Create Interactive Tour

Windows Analysis Report notepad.exe

Overview

General Information

Sample Name:notepad.exe
Analysis ID:458596
MD5:1c1760ed4d19cdbecb2398216922628b
SHA1:66b6158b28cc2b970e454b6a8cf1824dd99e4029
SHA256:d66458a3eb1b68715b552b3af32a9d2e889bbf8ac0c23c1afa8d0982023d1ce2
Infos:

Most interesting Screenshot:

Detection

Score:8
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

Binary contains a suspicious time stamp
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to query locales information (e.g. system language)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Found large amount of non-executed APIs
PE file contains sections with non-standard names
Program does not show much activity (idle)
Sample file is different than original file name gathered from version info
Uses Microsoft's Enhanced Cryptographic Provider
Uses the keyboard layout for branch decision (may execute only for specific keyboard layouts)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • notepad.exe (PID: 4904 cmdline: 'C:\Users\user\Desktop\notepad.exe' MD5: 1C1760ED4D19CDBECB2398216922628B)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Jbx Signature Overview

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: C:\Users\user\Desktop\notepad.exeCode function: 0_2_00007FF72B9004FC GetFileAttributesW,DuplicateEncryptionInfoFile,PathFileExistsW,CreateFileW,GetLastError,SendMessageW,SendMessageW,SendMessageW,SendMessageW,LocalLock,WriteFile,GetACP,WideCharToMultiByte,WriteFile,WriteFile,WriteFile,WriteFile,SetEndOfFile,LocalUnlock,SendMessageW,CloseHandle,memset,#170,PathFindExtensionW,memset,CoTaskMemFree,memset,CoTaskMemFree,GetFileAttributesW,DecryptFileW,WindowsCreateStringReference,RoGetActivationFactory,CoTaskMemFree,SetCursor,SetCursor,CloseHandle,LocalUnlock,DeleteFileW,0_2_00007FF72B9004FC
Source: C:\Users\user\Desktop\notepad.exeCode function: 0_2_00007FF72B927038 DuplicateEncryptionInfoFile,0_2_00007FF72B927038
Source: notepad.exeStatic PE information: GUARD_CF, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
Source: Binary string: notepad.pdbGCTL source: notepad.exe
Source: Binary string: notepad.pdb source: notepad.exe
Source: C:\Users\user\Desktop\notepad.exeCode function: 0_2_00007FF72B902CC8 CoTaskMemFree,CoTaskMemFree,PathIsFileSpecW,FindFirstFileW,FindClose,PathFindExtensionW,FindFirstFileW,FindClose,CoTaskMemFree,CoTaskMemFree,CoTaskMemFree,0_2_00007FF72B902CC8
Source: C:\Users\user\Desktop\notepad.exeCode function: 0_2_00007FF72B8FCBEC LocalFree,FindFirstFileW,FindClose,FormatMessageW,SetWindowTextW,LocalFree,LocalFree,_Init_thread_footer,FindFirstFileW,FindClose,CompareStringOrdinal,FormatMessageW,SetWindowTextW,CoTaskMemFree,CoTaskMemFree,0_2_00007FF72B8FCBEC
Source: C:\Users\user\Desktop\notepad.exeCode function: 0_2_00007FF72B8FD04C GetMenu,SendMessageW,GetSubMenu,EnableMenuItem,GetSubMenu,EnableMenuItem,GetSubMenu,EnableMenuItem,GetSubMenu,EnableMenuItem,OpenClipboard,IsClipboardFormatAvailable,CloseClipboard,GetSubMenu,EnableMenuItem,SendMessageW,GetSubMenu,EnableMenuItem,GetSubMenu,EnableMenuItem,GetSubMenu,EnableMenuItem,GetSubMenu,EnableMenuItem,SendMessageW,GetSubMenu,EnableMenuItem,GetSubMenu,CheckMenuItem,GetSubMenu,CheckMenuItem,0_2_00007FF72B8FD04C
Source: C:\Users\user\Desktop\notepad.exeCode function: 0_2_00007FF72B8F3E9C NtUpdateWnfStateData,GetModuleHandleW,GetProcAddress,0_2_00007FF72B8F3E9C
Source: C:\Users\user\Desktop\notepad.exeCode function: 0_2_00007FF72B8F3DF4 NtQueryWnfStateData,GetModuleHandleW,GetProcAddress,0_2_00007FF72B8F3DF4
Source: C:\Users\user\Desktop\notepad.exeCode function: 0_2_00007FF72B8FC0F80_2_00007FF72B8FC0F8
Source: C:\Users\user\Desktop\notepad.exeCode function: 0_2_00007FF72B8F78340_2_00007FF72B8F7834
Source: C:\Users\user\Desktop\notepad.exeCode function: 0_2_00007FF72B903D8C0_2_00007FF72B903D8C
Source: C:\Users\user\Desktop\notepad.exeCode function: 0_2_00007FF72B90E4C80_2_00007FF72B90E4C8
Source: C:\Users\user\Desktop\notepad.exeCode function: 0_2_00007FF72B8FC4BC0_2_00007FF72B8FC4BC
Source: C:\Users\user\Desktop\notepad.exeCode function: 0_2_00007FF72B8FE8EC0_2_00007FF72B8FE8EC
Source: C:\Users\user\Desktop\notepad.exeCode function: 0_2_00007FF72B9004FC0_2_00007FF72B9004FC
Source: C:\Users\user\Desktop\notepad.exeCode function: 0_2_00007FF72B9110280_2_00007FF72B911028
Source: C:\Users\user\Desktop\notepad.exeCode function: 0_2_00007FF72B8FEBA40_2_00007FF72B8FEBA4
Source: C:\Users\user\Desktop\notepad.exeCode function: 0_2_00007FF72B8FDFCC0_2_00007FF72B8FDFCC
Source: C:\Users\user\Desktop\notepad.exeCode function: 0_2_00007FF72B8FE3E00_2_00007FF72B8FE3E0
Source: C:\Users\user\Desktop\notepad.exeCode function: 0_2_00007FF72B90EB200_2_00007FF72B90EB20
Source: C:\Users\user\Desktop\notepad.exeCode function: 0_2_00007FF72B8FC7440_2_00007FF72B8FC744
Source: C:\Users\user\Desktop\notepad.exeCode function: 0_2_00007FF72B90F3640_2_00007FF72B90F364
Source: C:\Users\user\Desktop\notepad.exeCode function: 0_2_00007FF72B900EA00_2_00007FF72B900EA0
Source: C:\Users\user\Desktop\notepad.exeCode function: 0_2_00007FF72B8FE7140_2_00007FF72B8FE714
Source: C:\Users\user\Desktop\notepad.exeCode function: 0_2_00007FF72B8FEA480_2_00007FF72B8FEA48
Source: C:\Users\user\Desktop\notepad.exeCode function: 0_2_00007FF72B9026480_2_00007FF72B902648
Source: C:\Users\user\Desktop\notepad.exeCode function: 0_2_00007FF72B8FDE700_2_00007FF72B8FDE70
Source: C:\Users\user\Desktop\notepad.exeCode function: 0_2_00007FF72B9106900_2_00007FF72B910690
Source: C:\Users\user\Desktop\notepad.exeCode function: 0_2_00007FF72B8FE2840_2_00007FF72B8FE284
Source: C:\Users\user\Desktop\notepad.exeCode function: 0_2_00007FF72B903A800_2_00007FF72B903A80
Source: C:\Users\user\Desktop\notepad.exeCode function: 0_2_00007FF72B8F720C0_2_00007FF72B8F720C
Source: C:\Users\user\Desktop\notepad.exeCode function: 0_2_00007FF72B8FB6000_2_00007FF72B8FB600
Source: C:\Users\user\Desktop\notepad.exeCode function: 0_2_00007FF72B8FA52E0_2_00007FF72B8FA52E
Source: C:\Users\user\Desktop\notepad.exeCode function: 0_2_00007FF72B8FE1280_2_00007FF72B8FE128
Source: C:\Users\user\Desktop\notepad.exeCode function: 0_2_00007FF72B8FF5200_2_00007FF72B8FF520
Source: C:\Users\user\Desktop\notepad.exeCode function: 0_2_00007FF72B910D280_2_00007FF72B910D28
Source: C:\Users\user\Desktop\notepad.exeCode function: 0_2_00007FF72B8FE53C0_2_00007FF72B8FE53C
Source: C:\Users\user\Desktop\notepad.exeCode function: 0_2_00007FF72B8F7D380_2_00007FF72B8F7D38
Source: notepad.exeBinary or memory string: OriginalFilename vs notepad.exe
Source: classification engineClassification label: clean8.winEXE@1/0@0/0
Source: C:\Users\user\Desktop\notepad.exeCode function: 0_2_00007FF72B901B94 GetLastError,FormatMessageW,MessageBoxW,0_2_00007FF72B901B94
Source: C:\Users\user\Desktop\notepad.exeCode function: 0_2_00007FF72B9113E4 CreateDirectoryW,GetLastError,CreateFileW,CloseHandle,GetDiskFreeSpaceExW,SendMessageW,CoTaskMemFree,0_2_00007FF72B9113E4
Source: C:\Users\user\Desktop\notepad.exeCode function: 0_2_00007FF72B912434 CoCreateInstance,0_2_00007FF72B912434
Source: notepad.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\notepad.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: notepad.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: notepad.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: notepad.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: notepad.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: notepad.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: notepad.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: notepad.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: notepad.exeStatic PE information: GUARD_CF, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
Source: notepad.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: notepad.pdbGCTL source: notepad.exe
Source: Binary string: notepad.pdb source: notepad.exe
Source: notepad.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: notepad.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: notepad.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: notepad.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: notepad.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: notepad.exeStatic PE information: 0xF57E80D4 [Thu Jul 8 05:40:36 2100 UTC]
Source: notepad.exeStatic PE information: section name: .didat
Source: C:\Users\user\Desktop\notepad.exeCode function: 0_2_00007FF72B8FB600 GetDlgCtrlID,memset,WindowsCreateStringReference,RoGetActivationFactory,MessageBeep,MessageBeep,DestroyWindow,DestroyWindow,DeleteObject,SendMessageW,IsIconic,SetFocus,IsIconic,GetForegroundWindow,GetForegroundWindow,DefWindowProcW,PostQuitMessage,SetCursor,SetCursor,SetCursor,SetCursor,GetKeyboardLayout,MessageBoxW,SetWindowPos,SendMessageW,GetDpiForWindow,MulDiv,CreateFontIndirectW,DeleteObject,SendMessageW,RedrawWindow,DefWindowProcW,EnableMenuItem,DefWindowProcW,0_2_00007FF72B8FB600
Source: C:\Users\user\Desktop\notepad.exeCode function: 0_2_00007FF72B8FB600 GetDlgCtrlID,memset,WindowsCreateStringReference,RoGetActivationFactory,MessageBeep,MessageBeep,DestroyWindow,DestroyWindow,DeleteObject,SendMessageW,IsIconic,SetFocus,IsIconic,GetForegroundWindow,GetForegroundWindow,DefWindowProcW,PostQuitMessage,SetCursor,SetCursor,SetCursor,SetCursor,GetKeyboardLayout,MessageBoxW,SetWindowPos,SendMessageW,GetDpiForWindow,MulDiv,CreateFontIndirectW,DeleteObject,SendMessageW,RedrawWindow,DefWindowProcW,EnableMenuItem,DefWindowProcW,0_2_00007FF72B8FB600
Source: C:\Users\user\Desktop\notepad.exeCode function: 0_2_00007FF72B903D8C rdtsc 0_2_00007FF72B903D8C
Source: C:\Users\user\Desktop\notepad.exeAPI coverage: 2.8 %
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\notepad.exeCode function: 0_2_00007FF72B903D8C GetKeyboardLayout followed by cmp: cmp ax, 0011h and CTI: jne 00007FF72B9047A9h country: Japanese (ja)0_2_00007FF72B903D8C
Source: C:\Users\user\Desktop\notepad.exeCode function: 0_2_00007FF72B902CC8 CoTaskMemFree,CoTaskMemFree,PathIsFileSpecW,FindFirstFileW,FindClose,PathFindExtensionW,FindFirstFileW,FindClose,CoTaskMemFree,CoTaskMemFree,CoTaskMemFree,0_2_00007FF72B902CC8
Source: C:\Users\user\Desktop\notepad.exeCode function: 0_2_00007FF72B8FCBEC LocalFree,FindFirstFileW,FindClose,FormatMessageW,SetWindowTextW,LocalFree,LocalFree,_Init_thread_footer,FindFirstFileW,FindClose,CompareStringOrdinal,FormatMessageW,SetWindowTextW,CoTaskMemFree,CoTaskMemFree,0_2_00007FF72B8FCBEC
Source: C:\Users\user\Desktop\notepad.exeCode function: 0_2_00007FF72B903D8C rdtsc 0_2_00007FF72B903D8C
Source: C:\Users\user\Desktop\notepad.exeCode function: 0_2_00007FF72B915510 DelayLoadFailureHook,LdrResolveDelayLoadedAPI,0_2_00007FF72B915510
Source: C:\Users\user\Desktop\notepad.exeCode function: 0_2_00007FF72B916500 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF72B916500
Source: C:\Users\user\Desktop\notepad.exeCode function: 0_2_00007FF72B8F7834 GetCurrentProcessId,CreateMutexW,WaitForSingleObjectEx,GetProcessHeap,HeapAlloc,GetProcessHeap,GetProcessHeap,HeapFree,memset,InitializeCriticalSectionEx,0_2_00007FF72B8F7834
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\notepad.exeCode function: 0_2_00007FF72B915890 SetUnhandledExceptionFilter,_o__set_new_mode,0_2_00007FF72B915890
Source: C:\Users\user\Desktop\notepad.exeCode function: 0_2_00007FF72B916500 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF72B916500
Source: C:\Users\user\Desktop\notepad.exeCode function: 0_2_00007FF72B9166F8 SetUnhandledExceptionFilter,0_2_00007FF72B9166F8
Source: C:\Users\user\Desktop\notepad.exeCode function: 0_2_00007FF72B915A88 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF72B915A88
Source: C:\Users\user\Desktop\notepad.exeCode function: GetLocaleInfoW,0_2_00007FF72B900114
Source: C:\Users\user\Desktop\notepad.exeCode function: GetLocaleInfoW,0_2_00007FF72B8F9058
Source: C:\Users\user\Desktop\notepad.exeCode function: memset,GetLocalTime,GetLocaleInfoW,GetUserDefaultUILanguage,GetDateFormatW,GetTimeFormatW,SendMessageW,0_2_00007FF72B900174
Source: C:\Users\user\Desktop\notepad.exeCode function: 0_2_00007FF72B9163A4 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF72B9163A4

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationPath InterceptionPath InterceptionVirtualization/Sandbox Evasion1OS Credential DumpingSystem Time Discovery1Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel2Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsTimestomp1LSASS MemorySecurity Software Discovery3Remote Desktop ProtocolClipboard Data1Exfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerVirtualization/Sandbox Evasion1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Binary PaddingNTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA SecretsFile and Directory Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain CredentialsSystem Information Discovery23VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 458596 Sample: notepad.exe Startdate: 03/08/2021 Architecture: WINDOWS Score: 8 4 notepad.exe 2->4         started       

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand
SourceDetectionScannerLabelLink
notepad.exe0%VirustotalBrowse
notepad.exe0%MetadefenderBrowse
notepad.exe0%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos

General Information

Joe Sandbox Version:33.0.0 White Diamond
Analysis ID:458596
Start date:03.08.2021
Start time:15:14:54
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 2m 41s
Hypervisor based Inspection enabled:false
Report type:full
Sample file name:notepad.exe
Cookbook file name:default.jbs
Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
Number of analysed new started processes analysed:5
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • HDC enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Detection:CLEAN
Classification:clean8.winEXE@1/0@0/0
EGA Information:
  • Successful, ratio: 100%
HDC Information:
  • Successful, ratio: 95.2% (good quality ratio 44.1%)
  • Quality average: 27.4%
  • Quality standard deviation: 35%
HCA Information:Failed
Cookbook Comments:
  • Adjust boot time
  • Enable AMSI
  • Found application associated with file extension: .exe
  • Stop behavior analysis, all processes terminated
Warnings:
  • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, backgroundTaskHost.exe, svchost.exe
No simulations
No context
No context
No context
No context
No context
No created / dropped files found

Static File Info

General

File type:PE32+ executable (GUI) x86-64, for MS Windows
Entropy (8bit):6.315472935153009
TrID:
  • Win64 Executable GUI (202006/5) 92.65%
  • Win64 Executable (generic) (12005/4) 5.51%
  • Generic Win/DOS Executable (2004/3) 0.92%
  • DOS Executable Generic (2002/1) 0.92%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:notepad.exe
File size:211968
MD5:1c1760ed4d19cdbecb2398216922628b
SHA1:66b6158b28cc2b970e454b6a8cf1824dd99e4029
SHA256:d66458a3eb1b68715b552b3af32a9d2e889bbf8ac0c23c1afa8d0982023d1ce2
SHA512:f058eda0c65e59105a7c794721697782f1e1db759c69a11dab09ca454aa89767addcc8ecefa54995527bc2cae983e44c9ed42b0973fdb47435b31428150b96db
SSDEEP:3072:8GvxiAKXWqZE56LtBDxrdPiG4jMSVwkf85NfCAt/k6nrZvkweTbFEIzFbk0:8QxKWqC65BlNiP7V7k5NqG/k4f+uubk
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........T.P.:.P.:.P.:.Y...~.:.D.>.Z.:.D.9.S.:.D.;.Y.:.P.;.~.:.D.2.N.:.D.?.q.:.D...Q.:.D...Q.:.D.8.Q.:.RichP.:.................PE..d..

File Icon

Icon Hash:00828e8e8686b000

General

Entrypoint:0x140025a30
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x140000000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
DLL Characteristics:GUARD_CF, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
Time Stamp:0xF57E80D4 [Thu Jul 8 05:40:36 2100 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:10
OS Version Minor:0
File Version Major:10
File Version Minor:0
Subsystem Version Major:10
Subsystem Version Minor:0
Import Hash:670212bd5fae78855c331eddeffdd4eb
Instruction
dec eax
sub esp, 28h
call 00007FC5B4738750h
dec eax
add esp, 28h
jmp 00007FC5B4737C53h
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
nop word ptr [eax+eax+00000000h]
dec eax
cmp ecx, dword ptr [0000CA41h]
jne 00007FC5B4737DF5h
dec eax
rol ecx, 10h
test cx, FFFFh
jne 00007FC5B4737DE5h
ret
dec eax
ror ecx, 10h
jmp 00007FC5B4737E54h
int3
int3
int3
int3
int3
int3
int3
inc eax
push ebx
dec eax
sub esp, 20h
dec eax
mov ebx, ecx
call dword ptr [00002EC9h]
mov ecx, 00000001h
mov dword ptr [0000D79Eh], eax
call 00007FC5B473882Eh
xor ecx, ecx
call dword ptr [000033A9h]
dec eax
mov ecx, ebx
call dword ptr [000033A8h]
cmp dword ptr [0000D781h], 00000000h
jne 00007FC5B4737DECh
mov ecx, 00000001h
call 00007FC5B473880Ah
call dword ptr [00002EBFh]
dec eax
mov ecx, eax
mov edx, C0000409h
dec eax
add esp, 20h
pop ebx
dec eax
jmp dword ptr [000033ABh]
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
dec eax
mov dword ptr [esp+08h], ecx
dec eax
sub esp, 00000000h
Programming Language:
  • [IMP] VS2008 SP1 build 30729
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x2f9080x230.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x380000xbd8.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x350000x1218.pdata
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x390000x2f0.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x2ce000x54.rdata
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x288280x28.rdata
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x287100x118.rdata
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x288500x928.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x2f2200xe0.rdata
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x266720x26800False0.510539265422data6.2703839023IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
.rdata0x280000x9b3c0x9c00False0.519230769231data5.93009431776IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x320000x28080xe00False0.162388392857data1.83637350506IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
.pdata0x350000x12180x1400False0.47734375data4.77725385253IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.didat0x370000x1780x200False0.271484375data2.48605147045IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
.rsrc0x380000xbd80xc00False0.411783854167data4.60953946081IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x390000x2f00x400False0.41796875data4.25362792783IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountry
EDPENLIGHTENEDAPPINFOID0x387100x2dataEnglishUnited States
EDPPERMISSIVEAPPINFOID0x387180x2dataEnglishUnited States
MUI0x38a980x140dataEnglishUnited States
RT_VERSION0x387200x374dataEnglishUnited States
RT_MANIFEST0x382600x4afXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States
DLLImport
KERNEL32.dllGetProcAddress, CreateMutexExW, AcquireSRWLockShared, DeleteCriticalSection, GetCurrentProcessId, GetProcessHeap, GetModuleHandleW, DebugBreak, IsDebuggerPresent, GlobalFree, GetLocaleInfoW, CreateFileW, ReadFile, MulDiv, GetCurrentProcess, GetCommandLineW, HeapSetInformation, FreeLibrary, LocalFree, LocalAlloc, FindFirstFileW, FindClose, CompareStringOrdinal, FoldStringW, InitOnceBeginInitialize, InitOnceComplete, GetModuleFileNameW, GetUserDefaultUILanguage, GetLocalTime, GetDateFormatW, GetTimeFormatW, WideCharToMultiByte, WriteFile, GetFileAttributesW, LocalLock, GetACP, LocalUnlock, DeleteFileW, SetEndOfFile, GetFileAttributesExW, GetFileInformationByHandle, CreateFileMappingW, MapViewOfFile, MultiByteToWideChar, LocalReAlloc, UnmapViewOfFile, GetFullPathNameW, LocalSize, GetStartupInfoW, lstrcmpiW, FindNLSString, GlobalLock, GlobalUnlock, GlobalAlloc, GetDiskFreeSpaceExW, CreateDirectoryW, RegisterApplicationRestart, CreateSemaphoreExW, CreateThreadpoolTimer, ReleaseSRWLockShared, SetThreadpoolTimer, CloseHandle, OpenSemaphoreW, WaitForSingleObjectEx, AcquireSRWLockExclusive, CloseThreadpoolTimer, OutputDebugStringW, ReleaseSRWLockExclusive, GetLastError, FormatMessageW, ReleaseMutex, GetCurrentThreadId, WaitForSingleObject, WaitForThreadpoolTimerCallbacks, InitializeCriticalSectionEx, LeaveCriticalSection, GetModuleHandleExW, ReleaseSemaphore, EnterCriticalSection, SetLastError, HeapAlloc, HeapFree, ResolveDelayLoadedAPI, DelayLoadFailureHook, GetModuleFileNameA
GDI32.dllCreateDCW, StartPage, StartDocW, SetAbortProc, DeleteDC, EndDoc, AbortDoc, EndPage, GetTextMetricsW, SetBkMode, LPtoDP, SetWindowExtEx, SetViewportExtEx, SetMapMode, GetTextExtentPoint32W, TextOutW, EnumFontsW, GetTextFaceW, SelectObject, DeleteObject, CreateFontIndirectW, GetDeviceCaps
USER32.dllPostMessageW, MessageBoxW, GetMenu, CheckMenuItem, GetSubMenu, EnableMenuItem, ShowWindow, GetDC, ReleaseDC, SetCursor, GetDpiForWindow, SetActiveWindow, LoadStringW, DefWindowProcW, IsIconic, SetFocus, PostQuitMessage, DestroyWindow, MessageBeep, GetForegroundWindow, GetDlgCtrlID, SetWindowPos, RedrawWindow, GetKeyboardLayout, CharNextW, SetWinEventHook, GetMessageW, TranslateAcceleratorW, IsDialogMessageW, TranslateMessage, DispatchMessageW, UnhookWinEvent, SetWindowTextW, OpenClipboard, IsClipboardFormatAvailable, CloseClipboard, SetDlgItemTextW, GetDlgItemTextW, EndDialog, SendDlgItemMessageW, SetScrollPos, InvalidateRect, UpdateWindow, GetWindowPlacement, SetWindowPlacement, CharUpperW, GetSystemMenu, LoadAcceleratorsW, SetWindowLongW, CreateWindowExW, MonitorFromWindow, RegisterWindowMessageW, LoadCursorW, RegisterClassExW, GetWindowTextLengthW, GetWindowLongW, PeekMessageW, GetWindowTextW, EnableWindow, CreateDialogParamW, DrawTextExW, LoadIconW, LoadImageW, DialogBoxParamW, SetThreadDpiAwarenessContext, SendMessageW, MoveWindow, GetClientRect, GetFocus
api-ms-win-crt-string-l1-1-0.dllmemset, wcsnlen, wcscmp
api-ms-win-crt-runtime-l1-1-0.dll_c_exit, _register_thread_local_exe_atexit_callback, _initterm_e, _initterm
api-ms-win-crt-private-l1-1-0.dll_o__callnewh, _o__cexit, _o__configthreadlocale, _o__configure_wide_argv, _o__crt_atexit, _o__errno, _o__exit, _o__get_wide_winmain_command_line, _o__initialize_onexit_table, _o__initialize_wide_environment, _o__invalid_parameter_noinfo, _o__purecall, _o__register_onexit_function, _o__seh_filter_exe, _o__set_app_type, _o__set_fmode, _o__set_new_mode, _o__wcsicmp, _o__wtol, _o_exit, _o_free, _o_iswdigit, _o_malloc, _o_terminate, _o_toupper, __std_terminate, __CxxFrameHandler3, _CxxThrowException, _o___std_exception_destroy, _o___std_exception_copy, __C_specific_handler, _o___stdio_common_vswprintf, memcmp, _o___p__commode, memcpy, memmove
api-ms-win-core-com-l1-1-0.dllCoCreateFreeThreadedMarshaler, CoWaitForMultipleHandles, PropVariantClear, CoTaskMemFree, CoTaskMemAlloc, CoCreateInstance, CoInitializeEx, CoCreateGuid, CoUninitialize
api-ms-win-core-shlwapi-legacy-l1-1-0.dllPathFileExistsW, PathFindExtensionW, PathIsFileSpecW
api-ms-win-shcore-obsolete-l1-1-0.dllSHStrDupW
api-ms-win-shcore-path-l1-1-0.dll
api-ms-win-shcore-scaling-l1-1-1.dllGetDpiForMonitor
api-ms-win-core-rtlsupport-l1-1-0.dllRtlVirtualUnwind, RtlCaptureContext, RtlLookupFunctionEntry
api-ms-win-core-errorhandling-l1-1-0.dllRaiseException, SetUnhandledExceptionFilter, UnhandledExceptionFilter
api-ms-win-core-processthreads-l1-1-0.dllTerminateProcess
api-ms-win-core-processthreads-l1-1-1.dllGetProcessMitigationPolicy, IsProcessorFeaturePresent
api-ms-win-core-synch-l1-1-0.dllInitializeCriticalSectionAndSpinCount, SetEvent, ResetEvent, CreateEventExW, CreateEventW
api-ms-win-core-profile-l1-1-0.dllQueryPerformanceCounter
api-ms-win-core-sysinfo-l1-1-0.dllGetTickCount, GetSystemTimeAsFileTime
api-ms-win-core-interlocked-l1-1-0.dllInitializeSListHead
api-ms-win-core-libraryloader-l1-2-0.dllLoadLibraryExW
api-ms-win-core-winrt-string-l1-1-0.dllWindowsDeleteString, WindowsCreateStringReference, WindowsGetStringRawBuffer, WindowsCreateString
api-ms-win-core-winrt-error-l1-1-0.dllSetRestrictedErrorInfo
api-ms-win-core-winrt-l1-1-0.dllRoInitialize, RoGetActivationFactory, RoUninitialize
api-ms-win-core-winrt-error-l1-1-1.dllRoGetMatchingRestrictedErrorInfo
api-ms-win-eventing-provider-l1-1-0.dllEventProviderEnabled
api-ms-win-core-synch-l1-2-0.dllSleep
COMCTL32.dllCreateStatusWindowW
DescriptionData
LegalCopyright Microsoft Corporation. All rights reserved.
InternalNameNotepad
FileVersion10.0.19041.1081 (WinBuild.160101.0800)
CompanyNameMicrosoft Corporation
ProductNameMicrosoft Windows Operating System
ProductVersion10.0.19041.1081
FileDescriptionNotepad
OriginalFilenameNOTEPAD.EXE
Translation0x0409 0x04b0
Language of compilation systemCountry where language is spokenMap
EnglishUnited States

Network Behavior

No network behavior found

Code Manipulations

Statistics

CPU Usage

01020s020406080100

Click to jump to process

Memory Usage

01020sMB

Click to jump to process

System Behavior

Disassembly

Code Analysis

Execution Graph

Execution Coverage

Dynamic/Packed Code Coverage

Signature Coverage

Execution Coverage:3.1%
Dynamic/Decrypted Code Coverage:0%
Signature Coverage:31.6%
Total number of Nodes:718
Total number of Limit Nodes:8

Graph

Show Legend
Hide Nodes/Edges
execution_graph 9198 7ff72b9157c0 9199 7ff72b9157d0 9198->9199 9207 7ff72b915e04 9199->9207 9201 7ff72b9157f4 _RTC_Initialize 9202 7ff72b91581e __scrt_initialize_crt 9201->9202 9215 7ff72b91647c InitializeSListHead 9201->9215 9206 7ff72b915850 9202->9206 9216 7ff72b916500 IsProcessorFeaturePresent 9202->9216 9204 7ff72b915860 __scrt_initialize_default_local_stdio_options 9208 7ff72b915e19 9207->9208 9209 7ff72b915e4f 9207->9209 9210 7ff72b915ea9 9208->9210 9213 7ff72b915e22 __scrt_release_startup_lock 9208->9213 9209->9201 9211 7ff72b916500 9 API calls 9210->9211 9212 7ff72b915eb3 9211->9212 9213->9209 9214 7ff72b915e3f _o__initialize_onexit_table 9213->9214 9214->9209 9217 7ff72b916526 9216->9217 9218 7ff72b916534 memset RtlCaptureContext RtlLookupFunctionEntry 9217->9218 9219 7ff72b9165aa memset IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 9218->9219 9220 7ff72b91656e RtlVirtualUnwind 9218->9220 9221 7ff72b91662e 9219->9221 9220->9219 9221->9204 10628 7ff72b9171a4 10629 7ff72b91710c 10628->10629 10632 7ff72b915510 LdrResolveDelayLoadedAPI 10629->10632 10631 7ff72b91714b 10631->10631 10632->10631 9222 7ff72b9158b0 9223 7ff72b9158c4 __scrt_initialize_crt 9222->9223 9224 7ff72b9159fc 9223->9224 9226 7ff72b9158cc __scrt_acquire_startup_lock 9223->9226 9225 7ff72b916500 9 API calls 9224->9225 9227 7ff72b915a06 9225->9227 9226->9227 9232 7ff72b9158ea __scrt_release_startup_lock 9226->9232 9228 7ff72b916500 9 API calls 9227->9228 9229 7ff72b915a11 9228->9229 9231 7ff72b915a19 _o__exit 9229->9231 9230 7ff72b91590f 9232->9230 9233 7ff72b915995 9232->9233 9236 7ff72b91598d _register_thread_local_exe_atexit_callback 9232->9236 9244 7ff72b916654 memset GetStartupInfoW 9233->9244 9235 7ff72b91599a _o__get_wide_winmain_command_line 9245 7ff72b8fc0f8 9235->9245 9236->9233 9238 7ff72b9159b6 9290 7ff72b9166a0 GetModuleHandleW 9238->9290 9241 7ff72b9159c1 9242 7ff72b9159cb 9241->9242 9243 7ff72b9159c6 _o__cexit 9241->9243 9242->9230 9243->9242 9244->9235 9246 7ff72b8fc12e 9245->9246 9247 7ff72b8fc13e 9245->9247 9862 7ff72b8fe284 9246->9862 9292 7ff72b8ff7cc 9247->9292 9255 7ff72b8fc222 9314 7ff72b914d80 RoInitialize 9255->9314 9256 7ff72b8fc46e EtwEventUnregister 9256->9238 9258 7ff72b8fc22f 9259 7ff72b8fc27b 9258->9259 9260 7ff72b8fc261 CharNextW 9258->9260 9330 7ff72b903d8c 9259->9330 9260->9258 9263 7ff72b8fc2a6 9868 7ff72b8fc070 GetCurrentProcess OpenProcessToken 9263->9868 9264 7ff72b8fc41e 9265 7ff72b8fc42f 9264->9265 9889 7ff72b913b2c WindowsCreateStringReference 9264->9889 9268 7ff72b8fc447 9265->9268 9900 7ff72b9137a0 WindowsCreateStringReference 9265->9900 9271 7ff72b8fc453 FreeLibrary 9268->9271 9272 7ff72b8fc462 CoUninitialize 9268->9272 9271->9272 9272->9256 9275 7ff72b8fc399 GetMessageW 9276 7ff72b8fc2f1 9275->9276 9277 7ff72b8fc3b9 9275->9277 9279 7ff72b8fc315 TranslateAcceleratorW 9276->9279 9280 7ff72b8fc2f7 PostMessageW 9276->9280 9282 7ff72b8fc343 IsDialogMessageW 9276->9282 9283 7ff72b8fc357 TranslateAcceleratorW 9276->9283 9875 7ff72b900d80 GetFileAttributesExW 9277->9875 9279->9275 9279->9276 9280->9279 9282->9275 9282->9283 9283->9275 9285 7ff72b8fc379 TranslateMessage DispatchMessageW 9283->9285 9285->9275 9289 7ff72b8fc40f UnhookWinEvent 9289->9264 9291 7ff72b9159bd 9290->9291 9291->9229 9291->9241 9295 7ff72b8ff815 9292->9295 9293 7ff72b8ff8da 9911 7ff72b8f7610 9293->9911 9294 7ff72b8ff9f8 9943 7ff72b915a60 9294->9943 9295->9293 9296 7ff72b8ff933 9295->9296 9297 7ff72b8ff8f3 9296->9297 9299 7ff72b8ff965 9296->9299 9297->9294 9920 7ff72b8f8b10 9297->9920 9301 7ff72b8ff971 GetModuleHandleW 9299->9301 9302 7ff72b8ff98b GetProcAddress 9299->9302 9301->9302 9302->9297 9305 7ff72b8f1430 EtwEventRegister 9306 7ff72b8f149e EtwEventSetInformation 9305->9306 9307 7ff72b8f148e 9305->9307 9306->9307 9308 7ff72b915a60 9 API calls 9307->9308 9309 7ff72b8f14ca 9308->9309 9310 7ff72b9118b4 9309->9310 9311 7ff72b8fc1f3 HeapSetInformation CoInitializeEx 9310->9311 9312 7ff72b9118c4 9310->9312 9311->9255 9311->9256 9312->9311 10197 7ff72b8f1b44 9312->10197 9315 7ff72b914dc2 WindowsCreateStringReference 9314->9315 9321 7ff72b914e95 9314->9321 9317 7ff72b914deb RaiseException 9315->9317 9318 7ff72b914e06 RoGetActivationFactory 9315->9318 9316 7ff72b915a60 9 API calls 9319 7ff72b914fff 9316->9319 9317->9318 9318->9321 9322 7ff72b914e44 9318->9322 9319->9258 9321->9316 9322->9321 9323 7ff72b914e9f WindowsCreateStringReference 9322->9323 9324 7ff72b914edc 9323->9324 9324->9321 9325 7ff72b914ef9 WindowsDeleteString 9324->9325 9326 7ff72b914f20 9325->9326 9327 7ff72b914f2f 9326->9327 9328 7ff72b914f36 WindowsGetStringRawBuffer LoadLibraryExW RoUninitialize 9326->9328 9327->9321 9329 7ff72b914f73 WindowsDeleteString 9327->9329 9328->9327 9329->9321 10203 7ff72b917360 9330->10203 9333 7ff72b904505 9336 7ff72b915a60 9 API calls 9333->9336 9334 7ff72b903dee RegisterWindowMessageW 9334->9333 9335 7ff72b903e0f GetDC 9334->9335 9335->9333 9337 7ff72b903e29 9335->9337 9339 7ff72b8fc29e 9336->9339 10205 7ff72b902f84 LocalAlloc 9337->10205 9339->9263 9339->9264 9340 7ff72b903e31 9340->9333 9341 7ff72b903e39 LoadCursorW LoadCursorW LoadAcceleratorsW LoadAcceleratorsW 9340->9341 9341->9333 9342 7ff72b903eb4 9341->9342 9342->9333 10216 7ff72b90e3a0 LoadCursorW 9342->10216 9344 7ff72b903ed7 10223 7ff72b8f9058 GetLocaleInfoW 9344->10223 9346 7ff72b903f06 10225 7ff72b902648 memset RegOpenKeyExW 9346->10225 9352 7ff72b903f2b 10327 7ff72b8ffcb0 9352->10327 9355 7ff72b903f72 CreateWindowExW 9355->9333 9357 7ff72b903fe7 9355->9357 10339 7ff72b8fdbf0 9357->10339 9363 7ff72b90410e 9367 7ff72b904125 GetClientRect CreateWindowExW 9363->9367 9364 7ff72b904032 GetWindowPlacement 9365 7ff72b9040cf SetThreadDpiAwarenessContext SetWindowPlacement SetThreadDpiAwarenessContext 9364->9365 9366 7ff72b90407b 9364->9366 9365->9363 9366->9365 9367->9333 9368 7ff72b9041c3 9367->9368 10364 7ff72b9037e8 9368->10364 9371 7ff72b904268 10386 7ff72b903a30 9371->10386 9863 7ff72b8fe3b1 9862->9863 9864 7ff72b8fe2a8 9862->9864 9863->9247 9865 7ff72b8f7454 3 API calls 9864->9865 9866 7ff72b8fe2ad 9865->9866 9866->9863 9867 7ff72b8f7524 10 API calls 9866->9867 9867->9863 9869 7ff72b8fc0a4 GetTokenInformation CloseHandle 9868->9869 9870 7ff72b8fc0e8 9868->9870 9869->9870 9871 7ff72b911934 9870->9871 9872 7ff72b8fc2b2 GetCurrentProcessId SetWinEventHook 9871->9872 9873 7ff72b911944 9871->9873 9872->9275 9873->9872 10526 7ff72b8f1bd0 9873->10526 9876 7ff72b915a60 9 API calls 9875->9876 9877 7ff72b8fc3d1 9876->9877 9878 7ff72b911d00 9877->9878 9879 7ff72b911fe7 9878->9879 9880 7ff72b911d3c 9878->9880 9881 7ff72b915a60 9 API calls 9879->9881 9880->9879 10532 7ff72b8f179c EtwEventWriteTransfer 9880->10532 9882 7ff72b8fc3e5 9881->9882 9884 7ff72b8f900c 9882->9884 9885 7ff72b8f901c GlobalFree 9884->9885 9886 7ff72b8f9028 9884->9886 9885->9886 9887 7ff72b8f9034 GlobalFree 9886->9887 9888 7ff72b8f9040 9886->9888 9887->9888 9888->9264 9888->9289 9890 7ff72b913c23 9889->9890 9892 7ff72b913b7c RoGetActivationFactory 9889->9892 10533 7ff72b9126b8 RaiseException 9890->10533 9894 7ff72b913bb9 9892->9894 9897 7ff72b913bd2 9892->9897 9896 7ff72b8f2f4c 14 API calls 9894->9896 9896->9897 9898 7ff72b915a60 9 API calls 9897->9898 9899 7ff72b913c17 9898->9899 9899->9265 9901 7ff72b91389a 9900->9901 9902 7ff72b9137f0 RoGetActivationFactory 9900->9902 10534 7ff72b9126b8 RaiseException 9901->10534 9906 7ff72b913846 9902->9906 9907 7ff72b91382d 9902->9907 9909 7ff72b915a60 9 API calls 9906->9909 9908 7ff72b8f2f4c 14 API calls 9907->9908 9908->9906 9910 7ff72b91388e 9909->9910 9910->9268 9912 7ff72b8f7630 9911->9912 9914 7ff72b8f771e 9911->9914 9913 7ff72b8f766e 9912->9913 9966 7ff72b8f7028 9912->9966 9913->9914 9916 7ff72b8f76b4 AcquireSRWLockExclusive 9913->9916 9914->9297 9917 7ff72b8f76d1 9916->9917 9918 7ff72b8f7709 ReleaseSRWLockExclusive 9916->9918 9917->9918 9952 7ff72b8f6644 9917->9952 9918->9914 10167 7ff72b8f8968 InitOnceBeginInitialize 9920->10167 9923 7ff72b8f8ced 9924 7ff72b915a60 9 API calls 9923->9924 9925 7ff72b8f8fe6 9924->9925 9925->9294 9926 7ff72b8f8cf2 9929 7ff72b8f8e45 9926->9929 9930 7ff72b8f8d02 9926->9930 9927 7ff72b8f8b7a 9928 7ff72b8f8968 13 API calls 9927->9928 9935 7ff72b8f8b7f 9928->9935 9929->9923 9932 7ff72b8f8968 13 API calls 9929->9932 9931 7ff72b8f8968 13 API calls 9930->9931 9936 7ff72b8f8d07 9931->9936 9937 7ff72b8f8e53 9932->9937 9933 7ff72b8f8c3c 9933->9923 9934 7ff72b8f8968 13 API calls 9933->9934 9938 7ff72b8f8c54 9934->9938 9935->9933 10173 7ff72b8f1008 9935->10173 9936->9923 10178 7ff72b8f179c EtwEventWriteTransfer 9936->10178 9937->9923 10179 7ff72b8f10d0 9937->10179 9938->9923 9940 7ff72b8f1008 10 API calls 9938->9940 9940->9923 9944 7ff72b915a6a 9943->9944 9945 7ff72b915af0 IsProcessorFeaturePresent 9944->9945 9946 7ff72b8fc18f GetCommandLineW CoCreateGuid 9944->9946 9947 7ff72b915b08 9945->9947 9946->9305 10187 7ff72b915cfc RtlCaptureContext 9947->10187 9953 7ff72b8f6672 9952->9953 9954 7ff72b8f671c 9952->9954 9980 7ff72b8f68a0 9953->9980 9954->9918 9957 7ff72b8f667f AcquireSRWLockExclusive 9958 7ff72b8f66e0 9957->9958 9959 7ff72b8f669c 9957->9959 9961 7ff72b8f5f20 8 API calls 9958->9961 9959->9958 9960 7ff72b8f66a5 AcquireSRWLockExclusive 9959->9960 9988 7ff72b8f5f20 9960->9988 9963 7ff72b8f66f5 9961->9963 9963->9954 9965 7ff72b8f670d ReleaseSRWLockExclusive 9963->9965 9965->9954 9967 7ff72b8f714e 9966->9967 9969 7ff72b8f704b 9966->9969 9967->9913 9968 7ff72b8f7075 AcquireSRWLockExclusive 9970 7ff72b8f49fc 8 API calls 9968->9970 9969->9967 9969->9968 9971 7ff72b8f70a5 9970->9971 9972 7ff72b8f713a 9971->9972 9973 7ff72b8f710a SetThreadpoolTimer 9971->9973 9974 7ff72b8f70b8 CreateThreadpoolTimer 9971->9974 9972->9967 9975 7ff72b8f713f ReleaseSRWLockExclusive 9972->9975 9973->9972 9976 7ff72b8f7101 9974->9976 9977 7ff72b8f70dd GetLastError 9974->9977 9975->9967 9976->9972 9976->9973 10166 7ff72b8f84b8 SetThreadpoolTimer WaitForThreadpoolTimerCallbacks CloseThreadpoolTimer 9977->10166 9981 7ff72b8f6677 9980->9981 9982 7ff72b8f68bc 9980->9982 9981->9954 9981->9957 9983 7ff72b8f68e7 AcquireSRWLockExclusive 9982->9983 9992 7ff72b8f7834 GetCurrentProcessId 9982->9992 9985 7ff72b8f6914 9983->9985 9985->9981 9987 7ff72b8f6920 ReleaseSRWLockExclusive 9985->9987 9987->9981 9989 7ff72b8f5f4d 9988->9989 9991 7ff72b8f5f83 ReleaseSRWLockExclusive 9989->9991 10145 7ff72b8f49fc 9989->10145 9991->9958 10030 7ff72b8f21f0 9992->10030 9994 7ff72b8f78a2 CreateMutexW 9995 7ff72b8f78cb 9994->9995 9996 7ff72b8f78d7 WaitForSingleObjectEx 9994->9996 10056 7ff72b8f288c GetLastError 9995->10056 9998 7ff72b8f78f3 9996->9998 9999 7ff72b8f7902 9996->9999 9998->9999 10001 7ff72b8f7b4d 9998->10001 10032 7ff72b8f8504 9999->10032 10000 7ff72b8f78d0 10006 7ff72b915a60 9 API calls 10000->10006 10100 7ff72b8f2fc4 10001->10100 10008 7ff72b8f68d3 10006->10008 10007 7ff72b8f7949 10010 7ff72b8f795a 10007->10010 10011 7ff72b8f79c4 GetProcessHeap HeapAlloc 10007->10011 10017 7ff72b8f7969 10007->10017 10008->9983 10014 7ff72b8f2f4c 14 API calls 10010->10014 10012 7ff72b8f79fd GetProcessHeap 10011->10012 10013 7ff72b8f7a18 10011->10013 10012->10013 10015 7ff72b8f7a43 10013->10015 10016 7ff72b8f7a22 10013->10016 10014->10017 10076 7ff72b8f30fc 10015->10076 10018 7ff72b8f2f4c 14 API calls 10016->10018 10017->10000 10063 7ff72b8f3040 ReleaseMutex 10017->10063 10020 7ff72b8f7a3e 10018->10020 10020->10010 10020->10017 10023 7ff72b8f7a64 10026 7ff72b8f2f4c 14 API calls 10023->10026 10024 7ff72b8f7abb memset 10099 7ff72b8f5d50 10024->10099 10029 7ff72b8f7a7b 10026->10029 10027 7ff72b8f7af9 InitializeCriticalSectionEx 10027->10020 10028 7ff72b8f7a99 GetProcessHeap HeapFree 10028->10020 10029->10028 10031 7ff72b8f221f _vsnwprintf 10030->10031 10031->9994 10033 7ff72b8f8554 10032->10033 10034 7ff72b8f8567 OpenSemaphoreW 10033->10034 10035 7ff72b8f858e GetLastError 10034->10035 10036 7ff72b8f85bc 10034->10036 10037 7ff72b8f85a3 10035->10037 10038 7ff72b8f86be 10035->10038 10103 7ff72b8f32d8 WaitForSingleObject 10036->10103 10118 7ff72b8f2f84 10037->10118 10042 7ff72b915a60 9 API calls 10038->10042 10046 7ff72b8f7927 10042->10046 10043 7ff72b8f85fd 10047 7ff72b8f8611 OpenSemaphoreW 10043->10047 10044 7ff72b8f85d9 10045 7ff72b8f2f4c 14 API calls 10044->10045 10054 7ff72b8f85b5 10045->10054 10046->10007 10060 7ff72b8f2f4c 10046->10060 10048 7ff72b8f8631 10047->10048 10049 7ff72b8f8649 10047->10049 10051 7ff72b8f2f84 15 API calls 10048->10051 10052 7ff72b8f32d8 23 API calls 10049->10052 10050 7ff72b8f2f4c 14 API calls 10050->10038 10051->10054 10053 7ff72b8f8656 10052->10053 10053->10054 10055 7ff72b8f2f4c 14 API calls 10053->10055 10054->10038 10054->10050 10055->10054 10057 7ff72b8f28d1 10056->10057 10058 7ff72b8f28a2 10056->10058 10057->10000 10059 7ff72b8f2d80 14 API calls 10058->10059 10059->10057 10061 7ff72b8f2d80 14 API calls 10060->10061 10062 7ff72b8f2f75 10061->10062 10062->10007 10064 7ff72b8f3054 10063->10064 10065 7ff72b8f305a 10063->10065 10064->10000 10136 7ff72b8f2fa4 10065->10136 10068 7ff72b8f30ae 10071 7ff72b8f30df 10068->10071 10072 7ff72b8f30bb GetLastError 10068->10072 10069 7ff72b8f308a GetLastError 10070 7ff72b8f300c 10069->10070 10073 7ff72b8f30a0 SetLastError 10070->10073 10071->10000 10074 7ff72b8f300c 10072->10074 10073->10068 10075 7ff72b8f30d1 SetLastError 10074->10075 10075->10071 10077 7ff72b8f3137 10076->10077 10078 7ff72b8f32ca 10076->10078 10079 7ff72b8f3165 CreateSemaphoreExW 10077->10079 10080 7ff72b8f31dc 10079->10080 10081 7ff72b8f31a9 10079->10081 10083 7ff72b8f288c 15 API calls 10080->10083 10082 7ff72b8f31b1 GetLastError 10081->10082 10086 7ff72b8f31d5 10081->10086 10084 7ff72b8f300c 10082->10084 10083->10086 10085 7ff72b8f31c7 SetLastError 10084->10085 10085->10086 10088 7ff72b8f321c CreateSemaphoreExW 10086->10088 10092 7ff72b8f31e7 10086->10092 10087 7ff72b8f2f4c 14 API calls 10089 7ff72b8f3203 10087->10089 10090 7ff72b8f3284 10088->10090 10091 7ff72b8f324f 10088->10091 10095 7ff72b915a60 9 API calls 10089->10095 10094 7ff72b8f288c 15 API calls 10090->10094 10091->10092 10093 7ff72b8f3258 GetLastError 10091->10093 10092->10087 10092->10089 10096 7ff72b8f300c 10093->10096 10094->10092 10097 7ff72b8f32ad 10095->10097 10098 7ff72b8f326e SetLastError 10096->10098 10097->10023 10097->10024 10098->10092 10099->10027 10101 7ff72b8f2d80 14 API calls 10100->10101 10102 7ff72b8f2ff0 10101->10102 10104 7ff72b8f3316 10103->10104 10105 7ff72b8f32fb 10103->10105 10107 7ff72b8f333c ReleaseSemaphore 10104->10107 10108 7ff72b8f3397 ReleaseSemaphore 10104->10108 10117 7ff72b8f3321 10104->10117 10106 7ff72b8f2f84 15 API calls 10105->10106 10112 7ff72b8f3311 10106->10112 10107->10105 10110 7ff72b8f3358 ReleaseSemaphore 10107->10110 10108->10105 10109 7ff72b8f33bb 10108->10109 10111 7ff72b8f33c9 ReleaseSemaphore 10109->10111 10109->10117 10114 7ff72b8f3376 GetLastError 10110->10114 10110->10117 10115 7ff72b8f33e3 GetLastError 10111->10115 10111->10117 10112->10043 10112->10044 10113 7ff72b8f2f4c 14 API calls 10113->10112 10114->10112 10114->10117 10116 7ff72b8f33f6 WaitForSingleObject 10115->10116 10115->10117 10116->10117 10117->10112 10117->10113 10121 7ff72b8f2e88 GetLastError 10118->10121 10122 7ff72b8f2eec 10121->10122 10123 7ff72b8f2ec1 10121->10123 10130 7ff72b8f2c74 10122->10130 10127 7ff72b8f2d80 10123->10127 10128 7ff72b8f2c74 14 API calls 10127->10128 10129 7ff72b8f2db9 10128->10129 10129->10122 10131 7ff72b8f2c81 10130->10131 10132 7ff72b8f2914 14 API calls 10131->10132 10133 7ff72b8f2d0c 10132->10133 10134 7ff72b915a60 9 API calls 10133->10134 10135 7ff72b8f2d25 10134->10135 10135->10054 10139 7ff72b8f2dc8 GetLastError 10136->10139 10140 7ff72b8f2e2a 10139->10140 10141 7ff72b8f2dfb 10139->10141 10143 7ff72b8f2c74 14 API calls 10140->10143 10142 7ff72b8f2d80 14 API calls 10141->10142 10142->10140 10144 7ff72b8f2e68 10143->10144 10144->10068 10144->10069 10146 7ff72b8f4a40 10145->10146 10147 7ff72b8f4a2a 10145->10147 10149 7ff72b8f4a69 10146->10149 10159 7ff72b8f1ff4 10146->10159 10151 7ff72b8f48f4 10147->10151 10149->9991 10152 7ff72b8f4923 GetProcessHeap HeapAlloc 10151->10152 10153 7ff72b8f497a 10151->10153 10154 7ff72b8f4975 10152->10154 10155 7ff72b8f495a GetProcessHeap 10152->10155 10153->10146 10154->10153 10156 7ff72b8f4998 10154->10156 10157 7ff72b8f1ff4 3 API calls 10154->10157 10155->10154 10156->10153 10158 7ff72b8f49a5 GetProcessHeap HeapFree 10156->10158 10157->10156 10158->10153 10160 7ff72b8f2011 _o__errno 10159->10160 10161 7ff72b8f202d 10159->10161 10162 7ff72b8f2022 _o__invalid_parameter_noinfo 10160->10162 10161->10160 10163 7ff72b8f2055 10161->10163 10164 7ff72b8f2037 10161->10164 10162->10164 10163->10164 10165 7ff72b8f205a _o__errno 10163->10165 10164->10149 10165->10162 10168 7ff72b8f8a2e 10167->10168 10169 7ff72b8f899b 10167->10169 10168->9923 10168->9926 10168->9927 10169->10168 10170 7ff72b8f1430 11 API calls 10169->10170 10171 7ff72b8f89f4 InitOnceComplete 10170->10171 10171->10168 10185 7ff72b8f179c EtwEventWriteTransfer 10173->10185 10175 7ff72b8f10b1 10176 7ff72b915a60 9 API calls 10175->10176 10177 7ff72b8f10bd 10176->10177 10177->9933 10178->9923 10180 7ff72b8f112b 10179->10180 10186 7ff72b8f179c EtwEventWriteTransfer 10180->10186 10182 7ff72b8f1388 10183 7ff72b915a60 9 API calls 10182->10183 10184 7ff72b8f1394 10183->10184 10184->9923 10185->10175 10186->10182 10188 7ff72b915d16 RtlLookupFunctionEntry 10187->10188 10189 7ff72b915d2c RtlVirtualUnwind 10188->10189 10190 7ff72b915b1b 10188->10190 10189->10188 10189->10190 10191 7ff72b915a88 IsDebuggerPresent 10190->10191 10196 7ff72b9164f0 10191->10196 10193 7ff72b915aa7 SetUnhandledExceptionFilter UnhandledExceptionFilter 10194 7ff72b915acb GetCurrentProcess TerminateProcess 10193->10194 10195 7ff72b915ac1 10193->10195 10195->10194 10196->10193 10202 7ff72b8f179c EtwEventWriteTransfer 10197->10202 10199 7ff72b8f1bb4 10200 7ff72b915a60 9 API calls 10199->10200 10201 7ff72b8f1bc1 10200->10201 10201->9311 10202->10199 10204 7ff72b903dab RegisterWindowMessageW 10203->10204 10204->9333 10204->9334 10207 7ff72b902fcb 10205->10207 10215 7ff72b90304f 10205->10215 10206 7ff72b902fe4 LoadStringW 10206->10207 10208 7ff72b903012 LocalFree 10206->10208 10207->10206 10207->10208 10209 7ff72b90306f 10208->10209 10210 7ff72b90302d LocalAlloc 10208->10210 10211 7ff72b903073 LocalAlloc 10209->10211 10209->10215 10210->10207 10210->10215 10212 7ff72b903092 LocalSize 10211->10212 10211->10215 10213 7ff72b9030ab LoadStringW 10212->10213 10212->10215 10214 7ff72b9030dc 10213->10214 10213->10215 10214->10213 10214->10215 10215->9340 10217 7ff72b90e3f5 LoadIconW 10216->10217 10218 7ff72b90e419 10217->10218 10219 7ff72b90e40e 10217->10219 10220 7ff72b90e426 LoadImageW 10218->10220 10221 7ff72b90e45e RegisterClassExW 10218->10221 10219->10217 10219->10218 10220->10218 10220->10221 10221->9344 10224 7ff72b8f909d 10223->10224 10224->9346 10391 7ff72b90205c 10225->10391 10228 7ff72b90205c RegQueryValueExW 10229 7ff72b90272b 10228->10229 10230 7ff72b90205c RegQueryValueExW 10229->10230 10231 7ff72b902746 10230->10231 10232 7ff72b90205c RegQueryValueExW 10231->10232 10233 7ff72b902760 10232->10233 10234 7ff72b90205c RegQueryValueExW 10233->10234 10235 7ff72b90277a 10234->10235 10236 7ff72b90205c RegQueryValueExW 10235->10236 10237 7ff72b902794 10236->10237 10238 7ff72b90205c RegQueryValueExW 10237->10238 10239 7ff72b9027ae 10238->10239 10240 7ff72b90205c RegQueryValueExW 10239->10240 10241 7ff72b9027c8 10240->10241 10242 7ff72b90205c RegQueryValueExW 10241->10242 10243 7ff72b9027e2 10242->10243 10244 7ff72b90205c RegQueryValueExW 10243->10244 10245 7ff72b9027fc 10244->10245 10246 7ff72b90205c RegQueryValueExW 10245->10246 10247 7ff72b902816 RegOpenKeyExW 10246->10247 10248 7ff72b90284d 10247->10248 10249 7ff72b902898 10247->10249 10394 7ff72b9021a0 10248->10394 10251 7ff72b9021a0 2 API calls 10249->10251 10253 7ff72b9028bc 10251->10253 10255 7ff72b90205c RegQueryValueExW 10253->10255 10254 7ff72b90205c RegQueryValueExW 10256 7ff72b902885 RegCloseKey 10254->10256 10257 7ff72b9028d0 10255->10257 10256->10249 10258 7ff72b90205c RegQueryValueExW 10257->10258 10259 7ff72b9028ea 10258->10259 10260 7ff72b90290e 10259->10260 10399 7ff72b8fea48 10259->10399 10262 7ff72b8ff7cc 81 API calls 10260->10262 10263 7ff72b90295f 10262->10263 10264 7ff72b90205c RegQueryValueExW 10263->10264 10265 7ff72b902974 10264->10265 10266 7ff72b902998 10265->10266 10405 7ff72b8feba4 10265->10405 10268 7ff72b8ff7cc 81 API calls 10266->10268 10269 7ff72b9029e4 10268->10269 10270 7ff72b90205c RegQueryValueExW 10269->10270 10271 7ff72b9029f8 10270->10271 10272 7ff72b90205c RegQueryValueExW 10271->10272 10273 7ff72b902a12 10272->10273 10411 7ff72b9020c4 10273->10411 10276 7ff72b9020c4 4 API calls 10277 7ff72b902a3a 10276->10277 10278 7ff72b9020c4 4 API calls 10277->10278 10279 7ff72b902a51 10278->10279 10280 7ff72b9020c4 4 API calls 10279->10280 10281 7ff72b902a6b 10280->10281 10282 7ff72b9020c4 4 API calls 10281->10282 10283 7ff72b902a85 10282->10283 10284 7ff72b9021a0 2 API calls 10283->10284 10285 7ff72b902ab2 10284->10285 10286 7ff72b9021a0 2 API calls 10285->10286 10287 7ff72b902ad1 10286->10287 10288 7ff72b9021a0 2 API calls 10287->10288 10289 7ff72b902af5 10288->10289 10290 7ff72b9021a0 2 API calls 10289->10290 10291 7ff72b902b14 10290->10291 10292 7ff72b90205c RegQueryValueExW 10291->10292 10293 7ff72b902b2c 10292->10293 10294 7ff72b90205c RegQueryValueExW 10293->10294 10295 7ff72b902b4a 10294->10295 10296 7ff72b90205c RegQueryValueExW 10295->10296 10297 7ff72b902b68 10296->10297 10298 7ff72b90205c RegQueryValueExW 10297->10298 10299 7ff72b902b86 10298->10299 10300 7ff72b90205c RegQueryValueExW 10299->10300 10301 7ff72b902ba5 10300->10301 10302 7ff72b90205c RegQueryValueExW 10301->10302 10303 7ff72b902bbf 10302->10303 10304 7ff72b90205c RegQueryValueExW 10303->10304 10305 7ff72b902bd9 10304->10305 10306 7ff72b90205c RegQueryValueExW 10305->10306 10307 7ff72b902bf3 10306->10307 10308 7ff72b90205c RegQueryValueExW 10307->10308 10309 7ff72b902c0d 10308->10309 10310 7ff72b902c1d RegCloseKey 10309->10310 10311 7ff72b902c29 10309->10311 10310->10311 10312 7ff72b915a60 9 API calls 10311->10312 10313 7ff72b902c35 10312->10313 10314 7ff72b911538 CoCreateGuid 10313->10314 10315 7ff72b91157c 10314->10315 10316 7ff72b911585 10314->10316 10318 7ff72b915a60 9 API calls 10315->10318 10432 7ff72b8ffbb0 10316->10432 10319 7ff72b903f1c 10318->10319 10322 7ff72b90e624 10319->10322 10320 7ff72b911594 10320->10315 10321 7ff72b911617 CoTaskMemFree 10320->10321 10321->10315 10451 7ff72b916380 10322->10451 10325 7ff72b90e657 10325->9352 10328 7ff72b8ffcbc CoTaskMemFree 10327->10328 10329 7ff72b8ffcc8 10327->10329 10328->10329 10329->9355 10330 7ff72b911660 10329->10330 10331 7ff72b8ffbb0 20 API calls 10330->10331 10332 7ff72b911684 10331->10332 10333 7ff72b9116a7 RegisterApplicationRestart 10332->10333 10334 7ff72b9116a0 10332->10334 10333->10334 10335 7ff72b9116d7 10333->10335 10336 7ff72b8f2f4c 14 API calls 10334->10336 10337 7ff72b903f70 10335->10337 10338 7ff72b9116e0 CoTaskMemFree 10335->10338 10336->10335 10337->9355 10338->10337 10340 7ff72b8fdc4b 10339->10340 10341 7ff72b8fdc0a 10339->10341 10342 7ff72b8fdc3c 10340->10342 10344 7ff72b9137a0 17 API calls 10340->10344 10479 7ff72b9138a8 WindowsCreateStringReference 10341->10479 10350 7ff72b913990 10342->10350 10344->10342 10346 7ff72b8fdc13 10346->10342 10488 7ff72b912e14 WindowsCreateStringReference 10346->10488 10349 7ff72b9137a0 17 API calls 10349->10342 10351 7ff72b916380 3 API calls 10350->10351 10352 7ff72b9139c0 WindowsCreateStringReference 10351->10352 10354 7ff72b913b1b 10352->10354 10355 7ff72b913a4c RoGetActivationFactory 10352->10355 10500 7ff72b9126b8 RaiseException 10354->10500 10358 7ff72b913a89 10355->10358 10361 7ff72b913aa2 10355->10361 10360 7ff72b8f2f4c 14 API calls 10358->10360 10360->10361 10362 7ff72b915a60 9 API calls 10361->10362 10363 7ff72b904001 10362->10363 10363->9363 10363->9364 10365 7ff72b903804 10364->10365 10366 7ff72b90381c SendMessageW 10364->10366 10501 7ff72b9124d0 10365->10501 10368 7ff72b90385a 10366->10368 10369 7ff72b90384a 10366->10369 10372 7ff72b8ff7cc 81 API calls 10368->10372 10505 7ff72b8fe714 10369->10505 10373 7ff72b9038a7 SendMessageW SendMessageW 10372->10373 10374 7ff72b90390f 10373->10374 10375 7ff72b90391f 10373->10375 10511 7ff72b8fdfcc 10374->10511 10376 7ff72b8ff7cc 81 API calls 10375->10376 10378 7ff72b903967 SendMessageW 10376->10378 10379 7ff72b903995 10378->10379 10380 7ff72b9039a5 10378->10380 10517 7ff72b90e4c8 10379->10517 10382 7ff72b8ff7cc 81 API calls 10380->10382 10383 7ff72b9039ed SendMessageW 10382->10383 10523 7ff72b912434 10383->10523 10387 7ff72b903a45 10386->10387 10388 7ff72b903a5d 10386->10388 10389 7ff72b9124d0 9 API calls 10387->10389 10390 7ff72b903a4a DestroyWindow 10389->10390 10390->10388 10392 7ff72b9020a8 10391->10392 10393 7ff72b902081 RegQueryValueExW 10391->10393 10392->10228 10393->10392 10395 7ff72b9021d5 RegQueryValueExW 10394->10395 10396 7ff72b9021ff memcpy 10394->10396 10395->10396 10397 7ff72b9021f8 10395->10397 10398 7ff72b902210 10396->10398 10397->10396 10397->10398 10398->10254 10400 7ff72b8fea6c 10399->10400 10403 7ff72b8feb75 10399->10403 10417 7ff72b8f7454 10400->10417 10403->10260 10406 7ff72b8fecd1 10405->10406 10407 7ff72b8febc8 10405->10407 10406->10266 10408 7ff72b8f7454 3 API calls 10407->10408 10409 7ff72b8febcd 10408->10409 10409->10406 10410 7ff72b8f7524 10 API calls 10409->10410 10410->10406 10412 7ff72b902129 RegCreateKeyW 10411->10412 10413 7ff72b9020f9 RegQueryValueExW 10411->10413 10414 7ff72b90214e RegSetValueExW RegCloseKey 10412->10414 10415 7ff72b90218b 10412->10415 10416 7ff72b902120 10413->10416 10414->10415 10415->10276 10416->10412 10416->10415 10418 7ff72b8f7504 10417->10418 10419 7ff72b8f7468 10417->10419 10418->10403 10425 7ff72b8f7524 10418->10425 10419->10418 10420 7ff72b8f7474 AcquireSRWLockExclusive 10419->10420 10421 7ff72b8f7491 ReleaseSRWLockExclusive 10420->10421 10422 7ff72b8f74ac 10420->10422 10421->10418 10422->10421 10424 7ff72b8f74f8 ReleaseSRWLockExclusive 10422->10424 10424->10418 10426 7ff72b8f7544 AcquireSRWLockExclusive 10425->10426 10427 7ff72b8f75ad 10425->10427 10428 7ff72b8f7561 10426->10428 10429 7ff72b8f7585 ReleaseSRWLockExclusive 10426->10429 10427->10403 10428->10429 10431 7ff72b8f49fc 8 API calls 10428->10431 10429->10427 10431->10429 10433 7ff72b8ffbde 10432->10433 10440 7ff72b8ffbe8 CoTaskMemAlloc 10432->10440 10434 7ff72b8ffc90 10433->10434 10433->10440 10436 7ff72b8f2fc4 14 API calls 10434->10436 10439 7ff72b8ffca6 10436->10439 10437 7ff72b8ffc41 10438 7ff72b8ffc5a 10437->10438 10442 7ff72b8ffd84 10437->10442 10438->10320 10440->10437 10440->10438 10446 7ff72b8ffda5 10442->10446 10449 7ff72b8ffda1 10442->10449 10443 7ff72b8ffdaa _o__errno 10444 7ff72b8ffdbb _o__invalid_parameter_noinfo 10443->10444 10444->10449 10445 7ff72b8ffddd memset 10445->10443 10448 7ff72b8ffdec 10445->10448 10446->10443 10446->10445 10447 7ff72b8ffdd0 memcpy 10446->10447 10447->10449 10448->10449 10450 7ff72b8ffdf1 _o__errno 10448->10450 10449->10438 10450->10444 10464 7ff72b916988 10451->10464 10453 7ff72b90e645 10453->10325 10454 7ff72b910b9c 10453->10454 10458 7ff72b910bee 10454->10458 10455 7ff72b910c6a 10456 7ff72b910c80 10455->10456 10457 7ff72b910c74 CoTaskMemFree 10455->10457 10456->10325 10457->10456 10458->10455 10458->10456 10459 7ff72b8ffbb0 20 API calls 10458->10459 10461 7ff72b910c1c 10459->10461 10460 7ff72b910c51 10460->10455 10462 7ff72b910c5b CoTaskMemFree 10460->10462 10461->10460 10476 7ff72b8fdcd8 10461->10476 10462->10455 10465 7ff72b9169a2 _o_malloc 10464->10465 10466 7ff72b9169ac 10465->10466 10467 7ff72b916993 10465->10467 10466->10453 10467->10465 10468 7ff72b9169b2 10467->10468 10469 7ff72b9169bd 10468->10469 10472 7ff72b916b44 10468->10472 10471 7ff72b9169c3 _o___std_exception_copy 10469->10471 10471->10453 10475 7ff72b916a1c 10472->10475 10474 7ff72b916b52 _CxxThrowException 10475->10474 10477 7ff72b8fdd02 GetLastError CoTaskMemFree SetLastError 10476->10477 10478 7ff72b8fdd2d 10476->10478 10477->10478 10478->10460 10480 7ff72b9138f9 RoGetActivationFactory 10479->10480 10481 7ff72b91397f 10479->10481 10484 7ff72b913931 10480->10484 10498 7ff72b9126b8 RaiseException 10481->10498 10486 7ff72b915a60 9 API calls 10484->10486 10487 7ff72b8fdc0f 10486->10487 10487->10340 10487->10346 10489 7ff72b912e5d RoGetActivationFactory 10488->10489 10490 7ff72b912ee2 10488->10490 10492 7ff72b912e80 10489->10492 10495 7ff72b912e99 10489->10495 10499 7ff72b9126b8 RaiseException 10490->10499 10494 7ff72b8f2f4c 14 API calls 10492->10494 10494->10495 10496 7ff72b915a60 9 API calls 10495->10496 10497 7ff72b8fdc27 10496->10497 10497->10342 10497->10349 10502 7ff72b9124f4 10501->10502 10503 7ff72b915a60 9 API calls 10502->10503 10504 7ff72b903809 DestroyWindow 10503->10504 10504->10366 10506 7ff72b8fe738 10505->10506 10509 7ff72b8fe841 10505->10509 10507 7ff72b8f7454 3 API calls 10506->10507 10508 7ff72b8fe73d 10507->10508 10508->10509 10510 7ff72b8f7524 10 API calls 10508->10510 10509->10368 10510->10509 10512 7ff72b8fdff0 10511->10512 10513 7ff72b8fe0f9 10511->10513 10514 7ff72b8f7454 3 API calls 10512->10514 10513->10375 10515 7ff72b8fdff5 10514->10515 10515->10513 10516 7ff72b8f7524 10 API calls 10515->10516 10516->10513 10518 7ff72b90e5f5 10517->10518 10519 7ff72b90e4ec 10517->10519 10518->10380 10520 7ff72b8f7454 3 API calls 10519->10520 10521 7ff72b90e4f1 10520->10521 10521->10518 10522 7ff72b8f7524 10 API calls 10521->10522 10522->10518 10524 7ff72b912452 CoCreateInstance 10523->10524 10525 7ff72b903a21 SendMessageW SendMessageW SendMessageW CreateStatusWindowW 10523->10525 10524->10525 10525->9333 10525->9371 10531 7ff72b8f179c EtwEventWriteTransfer 10526->10531 10528 7ff72b8f1c4d 10529 7ff72b915a60 9 API calls 10528->10529 10530 7ff72b8f1c5d 10529->10530 10530->9872 10531->10528 10532->9879 10765 7ff72b917107 10766 7ff72b91710c 10765->10766 10769 7ff72b915510 LdrResolveDelayLoadedAPI 10766->10769 10768 7ff72b91714b 10769->10768 10535 7ff72b916040 InitializeCriticalSectionAndSpinCount GetModuleHandleW 10536 7ff72b91609c GetProcAddress GetProcAddress GetProcAddress 10535->10536 10537 7ff72b916082 GetModuleHandleW 10535->10537 10539 7ff72b91615b CreateEventW 10536->10539 10540 7ff72b9160dd 10536->10540 10537->10536 10538 7ff72b916187 10537->10538 10541 7ff72b916500 9 API calls 10538->10541 10539->10538 10543 7ff72b9160e7 10539->10543 10540->10539 10540->10543 10542 7ff72b916191 DeleteCriticalSection 10541->10542 10544 7ff72b9161bd CloseHandle 10542->10544 10545 7ff72b9161c3 10542->10545 10546 7ff72b915e04 10 API calls 10543->10546 10544->10545 10547 7ff72b916137 10546->10547 10548 7ff72b91613c 10547->10548 10549 7ff72b916500 9 API calls 10547->10549 10550 7ff72b916186 10549->10550 10550->10538 12943 7ff72b91558a 12945 7ff72b915596 12943->12945 12946 7ff72b915510 LdrResolveDelayLoadedAPI 12945->12946 12946->12945 10551 7ff72b915890 10555 7ff72b9166f8 SetUnhandledExceptionFilter 10551->10555

Executed Functions

APIs
  • RegisterWindowMessageW.USER32(?,?,?,00000000,00000000,?,00000000,?,00007FF72B8FC29E), ref: 00007FF72B903DD2
  • RegisterWindowMessageW.USER32(?,?,?,00000000,00000000,?,00000000,?,00007FF72B8FC29E), ref: 00007FF72B903DF5
  • GetDC.USER32 ref: 00007FF72B903E11
    • Part of subcall function 00007FF72B902F84: LocalAlloc.KERNEL32 ref: 00007FF72B902FB3
    • Part of subcall function 00007FF72B902F84: LoadStringW.USER32 ref: 00007FF72B902FF2
    • Part of subcall function 00007FF72B902F84: LocalFree.KERNEL32 ref: 00007FF72B903015
    • Part of subcall function 00007FF72B902F84: LocalAlloc.KERNEL32 ref: 00007FF72B90303B
  • LoadCursorW.USER32 ref: 00007FF72B903E40
  • LoadCursorW.USER32 ref: 00007FF72B903E5A
  • LoadAcceleratorsW.USER32 ref: 00007FF72B903E77
  • LoadAcceleratorsW.USER32 ref: 00007FF72B903E94
    • Part of subcall function 00007FF72B90E3A0: LoadCursorW.USER32 ref: 00007FF72B90E3DF
    • Part of subcall function 00007FF72B90E3A0: LoadIconW.USER32 ref: 00007FF72B90E3FD
    • Part of subcall function 00007FF72B90E3A0: LoadImageW.USER32 ref: 00007FF72B90E442
    • Part of subcall function 00007FF72B90E3A0: RegisterClassExW.USER32 ref: 00007FF72B90E495
    • Part of subcall function 00007FF72B8F9058: GetLocaleInfoW.KERNEL32 ref: 00007FF72B8F9089
    • Part of subcall function 00007FF72B902648: memset.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF72B902677
    • Part of subcall function 00007FF72B902648: RegOpenKeyExW.ADVAPI32 ref: 00007FF72B9026DC
    • Part of subcall function 00007FF72B911538: CoCreateGuid.API-MS-WIN-CORE-COM-L1-1-0 ref: 00007FF72B91156C
    • Part of subcall function 00007FF72B8FFCB0: CoTaskMemFree.API-MS-WIN-CORE-COM-L1-1-0 ref: 00007FF72B8FFCBC
  • CreateWindowExW.USER32 ref: 00007FF72B903FC4
  • GetWindowPlacement.USER32(?,?,?,00000000,00000000,?,00000000,?,00007FF72B8FC29E), ref: 00007FF72B904069
  • SetThreadDpiAwarenessContext.USER32 ref: 00007FF72B9040DA
  • SetWindowPlacement.USER32(?,?,?,00000000,00000000,?,00000000,?,00007FF72B8FC29E), ref: 00007FF72B9040F3
  • SetThreadDpiAwarenessContext.USER32 ref: 00007FF72B904102
  • GetClientRect.USER32 ref: 00007FF72B904138
    • Part of subcall function 00007FF72B911660: CoTaskMemFree.API-MS-WIN-CORE-COM-L1-1-0(?,?,00000001,00007FF72B90369B), ref: 00007FF72B9116E3
  • CreateWindowExW.USER32 ref: 00007FF72B9041AC
    • Part of subcall function 00007FF72B9037E8: DestroyWindow.USER32(?,?,?,?,?,?,?,?,FFFFFFEC,00000000,?,00007FF72B90ED58), ref: 00007FF72B903810
    • Part of subcall function 00007FF72B9037E8: SendMessageW.USER32(?,?,?,?,?,?,?,?,FFFFFFEC,00000000,?,00007FF72B90ED58), ref: 00007FF72B903831
    • Part of subcall function 00007FF72B9037E8: SendMessageW.USER32 ref: 00007FF72B9038C9
    • Part of subcall function 00007FF72B9037E8: SendMessageW.USER32 ref: 00007FF72B9038F6
    • Part of subcall function 00007FF72B9037E8: SendMessageW.USER32 ref: 00007FF72B90397C
  • SendMessageW.USER32(?,?,?,00000000,00000000,?,00000000,?,00007FF72B8FC29E), ref: 00007FF72B9041DD
  • SendMessageW.USER32(?,?,?,00000000,00000000,?,00000000,?,00007FF72B8FC29E), ref: 00007FF72B9041FB
  • SendMessageW.USER32(?,?,?,00000000,00000000,?,00000000,?,00007FF72B8FC29E), ref: 00007FF72B90421D
  • CreateStatusWindowW.COMCTL32(?,?,?,00000000,00000000,?,00000000,?,00007FF72B8FC29E), ref: 00007FF72B904253
    • Part of subcall function 00007FF72B903A30: DestroyWindow.USER32 ref: 00007FF72B903A51
    • Part of subcall function 00007FF72B8FC4BC: SendMessageW.USER32 ref: 00007FF72B8FC571
    • Part of subcall function 00007FF72B8FC4BC: memset.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF72B8FC58C
    • Part of subcall function 00007FF72B8FC4BC: SendMessageW.USER32 ref: 00007FF72B8FC5E8
    • Part of subcall function 00007FF72B8FC4BC: memset.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF72B8FC677
  • GetClientRect.USER32 ref: 00007FF72B904286
    • Part of subcall function 00007FF72B903A80: MonitorFromWindow.USER32 ref: 00007FF72B903ABB
    • Part of subcall function 00007FF72B903A80: GetDpiForMonitor.API-MS-WIN-SHCORE-SCALING-L1-1-1 ref: 00007FF72B903AD4
    • Part of subcall function 00007FF72B903A80: MulDiv.KERNEL32 ref: 00007FF72B903B5B
    • Part of subcall function 00007FF72B903A80: MulDiv.KERNEL32 ref: 00007FF72B903BD7
  • SendMessageW.USER32(?,?,?,00000000,00000000,?,00000000,?,00007FF72B8FC29E), ref: 00007FF72B9042B9
  • GetDpiForWindow.USER32 ref: 00007FF72B9042DA
  • MulDiv.KERNEL32(?,?,?,00000000,00000000,?,00000000,?,00007FF72B8FC29E), ref: 00007FF72B9042F4
  • CreateFontIndirectW.GDI32 ref: 00007FF72B904312
  • SelectObject.GDI32(?,?,?,00000000,00000000,?,00000000,?,00007FF72B8FC29E), ref: 00007FF72B90432B
  • GetTextFaceW.GDI32(?,?,?,00000000,00000000,?,00000000,?,00007FF72B8FC29E), ref: 00007FF72B904347
  • SelectObject.GDI32(?,?,?,00000000,00000000,?,00000000,?,00007FF72B8FC29E), ref: 00007FF72B904359
  • lstrcmpiW.KERNEL32(?,?,?,00000000,00000000,?,00000000,?,00007FF72B8FC29E), ref: 00007FF72B904373
  • EnumFontsW.GDI32(?,?,?,00000000,00000000,?,00000000,?,00007FF72B8FC29E), ref: 00007FF72B904397
  • DeleteObject.GDI32 ref: 00007FF72B9043AA
  • CreateFontIndirectW.GDI32 ref: 00007FF72B9043B9
    • Part of subcall function 00007FF72B902C54: CharUpperW.USER32 ref: 00007FF72B902C77
    • Part of subcall function 00007FF72B902C54: CharUpperW.USER32 ref: 00007FF72B902C8D
  • SendMessageW.USER32(?,?,?,00000000,00000000,?,00000000,?,00007FF72B8FC29E), ref: 00007FF72B9043E6
  • ReleaseDC.USER32 ref: 00007FF72B9043F7
  • SendMessageW.USER32(?,?,?,00000000,00000000,?,00000000,?,00007FF72B8FC29E), ref: 00007FF72B904415
  • ShowWindow.USER32(?,?,?,00000000,00000000,?,00000000,?,00007FF72B8FC29E), ref: 00007FF72B90444E
  • SetCursor.USER32(?,?,?,00000000,00000000,?,00000000,?,00007FF72B8FC29E), ref: 00007FF72B904461
Strings
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: Message$SendWindow$Load$Create$Cursor$FreeLocalObjectRegistermemset$AcceleratorsAllocAwarenessCharClientContextDestroyFontIndirectMonitorPlacementRectSelectTaskThreadUpper$ClassDeleteEnumFaceFontsFromGuidIconImageInfoLocaleOpenReleaseShowStatusStringTextlstrcmpi
  • String ID: $3$Default$Edit$GlobalAcc$MainAcc$NPCTXT$Notepad$NtQuerySystemInformation$Security-SPP-GenuineLocalStatus$Segoe UI Light$WinSta0$commdlg_FindReplace$commdlg_help$ntdll.dll$z$z$z${${${
  • API String ID: 2606882876-378693033
  • Opcode ID: 774b86368fcfd5e259140c1396230457c64330d3984e115934ba3f3a6fb7ffd9
  • Instruction ID: f6fd4068fd0d50b38fcc325830c767f5921d6d10d36e8284a5b20a3e7bf31559
  • Opcode Fuzzy Hash: 774b86368fcfd5e259140c1396230457c64330d3984e115934ba3f3a6fb7ffd9
  • Instruction Fuzzy Hash: 8024E332A18682CAE724DF39DD442B9BBA1FB89744F859535CA8E87764DF3CE540CB10
Uniqueness

Uniqueness Score: -1.00%

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 1781 7ff72b8fc0f8-7ff72b8fc12c 1782 7ff72b8fc12e-7ff72b8fc145 call 7ff72b8fe284 1781->1782 1783 7ff72b8fc148-7ff72b8fc21c call 7ff72b8ff7cc GetCommandLineW CoCreateGuid call 7ff72b8f1430 call 7ff72b9118b4 HeapSetInformation CoInitializeEx 1781->1783 1782->1783 1792 7ff72b8fc222-7ff72b8fc23f call 7ff72b914d80 1783->1792 1793 7ff72b8fc46e-7ff72b8fc4b2 EtwEventUnregister 1783->1793 1796 7ff72b8fc276-7ff72b8fc279 1792->1796 1797 7ff72b8fc241-7ff72b8fc245 1796->1797 1798 7ff72b8fc27b-7ff72b8fc27f 1796->1798 1801 7ff72b8fc24d-7ff72b8fc24f 1797->1801 1802 7ff72b8fc247-7ff72b8fc24b 1797->1802 1799 7ff72b8fc281-7ff72b8fc285 1798->1799 1800 7ff72b8fc287-7ff72b8fc28b 1798->1800 1799->1800 1803 7ff72b8fc28d-7ff72b8fc299 call 7ff72b903d8c 1799->1803 1800->1798 1801->1798 1804 7ff72b8fc251-7ff72b8fc255 1801->1804 1802->1801 1802->1804 1808 7ff72b8fc29e-7ff72b8fc2a0 1803->1808 1805 7ff72b8fc261-7ff72b8fc273 CharNextW 1804->1805 1806 7ff72b8fc257-7ff72b8fc25f 1804->1806 1805->1796 1806->1805 1809 7ff72b8fc2a6-7ff72b8fc2ec call 7ff72b8fc070 call 7ff72b911934 GetCurrentProcessId SetWinEventHook 1808->1809 1810 7ff72b8fc41e-7ff72b8fc428 1808->1810 1825 7ff72b8fc399-7ff72b8fc3b3 GetMessageW 1809->1825 1811 7ff72b8fc436-7ff72b8fc440 1810->1811 1812 7ff72b8fc42a-7ff72b8fc42f call 7ff72b913b2c 1810->1812 1815 7ff72b8fc442-7ff72b8fc447 call 7ff72b9137a0 1811->1815 1816 7ff72b8fc44e-7ff72b8fc451 1811->1816 1812->1811 1815->1816 1820 7ff72b8fc453-7ff72b8fc45d FreeLibrary 1816->1820 1821 7ff72b8fc462-7ff72b8fc469 CoUninitialize 1816->1821 1820->1821 1821->1793 1826 7ff72b8fc2f1-7ff72b8fc2f5 1825->1826 1827 7ff72b8fc3b9-7ff72b8fc3ef call 7ff72b900d80 call 7ff72b911d00 1825->1827 1829 7ff72b8fc315-7ff72b8fc335 TranslateAcceleratorW 1826->1829 1830 7ff72b8fc2f7-7ff72b8fc310 PostMessageW 1826->1830 1838 7ff72b8fc405-7ff72b8fc40d call 7ff72b8f900c 1827->1838 1839 7ff72b8fc3f1-7ff72b8fc3fe 1827->1839 1829->1825 1831 7ff72b8fc337-7ff72b8fc341 1829->1831 1830->1829 1833 7ff72b8fc343-7ff72b8fc355 IsDialogMessageW 1831->1833 1834 7ff72b8fc357-7ff72b8fc377 TranslateAcceleratorW 1831->1834 1833->1825 1833->1834 1834->1825 1836 7ff72b8fc379-7ff72b8fc394 TranslateMessage DispatchMessageW 1834->1836 1836->1825 1838->1810 1843 7ff72b8fc40f-7ff72b8fc419 UnhookWinEvent 1838->1843 1839->1838 1843->1810
APIs
Strings
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: Message$EventTranslate$Accelerator$CharCommandCreateCurrentDialogDispatchFreeGuidHeapHookInformationInitializeLibraryLineNextPostProcessUnhookUninitializeUnregister
  • String ID:
  • API String ID: 3896377122-3916222277
  • Opcode ID: b800bbb01b60699f523c104b0402643c193bf7154c30916286245b2a7f63fdbc
  • Instruction ID: 2fd41ec456545303b524ce4b1887ba3d96612ab6b273ce091b9cb441acf6cb9a
  • Opcode Fuzzy Hash: b800bbb01b60699f523c104b0402643c193bf7154c30916286245b2a7f63fdbc
  • Instruction Fuzzy Hash: 61B15F21E19642CAEB10AF29EC40278BBA0FB99B84BC59131DA4D43774DF3CE555DF60
Uniqueness

Uniqueness Score: -1.00%

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 1867 7ff72b8f7834-7ff72b8f78c9 GetCurrentProcessId call 7ff72b8f21f0 CreateMutexW 1870 7ff72b8f78cb-7ff72b8f78d2 call 7ff72b8f288c 1867->1870 1871 7ff72b8f78d7-7ff72b8f78f1 WaitForSingleObjectEx 1867->1871 1879 7ff72b8f7989-7ff72b8f798c 1870->1879 1873 7ff72b8f78f3-7ff72b8f78f5 1871->1873 1874 7ff72b8f7902-7ff72b8f7907 1871->1874 1876 7ff72b8f790e 1873->1876 1877 7ff72b8f78f7-7ff72b8f78fc 1873->1877 1874->1876 1878 7ff72b8f7909-7ff72b8f790c 1874->1878 1881 7ff72b8f7911-7ff72b8f7922 call 7ff72b8f8504 1876->1881 1877->1874 1880 7ff72b8f7b4d-7ff72b8f7b65 call 7ff72b8f2fc4 1877->1880 1878->1881 1882 7ff72b8f7996-7ff72b8f79c2 call 7ff72b915a60 1879->1882 1883 7ff72b8f798e-7ff72b8f7991 call 7ff72b8f300c 1879->1883 1888 7ff72b8f7927-7ff72b8f7932 1881->1888 1883->1882 1890 7ff72b8f7934-7ff72b8f7949 call 7ff72b8f2f4c 1888->1890 1891 7ff72b8f794b-7ff72b8f7954 1888->1891 1893 7ff72b8f7956-7ff72b8f7958 1890->1893 1891->1893 1896 7ff72b8f7964-7ff72b8f7967 1893->1896 1897 7ff72b8f795a-7ff72b8f795f 1893->1897 1899 7ff72b8f79c4-7ff72b8f79fb GetProcessHeap HeapAlloc 1896->1899 1900 7ff72b8f7969-7ff72b8f7978 1896->1900 1898 7ff72b8f7b36-7ff72b8f7b48 call 7ff72b8f2f4c 1897->1898 1907 7ff72b8f797c-7ff72b8f797f 1898->1907 1901 7ff72b8f79fd-7ff72b8f7a0f GetProcessHeap 1899->1901 1902 7ff72b8f7a18-7ff72b8f7a20 1899->1902 1903 7ff72b8f797a 1900->1903 1901->1902 1905 7ff72b8f7a43-7ff72b8f7a62 call 7ff72b8f30fc 1902->1905 1906 7ff72b8f7a22-7ff72b8f7a3e call 7ff72b8f2f4c 1902->1906 1903->1907 1916 7ff72b8f7a64-7ff72b8f7a83 call 7ff72b8f2f4c 1905->1916 1917 7ff72b8f7abb-7ff72b8f7b26 memset call 7ff72b8f5d50 InitializeCriticalSectionEx 1905->1917 1915 7ff72b8f7b31 1906->1915 1907->1879 1911 7ff72b8f7981-7ff72b8f7984 call 7ff72b8f3040 1907->1911 1911->1879 1915->1898 1923 7ff72b8f7a85 call 7ff72b8f300c 1916->1923 1924 7ff72b8f7a8a-7ff72b8f7a92 1916->1924 1922 7ff72b8f7b29-7ff72b8f7b2b 1917->1922 1922->1903 1922->1915 1923->1924 1925 7ff72b8f7a94 call 7ff72b8f300c 1924->1925 1926 7ff72b8f7a99-7ff72b8f7ab9 GetProcessHeap HeapFree 1924->1926 1925->1926 1926->1922
APIs
  • GetCurrentProcessId.KERNEL32 ref: 00007FF72B8F7870
    • Part of subcall function 00007FF72B8F21F0: _vsnwprintf.LEGACY_STDIO_DEFINITIONS ref: 00007FF72B8F2230
  • CreateMutexW.KERNELBASE ref: 00007FF72B8F78B2
  • WaitForSingleObjectEx.KERNEL32 ref: 00007FF72B8F78E0
    • Part of subcall function 00007FF72B8F288C: GetLastError.KERNEL32 ref: 00007FF72B8F2890
Strings
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: CreateCurrentErrorLastMutexObjectProcessSingleWait_vsnwprintf
  • String ID: Local\SM0:%d:%d:%hs$onecore\internal\sdk\inc\wil\opensource\wil\resource.h$wil
  • API String ID: 3333087404-847674279
  • Opcode ID: 290427eb6a8cfaae9462c989ded2c180355f76e308b537b2daba1739bbdf1464
  • Instruction ID: e168b2621ea31838e93e39459c95464d9667cf0b7ad2ae9cb569752cb63f1ba6
  • Opcode Fuzzy Hash: 290427eb6a8cfaae9462c989ded2c180355f76e308b537b2daba1739bbdf1464
  • Instruction Fuzzy Hash: 2C919136618B4286F760AF29EC402B9E761EB99B90FC09131DE8E47B65DF3CF1518B50
Uniqueness

Uniqueness Score: -1.00%

APIs
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: DelayLoadedResolve
  • String ID:
  • API String ID: 841769287-0
  • Opcode ID: dea47fbc23d7e09865cf3b99bb5978a4bf16469b3637a03c9014ba8686a2ba8a
  • Instruction ID: 74db4b30fb7ef995cdd51dcc1ce411bad5b3b3c3d564711493825bc351d5c7f9
  • Opcode Fuzzy Hash: dea47fbc23d7e09865cf3b99bb5978a4bf16469b3637a03c9014ba8686a2ba8a
  • Instruction Fuzzy Hash: 69E0B6B8918A42CAE610AB18EC40064BBA0FB99784FC05172D98D57334CB3CA115EF24
Uniqueness

Uniqueness Score: -1.00%

APIs
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: ExceptionFilterUnhandled
  • String ID:
  • API String ID: 3192549508-0
  • Opcode ID: 6496e19406f577a6234f9bd5db48dbed12d8b8de2af6806225c28b51bb82dcee
  • Instruction ID: d3afe576eb9dd5ece4822e0966359f352c42a0be472989de68cfaceda1a46863
  • Opcode Fuzzy Hash: 6496e19406f577a6234f9bd5db48dbed12d8b8de2af6806225c28b51bb82dcee
  • Instruction Fuzzy Hash: 79C04800E2E642C9E90837AD0C520B891A1CFC6300F90A075D58D052A2CC2C21D6BE32
Uniqueness

Uniqueness Score: -1.00%

Control-flow Graph

APIs
  • InitializeCriticalSectionAndSpinCount.API-MS-WIN-CORE-SYNCH-L1-1-0 ref: 00007FF72B916065
  • GetModuleHandleW.KERNELBASE ref: 00007FF72B916073
  • GetModuleHandleW.KERNEL32 ref: 00007FF72B916089
  • GetProcAddress.KERNEL32 ref: 00007FF72B9160A6
  • GetProcAddress.KERNEL32 ref: 00007FF72B9160BA
  • GetProcAddress.KERNEL32 ref: 00007FF72B9160CE
  • CreateEventW.API-MS-WIN-CORE-SYNCH-L1-1-0 ref: 00007FF72B916167
    • Part of subcall function 00007FF72B916500: IsProcessorFeaturePresent.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-1 ref: 00007FF72B91651C
    • Part of subcall function 00007FF72B916500: memset.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF72B916540
    • Part of subcall function 00007FF72B916500: RtlCaptureContext.API-MS-WIN-CORE-RTLSUPPORT-L1-1-0 ref: 00007FF72B916549
    • Part of subcall function 00007FF72B916500: RtlLookupFunctionEntry.API-MS-WIN-CORE-RTLSUPPORT-L1-1-0 ref: 00007FF72B916563
    • Part of subcall function 00007FF72B916500: RtlVirtualUnwind.API-MS-WIN-CORE-RTLSUPPORT-L1-1-0 ref: 00007FF72B9165A4
    • Part of subcall function 00007FF72B916500: memset.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF72B9165D7
    • Part of subcall function 00007FF72B916500: IsDebuggerPresent.KERNEL32 ref: 00007FF72B9165F8
    • Part of subcall function 00007FF72B916500: SetUnhandledExceptionFilter.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FF72B916619
    • Part of subcall function 00007FF72B916500: UnhandledExceptionFilter.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FF72B916624
  • DeleteCriticalSection.KERNEL32 ref: 00007FF72B9161AB
  • CloseHandle.KERNEL32 ref: 00007FF72B9161BD
Strings
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: AddressHandleProc$CriticalExceptionFilterModulePresentSectionUnhandledmemset$CaptureCloseContextCountCreateDebuggerDeleteEntryEventFeatureFunctionInitializeLookupProcessorSpinUnwindVirtual
  • String ID: InitializeConditionVariable$SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
  • API String ID: 2631387040-1714406822
  • Opcode ID: db24618b5eb622cb5cbbe5ed6acf9d879f6c38c64999a3de1d0b09191ce256e2
  • Instruction ID: 3af49ee5e23166bf2815f2b988506c30d04d8607b438de2b59058b9003a4200c
  • Opcode Fuzzy Hash: db24618b5eb622cb5cbbe5ed6acf9d879f6c38c64999a3de1d0b09191ce256e2
  • Instruction Fuzzy Hash: D1414120E29B02CEFA14BB28EC50275A261EF86750FC46535C98E577B5DF3CE445EA20
Uniqueness

Uniqueness Score: -1.00%

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 1929 7ff72b914d80-7ff72b914dbc RoInitialize 1930 7ff72b914dc2-7ff72b914de9 WindowsCreateStringReference 1929->1930 1931 7ff72b914ff3-7ff72b915014 call 7ff72b915a60 1929->1931 1933 7ff72b914deb-7ff72b914e01 RaiseException 1930->1933 1934 7ff72b914e06-7ff72b914e11 1930->1934 1933->1934 1936 7ff72b914e20-7ff72b914e3e RoGetActivationFactory 1934->1936 1937 7ff72b914e13-7ff72b914e16 1934->1937 1938 7ff72b914e44-7ff72b914e54 1936->1938 1939 7ff72b914fd6-7ff72b914fdd 1936->1939 1937->1936 1942 7ff72b914e5e-7ff72b914e62 1938->1942 1940 7ff72b914fdf-7ff72b914fe7 1939->1940 1941 7ff72b914ff1 1939->1941 1940->1941 1941->1931 1943 7ff72b914e68-7ff72b914e8a 1942->1943 1944 7ff72b914fbb-7ff72b914fc2 1942->1944 1947 7ff72b914e90-7ff72b914e93 1943->1947 1948 7ff72b914fa1-7ff72b914fa4 1943->1948 1944->1939 1945 7ff72b914fc4-7ff72b914fcc 1944->1945 1945->1939 1949 7ff72b914e9f-7ff72b914ee4 WindowsCreateStringReference 1947->1949 1950 7ff72b914e95-7ff72b914e9a 1947->1950 1948->1944 1951 7ff72b914fa6-7ff72b914fb1 1948->1951 1953 7ff72b914eea-7ff72b914eed 1949->1953 1954 7ff72b914f83-7ff72b914f86 1949->1954 1950->1948 1951->1944 1957 7ff72b914ef9-7ff72b914f28 WindowsDeleteString 1953->1957 1958 7ff72b914eef-7ff72b914ef4 1953->1958 1955 7ff72b914f88-7ff72b914f93 1954->1955 1956 7ff72b914f9d 1954->1956 1955->1956 1956->1948 1960 7ff72b914f2a-7ff72b914f2d 1957->1960 1961 7ff72b914f6e-7ff72b914f71 1957->1961 1958->1954 1962 7ff72b914f2f-7ff72b914f34 1960->1962 1963 7ff72b914f36-7ff72b914f6c WindowsGetStringRawBuffer LoadLibraryExW RoUninitialize 1960->1963 1964 7ff72b914f7f 1961->1964 1965 7ff72b914f73-7ff72b914f7a WindowsDeleteString 1961->1965 1962->1961 1963->1961 1964->1954 1965->1964
APIs
Strings
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: StringWindows$CreateDeleteReference$ActivationExceptionFactoryInitializeRaise
  • String ID: Files/Resources/notepad.exe.mui$Windows.ApplicationModel.Resources.Core.ResourceManager
  • API String ID: 2941117075-1600936776
  • Opcode ID: cd55610a5b8c9c32416645b74090953f83fd87d13f39ecf97c98aacf6dd4e747
  • Instruction ID: 53ea84de1ab9bf003bfeb82b138e8f77e44367768c93b7df71dc29153627fce6
  • Opcode Fuzzy Hash: cd55610a5b8c9c32416645b74090953f83fd87d13f39ecf97c98aacf6dd4e747
  • Instruction Fuzzy Hash: E5811A36B24B06CAEB009B69D8943ACBB71FB89B84F946135CE4D57B64CF38E405DB10
Uniqueness

Uniqueness Score: -1.00%

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 1966 7ff72b9158b0-7ff72b9158c6 call 7ff72b915db4 1969 7ff72b9159fc-7ff72b915a06 call 7ff72b916500 1966->1969 1970 7ff72b9158cc-7ff72b9158e4 call 7ff72b915d74 1966->1970 1975 7ff72b915a07-7ff72b915a0c call 7ff72b916500 1969->1975 1970->1975 1976 7ff72b9158ea-7ff72b9158ec 1970->1976 1981 7ff72b915a11-7ff72b915a13 call 7ff72b916d18 1975->1981 1978 7ff72b915938-7ff72b91593b 1976->1978 1979 7ff72b9158ee-7ff72b91590d call 7ff72b916bf8 1976->1979 1980 7ff72b915940-7ff72b915953 call 7ff72b915f5c call 7ff72b9164d0 1978->1980 1986 7ff72b915919-7ff72b915927 call 7ff72b916bec 1979->1986 1987 7ff72b91590f-7ff72b915914 1979->1987 1996 7ff72b915973-7ff72b91597f call 7ff72b9164e0 1980->1996 1997 7ff72b915955-7ff72b91595f call 7ff72b915ebc 1980->1997 1989 7ff72b915a18-7ff72b915a21 _o__exit 1981->1989 1994 7ff72b91592c-7ff72b915936 1986->1994 1990 7ff72b9159f1-7ff72b9159fb 1987->1990 1994->1980 2002 7ff72b915981-7ff72b91598b call 7ff72b915ebc 1996->2002 2003 7ff72b915995-7ff72b9159b1 call 7ff72b916654 _o__get_wide_winmain_command_line call 7ff72b8fc0f8 1996->2003 1997->1996 2004 7ff72b915961-7ff72b91596a 1997->2004 2002->2003 2009 7ff72b91598d-7ff72b915990 _register_thread_local_exe_atexit_callback 2002->2009 2011 7ff72b9159b6-7ff72b9159bf call 7ff72b9166a0 2003->2011 2004->1996 2009->2003 2011->1981 2014 7ff72b9159c1-7ff72b9159c4 2011->2014 2015 7ff72b9159cb-7ff72b9159d6 call 7ff72b915f88 2014->2015 2016 7ff72b9159c6 _o__cexit 2014->2016 2015->1990 2016->2015
APIs
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: __scrt_acquire_startup_lock__scrt_get_show_window_mode__scrt_initialize_crt__scrt_is_managed_app__scrt_release_startup_lock_o__cexit_o__exit_o__get_wide_winmain_command_line_register_thread_local_exe_atexit_callback
  • String ID:
  • API String ID: 105026157-0
  • Opcode ID: 72c483cfc1c096ab9830138a3106d75845afd1e486bdeba52df02be1278e808c
  • Instruction ID: 33ae72caf597d7f10dbf674afe4c2a5d612c9957922757f4590881d1cbd83b6e
  • Opcode Fuzzy Hash: 72c483cfc1c096ab9830138a3106d75845afd1e486bdeba52df02be1278e808c
  • Instruction Fuzzy Hash: 7131F921E2D102CEFA10BB2D9C552B99251DFD2784FC66035DACD0B2B7DE2CA445AA61
Uniqueness

Uniqueness Score: -1.00%

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 2019 7ff72b902f84-7ff72b902fc5 LocalAlloc 2020 7ff72b90304f 2019->2020 2021 7ff72b902fcb 2019->2021 2023 7ff72b903051-7ff72b90306d 2020->2023 2022 7ff72b902fd2-7ff72b902fdd 2021->2022 2024 7ff72b902fe4-7ff72b903001 LoadStringW 2022->2024 2025 7ff72b903003-7ff72b903010 2024->2025 2026 7ff72b903012-7ff72b90302b LocalFree 2024->2026 2025->2024 2025->2026 2027 7ff72b90306f-7ff72b903071 2026->2027 2028 7ff72b90302d-7ff72b90304d LocalAlloc 2026->2028 2027->2020 2029 7ff72b903073-7ff72b903090 LocalAlloc 2027->2029 2028->2020 2028->2022 2029->2020 2030 7ff72b903092-7ff72b9030a9 LocalSize 2029->2030 2030->2020 2031 7ff72b9030ab-7ff72b9030d6 LoadStringW 2030->2031 2031->2020 2032 7ff72b9030dc-7ff72b9030ec 2031->2032 2032->2031 2033 7ff72b9030ee-7ff72b903131 call 7ff72b8f208c * 2 2032->2033 2033->2023
APIs
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: Local$Alloc$FreeLoadString
  • String ID:
  • API String ID: 4206045929-0
  • Opcode ID: 97f7486c3501b8cc1143ae574958acde57fbf968e833dd4a2580ab6d71a25fcd
  • Instruction ID: 187e9f18260b0ac82c12d9d797a22f90e929c22ac2eff5f476efd9bbb62a83fd
  • Opcode Fuzzy Hash: 97f7486c3501b8cc1143ae574958acde57fbf968e833dd4a2580ab6d71a25fcd
  • Instruction Fuzzy Hash: 2C418F72B1AA42C6EA00AF09AC80179F7A1FB89B81F859435CE8E57365DF3CE4459B50
Uniqueness

Uniqueness Score: -1.00%

Control-flow Graph

APIs
Strings
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: ErrorLastOpenSemaphore
  • String ID: _p0$wil
  • API String ID: 1909229842-1814513734
  • Opcode ID: 26c08b54c2093927baddb9c2af52bd5568567a045a00b3fd2cca473bb1e19bba
  • Instruction ID: 79f7f7dcc83038416d0eb921ee04013af72558917f18976bb7f67740ef1c0d25
  • Opcode Fuzzy Hash: 26c08b54c2093927baddb9c2af52bd5568567a045a00b3fd2cca473bb1e19bba
  • Instruction Fuzzy Hash: FE51E562B18A82C6E720EB69EC102F9A790EFD8784FD04031EE4D57765DE3CF5118B90
Uniqueness

Uniqueness Score: -1.00%

Control-flow Graph

APIs
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: ErrorLast$MutexRelease
  • String ID:
  • API String ID: 3084565237-0
  • Opcode ID: e3b2b4a5d6a66c0ded5001229e633d129643ff1bfdc93c4895d25cc6b2450fdd
  • Instruction ID: e901625ea8de1f3f2c78d1c056b84aa885bfb4ac24370acdcc9b31c76da75bcc
  • Opcode Fuzzy Hash: e3b2b4a5d6a66c0ded5001229e633d129643ff1bfdc93c4895d25cc6b2450fdd
  • Instruction Fuzzy Hash: 3D115E21A14A81C7E7046B25E890339FA60FFC8B41F84D531DA4E07B65CF3CE4659B10
Uniqueness

Uniqueness Score: -1.00%

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 2096 7ff72b8ff7cc-7ff72b8ff80f 2097 7ff72b8ff815-7ff72b8ff818 2096->2097 2098 7ff72b8ff8a4 2096->2098 2100 7ff72b8ff81a-7ff72b8ff81d 2097->2100 2101 7ff72b8ff897-7ff72b8ff8a2 2097->2101 2099 7ff72b8ff8a9-7ff72b8ff8d8 call 7ff72b8ff520 2098->2099 2108 7ff72b8ff933-7ff72b8ff936 2099->2108 2109 7ff72b8ff8da-7ff72b8ff8ed call 7ff72b8f7610 2099->2109 2103 7ff72b8ff81f-7ff72b8ff822 2100->2103 2104 7ff72b8ff889-7ff72b8ff895 2100->2104 2101->2099 2106 7ff72b8ff824-7ff72b8ff827 2103->2106 2107 7ff72b8ff87b-7ff72b8ff887 2103->2107 2104->2099 2110 7ff72b8ff86d-7ff72b8ff879 2106->2110 2111 7ff72b8ff829-7ff72b8ff82c 2106->2111 2107->2099 2114 7ff72b8ff9bc-7ff72b8ff9c0 2108->2114 2115 7ff72b8ff93c-7ff72b8ff942 2108->2115 2117 7ff72b8ff8f3-7ff72b8ff8f6 2109->2117 2110->2099 2112 7ff72b8ff85f-7ff72b8ff86b 2111->2112 2113 7ff72b8ff82e-7ff72b8ff831 2111->2113 2112->2099 2120 7ff72b8ff833-7ff72b8ff839 2113->2120 2121 7ff72b8ff851-7ff72b8ff85d 2113->2121 2118 7ff72b8ff9c2-7ff72b8ff9cc 2114->2118 2119 7ff72b8ff9f8-7ff72b8ffa1e call 7ff72b915a60 2114->2119 2115->2114 2116 7ff72b8ff944-7ff72b8ff953 2115->2116 2122 7ff72b8ff955 2116->2122 2123 7ff72b8ff959-7ff72b8ff963 2116->2123 2124 7ff72b8ff8fc-7ff72b8ff92e 2117->2124 2125 7ff72b8ff9b7 2117->2125 2118->2119 2126 7ff72b8ff9ce-7ff72b8ff9f2 call 7ff72b8f8b10 2118->2126 2120->2098 2127 7ff72b8ff83b-7ff72b8ff84f 2120->2127 2121->2099 2122->2123 2129 7ff72b8ff965-7ff72b8ff96f 2123->2129 2130 7ff72b8ff9ad 2123->2130 2124->2125 2125->2114 2126->2119 2127->2099 2132 7ff72b8ff971-7ff72b8ff984 GetModuleHandleW 2129->2132 2133 7ff72b8ff98b-7ff72b8ff9ab GetProcAddress 2129->2133 2130->2125 2132->2133 2133->2125 2133->2130
APIs
Strings
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: AddressHandleModuleProc
  • String ID: RtlNotifyFeatureUsage$ntdll.dll
  • API String ID: 1646373207-2443152447
  • Opcode ID: d1984b1c00aae644ad81749d54549d1c06019f33a98c95438caf1dfde6a990bb
  • Instruction ID: 62107938f88906839dd508e4e9a3a4f0a4fa899e543ab4c84493cfc0eaf31f8a
  • Opcode Fuzzy Hash: d1984b1c00aae644ad81749d54549d1c06019f33a98c95438caf1dfde6a990bb
  • Instruction Fuzzy Hash: DF61B432F69B029AE714AF7DEC90378A2A1EB98744FC84235DD4D427E4DF3CE5148A50
Uniqueness

Uniqueness Score: -1.00%

Control-flow Graph

APIs
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: ExclusiveLock$AcquireRelease
  • String ID:
  • API String ID: 17069307-0
  • Opcode ID: 8b647db60dac75cfd403542d384b0e68e8a92977ec1f143e5187edb16381739f
  • Instruction ID: 20d851477c12757454e3e494fc92a422c0982757aadca314d15ed4738a9254ec
  • Opcode Fuzzy Hash: 8b647db60dac75cfd403542d384b0e68e8a92977ec1f143e5187edb16381739f
  • Instruction Fuzzy Hash: B1215E62A08A42CAEB10AF55E8503B9BBA0FB59F84FC88131DE4D07765CF3CE455CB90
Uniqueness

Uniqueness Score: -1.00%

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 2153 7ff72b8f7610-7ff72b8f762a 2154 7ff72b8f7630-7ff72b8f763a 2153->2154 2155 7ff72b8f771e-7ff72b8f773c 2153->2155 2156 7ff72b8f7653-7ff72b8f765b 2154->2156 2157 7ff72b8f763c-7ff72b8f763e 2154->2157 2158 7ff72b8f773e-7ff72b8f7748 2155->2158 2159 7ff72b8f774a-7ff72b8f774d 2155->2159 2162 7ff72b8f765d-7ff72b8f7669 call 7ff72b8f7028 2156->2162 2163 7ff72b8f766e-7ff72b8f7675 2156->2163 2160 7ff72b8f7640-7ff72b8f7648 2157->2160 2161 7ff72b8f764a 2157->2161 2158->2159 2164 7ff72b8f7756-7ff72b8f7765 2158->2164 2159->2164 2160->2156 2160->2161 2161->2156 2162->2163 2165 7ff72b8f769d-7ff72b8f76a1 2163->2165 2166 7ff72b8f7677-7ff72b8f7684 2163->2166 2165->2164 2170 7ff72b8f76a7-7ff72b8f76ae 2165->2170 2168 7ff72b8f7686-7ff72b8f7690 2166->2168 2169 7ff72b8f7692-7ff72b8f7695 2166->2169 2168->2165 2168->2169 2169->2165 2170->2164 2171 7ff72b8f76b4-7ff72b8f76cf AcquireSRWLockExclusive 2170->2171 2172 7ff72b8f76d1-7ff72b8f76e3 2171->2172 2173 7ff72b8f7709-7ff72b8f771c ReleaseSRWLockExclusive 2171->2173 2174 7ff72b8f76e5-7ff72b8f76ef 2172->2174 2175 7ff72b8f76f1-7ff72b8f7703 call 7ff72b8f6644 2172->2175 2173->2164 2174->2173 2174->2175 2175->2173
APIs
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: ExclusiveLock$AcquireRelease
  • String ID:
  • API String ID: 17069307-0
  • Opcode ID: d54f3a392ea67de80d392a230dd5e4456882794b2eae396b8f271d6692ec93a9
  • Instruction ID: 7a567634f03afae8ca194eb98ab842eb098f6881b0ad899356b1b848b3d8bc36
  • Opcode Fuzzy Hash: d54f3a392ea67de80d392a230dd5e4456882794b2eae396b8f271d6692ec93a9
  • Instruction Fuzzy Hash: AD412434E18646CAFA55AB1DEC80B34A7A1EBA4B50FC98134C98C027B0DF2CB851DB60
Uniqueness

Uniqueness Score: -1.00%

Control-flow Graph

APIs
    • Part of subcall function 00007FF72B915E04: _o__initialize_onexit_table.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000000,00007FF72B9157F4), ref: 00007FF72B915E46
  • _RTC_Initialize.LIBCMT ref: 00007FF72B9157F8
    • Part of subcall function 00007FF72B916010: _onexit.LIBCMT ref: 00007FF72B916014
  • __scrt_initialize_default_local_stdio_options.LIBCMT ref: 00007FF72B915874
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: Initialize__scrt_initialize_default_local_stdio_options_o__initialize_onexit_table_onexit
  • String ID:
  • API String ID: 3742801250-0
  • Opcode ID: eea0f9de1afa3335b8963e05af4259884430d092420fba63b39cd08fe8e2f225
  • Instruction ID: d56707a1d06a8f9db37d2906767221a3587e164cb6568ea429e67d5399ccf9c0
  • Opcode Fuzzy Hash: eea0f9de1afa3335b8963e05af4259884430d092420fba63b39cd08fe8e2f225
  • Instruction Fuzzy Hash: 26015840E39202CEFA447BB95C462B88151CFD5718FC16478EACE662E3ED1CB844AE32
Uniqueness

Uniqueness Score: -1.00%

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 2225 7ff72b8f68a0-7ff72b8f68ba 2226 7ff72b8f6936-7ff72b8f6948 2225->2226 2227 7ff72b8f68bc-7ff72b8f68c0 2225->2227 2228 7ff72b8f68c2-7ff72b8f68ce call 7ff72b8f7834 2227->2228 2229 7ff72b8f68e7-7ff72b8f6912 AcquireSRWLockExclusive 2227->2229 2233 7ff72b8f68d3-7ff72b8f68d5 2228->2233 2231 7ff72b8f6914-7ff72b8f6918 2229->2231 2232 7ff72b8f691b-7ff72b8f691e 2229->2232 2231->2232 2234 7ff72b8f6933 2232->2234 2235 7ff72b8f6920-7ff72b8f692f ReleaseSRWLockExclusive 2232->2235 2233->2229 2236 7ff72b8f68d7-7ff72b8f68dc 2233->2236 2234->2226 2235->2234 2236->2229 2237 7ff72b8f68de-7ff72b8f68e3 2236->2237 2237->2229
APIs
  • AcquireSRWLockExclusive.KERNEL32(?,?,?,00007FF72B8F63E6), ref: 00007FF72B8F68FF
  • ReleaseSRWLockExclusive.KERNEL32(?,?,?,00007FF72B8F63E6), ref: 00007FF72B8F6923
    • Part of subcall function 00007FF72B8F7834: GetCurrentProcessId.KERNEL32 ref: 00007FF72B8F7870
    • Part of subcall function 00007FF72B8F7834: CreateMutexW.KERNELBASE ref: 00007FF72B8F78B2
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: ExclusiveLock$AcquireCreateCurrentMutexProcessRelease
  • String ID:
  • API String ID: 4097130892-0
  • Opcode ID: f18b58fc62a8f7518ff145c5c761b010ac2e9fa8643cba8d6b4d1f143474ccd1
  • Instruction ID: ea6a328ba1df25a48f8d5307eeb40c79a3032faf5b6b5e2f41888a952e7b1e56
  • Opcode Fuzzy Hash: f18b58fc62a8f7518ff145c5c761b010ac2e9fa8643cba8d6b4d1f143474ccd1
  • Instruction Fuzzy Hash: D711BF32B15B4682EF049F29D840628B3A4FB68F88F944235CE5D03728DF38E962C780
Uniqueness

Uniqueness Score: -1.00%

Control-flow Graph

APIs
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: Event$InformationRegister
  • String ID:
  • API String ID: 1404366003-0
  • Opcode ID: c7831c6368fec970d16237d1c93c892c7a8b2c4833683e32f9adbd3868a9ee2a
  • Instruction ID: 8e42c67ce2c66d18d4008d1088ffcd4bd587567589c790dd747d6ea141a21a58
  • Opcode Fuzzy Hash: c7831c6368fec970d16237d1c93c892c7a8b2c4833683e32f9adbd3868a9ee2a
  • Instruction Fuzzy Hash: 4A118C72A08B85C6E7109B19E880379B7A0FB8CB94F904221EA8D47B25DF3CD555CB50
Uniqueness

Uniqueness Score: -1.00%

Control-flow Graph

APIs
  • InitOnceBeginInitialize.KERNEL32 ref: 00007FF72B8F8987
    • Part of subcall function 00007FF72B916010: _onexit.LIBCMT ref: 00007FF72B916014
    • Part of subcall function 00007FF72B8F1430: EtwEventRegister.NTDLL ref: 00007FF72B8F147C
  • InitOnceComplete.KERNEL32 ref: 00007FF72B8F8A22
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: InitOnce$BeginCompleteEventInitializeRegister_onexit
  • String ID:
  • API String ID: 1756061407-0
  • Opcode ID: 668d2436a52a317d6359af763c303365b32208c304d8823daee0594d8a8616a4
  • Instruction ID: a8bf051420d10e672831665187f38d933efaf71b65895017b787e741108ca4c2
  • Opcode Fuzzy Hash: 668d2436a52a317d6359af763c303365b32208c304d8823daee0594d8a8616a4
  • Instruction Fuzzy Hash: 1F11D625D28A86C6EB10AF19ED846A5B7A0FB95744FCA5131D68E03771CF3CE098DF60
Uniqueness

Uniqueness Score: -1.00%

Non-executed Functions

APIs
Strings
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: CapsDeviceWindow$ErrorLastObjectText$FreeSelectTask$CreateDeleteLocalModePage$AbortCursorEnableFontFormatIndirectMessageMetricsStartTime$DateDestroyDialogDrawItemLengthLockLongParamProcSendUnlockViewportmemsetwcsnlen
  • String ID: (
  • API String ID: 2953118813-3887548279
  • Opcode ID: 01741eaae34a4d570697a323405932bfea6b34618ae6d7bfef3bfc6a54f2ade7
  • Instruction ID: b80f7e7461cf897bad74fefe69dac5d063e009ef5e2051991805439550394359
  • Opcode Fuzzy Hash: 01741eaae34a4d570697a323405932bfea6b34618ae6d7bfef3bfc6a54f2ade7
  • Instruction Fuzzy Hash: 55424D31E18A42CBE704AF29EC54279FBA5FB99B45B869134C98E43730DF3CA5459F20
Uniqueness

Uniqueness Score: -1.00%

APIs
  • memset.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF72B902677
  • RegOpenKeyExW.ADVAPI32 ref: 00007FF72B9026DC
    • Part of subcall function 00007FF72B90205C: RegQueryValueExW.ADVAPI32 ref: 00007FF72B902098
  • RegCloseKey.ADVAPI32 ref: 00007FF72B90288C
  • RegOpenKeyExW.ADVAPI32 ref: 00007FF72B90283D
    • Part of subcall function 00007FF72B9021A0: RegQueryValueExW.ADVAPI32 ref: 00007FF72B9021E8
    • Part of subcall function 00007FF72B9021A0: memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?,?,?,?,?,?,?,00007FF72B9028BC), ref: 00007FF72B90220B
  • RegCloseKey.ADVAPI32 ref: 00007FF72B902C1D
Strings
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: CloseOpenQueryValue$memcpymemset
  • String ID: $Lucida Console$Software\Microsoft\Notepad$Software\Microsoft\Notepad\DefaultFonts$StatusBar$fMLE_is_broken$fMatchCase$fPasteOriginalEOL$fReverse$fSaveWindowPositions$fWindowsOnlyEOL$fWrap$fWrapAround$iDefaultEncoding$iMarginBottom$iMarginLeft$iMarginRight$iMarginTop$iPointSize$iWindowPosDX$iWindowPosDY$iWindowPosX$iWindowPosY$lfCharSet$lfClipPrecision$lfEscapement$lfFaceName$lfItalic$lfOrientation$lfOutPrecision$lfPitchAndFamily$lfQuality$lfStrikeOut$lfUnderline$lfWeight$replaceString$searchString$szHeader$szTrailer
  • API String ID: 216777390-570872617
  • Opcode ID: 6a86fa5fa1baeaebbfb1bcba359283258950a533cea8b834b6780ea7404fc18e
  • Instruction ID: f6c94d9270986df6c40aa4444c52e812a5509c9e24da5f7a8047af3ac836093f
  • Opcode Fuzzy Hash: 6a86fa5fa1baeaebbfb1bcba359283258950a533cea8b834b6780ea7404fc18e
  • Instruction Fuzzy Hash: 98F12962A18792CAEB00EF29EC416A9B760FB86744FC05436EADC47635DE3DE505CF60
Uniqueness

Uniqueness Score: -1.00%

APIs
Strings
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: FileMessageSend$Handle$ByteCharCloseCursorLocalMultiViewWide$ExtensionFindFreePathTaskUnmapmemset$#170AllocCreateErrorInformationLastLockMappingTextUnicodeUnlock_o__wcsicmpmemcpy
  • String ID: 0
  • API String ID: 585679752-4108050209
  • Opcode ID: 36489fdf4e85da6a33a26a8ca3c57d8eb6880c61b5a4e6560729996b0adab27e
  • Instruction ID: ff53f9ab91728b402caafb97924612abac42f4c41883f742ecaac64319957e7c
  • Opcode Fuzzy Hash: 36489fdf4e85da6a33a26a8ca3c57d8eb6880c61b5a4e6560729996b0adab27e
  • Instruction Fuzzy Hash: 90525072918692CBE720AB19E84067AFBA0FB85750F819135DA8D43BB4DF7DE484DF10
Uniqueness

Uniqueness Score: -1.00%

APIs
Strings
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: File$MessageSendWrite$FreeLocalTaskmemset$AttributesCloseCreateCursorHandlePathUnlock$#170ActivationByteCharDecryptDeleteDuplicateEncryptionErrorExistsExtensionFactoryFindInfoLastLockMultiReferenceStringWideWindows
  • String ID: 1$Windows.Security.EnterpriseData.ProtectionPolicyManager$shell\osshell\accesory\common\edpapphelper\edpapphelper.cpp
  • API String ID: 545286052-3300918443
  • Opcode ID: 7bae2d965a9fcb1a82e12f0a8706b7e8f1c581ca1d39e3b5be4d78f690307692
  • Instruction ID: 95d8ea039921a6e2c2bab9dbc2b27a20085dc3914fd3eaed7d3a54f51dd31e0d
  • Opcode Fuzzy Hash: 7bae2d965a9fcb1a82e12f0a8706b7e8f1c581ca1d39e3b5be4d78f690307692
  • Instruction Fuzzy Hash: DF326E32A18A46CAE710AB19EC401B9F7A1FB89B94F859535DA8E43774DF3CE444DF20
Uniqueness

Uniqueness Score: -1.00%

APIs
Strings
  • Windows.Security.EnterpriseData.ProtectionPolicyManager, xrefs: 00007FF72B8FB741
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: Window$Message$CreateCursor$ReferenceSendStringWindows$ActivationBeepDeleteDestroyFactoryForegroundIconicObject$CtrlFocusFontIndirectKeyboardLayoutPostProcQuitRedrawmemset
  • String ID: Windows.Security.EnterpriseData.ProtectionPolicyManager
  • API String ID: 679159887-1562784004
  • Opcode ID: 8a89c5570c31e86ef3a24bb5e5a74527853b9ba4268867e204b9852e9fc6ae60
  • Instruction ID: 72b3f4212d4286015ba4fbc6e63fdf578ed125d913f01fc1a3a6b56be7b59aca
  • Opcode Fuzzy Hash: 8a89c5570c31e86ef3a24bb5e5a74527853b9ba4268867e204b9852e9fc6ae60
  • Instruction Fuzzy Hash: 94425D31E19642CAEA10AB1DEC40179FAA0EF99B80FC55131DA8D437B5CE3CF5559FA0
Uniqueness

Uniqueness Score: -1.00%

APIs
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: Menu$Item$Enable$ClipboardMessageSend$Check$AvailableCloseFormatOpen
  • String ID:
  • API String ID: 2500327735-0
  • Opcode ID: 10b6eeda3b26afaa3f1c45e349fa7e4d4bcb9036a5690b848020500dc22c3045
  • Instruction ID: b401991e9b586bb2dd659fd99931100d5545e73a6b445de69646cb5b9af2b910
  • Opcode Fuzzy Hash: 10b6eeda3b26afaa3f1c45e349fa7e4d4bcb9036a5690b848020500dc22c3045
  • Instruction Fuzzy Hash: 6D912975A14A52CBE700AB25A854579FBA0FBCEB81B85E134CE4E43B24DF3CE4469B50
Uniqueness

Uniqueness Score: -1.00%

APIs
  • SetCursor.USER32(?,?,?,?,?,00000000,00000000,00000000,00000000,?), ref: 00007FF72B90EB50
  • SendMessageW.USER32(?,?,?,?,?,00000000,00000000,00000000,00000000,?), ref: 00007FF72B90EB83
  • SendMessageW.USER32(?,?,?,?,?,00000000,00000000,00000000,00000000,?), ref: 00007FF72B90EBA1
  • SendMessageW.USER32(?,?,?,?,?,00000000,00000000,00000000,00000000,?), ref: 00007FF72B90EBC8
  • LocalAlloc.KERNEL32(?,?,?,?,?,00000000,00000000,00000000,00000000,?), ref: 00007FF72B90EBE2
  • SetCursor.USER32(?,?,?,?,?,00000000,00000000,00000000,00000000,?), ref: 00007FF72B90EBF9
    • Part of subcall function 00007FF72B8F91BC: SendMessageW.USER32 ref: 00007FF72B8F924B
    • Part of subcall function 00007FF72B8F91BC: SendMessageW.USER32 ref: 00007FF72B8F926E
    • Part of subcall function 00007FF72B8F91BC: SendMessageW.USER32 ref: 00007FF72B8F928C
  • GetClientRect.USER32 ref: 00007FF72B90EC17
  • LocalLock.KERNEL32(?,?,?,?,?,00000000,00000000,00000000,00000000,?), ref: 00007FF72B90EC26
  • SendMessageW.USER32(?,?,?,?,?,00000000,00000000,00000000,00000000,?), ref: 00007FF72B90EC47
    • Part of subcall function 00007FF72B903788: CreateWindowExW.USER32 ref: 00007FF72B9037D0
  • SetCursor.USER32(?,?,?,?,?,00000000,00000000,00000000,00000000,?), ref: 00007FF72B90EC73
  • LocalUnlock.KERNEL32(?,?,?,?,?,00000000,00000000,00000000,00000000,?), ref: 00007FF72B90EC82
  • LocalFree.KERNEL32(?,?,?,?,?,00000000,00000000,00000000,00000000,?), ref: 00007FF72B90EC91
  • GetWindowLongW.USER32 ref: 00007FF72B90ECB2
  • SetWindowLongW.USER32 ref: 00007FF72B90ECC7
  • SendMessageW.USER32(?,?,?,?,?,00000000,00000000,00000000,00000000,?), ref: 00007FF72B90ECE5
  • SendMessageW.USER32(?,?,?,?,?,00000000,00000000,00000000,00000000,?), ref: 00007FF72B90ECFE
  • SetCursor.USER32(?,?,?,?,?,00000000,00000000,00000000,00000000,?), ref: 00007FF72B90ED12
  • DestroyWindow.USER32(?,?,?,?,?,00000000,00000000,00000000,00000000,?), ref: 00007FF72B90ED21
  • LocalUnlock.KERNEL32(?,?,?,?,?,00000000,00000000,00000000,00000000,?), ref: 00007FF72B90ED35
  • LocalFree.KERNEL32(?,?,?,?,?,00000000,00000000,00000000,00000000,?), ref: 00007FF72B90ED44
  • SendMessageW.USER32(?,?,?,?,?,00000000,00000000,00000000,00000000,?), ref: 00007FF72B90ED6A
  • ShowWindow.USER32(?,?,?,?,?,00000000,00000000,00000000,00000000,?), ref: 00007FF72B90ED8B
  • SendMessageW.USER32(?,?,?,?,?,00000000,00000000,00000000,00000000,?), ref: 00007FF72B90EDA9
  • SendMessageW.USER32(?,?,?,?,?,00000000,00000000,00000000,00000000,?), ref: 00007FF72B90EDC9
  • SetFocus.USER32(?,?,?,?,?,00000000,00000000,00000000,00000000,?), ref: 00007FF72B90EDDC
  • SetCursor.USER32(?,?,?,?,?,00000000,00000000,00000000,00000000,?), ref: 00007FF72B90EDEB
  • GetClientRect.USER32 ref: 00007FF72B90EE0B
  • ShowWindow.USER32(?,?,?,?,?,00000000,00000000,00000000,00000000,?), ref: 00007FF72B90EE36
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: MessageSend$LocalWindow$Cursor$ClientFreeLongRectShowUnlock$AllocCreateDestroyFocusLock
  • String ID:
  • API String ID: 126884220-0
  • Opcode ID: 9ad8cc02bf42c9665355f16e910318055b48ecd9cc59fc5f2ce6a19f6011c344
  • Instruction ID: b1652723942917fe4bd1d0faf5afe590c85867e57638a2ed4d5addbbb55315bf
  • Opcode Fuzzy Hash: 9ad8cc02bf42c9665355f16e910318055b48ecd9cc59fc5f2ce6a19f6011c344
  • Instruction Fuzzy Hash: 3F91EA35A19A42CBE700AB19EC94579BB60FBCEB51F86A531CE4E07774CF3CA4459B20
Uniqueness

Uniqueness Score: -1.00%

APIs
Strings
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: CloseFreeOpenTask$EnumInfoQueryValue
  • String ID: Software\Microsoft\Notepad\Autosave
  • API String ID: 10180006-1427544894
  • Opcode ID: 6e8a5ebfa77c94e7876d62ba35bf7f286cb2fc06c22f01ab6caac85adecf2b64
  • Instruction ID: cb6a434e97e5452e91bb5d1aaab850d32d88477aef7f0d19a5861bda56aa34fe
  • Opcode Fuzzy Hash: 6e8a5ebfa77c94e7876d62ba35bf7f286cb2fc06c22f01ab6caac85adecf2b64
  • Instruction Fuzzy Hash: 6DB1D236B18A52DEEB10AF68E8502BDB7A0FB85748F855131DE8D13B68DF38D444DB50
Uniqueness

Uniqueness Score: -1.00%

APIs
Strings
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: CloseCreate
  • String ID: %i,%s$%s\%s.autosave$Software\Microsoft\Notepad\Autosave
  • API String ID: 2932200918-285130182
  • Opcode ID: 8a4cce6cc3c9892ad89a71ccae19c739badeba75e027dd4b9811dc452bb17127
  • Instruction ID: 52c2ae515e1fd31721eef37119b90602fc9008f9705ef2b31f976d4f66952d4c
  • Opcode Fuzzy Hash: 8a4cce6cc3c9892ad89a71ccae19c739badeba75e027dd4b9811dc452bb17127
  • Instruction Fuzzy Hash: 5A91A332A18B42CAEB10AF19EC405B9BB60FF89794B856131DE8E137A4CF3DD045DB60
Uniqueness

Uniqueness Score: -1.00%

APIs
  • GetCurrentProcessId.KERNEL32 ref: 00007FF72B8F7D74
    • Part of subcall function 00007FF72B8F21F0: _vsnwprintf.LEGACY_STDIO_DEFINITIONS ref: 00007FF72B8F2230
  • CreateMutexExW.KERNEL32 ref: 00007FF72B8F7DB6
  • WaitForSingleObjectEx.KERNEL32 ref: 00007FF72B8F7DE4
    • Part of subcall function 00007FF72B8F288C: GetLastError.KERNEL32 ref: 00007FF72B8F2890
Strings
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: CreateCurrentErrorLastMutexObjectProcessSingleWait_vsnwprintf
  • String ID: Local\SM0:%d:%d:%hs$onecore\internal\sdk\inc\wil\opensource\wil\resource.h$wil$x
  • API String ID: 3333087404-3363748427
  • Opcode ID: c440184ade505da0ab71912d83ca09aa0c60c7d8cffe59e8dc11d6a258e75d02
  • Instruction ID: 59b2a6bd036b2dfef097c3a406c543c8ec6292e8c9c8d628cd7082b3758562ec
  • Opcode Fuzzy Hash: c440184ade505da0ab71912d83ca09aa0c60c7d8cffe59e8dc11d6a258e75d02
  • Instruction Fuzzy Hash: 9881A036618A42C6F760AF19EC406B9F761EB99B80FD09031EA8D47B65DF3CF4518B60
Uniqueness

Uniqueness Score: -1.00%

APIs
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: Free$Local$Find$CloseErrorFileFirstFormatLastMessageTaskTextWindow$AllocCompareInit_thread_footerOrdinalString
  • String ID:
  • API String ID: 2306847634-0
  • Opcode ID: 4734b65dcc0e080e251f5611d7f68aa4fdbe8bbeac2cc4256f4101b3e371a595
  • Instruction ID: 371c0a793c4e4a43b9a5c9945265343c08dfc167b496b46791f4c70e0d73a729
  • Opcode Fuzzy Hash: 4734b65dcc0e080e251f5611d7f68aa4fdbe8bbeac2cc4256f4101b3e371a595
  • Instruction Fuzzy Hash: 84C14A32A09A42CAEB10AF18EC401A9B7A4FB96794FC55231DA9D077B5DF3CE514CF60
Uniqueness

Uniqueness Score: -1.00%

APIs
Strings
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: FindFreeTask$File$CloseFirstPath$ExtensionSpec
  • String ID: .txt
  • API String ID: 3904377374-2195685702
  • Opcode ID: 5acdd54beb96a11c681456e77c26d8a4c1a8b6af072cda3c6876b7121b3800a9
  • Instruction ID: bf699f69c116ba0de0a9f0e1362544f2f1c060a2b7670a4ab23f6fb8aeb95e77
  • Opcode Fuzzy Hash: 5acdd54beb96a11c681456e77c26d8a4c1a8b6af072cda3c6876b7121b3800a9
  • Instruction Fuzzy Hash: 7C71B622618941C1DA20FB15E8501B9FB60FF89BA4FC85631EADE037E5DF3CE5458B60
Uniqueness

Uniqueness Score: -1.00%

APIs
Strings
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: CreateFree$CloseDirectoryDiskErrorFileHandleLastMessageSendSpaceTask
  • String ID: %s\%s$probe.autosave
  • API String ID: 3915114138-22072891
  • Opcode ID: fb1c7cf06db92606c190e0a0bf4e1541477659cba765ad4fc1509ed0b759d3d4
  • Instruction ID: 97f47b38265f252767658e8f9019dc25b5d8ac82d2666d71446a68665ed29a47
  • Opcode Fuzzy Hash: fb1c7cf06db92606c190e0a0bf4e1541477659cba765ad4fc1509ed0b759d3d4
  • Instruction Fuzzy Hash: F1319532A18651DBE710AF19E8505B9B760FBC9764F846230DA9E076A0CF3CE445DF10
Uniqueness

Uniqueness Score: -1.00%

APIs
Strings
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: FormatInfoLocaleTime$DateDefaultLanguageLocalMessageSendUsermemset
  • String ID: P
  • API String ID: 1142591158-3110715001
  • Opcode ID: c679d656eb6d46234c228883503a9f4906331edc57d3be65ebd494dda753449e
  • Instruction ID: 45ebd112d7d3c09c10734267453c3a73848d1e6a0a1a14d671e0315802d2295d
  • Opcode Fuzzy Hash: c679d656eb6d46234c228883503a9f4906331edc57d3be65ebd494dda753449e
  • Instruction Fuzzy Hash: 06416E36618A81CAE720AF68D8403F9B761FB88744FC15432EA8E437A5DF3CE545CB60
Uniqueness

Uniqueness Score: -1.00%

APIs
  • SetCursor.USER32(?,?,?,00000001,00000000,00007FF72B8FBD20), ref: 00007FF72B9106B8
  • SendMessageW.USER32(?,?,?,00000001,00000000,00007FF72B8FBD20), ref: 00007FF72B9106D6
  • SendMessageW.USER32(?,?,?,00000001,00000000,00007FF72B8FBD20), ref: 00007FF72B9106F4
  • LocalLock.KERNEL32(?,?,?,00000001,00000000,00007FF72B8FBD20), ref: 00007FF72B910713
  • GetWindowTextLengthW.USER32 ref: 00007FF72B91072E
    • Part of subcall function 00007FF72B90E6F0: FindNLSString.KERNEL32 ref: 00007FF72B90E730
  • LocalUnlock.KERNEL32(?,?,?,00000001,00000000,00007FF72B8FBD20), ref: 00007FF72B9107A3
  • SetCursor.USER32(?,?,?,00000001,00000000,00007FF72B8FBD20), ref: 00007FF72B9107DC
  • SendMessageW.USER32(?,?,?,00000001,00000000,00007FF72B8FBD20), ref: 00007FF72B9107FA
  • SendMessageW.USER32(?,?,?,00000001,00000000,00007FF72B8FBD20), ref: 00007FF72B910818
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: MessageSend$CursorLocal$FindLengthLockStringTextUnlockWindow
  • String ID:
  • API String ID: 3257532295-0
  • Opcode ID: d857d886ddc55264e7ae5c1a43d11e7fea413f208d306eb5c5c1fede264882ee
  • Instruction ID: d54b90efd2fc2b914bafb2be137035ad378072f77ebe7c7245b8ceeb9df9e416
  • Opcode Fuzzy Hash: d857d886ddc55264e7ae5c1a43d11e7fea413f208d306eb5c5c1fede264882ee
  • Instruction Fuzzy Hash: 33416225A19B42CBEB11AB19AC5057AFAA0FFC9B51F866135DD8E03770CE3CE4459F20
Uniqueness

Uniqueness Score: -1.00%

APIs
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: ExceptionFilterPresentUnhandledmemset$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
  • String ID:
  • API String ID: 313767242-0
  • Opcode ID: 99069975b61ab5e8d245399fc568debaa394eb3ff8c4f63bfc2c813cf5e46932
  • Instruction ID: 0e045693b570f9dff81c5c62fae56e8d1039bc3b71bbd5c01ee88ec622039791
  • Opcode Fuzzy Hash: 99069975b61ab5e8d245399fc568debaa394eb3ff8c4f63bfc2c813cf5e46932
  • Instruction Fuzzy Hash: 66316472A14A81C9EB60AF68EC803ED7760F784748F845039DA8D47694DF78D548DB20
Uniqueness

Uniqueness Score: -1.00%

APIs
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: MessageMonitorSend$FromWindow
  • String ID:
  • API String ID: 3597471249-0
  • Opcode ID: d0279e6e14b2005ac53fcfbc983a17bb096bd598b6f4c2dea59f50dab1916091
  • Instruction ID: 55c319bbe274af9fd8579e54c06398fb026b4a7100fc5ebdd3f368dfbdca3c18
  • Opcode Fuzzy Hash: d0279e6e14b2005ac53fcfbc983a17bb096bd598b6f4c2dea59f50dab1916091
  • Instruction Fuzzy Hash: 3C917032B18A51CBE710DF29E840AACBBA0FB89B48F815535DA4D93B65CF38D505CB50
Uniqueness

Uniqueness Score: -1.00%

APIs
Strings
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: MessageSend$FreeTask
  • String ID: shell\osshell\accesory\notepad\notepad.cpp
  • API String ID: 3291876417-1693142988
  • Opcode ID: 5e72e1ba180cdd0cfa0ad077bafa72762d6e2964ad6a419b9b5a4c495619738d
  • Instruction ID: e6ef5643b3dabb5279edb31395f91c318beb00e5c4a06da7055059dea5953571
  • Opcode Fuzzy Hash: 5e72e1ba180cdd0cfa0ad077bafa72762d6e2964ad6a419b9b5a4c495619738d
  • Instruction Fuzzy Hash: 77918D36E1C682CAE711AB28EC50679BBB4FB96744FC55139C68D42674CF3CA058CF60
Uniqueness

Uniqueness Score: -1.00%

APIs
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: MessageSend$memset
  • String ID:
  • API String ID: 2191228795-0
  • Opcode ID: 2109e02e9cdacd837aaadda92213647c32410cf6be357716115de53c04c2e24c
  • Instruction ID: 67020089bca6c2de59d9894c5d1fe937c9d3b620c5d17b4699ea11fb24aaf62b
  • Opcode Fuzzy Hash: 2109e02e9cdacd837aaadda92213647c32410cf6be357716115de53c04c2e24c
  • Instruction Fuzzy Hash: 49617F72A18681D6EB20EB19EC40A69BBA0FB95B84FC55035DA8D43B74CF3CE115CF60
Uniqueness

Uniqueness Score: -1.00%

APIs
    • Part of subcall function 00007FF72B8FC744: SendMessageW.USER32 ref: 00007FF72B8FC870
    • Part of subcall function 00007FF72B8FC744: SendMessageW.USER32 ref: 00007FF72B8FC8FC
  • SendMessageW.USER32 ref: 00007FF72B8FC571
  • memset.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF72B8FC58C
  • SendMessageW.USER32 ref: 00007FF72B8FC5E8
  • memset.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF72B8FC677
  • SendMessageW.USER32 ref: 00007FF72B8FC6FA
    • Part of subcall function 00007FF72B8FCA10: SendMessageW.USER32 ref: 00007FF72B8FCAB3
    • Part of subcall function 00007FF72B8FCA10: SendMessageW.USER32 ref: 00007FF72B8FCB26
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: MessageSend$memset
  • String ID:
  • API String ID: 2191228795-0
  • Opcode ID: a55f65b6909bf37b995a8dc2917ab60a429626a5e85ac85f587b770514edbb08
  • Instruction ID: 2aff7f093a2baa2912c99cc168c085367efc6ef15319408578270a303fa79692
  • Opcode Fuzzy Hash: a55f65b6909bf37b995a8dc2917ab60a429626a5e85ac85f587b770514edbb08
  • Instruction Fuzzy Hash: 7C614831E1C642C6EB10AB59EC546A9AB60FB99740FC15036EA8D43BB4CF3DE5158FA0
Uniqueness

Uniqueness Score: -1.00%

APIs
Strings
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: Message$Local$AllocErrorFormatFreeLastwcsnlen
  • String ID: 0
  • API String ID: 230745121-4108050209
  • Opcode ID: aa91e757aace67e0b7ddcb767b5fd33ce37bf33ba466f9430a97a04315945814
  • Instruction ID: dfa178bb3bf32d4c6892114ce4da5db189ba782b482fff9c2fb3e8ff24039f02
  • Opcode Fuzzy Hash: aa91e757aace67e0b7ddcb767b5fd33ce37bf33ba466f9430a97a04315945814
  • Instruction Fuzzy Hash: F4113D71918A42C6E760AB15FC543B9BA60FB99B84FC55535DACE43760CF3CE1848F20
Uniqueness

Uniqueness Score: -1.00%

APIs
Strings
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: AddressHandleModuleProc
  • String ID: NtUpdateWnfStateData$ntdll.dll
  • API String ID: 1646373207-3251081820
  • Opcode ID: a6f1944db0c258a3b630c86e7b4c21c2756672431c2302d080a8abd373555ade
  • Instruction ID: 44196e4eceb652442a90e0615ebc98b4787dcc62164887015b8294145539c1fd
  • Opcode Fuzzy Hash: a6f1944db0c258a3b630c86e7b4c21c2756672431c2302d080a8abd373555ade
  • Instruction Fuzzy Hash: 5C113A31A19B42CAEB11AB09F844265F7A0FB88B94FC19135DA8D43B24EF3CE414DF10
Uniqueness

Uniqueness Score: -1.00%

APIs
Strings
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: AddressHandleModuleProc
  • String ID: NtQueryWnfStateData$ntdll.dll
  • API String ID: 1646373207-3115237368
  • Opcode ID: 79ac5ba1aafd97cc3887946a05c00f04cdd9898959b0d8929c476eaf65730741
  • Instruction ID: 776b04fd8acd6e6ffc48c627048cc6a30c445903a334ff21f44ee0ab07ef78dc
  • Opcode Fuzzy Hash: 79ac5ba1aafd97cc3887946a05c00f04cdd9898959b0d8929c476eaf65730741
  • Instruction Fuzzy Hash: 02013521A1AB46CAEA11AB0EEC40165A7A1FF98B84BC58231CA8D03734EF3CE0108F10
Uniqueness

Uniqueness Score: -1.00%

APIs
  • IsDebuggerPresent.KERNEL32(?,?,?,00007FF72B915BBD), ref: 00007FF72B915A91
  • SetUnhandledExceptionFilter.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,00007FF72B915BBD), ref: 00007FF72B915AA9
  • UnhandledExceptionFilter.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,00007FF72B915BBD), ref: 00007FF72B915AB2
  • GetCurrentProcess.KERNEL32(?,?,?,00007FF72B915BBD), ref: 00007FF72B915ACB
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: ExceptionFilterUnhandled$CurrentDebuggerPresentProcess
  • String ID:
  • API String ID: 2506494423-0
  • Opcode ID: 6d985a4df7080e085682b06adf58882ac15ae3df810fe9370a7f39c114eb97d7
  • Instruction ID: b6b79a35cf6ec6406b822be30fcf39d3cf4b52c887e090c8a528b4cf627b8216
  • Opcode Fuzzy Hash: 6d985a4df7080e085682b06adf58882ac15ae3df810fe9370a7f39c114eb97d7
  • Instruction Fuzzy Hash: 42F03060D28606CEF7147B6CAC95234B661EFC4B05FC56434CA8E112B2CE7D7484AA20
Uniqueness

Uniqueness Score: -1.00%

APIs
Strings
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: InfoLocale
  • String ID: 1
  • API String ID: 2299586839-2212294583
  • Opcode ID: 8a906198e939dde3a6dccf918f9511260b3464488a97aec2dc50c79c7517998e
  • Instruction ID: a32463b8f09bd3534a44fe7e726588e0e0c9cf8734f880638d7d527d9fb7a313
  • Opcode Fuzzy Hash: 8a906198e939dde3a6dccf918f9511260b3464488a97aec2dc50c79c7517998e
  • Instruction Fuzzy Hash: B6019E70E18242CFE340AB18EC41B68B6A4FB55300F828136D59C862A0EB7DA5448FA0
Uniqueness

Uniqueness Score: -1.00%

APIs
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: CreateInstance
  • String ID:
  • API String ID: 542301482-0
  • Opcode ID: 43a3df711b02c09b8eff4db52f501b4a598933823c09aae3895f263ae16e3b59
  • Instruction ID: c1ac3d06c9a315f52f9bc7957e44cf4b75619edfc9740ae460d7dae3673dc909
  • Opcode Fuzzy Hash: 43a3df711b02c09b8eff4db52f501b4a598933823c09aae3895f263ae16e3b59
  • Instruction Fuzzy Hash: A1015E32A18A46C6EA10AF19FD40065B761FBC8B84B859231DADC42774DF3CD555DF20
Uniqueness

Uniqueness Score: -1.00%

APIs
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: InfoLocale
  • String ID:
  • API String ID: 2299586839-0
  • Opcode ID: 5c5e1314434c758303403ee755ca97e94c1b5d9eccd59329be68924ac39baf3c
  • Instruction ID: c87c20ce98c104f38b4472b36fe05fdb3fcafd494cf6aa4637abb143e67d211e
  • Opcode Fuzzy Hash: 5c5e1314434c758303403ee755ca97e94c1b5d9eccd59329be68924ac39baf3c
  • Instruction Fuzzy Hash: 48F03035A18A86CBEA50AB19EC513A9B2A0FB89704FC14036DA8D8B791DE2CE5058F11
Uniqueness

Uniqueness Score: -1.00%

Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID:
  • String ID:
  • API String ID:
  • Opcode ID: f6f0404d8c561c9b3f4b608d8456b6dc327ba9193c3a7336f6d2d0eee7641468
  • Instruction ID: 3eeb42cb503c87dbfd737548371983e0bb210890e8681f9f6d5302151b149bf9
  • Opcode Fuzzy Hash: f6f0404d8c561c9b3f4b608d8456b6dc327ba9193c3a7336f6d2d0eee7641468
  • Instruction Fuzzy Hash: FD7108B3B265A547E7689E18C811A38B692E794740BD5803DD60E87BE4DE3DF861CF80
Uniqueness

Uniqueness Score: -1.00%

Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID:
  • String ID:
  • API String ID:
  • Opcode ID: 266bd32a55913ef1480b9e5364e5e6387acd7a5b89d2cb97839471350b421b56
  • Instruction ID: 7d6476d8a68ec2ab6f42d760acbd04afcdb3822a3d6719e8e3a30f763884a8c3
  • Opcode Fuzzy Hash: 266bd32a55913ef1480b9e5364e5e6387acd7a5b89d2cb97839471350b421b56
  • Instruction Fuzzy Hash: 6E615936B15A15CAE754DF69D8406AC73F1F708B88F809039DE0D97B64DE38E852CB90
Uniqueness

Uniqueness Score: -1.00%

Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: ExclusiveLock$AcquireRelease
  • String ID:
  • API String ID: 17069307-0
  • Opcode ID: 3b744179f8365926c945c50dded99753f764bb389e0940afee0dbcae169864d2
  • Instruction ID: c24cca33f4bcc7aacc7ea7b787ca8e58a2c5730344d79c3f97fae313a9541027
  • Opcode Fuzzy Hash: 3b744179f8365926c945c50dded99753f764bb389e0940afee0dbcae169864d2
  • Instruction Fuzzy Hash: EE31F632F3895186EBA89B3CDC0172A76D1E784784F848534EA4DC7BA8DE3CE4418F10
Uniqueness

Uniqueness Score: -1.00%

Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: ExclusiveLock$AcquireRelease
  • String ID:
  • API String ID: 17069307-0
  • Opcode ID: f5a1bef9bc626fd63671de0d7da819b0af651419c9f74f56cd6914c93b83d717
  • Instruction ID: 67dd7b91e27ce120ee551e9335aa8c685cd6fac2d77e4abbcaa9a09a947920ff
  • Opcode Fuzzy Hash: f5a1bef9bc626fd63671de0d7da819b0af651419c9f74f56cd6914c93b83d717
  • Instruction Fuzzy Hash: BE31D233B2855186EBA89B3DDC0172AB6D1E794784FC4D134DA4DC7AA8DE3CE4518FA0
Uniqueness

Uniqueness Score: -1.00%

Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: ExclusiveLock$AcquireRelease
  • String ID:
  • API String ID: 17069307-0
  • Opcode ID: 1e181e26e1d302fb26bfe6360b3c10f2e96d5373f967cc42ec220bc73bb89e87
  • Instruction ID: e3a8e67c7d4ac6d693921cdd892192d85095843eeb14b50ea0987aa57247740a
  • Opcode Fuzzy Hash: 1e181e26e1d302fb26bfe6360b3c10f2e96d5373f967cc42ec220bc73bb89e87
  • Instruction Fuzzy Hash: EA31F233B385518AEBA89A3DDC0173A66D1E794784FC48134EA5DC3BA4DA3CE4528F50
Uniqueness

Uniqueness Score: -1.00%

Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: ExclusiveLock$AcquireRelease
  • String ID:
  • API String ID: 17069307-0
  • Opcode ID: 693dedf6943ce648ad049bc9aba0d74ae8c6c461c7d65337b3b725dfcceea574
  • Instruction ID: 5278ac2f31da50980e215c3afa16a478fbf91cd1e76c6d2e7596cac8b0d4d2dd
  • Opcode Fuzzy Hash: 693dedf6943ce648ad049bc9aba0d74ae8c6c461c7d65337b3b725dfcceea574
  • Instruction Fuzzy Hash: DF31E333B2855186EBA89A3DDC0176AA6D1F7D4784FC48134EA0DC7BA8DE3DE4518F90
Uniqueness

Uniqueness Score: -1.00%

Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: ExclusiveLock$AcquireRelease
  • String ID:
  • API String ID: 17069307-0
  • Opcode ID: ad18ce701b9b1c19e6dd6798883fe5cb3498da7c4c7c10e9e792a27c81fcf6f6
  • Instruction ID: 94c175cd8af24f059615c45464e4107540354299037ad91b27772ca30ffbf1f4
  • Opcode Fuzzy Hash: ad18ce701b9b1c19e6dd6798883fe5cb3498da7c4c7c10e9e792a27c81fcf6f6
  • Instruction Fuzzy Hash: 6231C533F2855186EBA89B3DDC0172966D1E7A4744FC48138EA0DC7BA8DA3CE4518F90
Uniqueness

Uniqueness Score: -1.00%

Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: ExclusiveLock$AcquireRelease
  • String ID:
  • API String ID: 17069307-0
  • Opcode ID: bdd6c52d446d256428f1ca0f7e0351d854a6dfa3e7e7e3be2fdce4a6561f00d7
  • Instruction ID: 24e3aae63735a234f740645e77407c52f6661fb969b1f8c1959763bd624b55ee
  • Opcode Fuzzy Hash: bdd6c52d446d256428f1ca0f7e0351d854a6dfa3e7e7e3be2fdce4a6561f00d7
  • Instruction Fuzzy Hash: 0F311633B3855186EBA89A3CDC0172966D1E794744FC4C134DA1DC3BA8DE3CE4528F90
Uniqueness

Uniqueness Score: -1.00%

Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: ExclusiveLock$AcquireRelease
  • String ID:
  • API String ID: 17069307-0
  • Opcode ID: 0ccc502ed95a9565fa4c5ea89f1ab34a51e3359721808fd16c88a6c9b2208fd4
  • Instruction ID: 668ef352af49ba785d471beb95ad714484435dbbf6821e9111db37326b1ccc16
  • Opcode Fuzzy Hash: 0ccc502ed95a9565fa4c5ea89f1ab34a51e3359721808fd16c88a6c9b2208fd4
  • Instruction Fuzzy Hash: 6231E733B2855187EBA49A3DDC0172A66D1E794784FC49134DA0EC7BA8DE3CE4518F50
Uniqueness

Uniqueness Score: -1.00%

Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: ExclusiveLock$AcquireRelease
  • String ID:
  • API String ID: 17069307-0
  • Opcode ID: 63a85b23b9c4fcbc2391e192abcb120a192f381abe3b8e5a78a11d651ce3c3d3
  • Instruction ID: c848323da911207029503003271a87c857f3e3448586b3a0ff81e6cb629ca4c0
  • Opcode Fuzzy Hash: 63a85b23b9c4fcbc2391e192abcb120a192f381abe3b8e5a78a11d651ce3c3d3
  • Instruction Fuzzy Hash: 4E31F633B385518AEBA89A3DDC01B6976D1E794784FC49134EA0DC7BA4EE3CE4518F50
Uniqueness

Uniqueness Score: -1.00%

Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: ExclusiveLock$AcquireRelease
  • String ID:
  • API String ID: 17069307-0
  • Opcode ID: c2a4fba42b9c2f429ba217b82c6cf4736a1fe77b1a82e8c9c6be8cf6ac068172
  • Instruction ID: 145b78e6d2a03f11c5389266d908077831d8d07e94aa5f5f9a58b55a410a2dff
  • Opcode Fuzzy Hash: c2a4fba42b9c2f429ba217b82c6cf4736a1fe77b1a82e8c9c6be8cf6ac068172
  • Instruction Fuzzy Hash: A6311633B285518BEBA89B3CDC01B2AA6D1E794744FC49134EA5DC3BA8DE3CE4118F50
Uniqueness

Uniqueness Score: -1.00%

Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: ExclusiveLock$AcquireRelease
  • String ID:
  • API String ID: 17069307-0
  • Opcode ID: 207689a59549d8e70f80a957eee39a599efe20992ff909130c476ebeda97592d
  • Instruction ID: a105ee785618ddfb8532a53d39d57e08a82913f3657717486984a88972efba5e
  • Opcode Fuzzy Hash: 207689a59549d8e70f80a957eee39a599efe20992ff909130c476ebeda97592d
  • Instruction Fuzzy Hash: C5312833B2855147EBA89B3DDC0172A66D1E798745FC48134EA0DC3BA4DE3CE4518F50
Uniqueness

Uniqueness Score: -1.00%

Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: ExclusiveLock$AcquireRelease
  • String ID:
  • API String ID: 17069307-0
  • Opcode ID: 13fb2d76203020b190a53e76d8b32f838fed71e61ceb08d3bbe0b026e9140834
  • Instruction ID: 1a30fd616f8f0cb2a4d056c95cd4509186ace1ddc924713d6fda2cd27b65fbb4
  • Opcode Fuzzy Hash: 13fb2d76203020b190a53e76d8b32f838fed71e61ceb08d3bbe0b026e9140834
  • Instruction Fuzzy Hash: F231F633B2855586EBA89B3DDC4176A76D1E798784FC48134DA0DC7BA8DE3CE4118F50
Uniqueness

Uniqueness Score: -1.00%

Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID:
  • String ID:
  • API String ID:
  • Opcode ID: e31d5ba1c7027b35b3766d73dd2ba5c0e98a2abfcae796a983cd17fa34770bce
  • Instruction ID: a5aff03656f598ff908a0f3bb1af28bb2db1671ac04dcf938c5383c2af73640b
  • Opcode Fuzzy Hash: e31d5ba1c7027b35b3766d73dd2ba5c0e98a2abfcae796a983cd17fa34770bce
  • Instruction Fuzzy Hash: FAA00126A28952D8E645AB08AC90021A720EB90701B842872D09E410B49E7CA440EA20
Uniqueness

Uniqueness Score: -1.00%

Memory Dump Source
  • Source File: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID:
  • String ID:
  • API String ID:
  • Opcode ID: 919594be064018db54899745ed1b407af63c4757e6aa10f7f7da718a0e9eade1
  • Instruction ID: 079453550c027c58c1d76574222cebd838315a5441ba68a860f8b5a48f51bbb9
  • Opcode Fuzzy Hash: 919594be064018db54899745ed1b407af63c4757e6aa10f7f7da718a0e9eade1
  • Instruction Fuzzy Hash:
Uniqueness

Uniqueness Score: -1.00%

APIs
Strings
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: AwarenessContextThread$CloseCreatePlacementWindow
  • String ID: Software\Microsoft\Notepad$StatusBar$fMatchCase$fReverse$fWrap$fWrapAround$iMarginBottom$iMarginLeft$iMarginRight$iMarginTop$iPointSize$iWindowPosDX$iWindowPosDY$iWindowPosX$iWindowPosY$lfCharSet$lfClipPrecision$lfEscapement$lfFaceName$lfItalic$lfOrientation$lfOutPrecision$lfPitchAndFamily$lfQuality$lfStrikeOut$lfUnderline$lfWeight$replaceString$searchString$szHeader$szTrailer
  • API String ID: 521538346-3265294410
  • Opcode ID: a39fd6242cfd55ba54230ae784446cc66c86fc58a02d892a5aacb56082e08748
  • Instruction ID: 3cd10abacf6bcb3eaf4c160d0a5ab976c80f1a2b6c8ce184f9e02477ca6a24aa
  • Opcode Fuzzy Hash: a39fd6242cfd55ba54230ae784446cc66c86fc58a02d892a5aacb56082e08748
  • Instruction Fuzzy Hash: 8DC12C21F18623CAEB00AB69DC805B8B731FB85784F955536EA9C17779CF2CA845CF60
Uniqueness

Uniqueness Score: -1.00%

APIs
Strings
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: AwarenessContextCursorThread$CapsCreateDeleteDeviceFontFreeIndirectMessageObjectReleaseSendTaskWindowmemset
  • String ID: A
  • API String ID: 548684209-3554254475
  • Opcode ID: 0d68004bd4d94fc7510ac65ae4bed4df0982b8a26c70f5e2d052b93da25e6da1
  • Instruction ID: 36d484dd880cc9a46a2d613e0077acaa1f206d7c1abac2f5e09e466818bb7393
  • Opcode Fuzzy Hash: 0d68004bd4d94fc7510ac65ae4bed4df0982b8a26c70f5e2d052b93da25e6da1
  • Instruction Fuzzy Hash: 85410835A19A42CBEB00AF59EC90179FAA0FB89B55B859135CE4E53370CF3CA0459B60
Uniqueness

Uniqueness Score: -1.00%

APIs
  • FormatMessageW.KERNEL32 ref: 00007FF72B8F23D5
  • GetCurrentThreadId.KERNEL32 ref: 00007FF72B8F2457
    • Part of subcall function 00007FF72B8F2270: _vsnwprintf.LEGACY_STDIO_DEFINITIONS ref: 00007FF72B8F22A8
Strings
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: CurrentFormatMessageThread_vsnwprintf
  • String ID: $%hs!%p: $%hs(%d) tid(%x) %08X %ws$%hs(%u)\%hs!%p: $(caller: %p) $CallContext:[%hs] $Exception$FailFast$LogHr$Msg:[%ws] $ReturnHr$[%hs(%hs)]$[%hs]
  • API String ID: 223436642-3173542853
  • Opcode ID: 3fb487f89ca74a7dc530ef6f83c69a2a831ef2433d62587c9e97bb2845fa7921
  • Instruction ID: eed93d6920499cf5cfec57514ee5a4f3ae8648a60f953edd9ec0c3753374e962
  • Opcode Fuzzy Hash: 3fb487f89ca74a7dc530ef6f83c69a2a831ef2433d62587c9e97bb2845fa7921
  • Instruction Fuzzy Hash: B8619361A18642CAEA64EF59AC405B9E3A0FF58784FC05136EA8D03774CF3CF565CBA1
Uniqueness

Uniqueness Score: -1.00%

APIs
Strings
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: Event$CountTickUnregister$ExclusiveLock$AcquireAllocEnabledLocalProviderRegisterReleaseSleep_o_toupper
  • String ID: <unknown>
  • API String ID: 1911282264-1574992787
  • Opcode ID: 8ee791aab1a67b0aa0088a650e2a6889b8d3a318a1b62011811feebebf0b1adf
  • Instruction ID: f790783103f95cd991f2c23af519793bb5545695dbcbf49f3b0f7297cee05c3b
  • Opcode Fuzzy Hash: 8ee791aab1a67b0aa0088a650e2a6889b8d3a318a1b62011811feebebf0b1adf
  • Instruction Fuzzy Hash: F5C16E32A28B41CEE700AF28E8803A9B7A4FB89754F965135DA8E03764DF3DD444CF50
Uniqueness

Uniqueness Score: -1.00%

APIs
Strings
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: Heap$ErrorFreeLastProcess$ObjectSingleWait
  • String ID: onecore\internal\sdk\inc\wil\opensource\wil\resource.h
  • API String ID: 1185803644-3341287125
  • Opcode ID: da69949bd2cacdce48efdcf9907536830b3dc8794d117ea6e67be8b1c9ffa746
  • Instruction ID: 308b8708d1d55c12a9c6dab6faf34848d1a986bb55ed09f9f3c78515f30fcb7b
  • Opcode Fuzzy Hash: da69949bd2cacdce48efdcf9907536830b3dc8794d117ea6e67be8b1c9ffa746
  • Instruction Fuzzy Hash: 67715522A09A42CAEB14AF69AC40279F7A0FF95B50FD88131DA4D47761DF3CF4619B60
Uniqueness

Uniqueness Score: -1.00%

APIs
Strings
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: Message$Send$ItemText$Focus$DialogFoldString_o__wtol
  • String ID: d
  • API String ID: 1997187840-2564639436
  • Opcode ID: 791655032cd52fe6def4c1b808f69328366bac51a57584ad916e6ed8ee19a228
  • Instruction ID: 53fb131651b935e0efcf2f0019d2df4359eaab41e7b255edac1687dda67dcbdf
  • Opcode Fuzzy Hash: 791655032cd52fe6def4c1b808f69328366bac51a57584ad916e6ed8ee19a228
  • Instruction Fuzzy Hash: BA517131A18642CBE710AB18EC046B9BB60FBDA701FD5A131CA8E077A4DF3CE4459F60
Uniqueness

Uniqueness Score: -1.00%

APIs
Strings
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: MessageSend$CursorLengthLocalTextWindow$FindLockStringUnlock
  • String ID: @
  • API String ID: 1480118076-2766056989
  • Opcode ID: a635ee15a58c34f85256e70f94a93ae0536d5eab8639af8fb064959b65c43efc
  • Instruction ID: c54cb68cdd57032e3b245e59aa64b6d4caf6903a27ff2a759e20728bb63563d6
  • Opcode Fuzzy Hash: a635ee15a58c34f85256e70f94a93ae0536d5eab8639af8fb064959b65c43efc
  • Instruction Fuzzy Hash: 2E718131E18A42CAEB10AF19EC501B9B7A4FF89B44F895535DA8E43774DF3CE4458B20
Uniqueness

Uniqueness Score: -1.00%

APIs
    • Part of subcall function 00007FF72B902C54: CharUpperW.USER32 ref: 00007FF72B902C77
    • Part of subcall function 00007FF72B902C54: CharUpperW.USER32 ref: 00007FF72B902C8D
  • GetSystemMenu.USER32 ref: 00007FF72B903184
  • LoadAcceleratorsW.USER32 ref: 00007FF72B9031A5
  • SetWindowLongW.USER32 ref: 00007FF72B9031C8
  • CreateFileW.KERNEL32(?,?,?,?,?,?,00007FF72B8FC29E), ref: 00007FF72B903225
  • GetLastError.KERNEL32(?,?,?,?,?,?,00007FF72B8FC29E), ref: 00007FF72B903242
  • CoTaskMemFree.API-MS-WIN-CORE-COM-L1-1-0(?,?,?,?,?,?,00007FF72B8FC29E), ref: 00007FF72B9032FE
    • Part of subcall function 00007FF72B8FD3C8: wcsnlen.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF72B8FD403
    • Part of subcall function 00007FF72B8FD3C8: LocalAlloc.KERNEL32 ref: 00007FF72B8FD440
    • Part of subcall function 00007FF72B8FD3C8: MessageBoxW.USER32 ref: 00007FF72B8FD4E1
    • Part of subcall function 00007FF72B8FD3C8: LocalFree.KERNEL32 ref: 00007FF72B8FD4F2
  • CreateFileW.KERNEL32(?,?,?,?,?,?,00007FF72B8FC29E), ref: 00007FF72B9032D8
Strings
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: CharCreateFileFreeLocalUpper$AcceleratorsAllocErrorLastLoadLongMenuMessageSystemTaskWindowwcsnlen
  • String ID: /.SETUP$3$SlipUpAcc
  • API String ID: 1676377551-1567928811
  • Opcode ID: 1a1a4fc042810b346b03a9f74f25a05da530b0beb62227f0349f079ccdd146cf
  • Instruction ID: 21c6a037c5c51e2c9a707d0f4370db7d50e0c810b82c3fe2ff009072a4d2d058
  • Opcode Fuzzy Hash: 1a1a4fc042810b346b03a9f74f25a05da530b0beb62227f0349f079ccdd146cf
  • Instruction Fuzzy Hash: 62515D31D0CA02CAE710AB19AC80179BBA0FB89794FC48A35DA8D477B4CF3CE4419F60
Uniqueness

Uniqueness Score: -1.00%

APIs
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: Heap$ErrorLast$FreeProcess$CriticalDeleteSectionThreadpoolTimer$CallbacksWait
  • String ID:
  • API String ID: 3162582620-0
  • Opcode ID: 62260a71dc7dbe7e741077152bc767b8f2433958c879216440b9ae0c7a72b7ee
  • Instruction ID: aac9f9a1d137a14233c8b4dd65752ade9d7bff923cb3cd7e6df5d5bef247e911
  • Opcode Fuzzy Hash: 62260a71dc7dbe7e741077152bc767b8f2433958c879216440b9ae0c7a72b7ee
  • Instruction Fuzzy Hash: 35413D21B05A41DBEB09AB659950378EB60FF99F81FC89134CA0E17B61CF3CF4619B60
Uniqueness

Uniqueness Score: -1.00%

APIs
Strings
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: FreeTask$AwarenessContextCursorMessageThread$CreateFile
  • String ID: *.txt
  • API String ID: 1452784593-4006125282
  • Opcode ID: cac5249f4c9052c3664b7dd738064fe643d34b03741e7a4438416d59feb5b531
  • Instruction ID: a2d84004074f4f37870971a9624c591cb2c78c32195ec9893d77783caa9ebdc6
  • Opcode Fuzzy Hash: cac5249f4c9052c3664b7dd738064fe643d34b03741e7a4438416d59feb5b531
  • Instruction Fuzzy Hash: ACC15926E0C643CAEA10BB28AC401B9E7A0FFA5794FC54135D99D476B1DE3CF4558FA0
Uniqueness

Uniqueness Score: -1.00%

APIs
    • Part of subcall function 00007FF72B8FB2C0: SendMessageW.USER32(?,?,?,?,00007FF72B8FB35C), ref: 00007FF72B8FB2DE
    • Part of subcall function 00007FF72B8FB2C0: SendMessageW.USER32(?,?,?,?,00007FF72B8FB35C), ref: 00007FF72B8FB301
  • SHStrDupW.API-MS-WIN-SHCORE-OBSOLETE-L1-1-0 ref: 00007FF72B8FB3FE
  • memset.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF72B8FB459
  • CoTaskMemFree.API-MS-WIN-CORE-COM-L1-1-0 ref: 00007FF72B8FB536
Strings
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: MessageSend$FreeTaskmemset
  • String ID: *.txt
  • API String ID: 3329309475-4006125282
  • Opcode ID: d0675baab160861ef060521cd6e32b0cffc033986fa3b0c312438cf8429070ea
  • Instruction ID: be245bd329c20b896766b9cfe5696241bebed7e657a632a10804072185272858
  • Opcode Fuzzy Hash: d0675baab160861ef060521cd6e32b0cffc033986fa3b0c312438cf8429070ea
  • Instruction Fuzzy Hash: E0717D22A08A42C6EA10AF19EC805B9F7A0FF99B84FC55135DA8E43775DF3CE5458F60
Uniqueness

Uniqueness Score: -1.00%

APIs
Strings
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: StringWindows$Delete$Create$ActivationFactoryReference
  • String ID: Windows.Security.EnterpriseData.ProtectionPolicyManager$shell\osshell\accesory\common\edpapphelper\edpapphelper.cpp
  • API String ID: 3735519776-1088074545
  • Opcode ID: 06625141e27b5d7a36cdedd879e2a11db8c6fce2c7bf99dd99a0b1cd264d1ef9
  • Instruction ID: 2bbc32b687616176d46e993b578a7fcb693443dcbc93ddfdae4b9efc6f26afbf
  • Opcode Fuzzy Hash: 06625141e27b5d7a36cdedd879e2a11db8c6fce2c7bf99dd99a0b1cd264d1ef9
  • Instruction Fuzzy Hash: B0515F36B28A46DDEB00AB69EC400ACB770FB88B94B959132CE8E57774CF38D405D760
Uniqueness

Uniqueness Score: -1.00%

APIs
Strings
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: ObjectSingleWait
  • String ID: wil
  • API String ID: 24740636-1589926490
  • Opcode ID: 4ee86bbd529652bca52049444ff4daebd2e8eb897cfad94c258fc3d89aa31029
  • Instruction ID: 4e06306625904e3c9dd8332dafc300da7aabd80b937ee945e6c75c9033281020
  • Opcode Fuzzy Hash: 4ee86bbd529652bca52049444ff4daebd2e8eb897cfad94c258fc3d89aa31029
  • Instruction Fuzzy Hash: 59417E71A18542C7F320AB29EC40279E6A1EFA5750FE4D131D94E83AB4CF3CF8559EA1
Uniqueness

Uniqueness Score: -1.00%

APIs
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: Textwcsnlen$ExtentPoint32
  • String ID:
  • API String ID: 4145614311-0
  • Opcode ID: 86b20bf711ad77287d50001263b16c96d834eae36ebb030179c11d5782889687
  • Instruction ID: 255f40a82510fc77cf794a888bb6a05d9923b751461b502f39c004ee98898d0e
  • Opcode Fuzzy Hash: 86b20bf711ad77287d50001263b16c96d834eae36ebb030179c11d5782889687
  • Instruction Fuzzy Hash: 5E511835A18642CFE610AF29EC44579FBA1FB99B84B869531D98E43B34CF3CE1498B50
Uniqueness

Uniqueness Score: -1.00%

APIs
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: MessageSend$Local$ErrorLast$AllocFreeLockTaskUnlock
  • String ID:
  • API String ID: 1218993353-0
  • Opcode ID: d3ac5847a9cd668c2f3b2d5a8124951d485e6b8d954f64244d2d59991ca134cc
  • Instruction ID: af2b2899d7b8ee24cd5b3ea0ae25c7774dc1b77cfd5c2257683bc3cbf48065ed
  • Opcode Fuzzy Hash: d3ac5847a9cd668c2f3b2d5a8124951d485e6b8d954f64244d2d59991ca134cc
  • Instruction Fuzzy Hash: 6A410835E18B42CBE700AB68AC51675BBA0EF99B41F869135DA8E03771CE3CE4449F60
Uniqueness

Uniqueness Score: -1.00%

APIs
Strings
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: String$Windows$Delete$Buffer$CompareOrdinal
  • String ID: shell\osshell\accesory\common\edpapphelper\edpapphelper.cpp
  • API String ID: 3050908022-1113416246
  • Opcode ID: 1ac93d61013a0de25a254a2ce7438a4d1fd1909c8479bdd75e3fc2e6e35afc6f
  • Instruction ID: f1088fa9ac11a718a590f90b8ba51c9c31d6b94d1135ba592d53cbafa51a1862
  • Opcode Fuzzy Hash: 1ac93d61013a0de25a254a2ce7438a4d1fd1909c8479bdd75e3fc2e6e35afc6f
  • Instruction Fuzzy Hash: 9B512B32624A46CEEB14AF29DC841ACB760FBC9B88B946131EE4E57774CF38D445EB50
Uniqueness

Uniqueness Score: -1.00%

APIs
Strings
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: ErrorLast$CreateSemaphore$ChangeCloseFindNotification
  • String ID: _p0$wil
  • API String ID: 17413022-1814513734
  • Opcode ID: 15439db9aecac90577134df4d83e766dd0a56c984ae96890dbcae9cfe25c0142
  • Instruction ID: 81bb8da8242c021b79f9fbf372b73355c49f4b6be10f75a8a23d0b03bba3b180
  • Opcode Fuzzy Hash: 15439db9aecac90577134df4d83e766dd0a56c984ae96890dbcae9cfe25c0142
  • Instruction Fuzzy Hash: E141A021B18B42CAE710BF69A8942B9F650FB98B51FC49035EE8E07761CF3CF4558B90
Uniqueness

Uniqueness Score: -1.00%

APIs
Strings
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: Message$LocalSend$AllocCursorFileFreeUnlockUnmapViewwcsnlen
  • String ID: 0$0
  • API String ID: 2825476163-203156872
  • Opcode ID: 8fa81f48bb8d6d9f1be5de176776439d72159b3c7b50505ac209e22e07e7363c
  • Instruction ID: 7ebd60febeb3848665d8457e1155b0dc863d092b266e648611084151c578a589
  • Opcode Fuzzy Hash: 8fa81f48bb8d6d9f1be5de176776439d72159b3c7b50505ac209e22e07e7363c
  • Instruction Fuzzy Hash: A8516E26D08692C6EB51AB19EC1027AB7A4FF85B40FC69132DA8D03371CF7CE5858F60
Uniqueness

Uniqueness Score: -1.00%

APIs
  • WindowsCreateStringReference.API-MS-WIN-CORE-WINRT-STRING-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF72B8FAE9C), ref: 00007FF72B91333F
  • RoGetActivationFactory.API-MS-WIN-CORE-WINRT-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF72B8FAE9C), ref: 00007FF72B91337B
Strings
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: ActivationCreateFactoryReferenceStringWindows
  • String ID: Windows.ApplicationModel.DataTransfer.Clipboard$shell\osshell\accesory\common\edpapphelper\edpapphelper.cpp
  • API String ID: 1966789792-3637659222
  • Opcode ID: f424c9abce4143103481942801846a9f67e458941c05e398d7742467aacb8480
  • Instruction ID: 401a1646371d99ec79a54486bdbe4e322160d76302a1e25842a9984f1de06809
  • Opcode Fuzzy Hash: f424c9abce4143103481942801846a9f67e458941c05e398d7742467aacb8480
  • Instruction Fuzzy Hash: 00710B36B28B16D9EB00EB69EC400AC7774FB88B88B909032DE8E57B64DF38D445D750
Uniqueness

Uniqueness Score: -1.00%

APIs
    • Part of subcall function 00007FF72B902C54: CharUpperW.USER32 ref: 00007FF72B902C77
    • Part of subcall function 00007FF72B902C54: CharUpperW.USER32 ref: 00007FF72B902C8D
  • ShowWindow.USER32 ref: 00007FF72B903401
  • CoTaskMemFree.API-MS-WIN-CORE-COM-L1-1-0 ref: 00007FF72B903458
Strings
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: CharUpper$FreeShowTaskWindow
  • String ID: /PT$0
  • API String ID: 4259454098-4063893260
  • Opcode ID: 58566343a5c4559178d06821d97cad775fe8e1525aa111208a6da53a7a63a4a1
  • Instruction ID: 7ace3bf15540bef96243deb1ab54aae57c9c0df6de6d666023993ff020ae513a
  • Opcode Fuzzy Hash: 58566343a5c4559178d06821d97cad775fe8e1525aa111208a6da53a7a63a4a1
  • Instruction Fuzzy Hash: EE514D62E1C652C6EB50BB1DA8502B9F690EF88B50FD48931DACE476B1DF3CE4419E20
Uniqueness

Uniqueness Score: -1.00%

APIs
Strings
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: ActivationCloseCreateFactoryFreeHandleReferenceStringTaskWindowsmemset
  • String ID: 0$Windows.Security.EnterpriseData.ProtectionPolicyManager
  • API String ID: 1025271488-297563236
  • Opcode ID: 1815e913017c5b10e38db30a100b821f9e16eeac015e67d1f05c570171450124
  • Instruction ID: bab0e7d6df03118b90aa54b6f96fb61677d4a24d1dd309cfa45e3c9f74486956
  • Opcode Fuzzy Hash: 1815e913017c5b10e38db30a100b821f9e16eeac015e67d1f05c570171450124
  • Instruction Fuzzy Hash: 9D615232A28A52C6E710AB18DC543BDB760FB94794F915136EA8D436B4DF3CE484CF60
Uniqueness

Uniqueness Score: -1.00%

APIs
    • Part of subcall function 00007FF72B8FFBB0: CoTaskMemAlloc.API-MS-WIN-CORE-COM-L1-1-0(?,?,?,00007FF72B8F98A0), ref: 00007FF72B8FFC2D
  • memset.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF72B8F98BC
    • Part of subcall function 00007FF72B8F21F0: _vsnwprintf.LEGACY_STDIO_DEFINITIONS ref: 00007FF72B8F2230
  • SetThreadDpiAwarenessContext.USER32 ref: 00007FF72B8F9984
  • SetThreadDpiAwarenessContext.USER32 ref: 00007FF72B8F99CD
  • CoTaskMemFree.API-MS-WIN-CORE-COM-L1-1-0 ref: 00007FF72B8F9A1D
Strings
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: AwarenessContextTaskThread$AllocFree_vsnwprintfmemset
  • String ID: %s%c*.txt%c%s%c*.*%c$*.txt$txt
  • API String ID: 2351153411-3032785013
  • Opcode ID: 349e908ef4443145f78ddaa6866d9a6adf1f0618bcc9839a4f6fafb0289827c4
  • Instruction ID: b781752819161e72f20512885539ccd05071d4b9db37d3fa4af6d851a8559c7d
  • Opcode Fuzzy Hash: 349e908ef4443145f78ddaa6866d9a6adf1f0618bcc9839a4f6fafb0289827c4
  • Instruction Fuzzy Hash: 7E514832A18B42CAEB10EB59EC403A9B7A4FB98B54FC54135DA8D477A4DF3CE055CB60
Uniqueness

Uniqueness Score: -1.00%

APIs
Strings
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: ExtensionFindFreePathTask_o__wcsicmp
  • String ID: .log$FAIL/Error$Unknown$test/log
  • API String ID: 2494169980-2209339843
  • Opcode ID: 08917038e2a224ed25ee7584d64dde88f1fceca0b809603fb4b7886e7937b1b8
  • Instruction ID: 42e50517a79ff3d4836e996cbd46b08a29ac5db514ff0e1a2130a655aafc6ed6
  • Opcode Fuzzy Hash: 08917038e2a224ed25ee7584d64dde88f1fceca0b809603fb4b7886e7937b1b8
  • Instruction Fuzzy Hash: E4114F72A18746CAE710AB15E8443BAFA61FB85790FC45035EA8D02664CF3CE444CF60
Uniqueness

Uniqueness Score: -1.00%

APIs
  • wcsnlen.API-MS-WIN-CRT-STRING-L1-1-0(00000000,00000000,?,00000001,00000000,00000000,00000000,00007FF72B91079E,?,?,?,00000001,00000000,00007FF72B8FBD20), ref: 00007FF72B910889
  • GlobalAlloc.KERNEL32(?,00000001,00000000,00000000,00000000,00007FF72B91079E,?,?,?,00000001,00000000,00007FF72B8FBD20), ref: 00007FF72B9108C6
  • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,00000001,00000000,00000000,00000000,00007FF72B91079E,?,?,?,00000001,00000000,00007FF72B8FBD20), ref: 00007FF72B910945
  • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,00000001,00000000,00000000,00000000,00007FF72B91079E,?,?,?,00000001,00000000,00007FF72B8FBD20), ref: 00007FF72B91095A
  • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,00000001,00000000,00000000,00000000,00007FF72B91079E,?,?,?,00000001,00000000,00007FF72B8FBD20), ref: 00007FF72B9109A3
  • SendMessageW.USER32(?,00000001,00000000,00000000,00000000,00007FF72B91079E,?,?,?,00000001,00000000,00007FF72B8FBD20), ref: 00007FF72B9109BA
  • SendMessageW.USER32(?,00000001,00000000,00000000,00000000,00007FF72B91079E,?,?,?,00000001,00000000,00007FF72B8FBD20), ref: 00007FF72B9109DB
  • GlobalFree.KERNEL32 ref: 00007FF72B9109EA
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: memcpy$GlobalMessageSend$AllocFreewcsnlen
  • String ID:
  • API String ID: 1997934235-0
  • Opcode ID: 78fcb64e1144e1fd77dfd00335271e420b2a6e458c17db2f54b4af874089e1fc
  • Instruction ID: 54813f4978833fda596cd12550f9518eddfc0b0cda9c19ed90b4ed0c692e2b6c
  • Opcode Fuzzy Hash: 78fcb64e1144e1fd77dfd00335271e420b2a6e458c17db2f54b4af874089e1fc
  • Instruction Fuzzy Hash: 00419631718A82CFEA10AF1AAC452AAEB90FBC9BD4F845035DECD47B55DE3DE4059B10
Uniqueness

Uniqueness Score: -1.00%

APIs
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: ItemMessageSend
  • String ID:
  • API String ID: 3015471070-0
  • Opcode ID: 0adb29e50f697d931382218fd850552aa829a59bb512d2abb2ee7c78866c6dba
  • Instruction ID: a38c123d22c9d847e417171e71f1b0cfccec863b49ebb3047e3c0e0d138a45c5
  • Opcode Fuzzy Hash: 0adb29e50f697d931382218fd850552aa829a59bb512d2abb2ee7c78866c6dba
  • Instruction Fuzzy Hash: BF416031B18B81C6E7209F19BC40A69BBA0FBD9B94F859235DA8D43B64CF3CE0458B50
Uniqueness

Uniqueness Score: -1.00%

APIs
  • wcsnlen.API-MS-WIN-CRT-STRING-L1-1-0(?,00000001,00000000,00000000,00000000,00007FF72B9107C0,?,?,?,00000001,00000000,00007FF72B8FBD20), ref: 00007FF72B910A49
  • SendMessageW.USER32(?,00000001,00000000,00000000,00000000,00007FF72B9107C0,?,?,?,00000001,00000000,00007FF72B8FBD20), ref: 00007FF72B910A6E
  • SendMessageW.USER32(?,00000001,00000000,00000000,00000000,00007FF72B9107C0,?,?,?,00000001,00000000,00007FF72B8FBD20), ref: 00007FF72B910A8C
  • LocalLock.KERNEL32(?,00000001,00000000,00000000,00000000,00007FF72B9107C0,?,?,?,00000001,00000000,00007FF72B8FBD20), ref: 00007FF72B910AA7
  • SendMessageW.USER32(?,00000001,00000000,00000000,00000000,00007FF72B9107C0,?,?,?,00000001,00000000,00007FF72B8FBD20), ref: 00007FF72B910B1E
  • SendMessageW.USER32(?,00000001,00000000,00000000,00000000,00007FF72B9107C0,?,?,?,00000001,00000000,00007FF72B8FBD20), ref: 00007FF72B910B41
  • SendMessageW.USER32(?,00000001,00000000,00000000,00000000,00007FF72B9107C0,?,?,?,00000001,00000000,00007FF72B8FBD20), ref: 00007FF72B910B64
  • LocalUnlock.KERNEL32(?,00000001,00000000,00000000,00000000,00007FF72B9107C0,?,?,?,00000001,00000000,00007FF72B8FBD20), ref: 00007FF72B910B75
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: MessageSend$Local$LockUnlockwcsnlen
  • String ID:
  • API String ID: 3687776761-0
  • Opcode ID: a92c930151c535ffecf25aeab5c35b4b4b7cbdef28793b336ddaac6d5b7b45c1
  • Instruction ID: fc76d8ea0421777e9f9c7d978f3046750d94b36556953692b3ae74402b09116f
  • Opcode Fuzzy Hash: a92c930151c535ffecf25aeab5c35b4b4b7cbdef28793b336ddaac6d5b7b45c1
  • Instruction Fuzzy Hash: 5B415B35A19642CBEA00AB18E84067AFBA0FBC9795F859131DE8D43B74CE3CE4459F20
Uniqueness

Uniqueness Score: -1.00%

APIs
  • _vscwprintf.LEGACY_STDIO_DEFINITIONS ref: 00007FF72B911733
    • Part of subcall function 00007FF72B916DE0: _o___stdio_common_vswprintf.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00007FF72B916E0F
    • Part of subcall function 00007FF72B8FFBB0: CoTaskMemAlloc.API-MS-WIN-CORE-COM-L1-1-0(?,?,?,00007FF72B8F98A0), ref: 00007FF72B8FFC2D
  • _vsnwprintf.LEGACY_STDIO_DEFINITIONS ref: 00007FF72B9117EC
  • CoTaskMemFree.API-MS-WIN-CORE-COM-L1-1-0(00000000,?,?,00000000,00000002,00000000,000F003F,?,00007FF72B910E0A), ref: 00007FF72B91184C
  • CoTaskMemFree.API-MS-WIN-CORE-COM-L1-1-0(00000000,?,?,00000000,00000002,00000000,000F003F,?,00007FF72B910E0A), ref: 00007FF72B911775
    • Part of subcall function 00007FF72B8FDCD8: GetLastError.KERNEL32 ref: 00007FF72B8FDD02
    • Part of subcall function 00007FF72B8FDCD8: CoTaskMemFree.API-MS-WIN-CORE-COM-L1-1-0 ref: 00007FF72B8FDD13
    • Part of subcall function 00007FF72B8FDCD8: SetLastError.KERNEL32 ref: 00007FF72B8FDD21
  • CoTaskMemFree.API-MS-WIN-CORE-COM-L1-1-0(00000000,?,?,00000000,00000002,00000000,000F003F,?,00007FF72B910E0A), ref: 00007FF72B91187F
Strings
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: Task$Free$ErrorLast$Alloc_o___stdio_common_vswprintf_vscwprintf_vsnwprintf
  • String ID: onecore\internal\sdk\inc\wil\opensource\wil\resource.h
  • API String ID: 3516882015-3341287125
  • Opcode ID: 312cbff025d18e022040c37755ba7b8cba62d550ad93bb1a6ac664d99372c52f
  • Instruction ID: 303fd3a41c7de0178bba4aa63ebfa59d5dac20a1a2810bfd5fc8fd95edaaeee4
  • Opcode Fuzzy Hash: 312cbff025d18e022040c37755ba7b8cba62d550ad93bb1a6ac664d99372c52f
  • Instruction Fuzzy Hash: 4441D226F24622E9EB11BB159C000BDA660EFC47A4FD8A131DE5D177A0DF3CE492DB60
Uniqueness

Uniqueness Score: -1.00%

APIs
Strings
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: ErrorHeapLast$FreeObjectProcessSingleWait
  • String ID: onecore\internal\sdk\inc\wil\opensource\wil\resource.h
  • API String ID: 453756160-3341287125
  • Opcode ID: b9de2dd6f2057d753dd07eadf59561444939490f20701e74ddb828d5e544b189
  • Instruction ID: aa4754a06d268082238614b49451504fb54f03e310f2066bbde817a58460123e
  • Opcode Fuzzy Hash: b9de2dd6f2057d753dd07eadf59561444939490f20701e74ddb828d5e544b189
  • Instruction Fuzzy Hash: 97518635A0864296FA60BB29DC442B9F790FFA5740FC44531DA8E426B1DF3CF554CBA0
Uniqueness

Uniqueness Score: -1.00%

APIs
    • Part of subcall function 00007FF72B8FFBB0: CoTaskMemAlloc.API-MS-WIN-CORE-COM-L1-1-0(?,?,?,00007FF72B8F98A0), ref: 00007FF72B8FFC2D
  • memset.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF72B8F9C2E
    • Part of subcall function 00007FF72B8F21F0: _vsnwprintf.LEGACY_STDIO_DEFINITIONS ref: 00007FF72B8F2230
  • SetThreadDpiAwarenessContext.USER32 ref: 00007FF72B8F9CF9
  • SetThreadDpiAwarenessContext.USER32 ref: 00007FF72B8F9D4F
  • CoTaskMemFree.API-MS-WIN-CORE-COM-L1-1-0 ref: 00007FF72B8F9D83
Strings
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: AwarenessContextTaskThread$AllocFree_vsnwprintfmemset
  • String ID: %s%c*.txt%c%s%c*.*%c$txt
  • API String ID: 2351153411-81093622
  • Opcode ID: d8023eb52343553a80af9855a4d76899e2fa53e77e7dc4b2ccf917f24767a52d
  • Instruction ID: 54c245afa8d6d3a0e31a00369dacbb63e5ffbad47da7d98bb295b78a9d14a089
  • Opcode Fuzzy Hash: d8023eb52343553a80af9855a4d76899e2fa53e77e7dc4b2ccf917f24767a52d
  • Instruction Fuzzy Hash: 1A515B32A19B42CAE700EF19EC403A9B7A4FB99B54F954135DA8D077A4DF3CE115CB60
Uniqueness

Uniqueness Score: -1.00%

APIs
Strings
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: Heap$AddressFreeHandleModuleProcProcess
  • String ID: RtlNotifyFeatureUsage$ntdll.dll
  • API String ID: 3729415315-2443152447
  • Opcode ID: 65e9f402a284b7b318187300b87fdd6f017aae09a3d9a1bef9bc618029b1c789
  • Instruction ID: 80490934f674f4afcba97c9ea362b99c347944bde7312336092990678baaae60
  • Opcode Fuzzy Hash: 65e9f402a284b7b318187300b87fdd6f017aae09a3d9a1bef9bc618029b1c789
  • Instruction Fuzzy Hash: 93418D21E1A64386FA60AB19EC40379E2A1EFA4B00FC44235D98D476B1DF2CF455DFA0
Uniqueness

Uniqueness Score: -1.00%

APIs
Strings
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: ExclusiveLock$AcquireAddressHandleModuleProcRelease
  • String ID: RtlRegisterFeatureConfigurationChangeNotification$ntdll.dll
  • API String ID: 303310891-4023217342
  • Opcode ID: 0e76a87a3097591dc206d2412d72bae637e9f77d0bdd4f39113b0d76c6aab5ac
  • Instruction ID: f3b75c63403b958165edfdf49556683aa63b00c9df282fe340cc533d3c7443bd
  • Opcode Fuzzy Hash: 0e76a87a3097591dc206d2412d72bae637e9f77d0bdd4f39113b0d76c6aab5ac
  • Instruction Fuzzy Hash: 24315961A08B02CAEA10AF19EC403B9A7A0FB69B84FC49131DE4D57764DF3CF556CB90
Uniqueness

Uniqueness Score: -1.00%

APIs
Strings
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: AddressHandleModuleProc$ErrorLast
  • String ID: RtlSubscribeWnfStateChangeNotification$ntdll.dll
  • API String ID: 798792539-2214456325
  • Opcode ID: c4a15f7a3caf167a17fd10fa7e5ad88768ae1a047e1621a6ad3b7e24851d4a66
  • Instruction ID: 6a65d487e43908f54a9d03526b898702eec3b10dc829442d65363ae25ad6176b
  • Opcode Fuzzy Hash: c4a15f7a3caf167a17fd10fa7e5ad88768ae1a047e1621a6ad3b7e24851d4a66
  • Instruction Fuzzy Hash: D7319E32A19B41CAEB01AF19E8443B9B7A0FB88B95FC54235DA8D07360DF3CE455CB60
Uniqueness

Uniqueness Score: -1.00%

APIs
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: EnableItemMenuWindow$CharDestroyFocusNextSystemText
  • String ID:
  • API String ID: 1812101388-0
  • Opcode ID: 9ad82370c2f20138d4384038108ab96d09581fd33f7c2d60a9c2cb9bee2a705e
  • Instruction ID: 3086027e9d881e95c5a9389fa8c7b38db4d7b739ad85ebc3a3745eeb43cd6aa5
  • Opcode Fuzzy Hash: 9ad82370c2f20138d4384038108ab96d09581fd33f7c2d60a9c2cb9bee2a705e
  • Instruction Fuzzy Hash: DF316F35E18A42CAF7506B19AC40174FAA4FB9AB80FD99431CE8E47774CF3CE4419B20
Uniqueness

Uniqueness Score: -1.00%

Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID:
  • String ID:
  • API String ID:
  • Opcode ID: 5459812730bc5f8edcb16be93eeac25d08fe202c385c4a76f4d8e42298880c44
  • Instruction ID: d9b8564ac464a59e84f9d340815c8b380f547a8395f0922f6b30d09177e39097
  • Opcode Fuzzy Hash: 5459812730bc5f8edcb16be93eeac25d08fe202c385c4a76f4d8e42298880c44
  • Instruction Fuzzy Hash: 89D1B562F19642CAEB11AF18DC112B9B760FB45B84FD49132CE9E232A4DF3DE545DB20
Uniqueness

Uniqueness Score: -1.00%

APIs
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: MessageSend$CreateDestroyInstanceWindow
  • String ID:
  • API String ID: 2293694912-0
  • Opcode ID: 7a35bc669f7bc77a4cd38f2090d68a54cf04a38a341ec3273df228e13b34f778
  • Instruction ID: a08d2b65ff4c22115a3f8d0ff96d4bcbfc7cdda63e0f8408a9db4b92afa91098
  • Opcode Fuzzy Hash: 7a35bc669f7bc77a4cd38f2090d68a54cf04a38a341ec3273df228e13b34f778
  • Instruction Fuzzy Hash: 43516436B18A41CAEB10EF19EC41AA8BB60FB99745FC56135D98D87B64CF3CD1458F20
Uniqueness

Uniqueness Score: -1.00%

APIs
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: LocalMessagewcsnlen$AllocFree
  • String ID:
  • API String ID: 4016091692-0
  • Opcode ID: 8f1c56fe61170f4c6d82ebde5f95a0caef2c6d0e6c087b44075e1cc02230ff5f
  • Instruction ID: ed7581f299fda2e222835ef587f6e48e546c7138437a1046212c92e2040a2893
  • Opcode Fuzzy Hash: 8f1c56fe61170f4c6d82ebde5f95a0caef2c6d0e6c087b44075e1cc02230ff5f
  • Instruction Fuzzy Hash: D7418E22E09741C6EA106F1AA804139F6A1FFA9F85BD49430DF4E47364EE3CF4619BA0
Uniqueness

Uniqueness Score: -1.00%

APIs
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: ByteCharMultiWide
  • String ID:
  • API String ID: 626452242-0
  • Opcode ID: 7f0b120ea91feeb67977716628403d5ab924ca998ea5c2519390a9e16c282540
  • Instruction ID: ba7690368f9bff5e09c322230bb485ea9042ed21528a3934359037be692e8796
  • Opcode Fuzzy Hash: 7f0b120ea91feeb67977716628403d5ab924ca998ea5c2519390a9e16c282540
  • Instruction Fuzzy Hash: B8316D32618B86CBD3209F1AA844669FBA5F78DB90F955235DE8E43B24DF3CE445DB00
Uniqueness

Uniqueness Score: -1.00%

APIs
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: ErrorExclusiveLastLockThreadpoolTimer$AcquireCreateRelease
  • String ID:
  • API String ID: 117860038-0
  • Opcode ID: 8474d3e4229c47791c521839211181dcefb8debf01fb96103a9dfc472595066d
  • Instruction ID: c550521385b3757865125a1fc358f8182130cf6d5ea79d5c0f2a94a28636c3fe
  • Opcode Fuzzy Hash: 8474d3e4229c47791c521839211181dcefb8debf01fb96103a9dfc472595066d
  • Instruction Fuzzy Hash: 0F319322A18781CAE760AB25A840139FBA0FB59B90FC45235DE8D03B64DF3CF461CB50
Uniqueness

Uniqueness Score: -1.00%

APIs
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: ErrorExclusiveLastLockThreadpoolTimer$AcquireCreateRelease
  • String ID:
  • API String ID: 117860038-0
  • Opcode ID: 08fd87acd06f7e49d55c623870f8d8ca2a4f3736c58bb87430829173edec6092
  • Instruction ID: 558477bbefca0915b3509d61e8fda8396e667eb9a9caf903bd62d858594e8e77
  • Opcode Fuzzy Hash: 08fd87acd06f7e49d55c623870f8d8ca2a4f3736c58bb87430829173edec6092
  • Instruction Fuzzy Hash: 7E316F35A08B41DBFB116F29A840279EB60FB95B90FC89130DE4D03B64DF3CE4A99B50
Uniqueness

Uniqueness Score: -1.00%

APIs
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: Lock$AcquireCriticalExclusiveReleaseSectionShared$EnterLeave
  • String ID:
  • API String ID: 3221859647-0
  • Opcode ID: 7c087d334c52c9c59e6380833283053256dff1cc3d03c912f71d724a765cb576
  • Instruction ID: 283dc6adf0d7306aa04745dc76bec39dd6e0abb63c3ea4b89603aff17e9ceabe
  • Opcode Fuzzy Hash: 7c087d334c52c9c59e6380833283053256dff1cc3d03c912f71d724a765cb576
  • Instruction Fuzzy Hash: 44317F62B18A51CAEA116F15A900179FB61FB99FD0BC99230DE4E17B24CF3CE495CB50
Uniqueness

Uniqueness Score: -1.00%

APIs
  • MessageBoxW.USER32 ref: 00007FF72B910321
  • GlobalLock.KERNEL32 ref: 00007FF72B910334
  • GlobalLock.KERNEL32 ref: 00007FF72B910351
  • CreateDCW.GDI32 ref: 00007FF72B910379
  • GlobalUnlock.KERNEL32(?,?,?,00007FF72B910582), ref: 00007FF72B91038F
  • GlobalUnlock.KERNEL32(?,?,?,00007FF72B910582), ref: 00007FF72B9103A7
    • Part of subcall function 00007FF72B8FDC80: SetThreadDpiAwarenessContext.USER32 ref: 00007FF72B8FDC94
    • Part of subcall function 00007FF72B8FDC80: SetThreadDpiAwarenessContext.USER32 ref: 00007FF72B8FDCB7
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: Global$AwarenessContextLockThreadUnlock$CreateMessage
  • String ID:
  • API String ID: 2654941827-0
  • Opcode ID: 17a1fc3f85381ab1e3b4d03d52c5a54b7720e26b7c8eab082f24ede78446b615
  • Instruction ID: b428649962c2fc1ffc0f496c02097f2fb9595fc6f048da067fc4d27cd84b7c72
  • Opcode Fuzzy Hash: 17a1fc3f85381ab1e3b4d03d52c5a54b7720e26b7c8eab082f24ede78446b615
  • Instruction Fuzzy Hash: BA213021A19A42CFEA04AB59EC54578F7A0FF89B84BC69131C98E53270DF3CE455EB20
Uniqueness

Uniqueness Score: -1.00%

APIs
  • memcmp.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,onecore\internal\sdk\inc\wil/Staging.h,00007FF72B8F51BD), ref: 00007FF72B8F562A
    • Part of subcall function 00007FF72B8F52EC: memcmp.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?,?,?,?,?,?,?,onecore\internal\sdk\inc\wil/Staging.h,00000000,?,00000000,?,00007FF72B8F57E5), ref: 00007FF72B8F5467
  • _o__errno.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,onecore\internal\sdk\inc\wil/Staging.h,00007FF72B8F51BD), ref: 00007FF72B8F58BC
  • _o__invalid_parameter_noinfo.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,onecore\internal\sdk\inc\wil/Staging.h,00007FF72B8F51BD), ref: 00007FF72B8F58CE
  • _o__errno.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,onecore\internal\sdk\inc\wil/Staging.h,00007FF72B8F51BD), ref: 00007FF72B8F58DF
Strings
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: _o__errnomemcmp$_o__invalid_parameter_noinfo
  • String ID: onecore\internal\sdk\inc\wil/Staging.h
  • API String ID: 859076816-4099157372
  • Opcode ID: 8f0934418c359f349685027090f3cc3e5fe48846a02656393a4b2669eaf1498d
  • Instruction ID: f20e4711817466a1bebd47a9b99d305a9396d96ff92417fd6b7f65cb66c6f43a
  • Opcode Fuzzy Hash: 8f0934418c359f349685027090f3cc3e5fe48846a02656393a4b2669eaf1498d
  • Instruction Fuzzy Hash: 83C1A662F1465189EB24EFB598002FD67B1FB24788FD44036DE4D27B69DF38A451CB90
Uniqueness

Uniqueness Score: -1.00%

APIs
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: Heap$Process$Free$AddressAllocHandleModuleProcmemset
  • String ID:
  • API String ID: 2903015918-0
  • Opcode ID: 3b8c0deba00ad8c18a03b1b41023549990ba36109af67922b5846e8fe0d52574
  • Instruction ID: db5f7be3acebc5ef81cba7773ef61a89ccee30cb1e1ab59eb1e5a565a140e5ce
  • Opcode Fuzzy Hash: 3b8c0deba00ad8c18a03b1b41023549990ba36109af67922b5846e8fe0d52574
  • Instruction Fuzzy Hash: CB916432A14B518AEB20DF69E8405BDB7B0F798B48B884136DF8E53764DF38E195CB10
Uniqueness

Uniqueness Score: -1.00%

APIs
  • CoTaskMemFree.API-MS-WIN-CORE-COM-L1-1-0 ref: 00007FF72B8FEF90
    • Part of subcall function 00007FF72B8FFBB0: CoTaskMemAlloc.API-MS-WIN-CORE-COM-L1-1-0(?,?,?,00007FF72B8F98A0), ref: 00007FF72B8FFC2D
  • CoTaskMemFree.API-MS-WIN-CORE-COM-L1-1-0 ref: 00007FF72B8FF00C
  • CoTaskMemFree.API-MS-WIN-CORE-COM-L1-1-0 ref: 00007FF72B8FF09A
    • Part of subcall function 00007FF72B8FDCD8: GetLastError.KERNEL32 ref: 00007FF72B8FDD02
    • Part of subcall function 00007FF72B8FDCD8: CoTaskMemFree.API-MS-WIN-CORE-COM-L1-1-0 ref: 00007FF72B8FDD13
    • Part of subcall function 00007FF72B8FDCD8: SetLastError.KERNEL32 ref: 00007FF72B8FDD21
  • CoTaskMemFree.API-MS-WIN-CORE-COM-L1-1-0 ref: 00007FF72B8FF0F4
Strings
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: Task$Free$ErrorLast$Alloc
  • String ID: onecore\internal\sdk\inc\wil\opensource/wil/win32_helpers.h
  • API String ID: 3148345226-1752416456
  • Opcode ID: 9e432260b04d99bd4ef2a76f0dbaba5a13c475b106532a38d882f0fce19f5f20
  • Instruction ID: 6c6eb7b2aa864008ccabb8f65974ddaca5b112a4d1a27cce745c244e51d12fd4
  • Opcode Fuzzy Hash: 9e432260b04d99bd4ef2a76f0dbaba5a13c475b106532a38d882f0fce19f5f20
  • Instruction Fuzzy Hash: BB71B422719A4685EA25EF19EC902B9A760FFD8B84FC44031EA8E47774DF3CE551CB90
Uniqueness

Uniqueness Score: -1.00%

APIs
Strings
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: Item$MessageSendText
  • String ID: https://go.microsoft.com/fwlink/p/?linkid=838060
  • API String ID: 3392263854-3259131482
  • Opcode ID: 0bf8e11640e445807c5102bdaabf3ff3f9dfa4b1e3089b2df6762f68868cc8bb
  • Instruction ID: 47690bb09c4f85370edb51efadd7ac24f0a929e0337800253c79a273080b58d5
  • Opcode Fuzzy Hash: 0bf8e11640e445807c5102bdaabf3ff3f9dfa4b1e3089b2df6762f68868cc8bb
  • Instruction Fuzzy Hash: 05319131A08681C7F7205B19E944379EB61FB89B84F958531CA8947BA8CF3CE5459B20
Uniqueness

Uniqueness Score: -1.00%

APIs
Strings
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: Load$ClassCursorIconImageRegister
  • String ID: Notepad
  • API String ID: 2097758932-311999004
  • Opcode ID: 69bea1f71d297bfa9ecbf2b7a90ff58e48320d996e8aa0ee86e2fa0fdc900dd8
  • Instruction ID: 85a8af7e09bca3052afe4a45f5e3642f0de763169f4b324224eefe1e1e4baaf9
  • Opcode Fuzzy Hash: 69bea1f71d297bfa9ecbf2b7a90ff58e48320d996e8aa0ee86e2fa0fdc900dd8
  • Instruction Fuzzy Hash: FE316B32A14F01CAD7109F24E8843ACB7A8FB88B48F858139DA8D53B54DF39E965C760
Uniqueness

Uniqueness Score: -1.00%

APIs
Strings
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: CursorMessage$ErrorFormatLast
  • String ID: 0
  • API String ID: 405598114-4108050209
  • Opcode ID: dab7530f3b00ed76ea994c1efd162e9b9e38a5b54c74b479e0274a35d187bc4e
  • Instruction ID: 086c040dd8600aa7c107a83bdf29c6aa17fa684b74a992973dbced243ec2e56f
  • Opcode Fuzzy Hash: dab7530f3b00ed76ea994c1efd162e9b9e38a5b54c74b479e0274a35d187bc4e
  • Instruction Fuzzy Hash: D6318461E2DA42CBFA607719AC51779F6A0EF89750FC15231D9DD826B0CF3DE4409E20
Uniqueness

Uniqueness Score: -1.00%

APIs
Strings
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: Value$CloseCreateQuery
  • String ID: Software\Microsoft\Notepad
  • API String ID: 409396109-2830939880
  • Opcode ID: 086ec40b2efc3f79f33dd0d00a8c6e7486357a3a0616fa0bd7420f738fdcd2c3
  • Instruction ID: 9293edf2cdd3e7425c7bdd8ed110a5ac4d764ddc3bb96e2f71d4e4734292a616
  • Opcode Fuzzy Hash: 086ec40b2efc3f79f33dd0d00a8c6e7486357a3a0616fa0bd7420f738fdcd2c3
  • Instruction Fuzzy Hash: 8F214372A04B41CFEB509F28D8442ACBBA4FB0979CF854631EB9D43B68DB38C558CB44
Uniqueness

Uniqueness Score: -1.00%

APIs
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: Heap$Process$AllocFreememset
  • String ID:
  • API String ID: 2653029805-0
  • Opcode ID: 54d9e156b72fb4e1f6a07c5526019c3860cb996dbe0574fd1ecc025deee39d74
  • Instruction ID: 3526ab4df53b065c8e17a1e4ef9d08eba3eab2d50c9ea520b532d5438b326aa0
  • Opcode Fuzzy Hash: 54d9e156b72fb4e1f6a07c5526019c3860cb996dbe0574fd1ecc025deee39d74
  • Instruction Fuzzy Hash: 7D81C0A2A09B8185EA51AF59EA04179F760FB68BC4BD98035CE0D07760DF3CF4B6DB50
Uniqueness

Uniqueness Score: -1.00%

APIs
  • LocalFree.KERNEL32 ref: 00007FF72B8FF364
    • Part of subcall function 00007FF72B8FFA28: LocalAlloc.KERNEL32(00000000,?,?,00007FF72B8FF3BB), ref: 00007FF72B8FFAA7
    • Part of subcall function 00007FF72B8FFB28: GetLastError.KERNEL32(?,?,?,?,?,?,?,00007FF72B8FF3BB), ref: 00007FF72B8FFB57
    • Part of subcall function 00007FF72B8FFB28: LocalFree.KERNEL32(?,?,?,?,?,?,?,00007FF72B8FF3BB), ref: 00007FF72B8FFB68
    • Part of subcall function 00007FF72B8FFB28: SetLastError.KERNEL32(?,?,?,?,?,?,?,00007FF72B8FF3BB), ref: 00007FF72B8FFB76
  • LocalFree.KERNEL32 ref: 00007FF72B8FF3D2
  • LocalFree.KERNEL32 ref: 00007FF72B8FF465
  • LocalFree.KERNEL32 ref: 00007FF72B8FF4B3
Strings
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: Local$Free$ErrorLast$Alloc
  • String ID: onecore\internal\sdk\inc\wil\opensource/wil/win32_helpers.h
  • API String ID: 3879364810-1752416456
  • Opcode ID: a3d310d43ec2ac68c443b553cf010351fc326481a47327bed28506c92e2dbc09
  • Instruction ID: f3a979696a4af0a93d6c27e5c1ed6a4bc4b3527773c049505027071f8b0b5fb7
  • Opcode Fuzzy Hash: a3d310d43ec2ac68c443b553cf010351fc326481a47327bed28506c92e2dbc09
  • Instruction Fuzzy Hash: 1F619622B19A4686EA25EF19EC806B9A360FF98B84FC45032DE4D47775CF3CE511CB90
Uniqueness

Uniqueness Score: -1.00%

APIs
Strings
  • onecore\internal\sdk\inc\wil/Staging.h, xrefs: 00007FF72B8F515E
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: Heap$FreeProcess$_o__errno
  • String ID: onecore\internal\sdk\inc\wil/Staging.h
  • API String ID: 1235431766-4099157372
  • Opcode ID: f74f02d23f3553339fa86f5639a1035ed8109d9e227bdeaa0cffafc499ed075e
  • Instruction ID: 157b7f21876a77bb9d9f07dab89950a08055f1fde8a2dcafd173d8e82bb3b529
  • Opcode Fuzzy Hash: f74f02d23f3553339fa86f5639a1035ed8109d9e227bdeaa0cffafc499ed075e
  • Instruction Fuzzy Hash: 2141A672A14B8185DB10EF29A8446ADB7A1FB9AFC4FD49231DE4C13766CF38E491CB40
Uniqueness

Uniqueness Score: -1.00%

APIs
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: Local$Free$AllocCreateMessage
  • String ID:
  • API String ID: 1500861735-0
  • Opcode ID: e3d065af1f205b251beb90ec1e394f9f6dd3175bd0d003a7c690e1c51708c70a
  • Instruction ID: 5419b85f44b8e0924736b7b5443e969964c86bce3fdfd7582e87cbe310e8f173
  • Opcode Fuzzy Hash: e3d065af1f205b251beb90ec1e394f9f6dd3175bd0d003a7c690e1c51708c70a
  • Instruction Fuzzy Hash: AC412D32A18A42CBE710AF19E844579FBA0FBCAB85B959031DA8D53764EF3DE4049F10
Uniqueness

Uniqueness Score: -1.00%

APIs
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: #345FormatFreeLoadMessageStringTaskmemset
  • String ID:
  • API String ID: 2015745548-0
  • Opcode ID: 970465d36e85b2f3f92ff1aec6d742661e5a0a590dd413fc4f9b83780c0ba9fd
  • Instruction ID: 7e04086bfd66135f957b86001a5b02071c9827c6fb192e36daf9a4c88401bbf8
  • Opcode Fuzzy Hash: 970465d36e85b2f3f92ff1aec6d742661e5a0a590dd413fc4f9b83780c0ba9fd
  • Instruction Fuzzy Hash: 83311732618B86CBE7109B59E8403AAB7B4FB89744F945025EA8D47A68DF3CE514CF50
Uniqueness

Uniqueness Score: -1.00%

APIs
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: LocalMessageSend$LockUnlockmemcpy
  • String ID:
  • API String ID: 4230444973-0
  • Opcode ID: a9f68d4b661027cc416732db320e32ef3ac464a497b7521188ed25035e29a5ad
  • Instruction ID: cdb437598405f9c7184a7127220d57749f83d54de011a136f3415e2d1e0d8c7a
  • Opcode Fuzzy Hash: a9f68d4b661027cc416732db320e32ef3ac464a497b7521188ed25035e29a5ad
  • Instruction Fuzzy Hash: D3218632A15B42CBDB049F5AE844569FBA0FBC9B81B959135CB4E03764DF38E845CF10
Uniqueness

Uniqueness Score: -1.00%

APIs
  • _o__errno.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?,00007FF72B8FFC5A,?,?,?,00007FF72B8F98A0), ref: 00007FF72B8FFDAA
  • _o__invalid_parameter_noinfo.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?,00007FF72B8FFC5A,?,?,?,00007FF72B8F98A0), ref: 00007FF72B8FFDBD
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: _o__errno_o__invalid_parameter_noinfo
  • String ID:
  • API String ID: 2671245207-0
  • Opcode ID: ab92233359da45f21528bff55b7c1439a6cc97d236008c3d0212e4f5fe24f5ea
  • Instruction ID: 784df1f58b3b32b006b3c080913e18c5febd2c8829e4e1957ac57400712597e8
  • Opcode Fuzzy Hash: ab92233359da45f21528bff55b7c1439a6cc97d236008c3d0212e4f5fe24f5ea
  • Instruction Fuzzy Hash: CF01D221E1E6838BFA503B19AD4017DD551EFA5B80FC49030DF0E0B7AAEE2CB4119EA0
Uniqueness

Uniqueness Score: -1.00%

APIs
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: Heap$FreeProcess
  • String ID:
  • API String ID: 3859560861-0
  • Opcode ID: 825b97cfe70b32361a97c3da66793807158b8ed075c58617446809871d6b1368
  • Instruction ID: 9a15bbcbde71daffbf057f2a0e29a36eb0462217e40d5c53c9a8c4d243d8aa02
  • Opcode Fuzzy Hash: 825b97cfe70b32361a97c3da66793807158b8ed075c58617446809871d6b1368
  • Instruction Fuzzy Hash: E0117331914B81CAE7019B66AA04378FAA1FB8DFD5F88A130CE4D07724DF38A041D610
Uniqueness

Uniqueness Score: -1.00%

Strings
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: CreateReferenceStringWindows
  • String ID: Windows.Security.EnterpriseData.FileProtectionManager$shell\osshell\accesory\common\edpapphelper\edpapphelper.cpp
  • API String ID: 3143385082-4012696473
  • Opcode ID: cab17d6a8e78257b25cc9d6fbaeb758a0ec9a6ed767f2c1376087ad4617a4a82
  • Instruction ID: 633011bbcfc346005ed841a870ae42f756e97dbb02469fc63c8a6ab73aec997b
  • Opcode Fuzzy Hash: cab17d6a8e78257b25cc9d6fbaeb758a0ec9a6ed767f2c1376087ad4617a4a82
  • Instruction Fuzzy Hash: E6711F26B28A06DEEB00EB69D8501AC7375FB88B88F809032DE8D57B65DE38D505E750
Uniqueness

Uniqueness Score: -1.00%

APIs
Strings
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: AddressHandleModuleProc
  • String ID: RtlQueryFeatureConfiguration$ntdll.dll
  • API String ID: 1646373207-4111156962
  • Opcode ID: 67256af9e75498a8e1d9a2ec9c81f651c6b3d9381b56eca433ff99d5938a751a
  • Instruction ID: 79364337a606d2d1d3d63e5ac994d632d68edb6f91625d0f9eb92966b3ef2b91
  • Opcode Fuzzy Hash: 67256af9e75498a8e1d9a2ec9c81f651c6b3d9381b56eca433ff99d5938a751a
  • Instruction Fuzzy Hash: D441A572A29B468BEB559F19EC00665B7E1FB98750F898035DA4E43760EF3CE501CF50
Uniqueness

Uniqueness Score: -1.00%

APIs
    • Part of subcall function 00007FF72B8FFBB0: CoTaskMemAlloc.API-MS-WIN-CORE-COM-L1-1-0(?,?,?,00007FF72B8F98A0), ref: 00007FF72B8FFC2D
  • CoTaskMemFree.API-MS-WIN-CORE-COM-L1-1-0 ref: 00007FF72B8FED62
  • GetModuleFileNameW.KERNEL32 ref: 00007FF72B8FED8F
  • CoTaskMemFree.API-MS-WIN-CORE-COM-L1-1-0 ref: 00007FF72B8FEE20
Strings
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: Task$Free$AllocFileModuleName
  • String ID: onecore\internal\sdk\inc\wil\opensource/wil/win32_helpers.h
  • API String ID: 3233965490-1752416456
  • Opcode ID: bf790d6f7336c317861cc595d6e4d36f08353a284cd1b5d7a7b95726ff9b5d11
  • Instruction ID: fe4404c1f6b33e23d0284f712eab4335879f966cabcafbf3145f34716e1f2e50
  • Opcode Fuzzy Hash: bf790d6f7336c317861cc595d6e4d36f08353a284cd1b5d7a7b95726ff9b5d11
  • Instruction Fuzzy Hash: FA316327B0864686EA10BB19EC000B9E791FF94B81FC84432DA8D43BB4DE7CF5558FA0
Uniqueness

Uniqueness Score: -1.00%

APIs
Strings
  • shell\osshell\accesory\common\edpapphelper\edpapphelper.cpp, xrefs: 00007FF72B9131BA
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: FreeTask$ClearPropVariant
  • String ID: shell\osshell\accesory\common\edpapphelper\edpapphelper.cpp
  • API String ID: 3162903231-1113416246
  • Opcode ID: d365831a6b6541b85e10bc40318d04f47270dcfe78fe877149162512b53e2f6d
  • Instruction ID: c38903bcc84bda24cdc4e94e6eaab917c28ae0faf4b11372e44f4e24a8c950b9
  • Opcode Fuzzy Hash: d365831a6b6541b85e10bc40318d04f47270dcfe78fe877149162512b53e2f6d
  • Instruction Fuzzy Hash: 90418036B28A46DEEB10AF69DC405A8BB70FB88B98B949031DE4E43734DF39D445E750
Uniqueness

Uniqueness Score: -1.00%

APIs
Strings
  • shell\osshell\accesory\common\edpapphelper\edpapphelper.cpp, xrefs: 00007FF72B913A8E
  • Windows.Security.EnterpriseData.ProtectionPolicyManager, xrefs: 00007FF72B913A31
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: ActivationCreateFactoryReferenceStringWindows
  • String ID: Windows.Security.EnterpriseData.ProtectionPolicyManager$shell\osshell\accesory\common\edpapphelper\edpapphelper.cpp
  • API String ID: 1966789792-1088074545
  • Opcode ID: 1137cb141f0ea2834815c254b0d883aae2359644a638e1ad0f5cfa70807ddb48
  • Instruction ID: b0762e852eacaa41b3a36680cd67fb53d319d8eea34cc1290b0b7a89f27b62eb
  • Opcode Fuzzy Hash: 1137cb141f0ea2834815c254b0d883aae2359644a638e1ad0f5cfa70807ddb48
  • Instruction Fuzzy Hash: 52414F21629B46DAEB10AB19E8543A9F370FBC8B84F859132DA8D47774DF3CD144EB60
Uniqueness

Uniqueness Score: -1.00%

APIs
Strings
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: ByteCharErrorLastMultiTextUnicodeWide
  • String ID: d
  • API String ID: 160532073-2564639436
  • Opcode ID: fb0407ecd6cf5c8fae06e560c5e21e6acedf2caa995329a8947b6afb8f904179
  • Instruction ID: f279a6ad7e947644d400111ad821c1cd271dd4f24461283da1ff733e29442433
  • Opcode Fuzzy Hash: fb0407ecd6cf5c8fae06e560c5e21e6acedf2caa995329a8947b6afb8f904179
  • Instruction Fuzzy Hash: 51316D31A0C642C7E7306B19A840679E690EB95B50FD05136EB4E83AF4DB2CE855CF60
Uniqueness

Uniqueness Score: -1.00%

APIs
Strings
  • shell\osshell\accesory\common\edpapphelper\edpapphelper.cpp, xrefs: 00007FF72B913BBE
  • Windows.Security.EnterpriseData.ProtectionPolicyManager, xrefs: 00007FF72B913B61
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: ActivationCreateFactoryReferenceStringWindows
  • String ID: Windows.Security.EnterpriseData.ProtectionPolicyManager$shell\osshell\accesory\common\edpapphelper\edpapphelper.cpp
  • API String ID: 1966789792-1088074545
  • Opcode ID: 671784dec72e2e2964e997f4192f3a7d2b0ec3dde980a2d7a831df274575ebc1
  • Instruction ID: 79e4f0617b3efaa8719ea9ff377d92f8a4306a6e7ad36228afecf5f63a3708dc
  • Opcode Fuzzy Hash: 671784dec72e2e2964e997f4192f3a7d2b0ec3dde980a2d7a831df274575ebc1
  • Instruction Fuzzy Hash: 8C214C22728A46DAEB10EB29E8543B9A371FBC8B84F919132DA8D47774CF3CD441DB50
Uniqueness

Uniqueness Score: -1.00%

APIs
Strings
  • shell\osshell\accesory\common\edpapphelper\edpapphelper.cpp, xrefs: 00007FF72B913832
  • Windows.Security.EnterpriseData.ProtectionPolicyManager, xrefs: 00007FF72B9137D5
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: ActivationCreateFactoryReferenceStringWindows
  • String ID: Windows.Security.EnterpriseData.ProtectionPolicyManager$shell\osshell\accesory\common\edpapphelper\edpapphelper.cpp
  • API String ID: 1966789792-1088074545
  • Opcode ID: 5811a7de13778b3230d11143fbf0f319fb50724021e282346e36344630e43ecd
  • Instruction ID: d597cd7abbdcdac35e158d0e94d07529817b275b44e8bd17d69cda8e2cfc67a1
  • Opcode Fuzzy Hash: 5811a7de13778b3230d11143fbf0f319fb50724021e282346e36344630e43ecd
  • Instruction Fuzzy Hash: C9215E22B28A46DAEB10EB19E8543B9A371FBC8B84F959132DA8D47774CF3CD441DB50
Uniqueness

Uniqueness Score: -1.00%

APIs
Strings
  • shell\osshell\accesory\common\edpapphelper\edpapphelper.cpp, xrefs: 00007FF72B912E85
  • Windows.Security.EnterpriseData.ProtectionPolicyManager, xrefs: 00007FF72B912E42
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: ActivationCreateFactoryReferenceStringWindows
  • String ID: Windows.Security.EnterpriseData.ProtectionPolicyManager$shell\osshell\accesory\common\edpapphelper\edpapphelper.cpp
  • API String ID: 1966789792-1088074545
  • Opcode ID: 14604f2c01c8dfabc667f165bb9e4d7b4ee73db3a4be538feab967074ea88441
  • Instruction ID: 905f0b89f9d6eee46a613cac169f689e5bde26fa6f9c67d68f8aee8e6d1f448e
  • Opcode Fuzzy Hash: 14604f2c01c8dfabc667f165bb9e4d7b4ee73db3a4be538feab967074ea88441
  • Instruction Fuzzy Hash: BE215021B28A06CAEB10EB19D8543B9B760FBC8B84F905132DA8D47774DF3DD545DB50
Uniqueness

Uniqueness Score: -1.00%

APIs
    • Part of subcall function 00007FF72B8FFBB0: CoTaskMemAlloc.API-MS-WIN-CORE-COM-L1-1-0(?,?,?,00007FF72B8F98A0), ref: 00007FF72B8FFC2D
  • RegisterApplicationRestart.KERNEL32 ref: 00007FF72B9116AC
  • CoTaskMemFree.API-MS-WIN-CORE-COM-L1-1-0(?,?,00000001,00007FF72B90369B), ref: 00007FF72B9116E3
Strings
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: Task$AllocApplicationFreeRegisterRestart
  • String ID: RestartByRestartManager:$shell\osshell\accesory\notepad\nprestart.cpp
  • API String ID: 1630650924-2284408686
  • Opcode ID: 4262926be94cd1da5739eecef95dac49ef682a641eda92a09b35fdafa48008e5
  • Instruction ID: 0bfe20f504e361f0c308ece9d7e07a2d62f8b00cc7a15075ef9f17d547546044
  • Opcode Fuzzy Hash: 4262926be94cd1da5739eecef95dac49ef682a641eda92a09b35fdafa48008e5
  • Instruction Fuzzy Hash: E001D622B28643D6EB00AB1AEC105BAE651EFD4BC0F886031D98E43774DE3DE5859F50
Uniqueness

Uniqueness Score: -1.00%

APIs
Strings
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: AddressHandleModuleProc
  • String ID: RtlDisownModuleHeapAllocation$ntdll.dll
  • API String ID: 1646373207-704576883
  • Opcode ID: b0a861913c3694a91a1e5fa372cf1588ba86ab1b2f66e1381138d881dbe9c37b
  • Instruction ID: ba01685a40db741e9d0fe7dc432b6946f2b7911a9a2ec9508424159038772088
  • Opcode Fuzzy Hash: b0a861913c3694a91a1e5fa372cf1588ba86ab1b2f66e1381138d881dbe9c37b
  • Instruction Fuzzy Hash: 84011A20A19B42CAEE05AB0AFC84165F6A0FF88B84BC49175D98D43734EF3CF4559B10
Uniqueness

Uniqueness Score: -1.00%

APIs
Strings
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: AddressHandleModuleProc
  • String ID: RtlNtStatusToDosErrorNoTeb$ntdll.dll
  • API String ID: 1646373207-1321910969
  • Opcode ID: 2ce9a5ca2821297fb50248740b7907f3621fd2095108a5eb919d9a478203ba96
  • Instruction ID: 1cfd0fafd86f8e62f5864c1f5e0cdd600ed92eb1d8fb69355a344e1276a0ab4b
  • Opcode Fuzzy Hash: 2ce9a5ca2821297fb50248740b7907f3621fd2095108a5eb919d9a478203ba96
  • Instruction Fuzzy Hash: 03F0F620A19B42CAEE05AB0DEC84174B2A1FF88744BC59075CA8D42330EF3CF4559A20
Uniqueness

Uniqueness Score: -1.00%

APIs
Strings
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: AddressHandleModuleProc
  • String ID: RtlDllShutdownInProgress$ntdll.dll
  • API String ID: 1646373207-582119455
  • Opcode ID: 2c0934975e5bc364a1a0a00984a27c75152587989ec7d54960f497c7e2becca9
  • Instruction ID: c839e15843f7240ecbefb95a272186401bd482c3ffcdd4b7b9abfeb22305ff77
  • Opcode Fuzzy Hash: 2c0934975e5bc364a1a0a00984a27c75152587989ec7d54960f497c7e2becca9
  • Instruction Fuzzy Hash: 5BF09720E1AB02CEEA157F59EC451B0B7A0FFA9701BC5A175C98D07370EF3CB5559A60
Uniqueness

Uniqueness Score: -1.00%

APIs
Strings
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: AddressHandleModuleProc
  • String ID: RtlUnregisterFeatureConfigurationChangeNotification$ntdll.dll
  • API String ID: 1646373207-1836318313
  • Opcode ID: 28de1c808d372a9417fe283310ac5c7641b7f79e2204b257c291048f3d752c66
  • Instruction ID: 9ee2f067f84e1d65de3105ea2ed3b8eabf86a03d7915122669028491c9255728
  • Opcode Fuzzy Hash: 28de1c808d372a9417fe283310ac5c7641b7f79e2204b257c291048f3d752c66
  • Instruction Fuzzy Hash: ADF0A920E1AB06CAFE05BB09AC44170B7A0FF99B55BC99175C98D06370EF3CB1559A60
Uniqueness

Uniqueness Score: -1.00%

APIs
Strings
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: AddressHandleModuleProc
  • String ID: RtlUnsubscribeWnfNotificationWaitForCompletion$ntdll.dll
  • API String ID: 1646373207-368597124
  • Opcode ID: 83d9c252ac964497717aea220aae900edc2b434939c906b212475c540b3d269e
  • Instruction ID: c95b14042b3bdb99e0f3b8d50329a2199b7d22069aebc26e42be06c7fb30509d
  • Opcode Fuzzy Hash: 83d9c252ac964497717aea220aae900edc2b434939c906b212475c540b3d269e
  • Instruction Fuzzy Hash: F8F0BD24E1AB06CAEE15AB4EEC44170A7A0FF99745BC96175C98D06370EF3CB055DA20
Uniqueness

Uniqueness Score: -1.00%

APIs
Strings
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: AddressHandleModuleProc
  • String ID: RaiseFailFastException$kernelbase.dll
  • API String ID: 1646373207-919018592
  • Opcode ID: 48d0bc579d63c4e7cfea927019cd231a443076e71b80217c0f3d45544442a5bc
  • Instruction ID: 68f20b2d6bedfbac466aca851fceee2d2f134117193cd61993ee15862e7fdaae
  • Opcode Fuzzy Hash: 48d0bc579d63c4e7cfea927019cd231a443076e71b80217c0f3d45544442a5bc
  • Instruction Fuzzy Hash: F8F0BD21A29691CAE6045F06F844065E661FB89BC0BC4A135DA8E07B68DF2CD455DB50
Uniqueness

Uniqueness Score: -1.00%

APIs
  • GetProcessHeap.KERNEL32 ref: 00007FF72B8F492B
  • HeapAlloc.KERNEL32 ref: 00007FF72B8F493F
  • GetProcessHeap.KERNEL32 ref: 00007FF72B8F495A
  • GetProcessHeap.KERNEL32 ref: 00007FF72B8F49A5
  • HeapFree.KERNEL32 ref: 00007FF72B8F49B9
    • Part of subcall function 00007FF72B8F1FF4: _o__errno.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00007FF72B8F2011
    • Part of subcall function 00007FF72B8F1FF4: _o__invalid_parameter_noinfo.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00007FF72B8F2024
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: Heap$Process$AllocFree_o__errno_o__invalid_parameter_noinfo
  • String ID:
  • API String ID: 2883572028-0
  • Opcode ID: f4b1a9164b5d7c4b4bd4965cbf620c628e5f42759474ec9670633fa2f50553b1
  • Instruction ID: 9c91827d9f2db77f7d956e74e282739b8430b842f79933f155e4c6b8ce60dc2a
  • Opcode Fuzzy Hash: f4b1a9164b5d7c4b4bd4965cbf620c628e5f42759474ec9670633fa2f50553b1
  • Instruction Fuzzy Hash: FE217C36A14F41CADB04AF6AE940068B7A4FB99FD4B889236CE5D07765CF38E062C750
Uniqueness

Uniqueness Score: -1.00%

APIs
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: ExclusiveLock$AcquireRelease
  • String ID:
  • API String ID: 17069307-0
  • Opcode ID: 7fca9310fbc80823f69c121ddedefa8c621d39d737d8e4e55953743f632b2d19
  • Instruction ID: bc85384077d42acdaacc577af1a5d3956fafa83231f9c34f7d165e8b1e461ea7
  • Opcode Fuzzy Hash: 7fca9310fbc80823f69c121ddedefa8c621d39d737d8e4e55953743f632b2d19
  • Instruction Fuzzy Hash: C6316F21E0864286FA20BF19A980279F790FB75B80FD85131DA4D037A1CF2DF4A5CBA0
Uniqueness

Uniqueness Score: -1.00%

APIs
  • CreateThreadpoolTimer.KERNEL32 ref: 00007FF72B8F6987
  • GetLastError.KERNEL32(?,?,?,00007FF72B8F64CE), ref: 00007FF72B8F699F
    • Part of subcall function 00007FF72B8F84B8: SetThreadpoolTimer.KERNEL32(?,?,?,00007FF72B8F82E8), ref: 00007FF72B8F84C9
    • Part of subcall function 00007FF72B8F84B8: WaitForThreadpoolTimerCallbacks.KERNEL32(?,?,?,00007FF72B8F82E8), ref: 00007FF72B8F84DD
  • SetLastError.KERNEL32(?,?,?,00007FF72B8F64CE), ref: 00007FF72B8F69B7
  • SetThreadpoolTimer.KERNEL32(?,?,?,00007FF72B8F64CE), ref: 00007FF72B8F69EC
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: ThreadpoolTimer$ErrorLast$CallbacksCreateWait
  • String ID:
  • API String ID: 1675045912-0
  • Opcode ID: 76998cd62448d3d39e1a8054bed810b7c8b4d3ba8f7fa196e95bc56536fb0a0b
  • Instruction ID: 19cac55b53d917712a1c29dff4750fe2cbf07243da17bb5fd61982c4b544571d
  • Opcode Fuzzy Hash: 76998cd62448d3d39e1a8054bed810b7c8b4d3ba8f7fa196e95bc56536fb0a0b
  • Instruction Fuzzy Hash: 85118422B18B91CBE710AB29A84017DBA60FB55F80FC49230DE8D07B64CF3DE465CB10
Uniqueness

Uniqueness Score: -1.00%

APIs
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: CriticalExclusiveLockSection$AcquireEnterLeaveRelease
  • String ID:
  • API String ID: 1115728412-0
  • Opcode ID: 3a39090eb9dc4828f58b7e8b9f1fcab9880cd8098a5390b615f6697595bc5d86
  • Instruction ID: 1d018d806f4ac641f60098bc6b0029e640250cdf2f62a0518c935bd25ffb7e5d
  • Opcode Fuzzy Hash: 3a39090eb9dc4828f58b7e8b9f1fcab9880cd8098a5390b615f6697595bc5d86
  • Instruction Fuzzy Hash: 6C014462A14B82C6DA145B25A950079E761FF99FC1798A231DE4E13724DF3CE491CB10
Uniqueness

Uniqueness Score: -1.00%

APIs
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: Message$DialogDispatchPeekTranslate
  • String ID:
  • API String ID: 1266772231-0
  • Opcode ID: db6c2f0df82b361cd8660d9da5f869d297314cff3419e05836c5597ff0ce09ca
  • Instruction ID: 1fde63d6052da1ad8bf458aaac31ba9f141f98328e5ef7e47b8accafaf43e6ae
  • Opcode Fuzzy Hash: db6c2f0df82b361cd8660d9da5f869d297314cff3419e05836c5597ff0ce09ca
  • Instruction Fuzzy Hash: AF01E121E29946CBE750AF18EC44675FA54FFA5B41FC5A431DA8E42A70DF3CE404DE20
Uniqueness

Uniqueness Score: -1.00%

APIs
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: ProcessToken$CloseCurrentHandleInformationOpen
  • String ID:
  • API String ID: 215268677-0
  • Opcode ID: ef7cb3755e8f09ef77ce0c0b5c25dd5c7094862bf0735327f92b98f78e6b5b9e
  • Instruction ID: 5e62df6c76e7b3940bdc636a5efce49d1fa7fb3f110e2ac75c4001d75f1ce4fb
  • Opcode Fuzzy Hash: ef7cb3755e8f09ef77ce0c0b5c25dd5c7094862bf0735327f92b98f78e6b5b9e
  • Instruction Fuzzy Hash: F5011A36604B81CBD7009F24E8404AAFBB0FBCAB15B848125DA8D43724CF78D909CF50
Uniqueness

Uniqueness Score: -1.00%

APIs
Strings
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: CreateFileInstancePathSpec
  • String ID: prop:System.Security.EncryptionOwners
  • API String ID: 4203885736-2773134222
  • Opcode ID: e93088415847ae4d12fcdd9f003c87568bd16ff919f67b302c5caa7cf1401105
  • Instruction ID: 35a5dd5384450f5f1ae902d4e49884623973b848cdc53fc6711a40c214e9ce9a
  • Opcode Fuzzy Hash: e93088415847ae4d12fcdd9f003c87568bd16ff919f67b302c5caa7cf1401105
  • Instruction Fuzzy Hash: F191EB26B14B16CAEB009B6ADC843A86770FB88B88F859132CF0D57774DF39E445D760
Uniqueness

Uniqueness Score: -1.00%

APIs
Strings
  • Windows.Security.EnterpriseData.ProtectionPolicyManager, xrefs: 00007FF72B913C6A
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: ActivationCreateFactoryReferenceStringWindows
  • String ID: Windows.Security.EnterpriseData.ProtectionPolicyManager
  • API String ID: 1966789792-1562784004
  • Opcode ID: 0d5f8cc29e8d6292dccfdd15bd7684412565464f6e207c68aae51fe2997a51e1
  • Instruction ID: 775bd6faaedddd53a31ff1129809cf383492b3785b4b1c3dec5a945b0f5bc133
  • Opcode Fuzzy Hash: 0d5f8cc29e8d6292dccfdd15bd7684412565464f6e207c68aae51fe2997a51e1
  • Instruction Fuzzy Hash: 49313E26B28A46DAFF04AB69DC503BC6370FB84B48F959035CA4E57664CF28D445EB60
Uniqueness

Uniqueness Score: -1.00%

APIs
Strings
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: CreateFreeGuidTask
  • String ID: %08lX-%04X-%04x-%02X%02X-%02X%02X%02X%02X%02X%02X
  • API String ID: 2319009263-4283501729
  • Opcode ID: 123a6ca25202cd6f815e0fb313ff7fec648beafd19847216478cf2f53566d232
  • Instruction ID: 6f384b46479f8811c7bb311f39906bf06f3a1b3c61a988a94868f52ce31a9ea1
  • Opcode Fuzzy Hash: 123a6ca25202cd6f815e0fb313ff7fec648beafd19847216478cf2f53566d232
  • Instruction Fuzzy Hash: 4D3181336196A0CED7509F25E8502A9BBB4F788788F892126FF8E43B54CB38D491DF50
Uniqueness

Uniqueness Score: -1.00%

APIs
  • CoTaskMemFree.API-MS-WIN-CORE-COM-L1-1-0(?,?,?,00000000,00000000,00007FF72B90E657), ref: 00007FF72B910C5E
  • CoTaskMemFree.API-MS-WIN-CORE-COM-L1-1-0(?,?,?,00000000,00000000,00007FF72B90E657), ref: 00007FF72B910C74
Strings
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: FreeTask
  • String ID: \Notepad
  • API String ID: 734271698-3898563714
  • Opcode ID: 883eb3ab38e63a6bb79dc25466f8a2f26dbff9db214831c9d9d2436746067c69
  • Instruction ID: a63f5510ad9ab0b79ffedf5a173e859e45fb10264954bae82953159524d4e65e
  • Opcode Fuzzy Hash: 883eb3ab38e63a6bb79dc25466f8a2f26dbff9db214831c9d9d2436746067c69
  • Instruction Fuzzy Hash: 1221B436A18B41C5EB10AF19E8401AAB760FB88B90FD49232DE9D033A4DF3DD551DB50
Uniqueness

Uniqueness Score: -1.00%

APIs
Strings
  • Windows.Security.EnterpriseData.ProtectionPolicyManager, xrefs: 00007FF72B9138DE
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: ActivationCreateFactoryReferenceStringWindows
  • String ID: Windows.Security.EnterpriseData.ProtectionPolicyManager
  • API String ID: 1966789792-1562784004
  • Opcode ID: 41891429762d818e05d2b5ee9234f46b13a8a441304a71c9d5d1e525415997a2
  • Instruction ID: 51320725688bc0b13d0c328dbc4d6a78331656111a8d13b94800ea0c486e59ee
  • Opcode Fuzzy Hash: 41891429762d818e05d2b5ee9234f46b13a8a441304a71c9d5d1e525415997a2
  • Instruction Fuzzy Hash: BA212B22B24A15DAFB00EB69D8943AC6770FB84B48F949036DE8E57765CF38D045DB50
Uniqueness

Uniqueness Score: -1.00%

APIs
Strings
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: FreeIconLoadTask
  • String ID: feedback-hub://?tabid=2&contextid=1010
  • API String ID: 2336424503-1864734595
  • Opcode ID: bf46ae015f07175977de0ce2cd5772f38dbe3b4667242a6681b6c04662e092dc
  • Instruction ID: 4ec639428b4d8325e40d917e3ff44fc83b3561e6853edec83469b3cbee2569ad
  • Opcode Fuzzy Hash: bf46ae015f07175977de0ce2cd5772f38dbe3b4667242a6681b6c04662e092dc
  • Instruction Fuzzy Hash: 39218726E09B42CAEB10AB58EC80279E770FB987A4FC55031CD5D1B374DE3CA0559AA0
Uniqueness

Uniqueness Score: -1.00%

APIs
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: Heap$FreeProcess
  • String ID:
  • API String ID: 3859560861-0
  • Opcode ID: 9c0b6e99a9b077f01694d313a6535a450aa51282ae8a7cd9f110b7a8e042c24b
  • Instruction ID: ea8de46410d7c807405bbe21a8b084043e1211d5af75b5c6066528a4325102f3
  • Opcode Fuzzy Hash: 9c0b6e99a9b077f01694d313a6535a450aa51282ae8a7cd9f110b7a8e042c24b
  • Instruction Fuzzy Hash: 2BB16F32A18B818AE7209F69D8401EDB7F0FB59748F904125EE8D17B69DF38E5A1CB50
Uniqueness

Uniqueness Score: -1.00%

APIs
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: Heap$FreeProcess
  • String ID:
  • API String ID: 3859560861-0
  • Opcode ID: f3d95f25c3677f17425cd205c3ec44b4733bcd8f04721d207ec3a4da860c3f8c
  • Instruction ID: 781ee4dd2f90881a05993fff7608190fb7301785ba7bad7fc9fdb89028358781
  • Opcode Fuzzy Hash: f3d95f25c3677f17425cd205c3ec44b4733bcd8f04721d207ec3a4da860c3f8c
  • Instruction Fuzzy Hash: 9F315C27915F90CAD3428F29A440269BB70F79AF94F18A214CF8C27726DB34E4E2C740
Uniqueness

Uniqueness Score: -1.00%

APIs
Memory Dump Source
  • Source File: 00000000.00000002.208559045.00007FF72B8F1000.00000020.00020000.sdmp, Offset: 00007FF72B8F0000, based on PE: true
  • Associated: 00000000.00000002.208553190.00007FF72B8F0000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208581067.00007FF72B918000.00000002.00020000.sdmp Download File
  • Associated: 00000000.00000002.208589009.00007FF72B922000.00000004.00020000.sdmp Download File
  • Associated: 00000000.00000002.208594381.00007FF72B925000.00000002.00020000.sdmp Download File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff72b8f0000_notepad.jbxd
Similarity
  • API ID: Heap$FreeProcess
  • String ID:
  • API String ID: 3859560861-0
  • Opcode ID: c6d411492dc7aa51039210e78294f51831ed61ed292aa6c80673049763bd63c2
  • Instruction ID: 4fdb8ad8de6a6026f5e7f511865052a3c37751d5df42ffb599c17e41f38ca2c6
  • Opcode Fuzzy Hash: c6d411492dc7aa51039210e78294f51831ed61ed292aa6c80673049763bd63c2
  • Instruction Fuzzy Hash: 27111C76604B81DADB149F56E8400A9BBB0F78DF80B999135DF8D13B24CF38E5A2D700
Uniqueness

Uniqueness Score: -1.00%