53924 53927 a76434 53925->53927 53929 a764a6 FreeLibrary 53926->53929 53930 a764c0 FreeLibrary 53926->53930 53927->53920 53927->53924 53929->53924 53930->53924 53932 a76519 53930->53932 53932->53924 53933 a76604 GetLastError 53932->53933 53933->53924 53964 a73930 53965 a73962 53964->53965 53966 a7396f GetCurrentProcess 53965->53966 53967 a6f071 53966->53967 53968 a73989 OpenProcessToken 53967->53968 53969 a73997 53968->53969 53970 a739a2 LookupPrivilegeValueA 53969->53970 53977 a7399b 53969->53977 53971 a739bb 53970->53971 53972 a739d6 AdjustTokenPrivileges 53971->53972 53973 a739bf CloseHandle 53971->53973 53975 a6f071 53972->53975 53974 a739d2 53973->53974 53974->53977 53976 a73a22 CloseHandle 53975->53976 53976->53974 53978 a78330 LoadLibraryExW 53979 a74570 53982 a741e0 53979->53982 53981 a74578 53983 a6f76f 53982->53983 53984 a741e8 __scrt_common_main_seh 53983->53984 53984->53981 53985 a74750 53986 a7477e 53985->53986 53987 a7475b 53985->53987 53989 a74950 failwithmessage 6 API calls 53986->53989 53988 a74799 53987->53988 53992 a74950 53987->53992 53989->53988 53991 a74779 53994 a7498b 53992->53994 53993 a749a3 MultiByteToWideChar 53995 a749e0 53993->53995 53996 a749be MultiByteToWideChar 53993->53996 53994->53993 54007 a74580 53995->54007 53996->53995 54000 a74a0b 54001 a74a2f IsDebuggerPresent 54000->54001 54002 a74a3d 54000->54002 54004 a74a6c 54000->54004 54001->54002 54001->54004 54003 a74a9e WideCharToMultiByte 54002->54003 54002->54004 54005 a74ad3 WideCharToMultiByte 54003->54005 54006 a74acd 54003->54006 54004->53991 54005->54004 54006->54005 54011 a74bd0 KiUserExceptionDispatcher 54007->54011 54010 a745d0 KiUserExceptionDispatcher DebuggerProbe 54010->54000 54012 a745a6 54011->54012 54012->54000 54012->54010 53934 a8dee0 53937 a8c910 53934->53937 53936 a8df02 53938 a8c91f 53937->53938 53939 a8c939 GetModuleHandleExW 53938->53939 53940 a8c92f 53938->53940 53941 a8c95a __CrtDbgReportWV 53939->53941 53940->53936 53941->53940 53942 a8cddf GetCurrentProcess TerminateProcess 53941->53942 53942->53940 53943 ad2ac0 53944 ad2ae5 53943->53944 53945 ad2b77 53944->53945 53946 ad2ba6 53944->53946 53950 ad2c45 53944->53950 53947 ad2bdc OutputDebugStringW 53946->53947 53948 ad2bf0 OutputDebugStringW OutputDebugStringW OutputDebugStringW OutputDebugStringW 53947->53948 53948->53945 53950->53945 53951 ad3344 53950->53951 53952 ad31dc GetFileType 53950->53952 53951->53945 53953 ad3353 OutputDebugStringW 53951->53953 53954 ad31fe 53952->53954 53959 ad31fc 53952->53959 53953->53945 53955 ad321d WriteConsoleW 53954->53955 53956 ad323d 53955->53956 53957 ad3242 GetLastError 53955->53957 53956->53951 53957->53956 53957->53959 53958 ad32fa 53961 ad3303 53958->53961 53962 ad3312 WriteFile 53958->53962 53959->53958 53960 ad32bb 53959->53960 53963 ad32da WriteFile 53960->53963 53961->53962 53962->53951 53963->53951 54013 ad5810 54016 ad5580 IsDebuggerPresent 54013->54016 54015 ad5826 54017 ad5592 54016->54017 54017->54015 54018 ae7450 54023 ae6570 54018->54023 54021 ae748a 54022 ae7485 MessageBoxW 54022->54021 54026 ae66c0 54023->54026 54027 ae66d8 54026->54027 54028 ae658b 54027->54028 54029 ae6706 54027->54029 54028->54021 54028->54022 54032 ae6990 FreeLibrary GetProcAddress LoadLibraryExW GetLastError LoadLibraryExW 54029->54032 54031 ae6717 54031->54028 54032->54031

Executed Functions

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 0 ad2ac0-ad2b6f call a6d03c call a6dd2f * 4 11 ad2b77-ad2b7a 0->11 12 ad2b71-ad2b75 0->12 14 ad344f-ad346a call a6ecd4 11->14 12->11 13 ad2b7f-ad2b8a 12->13 16 ad2c45-ad2c49 13->16 17 ad2b90-ad2ba0 13->17 20 ad2c4f-ad2cb9 call a6e2c0 * 2 call a6d81b 16->20 21 ad2d33-ad2d37 16->21 17->16 19 ad2ba6-ad2bee call a6d32a call a6dd39 OutputDebugStringW 17->19 41 ad2bfb 19->41 42 ad2bf0-ad2bf9 19->42 51 ad2cbb-ad2ce2 call a6e2c0 call a6ef68 20->51 52 ad2ce5-ad2cf9 call a6e2c0 20->52 22 ad2d8f-ad2dcd call a6e919 call a6dd39 21->22 23 ad2d39-ad2d3d 21->23 47 ad2dcf-ad2ddc 22->47 48 ad2e4e-ad2e52 22->48 26 ad2d3f-ad2d49 23->26 27 ad2d4b 23->27 32 ad2d55-ad2d8c call a70034 call a6dd39 26->32 27->32 32->22 46 ad2c05-ad2c40 OutputDebugStringW * 4 41->46 42->46 56 ad342d-ad3449 call ad343b 46->56 49 ad2dde-ad2e13 call a6e919 call a6dd39 47->49 50 ad2e16-ad2e4b call a6e919 call a6dd39 47->50 54 ad2e58-ad2eb4 call a6e2c0 * 2 call a6dcd5 48->54 55 ad2f30-ad2f67 call a70034 call a6dd39 48->55 49->50 50->48 51->52 52->21 75 ad2cfb-ad2d30 call a70034 call a6dd39 52->75 91 ad2eb6-ad2edd call a6e2c0 call a6ef68 54->91 92 ad2ee0-ad2ef4 call a6e2c0 54->92 85 ad2f6a-ad2fb9 call a701bf call a6ef68 55->85 56->14 75->21 103 ad2fbb-ad2ff0 call a6f774 call a6dd39 85->103 104 ad2ff3-ad2ffa 85->104 91->92 101 ad2f2e 92->101 102 ad2ef6-ad2f2b call a70034 call a6dd39 92->102 101->85 102->101 103->104 105 ad2ffc-ad3003 104->105 106 ad3009-ad3039 call a6d640 104->106 105->106 110 ad3150-ad3157 105->110 119 ad304a-ad3051 106->119 115 ad315e-ad3165 110->115 116 ad3159 110->116 120 ad31b8-ad31c5 115->120 121 ad3167-ad31a5 115->121 116->56 126 ad30b4-ad30bf 119->126 127 ad3053-ad3095 119->127 124 ad31cb-ad31d6 120->124 125 ad3344-ad3351 120->125 121->120 146 ad31a7-ad31b3 121->146 124->125 128 ad31dc-ad31fa GetFileType 124->128 129 ad3360-ad336d 125->129 130 ad3353-ad335a OutputDebugStringW 125->130 131 ad30d0-ad30d7 126->131 157 ad3097-ad30ad 127->157 158 ad30b2 127->158 135 ad31fc 128->135 136 ad31fe-ad323b call a6f8f5 WriteConsoleW 128->136 129->56 138 ad3373-ad338b 129->138 130->129 133 ad30d9-ad311b 131->133 134 ad3137-ad3143 call ad3145 131->134 169 ad311d-ad3133 133->169 170 ad3135 133->170 134->110 140 ad3252-ad32b0 call a701bf call a6ef68 135->140 155 ad323d 136->155 156 ad3242-ad324b GetLastError 136->156 143 ad338d 138->143 144 ad338f call a6e45f 138->144 172 ad32fa-ad3301 140->172 173 ad32b2-ad32b9 140->173 151 ad3394-ad33a8 143->151 144->151 146->56 153 ad33aa-ad33e0 call a6d32a call a6dd39 151->153 154 ad33e3-ad33e7 151->154 153->154 163 ad33e9-ad33f5 154->163 164 ad33f7 154->164 155->125 156->140 165 ad324d 156->165 157->134 158->119 171 ad3401-ad341f call a6d44c 163->171 164->171 165->125 169->134 170->131 181 ad3424-ad3427 171->181 179 ad3303-ad330c 172->179 180 ad3312-ad333e WriteFile 172->180 173->172 177 ad32bb-ad32f8 call a6f8f5 WriteFile 173->177 177->125 179->180 180->125 181->56
APIs
  • OutputDebugStringW.KERNEL32(Second Chance Assertion Failed: File ), ref: 00AD2BE4
  • OutputDebugStringW.KERNEL32(00B273CC), ref: 00AD2C0C
  • OutputDebugStringW.KERNEL32(, Line ), ref: 00AD2C17
  • OutputDebugStringW.KERNEL32(?), ref: 00AD2C24
  • OutputDebugStringW.KERNEL32(00B27404), ref: 00AD2C2F
Strings
Memory Dump Source
  • Source File: 00000002.00000002.1480643754.0000000000A73000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
  • Associated: 00000002.00000002.1480610957.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000A6D000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000B0F000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480751496.0000000000B11000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480793467.0000000000B37000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480813702.0000000000B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B3D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B59000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_a20000_ForkieByKKosty4ka.jbxd
Similarity
  • API ID: DebugOutputString
  • String ID: %ls(%d) : %ls$(*_errno())$, Line $P$Second Chance Assertion Failed: File $_CrtDbgReport: String too long or IO Error$_CrtDbgReport: String too long or Invalid characters in String$_VCrtDbgReportW$_itow_s(nLine, szLineMessage, 4096, 10)$minkernel\crts\ucrt\src\appcrt\misc\dbgrptt.cpp$strcpy_s(szOutMessage2, 4096, "_CrtDbgReport: String too long or Invalid characters in String")$wcscat_s(szLineMessage, 4096, L"\n")$wcscat_s(szLineMessage, 4096, L"\r")$wcscat_s(szLineMessage, 4096, szUserMessage)$wcscpy_s(szLineMessage, 4096, szFormat ? L"Assertion failed: " : L"Assertion failed!")$wcscpy_s(szOutMessage, 4096, L"_CrtDbgReport: String too long or IO Error")$wcscpy_s(szOutMessage, 4096, szLineMessage)$wcscpy_s(szUserMessage, 4096, L"_CrtDbgReport: String too long or IO Error")$wcstombs_s(&ret, szaOutMessage, 4096, szOutMessage, ((size_t)-1))$wcstombs_s(nullptr, szOutMessage2, 4096, szOutMessage, ((size_t)-1))
  • API String ID: 1166629820-796398028
  • Opcode ID: 496f2389ff92ca5c3c0820feaae1131af655f3cfd72201b27881a224e9755f9d
  • Instruction ID: 713137d08dd8b41347d993dbedd8b3f6c24f4227eabcb874480534642d97267e
  • Opcode Fuzzy Hash: 496f2389ff92ca5c3c0820feaae1131af655f3cfd72201b27881a224e9755f9d
  • Instruction Fuzzy Hash: 0B32AFB1A80318EBDB64DF50DD4AB9E73B8BB08740F1085D9F549662D0DFB09A88CF65

Control-flow Graph

APIs
  • MessageBoxA.USER32(00000000,Run virus?,WARNING,00000134), ref: 00A73C1B
  • MessageBoxA.USER32(00000000,THIS IS THE LAST WARNING!THE CREATOR IS NOT RESPONSIBLE FOR ANY DAMAGE MADE USING THIS MALWARE!STILL EXECUTE IT?,LAST WARNING,00000134), ref: 00A73C40
  • ExitProcess.KERNEL32 ref: 00A73C56
  • LoadLibraryA.KERNEL32(ntdll.dll), ref: 00A73C77
  • GetProcAddress.KERNEL32(?,RtlSetProcessIsCritical), ref: 00A73C92
  • RtlSetProcessIsCritical.NTDLL(00000001,00000000,00000000), ref: 00A73CAA
  • CreateThread.KERNEL32(00000000,00000000,00A6D578,00000000,00000000,00000000), ref: 00A73CC5
Strings
  • LAST WARNING, xrefs: 00A73C34
  • THIS IS THE LAST WARNING!THE CREATOR IS NOT RESPONSIBLE FOR ANY DAMAGE MADE USING THIS MALWARE!STILL EXECUTE IT?, xrefs: 00A73C39
  • Run virus?, xrefs: 00A73C14
  • ntdll.dll, xrefs: 00A73C72
  • SeDebugPrivilege, xrefs: 00A73C63
  • WARNING, xrefs: 00A73C0F
  • RtlSetProcessIsCritical, xrefs: 00A73C89
Memory Dump Source
  • Source File: 00000002.00000002.1480643754.0000000000A73000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
  • Associated: 00000002.00000002.1480610957.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000A6D000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000B0F000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480751496.0000000000B11000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480793467.0000000000B37000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480813702.0000000000B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B3D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B59000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_a20000_ForkieByKKosty4ka.jbxd
Similarity
  • API ID: MessageProcess$AddressCreateCriticalExitLibraryLoadProcThread
  • String ID: LAST WARNING$RtlSetProcessIsCritical$Run virus?$SeDebugPrivilege$THIS IS THE LAST WARNING!THE CREATOR IS NOT RESPONSIBLE FOR ANY DAMAGE MADE USING THIS MALWARE!STILL EXECUTE IT?$WARNING$ntdll.dll
  • API String ID: 4228153206-1395599588
  • Opcode ID: 9501aaf0df17850390c875f37d22696ddd8ee8debe9044643e0106b189f17ade
  • Instruction ID: 29edda32f42ecd46e038c3388f07e3c5ba53a97bc0c5cb43713fc70414cc822c
  • Opcode Fuzzy Hash: 9501aaf0df17850390c875f37d22696ddd8ee8debe9044643e0106b189f17ade
  • Instruction Fuzzy Hash: E0210D36F803103FD670B7A49D4BB9D7961D700752FA10291FA497B1D2D9961D9483D3

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 314 a767e0-a7680d VirtualQuery 315 a76b57-a76b5f 314->315 316 a76813-a76826 call a6d57d 314->316 316->315 319 a7682c-a76837 316->319 319->315 320 a7683d-a76842 319->320 320->315 321 a76848-a76850 320->321 321->315 322 a76856-a76869 321->322 323 a76887-a76889 322->323 324 a7686b-a7686d 322->324 323->315 326 a7688f-a7689a 323->326 325 a76870-a76875 324->325 327 a76877-a7687d 325->327 328 a7687f-a76885 325->328 329 a768c4 326->329 330 a7689c-a768a3 326->330 327->326 327->328 328->323 328->325 331 a768c9-a768d9 GetProcAddress 329->331 330->315 332 a768a9 call a76250 330->332 331->315 334 a768df-a76903 331->334 335 a768ae-a768b5 332->335 334->315 339 a76909-a7692f 334->339 335->315 336 a768bb-a768c2 335->336 336->331 342 a76935-a76956 339->342 343 a76a74-a76a91 339->343 342->343 348 a7695c-a76980 342->348 351 a76986-a769a0 348->351 352 a76a60-a76a70 348->352 356 a769a6-a769ab 351->356 357 a76a4c-a76a5c 351->357 352->343 356->357 358 a769b1-a769c4 356->358 357->352 362 a76a27 358->362 363 a769c6-a769f0 358->363 364 a76a29-a76a33 GetProcessHeap HeapFree 362->364 365 a76a39-a76a48 363->365 369 a769f2-a769f9 363->369 364->365 365->357 370 a76a0f-a76a25 369->370 371 a769fb-a76a00 369->371 370->362 370->363 371->370 372 a76a02-a76a09 371->372 372->370 373 a76a92-a76a97 372->373 373->365 375 a76a99-a76a9f 373->375 375->365 377 a76aa1-a76ab9 GetProcessHeap HeapAlloc 375->377 377->365 378 a76abf-a76ae7 377->378 378->364 381 a76aed-a76af2 378->381 381->364 382 a76af8-a76b02 381->382 383 a76b04-a76b07 382->383 384 a76b0e-a76b45 382->384 383->384 385 a76b09-a76b0c 383->385 384->364 388 a76b4b-a76b52 384->388 385->383 385->384 388->364
APIs
  • VirtualQuery.KERNEL32(?,?,0000001C), ref: 00A76805
  • GetPdbDll.LIBCMTD ref: 00A768A9
  • GetProcAddress.KERNEL32(00000000,PDBOpenValidate5), ref: 00A768CF
  • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00A76A2C
  • HeapFree.KERNEL32(00000000), ref: 00A76A33
  • GetProcessHeap.KERNEL32 ref: 00A76AA4
  • HeapAlloc.KERNEL32(00000000,00000000,?), ref: 00A76AAE
Strings
Memory Dump Source
  • Source File: 00000002.00000002.1480643754.0000000000A73000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
  • Associated: 00000002.00000002.1480610957.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000A6D000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000B0F000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480751496.0000000000B11000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480793467.0000000000B37000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480813702.0000000000B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B3D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B59000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_a20000_ForkieByKKosty4ka.jbxd
Similarity
  • API ID: Heap$Process$AddressAllocFreeProcQueryVirtual
  • String ID: PDBOpenValidate5
  • API String ID: 1898765391-413491164
  • Opcode ID: 59eac7f80308047f58c4260591d6e3c29e985177a7f6a8e950acf714f002e1e5
  • Instruction ID: b02666b5b38934e80ab13b4d0e0d0b0b3749db7aaec58e412edad2a2beb71dc5
  • Opcode Fuzzy Hash: 59eac7f80308047f58c4260591d6e3c29e985177a7f6a8e950acf714f002e1e5
  • Instruction Fuzzy Hash: FEB16B35B006299FCF14DFA4CC54BAE7BB6FB88754F298059E905A7390DB31AD02CB91

Control-flow Graph

APIs
  • GetCurrentProcess.KERNEL32(00000028,?), ref: 00A7397C
  • OpenProcessToken.ADVAPI32(00000000), ref: 00A7398A
  • LookupPrivilegeValueA.ADVAPI32(00000000,?,?), ref: 00A739AE
  • CloseHandle.KERNEL32(?), ref: 00A739C5
Memory Dump Source
  • Source File: 00000002.00000002.1480643754.0000000000A73000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
  • Associated: 00000002.00000002.1480610957.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000A6D000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000B0F000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480751496.0000000000B11000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480793467.0000000000B37000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480813702.0000000000B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B3D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B59000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_a20000_ForkieByKKosty4ka.jbxd
Similarity
  • API ID: Process$CloseCurrentHandleLookupOpenPrivilegeTokenValue
  • String ID:
  • API String ID: 2654680240-0
  • Opcode ID: 3cfb33dd0f7d24543efe3e172fb4a5873d1a06a5e6dc731372e91c712edfbb2e
  • Instruction ID: d2d39d7ad5daa63b30b85994e1d67b45f634109a893992038c4928596fccf3f9
  • Opcode Fuzzy Hash: 3cfb33dd0f7d24543efe3e172fb4a5873d1a06a5e6dc731372e91c712edfbb2e
  • Instruction Fuzzy Hash: 1F310672E00108AFDB14EBA8ED56BADB3B9EB44300F614164FA49E7281EB759D408791

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 208 a8c910-a8c92d call a6d03c 211 a8c939-a8c958 GetModuleHandleExW 208->211 212 a8c92f-a8c934 208->212 214 a8c95a 211->214 215 a8c964-a8c9a3 call a6dd2f call a6ee19 211->215 213 a8cdf7-a8ce04 call a6ecd4 212->213 214->215 222 a8c9fb-a8ca23 call a6d9f6 215->222 223 a8c9a5-a8c9f8 call a8dca0 call a6fd55 call a6dd39 215->223 229 a8ca7f-a8ca83 222->229 230 a8ca25-a8ca7b 222->230 223->222 232 a8ca99 229->232 233 a8ca85-a8ca97 call a6d8c0 229->233 230->229 236 a8caa3-a8cabd 232->236 233->236 239 a8cadb-a8cadf 236->239 240 a8cabf-a8cac6 236->240 241 a8caef 239->241 242 a8cae1-a8caed 239->242 240->239 243 a8cac8-a8cad5 240->243 244 a8caf9-a8cb0a 241->244 242->244 243->239 245 a8cb0c-a8cb15 244->245 246 a8cb17 244->246 247 a8cb21-a8cb32 245->247 246->247 248 a8cb34-a8cb38 247->248 249 a8cb46 247->249 248->249 250 a8cb3a-a8cb44 248->250 251 a8cb50-a8cb61 249->251 250->251 252 a8cb6f 251->252 253 a8cb63-a8cb6d 251->253 254 a8cb79-a8cb7d 252->254 253->254 255 a8cb8a 254->255 256 a8cb7f-a8cb88 254->256 257 a8cb94-a8cb98 255->257 256->257 258 a8cb9a-a8cba4 257->258 259 a8cba6 257->259 260 a8cbb0-a8cbb4 258->260 259->260 261 a8cbc1 260->261 262 a8cbb6-a8cbbf 260->262 263 a8cbcb-a8cbcf 261->263 262->263 264 a8cbdd 263->264 265 a8cbd1-a8cbdb 263->265 266 a8cbe7-a8cbee 264->266 265->266 267 a8cbfe-a8cc02 266->267 268 a8cbf0-a8cbfc 266->268 270 a8cc0f 267->270 271 a8cc04-a8cc0d 267->271 269 a8cc25-a8cc2c 268->269 272 a8cc3a 269->272 273 a8cc2e-a8cc38 269->273 274 a8cc19-a8cc1f 270->274 271->274 275 a8cc44-a8cc48 272->275 273->275 274->269 276 a8cc4a-a8cc54 275->276 277 a8cc56 275->277 278 a8cc60-a8cd08 call a8dc80 call a6dcd5 call a6e2c0 * 2 276->278 277->278 287 a8cd0a-a8cd31 call a6e2c0 call a6ef68 278->287 288 a8cd34-a8cd48 call a6e2c0 278->288 287->288 294 a8cd4a-a8cd7f call a70034 call a6dd39 288->294 295 a8cd82-a8cdb4 call a6e44b 288->295 294->295 302 a8cdc1-a8cdd3 call a6eee6 295->302 303 a8cdb6-a8cdbd 295->303 310 a8cddf-a8cde8 GetCurrentProcess TerminateProcess 302->310 311 a8cdd5-a8cddc call a6fc65 302->311 306 a8cdee-a8cdf3 303->306 307 a8cdbf-a8cdf5 303->307 306->213 307->213 310->306 311->310
APIs
  • GetModuleHandleExW.KERNEL32(00000006,?,00000000), ref: 00A8C950
Strings
  • wcscpy_s(message_buffer, 4096, L"_CrtDbgReport: String too long or IO Error"), xrefs: 00A8CD5B
  • @, xrefs: 00A8CABF
  • Microsoft Visual C++ Runtime Library, xrefs: 00A8CD87
  • ..., xrefs: 00A8CC2E
  • _CrtDbgReport: String too long or IO Error, xrefs: 00A8CD60
  • (*_errno()), xrefs: 00A8CD1B
  • common_message_window, xrefs: 00A8C9CB, 00A8CD16, 00A8CD56
  • minkernel\crts\ucrt\src\appcrt\misc\dbgrpt.cpp, xrefs: 00A8C9C6, 00A8CD11, 00A8CD51
  • @, xrefs: 00A8CA1C
  • traits::tcscpy_s(program_name, (sizeof(*__countof_helper(program_name)) + 0), get_program_name_unknown_text(Character())), xrefs: 00A8C9D0
Memory Dump Source
  • Source File: 00000002.00000002.1480643754.0000000000A73000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
  • Associated: 00000002.00000002.1480610957.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000A6D000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000B0F000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480751496.0000000000B11000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480793467.0000000000B37000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480813702.0000000000B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B3D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B59000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_a20000_ForkieByKKosty4ka.jbxd
Similarity
  • API ID: HandleModule
  • String ID: (*_errno())$...$@$@$Microsoft Visual C++ Runtime Library$_CrtDbgReport: String too long or IO Error$common_message_window$minkernel\crts\ucrt\src\appcrt\misc\dbgrpt.cpp$traits::tcscpy_s(program_name, (sizeof(*__countof_helper(program_name)) + 0), get_program_name_unknown_text(Character()))$wcscpy_s(message_buffer, 4096, L"_CrtDbgReport: String too long or IO Error")
  • API String ID: 4139908857-1633980848
  • Opcode ID: 8a02cd9f87cc9d5da656a98b40303cc18deea9f0d97a6d0658f18727eb6daf9a
  • Instruction ID: a1c886766e9e25737b561db8331275d82d060338f463500582c108f5d9205b19
  • Opcode Fuzzy Hash: 8a02cd9f87cc9d5da656a98b40303cc18deea9f0d97a6d0658f18727eb6daf9a
  • Instruction Fuzzy Hash: 9ED17CB1944229EBDB24EF94DC4DBEAB7B4AB54304F1041E9E4096B290D7B49FC4CFA1

Control-flow Graph

APIs
  • LoadLibraryA.KERNEL32(ntdll.dll), ref: 00A73C77
  • GetProcAddress.KERNEL32(?,RtlSetProcessIsCritical), ref: 00A73C92
  • RtlSetProcessIsCritical.NTDLL(00000001,00000000,00000000), ref: 00A73CAA
  • CreateThread.KERNEL32(00000000,00000000,00A6D578,00000000,00000000,00000000), ref: 00A73CC5
Strings
Memory Dump Source
  • Source File: 00000002.00000002.1480643754.0000000000A73000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
  • Associated: 00000002.00000002.1480610957.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000A6D000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000B0F000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480751496.0000000000B11000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480793467.0000000000B37000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480813702.0000000000B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B3D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B59000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_a20000_ForkieByKKosty4ka.jbxd
Similarity
  • API ID: AddressCreateCriticalLibraryLoadProcProcessThread
  • String ID: RtlSetProcessIsCritical$SeDebugPrivilege$ntdll.dll
  • API String ID: 4168212113-3270220969
  • Opcode ID: 08744221f32daff5ac46126ca4adc5ef3e38e5a4e9ebe11c3f0987ae107006df
  • Instruction ID: 0edcd51d58aca528fd4cb08afae837e55b4e63674d4babb30a8cf5785638e0aa
  • Opcode Fuzzy Hash: 08744221f32daff5ac46126ca4adc5ef3e38e5a4e9ebe11c3f0987ae107006df
  • Instruction Fuzzy Hash: 9001A936F802107FD661B7B4AD47B9C7A719B00752F6202A1FE497B1D3E9961D9043D3

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 434 a74750-a74759 435 a7477e-a74799 call a74950 434->435 436 a7475b-a7476c 434->436 438 a7479c-a7479d 435->438 437 a7476e-a74774 call a74950 436->437 436->438 442 a74779-a7477d 437->442
APIs
  • failwithmessage.LIBCMTD ref: 00A74774
    • Part of subcall function 00A74950: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00A74702,000000FF,00000000,00000000,?), ref: 00A749B1
    • Part of subcall function 00A74950: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00A74702,000000FF,?,00000000), ref: 00A749D0
    • Part of subcall function 00A74950: DebuggerProbe.LIBCMTD ref: 00A749EA
    • Part of subcall function 00A74950: DebuggerRuntime.LIBCMTD ref: 00A74A06
    • Part of subcall function 00A74950: IsDebuggerPresent.KERNEL32 ref: 00A74A2F
  • failwithmessage.LIBCMTD ref: 00A74794
Memory Dump Source
  • Source File: 00000002.00000002.1480643754.0000000000A73000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
  • Associated: 00000002.00000002.1480610957.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000A6D000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000B0F000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480751496.0000000000B11000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480793467.0000000000B37000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480813702.0000000000B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B3D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B59000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_a20000_ForkieByKKosty4ka.jbxd
Similarity
  • API ID: Debugger$ByteCharMultiWidefailwithmessage$PresentProbeRuntime
  • String ID:
  • API String ID: 3941055102-0
  • Opcode ID: fd1efcfaa176356a8cd6c0adcb30cda862dbd5beaf97d950fac376cf9d3ef3fa
  • Instruction ID: cc6f8b62bc67bbb54ed3bec1eaba0d48c97f867ef7ab5b367d97ee439b51e1d6
  • Opcode Fuzzy Hash: fd1efcfaa176356a8cd6c0adcb30cda862dbd5beaf97d950fac376cf9d3ef3fa
  • Instruction Fuzzy Hash: C0E065B4500104AFEB149B58FC5597B3359D785314F94C214F51C572A2EB72AD724550

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 443 ad5580-ad5590 IsDebuggerPresent 444 ad5598 443->444 445 ad5592-ad5596 443->445 446 ad559c-ad55a8 444->446 445->446 447 ad55e8-ad55f0 call a6ec20 446->447 448 ad55aa-ad55ae 446->448 455 ad55f8 447->455 456 ad55f2-ad55f6 447->456 450 ad55bc-ad55c4 call a6f27e 448->450 451 ad55b0-ad55b9 call a6ea4a 448->451 460 ad55cc 450->460 461 ad55c6-ad55ca 450->461 451->450 459 ad55fc-ad5608 455->459 456->459 462 ad560a-ad5614 call a702d2 459->462 463 ad5616-ad561c 459->463 464 ad55d0-ad55dc 460->464 461->464 462->463 472 ad5633-ad563d call a6f71a 462->472 467 ad561e-ad5625 463->467 468 ad5627 463->468 464->447 465 ad55de-ad55e3 464->465 469 ad568c-ad568f 465->469 471 ad562e-ad5631 467->471 468->471 471->469 475 ad566c-ad5684 call a6e2b6 call a6d27b 472->475 476 ad563f-ad566a call a6e2ca 472->476 482 ad5689 475->482 476->469 482->469
APIs
  • IsDebuggerPresent.KERNEL32 ref: 00AD5588
Memory Dump Source
  • Source File: 00000002.00000002.1480643754.0000000000A73000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
  • Associated: 00000002.00000002.1480610957.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000A6D000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000B0F000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480751496.0000000000B11000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480793467.0000000000B37000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480813702.0000000000B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B3D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B59000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_a20000_ForkieByKKosty4ka.jbxd
Similarity
  • API ID: DebuggerPresent
  • String ID:
  • API String ID: 1347740429-0
  • Opcode ID: aa01a8f9ecf539bd5cc2aff93a9c6738f1d22219196cfc5b9dcb0796f0e088c2
  • Instruction ID: 10afeb63b9e47855d0c3a92de253d0197dfc68d9acbc73b93b0f9ef936c2f44c
  • Opcode Fuzzy Hash: aa01a8f9ecf539bd5cc2aff93a9c6738f1d22219196cfc5b9dcb0796f0e088c2
  • Instruction Fuzzy Hash: A431E4B5C08288AADF16DBF5D451BFE7F756F11300F08809BE8525A382D675C708CBA2

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 483 a74bd0-a74c4c KiUserExceptionDispatcher
APIs
  • KiUserExceptionDispatcher.NTDLL(406D1388,00000000,00000006,00A745A6,6B903ED7,?,?,?,00A745A6), ref: 00A74C16
Memory Dump Source
  • Source File: 00000002.00000002.1480643754.0000000000A73000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
  • Associated: 00000002.00000002.1480610957.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000A6D000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000B0F000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480751496.0000000000B11000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480793467.0000000000B37000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480813702.0000000000B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B3D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B59000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_a20000_ForkieByKKosty4ka.jbxd
Similarity
  • API ID: DispatcherExceptionUser
  • String ID:
  • API String ID: 6842923-0
  • Opcode ID: c0fec8de9f066242c14d97fb96407cbc567aa022a929d62428c2992231e39209
  • Instruction ID: 2e02d913413d898f4a523134200206c595138169bc8c1a61ecb04660dab2379f
  • Opcode Fuzzy Hash: c0fec8de9f066242c14d97fb96407cbc567aa022a929d62428c2992231e39209
  • Instruction Fuzzy Hash: F5F0F671A84748FBC724CF98DD01F9ABFB8F744B20F204269F505972D0D73124008A90

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 485 ae7450-ae7464 call ae6570 488 ae748a call a6d1c7 485->488 489 ae7466-ae7488 MessageBoxW 485->489 491 ae748f-ae7492 488->491 489->491
APIs
Memory Dump Source
  • Source File: 00000002.00000002.1480643754.0000000000A73000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
  • Associated: 00000002.00000002.1480610957.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000A6D000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000B0F000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480751496.0000000000B11000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480793467.0000000000B37000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480813702.0000000000B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B3D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B59000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_a20000_ForkieByKKosty4ka.jbxd
Similarity
  • API ID: Message
  • String ID:
  • API String ID: 2030045667-0
  • Opcode ID: 0559cffa934f44047a79ea0ba5a7bc9fd82f5937fd5f424dc967d7c27d07a1db
  • Instruction ID: 57353adf92684cf2816fdfa217c324389556316986239087acdc4adbb7b374cb
  • Opcode Fuzzy Hash: 0559cffa934f44047a79ea0ba5a7bc9fd82f5937fd5f424dc967d7c27d07a1db
  • Instruction Fuzzy Hash: FCF03071A0414CEBCB04EFD9D94499E7BB8EF88300F108158F91993250DB70AE50DB61

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 493 a78330-a78346 LoadLibraryExW
APIs
  • LoadLibraryExW.KERNEL32(?,?,?), ref: 00A7833F
Memory Dump Source
  • Source File: 00000002.00000002.1480643754.0000000000A73000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
  • Associated: 00000002.00000002.1480610957.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000A6D000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000B0F000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480751496.0000000000B11000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480793467.0000000000B37000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480813702.0000000000B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B3D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B59000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_a20000_ForkieByKKosty4ka.jbxd
Similarity
  • API ID: LibraryLoad
  • String ID:
  • API String ID: 1029625771-0
  • Opcode ID: cfcdda449e3093355ace1f95615532683115fb88f44de15e77c81508a38aec5b
  • Instruction ID: 08f5a9317651d0d45b5dd9606f88c40f25eaa349b7b67d724fd9b07219f4096d
  • Opcode Fuzzy Hash: cfcdda449e3093355ace1f95615532683115fb88f44de15e77c81508a38aec5b
  • Instruction Fuzzy Hash: A3C04C7611424CAB8B04DF98EC84CEB37ADAB8C611B108508BA1DC7210CA30F9549BA5

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 494 a741e0-a741ee call a6f76f __scrt_common_main_seh
APIs
  • __scrt_common_main_seh.LIBCMTD ref: 00A741E8
Memory Dump Source
  • Source File: 00000002.00000002.1480643754.0000000000A73000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
  • Associated: 00000002.00000002.1480610957.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000A6D000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000B0F000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480751496.0000000000B11000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480793467.0000000000B37000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480813702.0000000000B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B3D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B59000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_a20000_ForkieByKKosty4ka.jbxd
Similarity
  • API ID: __scrt_common_main_seh
  • String ID:
  • API String ID: 4147471026-0
  • Opcode ID: 1f45acf9b494ed39981534e27bc09cf64c01b739f5bc27cd40f0248eabbfc0dd
  • Instruction ID: bf8d31957a7c8da586d4668d5e3a7229dde78b6ec880f3696b02676c8978e449
  • Opcode Fuzzy Hash: 1f45acf9b494ed39981534e27bc09cf64c01b739f5bc27cd40f0248eabbfc0dd
  • Instruction Fuzzy Hash: C8A0022184464C49148033E53F03999769C0944714B908061752C055133D45646000EA

Non-executed Functions

APIs
  • CreateFileA.KERNEL32(\\.\PhysicalDrive0,C0000000,00000003,00000000,00000003,00000000,00000000), ref: 00A7374C
  • SetFilePointer.KERNEL32(?,00000000,00000000,00000000), ref: 00A7376E
  • ReadFile.KERNEL32(?,?,000FA000,?,00000000), ref: 00A73796
  • SetFilePointerEx.KERNEL32(?,?,?,00000000,00000001), ref: 00A73819
  • WriteFile.KERNEL32(?,?,000FA000,?,00000000), ref: 00A73841
Strings
Memory Dump Source
  • Source File: 00000002.00000002.1480643754.0000000000A73000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
  • Associated: 00000002.00000002.1480610957.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000A6D000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000B0F000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480751496.0000000000B11000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480793467.0000000000B37000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480813702.0000000000B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B3D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B59000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_a20000_ForkieByKKosty4ka.jbxd
Similarity
  • API ID: File$Pointer$CreateReadWrite
  • String ID: \\.\PhysicalDrive0
  • API String ID: 832938191-1180397377
  • Opcode ID: ae6a33c86b284f01ea958d7b3c5eedb0ed5f7b2cc2ea51d5403133346806598b
  • Instruction ID: adbaf8dc7fcf52cbeea52d2d34f3529ef2cc8ca74e8a446b09d81b03df47a3bd
  • Opcode Fuzzy Hash: ae6a33c86b284f01ea958d7b3c5eedb0ed5f7b2cc2ea51d5403133346806598b
  • Instruction Fuzzy Hash: 043170F1F00318ABCB24DB18EC56FB976B4AB0A700F5141D4F60CA7681CA355A85AFA7
APIs
  • GetLocaleInfoW.KERNEL32(?,20001004,?,00000002), ref: 00AE566D
  • GetACP.KERNEL32 ref: 00AE5681
  • GetLocaleInfoW.KERNEL32(?,2000000B,?,00000002), ref: 00AE56B2
Strings
Memory Dump Source
  • Source File: 00000002.00000002.1480643754.0000000000A73000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
  • Associated: 00000002.00000002.1480610957.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000A6D000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000B0F000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480751496.0000000000B11000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480793467.0000000000B37000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480813702.0000000000B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B3D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B59000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_a20000_ForkieByKKosty4ka.jbxd
Similarity
  • API ID: InfoLocale
  • String ID: ACP$OCP
  • API String ID: 2299586839-711371036
  • Opcode ID: 28dcdac122a93a2092486a42b8bc5e124ee632033e27931f9e9642373886703b
  • Instruction ID: 58b3c185a5f79c0e644e260bf28e5855305924388b94df1596b133f7b6827325
  • Opcode Fuzzy Hash: 28dcdac122a93a2092486a42b8bc5e124ee632033e27931f9e9642373886703b
  • Instruction Fuzzy Hash: 93119074A00648FBDB00DF72EA85EAA3378AB14749F688818FD0ADB150EB70DE40DB51
APIs
  • IsValidCodePage.KERNEL32(00000000), ref: 00AE5A7E
    • Part of subcall function 00AE4AB0: GetUserDefaultLCID.KERNEL32 ref: 00AE4AC6
  • IsValidLocale.KERNEL32(00000000,00000001), ref: 00AE5A98
  • GetLocaleInfoW.KERNEL32(00000000,00001001,00000000,00000040,00000000,-00000120,00000055,00000000,00000000,?,00000055,00000000), ref: 00AE5B01
Memory Dump Source
  • Source File: 00000002.00000002.1480643754.0000000000A73000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
  • Associated: 00000002.00000002.1480610957.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000A6D000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000B0F000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480751496.0000000000B11000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480793467.0000000000B37000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480813702.0000000000B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B3D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B59000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_a20000_ForkieByKKosty4ka.jbxd
Similarity
  • API ID: LocaleValid$CodeDefaultInfoPageUser
  • String ID:
  • API String ID: 334263767-0
  • Opcode ID: 0b2e8fccadec728744d7ea70eb77a2edb558f1c4e1c3aae15f37294e46fef19a
  • Instruction ID: 661da2cb8d7d5ab11b10092f34f0c478e36f74a358a3590647e177d9cc95c873
  • Opcode Fuzzy Hash: 0b2e8fccadec728744d7ea70eb77a2edb558f1c4e1c3aae15f37294e46fef19a
  • Instruction Fuzzy Hash: 09917CB0E00645DFDB04DFA5E995BBFB7B5AF48308F248128E505AB281E735EC41CBA1
APIs
  • GetLocaleInfoW.KERNEL32(?,00001002,?,00000078), ref: 00AE4DEF
  • GetLocaleInfoW.KERNEL32(?,00001001,?,00000078), ref: 00AE4E69
    • Part of subcall function 00AE5770: GetLocaleInfoW.KERNEL32(00000000,20000001,?,00000002,?,?,00000000,?), ref: 00AE57AB
  • GetLocaleInfoW.KERNEL32(?,00001001,?,00000078), ref: 00AE5005
Memory Dump Source
  • Source File: 00000002.00000002.1480643754.0000000000A73000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
  • Associated: 00000002.00000002.1480610957.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000A6D000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000B0F000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480751496.0000000000B11000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480793467.0000000000B37000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480813702.0000000000B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B3D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B59000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_a20000_ForkieByKKosty4ka.jbxd
Similarity
  • API ID: InfoLocale
  • String ID:
  • API String ID: 2299586839-0
  • Opcode ID: 98993cff081280fc6b0e29641476769ca613360df660dbcee1d0a7c84cf842a2
  • Instruction ID: 96b61a63b36ce5479c6ec7792bf4a0b55a78145f3ecc25a25afb2ab79ee7f662
  • Opcode Fuzzy Hash: 98993cff081280fc6b0e29641476769ca613360df660dbcee1d0a7c84cf842a2
  • Instruction Fuzzy Hash: 61D1F274E4021ACBDB64CF15D981BEAB3B5BB58304F1181E8E809AB740EB75AEC5DF50
APIs
  • IsDebuggerPresent.KERNEL32 ref: 00AD19A0
  • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00AD19AE
  • UnhandledExceptionFilter.KERNEL32(?), ref: 00AD19BB
Memory Dump Source
  • Source File: 00000002.00000002.1480643754.0000000000A73000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
  • Associated: 00000002.00000002.1480610957.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000A6D000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000B0F000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480751496.0000000000B11000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480793467.0000000000B37000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480813702.0000000000B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B3D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B59000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_a20000_ForkieByKKosty4ka.jbxd
Similarity
  • API ID: ExceptionFilterUnhandled$DebuggerPresent
  • String ID:
  • API String ID: 3906539128-0
  • Opcode ID: ec107cfcc9a7e3b41c1baaa57ea044793ebadff44350cbbb137f56a724257aef
  • Instruction ID: 9a44eccfc9424c5247e42a6e78621e606953f923339188c512f6a6f324658f19
  • Opcode Fuzzy Hash: ec107cfcc9a7e3b41c1baaa57ea044793ebadff44350cbbb137f56a724257aef
  • Instruction Fuzzy Hash: B741D5B4C0122CABCB25DF24D9997DDB7B4BF18310F1041DAE90DA6250E7705B85CF85
Strings
  • minkernel\crts\ucrt\inc\corecrt_internal_big_integer.h, xrefs: 00AF68C5
  • %ls, xrefs: 00AF68B9
  • ("Division by zero", false), xrefs: 00AF68B4
Memory Dump Source
  • Source File: 00000002.00000002.1480643754.0000000000A73000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
  • Associated: 00000002.00000002.1480610957.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000A6D000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000B0F000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480751496.0000000000B11000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480793467.0000000000B37000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480813702.0000000000B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B3D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B59000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_a20000_ForkieByKKosty4ka.jbxd
Similarity
  • API ID:
  • String ID: %ls$("Division by zero", false)$minkernel\crts\ucrt\inc\corecrt_internal_big_integer.h
  • API String ID: 0-226933
  • Opcode ID: bc7f580edf5a365ffdca3bc120f2fbbf91d9879b8e7f31a3fb20b0a5b2e44003
  • Instruction ID: 6de99165c72861a2edb68d03477a4a6fc10d36cb427dc7eb02735f34df12a2d4
  • Opcode Fuzzy Hash: bc7f580edf5a365ffdca3bc120f2fbbf91d9879b8e7f31a3fb20b0a5b2e44003
  • Instruction Fuzzy Hash: 38629974E049288FDB64CF58CD90BAAB7B2BB88356F1081D9E94DA7345DB316E81CF40
Strings
  • minkernel\crts\ucrt\src\appcrt\internal\win_policies.cpp, xrefs: 00ADDF61
  • cached_state == static_cast<long>(policyValue), xrefs: 00ADDF53
  • %ls, xrefs: 00ADDF58
Memory Dump Source
  • Source File: 00000002.00000002.1480643754.0000000000A73000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
  • Associated: 00000002.00000002.1480610957.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000A6D000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000B0F000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480751496.0000000000B11000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480793467.0000000000B37000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480813702.0000000000B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B3D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B59000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_a20000_ForkieByKKosty4ka.jbxd
Similarity
  • API ID:
  • String ID: %ls$cached_state == static_cast<long>(policyValue)$minkernel\crts\ucrt\src\appcrt\internal\win_policies.cpp
  • API String ID: 0-2042085565
  • Opcode ID: 66491424536a9098488db36b9722da774b40e0c47dab43c0bfc141f0b7814a8d
  • Instruction ID: 8ab67aa1e157a562645b960b40f42b078b56b6c07d2501d00a6a72078561ad2f
  • Opcode Fuzzy Hash: 66491424536a9098488db36b9722da774b40e0c47dab43c0bfc141f0b7814a8d
  • Instruction Fuzzy Hash: B311A5B5E40248FBCB10DF94C946BEDB7B0AB54700F208595E4176B381E7B1AE50CB81
Strings
  • minkernel\crts\ucrt\src\appcrt\internal\win_policies.cpp, xrefs: 00ADDE91
  • cached_state == static_cast<long>(policyValue), xrefs: 00ADDE83
  • %ls, xrefs: 00ADDE88
Memory Dump Source
  • Source File: 00000002.00000002.1480643754.0000000000A73000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
  • Associated: 00000002.00000002.1480610957.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000A6D000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000B0F000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480751496.0000000000B11000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480793467.0000000000B37000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480813702.0000000000B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B3D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B59000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_a20000_ForkieByKKosty4ka.jbxd
Similarity
  • API ID:
  • String ID: %ls$cached_state == static_cast<long>(policyValue)$minkernel\crts\ucrt\src\appcrt\internal\win_policies.cpp
  • API String ID: 0-2042085565
  • Opcode ID: e637602304ac0c1bcb028f08aceadde1ab2aec600c107b06ef65f15faadd18df
  • Instruction ID: 1e2b579fdc7c29c75bba5cc2486d38babd9ba34251114e2e60f35e3dad37605f
  • Opcode Fuzzy Hash: e637602304ac0c1bcb028f08aceadde1ab2aec600c107b06ef65f15faadd18df
  • Instruction Fuzzy Hash: 0011A575E40209EFCB10EF94C946BADB7B0AB54700F204599E41A6F381EB70AF44CB81
Strings
  • minkernel\crts\ucrt\src\appcrt\internal\win_policies.cpp, xrefs: 00ADE031
  • cached_state == static_cast<long>(policyValue), xrefs: 00ADE023
  • %ls, xrefs: 00ADE028
Memory Dump Source
  • Source File: 00000002.00000002.1480643754.0000000000A73000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
  • Associated: 00000002.00000002.1480610957.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000A6D000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000B0F000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480751496.0000000000B11000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480793467.0000000000B37000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480813702.0000000000B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B3D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B59000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_a20000_ForkieByKKosty4ka.jbxd
Similarity
  • API ID:
  • String ID: %ls$cached_state == static_cast<long>(policyValue)$minkernel\crts\ucrt\src\appcrt\internal\win_policies.cpp
  • API String ID: 0-2042085565
  • Opcode ID: 93445ec976f9f160c977b0047cf49b9abec37e6e2d639712e5af1fd04de3ae11
  • Instruction ID: 99e7c3576efc114c9f781b309ee52e29dc28e54ed2bd452b69b8e6b4e957a63d
  • Opcode Fuzzy Hash: 93445ec976f9f160c977b0047cf49b9abec37e6e2d639712e5af1fd04de3ae11
  • Instruction Fuzzy Hash: 9211A575E40308EBCB14EF94D986BADB7F0AB14700F2445A5E51A6B381E7B5AE44CB81
APIs
  • FindFirstFileExW.KERNEL32(00000000,00000000,?), ref: 00AD9843
  • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,00000000), ref: 00AD99E5
Memory Dump Source
  • Source File: 00000002.00000002.1480643754.0000000000A73000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
  • Associated: 00000002.00000002.1480610957.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000A6D000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000B0F000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480751496.0000000000B11000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480793467.0000000000B37000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480813702.0000000000B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B3D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B59000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_a20000_ForkieByKKosty4ka.jbxd
Similarity
  • API ID: FileFind$FirstNext
  • String ID:
  • API String ID: 1690352074-0
  • Opcode ID: e65e7c685caab99005087ba8684d5421a87925c28f2d09c4bf7df6826b6ff7b9
  • Instruction ID: bfdcbee352eaf49c7cbac3f89a66b326df73e3bb9e81374294ac2cb2b4191a20
  • Opcode Fuzzy Hash: e65e7c685caab99005087ba8684d5421a87925c28f2d09c4bf7df6826b6ff7b9
  • Instruction Fuzzy Hash: 19A13F71A042299FDB64EF24CD99BEE7375AF95300F5045EAE40A6B291DF30AE84CF50
APIs
  • FindFirstFileExW.KERNEL32(00000000,00000000,?), ref: 00AD93E1
  • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,00000000), ref: 00AD9583
Memory Dump Source
  • Source File: 00000002.00000002.1480643754.0000000000A73000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
  • Associated: 00000002.00000002.1480610957.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000A6D000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000B0F000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480751496.0000000000B11000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480793467.0000000000B37000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480813702.0000000000B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B3D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B59000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_a20000_ForkieByKKosty4ka.jbxd
Similarity
  • API ID: FileFind$FirstNext
  • String ID:
  • API String ID: 1690352074-0
  • Opcode ID: 8a5558488b3fef1120eebd46ac8c12bc59cc8b2ea5fd51c1ad778f805e69d21f
  • Instruction ID: c43a915fcf32bf53c1ef48b504f4c7dac43e48fe3124d54daf6ed916a28c1adc
  • Opcode Fuzzy Hash: 8a5558488b3fef1120eebd46ac8c12bc59cc8b2ea5fd51c1ad778f805e69d21f
  • Instruction Fuzzy Hash: D1A16F71A042699FCB24EF20DD99BEE7775AF95301F1041EAE40A6B291DF31AE84CF40
APIs
  • GetLocaleInfoW.KERNEL32(?,00001001,?,00000078), ref: 00AE53AF
    • Part of subcall function 00AE5770: GetLocaleInfoW.KERNEL32(00000000,20000001,?,00000002,?,?,00000000,?), ref: 00AE57AB
Memory Dump Source
  • Source File: 00000002.00000002.1480643754.0000000000A73000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
  • Associated: 00000002.00000002.1480610957.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000A6D000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000B0F000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480751496.0000000000B11000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480793467.0000000000B37000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480813702.0000000000B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B3D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B59000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_a20000_ForkieByKKosty4ka.jbxd
Similarity
  • API ID: InfoLocale
  • String ID:
  • API String ID: 2299586839-0
  • Opcode ID: c3ae71f8df9208b364a168bf0568cb4c8f05b5b5a3c95b4a8fcabb9c6c129de9
  • Instruction ID: 11aefbc45e73dcb8dc96f6211c24b080f51e414fe1ed1e5fac927891916f9615
  • Opcode Fuzzy Hash: c3ae71f8df9208b364a168bf0568cb4c8f05b5b5a3c95b4a8fcabb9c6c129de9
  • Instruction Fuzzy Hash: B4511975E4021A8BDB34CF65D981BE9B3B5AB58305F1180E8E80D9B780EB74AEC5DF50
APIs
  • GetSystemInfo.KERNEL32(?,6B903ED7), ref: 00ACC0D6
Memory Dump Source
  • Source File: 00000002.00000002.1480643754.0000000000A73000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
  • Associated: 00000002.00000002.1480610957.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000A6D000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000B0F000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480751496.0000000000B11000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480793467.0000000000B37000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480813702.0000000000B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B3D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B59000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_a20000_ForkieByKKosty4ka.jbxd
Similarity
  • API ID: InfoSystem
  • String ID:
  • API String ID: 31276548-0
  • Opcode ID: ed13922813153c9deffb5099bd8824b2475c2355c2aa8e8cfe5151b31653223e
  • Instruction ID: 18bb912d8e764413219f24a213659f134d9401891a6659836ee4d117efac6351
  • Opcode Fuzzy Hash: ed13922813153c9deffb5099bd8824b2475c2355c2aa8e8cfe5151b31653223e
  • Instruction Fuzzy Hash: 9331B0B5D04258EFCB14CFA9C881AEDBBF1FB49320F25826AD419B7241D7355A41CB64
APIs
  • GetLocaleInfoW.KERNEL32(?,00001002,?,00000078), ref: 00AE491F
Memory Dump Source
  • Source File: 00000002.00000002.1480643754.0000000000A73000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
  • Associated: 00000002.00000002.1480610957.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000A6D000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000B0F000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480751496.0000000000B11000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480793467.0000000000B37000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480813702.0000000000B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B3D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B59000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_a20000_ForkieByKKosty4ka.jbxd
Similarity
  • API ID: InfoLocale
  • String ID:
  • API String ID: 2299586839-0
  • Opcode ID: d80f44918492c453f151ab7cb70fd76f13ed00c53bbb576e59e8f8ed666dbe6c
  • Instruction ID: cb62c0a2098f1d4af8171ab321b713348b253b10e5ed9b3963b547c200b28ac5
  • Opcode Fuzzy Hash: d80f44918492c453f151ab7cb70fd76f13ed00c53bbb576e59e8f8ed666dbe6c
  • Instruction Fuzzy Hash: 87313AB1E4421A8BDB64CF14D941BAAB7B4AB58300F1081E8D94DAB341EB74EEC4DF50
APIs
  • EnumSystemLocalesW.KERNEL32(00AE4D70,00000001), ref: 00AE4BA9
Memory Dump Source
  • Source File: 00000002.00000002.1480643754.0000000000A73000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
  • Associated: 00000002.00000002.1480610957.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000A6D000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000B0F000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480751496.0000000000B11000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480793467.0000000000B37000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480813702.0000000000B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B3D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B59000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_a20000_ForkieByKKosty4ka.jbxd
Similarity
  • API ID: EnumLocalesSystem
  • String ID:
  • API String ID: 2099609381-0
  • Opcode ID: 2febcd4c2ff507b6f83c92493a028e3708f987589e67dd523daa56ada7b40783
  • Instruction ID: 81619cc9f064f17d28f85fffa02286a7d63a7572990d6f07ca9137f6d89cc613
  • Opcode Fuzzy Hash: 2febcd4c2ff507b6f83c92493a028e3708f987589e67dd523daa56ada7b40783
  • Instruction Fuzzy Hash: 532119B8A00248EFDB04DF95D585BAEBBB5FB88310F208598E8155B381D775EE51CB81
APIs
  • GetLocaleInfoW.KERNEL32(00000000,20000001,?,00000002,?,?,00000000,?), ref: 00AE57AB
Memory Dump Source
  • Source File: 00000002.00000002.1480643754.0000000000A73000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
  • Associated: 00000002.00000002.1480610957.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000A6D000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000B0F000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480751496.0000000000B11000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480793467.0000000000B37000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480813702.0000000000B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B3D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B59000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_a20000_ForkieByKKosty4ka.jbxd
Similarity
  • API ID: InfoLocale
  • String ID:
  • API String ID: 2299586839-0
  • Opcode ID: a7a8bf6658f1b48e4d74a81b8ecb8f275abb870d70c8ad3a04669c84ae0ccf19
  • Instruction ID: a9491dc3c87b9cb579f98defd23d0dd994b42100b9f05006e3a4ca6ce420e7d8
  • Opcode Fuzzy Hash: a7a8bf6658f1b48e4d74a81b8ecb8f275abb870d70c8ad3a04669c84ae0ccf19
  • Instruction Fuzzy Hash: F301B176D00254EBDB10DBBAE981ABF73B9AB44344F108579F855DB240E634EE508BA1
APIs
  • EnumSystemLocalesW.KERNEL32(00AE5330,00000001), ref: 00AE4C92
Memory Dump Source
  • Source File: 00000002.00000002.1480643754.0000000000A73000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
  • Associated: 00000002.00000002.1480610957.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000A6D000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000B0F000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480751496.0000000000B11000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480793467.0000000000B37000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480813702.0000000000B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B3D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B59000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_a20000_ForkieByKKosty4ka.jbxd
Similarity
  • API ID: EnumLocalesSystem
  • String ID:
  • API String ID: 2099609381-0
  • Opcode ID: 19fe28760b9468fa1e787f16a282f7b397a4a947b72cb7e0d4e1169c21ec7981
  • Instruction ID: 0917b2585221f54025a07ec29d86ff1a747501e213638efb9219cfcac0247d64
  • Opcode Fuzzy Hash: 19fe28760b9468fa1e787f16a282f7b397a4a947b72cb7e0d4e1169c21ec7981
  • Instruction Fuzzy Hash: F511F7B4E01248EFDB04DF95D585B9DB7B5EB88304F208198E8159B340D775AE41DB81
APIs
  • GetLocaleInfoW.KERNEL32(00000000,?,00000000,?,?,?), ref: 00AE6F92
Memory Dump Source
  • Source File: 00000002.00000002.1480643754.0000000000A73000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
  • Associated: 00000002.00000002.1480610957.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000A6D000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000B0F000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480751496.0000000000B11000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480793467.0000000000B37000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480813702.0000000000B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B3D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B59000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_a20000_ForkieByKKosty4ka.jbxd
Similarity
  • API ID: InfoLocale
  • String ID:
  • API String ID: 2299586839-0
  • Opcode ID: 7452645e52c11858bc9d0a0303084eae87608a561c6a21aa41a5400af3fb1c54
  • Instruction ID: 7098abacd572c52454efb4090f26384cc80e6601ce3717637529ae40ef2e2c0f
  • Opcode Fuzzy Hash: 7452645e52c11858bc9d0a0303084eae87608a561c6a21aa41a5400af3fb1c54
  • Instruction Fuzzy Hash: F0011975500208FFCB04DF98D948E9F7BB9AF88301F108548B90997250CA30AE11DB60
APIs
  • EnumSystemLocalesW.KERNEL32(Function_000C48A0,00000001), ref: 00AE4A77
Memory Dump Source
  • Source File: 00000002.00000002.1480643754.0000000000A73000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
  • Associated: 00000002.00000002.1480610957.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000A6D000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000B0F000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480751496.0000000000B11000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480793467.0000000000B37000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480813702.0000000000B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B3D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B59000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_a20000_ForkieByKKosty4ka.jbxd
Similarity
  • API ID: EnumLocalesSystem
  • String ID:
  • API String ID: 2099609381-0
  • Opcode ID: a18e2ed12fc1e9b26480c7b71a4861f2698351659af8ac8a1d06e10d442a7cbb
  • Instruction ID: 367a1d83a99bf148e6fbc4fca14e7adc6aacefcdc48a1a5d289bf51481118d7e
  • Opcode Fuzzy Hash: a18e2ed12fc1e9b26480c7b71a4861f2698351659af8ac8a1d06e10d442a7cbb
  • Instruction Fuzzy Hash: 82F03075940348EFEB10DF94E985B5E7BB5EB89750F2081A4E8055B340D672EE80CBD1
APIs
  • EnumSystemLocalesW.KERNEL32(00000000,00000001), ref: 00AE5FA9
Memory Dump Source
  • Source File: 00000002.00000002.1480643754.0000000000A73000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
  • Associated: 00000002.00000002.1480610957.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000A6D000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000B0F000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480751496.0000000000B11000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480793467.0000000000B37000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480813702.0000000000B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B3D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B59000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_a20000_ForkieByKKosty4ka.jbxd
Similarity
  • API ID: EnumLocalesSystem
  • String ID:
  • API String ID: 2099609381-0
  • Opcode ID: 8539f1650bed94a10f8feaa40469359ba9abcbb567ddde39ddce276fe7a34c11
  • Instruction ID: e8f27a461ff4e710292f9720b8444ff8067ade2f57e221a22f97631bad432368
  • Opcode Fuzzy Hash: 8539f1650bed94a10f8feaa40469359ba9abcbb567ddde39ddce276fe7a34c11
  • Instruction Fuzzy Hash: A5F0A7B5D04388AFDF00EBB4E807A9E7B749B01301F0040A5F84597341EE71661DCB92
APIs
  • SetUnhandledExceptionFilter.KERNEL32(00A6E469), ref: 00A76058
Memory Dump Source
  • Source File: 00000002.00000002.1480643754.0000000000A73000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
  • Associated: 00000002.00000002.1480610957.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000A6D000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000B0F000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480751496.0000000000B11000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480793467.0000000000B37000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480813702.0000000000B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B3D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B59000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_a20000_ForkieByKKosty4ka.jbxd
Similarity
  • API ID: ExceptionFilterUnhandled
  • String ID:
  • API String ID: 3192549508-0
  • Opcode ID: 45951bf638628437f5d3748e21205e246fb838ede21845eaa74e1f27c26d1665
  • Instruction ID: be2f04940a7ad4f218b8f5181a641b1e8d34a96f521e7087b4165ba0977f5dac
  • Opcode Fuzzy Hash: 45951bf638628437f5d3748e21205e246fb838ede21845eaa74e1f27c26d1665
  • Instruction Fuzzy Hash: 01A0223008030CB302002BF2BC0E8083B2CF000B223280800F20C828208EC3202000A3
Memory Dump Source
  • Source File: 00000002.00000002.1480643754.0000000000A73000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
  • Associated: 00000002.00000002.1480610957.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000A6D000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000B0F000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480751496.0000000000B11000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480793467.0000000000B37000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480813702.0000000000B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B3D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B59000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_a20000_ForkieByKKosty4ka.jbxd
Similarity
  • API ID:
  • String ID:
  • API String ID:
  • Opcode ID: 96f71abc6a61aeea27e477f0be29e4f9b3fd2b393605829c4231d1e46edd81c9
  • Instruction ID: cd474864ecd705db5db7e308a8c0d6ca96dc369111c5384889867070d0bd4640
  • Opcode Fuzzy Hash: 96f71abc6a61aeea27e477f0be29e4f9b3fd2b393605829c4231d1e46edd81c9
  • Instruction Fuzzy Hash: EBE02234F0C3CAAACF228BA48002BFE7BF88F53304F1800C4D44117242C1ABC90AE762
Memory Dump Source
  • Source File: 00000002.00000002.1480643754.0000000000A73000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
  • Associated: 00000002.00000002.1480610957.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000A6D000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000B0F000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480751496.0000000000B11000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480793467.0000000000B37000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480813702.0000000000B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B3D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B59000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_a20000_ForkieByKKosty4ka.jbxd
Similarity
  • API ID:
  • String ID:
  • API String ID:
  • Opcode ID: 444943a13ae2ffb8ab67dbbfae9924854bd6ff28f0f721fd2be7c0ad30b87760
  • Instruction ID: ba854f986479e451af1ba97555a9220b1e7abfee2e4744bbe43f7948b924ea3b
  • Opcode Fuzzy Hash: 444943a13ae2ffb8ab67dbbfae9924854bd6ff28f0f721fd2be7c0ad30b87760
  • Instruction Fuzzy Hash: 5FE048B6900248EBCB15DB54D942A5AB374E754310F244659F80D4B301E535EF11C691
Memory Dump Source
  • Source File: 00000002.00000002.1480643754.0000000000A6D000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
  • Associated: 00000002.00000002.1480610957.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000A73000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000B0F000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480751496.0000000000B11000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480793467.0000000000B37000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480813702.0000000000B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B3D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B59000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_a20000_ForkieByKKosty4ka.jbxd
Similarity
  • API ID:
  • String ID:
  • API String ID:
  • Opcode ID: 9dc5cfb00b0a832793ec46a1cf6020460bb34e82a8248cf7c8624f99aefc75f9
  • Instruction ID: a94bde22d71b713cfe07ececace54c385913ec22595d3d6ec688cd1e8ae482d0
  • Opcode Fuzzy Hash: 9dc5cfb00b0a832793ec46a1cf6020460bb34e82a8248cf7c8624f99aefc75f9
  • Instruction Fuzzy Hash:
Memory Dump Source
  • Source File: 00000002.00000002.1480643754.0000000000A6D000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
  • Associated: 00000002.00000002.1480610957.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000A73000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000B0F000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480751496.0000000000B11000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480793467.0000000000B37000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480813702.0000000000B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B3D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B59000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_a20000_ForkieByKKosty4ka.jbxd
Similarity
  • API ID:
  • String ID:
  • API String ID:
  • Opcode ID: c0538d92690580f435eaf8b7a82d857e69d8b4c7600d87bd2e9474c74118484d
  • Instruction ID: 26ef7044ebf832acdaef467249ba3c80596c062299c0921c198ad63a0c751813
  • Opcode Fuzzy Hash: c0538d92690580f435eaf8b7a82d857e69d8b4c7600d87bd2e9474c74118484d
  • Instruction Fuzzy Hash:
Memory Dump Source
  • Source File: 00000002.00000002.1480643754.0000000000A6D000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
  • Associated: 00000002.00000002.1480610957.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000A73000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000B0F000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480751496.0000000000B11000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480793467.0000000000B37000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480813702.0000000000B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B3D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B59000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_a20000_ForkieByKKosty4ka.jbxd
Similarity
  • API ID:
  • String ID:
  • API String ID:
  • Opcode ID: b9a67bfcb3bb4f8734b4a3997206c0ede4099513db003de9bf1d676a18511b2f
  • Instruction ID: e28f99d9186e28b9d77ab939f990ad8e8d8679759fa9ba6b868e20004b22b0ab
  • Opcode Fuzzy Hash: b9a67bfcb3bb4f8734b4a3997206c0ede4099513db003de9bf1d676a18511b2f
  • Instruction Fuzzy Hash:
Memory Dump Source
  • Source File: 00000002.00000002.1480643754.0000000000A6D000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
  • Associated: 00000002.00000002.1480610957.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000A73000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000B0F000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480751496.0000000000B11000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480793467.0000000000B37000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480813702.0000000000B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B3D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B59000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_a20000_ForkieByKKosty4ka.jbxd
Similarity
  • API ID:
  • String ID:
  • API String ID:
  • Opcode ID: 0dcbe99b0b95b9213226b184d49d5136edcd1ab572c93f68bc0005ca3a5fcc68
  • Instruction ID: 036c01a56f460dbd254e48ff6fbc7de07835bc8c1a61c46ab04f81189e34a639
  • Opcode Fuzzy Hash: 0dcbe99b0b95b9213226b184d49d5136edcd1ab572c93f68bc0005ca3a5fcc68
  • Instruction Fuzzy Hash:
Memory Dump Source
  • Source File: 00000002.00000002.1480643754.0000000000A6D000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
  • Associated: 00000002.00000002.1480610957.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000A73000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000B0F000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480751496.0000000000B11000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480793467.0000000000B37000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480813702.0000000000B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B3D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B59000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_a20000_ForkieByKKosty4ka.jbxd
Similarity
  • API ID:
  • String ID:
  • API String ID:
  • Opcode ID: 2aa734b617cbfa559c65c032faac63661f3f8425b15eb1ee6d6552e6a40054e7
  • Instruction ID: c60f4e4fac0fb37915a88cd628fb57838f80cf1e7224e1894b3713daba60a871
  • Opcode Fuzzy Hash: 2aa734b617cbfa559c65c032faac63661f3f8425b15eb1ee6d6552e6a40054e7
  • Instruction Fuzzy Hash:
Memory Dump Source
  • Source File: 00000002.00000002.1480643754.0000000000A6D000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
  • Associated: 00000002.00000002.1480610957.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000A73000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000B0F000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480751496.0000000000B11000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480793467.0000000000B37000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480813702.0000000000B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B3D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B59000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_a20000_ForkieByKKosty4ka.jbxd
Similarity
  • API ID:
  • String ID:
  • API String ID:
  • Opcode ID: 06ea879092edb4892e88a861bb063849d215a765e1a5f81b250b17f6c68218a4
  • Instruction ID: bb4b378f5f19ca7ce6c44e77d385d5b0ac2578b7971f58c4e494c47da2d95a45
  • Opcode Fuzzy Hash: 06ea879092edb4892e88a861bb063849d215a765e1a5f81b250b17f6c68218a4
  • Instruction Fuzzy Hash:
APIs
  • GetModuleHandleExW.KERNEL32(00000006,?,00000000), ref: 00A8C330
Strings
  • wcscpy_s(message_buffer, 4096, L"_CrtDbgReport: String too long or IO Error"), xrefs: 00A8C72C
  • Microsoft Visual C++ Runtime Library, xrefs: 00A8C758
  • ..., xrefs: 00A8C5FF
  • _CrtDbgReport: String too long or IO Error, xrefs: 00A8C731
  • (*_errno()), xrefs: 00A8C6EC
  • common_message_window, xrefs: 00A8C3AB, 00A8C6E7, 00A8C727
  • minkernel\crts\ucrt\src\appcrt\misc\dbgrpt.cpp, xrefs: 00A8C3A6, 00A8C6E2, 00A8C722
  • traits::tcscpy_s(program_name, (sizeof(*__countof_helper(program_name)) + 0), get_program_name_unknown_text(Character())), xrefs: 00A8C3B0
  • @, xrefs: 00A8C490
  • @, xrefs: 00A8C3FC
Memory Dump Source
  • Source File: 00000002.00000002.1480643754.0000000000A73000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
  • Associated: 00000002.00000002.1480610957.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000A6D000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000B0F000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480751496.0000000000B11000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480793467.0000000000B37000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480813702.0000000000B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B3D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B59000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_a20000_ForkieByKKosty4ka.jbxd
Similarity
  • API ID: HandleModule
  • String ID: (*_errno())$...$@$@$Microsoft Visual C++ Runtime Library$_CrtDbgReport: String too long or IO Error$common_message_window$minkernel\crts\ucrt\src\appcrt\misc\dbgrpt.cpp$traits::tcscpy_s(program_name, (sizeof(*__countof_helper(program_name)) + 0), get_program_name_unknown_text(Character()))$wcscpy_s(message_buffer, 4096, L"_CrtDbgReport: String too long or IO Error")
  • API String ID: 4139908857-1633980848
  • Opcode ID: 1dfb374b9bcc15543f71c0d10109e18970e96be66c7b4cf1a4d1536063bc1662
  • Instruction ID: e9cfa1253eecc331b6acf9ae28608b8157bd4a942cdc97b31d595b36b948b146
  • Opcode Fuzzy Hash: 1dfb374b9bcc15543f71c0d10109e18970e96be66c7b4cf1a4d1536063bc1662
  • Instruction Fuzzy Hash: 72D16EB1900228DFDB28EF54CC4DBDEB7B5AB69714F1040E9E60967280D7B09AD5CFA1
Strings
  • wcsncpy_s(pch, progname_size - (pch - progname), L"...", 3), xrefs: 00A8E6C6
  • Microsoft Visual C++ Runtime Library, xrefs: 00A8E765
  • <program name unknown>, xrefs: 00A8E66D
  • wcscpy_s(progname, progname_size, L"<program name unknown>"), xrefs: 00A8E668
  • Runtime Error!Program: , xrefs: 00A8E60E
  • wcscat_s(outmsg, (sizeof(*__countof_helper(outmsg)) + 0), L"\n\n"), xrefs: 00A8E706
  • ..., xrefs: 00A8E6CD
  • wcscpy_s(outmsg, (sizeof(*__countof_helper(outmsg)) + 0), L"Runtime Error!\n\nProgram: "), xrefs: 00A8E609
  • wcscat_s(outmsg, (sizeof(*__countof_helper(outmsg)) + 0), message), xrefs: 00A8E73C
  • __acrt_report_runtime_error, xrefs: 00A8E604, 00A8E663, 00A8E6C1, 00A8E701, 00A8E737
  • minkernel\crts\ucrt\src\appcrt\internal\report_runtime_error.cpp, xrefs: 00A8E5FF, 00A8E65E, 00A8E6BC, 00A8E6FC, 00A8E732
Memory Dump Source
  • Source File: 00000002.00000002.1480643754.0000000000A73000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
  • Associated: 00000002.00000002.1480610957.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000A6D000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000B0F000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480751496.0000000000B11000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480793467.0000000000B37000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480813702.0000000000B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B3D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B59000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_a20000_ForkieByKKosty4ka.jbxd
Similarity
  • API ID:
  • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program: $__acrt_report_runtime_error$minkernel\crts\ucrt\src\appcrt\internal\report_runtime_error.cpp$wcscat_s(outmsg, (sizeof(*__countof_helper(outmsg)) + 0), L"\n\n")$wcscat_s(outmsg, (sizeof(*__countof_helper(outmsg)) + 0), message)$wcscpy_s(outmsg, (sizeof(*__countof_helper(outmsg)) + 0), L"Runtime Error!\n\nProgram: ")$wcscpy_s(progname, progname_size, L"<program name unknown>")$wcsncpy_s(pch, progname_size - (pch - progname), L"...", 3)
  • API String ID: 0-4242594854
  • Opcode ID: 0c2f9ae5089080c11e98cdd0a3b01c50f424798622dd6e64850f41a69d52765e
  • Instruction ID: 71442913751d2de64cfe1ac4fd7cacfdb305dcea479216f04bf6ac041193a209
  • Opcode Fuzzy Hash: 0c2f9ae5089080c11e98cdd0a3b01c50f424798622dd6e64850f41a69d52765e
  • Instruction Fuzzy Hash: 9A41B6B6F81304F7DB04FAA49D43F9E76B59B94B00F5484A4B9047B3D2EAB19B408792
APIs
  • failwithmessage.LIBCMTD ref: 00A7466D
    • Part of subcall function 00A74950: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00A74702,000000FF,00000000,00000000,?), ref: 00A749B1
    • Part of subcall function 00A74950: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00A74702,000000FF,?,00000000), ref: 00A749D0
    • Part of subcall function 00A74950: DebuggerProbe.LIBCMTD ref: 00A749EA
    • Part of subcall function 00A74950: DebuggerRuntime.LIBCMTD ref: 00A74A06
    • Part of subcall function 00A74950: IsDebuggerPresent.KERNEL32 ref: 00A74A2F
  • _getMemBlockDataString.LIBCMTD ref: 00A74699
  • failwithmessage.LIBCMTD ref: 00A746FD
Strings
  • Stack area around _alloca memory reserved by this function is corrupted, xrefs: 00A746CF
  • Stack area around _alloca memory reserved by this function is corrupted, xrefs: 00A74664
  • Allocation number within this function: , xrefs: 00A746BE
  • %s%s%p%s%zd%s%d%s%s%s%s%s, xrefs: 00A746D4
  • Data: <, xrefs: 00A746B3
  • Size: , xrefs: 00A746C4
  • Address: 0x, xrefs: 00A746CA
Memory Dump Source
  • Source File: 00000002.00000002.1480643754.0000000000A73000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
  • Associated: 00000002.00000002.1480610957.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000A6D000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000B0F000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480751496.0000000000B11000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480793467.0000000000B37000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480813702.0000000000B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B3D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B59000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_a20000_ForkieByKKosty4ka.jbxd
Similarity
  • API ID: Debugger$ByteCharMultiWidefailwithmessage$BlockDataPresentProbeRuntimeString_get
  • String ID: Address: 0x$Allocation number within this function: $Data: <$Size: $%s%s%p%s%zd%s%d%s%s%s%s%s$Stack area around _alloca memory reserved by this function is corrupted$Stack area around _alloca memory reserved by this function is corrupted
  • API String ID: 4067135985-3301296223
  • Opcode ID: 90c812b3f1ee8dc500851e8ac680c0fac675a3043fc995c92109f7341117bc5c
  • Instruction ID: 121d3d79bbc118399aa57e7650fbec4c4c7ba5429860be53b06b6fcb9fcbba1a
  • Opcode Fuzzy Hash: 90c812b3f1ee8dc500851e8ac680c0fac675a3043fc995c92109f7341117bc5c
  • Instruction Fuzzy Hash: DD2183B6A40208ABCB10DF94DD82EEF77BCEB49710F4041A5FA1CE71D1DA709D558754
Strings
Memory Dump Source
  • Source File: 00000002.00000002.1480643754.0000000000A73000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
  • Associated: 00000002.00000002.1480610957.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000A6D000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000B0F000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480751496.0000000000B11000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480793467.0000000000B37000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480813702.0000000000B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B3D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B59000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_a20000_ForkieByKKosty4ka.jbxd
Similarity
  • API ID:
  • String ID: "$"$%ls$("Buffer too small", 0)$*$*$_wctomb_s_l$destination_count <= INT_MAX$destination_count > 0$minkernel\crts\ucrt\src\appcrt\convert\wctomb.cpp
  • API String ID: 0-2198373435
  • Opcode ID: c48990a2e58f9e827753a72b619b0216d4bb5d86ddb209ef70d08715f21f68ec
  • Instruction ID: 1c284c8d938600a7c73fc0e3ec41c5aa1561896a1736b32aaed3abd2ea5e9996
  • Opcode Fuzzy Hash: c48990a2e58f9e827753a72b619b0216d4bb5d86ddb209ef70d08715f21f68ec
  • Instruction Fuzzy Hash: 6DB19070E00248EFDF14EF91D94ABEE77B0BF14744F20846AE5192B2D1DBB85A84CB91
APIs
  • _cmpDWORD.LIBCMTD ref: 00B0A7FC
    • Part of subcall function 00B09EF0: _cmpBYTE.LIBCMTD ref: 00B09F26
  • _cmpDWORD.LIBCMTD ref: 00B0A823
Memory Dump Source
  • Source File: 00000002.00000002.1480643754.0000000000A73000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
  • Associated: 00000002.00000002.1480610957.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000A6D000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000B0F000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480751496.0000000000B11000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480793467.0000000000B37000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480813702.0000000000B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B3D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B59000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_a20000_ForkieByKKosty4ka.jbxd
Similarity
  • API ID: _cmp
  • String ID:
  • API String ID: 2028851527-0
  • Opcode ID: dcf5647540f9869c7e8f67cfd3f3416951bda7d1ccddd060f364bd93f6ce725b
  • Instruction ID: d141457cb14c2915f6362cdaa55d860478d35527b9bac42df2ce2ef5698b9289
  • Opcode Fuzzy Hash: dcf5647540f9869c7e8f67cfd3f3416951bda7d1ccddd060f364bd93f6ce725b
  • Instruction Fuzzy Hash: 7051EAB1E00208EFCB04DFACDA98A9E7FF5EB40301F51C598E409AB286D630AF44DB51
APIs
  • std::exception::exception.LIBCMTD ref: 00AD8945
Strings
Memory Dump Source
  • Source File: 00000002.00000002.1480643754.0000000000A73000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
  • Associated: 00000002.00000002.1480610957.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000A6D000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000B0F000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480751496.0000000000B11000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480793467.0000000000B37000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480813702.0000000000B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B3D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B59000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_a20000_ForkieByKKosty4ka.jbxd
Similarity
  • API ID: std::exception::exception
  • String ID: %ls$*$?$common_expand_argv_wildcards$minkernel\crts\ucrt\src\appcrt\startup\argv_wildcards.cpp$result != nullptr$traits::tcsncpy_s( character_it, character_count - (character_it - character_first), *it, count)
  • API String ID: 2807920213-976376051
  • Opcode ID: d6e4e25024ca9d64d790ad33b8432775270b854bc5cb787235cc58f3c8425703
  • Instruction ID: 9e520441ae4197986ba7f3b80df489db051992065d3300dce63e21088d92c8bc
  • Opcode Fuzzy Hash: d6e4e25024ca9d64d790ad33b8432775270b854bc5cb787235cc58f3c8425703
  • Instruction Fuzzy Hash: 799117B1D00208EFDB04EFE4D992BEEB7B4AF54304F24456AE4167B391EB74AA44CB51
APIs
Strings
  • minkernel\crts\ucrt\src\appcrt\locale\get_qualified_locale.cpp, xrefs: 00AE4676, 00AE4774
  • wcsncpy_s(lpOutStr->szLocaleName, (sizeof(*__countof_helper(lpOutStr->szLocaleName)) + 0), _psetloc_data->_cacheLocaleName, wcslen, xrefs: 00AE4680
  • __acrt_get_qualified_locale, xrefs: 00AE467B, 00AE4779
  • utf8, xrefs: 00AE4785
  • wcsncpy_s(lpOutStr->szCodePage, (sizeof(*__countof_helper(lpOutStr->szCodePage)) + 0), L"utf8", 5), xrefs: 00AE477E
Memory Dump Source
  • Source File: 00000002.00000002.1480643754.0000000000A73000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
  • Associated: 00000002.00000002.1480610957.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000A6D000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000B0F000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480751496.0000000000B11000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480793467.0000000000B37000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480813702.0000000000B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B3D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B59000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_a20000_ForkieByKKosty4ka.jbxd
Similarity
  • API ID: CodePageValid
  • String ID: __acrt_get_qualified_locale$minkernel\crts\ucrt\src\appcrt\locale\get_qualified_locale.cpp$utf8$wcsncpy_s(lpOutStr->szCodePage, (sizeof(*__countof_helper(lpOutStr->szCodePage)) + 0), L"utf8", 5)$wcsncpy_s(lpOutStr->szLocaleName, (sizeof(*__countof_helper(lpOutStr->szLocaleName)) + 0), _psetloc_data->_cacheLocaleName, wcslen
  • API String ID: 1911128615-3002009667
  • Opcode ID: 7d4e20c2441b8fac55ecc3bbf7797383121fa1948d53a4c85b4b9efcfb90e3f8
  • Instruction ID: e553b44e6830ccdb6e4bf46ee7a56dbf8381469c7c7fa88ecf0b69dec1819992
  • Opcode Fuzzy Hash: 7d4e20c2441b8fac55ecc3bbf7797383121fa1948d53a4c85b4b9efcfb90e3f8
  • Instruction Fuzzy Hash: 5F91E2B0A00244EBEB04DF66CD46B6E73B9AF48704F148568F9059B3C2E775EE50DB90
APIs
Strings
Memory Dump Source
  • Source File: 00000002.00000002.1480643754.0000000000A73000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
  • Associated: 00000002.00000002.1480610957.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000A6D000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000B0F000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480751496.0000000000B11000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480793467.0000000000B37000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480813702.0000000000B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B3D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B59000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_a20000_ForkieByKKosty4ka.jbxd
Similarity
  • API ID: und_strncmp
  • String ID: @$`generic-type-$`template-parameter-$generic-type-$template-parameter-
  • API String ID: 2034953485-3433397351
  • Opcode ID: f11a2066aa67ca98710c5d277278e7828d34dbc8264c693757a49c6a79c5b49a
  • Instruction ID: 7897a83566d935ebfc8e2e3bde1feeee68ef8c4e79018bb840e077bde19e22d0
  • Opcode Fuzzy Hash: f11a2066aa67ca98710c5d277278e7828d34dbc8264c693757a49c6a79c5b49a
  • Instruction Fuzzy Hash: EAA180B1D042089FDB04EFA4DD91EEEBBB5BF58300F244129F916AB261EF309A44CB51
APIs
  • HeapSize.KERNEL32(012A0000,00000000,00000000), ref: 00AEDB45
  • HeapReAlloc.KERNEL32(012A0000,00000010,00000000,?), ref: 00AEDB7A
Strings
Memory Dump Source
  • Source File: 00000002.00000002.1480643754.0000000000A73000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
  • Associated: 00000002.00000002.1480610957.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000A6D000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000B0F000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480751496.0000000000B11000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480793467.0000000000B37000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480813702.0000000000B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B3D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B59000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_a20000_ForkieByKKosty4ka.jbxd
Similarity
  • API ID: Heap$AllocSize
  • String ID: %ls$_expand_base$block != nullptr$minkernel\crts\ucrt\src\appcrt\heap\expand.cpp
  • API String ID: 3906553864-3244948836
  • Opcode ID: 8624e90fdfe784a354a017f7bdd3ca7b00d8c513032d0a246b5518dcb0e8fd81
  • Instruction ID: b725e53d6ac79a02eaeb3a5d77b9f156d946d3066e458298911a5e0ba995fbfe
  • Opcode Fuzzy Hash: 8624e90fdfe784a354a017f7bdd3ca7b00d8c513032d0a246b5518dcb0e8fd81
  • Instruction Fuzzy Hash: AB31CFB0E04348EFDB10EFA5DC46BAE7BB5EB54740F218954F515AB2C0E7B49A80CB91
APIs
  • MessageBoxW.USER32(00000000,This PC has been recycled by KKosty4ka...,h a v e f u n,00001030), ref: 00A73B4B
  • Sleep.KERNEL32(00001388), ref: 00A73B5F
  • MessageBoxW.USER32(00000000,I'm Forkie.I just wiped this VMand it's only copy in in memory.If you reboot, all data will be lost.Have fun! - KKosty4ka,Forkie by KKosty4ka,00000030), ref: 00A73B85
Strings
  • Forkie by KKosty4ka, xrefs: 00A73B79
  • This PC has been recycled by KKosty4ka..., xrefs: 00A73B44
  • I'm Forkie.I just wiped this VMand it's only copy in in memory.If you reboot, all data will be lost.Have fun! - KKosty4ka, xrefs: 00A73B7E
  • h a v e f u n, xrefs: 00A73B3F
Memory Dump Source
  • Source File: 00000002.00000002.1480643754.0000000000A73000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
  • Associated: 00000002.00000002.1480610957.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000A6D000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000B0F000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480751496.0000000000B11000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480793467.0000000000B37000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480813702.0000000000B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B3D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B59000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_a20000_ForkieByKKosty4ka.jbxd
Similarity
  • API ID: Message$Sleep
  • String ID: Forkie by KKosty4ka$I'm Forkie.I just wiped this VMand it's only copy in in memory.If you reboot, all data will be lost.Have fun! - KKosty4ka$This PC has been recycled by KKosty4ka...$h a v e f u n
  • API String ID: 3822036148-1844201075
  • Opcode ID: abae609f34336ef00cda9d27b2fe3b68f856f821303d9b7dc6e6b340b0879003
  • Instruction ID: 6c5ba960203e3351341e7c73b415063e7a63d42bc160bff246cad4c64e133e27
  • Opcode Fuzzy Hash: abae609f34336ef00cda9d27b2fe3b68f856f821303d9b7dc6e6b340b0879003
  • Instruction Fuzzy Hash: 03F0C837B842146BE620339DAC17FAA76689740792F9106A0FE59772D299865D8081D3
APIs
  • _cmpDWORD.LIBCMTD ref: 00B0A5A4
    • Part of subcall function 00B09EF0: _cmpBYTE.LIBCMTD ref: 00B09F26
  • _cmpDWORD.LIBCMTD ref: 00B0A5CB
Memory Dump Source
  • Source File: 00000002.00000002.1480643754.0000000000A73000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
  • Associated: 00000002.00000002.1480610957.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000A6D000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000B0F000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480751496.0000000000B11000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480793467.0000000000B37000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480813702.0000000000B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B3D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B59000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_a20000_ForkieByKKosty4ka.jbxd
Similarity
  • API ID: _cmp
  • String ID:
  • API String ID: 2028851527-0
  • Opcode ID: 2640301d4570daf9c888c71c09274a33e47595d280c6422622a01629a6ba161a
  • Instruction ID: a8316002bec3432fc131df8a1cee1e2dce979b75a5dede0801218097b0996769
  • Opcode Fuzzy Hash: 2640301d4570daf9c888c71c09274a33e47595d280c6422622a01629a6ba161a
  • Instruction Fuzzy Hash: F8311E71900208EFCB04DFBCDA98A9D7FF5AB40305F55C598F409AB286E635AF44DB91
APIs
  • _cmpDWORD.LIBCMTD ref: 00B0A6D0
    • Part of subcall function 00B09EF0: _cmpBYTE.LIBCMTD ref: 00B09F26
  • _cmpDWORD.LIBCMTD ref: 00B0A6F7
Memory Dump Source
  • Source File: 00000002.00000002.1480643754.0000000000A73000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
  • Associated: 00000002.00000002.1480610957.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000A6D000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000B0F000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480751496.0000000000B11000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480793467.0000000000B37000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480813702.0000000000B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B3D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B59000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_a20000_ForkieByKKosty4ka.jbxd
Similarity
  • API ID: _cmp
  • String ID:
  • API String ID: 2028851527-0
  • Opcode ID: cab4e5dea73df74ae65bb80adee57d74dc798646feee793aae844ddc1c4fb3b9
  • Instruction ID: d6a3e44f61142912dc212a86ec54e988efeca8998174277b3229ebad80a88941
  • Opcode Fuzzy Hash: cab4e5dea73df74ae65bb80adee57d74dc798646feee793aae844ddc1c4fb3b9
  • Instruction Fuzzy Hash: 5F312D71900208EFCB04DFBCDA89A9D7FF5AB40345F61C598F409AB286D630AF44EB91
Strings
Memory Dump Source
  • Source File: 00000002.00000002.1480643754.0000000000A73000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
  • Associated: 00000002.00000002.1480610957.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000A6D000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000B0F000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480751496.0000000000B11000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480793467.0000000000B37000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480813702.0000000000B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B3D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B59000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_a20000_ForkieByKKosty4ka.jbxd
Similarity
  • API ID:
  • String ID: %ls$_wcstombs_l_helper$minkernel\crts\ucrt\src\appcrt\convert\wcstombs.cpp$pwcs != nullptr
  • API String ID: 0-287901994
  • Opcode ID: 0f0cf60533d35ea368f642b6638ed7675b44791d3f3a14c30bce58eb94c1b53d
  • Instruction ID: 32d46d03f99f924f89c0c2a47e5cbb2b214380415dcf1a1c05ea006a4c4be1ac
  • Opcode Fuzzy Hash: 0f0cf60533d35ea368f642b6638ed7675b44791d3f3a14c30bce58eb94c1b53d
  • Instruction Fuzzy Hash: 891213B0A00209EFDB14DFA4D994FADB7B1BF54350F208259F625AB292D774AA41CF80
APIs
  • Is_bad_exception_allowed.LIBVCRUNTIMED ref: 00A89B09
  • CatchIt.LIBCMTD ref: 00A89D03
Strings
Memory Dump Source
  • Source File: 00000002.00000002.1480643754.0000000000A73000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
  • Associated: 00000002.00000002.1480610957.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000A6D000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000B0F000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480751496.0000000000B11000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480793467.0000000000B37000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480813702.0000000000B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B3D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B59000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_a20000_ForkieByKKosty4ka.jbxd
Similarity
  • API ID: CatchIs_bad_exception_allowed
  • String ID: csm$csm$csm
  • API String ID: 974221251-393685449
  • Opcode ID: c635bcc587df01c3ac2da5b8668f77e92a8aeafe8a366eca20090aa46e79c4a1
  • Instruction ID: 824f890d847a1b03d81c66fe41d927a9723f57867646b371b88595d39dfd28df
  • Opcode Fuzzy Hash: c635bcc587df01c3ac2da5b8668f77e92a8aeafe8a366eca20090aa46e79c4a1
  • Instruction Fuzzy Hash: 16F16EB5A00209EFCB08EFA4D981AFF7BB5BF54340F188559F8155B241DB31EA45CBA1
APIs
  • std::exception::exception.LIBCMTD ref: 00AD8CDF
Strings
Memory Dump Source
  • Source File: 00000002.00000002.1480643754.0000000000A73000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
  • Associated: 00000002.00000002.1480610957.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000A6D000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000B0F000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480751496.0000000000B11000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480793467.0000000000B37000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480813702.0000000000B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B3D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B59000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_a20000_ForkieByKKosty4ka.jbxd
Similarity
  • API ID: std::exception::exception
  • String ID: %ls$common_expand_argv_wildcards$minkernel\crts\ucrt\src\appcrt\startup\argv_wildcards.cpp$result != nullptr$traits::tcsncpy_s( character_it, character_count - (character_it - character_first), *it, count)
  • API String ID: 2807920213-1103401458
  • Opcode ID: db60eba9ed34477084e9a2af8cd478a56e5614945ca098a7dc78224544a72bbd
  • Instruction ID: af7bdb0fd47e2311926a5f740fe8b14eed61bba026c34a9b1de649cf18210951
  • Opcode Fuzzy Hash: db60eba9ed34477084e9a2af8cd478a56e5614945ca098a7dc78224544a72bbd
  • Instruction Fuzzy Hash: 41A12AB0D00209DFDB14EF94D982BEEB7B5BF58300F24412AE506BB395EB74AA45CB51
Strings
Memory Dump Source
  • Source File: 00000002.00000002.1480643754.0000000000A73000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
  • Associated: 00000002.00000002.1480610957.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000A6D000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000B0F000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480751496.0000000000B11000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480793467.0000000000B37000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480813702.0000000000B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B3D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B59000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_a20000_ForkieByKKosty4ka.jbxd
Similarity
  • API ID:
  • String ID: %ls$C:\Users\user\Desktop\ForkieByKKosty4ka.exe$common_configure_argv$minkernel\crts\ucrt\src\appcrt\startup\argv_parsing.cpp$mode == _crt_argv_expanded_arguments || mode == _crt_argv_unexpanded_arguments
  • API String ID: 0-2458879550
  • Opcode ID: ac61946173b83e0bc1c367e02dd737cfd8092245668c17c2ceafe16b7396cd94
  • Instruction ID: 6342a0d4ec8c7bbfba984f60389bf4346de047abccffeaf18f2c896801b16a3b
  • Opcode Fuzzy Hash: ac61946173b83e0bc1c367e02dd737cfd8092245668c17c2ceafe16b7396cd94
  • Instruction Fuzzy Hash: C5714AB1D00209EFDB14FFE4D986BEEB7B5AF54304F204169E5066B292EB705A44CBA1
Strings
Memory Dump Source
  • Source File: 00000002.00000002.1480643754.0000000000A73000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
  • Associated: 00000002.00000002.1480610957.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000A6D000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000B0F000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480751496.0000000000B11000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480793467.0000000000B37000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480813702.0000000000B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B3D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B59000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_a20000_ForkieByKKosty4ka.jbxd
Similarity
  • API ID:
  • String ID: %ls$(_osfile(fh) & FOPEN)$(fh >= 0 && (unsigned)fh < (unsigned)_nhandle)$_close$minkernel\crts\ucrt\src\appcrt\lowio\close.cpp
  • API String ID: 0-1433886027
  • Opcode ID: 1a8e3605f3c16d066f177adc285cb2a70f1a928ae3f097f64d1c0dd41f857140
  • Instruction ID: c0448ed0b11fa49a66d7f63562f56bac149184c57ac856cb8cac1d304674a58b
  • Opcode Fuzzy Hash: 1a8e3605f3c16d066f177adc285cb2a70f1a928ae3f097f64d1c0dd41f857140
  • Instruction Fuzzy Hash: 8331A2B0A84608FEDB249B94CD42BAF3FE0AB21B51F6046C4F1156A5D1D7F18A80CBA1
Strings
Memory Dump Source
  • Source File: 00000002.00000002.1480643754.0000000000A73000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
  • Associated: 00000002.00000002.1480610957.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000A6D000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000B0F000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480751496.0000000000B11000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480793467.0000000000B37000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480813702.0000000000B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B3D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B59000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_a20000_ForkieByKKosty4ka.jbxd
Similarity
  • API ID:
  • String ID: %ls$(_osfile(fh) & FOPEN)$(fh >= 0 && (unsigned)fh < (unsigned)_nhandle)$_commit$minkernel\crts\ucrt\src\appcrt\lowio\commit.cpp
  • API String ID: 0-1026578051
  • Opcode ID: 1f307f4df37569ab6932e35f9cbf65f908c83489a816d231a9285c2666f01919
  • Instruction ID: e02d33c1442d29a75b4418d5c6b04cb69924b4b8c0ed6825fae442a7f928a272
  • Opcode Fuzzy Hash: 1f307f4df37569ab6932e35f9cbf65f908c83489a816d231a9285c2666f01919
  • Instruction Fuzzy Hash: 1B31A970E80204BADB24DB98CC87BED7FF4AB50B15F608BD4F5252E1D2D7B086908791
APIs
  • _cmpDWORD.LIBCMTD ref: 00B0A48C
    • Part of subcall function 00B09EF0: _cmpBYTE.LIBCMTD ref: 00B09F26
  • _cmpDWORD.LIBCMTD ref: 00B0A4B3
Memory Dump Source
  • Source File: 00000002.00000002.1480643754.0000000000A73000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
  • Associated: 00000002.00000002.1480610957.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000A6D000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000B0F000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480751496.0000000000B11000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480793467.0000000000B37000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480813702.0000000000B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B3D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B59000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_a20000_ForkieByKKosty4ka.jbxd
Similarity
  • API ID: _cmp
  • String ID:
  • API String ID: 2028851527-0
  • Opcode ID: 886a3d6f066865c6bb5d327980fe2796885dd27cc38c0e45858bb95054f92fe6
  • Instruction ID: 7fd9775f9f7c1664f181487158274f33f785fb154d4ee30923cba7461c33d789
  • Opcode Fuzzy Hash: 886a3d6f066865c6bb5d327980fe2796885dd27cc38c0e45858bb95054f92fe6
  • Instruction Fuzzy Hash: 8931ED71900208EFCB04DFBCDA88A9D7FF5AB50305F51C598E409AB296D634EF44DB61
APIs
  • std::_Fac_node::_Fac_node.LIBCPMTD ref: 00A8D058
Strings
Memory Dump Source
  • Source File: 00000002.00000002.1480643754.0000000000A73000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
  • Associated: 00000002.00000002.1480610957.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000A6D000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000B0F000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480751496.0000000000B11000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480793467.0000000000B37000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480813702.0000000000B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B3D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B59000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_a20000_ForkieByKKosty4ka.jbxd
Similarity
  • API ID: Fac_nodeFac_node::_std::_
  • String ID: %ls$common_set_report_hook$minkernel\crts\ucrt\src\appcrt\misc\dbgrpt.cpp$mode == _CRT_RPTHOOK_INSTALL || mode == _CRT_RPTHOOK_REMOVE$new_hook != nullptr
  • API String ID: 1114552684-2008714909
  • Opcode ID: 161e6e049e714a33051edcc1643ca0eba9d328926044a7d2743acf2d8937ab64
  • Instruction ID: 0aa88b740abcf3c016b0d78a0c93f5ed46da40729c85e5ae4a0304c6801d8fcd
  • Opcode Fuzzy Hash: 161e6e049e714a33051edcc1643ca0eba9d328926044a7d2743acf2d8937ab64
  • Instruction Fuzzy Hash: 7A2186B0E80308BAEB20BB94CC47FEE7BB16B11B25F518194F614291D2D3F55A84CB65
APIs
  • std::_Fac_node::_Fac_node.LIBCPMTD ref: 00A8D1C8
Strings
Memory Dump Source
  • Source File: 00000002.00000002.1480643754.0000000000A73000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
  • Associated: 00000002.00000002.1480610957.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000A6D000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000B0F000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480751496.0000000000B11000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480793467.0000000000B37000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480813702.0000000000B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B3D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B59000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_a20000_ForkieByKKosty4ka.jbxd
Similarity
  • API ID: Fac_nodeFac_node::_std::_
  • String ID: %ls$common_set_report_hook$minkernel\crts\ucrt\src\appcrt\misc\dbgrpt.cpp$mode == _CRT_RPTHOOK_INSTALL || mode == _CRT_RPTHOOK_REMOVE$new_hook != nullptr
  • API String ID: 1114552684-2008714909
  • Opcode ID: 9b810b0a21e732dd1c5cffd7a258dd745fb966d2666d4af6371698f12f6b3e07
  • Instruction ID: dce8cb32e7e629edcef13bc6df0519d03df4585672a559d6e7527b9ea98742ee
  • Opcode Fuzzy Hash: 9b810b0a21e732dd1c5cffd7a258dd745fb966d2666d4af6371698f12f6b3e07
  • Instruction Fuzzy Hash: 0D2186B0E80308BAEB20BF90CC4BBEE7BB06B11B19F518795F514291D2D3F55684CB95
Strings
  • %ls, xrefs: 00AFBE9B
  • minkernel\crts\ucrt\src\appcrt\locale\comparestringa.cpp, xrefs: 00AFBEA4
  • cchCount1==0 && cchCount2==1 || cchCount1==1 && cchCount2==0, xrefs: 00AFBE96
  • minkernel\crts\ucrt\src\appcrt\locale\comparestringa.cpp, xrefs: 00AFC031, 00AFC132
Memory Dump Source
  • Source File: 00000002.00000002.1480643754.0000000000A73000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
  • Associated: 00000002.00000002.1480610957.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000A6D000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000B0F000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480751496.0000000000B11000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480793467.0000000000B37000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480813702.0000000000B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B3D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B59000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_a20000_ForkieByKKosty4ka.jbxd
Similarity
  • API ID:
  • String ID: %ls$cchCount1==0 && cchCount2==1 || cchCount1==1 && cchCount2==0$minkernel\crts\ucrt\src\appcrt\locale\comparestringa.cpp$minkernel\crts\ucrt\src\appcrt\locale\comparestringa.cpp
  • API String ID: 0-1085474390
  • Opcode ID: 7993959913260589bb7a4ad2ccacb9b9ebf609b41c952e527eeaac3da7f8496e
  • Instruction ID: 9c4a7b0f2ebdbfc32409c176f7516791ed8d7700f5a672c5496ef3b0a99b6e98
  • Opcode Fuzzy Hash: 7993959913260589bb7a4ad2ccacb9b9ebf609b41c952e527eeaac3da7f8496e
  • Instruction Fuzzy Hash: 49E16C71A0010DDBDF14EFE5CA52BFE77B5AB58304F204129F612AB285D739D941CBA0
APIs
  • GetStdHandle.KERNEL32(000000F5), ref: 00AD1DE3
  • GetStdHandle.KERNEL32(000000F4), ref: 00AD1DFD
Strings
Memory Dump Source
  • Source File: 00000002.00000002.1480643754.0000000000A73000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
  • Associated: 00000002.00000002.1480610957.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000A6D000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000B0F000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480751496.0000000000B11000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480793467.0000000000B37000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480813702.0000000000B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B3D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B59000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_a20000_ForkieByKKosty4ka.jbxd
Similarity
  • API ID: Handle
  • String ID: %ls$_CrtSetReportFile$minkernel\crts\ucrt\src\appcrt\misc\dbgrptt.cpp$nRptType >= 0 && nRptType < _CRT_ERRCNT
  • API String ID: 2519475695-1451859211
  • Opcode ID: 2ad17360b95574c6430ebef5d86762182bd98966840f44511b317360cb82073d
  • Instruction ID: 43de833285ddac0700bc06c6df8d4aff5f70075ff04e46142fdea5c3475dc44a
  • Opcode Fuzzy Hash: 2ad17360b95574c6430ebef5d86762182bd98966840f44511b317360cb82073d
  • Instruction Fuzzy Hash: E5218374A44309FBCB20CF64D945B9C7BB1E71A720F208245FD6A573E0DB709680CB51
APIs
Strings
Memory Dump Source
  • Source File: 00000002.00000002.1480643754.0000000000A73000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
  • Associated: 00000002.00000002.1480610957.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000A6D000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000B0F000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480751496.0000000000B11000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480793467.0000000000B37000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480813702.0000000000B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B3D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B59000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_a20000_ForkieByKKosty4ka.jbxd
Similarity
  • API ID: _fix_grouping
  • String ID: %ls$minkernel\crts\ucrt\src\appcrt\locale\initnum.cpp$minkernel\crts\ucrt\src\appcrt\locale\initnum.cpp$ploci->lconv_num_refcount > 0
  • API String ID: 3906328105-162942574
  • Opcode ID: bbf3c7abeedd6f39ebe5a824b4d9b62c6b20424e53cfe40f870a30f87b73654d
  • Instruction ID: 6bad14c4d5b6d3f08d392cdbc03b1e3ae0189d13ce67ae2ec6cde5a56c672a88
  • Opcode Fuzzy Hash: bbf3c7abeedd6f39ebe5a824b4d9b62c6b20424e53cfe40f870a30f87b73654d
  • Instruction Fuzzy Hash: 44C162B1E40218AFDB10DF95C846FEEBBB1FF44304F148568E614AB381D7B5AA85CB91
Strings
  • mode == _crt_argv_expanded_arguments || mode == _crt_argv_unexpanded_arguments, xrefs: 00A8EB1E, 00A8EB66
  • common_configure_argv, xrefs: 00A8EB61
  • %ls, xrefs: 00A8EB23
  • minkernel\crts\ucrt\src\appcrt\startup\argv_parsing.cpp, xrefs: 00A8EB2F, 00A8EB5C
Memory Dump Source
  • Source File: 00000002.00000002.1480643754.0000000000A73000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
  • Associated: 00000002.00000002.1480610957.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000A6D000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000B0F000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480751496.0000000000B11000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480793467.0000000000B37000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480813702.0000000000B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B3D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B59000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_a20000_ForkieByKKosty4ka.jbxd
Similarity
  • API ID:
  • String ID: %ls$common_configure_argv$minkernel\crts\ucrt\src\appcrt\startup\argv_parsing.cpp$mode == _crt_argv_expanded_arguments || mode == _crt_argv_unexpanded_arguments
  • API String ID: 0-3792389471
  • Opcode ID: 53215877f68a9471aebc7f847f1f056d0394c4690529aa9819f9a06b0e3ef578
  • Instruction ID: 5e249a58a406ba9d43b53fed4b69153db52ae05efe5e35d928c7a90b11a6f815
  • Opcode Fuzzy Hash: 53215877f68a9471aebc7f847f1f056d0394c4690529aa9819f9a06b0e3ef578
  • Instruction Fuzzy Hash: D2716DB1E00209EFDB14FFE4D996BEEB7B4AF54704F108169E5027B291EB706A44CB91
Strings
Memory Dump Source
  • Source File: 00000002.00000002.1480643754.0000000000A73000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
  • Associated: 00000002.00000002.1480610957.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000A6D000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000B0F000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480751496.0000000000B11000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480793467.0000000000B37000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480813702.0000000000B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B3D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B59000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_a20000_ForkieByKKosty4ka.jbxd
Similarity
  • API ID:
  • String ID: %ls$cached_fp == invalid_function_sentinel()$cached_fp == new_fp$d:\agent\_work\3\s\src\vctools\crt\vcruntime\src\internal\winapi_downlevel.cpp
  • API String ID: 0-1715344985
  • Opcode ID: 43b4457f90eda92f0adc674adaffcde01f32ded0a9aafd2433f137c1f31ad7ad
  • Instruction ID: b82e512c8d8b2502e5445f846ce1746c66c9a95ea72c67384c7ccf93641000d8
  • Opcode Fuzzy Hash: 43b4457f90eda92f0adc674adaffcde01f32ded0a9aafd2433f137c1f31ad7ad
  • Instruction Fuzzy Hash: 91218571E40309FBCB10FBA4DD46B9E77B4AB14704FA08494F514A7281EE7A9B98CB61
Strings
Memory Dump Source
  • Source File: 00000002.00000002.1480643754.0000000000A73000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
  • Associated: 00000002.00000002.1480610957.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000A6D000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000B0F000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480751496.0000000000B11000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480793467.0000000000B37000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480813702.0000000000B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B3D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B59000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_a20000_ForkieByKKosty4ka.jbxd
Similarity
  • API ID:
  • String ID: %ls$cached_handle == INVALID_HANDLE_VALUE$cached_handle == new_handle$minkernel\crts\ucrt\src\appcrt\internal\winapi_thunks.cpp
  • API String ID: 0-442401637
  • Opcode ID: 0f33db2f4474436cbfdb42243539ecad30db0b34238eff0e2a11fe83affd973d
  • Instruction ID: 38d430aff9c98f526290945d8e0021607737e812f1df8e3b799de9a96ae78a59
  • Opcode Fuzzy Hash: 0f33db2f4474436cbfdb42243539ecad30db0b34238eff0e2a11fe83affd973d
  • Instruction Fuzzy Hash: CC21E470E40349FBCF20DBA4DC4ABAD77B4AB20794F200A54F015672D1EA70AF95CB91
APIs
  • std::_Timevec::_Timevec.LIBCPMTD ref: 00A948CE
Strings
Memory Dump Source
  • Source File: 00000002.00000002.1480643754.0000000000A73000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
  • Associated: 00000002.00000002.1480610957.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000A6D000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000B0F000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480751496.0000000000B11000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480793467.0000000000B37000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480813702.0000000000B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B3D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B59000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_a20000_ForkieByKKosty4ka.jbxd
Similarity
  • API ID: TimevecTimevec::_std::_
  • String ID: %ls$LC_MIN <= _category && _category <= LC_MAX$_wsetlocale$minkernel\crts\ucrt\src\appcrt\locale\wsetlocale.cpp
  • API String ID: 4219598475-2399076032
  • Opcode ID: 881680be9203b04fb10eb9747fd2e7605cd31cf02700688f9241c57cd4f6e0f7
  • Instruction ID: 10fadc969eb03ac6b1a46430c9354ab88802280540b3e2a7e31096a33525eb58
  • Opcode Fuzzy Hash: 881680be9203b04fb10eb9747fd2e7605cd31cf02700688f9241c57cd4f6e0f7
  • Instruction Fuzzy Hash: 3F217CB6E40208FADF10EFE0CD86FEE77F8AB58700F108595F50576181EAB09685CBA1
APIs
  • FlushFileBuffers.KERNEL32(00000000), ref: 00B01BC3
  • GetLastError.KERNEL32 ref: 00B01BD1
Strings
  • minkernel\crts\ucrt\src\appcrt\lowio\commit.cpp, xrefs: 00B01BFD
  • ("Invalid file descriptor. File possibly closed by a different thread",0), xrefs: 00B01BEF
  • %ls, xrefs: 00B01BF4
Memory Dump Source
  • Source File: 00000002.00000002.1480643754.0000000000A73000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
  • Associated: 00000002.00000002.1480610957.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000A6D000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000B0F000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480751496.0000000000B11000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480793467.0000000000B37000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480813702.0000000000B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B3D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B59000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_a20000_ForkieByKKosty4ka.jbxd
Similarity
  • API ID: BuffersErrorFileFlushLast
  • String ID: %ls$("Invalid file descriptor. File possibly closed by a different thread",0)$minkernel\crts\ucrt\src\appcrt\lowio\commit.cpp
  • API String ID: 1917127615-1268643607
  • Opcode ID: aef0f20c1b1a246979f30f73f1772a2887a4055f628a063133da6624a9ca647d
  • Instruction ID: 2b673f434e0ec633a0942263b592814f9b0a8289a132b752e6ae5be0fd31e5fb
  • Opcode Fuzzy Hash: aef0f20c1b1a246979f30f73f1772a2887a4055f628a063133da6624a9ca647d
  • Instruction Fuzzy Hash: B311E134B80200AFCB18DBA8DD46A6A37E9EB4A750F3409D8F501DB3E1EA71ED408791
APIs
  • LoadLibraryExW.KERNEL32(00AE6889,00000000,00000800,?,?,00AE6889,00000000), ref: 00AE69F1
  • GetLastError.KERNEL32(?,?,00AE6889), ref: 00AE6A05
  • LoadLibraryExW.KERNEL32(00AE6889,00000000,00000000,?,?,?,?,00AE6889), ref: 00AE6A46
Strings
Memory Dump Source
  • Source File: 00000002.00000002.1480643754.0000000000A73000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
  • Associated: 00000002.00000002.1480610957.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000A6D000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000B0F000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480751496.0000000000B11000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480793467.0000000000B37000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480813702.0000000000B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B3D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B59000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_a20000_ForkieByKKosty4ka.jbxd
Similarity
  • API ID: LibraryLoad$ErrorLast
  • String ID: api-ms-$ext-ms-
  • API String ID: 3177248105-537541572
  • Opcode ID: 26d9668ba04b3072bd7f836d0c44d26ae272cca2668a5e5be5a74d54dff62d29
  • Instruction ID: ae7ecb2335f4d16e19ae9a0443ae5f4ed0664bd6eb04aca4bc4895b80b0eb203
  • Opcode Fuzzy Hash: 26d9668ba04b3072bd7f836d0c44d26ae272cca2668a5e5be5a74d54dff62d29
  • Instruction Fuzzy Hash: 72018171A40348BBDB14DB61DE46B6E3BB5AB10780F208820F90DAB180DA71EA449791
Strings
Memory Dump Source
  • Source File: 00000002.00000002.1480643754.0000000000A73000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
  • Associated: 00000002.00000002.1480610957.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000A6D000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000B0F000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480751496.0000000000B11000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480793467.0000000000B37000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480813702.0000000000B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B3D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B59000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_a20000_ForkieByKKosty4ka.jbxd
Similarity
  • API ID:
  • String ID: %ls$_mbstowcs_l_helper$minkernel\crts\ucrt\src\appcrt\convert\mbstowcs.cpp$s != nullptr
  • API String ID: 0-454128329
  • Opcode ID: eef50a094324b6e0eb565c7b9e1266589d96e4c11d50dde6665268e6273f2142
  • Instruction ID: 2c5aa714c3ecff477c0b35bed3f52ad60e73bab2ecf2c664ac46519361e73f30
  • Opcode Fuzzy Hash: eef50a094324b6e0eb565c7b9e1266589d96e4c11d50dde6665268e6273f2142
  • Instruction Fuzzy Hash: 1BC14D71A00248EFDF18EFA5C995BEDB7B1FF54350F248269E419AB291D770AE80CB50
APIs
Strings
  • __acrt_GetLocaleInfoA, xrefs: 00AF2E0A
  • minkernel\crts\ucrt\src\appcrt\locale\getlocaleinfoa.cpp, xrefs: 00AF2DB0, 00AF2E91, 00AF2FB2
  • strncpy_s(*char_result, local_length, local_buffer, local_length - 1), xrefs: 00AF2E0F
  • minkernel\crts\ucrt\src\appcrt\locale\getlocaleinfoa.cpp, xrefs: 00AF2E05
Memory Dump Source
  • Source File: 00000002.00000002.1480643754.0000000000A73000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
  • Associated: 00000002.00000002.1480610957.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000A6D000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000B0F000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480751496.0000000000B11000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480793467.0000000000B37000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480813702.0000000000B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B3D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B59000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_a20000_ForkieByKKosty4ka.jbxd
Similarity
  • API ID: ErrorLast
  • String ID: __acrt_GetLocaleInfoA$minkernel\crts\ucrt\src\appcrt\locale\getlocaleinfoa.cpp$minkernel\crts\ucrt\src\appcrt\locale\getlocaleinfoa.cpp$strncpy_s(*char_result, local_length, local_buffer, local_length - 1)
  • API String ID: 1452528299-34002772
  • Opcode ID: a74a3769b5f9980d7be8087a92b041f49dc433a845259409c705d002b0db1622
  • Instruction ID: 2db92a90e6d1177ff45b25cbfbbe9ba718b618e6f60d78f3d91604de3fbf2592
  • Opcode Fuzzy Hash: a74a3769b5f9980d7be8087a92b041f49dc433a845259409c705d002b0db1622
  • Instruction Fuzzy Hash: E6A13671A002189BDB24EF64DD42FAAB7B5BF14310F1082D9F61DA7292DB319E84CF61
APIs
  • SetFilePointerEx.KERNEL32(?,00000000,?,?,00000001), ref: 00B01346
  • GetLastError.KERNEL32 ref: 00B01350
  • SetFilePointerEx.KERNEL32(00000000,00000000,?,00000000,00000000), ref: 00B0139D
  • GetLastError.KERNEL32 ref: 00B013A7
Memory Dump Source
  • Source File: 00000002.00000002.1480643754.0000000000A73000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
  • Associated: 00000002.00000002.1480610957.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000A6D000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000B0F000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480751496.0000000000B11000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480793467.0000000000B37000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480813702.0000000000B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B3D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B59000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_a20000_ForkieByKKosty4ka.jbxd
Similarity
  • API ID: ErrorFileLastPointer
  • String ID:
  • API String ID: 2976181284-0
  • Opcode ID: c4f965b4d84dec7e0c881b5c58d58554bb7096ec5d06c496a53eed933b3ba123
  • Instruction ID: f47172536995ebce59310a109e18575166924c6b42fb53849b83839f491ae1fe
  • Opcode Fuzzy Hash: c4f965b4d84dec7e0c881b5c58d58554bb7096ec5d06c496a53eed933b3ba123
  • Instruction Fuzzy Hash: 6A2110B1900108EBDB08DFA9DD45BAF7BF9FF48310F208659B529D32D0DB7499008B51
APIs
  • _ValidateLocalCookies.LIBCMTD ref: 00A7736D
  • _ValidateLocalCookies.LIBCMTD ref: 00A774A0
  • _ValidateLocalCookies.LIBCMTD ref: 00A774F3
Strings
Memory Dump Source
  • Source File: 00000002.00000002.1480643754.0000000000A73000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
  • Associated: 00000002.00000002.1480610957.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000A6D000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000B0F000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480751496.0000000000B11000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480793467.0000000000B37000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480813702.0000000000B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B3D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B59000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_a20000_ForkieByKKosty4ka.jbxd
Similarity
  • API ID: CookiesLocalValidate
  • String ID: csm
  • API String ID: 2268201637-1018135373
  • Opcode ID: f9f6b396c4cf9e9944d7f15f9e0d41d2b5d24a3b05e952679d68ee28e0147636
  • Instruction ID: d3a3d53ee0ac9af1a2c55abb380104a9c837d90a1ca1bd7d0d93847858466d8d
  • Opcode Fuzzy Hash: f9f6b396c4cf9e9944d7f15f9e0d41d2b5d24a3b05e952679d68ee28e0147636
  • Instruction Fuzzy Hash: 24513C74E04209EFCB08CF94D991AAEBBB1BF49314F10C198E9196B391D735AA41CFA1
APIs
  • LoadLibraryExW.KERNEL32(00A88187,00000000,00000800,?,?,00A88187,00000000), ref: 00A882CF
  • GetLastError.KERNEL32(?,?,00A88187), ref: 00A882E3
  • LoadLibraryExW.KERNEL32(00A88187,00000000,00000000,?,00A88187), ref: 00A8830D
Strings
Memory Dump Source
  • Source File: 00000002.00000002.1480643754.0000000000A73000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
  • Associated: 00000002.00000002.1480610957.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000A6D000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000B0F000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480751496.0000000000B11000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480793467.0000000000B37000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480813702.0000000000B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B3D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B59000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_a20000_ForkieByKKosty4ka.jbxd
Similarity
  • API ID: LibraryLoad$ErrorLast
  • String ID: api-ms-
  • API String ID: 3177248105-2084034818
  • Opcode ID: 065a76b00ab2fadb8a28d845e09972a4fe72c190b784f4a2f67f35332939ecdc
  • Instruction ID: 4bf026be03fc34dfe759617b2b8b7b17029a1a55caf8d026c69624dbc5533046
  • Opcode Fuzzy Hash: 065a76b00ab2fadb8a28d845e09972a4fe72c190b784f4a2f67f35332939ecdc
  • Instruction Fuzzy Hash: 00F0BE75A00304FBDB04ABA0CC4ABAE37B8EB00F00F604410F9489B180EEB9EE44DB91
APIs
  • HeapAlloc.KERNEL32(012A0000,00000000,?), ref: 00ACBDCF
Strings
  • Error: memory allocation: bad memory block type., xrefs: 00ACBD9A
  • Client hook allocation failure at file %hs line %d., xrefs: 00ACBCFB
  • Client hook allocation failure., xrefs: 00ACBD18
Memory Dump Source
  • Source File: 00000002.00000002.1480643754.0000000000A73000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
  • Associated: 00000002.00000002.1480610957.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000A6D000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000B0F000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480751496.0000000000B11000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480793467.0000000000B37000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480813702.0000000000B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B3D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B59000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_a20000_ForkieByKKosty4ka.jbxd
Similarity
  • API ID: AllocHeap
  • String ID: Client hook allocation failure at file %hs line %d.$Client hook allocation failure.$Error: memory allocation: bad memory block type.
  • API String ID: 4292702814-2973468218
  • Opcode ID: 5e45a452f974e21418cf03fed561b35b6e10edb13e8d22fe9bda9aa74d087d56
  • Instruction ID: c4e98bd75023b1364491c2b3286ff638c793e6a21818d274c1cd67a0bcbaa196
  • Opcode Fuzzy Hash: 5e45a452f974e21418cf03fed561b35b6e10edb13e8d22fe9bda9aa74d087d56
  • Instruction Fuzzy Hash: F0B16DB4A10318EBDB14DF94DC82FAD77B2BB48314F208559F909AB391DB769940CFA1
APIs
  • WriteConsoleW.KERNEL32(?,?,?,00000000), ref: 00B0737C
  • GetLastError.KERNEL32 ref: 00B07388
  • ___initconout.LIBCMT ref: 00B07398
    • Part of subcall function 00B07416: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,00B0739D), ref: 00B07429
  • WriteConsoleW.KERNEL32(?,?,?,00000000), ref: 00B073AC
Memory Dump Source
  • Source File: 00000002.00000002.1480643754.0000000000A73000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
  • Associated: 00000002.00000002.1480610957.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000A6D000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000B0F000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480751496.0000000000B11000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480793467.0000000000B37000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480813702.0000000000B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B3D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B59000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_a20000_ForkieByKKosty4ka.jbxd
Similarity
  • API ID: ConsoleWrite$CreateErrorFileLast___initconout
  • String ID:
  • API String ID: 3431868840-0
  • Opcode ID: b912937d3d9a3ab33e208939b3514d96a75176599ec56399a58225477dd28298
  • Instruction ID: 26c3fee9bfa0a2c0771e648111c9524139572c2c292781f0e6d517d5ef501622
  • Opcode Fuzzy Hash: b912937d3d9a3ab33e208939b3514d96a75176599ec56399a58225477dd28298
  • Instruction Fuzzy Hash: A2F05E36544544ABCB222B95DC05D4ABFA7EB89350B200454F6D983530CE32E810AB21
APIs
  • WriteConsoleW.KERNEL32(?,?,?,00000000), ref: 00B07495
  • GetLastError.KERNEL32 ref: 00B074A1
  • ___initconout.LIBCMT ref: 00B074B1
    • Part of subcall function 00B07416: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,00B0739D), ref: 00B07429
  • WriteConsoleW.KERNEL32(?,?,?,00000000), ref: 00B074C6
Memory Dump Source
  • Source File: 00000002.00000002.1480643754.0000000000A73000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
  • Associated: 00000002.00000002.1480610957.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000A6D000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000B0F000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480751496.0000000000B11000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480793467.0000000000B37000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480813702.0000000000B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B3D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B59000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_a20000_ForkieByKKosty4ka.jbxd
Similarity
  • API ID: ConsoleWrite$CreateErrorFileLast___initconout
  • String ID:
  • API String ID: 3431868840-0
  • Opcode ID: 875fcb96630d6a78403d9de30418afacf14eae7967e84a697cd0d108f5ba0eb7
  • Instruction ID: c86a0ae4ca1cf4c8c48b14fc48913ea1c8c57c0c93b5bdced877870a9b530132
  • Opcode Fuzzy Hash: 875fcb96630d6a78403d9de30418afacf14eae7967e84a697cd0d108f5ba0eb7
  • Instruction Fuzzy Hash: D1F03736545558BBCF222FA1DC0898E7F66FF093A0F204050FA5996170CF32DD20DB91
APIs
  • GetCPInfo.KERNEL32(0000FDE9,?), ref: 00ADB3D3
Strings
Memory Dump Source
  • Source File: 00000002.00000002.1480643754.0000000000A73000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
  • Associated: 00000002.00000002.1480610957.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000A6D000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000B0F000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480751496.0000000000B11000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480793467.0000000000B37000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480813702.0000000000B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B3D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B59000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_a20000_ForkieByKKosty4ka.jbxd
Similarity
  • API ID: Info
  • String ID: $z
  • API String ID: 1807457897-2251613814
  • Opcode ID: 3827063bfcd941fe3c44b1199b681727e58d00e230833c586f7f386c9e5684ca
  • Instruction ID: c5765eca4be8443b03557e36ae36e7db885081fb2f6495a1707892df068699c5
  • Opcode Fuzzy Hash: 3827063bfcd941fe3c44b1199b681727e58d00e230833c586f7f386c9e5684ca
  • Instruction Fuzzy Hash: 1DA11974A5825CDBDB25CF49C891BE9BB71EF44304F1480DAD94E5B382C378AA91CFA4
APIs
  • SetConsoleCtrlHandler.KERNEL32(Function_000B5C20,00000001), ref: 00AD6657
Strings
  • minkernel\crts\ucrt\src\appcrt\misc\signal.cpp, xrefs: 00AD6746
Memory Dump Source
  • Source File: 00000002.00000002.1480643754.0000000000A73000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
  • Associated: 00000002.00000002.1480610957.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000A6D000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000B0F000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480751496.0000000000B11000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480793467.0000000000B37000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480813702.0000000000B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B3D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B59000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_a20000_ForkieByKKosty4ka.jbxd
Similarity
  • API ID: ConsoleCtrlHandler
  • String ID: minkernel\crts\ucrt\src\appcrt\misc\signal.cpp
  • API String ID: 1513847179-3244217075
  • Opcode ID: 9e6ba7f68964c10b9aef863cba27f146839f426cf90d8b2059c4721286700c78
  • Instruction ID: 71d93273dd73cc1e9e7de62517b1f53f1e8e50b68e2c12084e94ff1082abda97
  • Opcode Fuzzy Hash: 9e6ba7f68964c10b9aef863cba27f146839f426cf90d8b2059c4721286700c78
  • Instruction Fuzzy Hash: 2D71AEB5E00208EFCB14DFA4D985AEE7BB5EF49308F14852AF8066B351D735E944CBA1
Strings
Memory Dump Source
  • Source File: 00000002.00000002.1480643754.0000000000A73000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
  • Associated: 00000002.00000002.1480610957.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000A6D000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000B0F000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480751496.0000000000B11000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480793467.0000000000B37000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480813702.0000000000B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B3D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B59000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_a20000_ForkieByKKosty4ka.jbxd
Similarity
  • API ID:
  • String ID: MOC$RCC
  • API String ID: 0-2084237596
  • Opcode ID: 1fd8e8fb234002cc42bf269c96c37e65f150a7988d74e7dbf537c866d3502b8c
  • Instruction ID: 9ac5c3319ee720139d303d0ac72e9819b42b2241cf4a24639a1f411840e1b09c
  • Opcode Fuzzy Hash: 1fd8e8fb234002cc42bf269c96c37e65f150a7988d74e7dbf537c866d3502b8c
  • Instruction Fuzzy Hash: 2B516375A00109EFDB04EF94C981EEF77B9AF58300F14825AF916A7291DB30EE41CB92
APIs
  • GetEnvironmentStringsW.KERNEL32 ref: 00ADCF20
  • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00ADCF9C
Strings
  • minkernel\crts\ucrt\src\desktopcrt\env\get_environment_from_os.cpp, xrefs: 00ADCF53
Memory Dump Source
  • Source File: 00000002.00000002.1480643754.0000000000A73000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
  • Associated: 00000002.00000002.1480610957.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000A6D000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000B0F000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480751496.0000000000B11000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480793467.0000000000B37000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480813702.0000000000B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B3D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B59000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_a20000_ForkieByKKosty4ka.jbxd
Similarity
  • API ID: EnvironmentStrings$Free
  • String ID: minkernel\crts\ucrt\src\desktopcrt\env\get_environment_from_os.cpp
  • API String ID: 3328510275-170101930
  • Opcode ID: 888288d6e3b6d66fbfbdda4895d6e82c188a14efbf276ae946f8c96dce9fa0a4
  • Instruction ID: 8e0b603d1c90440edfcafb288f39a78c81232b6b094478acbc4d778571ad93fb
  • Opcode Fuzzy Hash: 888288d6e3b6d66fbfbdda4895d6e82c188a14efbf276ae946f8c96dce9fa0a4
  • Instruction Fuzzy Hash: 9D01D6E2A013527EE72117B61D4EDFF396ECFCABA4B544126BA06D6341ED658D01C1B0
APIs
  • std::_Timevec::_Timevec.LIBCPMTD ref: 00A94436
  • std::_Timevec::_Timevec.LIBCPMTD ref: 00A9444D
Strings
  • minkernel\crts\ucrt\src\appcrt\locale\wsetlocale.cpp, xrefs: 00A943C5
Memory Dump Source
  • Source File: 00000002.00000002.1480643754.0000000000A73000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
  • Associated: 00000002.00000002.1480610957.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000A6D000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000B0F000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480751496.0000000000B11000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480793467.0000000000B37000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480813702.0000000000B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B3D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B59000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_a20000_ForkieByKKosty4ka.jbxd
Similarity
  • API ID: TimevecTimevec::_std::_
  • String ID: minkernel\crts\ucrt\src\appcrt\locale\wsetlocale.cpp
  • API String ID: 4219598475-2192260110
  • Opcode ID: 4ddd17a069ce82bf25d73acf0af37dfdf036f88601fa3e31618818d27d30375a
  • Instruction ID: b713bb47e47253d54fd0b498543a1fceefc617e87c241044f73c7bfa1f7ee7fd
  • Opcode Fuzzy Hash: 4ddd17a069ce82bf25d73acf0af37dfdf036f88601fa3e31618818d27d30375a
  • Instruction Fuzzy Hash: 8C210075E40108AFDB04FB94DA53EEEB7B4AF54300F5041A5E5556B292EF306F06CB91
APIs
  • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,00000000,?,00A91540,?), ref: 00A91746
Strings
Memory Dump Source
  • Source File: 00000002.00000002.1480643754.0000000000A73000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
  • Associated: 00000002.00000002.1480610957.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000A6D000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000B0F000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480751496.0000000000B11000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480793467.0000000000B37000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480813702.0000000000B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B3D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B59000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_a20000_ForkieByKKosty4ka.jbxd
Similarity
  • API ID: HandleModule
  • String ID: CorExitProcess$mscoree.dll
  • API String ID: 4139908857-1276376045
  • Opcode ID: c671918223d323e7b851a71d888ca89010da1c9df3a3ce1d86f0438b78bf6fb1
  • Instruction ID: 4ba0bc3b5f138a28b1aa8a5360582f1777a5250695e4f3b3fb68262ff4a85e38
  • Opcode Fuzzy Hash: c671918223d323e7b851a71d888ca89010da1c9df3a3ce1d86f0438b78bf6fb1
  • Instruction Fuzzy Hash: AF01DA34E00109FFCB04FBE4DE96AEDBB78AF50305F6041A8E40666191EF305B44DB55
APIs
  • GetEnvironmentStringsW.KERNEL32(?,?,00A9024E,?,?,00A901AB,00A90BA3), ref: 00ADCFD1
  • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00ADD01E
Strings
  • minkernel\crts\ucrt\src\desktopcrt\env\get_environment_from_os.cpp, xrefs: 00ADCFEC
Memory Dump Source
  • Source File: 00000002.00000002.1480643754.0000000000A73000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
  • Associated: 00000002.00000002.1480610957.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000A6D000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480643754.0000000000B0F000.00000020.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480751496.0000000000B11000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480793467.0000000000B37000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480813702.0000000000B3A000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B3D000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000002.00000002.1480831945.0000000000B59000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_2_2_a20000_ForkieByKKosty4ka.jbxd
Similarity
  • API ID: EnvironmentStrings$Free
  • String ID: minkernel\crts\ucrt\src\desktopcrt\env\get_environment_from_os.cpp
  • API String ID: 3328510275-170101930
  • Opcode ID: fea4e5313d7b0d2336493b54d2e82698a1eaa2329a41be4194d04aea204586f7
  • Instruction ID: 0de275379916268b4b730c8e786101f4876c00e187a22fad662ac98e8a55da44
  • Opcode Fuzzy Hash: fea4e5313d7b0d2336493b54d2e82698a1eaa2329a41be4194d04aea204586f7
  • Instruction Fuzzy Hash: B4F0A7676417213AD12122793E4FF7F2659CBC5B74F650125F61AA63C3EE684C0251A1