Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
db_Usr.dll

Overview

General Information

Sample name:db_Usr.dll
(renamed file extension from sql to dll)
Original sample name:db_Usr.sql
Analysis ID:1431865
MD5:286394d06972734946774c85742a094f
SHA1:616415b3ec0c08511d232e56b51faf7a03c45183
SHA256:8501e14ee6ee142122746333b936c9ab0fc541328f37b5612b6804e6cdc2c2c6
Infos:

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

System process connects to network (likely due to code injection or exploit)
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file contains an invalid checksum
PE file contains sections with non-standard names
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info

Classification

  • System is w10x64
  • loaddll64.exe (PID: 7104 cmdline: loaddll64.exe "C:\Users\user\Desktop\db_Usr.dll" MD5: 763455F9DCB24DFEECC2B9D9F8D46D52)
    • conhost.exe (PID: 3160 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 3180 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\db_Usr.dll",#1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • rundll32.exe (PID: 2956 cmdline: rundll32.exe "C:\Users\user\Desktop\db_Usr.dll",#1 MD5: EF3179D498793BF4234F708D3BE28633)
        • WerFault.exe (PID: 3172 cmdline: C:\Windows\system32\WerFault.exe -u -p 2956 -s 332 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
    • rundll32.exe (PID: 4068 cmdline: rundll32.exe C:\Users\user\Desktop\db_Usr.dll,GetAnalyzerInterfaceByType MD5: EF3179D498793BF4234F708D3BE28633)
      • WerFault.exe (PID: 6148 cmdline: C:\Windows\system32\WerFault.exe -u -p 4068 -s 316 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
    • rundll32.exe (PID: 180 cmdline: rundll32.exe C:\Users\user\Desktop\db_Usr.dll,GetAnalyzerTypes MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 6180 cmdline: rundll32.exe C:\Users\user\Desktop\db_Usr.dll,GetConfiguratorInterfaceByType MD5: EF3179D498793BF4234F708D3BE28633)
      • WerFault.exe (PID: 4372 cmdline: C:\Windows\system32\WerFault.exe -u -p 6180 -s 328 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
    • rundll32.exe (PID: 3496 cmdline: rundll32.exe "C:\Users\user\Desktop\db_Usr.dll",GetAnalyzerInterfaceByType MD5: EF3179D498793BF4234F708D3BE28633)
      • WerFault.exe (PID: 6484 cmdline: C:\Windows\system32\WerFault.exe -u -p 3496 -s 328 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
    • rundll32.exe (PID: 4276 cmdline: rundll32.exe "C:\Users\user\Desktop\db_Usr.dll",GetAnalyzerTypes MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 3608 cmdline: rundll32.exe "C:\Users\user\Desktop\db_Usr.dll",GetConfiguratorInterfaceByType MD5: EF3179D498793BF4234F708D3BE28633)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results
Source: Binary string: C:\Jenkins\workspace\lds_ml_library_documents_develop@2\x64\Release\docmodel.pdb source: rundll32.exe, 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.2335148502.000000018003B000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000C.00000002.3246388452.000000018003B000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000D.00000002.2377807873.000000018003B000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000010.00000002.2395246141.000000018003B000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000011.00000002.3246387323.000000018003B000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000012.00000002.2093958922.000000018003B000.00000002.00000001.01000000.00000003.sdmp, db_Usr.dll
Source: Binary string: C:\Jenkins\workspace\lds_ml_library_documents_develop@2\x64\Release\docmodel.pdb+ source: rundll32.exe, 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.2335148502.000000018003B000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000C.00000002.3246388452.000000018003B000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000D.00000002.2377807873.000000018003B000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000010.00000002.2395246141.000000018003B000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000011.00000002.3246387323.000000018003B000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000012.00000002.2093958922.000000018003B000.00000002.00000001.01000000.00000003.sdmp, db_Usr.dll
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180031E94 FindFirstFileExW,3_2_0000000180031E94

Networking

barindex
Source: C:\Windows\System32\rundll32.exeNetwork Connect: 185.219.221.136 443Jump to behavior
Source: Joe Sandbox ViewASN Name: SERVINGADE SERVINGADE
Source: unknownTCP traffic detected without corresponding DNS query: 185.219.221.136
Source: unknownTCP traffic detected without corresponding DNS query: 185.219.221.136
Source: unknownTCP traffic detected without corresponding DNS query: 185.219.221.136
Source: unknownTCP traffic detected without corresponding DNS query: 185.219.221.136
Source: unknownTCP traffic detected without corresponding DNS query: 185.219.221.136
Source: unknownTCP traffic detected without corresponding DNS query: 185.219.221.136
Source: unknownTCP traffic detected without corresponding DNS query: 185.219.221.136
Source: unknownTCP traffic detected without corresponding DNS query: 185.219.221.136
Source: C:\Windows\System32\rundll32.exeCode function: 12_2_00000195B44600CE LoadLibraryA,WSAStartup,socket,connect,send,send,recv,recv,12_2_00000195B44600CE
Source: Amcache.hve.8.drString found in binary or memory: http://upx.sf.net
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800013E03_2_00000001800013E0
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800156383_2_0000000180015638
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800337183_2_0000000180033718
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800067403_2_0000000180006740
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018002E7543_2_000000018002E754
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180034C483_2_0000000180034C48
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180031C883_2_0000000180031C88
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180006D103_2_0000000180006D10
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180031E943_2_0000000180031E94
Source: C:\Windows\System32\rundll32.exeCode function: 12_2_00000195B44600CE12_2_00000195B44600CE
Source: C:\Windows\System32\rundll32.exeCode function: 12_2_00000195B44609A112_2_00000195B44609A1
Source: C:\Windows\System32\rundll32.exeCode function: 17_2_0000020C5A8700CE17_2_0000020C5A8700CE
Source: C:\Windows\System32\rundll32.exeCode function: 17_2_0000020C5A8709A117_2_0000020C5A8709A1
Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 2956 -s 332
Source: db_Usr.dllBinary or memory string: OriginalFilenamemodel_dl.dllB vs db_Usr.dll
Source: classification engineClassification label: mal48.evad.winDLL@22/17@0/1
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6180
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess2956
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3160:120:WilError_03
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess4068
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess3496
Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\c0dfe8f3-8d0d-4b14-bbb9-028e2c8613c1Jump to behavior
Source: db_Usr.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\loaddll64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\db_Usr.dll,GetAnalyzerInterfaceByType
Source: unknownProcess created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\db_Usr.dll"
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\db_Usr.dll",#1
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\db_Usr.dll,GetAnalyzerInterfaceByType
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\db_Usr.dll",#1
Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 2956 -s 332
Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 4068 -s 316
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\db_Usr.dll,GetAnalyzerTypes
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\db_Usr.dll,GetConfiguratorInterfaceByType
Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 6180 -s 328
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\db_Usr.dll",GetAnalyzerInterfaceByType
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\db_Usr.dll",GetAnalyzerTypes
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\db_Usr.dll",GetConfiguratorInterfaceByType
Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 3496 -s 328
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\db_Usr.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\db_Usr.dll,GetAnalyzerInterfaceByTypeJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\db_Usr.dll,GetAnalyzerTypesJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\db_Usr.dll,GetConfiguratorInterfaceByTypeJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\db_Usr.dll",GetAnalyzerInterfaceByTypeJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\db_Usr.dll",GetAnalyzerTypesJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\db_Usr.dll",GetConfiguratorInterfaceByTypeJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\db_Usr.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: kernel.appcore.dllJump to behavior
Source: db_Usr.dllStatic PE information: Image base 0x180000000 > 0x60000000
Source: db_Usr.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: db_Usr.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: db_Usr.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: db_Usr.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: db_Usr.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: db_Usr.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: db_Usr.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\Jenkins\workspace\lds_ml_library_documents_develop@2\x64\Release\docmodel.pdb source: rundll32.exe, 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.2335148502.000000018003B000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000C.00000002.3246388452.000000018003B000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000D.00000002.2377807873.000000018003B000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000010.00000002.2395246141.000000018003B000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000011.00000002.3246387323.000000018003B000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000012.00000002.2093958922.000000018003B000.00000002.00000001.01000000.00000003.sdmp, db_Usr.dll
Source: Binary string: C:\Jenkins\workspace\lds_ml_library_documents_develop@2\x64\Release\docmodel.pdb+ source: rundll32.exe, 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.2335148502.000000018003B000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000C.00000002.3246388452.000000018003B000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000D.00000002.2377807873.000000018003B000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000010.00000002.2395246141.000000018003B000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000011.00000002.3246387323.000000018003B000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000012.00000002.2093958922.000000018003B000.00000002.00000001.01000000.00000003.sdmp, db_Usr.dll
Source: db_Usr.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: db_Usr.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: db_Usr.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: db_Usr.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: db_Usr.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180002CA0 _invalid_parameter_noinfo_noreturn,LoadLibraryA,GetProcAddress,GetModuleHandleExA,GetModuleFileNameA,__std_fs_code_page,__std_fs_code_page,LoadLibraryA,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,3_2_0000000180002CA0
Source: db_Usr.dllStatic PE information: real checksum: 0x65b96 should be: 0x61179
Source: db_Usr.dllStatic PE information: section name: .didat
Source: db_Usr.dllStatic PE information: section name: _RDATA
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001E168 GetModuleHandleW,GetProcAddress,GetModuleHandleW,GetProcAddress,GetModuleHandleW,GetProcAddress,GetModuleHandleW,GetProcAddress,GetModuleHandleW,GetProcAddress,GetModuleHandleW,GetProcAddress,GetModuleHandleW,GetProcAddress,GetModuleHandleW,GetProcAddress,GetModuleHandleW,GetProcAddress,GetModuleHandleW,GetProcAddress,GetModuleHandleW,GetProcAddress,GetModuleHandleW,GetProcAddress,GetModuleHandleW,GetProcAddress,GetModuleHandleW,GetProcAddress,GetModuleHandleW,GetProcAddress,GetModuleHandleW,GetProcAddress,GetModuleHandleW,GetProcAddress,GetLastError,GetLastError,GetLastError,GetLastError,GetLastError,GetLastError,GetLastError,GetLastError,GetLastError,GetLastError,GetLastError,GetLastError,GetLastError,GetLastError,GetLastError,GetLastError,GetLastError,3_2_000000018001E168
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\loaddll64.exe TID: 4028Thread sleep time: -120000s >= -30000sJump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180031E94 FindFirstFileExW,3_2_0000000180031E94
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180009D20 VirtualQuery,GetSystemInfo,3_2_0000000180009D20
Source: C:\Windows\System32\loaddll64.exeThread delayed: delay time: 120000Jump to behavior
Source: Amcache.hve.8.drBinary or memory string: VMware
Source: Amcache.hve.8.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.8.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.8.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.8.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.8.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.8.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.8.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.8.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: rundll32.exe, 00000011.00000002.3246897580.0000020C5A6F8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll+
Source: Amcache.hve.8.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.8.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.8.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: rundll32.exe, 0000000C.00000002.3246955339.00000195B432F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: Amcache.hve.8.drBinary or memory string: vmci.sys
Source: Amcache.hve.8.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
Source: Amcache.hve.8.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.8.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.8.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.8.drBinary or memory string: VMware20,1
Source: Amcache.hve.8.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.8.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.8.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.8.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.8.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.8.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.8.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.8.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.8.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.8.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.8.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018002D210 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_000000018002D210
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180002CA0 _invalid_parameter_noinfo_noreturn,LoadLibraryA,GetProcAddress,GetModuleHandleExA,GetModuleFileNameA,__std_fs_code_page,__std_fs_code_page,LoadLibraryA,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,3_2_0000000180002CA0
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180033330 GetProcessHeap,3_2_0000000180033330
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018000C074 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_000000018000C074
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018002D210 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_000000018002D210
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018000C4F8 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_000000018000C4F8

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Windows\System32\rundll32.exeNetwork Connect: 185.219.221.136 443Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\db_Usr.dll",#1Jump to behavior
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180034340 cpuid 3_2_0000000180034340
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018000B090 GetSystemTimeAsFileTime,3_2_000000018000B090
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800124D8 GetVersionExW,3_2_00000001800124D8
Source: Amcache.hve.8.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.8.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.8.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.8.drBinary or memory string: MsMpEng.exe
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180021A04 Concurrency::details::WorkItem::ResolveToken,Concurrency::details::WorkItem::BindTo,Concurrency::details::SchedulerBase::ReleaseInternalContext,Concurrency::details::WorkItem::Bind,3_2_0000000180021A04
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180022A60 Concurrency::details::WorkItem::ResolveToken,Concurrency::details::WorkItem::BindTo,Concurrency::details::SchedulerBase::ReleaseInternalContext,Concurrency::details::SchedulerBase::ReleaseInternalContext,Concurrency::details::WorkItem::Bind,3_2_0000000180022A60
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Native API
1
DLL Side-Loading
111
Process Injection
21
Virtualization/Sandbox Evasion
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
12
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
111
Process Injection
LSASS Memory41
Security Software Discovery
Remote Desktop ProtocolData from Removable Media1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Rundll32
Security Account Manager21
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive1
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDS1
File and Directory Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets14
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 1431865 Sample: db_Usr.sql Startdate: 25/04/2024 Architecture: WINDOWS Score: 48 7 loaddll64.exe 1 2->7         started        process3 9 rundll32.exe 7->9         started        12 rundll32.exe 7->12         started        15 cmd.exe 1 7->15         started        17 5 other processes 7->17 dnsIp4 31 System process connects to network (likely due to code injection or exploit) 9->31 29 185.219.221.136, 443, 49711, 49712 SERVINGADE Sweden 12->29 19 rundll32.exe 15->19         started        21 WerFault.exe 16 17->21         started        23 WerFault.exe 16 17->23         started        25 WerFault.exe 16 17->25         started        signatures5 process6 process7 27 WerFault.exe 20 16 19->27         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
db_Usr.dll12%ReversingLabsWin64.Malware.Generic
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://upx.sf.netAmcache.hve.8.drfalse
    high
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    185.219.221.136
    unknownSweden
    39378SERVINGADEtrue
    Joe Sandbox version:40.0.0 Tourmaline
    Analysis ID:1431865
    Start date and time:2024-04-25 22:03:15 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 6m 2s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:25
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:db_Usr.dll
    (renamed file extension from sql to dll)
    Original Sample Name:db_Usr.sql
    Detection:MAL
    Classification:mal48.evad.winDLL@22/17@0/1
    EGA Information:
    • Successful, ratio: 66.7%
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 2
    • Number of non-executed functions: 98
    • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
    • Excluded IPs from analysis (whitelisted): 52.168.117.173, 20.42.73.29
    • Excluded domains from analysis (whitelisted): onedsblobprdeus16.eastus.cloudapp.azure.com, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdeus15.eastus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
    • Execution Graph export aborted for target rundll32.exe, PID 4068 because there are no executed function
    • Not all processes where analyzed, report is missing behavior information
    • Report size exceeded maximum capacity and may have missing behavior information.
    • VT rate limit hit for: db_Usr.dll
    TimeTypeDescription
    22:04:09API Interceptor1x Sleep call for process: loaddll64.exe modified
    22:04:33API Interceptor4x Sleep call for process: WerFault.exe modified
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    185.219.221.136SophosCleanup.exeGet hashmaliciousBazar LoaderBrowse
      out.exeGet hashmaliciousUnknownBrowse
        No context
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        SERVINGADEhttps://www.clinical-partners.co.ukGet hashmaliciousUnknownBrowse
        • 185.158.251.240
        http://www.gerstacker-weinkellerei.deGet hashmaliciousUnknownBrowse
        • 185.158.251.240
        http://www.clinical-partners.co.ukGet hashmaliciousUnknownBrowse
        • 185.158.251.240
        http://stake.libertariancounterpoint.comGet hashmaliciousUnknownBrowse
        • 185.158.251.240
        http://clinical-partners.co.ukGet hashmaliciousUnknownBrowse
        • 185.158.251.240
        https://stake.libertariancounterpoint.com/+6N67YCBGYSfgUDfzZBWz4mBQM+X0RyGi80NjJ/FF4eJwViQGet hashmaliciousUnknownBrowse
        • 185.158.251.240
        https://exodontia.infoGet hashmaliciousUnknownBrowse
        • 185.158.251.240
        https://funcallback.comGet hashmaliciousUnknownBrowse
        • 185.158.251.240
        http://www.clinical-partners.co.ukGet hashmaliciousUnknownBrowse
        • 185.158.251.240
        http://stake.libertariancounterpoint.comGet hashmaliciousUnknownBrowse
        • 185.158.251.240
        No context
        No context
        Process:C:\Windows\System32\WerFault.exe
        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
        Category:dropped
        Size (bytes):65536
        Entropy (8bit):0.7550143332935241
        Encrypted:false
        SSDEEP:96:zdFgbfLmiAPyKytsjLR4RveCbfOQXIDcQfc6mcEwcw3eXaXz+HbHgSQgJjOh88WJ:hwmiAPytCG0RiKgj2uzuiFZZ24lO8uy
        MD5:4EAFE77700D48887D73CAA8593D8AFD9
        SHA1:61D8BB1B0303B3A517809B5427B03E28B377309F
        SHA-256:8F1D3485E210C554C546D2A0C84014911110388394089C7980608758B3C48FC0
        SHA-512:A44B4A43111EA454C0B693562D904D3E6B769D6A7E8987C7913C898980C0FBB940B5E5B8892308CFFE6B863E31810440EC021830242E0C346536FACACDFC56FA
        Malicious:false
        Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.5.8.5.4.9.0.4.7.5.0.9.5.8.7.9.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.5.8.5.4.9.0.4.8.4.0.0.2.0.9.8.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.b.2.f.3.c.a.5.e.-.b.9.b.a.-.4.f.c.b.-.8.7.3.e.-.2.4.a.2.1.7.9.d.c.c.6.8.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.2.9.d.5.d.5.b.6.-.f.9.3.2.-.4.3.b.b.-.8.5.3.3.-.f.e.c.8.2.6.9.a.a.c.0.2.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e._.d.b._.U.s.r...d.l.l.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.8.2.4.-.0.0.0.1.-.0.0.1.4.-.9.e.7.8.-.6.6.b.a.4.b.9.7.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.d.d.3.9.9.a.e.4.6.3.0.3.3.4.3.f.9.f.0.d.a.1.8.9.a.e.e.1.1.c.6.7.b.d.8.6.8.2.2.2.!.r.
        Process:C:\Windows\System32\WerFault.exe
        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
        Category:dropped
        Size (bytes):65536
        Entropy (8bit):0.7547443414102687
        Encrypted:false
        SSDEEP:96:HsFrLmi0yKy2sjLR4RveCbfQQXIDcQfc6mcE0cw3yXaXz+HbHgSQgJjOh88WpOye:Mlmi0y2CI0Riekj2uzuiFZZ24lO8uy
        MD5:8F726D5F444DCE60C196429CC4C631F9
        SHA1:546EDEF46D21C3AFDFABC2F0006C0F4AC37BFFB6
        SHA-256:7BC5FF7BAECEB7A3BDFE9DA402FDA3EA6455E76D08F8601FCB07C98DFAB6AD3F
        SHA-512:4B8398B76227325B617E68BA1D63F0C2FD575B01556352656802D53BF4D6843725E4A99C1FC2216200C41625F15734749A077D007EE1A7F08DBA8F97BE5ECD88
        Malicious:false
        Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.5.8.5.4.9.0.4.1.0.2.3.0.8.5.9.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.5.8.5.4.9.0.4.1.5.8.5.5.7.1.6.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.2.4.4.6.f.0.a.f.-.a.b.7.b.-.4.1.d.e.-.b.8.5.f.-.9.1.7.e.3.e.3.2.7.7.6.e.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.0.c.3.6.e.c.2.-.d.7.5.5.-.4.f.d.f.-.8.2.e.2.-.1.f.9.4.f.2.e.9.9.7.4.4.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e._.d.b._.U.s.r...d.l.l.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.b.8.c.-.0.0.0.1.-.0.0.1.4.-.7.d.b.b.-.d.1.b.6.4.b.9.7.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.d.d.3.9.9.a.e.4.6.3.0.3.3.4.3.f.9.f.0.d.a.1.8.9.a.e.e.1.1.c.6.7.b.d.8.6.8.2.2.2.!.r.
        Process:C:\Windows\System32\WerFault.exe
        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
        Category:dropped
        Size (bytes):65536
        Entropy (8bit):0.7550021288003151
        Encrypted:false
        SSDEEP:96:F4rF0bLwLmihyKyxsjLR4RveCbfQQXIDcQfc6mcE0cw3yXaXz+HbHgSQgJjOh88g:0tmihyxCI0Riekj2uzuiFZZ24lO8uy
        MD5:CDE6EBF087558C1C139E4AF8060CDEC0
        SHA1:A465E44817CB174F9AD2E24C5FC0DEE4241A953F
        SHA-256:DF5AA0BD894E3676D07D58E1A2DC4F4EC4609769260EADF8D680CF9579418020
        SHA-512:6CE671C5419E22DE848899D1E7FE8141CBCA4FCC11063A5DBDC39A0A0C3A5AEE45AE730ECB3C3806E9E6644F861754002864F30CD2533E3AAD8B297CDA0A92C8
        Malicious:false
        Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.5.8.5.4.9.0.5.1.5.7.9.8.7.1.4.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.5.8.5.4.9.0.5.3.7.9.8.6.2.8.9.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.9.f.9.3.6.d.4.a.-.e.d.4.d.-.4.b.d.6.-.8.6.d.d.-.a.6.5.2.1.a.c.0.b.5.5.c.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.c.2.d.3.3.f.4.c.-.1.6.b.5.-.4.e.d.d.-.b.f.9.6.-.6.d.5.6.0.f.2.b.3.6.3.a.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e._.d.b._.U.s.r...d.l.l.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.d.a.8.-.0.0.0.1.-.0.0.1.4.-.4.c.3.8.-.3.e.b.c.4.b.9.7.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.d.d.3.9.9.a.e.4.6.3.0.3.3.4.3.f.9.f.0.d.a.1.8.9.a.e.e.1.1.c.6.7.b.d.8.6.8.2.2.2.!.r.
        Process:C:\Windows\System32\WerFault.exe
        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
        Category:dropped
        Size (bytes):65536
        Entropy (8bit):0.7545985185272127
        Encrypted:false
        SSDEEP:96:/VFwGQLmiWyKyJsjLR4RveCbfQQXIDcQfc6mcE0cw3yXaXz+HbHgSQgJjOh88Wpo:dzEmiWyJCI0Riekj2uzuiFZZ24lO8uy
        MD5:D2D06F72AD84CAB9A241508C3963A808
        SHA1:D6C2DBB0F439B5CCFAE199EBCE841AE5464B05A7
        SHA-256:601F6E8CC9DD274015FEA63E77A7E6AAF8825B7A92A9B45AE0D69D376224C007
        SHA-512:19EFDF880E270AF03CF848A789D0615A63B3AD9A8556016D47E5AAD2DE219003ACDF4901D218D6D8F40250523F9A44F60DFCF7A78CC9E8626A5C949FBF3185AA
        Malicious:false
        Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.5.8.5.4.9.0.4.1.0.2.2.6.5.7.9.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.5.8.5.4.9.0.4.1.5.5.3.9.0.4.8.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.f.7.d.2.f.3.f.f.-.f.5.2.0.-.4.3.d.c.-.8.b.1.d.-.0.1.5.f.a.9.d.b.1.5.e.6.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.0.5.5.e.8.9.0.d.-.9.9.4.f.-.4.0.6.8.-.a.1.7.e.-.b.3.c.4.5.3.b.7.4.4.7.e.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e._.d.b._.U.s.r...d.l.l.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.f.e.4.-.0.0.0.1.-.0.0.1.4.-.e.5.3.9.-.c.c.b.6.4.b.9.7.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.d.d.3.9.9.a.e.4.6.3.0.3.3.4.3.f.9.f.0.d.a.1.8.9.a.e.e.1.1.c.6.7.b.d.8.6.8.2.2.2.!.r.
        Process:C:\Windows\System32\WerFault.exe
        File Type:Mini DuMP crash report, 14 streams, Thu Apr 25 20:04:01 2024, 0x1205a4 type
        Category:dropped
        Size (bytes):56068
        Entropy (8bit):1.6484281004653722
        Encrypted:false
        SSDEEP:192:qy7M1OMsP/1GXlYlvyM5Gwyft+2r3lcJ13Y:EYdP/M2ByBlft+2rGJ1
        MD5:00F04C8B8290F071D1C2B34D9AB7C7A2
        SHA1:EF8DD4EF3DACA6BDD75746EE5C226A4577566A14
        SHA-256:E6395E02FABED4CD93DFDB1B1D6904BE98B405E44B4A293B4C46B97F6F113D8E
        SHA-512:4DA363AEEBEB65AAD83B6B659987E399459BEBBC62E11DB7CC723A691473A314A2E11EF47E08DA67158AE7A67B0D74CF11FB4D9029703D2F9AEA025D1D7C2EDF
        Malicious:false
        Preview:MDMP..a..... .......1.*f.........................................(..........T.......8...........T...............$...........|...........h...............................................................................eJ..............Lw......................T...........0.*f.............................0..................W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .S.u.m.m.e.r. .T.i.m.e...........................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Windows\System32\WerFault.exe
        File Type:Mini DuMP crash report, 14 streams, Thu Apr 25 20:04:01 2024, 0x1205a4 type
        Category:dropped
        Size (bytes):55040
        Entropy (8bit):1.6743453438052422
        Encrypted:false
        SSDEEP:96:578qE3n8c2H1vJJ/1ouihmaoi7MTJ0vhYVz6WGQi2YvL46wn86aWIwXIBbpyttDH:q7MOMTuvhG6WGQiRvpyv3j
        MD5:95CB3B84B42D69496B66F8792A33A371
        SHA1:17DE3B60C3A4AF07DD06215D254F63DA632C5AF4
        SHA-256:709F79670FA0A3E893D6A8E18DC717D868BF0C8DE3F2E46431633843C626C5D1
        SHA-512:98B041D3C30A44ECA175164CE1E67900C307814110502AB70F4147E7C1F2E160279C3E47F15CF5B9C25DC2DCE8D65D5EE4B647BAB49C11DC1471C7E7C078A156
        Malicious:false
        Preview:MDMP..a..... .......1.*f.........................................(..........T.......8...........T...........0...............|...........h...............................................................................eJ..............Lw......................T...........0.*f.............................0..................W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .S.u.m.m.e.r. .T.i.m.e...........................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Windows\System32\WerFault.exe
        File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
        Category:dropped
        Size (bytes):8746
        Entropy (8bit):3.698132855710452
        Encrypted:false
        SSDEEP:192:R6l7wVeJHXaIH6Y8g1Pgmf4kllprr89bqdDfyum:R6lXJ3aIH6YpPgmf4klkqpfy
        MD5:8E23789B65366F9CDD2FB239E302EA47
        SHA1:311D366E48B21740721C5268F07154D0B0B9A515
        SHA-256:CD38FBE76CEE0007C90D2BB979C95B87173DB955EBEB8F0C0B4B960C5D61B577
        SHA-512:0AA4EB2B4A0F961611178C5182C04518D841C2F2A143943B06912391AB72EC5170CB801FF6A0ED2008C6440A5BEE6A73625F7D283F4E7B79EBC20EB6E4B491DE
        Malicious:false
        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.4.0.6.8.<./.P.i.
        Process:C:\Windows\System32\WerFault.exe
        File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
        Category:dropped
        Size (bytes):8754
        Entropy (8bit):3.6960741853810872
        Encrypted:false
        SSDEEP:192:R6l7wVeJdmUIeDUe6YJxhwd13gmf4kllprO89bqh+Df7vum:R6lXJMUII6Y/Wd13gmf4klPqEfD
        MD5:807E7E088A7157815F88C03475243DD7
        SHA1:018F3ADEE84E4717581C97720EA31517198BA46E
        SHA-256:D64B93936F731A70F3B2BAE1B81E32E8A3A912C553042090065DD79E2398ABF9
        SHA-512:C25CD2ABD521C56B1F771E0E2B59D16E7F64D6F658C7A13F973427BFBF78BCF1FDADDD5F176B0E07A19F18A18CD4AC3B12BB0EEF128CB22845F6F9E04B6E453E
        Malicious:false
        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.2.9.5.6.<./.P.i.
        Process:C:\Windows\System32\WerFault.exe
        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
        Category:dropped
        Size (bytes):4734
        Entropy (8bit):4.470022451515776
        Encrypted:false
        SSDEEP:48:cvIwWl8zsqJg771I9B2WpW8VYuYm8M4JCqCIBGuF6fyq85mw9cWyptSTSid:uIjf4I7GX7VKJSfeypoOid
        MD5:3AB8E770D189CCF32218EAE1C8EDF229
        SHA1:72E98B50E5007D6E9DE07A4549198B06A17E3163
        SHA-256:62B9D42B8B5061D8CE4F9D0B3462A5FEE0D460B7AF9E5229E997048C202AE964
        SHA-512:7E4892751450FA57BBFFD6108BA69F37E79D0B6CCA85E09F3D018ADD75E736CD5E3D24C5887C0EB19170F28DC34D7B2D81928F4A0BA005BBC63FF61E663B2797
        Malicious:false
        Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="295866" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
        Process:C:\Windows\System32\WerFault.exe
        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
        Category:dropped
        Size (bytes):4734
        Entropy (8bit):4.470607437696413
        Encrypted:false
        SSDEEP:48:cvIwWl8zsqJg771I9B2WpW8VY2Ym8M4JCqCIBGuFUyq85mw9cK8ptSTS5d:uIjf4I7GX7VKJMnpoO5d
        MD5:18F3D167C53297E8E2098E6B188C04D3
        SHA1:7D2D7F6915E1564AB9180F6D8679CA732D0A4F69
        SHA-256:02F902F955DA1E0804448DA66F9DB7182CA8E356C945499A54EEF530A265F491
        SHA-512:E9D798FE36D2584D76286B8C69CDC45A9032E66489C00277C77892CC3AEFCF40CA2CC1CBF540152626D328AB60721668A0296D7CBBE20E692F49FFF6E60B42D1
        Malicious:false
        Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="295866" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
        Process:C:\Windows\System32\WerFault.exe
        File Type:Mini DuMP crash report, 14 streams, Thu Apr 25 20:04:07 2024, 0x1205a4 type
        Category:dropped
        Size (bytes):54964
        Entropy (8bit):1.670325692624638
        Encrypted:false
        SSDEEP:96:5F8+E3L8c2H1vJJ/1ouiFAlToi7MauKIDzkNh0X+wWBcLzpqdMrLJ9IuTPKWI3nw:EL3OMauKwPX+wbKA+6bhD
        MD5:6BD415429EA98168FD44C1395597D4D1
        SHA1:8889BE012CFC8CAF16BE0D4A2EAD773298E42CCB
        SHA-256:CE617F9F0DA38C5F787EB00BD53E23B7F27C6985F0F5908833DA16CA77F08645
        SHA-512:D41BC82A289AEBB37AD78BB26269D61E7FCD37CA235CB5239716683BBD36FBF09A3B81D444ACAAF8CBE2779E03F6C4C7513A2D08FB216821286E968159096B35
        Malicious:false
        Preview:MDMP..a..... .......7.*f.........................................(..........T.......8...........T...........................|...........h...............................................................................eJ..............Lw......................T.......$...6.*f.............................0..................W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .S.u.m.m.e.r. .T.i.m.e...........................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Windows\System32\WerFault.exe
        File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
        Category:dropped
        Size (bytes):8754
        Entropy (8bit):3.6965785520083627
        Encrypted:false
        SSDEEP:192:R6l7wVeJ6juMIY6Y8gEPgmf4krCYprl89b2bQgDf8wjm:R6lXJ8uMIY6YYPgmf4krS2bQcfz6
        MD5:970E213525C53E86C047F161B6AB7831
        SHA1:A1B6D617F9C53C9E01ABEE9D9F076DDC62ACFFDF
        SHA-256:2ED0337339064CE87C11A23AF09BF1064F99A6AABCF5C645AD57405BDBC70D5D
        SHA-512:713EC38DDC47E87CD4570492D3E5E68E9F63BBF7D9D30E9E6C8703932E5CB65EE1F4A4602ABC18CE2EEC6B1652AEF365E197F5232D9CA48CDF8FCD2BA2482CC1
        Malicious:false
        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.1.8.0.<./.P.i.
        Process:C:\Windows\System32\WerFault.exe
        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
        Category:dropped
        Size (bytes):4734
        Entropy (8bit):4.471201142668408
        Encrypted:false
        SSDEEP:48:cvIwWl8zsqJg771I9B2WpW8VYpYm8M4JCqCIBZF7oyq85mw96ptSTSYd:uIjf4I7GX7VpJ1odpoOYd
        MD5:96321C390683D2B0FEB1AC2E4C08FABF
        SHA1:D42A3204BEEA1A3201E100884DC03117AC2C2F50
        SHA-256:40EE6512BAB6627E0FA12B6ED35904E13E698C5854BC60D4FC06899B35C9179D
        SHA-512:AD4828D8937BD8D2C7D1A31AD196246CE09B8ED950B450D218DB9AF286A89974A5C11E6DEA23FC6EA4959C240FCDE015BC412360FB3D72FC63923E93194063C0
        Malicious:false
        Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="295866" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
        Process:C:\Windows\System32\WerFault.exe
        File Type:Mini DuMP crash report, 14 streams, Thu Apr 25 20:04:11 2024, 0x1205a4 type
        Category:dropped
        Size (bytes):55460
        Entropy (8bit):1.6546439822119097
        Encrypted:false
        SSDEEP:96:5B8gE3U8c2H1vJJ/1ouii/Yoi7MUYxDHVzhcrwEKf1cj3aC3bKyiN9scrKWIabIl:whdOMrlhcrwnf1DdN9sfrEqX
        MD5:6CE9DCAB429A9B42FD9107347F92AF8B
        SHA1:489DCA4FFC37CA2CA556A018C3115DE1E4245CF1
        SHA-256:973103FD74A72A5DAEB378ABA88965E7866A65D96F637725928EFBC989CDFC72
        SHA-512:6B98784A6BAFC7A263C3ABC7F6AC88B02A36EE23082EDB6B509AA4EC59D516FB29EB7E31D15B04446A5090CF2F0363B6631AB1898C8F45BF18810A61A7F57E2C
        Malicious:false
        Preview:MDMP..a..... .......;.*f.........................................(..........T.......8...........T...........................|...........h...............................................................................eJ..............Lw......................T...........9.*f.............................0..................W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .S.u.m.m.e.r. .T.i.m.e...........................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Windows\System32\WerFault.exe
        File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
        Category:dropped
        Size (bytes):8938
        Entropy (8bit):3.699285037276246
        Encrypted:false
        SSDEEP:192:R6l7wVeJ12DIeg6Y8TlWSegmf4kllpru89bQMAfuQm:R6lXJ0DIB6YyWlgmf4klPQDfg
        MD5:AC95CD35AC64E5355EE18BBEB874E34A
        SHA1:8DC46A9DFEA704E0DD1268D3E200A337C89BFAF6
        SHA-256:F155F4FE7BE2CD4F39DB6E5C038103154AFB969034608BE9CF8C66D701383F97
        SHA-512:122924947B10685E8AD2323F6059BC4E84455BFB1E2A93178875E99FB35C09844C38732DC27730BE1B58A9F88EF3B433A72FE1C74F0451CC2F7555AB8D0FD1CA
        Malicious:false
        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.3.4.9.6.<./.P.i.
        Process:C:\Windows\System32\WerFault.exe
        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
        Category:dropped
        Size (bytes):4734
        Entropy (8bit):4.470000125591021
        Encrypted:false
        SSDEEP:48:cvIwWl8zsqJg771I9B2WpW8VYIYm8M4JCqCIBGuFTyq85mw9c6ptSTSMd:uIjf4I7GX7VEJbypoOMd
        MD5:57D2176F7D36B1D1578019C1F84C521C
        SHA1:01148600358937A240B5EB82B2144568ACD76D5F
        SHA-256:07C7ED92131304C3A3A7E036753D6DEAC41C97C10F1175578F966AAFBBCF54B3
        SHA-512:677F85FF6A1EDDFDEF98BDD031E1024AD3D4809868DB5E98F0574E70BB0B62DBCAFCFAEDAE7875F88E215D865858AC63DDF9A8AC97C3C203FBE23102B7C638A2
        Malicious:false
        Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="295866" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
        Process:C:\Windows\System32\WerFault.exe
        File Type:MS Windows registry file, NT/2000 or above
        Category:dropped
        Size (bytes):1835008
        Entropy (8bit):4.422400705061707
        Encrypted:false
        SSDEEP:6144:eSvfpi6ceLP/9skLmb0OTMWSPHaJG8nAgeMZMMhA2fX4WABlEnNa0uhiTw:9vloTMW+EZMM6DFy003w
        MD5:F1219AE826397C1041106F5CBE4CDEAF
        SHA1:6241EFAC3CA03AB8B7884AE51284FA3B7F0CB01D
        SHA-256:8ABC95345B1DA0E7E0D0E9FBBDF43440B93293F20C225FA2735CB78B01DDC09C
        SHA-512:0B4F82D6D0993E8FDB096A7B1B8AA1A5AC99970F9B340A3453DE4B70BB83FE2AAF51C76DEF77222282AC39874E3EB7521095787172799C934839F7A195B30DE6
        Malicious:false
        Preview:regf>...>....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtmv...K..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
        File type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
        Entropy (8bit):6.298239096752118
        TrID:
        • Win64 Dynamic Link Library (generic) (102004/3) 86.43%
        • Win64 Executable (generic) (12005/4) 10.17%
        • Generic Win/DOS Executable (2004/3) 1.70%
        • DOS Executable Generic (2002/1) 1.70%
        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.01%
        File name:db_Usr.dll
        File size:382'976 bytes
        MD5:286394d06972734946774c85742a094f
        SHA1:616415b3ec0c08511d232e56b51faf7a03c45183
        SHA256:8501e14ee6ee142122746333b936c9ab0fc541328f37b5612b6804e6cdc2c2c6
        SHA512:1e8e0c408d27721284160e716d8421e2f53ce4176c392ebf1797ce5f6465cfb0abe272e2671fc9809848842f8aac1c586ae5c9c960599215778b8edb3b4d0bcc
        SSDEEP:6144:yPfFKlojxM82ScMOM2gWfXyRtEmvLMOFIQV5ilTHoZTE4sUsdJn:yPYoORgLE7uIuIpoZgqs
        TLSH:62846C5ABB5404B5E4678078C9638A0BE3B2BC451361C7DF26E4479E2F37BE1693E720
        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........p..F...F...F....y..W....y..H....y.......a..H....a..O....a..-....y..E...F........`..O....`..G....`..G...F.q.G....`..G...RichF..
        Icon Hash:7ae282899bbab082
        Entrypoint:0x18000bf30
        Entrypoint Section:.text
        Digitally signed:true
        Imagebase:0x180000000
        Subsystem:windows gui
        Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, DLL
        DLL Characteristics:HIGH_ENTROPY_VA, NX_COMPAT, GUARD_CF
        Time Stamp:0x61F3FE2A [Fri Jan 28 14:31:06 2022 UTC]
        TLS Callbacks:
        CLR (.Net) Version:
        OS Version Major:6
        OS Version Minor:0
        File Version Major:6
        File Version Minor:0
        Subsystem Version Major:6
        Subsystem Version Minor:0
        Import Hash:1f852021aa767827db12999991ad10a4
        Signature Valid:
        Signature Issuer:
        Signature Validation Error:
        Error Number:
        Not Before, Not After
          Subject Chain
            Version:
            Thumbprint MD5:
            Thumbprint SHA-1:
            Thumbprint SHA-256:
            Serial:
            Instruction
            ret
            mov dword ptr [esp+08h], ebx
            dec eax
            mov dword ptr [esp+10h], esi
            push edi
            dec eax
            sub esp, 20h
            dec ecx
            mov edi, eax
            mov ebx, edx
            dec eax
            mov esi, ecx
            cmp edx, 01h
            jne 00007FCA4CD6A9E7h
            call 00007FCA4CD6B0D8h
            dec esp
            mov eax, edi
            mov edx, ebx
            dec eax
            mov ecx, esi
            dec eax
            mov ebx, dword ptr [esp+30h]
            dec eax
            mov esi, dword ptr [esp+38h]
            dec eax
            add esp, 20h
            pop edi
            jmp 00007FCA4CD6A874h
            int3
            int3
            int3
            dec eax
            sub esp, 28h
            dec ebp
            mov eax, dword ptr [ecx+38h]
            dec eax
            mov ecx, edx
            dec ecx
            mov edx, ecx
            call 00007FCA4CD6A9F2h
            mov eax, 00000001h
            dec eax
            add esp, 28h
            ret
            int3
            int3
            int3
            inc eax
            push ebx
            inc ebp
            mov ebx, dword ptr [eax]
            dec eax
            mov ebx, edx
            inc ecx
            and ebx, FFFFFFF8h
            dec esp
            mov ecx, ecx
            inc ecx
            test byte ptr [eax], 00000004h
            dec esp
            mov edx, ecx
            je 00007FCA4CD6A9F5h
            inc ecx
            mov eax, dword ptr [eax+08h]
            dec ebp
            arpl word ptr [eax+04h], dx
            neg eax
            dec esp
            add edx, ecx
            dec eax
            arpl ax, cx
            dec esp
            and edx, ecx
            dec ecx
            arpl bx, ax
            dec edx
            mov edx, dword ptr [eax+edx]
            dec eax
            mov eax, dword ptr [ebx+10h]
            mov ecx, dword ptr [eax+08h]
            dec eax
            mov eax, dword ptr [ebx+08h]
            test byte ptr [ecx+eax+03h], 0000000Fh
            je 00007FCA4CD6A9EDh
            movzx eax, byte ptr [ecx+eax+03h]
            and eax, FFFFFFF0h
            dec esp
            add ecx, eax
            dec esp
            xor ecx, edx
            dec ecx
            mov ecx, ecx
            pop ebx
            jmp 00007FCA4CD69E0Ah
            int3
            dec eax
            mov eax, esp
            dec eax
            mov dword ptr [eax+08h], ebx
            dec eax
            mov dword ptr [eax+10h], ebp
            NameVirtual AddressVirtual Size Is in Section
            IMAGE_DIRECTORY_ENTRY_EXPORT0x51ac00xa0.rdata
            IMAGE_DIRECTORY_ENTRY_IMPORT0x51b600x28.rdata
            IMAGE_DIRECTORY_ENTRY_RESOURCE0x620000x1888.rsrc
            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x5b0000x405c.pdata
            IMAGE_DIRECTORY_ENTRY_SECURITY0x5c4000x3798
            IMAGE_DIRECTORY_ENTRY_BASERELOC0x640000xd74.reloc
            IMAGE_DIRECTORY_ENTRY_DEBUG0x48ea40x70.rdata
            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
            IMAGE_DIRECTORY_ENTRY_TLS0x48f180x28.rdata
            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x3d1d00x130.rdata
            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IAT0x3b0000x3b0.rdata
            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x51a5c0x40.rdata
            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
            .text0x10000x3953c0x396009ec98ef972b39acc498404c0904e83a3False0.5384582652505446data6.39324545352626IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            .rdata0x3b0000x178020x17a00a2892c398b2b47d3aab6892aca7f7f63False0.4185681216931217data4.90161140273218IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .data0x530000x728c0x560075dc56ee3f5cb0c806fb561fbeef585bFalse0.5056776889534884DOS executable (block device driver \322f\324\377\3772)6.094877040377164IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            .pdata0x5b0000x405c0x42008ae6220ea44f3848228f9b8061920ee3False0.47022964015151514PEX Binary Archive5.466077612144935IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .didat0x600000x100x200982998454860f426a296c28db71401ddFalse0.03515625data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            _RDATA0x610000x940x20098ecda63236cd17614dc4e53eb62d728False0.21484375data1.455240117357614IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .rsrc0x620000x18880x1a003b5428e74aee5e63d23fdde8c6abe6e2False0.7270132211538461data7.26740595365208IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .reloc0x640000xd740xe0031cd9a799deb90fd71ebee13ce8933eeFalse0.48074776785714285data5.500053908992591IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
            NameRVASizeTypeLanguageCountryZLIB Complexity
            RT_ICON0x620e80x1400data0.8263671875
            RT_VERSION0x634e80x30cdataEnglishUnited States0.44743589743589746
            RT_MANIFEST0x637f40x91XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.8689655172413793
            DLLImport
            KERNEL32.dllGetModuleFileNameA, GetModuleHandleExA, LoadLibraryA, GetProcAddress, ReadFile, SetFilePointer, CreateFileW, MultiByteToWideChar, GetLastError, CloseHandle, GetFileSize, RaiseException, GetSystemInfo, VirtualProtect, VirtualQuery, FreeLibrary, GetModuleHandleW, LoadLibraryExA, LocalFree, FormatMessageA, FindClose, FindFirstFileExW, FindNextFileW, SetFilePointerEx, AreFileApisANSI, SetLastError, WideCharToMultiByte, EnterCriticalSection, LeaveCriticalSection, TryEnterCriticalSection, DeleteCriticalSection, GetCurrentThreadId, InitializeCriticalSectionAndSpinCount, CreateEventW, SwitchToThread, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetSystemTimeAsFileTime, GetTickCount, QueryPerformanceCounter, SetEvent, ResetEvent, WaitForSingleObjectEx, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, IsProcessorFeaturePresent, IsDebuggerPresent, GetStartupInfoW, GetCurrentProcessId, InitializeSListHead, Sleep, SignalObjectAndWait, CreateThread, SetThreadPriority, GetThreadPriority, GetLogicalProcessorInformation, CreateTimerQueueTimer, ChangeTimerQueueTimer, DeleteTimerQueueTimer, GetNumaHighestNodeNumber, GetProcessAffinityMask, SetThreadAffinityMask, RegisterWaitForSingleObject, UnregisterWait, EncodePointer, GetCurrentThread, GetThreadTimes, FreeLibraryAndExitThread, GetModuleFileNameW, GetModuleHandleA, LoadLibraryExW, GetVersionExW, VirtualAlloc, VirtualFree, DuplicateHandle, ReleaseSemaphore, InterlockedPopEntrySList, InterlockedPushEntrySList, InterlockedFlushSList, QueryDepthSList, UnregisterWaitEx, CreateTimerQueue, LoadLibraryW, RtlUnwindEx, RtlPcToFileHeader, GetCPInfo, ExitProcess, GetModuleHandleExW, GetConsoleMode, GetStdHandle, GetFileType, HeapFree, HeapAlloc, GetStringTypeW, LCMapStringW, IsValidCodePage, GetACP, GetOEMCP, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, GetProcessHeap, FlushFileBuffers, WriteFile, GetConsoleCP, SetStdHandle, HeapSize, HeapReAlloc, WriteConsoleW
            NameOrdinalAddress
            GetAnalyzerInterfaceByType10x180008250
            GetAnalyzerTypes20x1800084d0
            GetConfiguratorInterfaceByType30x1800083d0
            Language of compilation systemCountry where language is spokenMap
            EnglishUnited States
            TimestampSource PortDest PortSource IPDest IP
            Apr 25, 2024 22:04:05.245631933 CEST49711443192.168.2.5185.219.221.136
            Apr 25, 2024 22:04:05.245670080 CEST44349711185.219.221.136192.168.2.5
            Apr 25, 2024 22:04:05.245733023 CEST49711443192.168.2.5185.219.221.136
            Apr 25, 2024 22:04:05.245754957 CEST49711443192.168.2.5185.219.221.136
            Apr 25, 2024 22:04:05.245759964 CEST44349711185.219.221.136192.168.2.5
            Apr 25, 2024 22:04:05.245795012 CEST49711443192.168.2.5185.219.221.136
            Apr 25, 2024 22:04:05.245799065 CEST44349711185.219.221.136192.168.2.5
            Apr 25, 2024 22:04:05.246021986 CEST44349711185.219.221.136192.168.2.5
            Apr 25, 2024 22:04:12.656924963 CEST49712443192.168.2.5185.219.221.136
            Apr 25, 2024 22:04:12.656969070 CEST44349712185.219.221.136192.168.2.5
            Apr 25, 2024 22:04:12.657032967 CEST49712443192.168.2.5185.219.221.136
            Apr 25, 2024 22:04:12.657078981 CEST49712443192.168.2.5185.219.221.136
            Apr 25, 2024 22:04:12.657084942 CEST44349712185.219.221.136192.168.2.5
            Apr 25, 2024 22:04:12.657121897 CEST49712443192.168.2.5185.219.221.136
            Apr 25, 2024 22:04:12.657126904 CEST44349712185.219.221.136192.168.2.5
            Apr 25, 2024 22:04:12.657298088 CEST44349712185.219.221.136192.168.2.5

            Click to jump to process

            Click to jump to process

            Click to dive into process behavior distribution

            Click to jump to process

            Target ID:0
            Start time:22:04:00
            Start date:25/04/2024
            Path:C:\Windows\System32\loaddll64.exe
            Wow64 process (32bit):false
            Commandline:loaddll64.exe "C:\Users\user\Desktop\db_Usr.dll"
            Imagebase:0x7ff7d3740000
            File size:165'888 bytes
            MD5 hash:763455F9DCB24DFEECC2B9D9F8D46D52
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:moderate
            Has exited:true

            Target ID:1
            Start time:22:04:00
            Start date:25/04/2024
            Path:C:\Windows\System32\conhost.exe
            Wow64 process (32bit):false
            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Imagebase:0x7ff6d64d0000
            File size:862'208 bytes
            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Target ID:2
            Start time:22:04:00
            Start date:25/04/2024
            Path:C:\Windows\System32\cmd.exe
            Wow64 process (32bit):false
            Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\db_Usr.dll",#1
            Imagebase:0x7ff7fdf20000
            File size:289'792 bytes
            MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Target ID:3
            Start time:22:04:00
            Start date:25/04/2024
            Path:C:\Windows\System32\rundll32.exe
            Wow64 process (32bit):false
            Commandline:rundll32.exe C:\Users\user\Desktop\db_Usr.dll,GetAnalyzerInterfaceByType
            Imagebase:0x7ff61b9b0000
            File size:71'680 bytes
            MD5 hash:EF3179D498793BF4234F708D3BE28633
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Target ID:4
            Start time:22:04:00
            Start date:25/04/2024
            Path:C:\Windows\System32\rundll32.exe
            Wow64 process (32bit):false
            Commandline:rundll32.exe "C:\Users\user\Desktop\db_Usr.dll",#1
            Imagebase:0x7ff61b9b0000
            File size:71'680 bytes
            MD5 hash:EF3179D498793BF4234F708D3BE28633
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Target ID:8
            Start time:22:04:00
            Start date:25/04/2024
            Path:C:\Windows\System32\WerFault.exe
            Wow64 process (32bit):false
            Commandline:C:\Windows\system32\WerFault.exe -u -p 2956 -s 332
            Imagebase:0x7ff656d90000
            File size:570'736 bytes
            MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Target ID:10
            Start time:22:04:00
            Start date:25/04/2024
            Path:C:\Windows\System32\WerFault.exe
            Wow64 process (32bit):false
            Commandline:C:\Windows\system32\WerFault.exe -u -p 4068 -s 316
            Imagebase:0x7ff656d90000
            File size:570'736 bytes
            MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Target ID:12
            Start time:22:04:03
            Start date:25/04/2024
            Path:C:\Windows\System32\rundll32.exe
            Wow64 process (32bit):false
            Commandline:rundll32.exe C:\Users\user\Desktop\db_Usr.dll,GetAnalyzerTypes
            Imagebase:0x7ff61b9b0000
            File size:71'680 bytes
            MD5 hash:EF3179D498793BF4234F708D3BE28633
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:false

            Target ID:13
            Start time:22:04:06
            Start date:25/04/2024
            Path:C:\Windows\System32\rundll32.exe
            Wow64 process (32bit):false
            Commandline:rundll32.exe C:\Users\user\Desktop\db_Usr.dll,GetConfiguratorInterfaceByType
            Imagebase:0x7ff61b9b0000
            File size:71'680 bytes
            MD5 hash:EF3179D498793BF4234F708D3BE28633
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Target ID:15
            Start time:22:04:07
            Start date:25/04/2024
            Path:C:\Windows\System32\WerFault.exe
            Wow64 process (32bit):false
            Commandline:C:\Windows\system32\WerFault.exe -u -p 6180 -s 328
            Imagebase:0x7ff656d90000
            File size:570'736 bytes
            MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Target ID:16
            Start time:22:04:09
            Start date:25/04/2024
            Path:C:\Windows\System32\rundll32.exe
            Wow64 process (32bit):false
            Commandline:rundll32.exe "C:\Users\user\Desktop\db_Usr.dll",GetAnalyzerInterfaceByType
            Imagebase:0x7ff61b9b0000
            File size:71'680 bytes
            MD5 hash:EF3179D498793BF4234F708D3BE28633
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Target ID:17
            Start time:22:04:09
            Start date:25/04/2024
            Path:C:\Windows\System32\rundll32.exe
            Wow64 process (32bit):false
            Commandline:rundll32.exe "C:\Users\user\Desktop\db_Usr.dll",GetAnalyzerTypes
            Imagebase:0x7ff61b9b0000
            File size:71'680 bytes
            MD5 hash:EF3179D498793BF4234F708D3BE28633
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:false

            Target ID:18
            Start time:22:04:09
            Start date:25/04/2024
            Path:C:\Windows\System32\rundll32.exe
            Wow64 process (32bit):false
            Commandline:rundll32.exe "C:\Users\user\Desktop\db_Usr.dll",GetConfiguratorInterfaceByType
            Imagebase:0x7ff61b9b0000
            File size:71'680 bytes
            MD5 hash:EF3179D498793BF4234F708D3BE28633
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Target ID:21
            Start time:22:04:11
            Start date:25/04/2024
            Path:C:\Windows\System32\WerFault.exe
            Wow64 process (32bit):false
            Commandline:C:\Windows\system32\WerFault.exe -u -p 3496 -s 328
            Imagebase:0x7ff656d90000
            File size:570'736 bytes
            MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Has exited:true

            Reset < >
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: AddressErrorHandleLastModuleProc
              • String ID: CreateRemoteThreadEx$CreateUmsCompletionList$CreateUmsThreadContext$DeleteProcThreadAttributeList$DeleteUmsCompletionList$DeleteUmsThreadContext$DequeueUmsCompletionListItems$EnterUmsSchedulingMode$ExecuteUmsThread$GetCurrentUmsThread$GetNextUmsListItem$GetUmsCompletionListEvent$InitializeProcThreadAttributeList$QueryUmsThreadInformation$SetUmsThreadInformation$UmsThreadYield$UpdateProcThreadAttribute$kernel32.dll
              • API String ID: 4275029093-2643937717
              • Opcode ID: f9eaf222f6879a7da7ae78f53b6a6e7ffd2825e6f774e33b8bf15d84986a6dde
              • Instruction ID: 9c0552eedca0a698e158dedc289968652e7714387bc5ab8b218221cec9504098
              • Opcode Fuzzy Hash: f9eaf222f6879a7da7ae78f53b6a6e7ffd2825e6f774e33b8bf15d84986a6dde
              • Instruction Fuzzy Hash: 63021C30601A0D85FF8BEB65A8553EA33A1BB8C7C5F45D426FA19962A5FE7C870C8350
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: Module__std_fs_code_page$AddressFileHandleLibraryLoadNameProc_invalid_parameter_noinfo_noreturn
              • String ID: onnxruntime.dll$shlwapi.dll
              • API String ID: 1957618143-256643573
              • Opcode ID: 7882e597ea89e4a43fa87efe9ceceb3192d74b2da034ed01965721d8ba283eb0
              • Instruction ID: 3f35741a6a2a244f57297cfe399711942d047dba908dfcd52530d44cbd610acd
              • Opcode Fuzzy Hash: 7882e597ea89e4a43fa87efe9ceceb3192d74b2da034ed01965721d8ba283eb0
              • Instruction Fuzzy Hash: 0F91A372310A8881EE96DB25E4443DE73A1F7887D4F509122FB9D47AE9DF78C689C700
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: Concurrency::details::$GrowQuickSet::$CountedHashReference$SpinWait$Base::ErrorExceptionFileHeaderHighestIndexLastNodeNumaNumberRaiseRingSchedulerSchedulingValid
              • String ID:
              • API String ID: 2855629441-0
              • Opcode ID: 10e8b383cc2d444ee8d0c84e22c65b6f30374c92b3fe6f0fa3fff1c1f1611d0b
              • Instruction ID: 720183d061135b29b824aea8bdc58cd13fe8322c3fc7d69882f4cc019bd6e469
              • Opcode Fuzzy Hash: 10e8b383cc2d444ee8d0c84e22c65b6f30374c92b3fe6f0fa3fff1c1f1611d0b
              • Instruction Fuzzy Hash: D2F15A32701B4886EB92DB66E4543DE77A1FB88BC8F448125EF9E577A5DE38D609C300
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
              • String ID:
              • API String ID: 1239891234-0
              • Opcode ID: 7ce4bb5d8cacddfe21ed9ab6f432614e715b109177e776a065b06fd18cf19337
              • Instruction ID: 4dc2fc5852fc032eea7cfb68e4f73eb563a4dd5a5137d15b61f2d325e3fc9c1d
              • Opcode Fuzzy Hash: 7ce4bb5d8cacddfe21ed9ab6f432614e715b109177e776a065b06fd18cf19337
              • Instruction Fuzzy Hash: DF316F32214B8486EBA2CF25E8503DE73A4F789798F504126FB9D43B99DF78C649CB00
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: ErrorFileLastWrite$Console
              • String ID:
              • API String ID: 786612050-0
              • Opcode ID: c9f49d25747f3e638e7c69d1fe9a0a8fb5f5dde1b43da9de647de6d1ca1c319f
              • Instruction ID: 46b6167f948dd14a0a1b3cfe0fa41de7e3ae0e695d24e60078e6d5c6b0851df3
              • Opcode Fuzzy Hash: c9f49d25747f3e638e7c69d1fe9a0a8fb5f5dde1b43da9de647de6d1ca1c319f
              • Instruction Fuzzy Hash: 9CD1CF72704A849AE752CF65D5853DE7BB1F7487C8F15811AEF8A47B99DE38C21AC300
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • Concurrency::details::WorkItem::ResolveToken.LIBCONCRT ref: 0000000180022B4E
              • Concurrency::details::WorkItem::BindTo.LIBCMT ref: 0000000180022B95
                • Part of subcall function 000000018001A4B8: Concurrency::details::Etw::Trace.LIBCONCRT ref: 000000018001A525
              • Concurrency::details::SchedulerBase::ReleaseInternalContext.LIBCONCRT ref: 0000000180022BA3
              • Concurrency::details::SchedulerBase::ReleaseInternalContext.LIBCONCRT ref: 0000000180022BCC
              • Concurrency::details::WorkItem::Bind.LIBCMT ref: 0000000180022C05
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: Concurrency::details::$Item::Work$Base::BindContextInternalReleaseScheduler$Etw::ResolveTokenTrace
              • String ID:
              • API String ID: 285749472-0
              • Opcode ID: 981b7c1395e1aca9ac8b89e0c2fbabffc5f9a282d9f74c2abf27e60f4e365613
              • Instruction ID: d6093245e3aba79fdcd58a781783ea50212a901325dd4934e4bed5854c31ba63
              • Opcode Fuzzy Hash: 981b7c1395e1aca9ac8b89e0c2fbabffc5f9a282d9f74c2abf27e60f4e365613
              • Instruction Fuzzy Hash: 6B517C32700A5996EB93DFA5D4543ED2361F78CBC8F448022EE5E1BB9ACF25C649C750
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: Xinvalid_argumentstd::_
              • String ID: list too long
              • API String ID: 909987262-1124181908
              • Opcode ID: 9ea7fc6ece6c44728e50fdbf346f14f40b87dd7fcc6634a79418ecee57298033
              • Instruction ID: 019c4c84878692b295062b39fa7e5719bbb2e00093051122feef87187812c7a6
              • Opcode Fuzzy Hash: 9ea7fc6ece6c44728e50fdbf346f14f40b87dd7fcc6634a79418ecee57298033
              • Instruction Fuzzy Hash: EF02D076301A48CAEB96CF14D4947EC73A6EB8C7CAF458125FA4A87791EF34DA48C740
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • _invalid_parameter_noinfo.LIBCMT ref: 0000000180031CB8
                • Part of subcall function 000000018002D474: IsProcessorFeaturePresent.KERNEL32(?,?,?,?,000000018002D421), ref: 000000018002D47D
                • Part of subcall function 000000018002D474: GetCurrentProcess.KERNEL32(?,?,?,?,000000018002D421), ref: 000000018002D4A2
              Strings
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: CurrentFeaturePresentProcessProcessor_invalid_parameter_noinfo
              • String ID: *?
              • API String ID: 4036615347-2564092906
              • Opcode ID: 5aae11b009f9f8077a035555a8a94d7972d472115c1a6d6e6602af9b019fb6f7
              • Instruction ID: 53a37d49e55d9ba5738b2287a1a1a3eaff4af0f36523737cbcfe8d7990e43a2c
              • Opcode Fuzzy Hash: 5aae11b009f9f8077a035555a8a94d7972d472115c1a6d6e6602af9b019fb6f7
              • Instruction Fuzzy Hash: 4051D372710B9889EF57DFA298007EA27A5F75CBD4F468922EE1D07B85EF38C5498300
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: ExceptionRaise_clrfp
              • String ID:
              • API String ID: 15204871-0
              • Opcode ID: f8abcabbac9793642e3f6b8e3d81d6b6530ea4e47b1d82ab21f481a52d6e9a24
              • Instruction ID: aeb09eb94897e59d00e5a601a60feb998de88869a6dc8d7cec1e00fd4c4a785a
              • Opcode Fuzzy Hash: f8abcabbac9793642e3f6b8e3d81d6b6530ea4e47b1d82ab21f481a52d6e9a24
              • Instruction Fuzzy Hash: 95B15E77210B888BEB56CF29C88639D77A0F348B88F19C911EB5D8B7A4CB35D955C700
              Uniqueness

              Uniqueness Score: -1.00%

              Strings
              • %PDF-1.1 0 obj<</Pages 2 0 R>>endobj2 0 obj<</Kids[3 0 R]/Count 1>>endobj3 0 obj<</Parent 2 0 R>>endobjtrailer <</Root 1 0 R>>, xrefs: 0000000180006D68
              • {\rtf1\ansi\ansicpg1252\deff0\nouicompat\deflang1033{\fonttbl{\f0\fnil\fcharset0 Calibri;}}{\*\generator Riched20 10.0.18362}\viewkind4\uc1 \pard\sa200\sl276\slmult1\f0\fs22\lang9 "Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tem, xrefs: 0000000180006D76
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID:
              • String ID: %PDF-1.1 0 obj<</Pages 2 0 R>>endobj2 0 obj<</Kids[3 0 R]/Count 1>>endobj3 0 obj<</Parent 2 0 R>>endobjtrailer <</Root 1 0 R>>${\rtf1\ansi\ansicpg1252\deff0\nouicompat\deflang1033{\fonttbl{\f0\fnil\fcharset0 Calibri;}}{\*\generator Riched20 10.0.18362}\viewkind4\uc1 \pard\sa200\sl276\slmult1\f0\fs22\lang9 "Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tem
              • API String ID: 0-461649206
              • Opcode ID: 4e628d5dbb0ce87860dc2487cb12e3a375f3080979bfffffb3e39337955f7d57
              • Instruction ID: 60fa0f3c087fe035d8fac307bd4653963ac8fda2eb1af304b58fb58831996b24
              • Opcode Fuzzy Hash: 4e628d5dbb0ce87860dc2487cb12e3a375f3080979bfffffb3e39337955f7d57
              • Instruction Fuzzy Hash: 29A1EA32E14ACC85F2A3DB3590413E6B355BF6E3C4F15D312FA85721A6EF6992DA8700
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 1dfe4dc84a4ed6a9cff2939fb96386e99a20243c992ddf26f0f2560b2bc9f447
              • Instruction ID: 8fed129e5a4173c423762d70ee74820aa3e77f1b4ff11b8d25c105dbdc832d66
              • Opcode Fuzzy Hash: 1dfe4dc84a4ed6a9cff2939fb96386e99a20243c992ddf26f0f2560b2bc9f447
              • Instruction Fuzzy Hash: 3451E33270079498F7A29B72A9043DF7BA1B748BD4F568215BE9847A86CF78C609C700
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: HeapProcess
              • String ID:
              • API String ID: 54951025-0
              • Opcode ID: 73edfe39d761d9d3fa356a5deb4001ff91904aa9fe78d25bca5146e3e773d5ab
              • Instruction ID: 597f05757a0da8dd626c542a2e88db427e331d14c5c40727f65058e3098f679c
              • Opcode Fuzzy Hash: 73edfe39d761d9d3fa356a5deb4001ff91904aa9fe78d25bca5146e3e773d5ab
              • Instruction Fuzzy Hash: 11B09230A03B08C2EA8A2B556CC238423A4BB8CB40F998019E10C90320DE2C06E99711
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: ErrorFreeHeapLast
              • String ID:
              • API String ID: 485612231-0
              • Opcode ID: ba019cfb240f0f0d67e5092171fb7f53e96da6d3d43ae7969c5cea12d1e32449
              • Instruction ID: e922b7a6f7869e38acedf552627ce3fcb61331dd82256dd882682f2698f9e016
              • Opcode Fuzzy Hash: ba019cfb240f0f0d67e5092171fb7f53e96da6d3d43ae7969c5cea12d1e32449
              • Instruction Fuzzy Hash: B4419072310A5882EF95CF2AD96539A73A1A34CFD4F49E426FE4D97B58DE3DC2468300
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 689ebba5406f6c80324318eda21bc6585d230cc1922b43087ebe614791f70ab0
              • Instruction ID: 558f8ffc36791252829933fd237ae662babf4097d62169dd37c0c275feedb6b8
              • Opcode Fuzzy Hash: 689ebba5406f6c80324318eda21bc6585d230cc1922b43087ebe614791f70ab0
              • Instruction Fuzzy Hash: 700168B2B7C54582DB5EDA398A593BDA782D345BC4F80B039FE0FCB6A0D929C7158600
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: a0255d7a404cfc97e90feae3ef9e55d74cdbeae368b12f9566ee2b62271460f6
              • Instruction ID: cf5401a9366e1499d812c55e5de77a8ea2cd31d29e8983d18c30bde8e4db2e00
              • Opcode Fuzzy Hash: a0255d7a404cfc97e90feae3ef9e55d74cdbeae368b12f9566ee2b62271460f6
              • Instruction Fuzzy Hash: 53F04F726152A88BDBE5CF68A80275A77E4F3483C0F808019F68983E04D73D81648F54
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 783244c1f6c018e505bc6e0027131e8a8fa7eacb3e5132b692676adc6ef7cab9
              • Instruction ID: 2d330b699183f326448e2d70476a074735966263a3b21ed6c49726c99a12f7f6
              • Opcode Fuzzy Hash: 783244c1f6c018e505bc6e0027131e8a8fa7eacb3e5132b692676adc6ef7cab9
              • Instruction Fuzzy Hash: DBC00835205A5CC0EAD74B45A8503922BA0EB08789F459425B918A12A0DE7996489716
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: AddressProc$HandleModule
              • String ID: AcquireSRWLockExclusive$CloseThreadpoolTimer$CloseThreadpoolWait$CloseThreadpoolWork$CompareStringEx$CreateEventExW$CreateSemaphoreExW$CreateSemaphoreW$CreateSymbolicLinkW$CreateThreadpoolTimer$CreateThreadpoolWait$CreateThreadpoolWork$FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$FlushProcessWriteBuffers$FreeLibraryWhenCallbackReturns$GetCurrentPackageId$GetCurrentProcessorNumber$GetFileInformationByHandleEx$GetLocaleInfoEx$GetSystemTimePreciseAsFileTime$GetTickCount64$InitOnceExecuteOnce$InitializeConditionVariable$InitializeCriticalSectionEx$InitializeSRWLock$LCMapStringEx$ReleaseSRWLockExclusive$SetFileInformationByHandle$SetThreadpoolTimer$SetThreadpoolWait$SleepConditionVariableCS$SleepConditionVariableSRW$SubmitThreadpoolWork$TryAcquireSRWLockExclusive$WaitForThreadpoolTimerCallbacks$WakeAllConditionVariable$WakeConditionVariable$kernel32.dll
              • API String ID: 667068680-295688737
              • Opcode ID: cda0040cb0776b40282769a75d1d4ad5c4a663430d0e1f735c6edddd2b5dbf2e
              • Instruction ID: 54e8e55bf43334902505e063c2165f1111288958be1015f28b7c597e677dae18
              • Opcode Fuzzy Hash: cda0040cb0776b40282769a75d1d4ad5c4a663430d0e1f735c6edddd2b5dbf2e
              • Instruction Fuzzy Hash: F7A1A478501B0E91EE9B9F15BC887C623A5B70DBC9F459021A96E93224EF7D839DD340
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • LoadLibraryExW.KERNEL32(?,?,?,000000018001F3D6,?,?,?,?,?,?,?,?,?,?,0000000180013F83), ref: 000000018001EFB4
              • GetLastError.KERNEL32(?,?,?,000000018001F3D6,?,?,?,?,?,?,?,?,?,?,0000000180013F83), ref: 000000018001EFC2
              • LoadLibraryW.KERNEL32(?,?,?,000000018001F3D6,?,?,?,?,?,?,?,?,?,?,0000000180013F83), ref: 000000018001EFD8
              • GetProcAddress.KERNEL32(?,?,?,000000018001F3D6,?,?,?,?,?,?,?,?,?,?,0000000180013F83), ref: 000000018001EFF4
              • GetProcAddress.KERNEL32(?,?,?,000000018001F3D6,?,?,?,?,?,?,?,?,?,?,0000000180013F83), ref: 000000018001F00F
              • GetProcAddress.KERNEL32(?,?,?,000000018001F3D6,?,?,?,?,?,?,?,?,?,?,0000000180013F83), ref: 000000018001F02B
              • GetProcAddress.KERNEL32(?,?,?,000000018001F3D6,?,?,?,?,?,?,?,?,?,?,0000000180013F83), ref: 000000018001F047
              • GetProcAddress.KERNEL32(?,?,?,000000018001F3D6,?,?,?,?,?,?,?,?,?,?,0000000180013F83), ref: 000000018001F063
              • GetProcAddress.KERNEL32(?,?,?,000000018001F3D6,?,?,?,?,?,?,?,?,?,?,0000000180013F83), ref: 000000018001F07F
              Strings
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: AddressProc$LibraryLoad$ErrorLast
              • String ID: GetTraceEnableFlags$GetTraceEnableLevel$GetTraceLoggerHandle$RegisterTraceGuidsW$TraceEvent$UnregisterTraceGuids$advapi32.dll
              • API String ID: 2340687224-19120757
              • Opcode ID: 60f85dc344bc9d6864e16cb1ecd3d8851a2150d0595f5b74a69b3fd1cdfbc2b3
              • Instruction ID: 5775900f19b43099875f7b38352dd07090e1398c38e643f3458cd0763c2016d1
              • Opcode Fuzzy Hash: 60f85dc344bc9d6864e16cb1ecd3d8851a2150d0595f5b74a69b3fd1cdfbc2b3
              • Instruction Fuzzy Hash: D2211B39601B4991EA9BDB16F8543EA33A0BB4EBC1F45D525AA0E473A1EF3CC35C8350
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: Dload$Section$FunctionLockPointers$AccessWrite$ExceptionProtectRaiseRelease$AcquireErrorLastLibraryLoad
              • String ID: H
              • API String ID: 3582658894-2852464175
              • Opcode ID: f1658e13351d243abc845e5bc92c057fd4b28cceced6ebbc9dd53c52684b2050
              • Instruction ID: 0af1baff8f69cbfda9dab198d715969f3d9b847330068f99e127d7471474d3f8
              • Opcode Fuzzy Hash: f1658e13351d243abc845e5bc92c057fd4b28cceced6ebbc9dd53c52684b2050
              • Instruction Fuzzy Hash: 46911732A11B588AFB96CFA5E8407E937A1FB0DBC8F058525EE0957B54EF38D649C700
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: Handle$AddressCriticalModuleProcSection$CloseCountCreateDeleteEventInitializeSpin__scrt_fastfail
              • String ID: SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
              • API String ID: 2680415206-3242537097
              • Opcode ID: e774f97c3732503128ae0e7a4f5a010c0fc27a982a0d4cb2fb05135d42bcf29b
              • Instruction ID: 1779cc06258e4b49dd7b9a6fa617724d247b15a8708ae442a74ee96498ffb086
              • Opcode Fuzzy Hash: e774f97c3732503128ae0e7a4f5a010c0fc27a982a0d4cb2fb05135d42bcf29b
              • Instruction Fuzzy Hash: 6121E930605A0D81EADBDB25E8957E623A0AB5D7C4F598425BA1A926A0EE3CC74D9B00
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: List$HeadInitialize$ErrorLast$ArrayBlockingReentrantRegisterScheduler$AsyncConcurrency::Concurrency::details::Concurrency::details::_LibraryLoadLockLock::_ObjectPolicyPolicy::SingleTimerWait__std_exception_copy
              • String ID:
              • API String ID: 4049533768-0
              • Opcode ID: 6a769a948feeed17173f49d7ff08d20b0c0d832948101fc49044bfea738d586f
              • Instruction ID: fdc9b73a43709b38dc3f8a8c2721cca333f06142bb7a90dd744cda18e792e42c
              • Opcode Fuzzy Hash: 6a769a948feeed17173f49d7ff08d20b0c0d832948101fc49044bfea738d586f
              • Instruction Fuzzy Hash: CEB13A72200B88A7E79AEF31E5543DE73A5F788780F508615EB68836A1EF34D278C750
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • std::bad_alloc::bad_alloc.LIBCMT ref: 0000000180018F09
              • std::bad_alloc::bad_alloc.LIBCMT ref: 0000000180018EEF
                • Part of subcall function 0000000180029B1C: RtlPcToFileHeader.KERNEL32(?,?,?,?,?,?,?,?,?,00000001800011EF), ref: 0000000180029B60
                • Part of subcall function 0000000180029B1C: RaiseException.KERNEL32(?,?,?,?,?,?,?,?,?,00000001800011EF), ref: 0000000180029BA6
              Strings
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: std::bad_alloc::bad_alloc$ExceptionFileHeaderRaise
              • String ID: $pEvents
              • API String ID: 182597618-273013077
              • Opcode ID: dcc77da0759010a8956354dc31eb084cee19a5172fb50eebba3fbef8d8cdb2e2
              • Instruction ID: d575d0be13853ce636d50cf1dae70f3ef46dfbdc0cb7965a3cec876c41f1c0e8
              • Opcode Fuzzy Hash: dcc77da0759010a8956354dc31eb084cee19a5172fb50eebba3fbef8d8cdb2e2
              • Instruction Fuzzy Hash: 30B17B32701A4885FB92DBA4D4803ED23B1BB58798F548922EE0E576DAEF34C70ED340
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: ErrorLast$AddressHandleModuleProc$LibraryLoad
              • String ID: RoInitialize$RoUninitialize$combase.dll
              • API String ID: 4089895538-3997890769
              • Opcode ID: 7e511dab28cfa7b09cfe4ce401d456891a4526e9be3343ea5b157fc44fd116e6
              • Instruction ID: 0b93ef887d12b46650fd5c3704e5cab0057d0a4ba612059cb0411d3ab66abf10
              • Opcode Fuzzy Hash: 7e511dab28cfa7b09cfe4ce401d456891a4526e9be3343ea5b157fc44fd116e6
              • Instruction Fuzzy Hash: 46314930604A4D95FA97EB25E8553DA23A1BB8C7C5F41C422B64E822A4FE3CC34CC340
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: AddressProc$ErrorLast$HandleModule
              • String ID: GetCurrentProcessorNumberEx$GetThreadGroupAffinity$SetThreadGroupAffinity$kernel32.dll
              • API String ID: 730103829-465693683
              • Opcode ID: c5028ea3e3335243b73bdb94368c1be195a639f1a7056035aee841dce3270e3c
              • Instruction ID: b1d4f97a50650784c38d2f40fa4aee32cb8a0c053803763041753e5b02a750a7
              • Opcode Fuzzy Hash: c5028ea3e3335243b73bdb94368c1be195a639f1a7056035aee841dce3270e3c
              • Instruction Fuzzy Hash: 1E214B34200B4D81FA9BDB55B9453EA23A1BB8CBC5F45C422BA4957698EF3CC74D8310
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • Concurrency::details::WorkSearchContext::PreSearch.LIBCONCRT ref: 0000000180027B03
                • Part of subcall function 0000000180027848: Concurrency::details::WorkItem::WorkItem.LIBCONCRT ref: 000000018002786E
              • Concurrency::details::SchedulerBase::PerformServiceScan.LIBCMT ref: 0000000180027B3A
              • Concurrency::details::SchedulerBase::GetNextPriorityObject.LIBCMT ref: 0000000180027B78
              • Concurrency::details::WorkSearchContext::QuickSearch.LIBCONCRT ref: 0000000180027B9F
              • Concurrency::details::_CriticalNonReentrantLock::_Acquire.LIBCMT ref: 0000000180027BD4
              • StructuredWorkStealingQueue.LIBCONCRT ref: 0000000180027BDF
              • Concurrency::details::WorkItem::WorkItem.LIBCONCRT ref: 0000000180027C18
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: Work$Concurrency::details::$Search$Base::Context::ItemItem::Scheduler$AcquireConcurrency::details::_CriticalLock::_NextObjectPerformPriorityQueueQuickReentrantScanServiceStealingStructured
              • String ID:
              • API String ID: 176267151-0
              • Opcode ID: e850badfc42921b327401099b4842620e91b9416f71ca23ddddede609b423ea0
              • Instruction ID: 425b697c1cbcc2a11e8ce7ef85267080c9d840d502ae70d507c68f97ddb628d0
              • Opcode Fuzzy Hash: e850badfc42921b327401099b4842620e91b9416f71ca23ddddede609b423ea0
              • Instruction Fuzzy Hash: F6C15D7620978886EAA6CB16E0403EABBA1F79DBC4F158056EF8D47B56CF38C549C710
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • Concurrency::details::WorkSearchContext::PreSearch.LIBCONCRT ref: 0000000180027F70
                • Part of subcall function 0000000180027848: Concurrency::details::WorkItem::WorkItem.LIBCONCRT ref: 000000018002786E
              • Concurrency::details::SchedulerBase::PerformServiceScan.LIBCMT ref: 0000000180027FA6
              • Concurrency::details::SchedulerBase::GetNextPriorityObject.LIBCMT ref: 0000000180027FDF
              • Concurrency::details::WorkSearchContext::QuickSearchYield.LIBCONCRT ref: 0000000180028007
              • Concurrency::details::_CriticalNonReentrantLock::_Acquire.LIBCMT ref: 000000018002803D
              • StructuredWorkStealingQueue.LIBCONCRT ref: 0000000180028048
              • Concurrency::details::SchedulerBase::GetNextPriorityObject.LIBCMT ref: 0000000180028069
              • Concurrency::details::WorkItem::WorkItem.LIBCONCRT ref: 0000000180028080
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: Concurrency::details::Work$Search$Base::Scheduler$Context::ItemItem::NextObjectPriority$AcquireConcurrency::details::_CriticalLock::_PerformQueueQuickReentrantScanServiceStealingStructuredYield
              • String ID:
              • API String ID: 117327790-0
              • Opcode ID: f4c66b18f04dc44155bf396ebdf4723087e30d4d50f225f382a16be8a626c640
              • Instruction ID: ddcbcfa7981fb59d05678ef5ebcf6256273ba3a384fd358ff2eb86c096ba2432
              • Opcode Fuzzy Hash: f4c66b18f04dc44155bf396ebdf4723087e30d4d50f225f382a16be8a626c640
              • Instruction Fuzzy Hash: FD91BF3A2067C486EAA78B1695403EA6BA0FB9EBC4F148015FF8917796CF39C65DD700
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_fastfail__scrt_release_startup_lock
              • String ID:
              • API String ID: 2904100720-0
              • Opcode ID: 288323bbdc39a3a60ceb3df47995392d6b4ee48232bd62087a27c78229e62d0a
              • Instruction ID: f3aa1603b221721d1da384f7f8d5c74759afa219bc0d442e4deb19142a95c569
              • Opcode Fuzzy Hash: 288323bbdc39a3a60ceb3df47995392d6b4ee48232bd62087a27c78229e62d0a
              • Instruction Fuzzy Hash: B981AD3161464D86FAE3EB6998413D97690EB8DBC0F54C425BA08D7396EF38CB4D9F01
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • GetCurrentThreadId.KERNEL32 ref: 000000018002176F
              • Concurrency::details::WinRT::RoInitialize.LIBCONCRT ref: 00000001800217DD
              • Concurrency::details::InternalContextBase::ExecutedAssociatedChore.LIBCONCRT ref: 00000001800217F7
              • Concurrency::details::InternalContextBase::IsVirtualProcessorRetired.LIBCONCRT ref: 0000000180021803
              • Concurrency::details::InternalContextBase::WorkWasFound.LIBCONCRT ref: 000000018002186C
              • Concurrency::details::InternalContextBase::ExecuteChoreInline.LIBCONCRT ref: 0000000180021890
              • Concurrency::details::InternalContextBase::IsVirtualProcessorRetired.LIBCONCRT ref: 0000000180021898
              • Concurrency::details::InternalContextBase::IsVirtualProcessorRetired.LIBCONCRT ref: 00000001800218A2
                • Part of subcall function 0000000180021E5C: Concurrency::details::ReferenceCountedQuickBitSet::InterlockedClear.LIBCONCRT ref: 0000000180021E9C
                • Part of subcall function 0000000180021E5C: Concurrency::details::InternalContextBase::CleanupDispatchedContextOnCancel.LIBCMT ref: 0000000180021EB9
              • Concurrency::details::InternalContextBase::WaitForWork.LIBCONCRT ref: 00000001800218AE
                • Part of subcall function 0000000180022894: Concurrency::details::ReferenceCountedQuickBitSet::InterlockedSet.LIBCONCRT ref: 00000001800228D5
                • Part of subcall function 0000000180022894: Concurrency::details::VirtualProcessor::MakeAvailable.LIBCONCRT ref: 0000000180022926
              • Concurrency::details::InternalContextBase::CleanupDispatchedContextOnCancel.LIBCMT ref: 00000001800218C0
                • Part of subcall function 0000000180021728: Concurrency::details::InternalContextBase::Cleanup.LIBCMT ref: 000000018002173D
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: Concurrency::details::$Context$Base::Internal$Virtual$CleanupProcessorRetired$CancelChoreCountedDispatchedInterlockedQuickReferenceSet::Work$AssociatedAvailableClearCurrentExecuteExecutedFoundInitializeInlineMakeProcessor::ThreadWait
              • String ID:
              • API String ID: 3781320041-0
              • Opcode ID: c17c751db9575f3e20e2b95e93d631fec77388083566567091fd1de2fe7fbf15
              • Instruction ID: 69aa320d618f62e908b2ba37101aa3dc395bfa047bb3a86dbf28ef7f5917625b
              • Opcode Fuzzy Hash: c17c751db9575f3e20e2b95e93d631fec77388083566567091fd1de2fe7fbf15
              • Instruction Fuzzy Hash: D1517F3160464889FFE7EB6194513ED2360AB5EBD9F458021BE4A1B6C6CF35C64E8350
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: Timer$Concurrency::details::CreateSchedulerstd::bad_alloc::bad_alloc$AsyncBase::ContextDefaultFromLibraryLoadQueueRegisterValue
              • String ID:
              • API String ID: 1370819030-3916222277
              • Opcode ID: a6d4b40d33a89b8be2e52fd23322bd36d054622ea14b15fbdaee6647cd969c12
              • Instruction ID: 8615b032fd0f3c7cbdcce9115446c037e5cb63622a11ca418e0da998d349ceec
              • Opcode Fuzzy Hash: a6d4b40d33a89b8be2e52fd23322bd36d054622ea14b15fbdaee6647cd969c12
              • Instruction Fuzzy Hash: 5A216832204A4882FB96EB18E4557D972A0F78C7C8F68C515FA8C4B6A6DF79C64EC701
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
                • Part of subcall function 00000001800113A8: Concurrency::details::ResourceManager::InitializeRMBuffers.LIBCONCRT ref: 00000001800113B8
                • Part of subcall function 00000001800113A8: Concurrency::details::HillClimbing::Update.LIBCONCRT ref: 000000018001145F
                • Part of subcall function 00000001800113A8: Concurrency::details::SchedulerProxy::AdjustAllocationIncrease.LIBCONCRT ref: 0000000180011477
              • Concurrency::details::ResourceManager::PreProcessDynamicAllocationData.LIBCONCRT ref: 000000018000F783
                • Part of subcall function 0000000180011510: Concurrency::details::ResourceManager::HandleBorrowedCores.LIBCMT ref: 0000000180011550
              • Concurrency::details::ResourceManager::IncreaseFullyLoadedSchedulerAllocations.LIBCONCRT ref: 000000018000F8B8
              • Concurrency::details::ResourceManager::AdjustDynamicAllocation.LIBCONCRT ref: 000000018000F925
              • Concurrency::details::ResourceManager::PrepareReceiversForCoreTransfer.LIBCONCRT ref: 000000018000F931
              • Concurrency::details::ResourceManager::DistributeExclusiveCores.LIBCONCRT ref: 000000018000F96B
              • Concurrency::details::ResourceManager::AdjustDynamicAllocation.LIBCONCRT ref: 000000018000F98B
              • Concurrency::details::ResourceManager::PrepareReceiversForCoreTransfer.LIBCONCRT ref: 000000018000F997
              • Concurrency::details::ResourceManager::DistributeIdleCores.LIBCMT ref: 000000018000F9A4
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: Concurrency::details::$Manager::Resource$Allocation$AdjustCoresDynamic$CoreDistributeIncreasePrepareReceiversSchedulerTransfer$AllocationsBorrowedBuffersClimbing::DataExclusiveFullyHandleHillIdleInitializeLoadedProcessProxy::Update
              • String ID:
              • API String ID: 2922458324-0
              • Opcode ID: 0e3d62a214c761d9851f84079443a1f1ce627719fd117a3a4d8ec4635577f3b6
              • Instruction ID: 53dda04e89d74bc466bcbb5e6ca23fb75d0606df30c5763af33de0a50843b131
              • Opcode Fuzzy Hash: 0e3d62a214c761d9851f84079443a1f1ce627719fd117a3a4d8ec4635577f3b6
              • Instruction Fuzzy Hash: 85719E72B006489BDBA5DE6AD244BBC77A5F388BC0F10812AEB0A83F54DF30D565CB40
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: Current$Concurrency::details::ErrorLastLibraryLoadProcessThread$AsyncDuplicateHandleReferenceRegisterWait
              • String ID:
              • API String ID: 1454699368-0
              • Opcode ID: 5817eb6275a6040e8c29b52868470e0e55ac724f13bdadd8073c8eba9c6163b7
              • Instruction ID: fd0410424cebf3536e894be3055f9e20582dfaf8040207deea37c931c2f489e5
              • Opcode Fuzzy Hash: 5817eb6275a6040e8c29b52868470e0e55ac724f13bdadd8073c8eba9c6163b7
              • Instruction Fuzzy Hash: AB316D31204B8982EB97DB21E8593DA73A1F7497C6F54C022FB9987699EF38C64DC740
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • Concurrency::details::WorkSearchContext::GetRunnableContextWithinGroup.LIBCONCRT ref: 00000001800284BD
                • Part of subcall function 00000001800275F0: Concurrency::details::WorkSearchContext::SkipSegmentSearch.LIBCONCRT ref: 000000018002762A
                • Part of subcall function 00000001800275F0: Concurrency::details::WorkSearchContext::GetRunnableContext.LIBCONCRT ref: 000000018002763C
                • Part of subcall function 00000001800275F0: Concurrency::details::WorkSearchContext::SkipSegmentSearch.LIBCONCRT ref: 0000000180027669
                • Part of subcall function 00000001800275F0: Concurrency::details::WorkSearchContext::GetRunnableContext.LIBCONCRT ref: 000000018002767B
              • Concurrency::details::SchedulingRing::GetPseudoRRNonAffineScheduleGroupSegment.LIBCONCRT ref: 0000000180028503
              • Concurrency::details::SchedulingRing::GetPseudoRRAffineScheduleGroupSegment.LIBCONCRT ref: 000000018002850A
                • Part of subcall function 0000000180027394: Concurrency::details::SchedulingRing::FindScheduleGroupSegment.LIBCONCRT ref: 00000001800273C8
                • Part of subcall function 0000000180027394: Concurrency::details::SchedulingRing::FindScheduleGroupSegment.LIBCONCRT ref: 00000001800273E6
              • Concurrency::details::WorkSearchContext::QuickSearch.LIBCONCRT ref: 0000000180028582
              • Concurrency::details::WorkSearchContext::SkipSegmentSearch.LIBCONCRT ref: 00000001800285A5
              • Concurrency::details::WorkSearchContext::GetRunnableContext.LIBCONCRT ref: 00000001800285B7
              • Concurrency::details::SchedulingRing::GetNextScheduleGroupSegment.LIBCONCRT ref: 00000001800285E5
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: Concurrency::details::$Search$Context::SegmentWork$Group$Ring::ScheduleScheduling$ContextRunnable$Skip$AffineFindPseudo$NextQuickWithin
              • String ID:
              • API String ID: 3862713884-0
              • Opcode ID: 3b4fa9c2bcc3e3bda7705f4becc5542b07d93b9400ce9f77ee7ead11fb4ea817
              • Instruction ID: 1cc98e2829a7e92e269e4045fe9a1790114b0f2867b32bd9a83cf9dd87d3b7d8
              • Opcode Fuzzy Hash: 3b4fa9c2bcc3e3bda7705f4becc5542b07d93b9400ce9f77ee7ead11fb4ea817
              • Instruction Fuzzy Hash: DB41187670679886FAA7CA1695007D96791BB4DFC8F04C125FE9807B9ACF38C64ADB00
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: CurrentThread$xtime_get
              • String ID:
              • API String ID: 1104475336-0
              • Opcode ID: b15f851a7382b51a61bf09cbef71fcbe87ef7a798c915736be742598f65ac943
              • Instruction ID: 8d8d08fbc13c1dd75e2995ad70824187da901de639845c461a311fc7b4cbb8a0
              • Opcode Fuzzy Hash: b15f851a7382b51a61bf09cbef71fcbe87ef7a798c915736be742598f65ac943
              • Instruction Fuzzy Hash: 4841FC32714649C6FBA6CF16E5803AE73A0E74EBC5F51C015FB5A826A1DF39CA89C701
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: Xinvalid_argumentstd::_
              • String ID: vector too long
              • API String ID: 909987262-2873823879
              • Opcode ID: 1631e66e1dc3b620ecf7517eac051954512b3964d693f7c6831cb6fcedf53d7c
              • Instruction ID: aa7cfb9ba72ed2715db543e39cba6a7a784a292792ae616fbb4cb2abbe88f8f1
              • Opcode Fuzzy Hash: 1631e66e1dc3b620ecf7517eac051954512b3964d693f7c6831cb6fcedf53d7c
              • Instruction Fuzzy Hash: 9E11273530068C96E959FA6294083DA6250B70CBF1F748F10BEBC07BC6CEB4C6498341
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • LoadLibraryExW.KERNEL32(?,?,00000000,000000018002CF3F,?,?,?,000000018002AC6E,?,?,?,0000000180029FF9), ref: 000000018002CDBF
              • GetLastError.KERNEL32(?,?,00000000,000000018002CF3F,?,?,?,000000018002AC6E,?,?,?,0000000180029FF9), ref: 000000018002CDCD
              • LoadLibraryExW.KERNEL32(?,?,00000000,000000018002CF3F,?,?,?,000000018002AC6E,?,?,?,0000000180029FF9), ref: 000000018002CDF7
              • FreeLibrary.KERNEL32(?,?,00000000,000000018002CF3F,?,?,?,000000018002AC6E,?,?,?,0000000180029FF9), ref: 000000018002CE3D
              • GetProcAddress.KERNEL32(?,?,00000000,000000018002CF3F,?,?,?,000000018002AC6E,?,?,?,0000000180029FF9), ref: 000000018002CE49
              Strings
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: Library$Load$AddressErrorFreeLastProc
              • String ID: api-ms-
              • API String ID: 2559590344-2084034818
              • Opcode ID: 1063e0f33c2b4715e19682f5c4eb7e687b8df8181800ba4d6310fa20ad64acb4
              • Instruction ID: ad3142f32d2403657df21bcdf1ffe6820a59cb9f1bf544a3ea77ba5627281b9a
              • Opcode Fuzzy Hash: 1063e0f33c2b4715e19682f5c4eb7e687b8df8181800ba4d6310fa20ad64acb4
              • Instruction Fuzzy Hash: 8031B631312B4895EEA7DB16A800BDA2398F74CBE4F5A8625BE1D47390DF38C649C341
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
              • String ID: CONOUT$
              • API String ID: 3230265001-3130406586
              • Opcode ID: 0e78c22a476fcb2aef03638f1ccbdbab3c1fd7eba0baffed66eb53b74e5273a8
              • Instruction ID: 2a05ffc0efa9eab8e12917efe3897a09ae9a5230df16b18db4cd48e71d5b8b72
              • Opcode Fuzzy Hash: 0e78c22a476fcb2aef03638f1ccbdbab3c1fd7eba0baffed66eb53b74e5273a8
              • Instruction Fuzzy Hash: AD11B631310B4886E7928B52E84439AB3A4F78CFE4F118225FA5E877A4DF3CC608C740
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: ByteCharFileMultiWide$CreateErrorLastSize_invalid_parameter_noinfo_noreturn
              • String ID:
              • API String ID: 25784916-0
              • Opcode ID: cbdbd438d8c8a87f796d49205b65102614d1f2159b7dfb1311c9c28d54ef1b2e
              • Instruction ID: 810606fb5a362a241cd492c83aa4aad49cd11c93d81088caaf7119844a5b4f3b
              • Opcode Fuzzy Hash: cbdbd438d8c8a87f796d49205b65102614d1f2159b7dfb1311c9c28d54ef1b2e
              • Instruction Fuzzy Hash: 0F51B03220478886EB55CF15E48439E77A0F3897E4F148225FBA947BE5DF38C6998B00
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: Scheduling$Concurrency::details::List$ArrayConcConcurrency::details::_EntryEventFreeInterlockedNodeNode::~RingRing::~SpinTracingUnregisterWait
              • String ID:
              • API String ID: 1521613620-0
              • Opcode ID: 7ce23d8fbe2741df9c0e488aaa763f028d8339bf93bafe7af59d63b9c1aa5024
              • Instruction ID: 8747156eb3b66dd9229c4ec0d0764c288993a03d963199fbc028624fc2bc2973
              • Opcode Fuzzy Hash: 7ce23d8fbe2741df9c0e488aaa763f028d8339bf93bafe7af59d63b9c1aa5024
              • Instruction Fuzzy Hash: CB414D32311A499AEB96DB26E4913D93360FB4CBC4F588021FE4D577A2DF39CA19C740
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: List$Interlocked$DepthEntryPushQuery$ArrayFlush
              • String ID:
              • API String ID: 2989968538-0
              • Opcode ID: 8be75197d286c72b889dcba972616b562f088d2f01ad1d96e8331dfbbb2c601c
              • Instruction ID: 2d89613041e76fc3fc83ceee19955f6cd5adbe81fc3fabb9f68913d32968499a
              • Opcode Fuzzy Hash: 8be75197d286c72b889dcba972616b562f088d2f01ad1d96e8331dfbbb2c601c
              • Instruction Fuzzy Hash: 9B418132608A4886DB97CF25D9803AD33A4F74CFC5F508115EE4A837A8CF39CA99C780
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • QueryDepthSList.KERNEL32(?,?,?,?,?,000000018001A094,?,?,00000000,000000018002564A), ref: 000000018001A158
              • InterlockedPushEntrySList.KERNEL32(?,?,?,?,?,000000018001A094,?,?,00000000,000000018002564A), ref: 000000018001A171
              • QueryDepthSList.KERNEL32(?,?,?,?,?,000000018001A094,?,?,00000000,000000018002564A), ref: 000000018001A17A
              • InterlockedFlushSList.KERNEL32(?,?,?,?,?,000000018001A094,?,?,00000000,000000018002564A), ref: 000000018001A1A1
              • Concurrency::details::SafePointInvocation::InvokeAtNextSafePoint.LIBCONCRT ref: 000000018001A1BD
              • InterlockedPushEntrySList.KERNEL32(?,?,?,?,?,000000018001A094,?,?,00000000,000000018002564A), ref: 000000018001A1C7
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: List$Interlocked$DepthEntryPointPushQuerySafe$Concurrency::details::FlushInvocation::InvokeNext
              • String ID:
              • API String ID: 80210428-0
              • Opcode ID: 7dd7381e94a82191db4763a50c7ac1549e3aeae17365284d8f5350acad4e9f4d
              • Instruction ID: 71afe95cc11e917144ca317d926105b37bbcdbfaa7f8e93d6b2639114d316da0
              • Opcode Fuzzy Hash: 7dd7381e94a82191db4763a50c7ac1549e3aeae17365284d8f5350acad4e9f4d
              • Instruction Fuzzy Hash: 86418F32208A4896EB96CF25D9403EE3360FB49FD9F408516EF4A43B59CF38CA58C740
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • QueryDepthSList.KERNEL32(?,?,?,?,?,000000018002480E,?,?,00000000,000000018002452F,?,?,00000000,00000001800240E9), ref: 0000000180024660
              • InterlockedPushEntrySList.KERNEL32(?,?,?,?,?,000000018002480E,?,?,00000000,000000018002452F,?,?,00000000,00000001800240E9), ref: 0000000180024679
              • QueryDepthSList.KERNEL32(?,?,?,?,?,000000018002480E,?,?,00000000,000000018002452F,?,?,00000000,00000001800240E9), ref: 0000000180024682
              • InterlockedFlushSList.KERNEL32(?,?,?,?,?,000000018002480E,?,?,00000000,000000018002452F,?,?,00000000,00000001800240E9), ref: 00000001800246A9
              • Concurrency::details::SafePointInvocation::InvokeAtNextSafePoint.LIBCONCRT ref: 00000001800246C5
              • InterlockedPushEntrySList.KERNEL32(?,?,?,?,?,000000018002480E,?,?,00000000,000000018002452F,?,?,00000000,00000001800240E9), ref: 00000001800246CF
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: List$Interlocked$DepthEntryPointPushQuerySafe$Concurrency::details::FlushInvocation::InvokeNext
              • String ID:
              • API String ID: 80210428-0
              • Opcode ID: 69ca52dfbcd46a33be6062ed68cc12ebff2211758cbc06aaea45b4180b891fcc
              • Instruction ID: c9f4dbc0db54afbed4848199b367dc12540a93a0cbad27b2cac6809af88475fa
              • Opcode Fuzzy Hash: 69ca52dfbcd46a33be6062ed68cc12ebff2211758cbc06aaea45b4180b891fcc
              • Instruction Fuzzy Hash: CF415532204A4886DB97CF25E5443AE7360FB49FC9F408116EE8A4BA58CF38CA58C781
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: List$Interlocked$DepthEntryPointPushQuerySafe$Concurrency::details::FlushInvocation::InvokeNext
              • String ID:
              • API String ID: 80210428-0
              • Opcode ID: 1d2441698d5fc04ef64b013fe7e42d0f76904406dbd255a685f388cc0236fda7
              • Instruction ID: 547dd04ca347c49f6e1845fc996934fd0024e54328f611e2c6c9ff36c826ce98
              • Opcode Fuzzy Hash: 1d2441698d5fc04ef64b013fe7e42d0f76904406dbd255a685f388cc0236fda7
              • Instruction Fuzzy Hash: CE414A32204A4896DB97DF65DA403AE73B4F749FC9F414126FE5A47A68CF38CA49C780
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: List$Interlocked$DepthEntryPointPushQuerySafe$Concurrency::details::FlushInvocation::InvokeNext
              • String ID:
              • API String ID: 80210428-0
              • Opcode ID: 22cd69ad9d10e19669a86acab0718bfad0ead22c5736897a55873594372613f0
              • Instruction ID: 877c4dfe6e63d245cf2589d463a33241e1d3bd866cdd8df9b00b9af34c65eaf9
              • Opcode Fuzzy Hash: 22cd69ad9d10e19669a86acab0718bfad0ead22c5736897a55873594372613f0
              • Instruction Fuzzy Hash: 7A416A32214A4886DBA6CF25E5403BE7360FB49FC9F50412AEE4A43759CF78CA4AC780
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: Is_bad_exception_allowedstd::bad_alloc::bad_alloc
              • String ID: csm$csm$csm
              • API String ID: 3523768491-393685449
              • Opcode ID: 5e79b6a5afa65a3934cd95f36f50dc0c15ebd5d4d675b7abfc1ccb47971440e4
              • Instruction ID: dce8c6019c0e4f679df539df1b3868637c05356975e714d3eba0f4300cd5ee15
              • Opcode Fuzzy Hash: 5e79b6a5afa65a3934cd95f36f50dc0c15ebd5d4d675b7abfc1ccb47971440e4
              • Instruction Fuzzy Hash: E4E1AE736046888AE7A3DF25D4843ED3BA0F749B98F148116FE8997796DF38D689C700
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: _invalid_parameter_noinfo_noreturn
              • String ID: Allocation failure$Broken input tensor$Broken output tensor$Model version unknown:
              • API String ID: 3668304517-3795033441
              • Opcode ID: aa4972cabae445d94ef9147087d795554d2b4bb37b04df3bd3c92b08a6e6ddd3
              • Instruction ID: a7bdeaf9ab473b072e4012d89d469f8fd6c857bc77d623c2cf3a884690ff845c
              • Opcode Fuzzy Hash: aa4972cabae445d94ef9147087d795554d2b4bb37b04df3bd3c92b08a6e6ddd3
              • Instruction Fuzzy Hash: D9E16A32214B4C81EE42DB6AE8903DA7361F78DBD4F449122FA4D577A5DF78C649C740
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • GetLogicalProcessorInformation.KERNEL32(?,?,?,?,?,?,00000000,0000000180010787,?,?,?,?,0000000180010EDE,00000000,00000000,?), ref: 000000018000D672
              • GetLastError.KERNEL32(?,?,?,?,?,?,00000000,0000000180010787,?,?,?,?,0000000180010EDE,00000000,00000000,?), ref: 000000018000D678
              • GetLogicalProcessorInformation.KERNEL32(?,?,?,?,?,?,00000000,0000000180010787,?,?,?,?,0000000180010EDE,00000000,00000000,?), ref: 000000018000D698
              • GetLastError.KERNEL32(?,?,?,?,?,?,00000000,0000000180010787,?,?,?,?,0000000180010EDE,00000000,00000000,?), ref: 000000018000D6B0
              • std::bad_alloc::bad_alloc.LIBCMT ref: 000000018000D6E5
              • GetLastError.KERNEL32(?,?,?,?,?,?,00000000,0000000180010787,?,?,?,?,0000000180010EDE,00000000,00000000,?), ref: 000000018000D6FC
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: ErrorLast$InformationLogicalProcessor$std::bad_alloc::bad_alloc
              • String ID:
              • API String ID: 1555479786-0
              • Opcode ID: 93f6165f1fa1bd510420f557588c4a9ef5a731289b8ab9d2e0404fe17cf55add
              • Instruction ID: 5935001264751c0dadffd42e61cc25672ad904baac92691e9dfb73048740559d
              • Opcode Fuzzy Hash: 93f6165f1fa1bd510420f557588c4a9ef5a731289b8ab9d2e0404fe17cf55add
              • Instruction Fuzzy Hash: B311543120454D82FB97EB65E9553EA63A1BB8C7C4F50C522F64D865A9EF6CC70CC740
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: Wait$Concurrency::details::ExecutionObjectProxy::SingleSpinSuspendThreadValue
              • String ID: pContext
              • API String ID: 77448541-2046700901
              • Opcode ID: 8ff913c706ca9ff3366c501102dd2d404dca0f5c04fd62acd1b2570584b481ff
              • Instruction ID: 45680babf578850b8fc4cecc38dca7ac9b33b4b003f6ce451f0b45bbf0370da7
              • Opcode Fuzzy Hash: 8ff913c706ca9ff3366c501102dd2d404dca0f5c04fd62acd1b2570584b481ff
              • Instruction Fuzzy Hash: A3415C72615A8C81EE93DB15E0903E82361FB9CBD5F548522FA5E4B7B5EF28C68DC700
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: Concurrency::details::FindMatchingNode::ProcessorSchedulingSpinSwitchThreadVirtualWait
              • String ID: count$ppVirtualProcessorRoots
              • API String ID: 1750512984-3650809737
              • Opcode ID: 6f671d5e895bd6d2b9bcbb94b01e313f1b2c2ce583abb39249fdf33aa0c8ef0d
              • Instruction ID: efb59ace586d6670fc848deb5d139e439421b84aea6cee44f3dbc8b9e041f93e
              • Opcode Fuzzy Hash: 6f671d5e895bd6d2b9bcbb94b01e313f1b2c2ce583abb39249fdf33aa0c8ef0d
              • Instruction Fuzzy Hash: 0E314C72B14A4881EF93DB11E8443E96760F79CBC4F448122BA8D47BAADF38C648C700
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: AddressFreeHandleLibraryModuleProc
              • String ID: CorExitProcess$mscoree.dll
              • API String ID: 4061214504-1276376045
              • Opcode ID: 5b1898540b1750ca1bdcc77a3aaf9761d95c7dabf0b9241a2073566f8c90fa91
              • Instruction ID: d61a94d72c583b4e3001ad20aa31565cbe75fa5d202247b9b537c6651c384f33
              • Opcode Fuzzy Hash: 5b1898540b1750ca1bdcc77a3aaf9761d95c7dabf0b9241a2073566f8c90fa91
              • Instruction Fuzzy Hash: 97F05E71311A4881EB9B9B61E4C03EA6360AB4D7C4F059019BA1F862A4CF6CC68DC300
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • _invalid_parameter_noinfo.LIBCMT ref: 00000001800340A5
              • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,0000000180034023,?,?,?,000000018002EF77), ref: 0000000180034164
              • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,0000000180034023,?,?,?,000000018002EF77), ref: 00000001800341E4
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: ConsoleErrorLastMode_invalid_parameter_noinfo
              • String ID:
              • API String ID: 2210144848-0
              • Opcode ID: 92e5c414bf72968bb723349aee617c9b7949639b3b9373e394971ba694430436
              • Instruction ID: bb9ef139b9f70d80f7cdc2a03172f1b4f7fb352f3ecc16157690fe92a96675c6
              • Opcode Fuzzy Hash: 92e5c414bf72968bb723349aee617c9b7949639b3b9373e394971ba694430436
              • Instruction Fuzzy Hash: 2D81B033610A0885FB979B65C9403EE67A0F79CBC8F868116FE0A6F7A5DF349649C710
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: CriticalSection$Leave$AllocationConcurrency::details::EnterEventManager::PerformResourceValue
              • String ID:
              • API String ID: 2618838645-0
              • Opcode ID: f288b7759366f7f5379f06c5907031907bc411e45a73196777d9d6597851e8f9
              • Instruction ID: a6051f6000cbdc107ce671d2c442b914405ed4c0c96d2c44ac2abbcb344101aa
              • Opcode Fuzzy Hash: f288b7759366f7f5379f06c5907031907bc411e45a73196777d9d6597851e8f9
              • Instruction Fuzzy Hash: 1B417232201B888BDBA5DF22A94139E77A4F389BC4F449429EF8A47761DF38D659C704
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: List$Interlocked$DepthEntryPushQuery$Flush
              • String ID:
              • API String ID: 358188281-0
              • Opcode ID: 588dbb8975edc9419d5280692cb7ae8be04778c384ed79b5ab2b2943a06a2f9c
              • Instruction ID: 43c0d5da3d49bfe65a6e64c2283908134b63014229195eaef8c34efa7d89a16e
              • Opcode Fuzzy Hash: 588dbb8975edc9419d5280692cb7ae8be04778c384ed79b5ab2b2943a06a2f9c
              • Instruction Fuzzy Hash: D9418D32614E4886EB57CF25E8403AE37A4FB48F85F548125EF4A53768CF34CA59CB40
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • Concurrency::details::InternalContextBase::ReclaimVirtualProcessor.LIBCONCRT ref: 000000018002244E
              • Concurrency::details::ScheduleGroupSegmentBase::ReleaseInternalContext.LIBCONCRT ref: 00000001800224E1
              • Concurrency::details::SchedulerBase::TriggerCommitSafePoints.LIBCONCRT ref: 00000001800224EF
              • Concurrency::details::SchedulerBase::VirtualProcessorActive.LIBCONCRT ref: 00000001800224FA
              • Concurrency::details::ScheduleGroupSegmentBase::AddRunnableContext.LIBCONCRT ref: 0000000180022563
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: Base::Concurrency::details::$Context$GroupInternalProcessorScheduleSchedulerSegmentVirtual$ActiveCommitPointsReclaimReleaseRunnableSafeTrigger
              • String ID:
              • API String ID: 2956896616-0
              • Opcode ID: 72db41979e72bc90aaec3be48ef5b1b6b5815178c7603e77f6eefea5c1ff67e1
              • Instruction ID: 31f733762b728fb0358b1c20a07b1504152b1f49e09c7e3f4404127d26207478
              • Opcode Fuzzy Hash: 72db41979e72bc90aaec3be48ef5b1b6b5815178c7603e77f6eefea5c1ff67e1
              • Instruction Fuzzy Hash: 77417D36604B5886EBA2DF6AD4403D977A0F78CFD8F158121EE9D57369CE38CA46C740
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • GetCurrentProcess.KERNEL32(?,?,?,?,?,?,?,?,00000000,0000000180010FD9,00000000,00000000,?,000000018000E233), ref: 000000018000E6B2
              • GetProcessAffinityMask.KERNEL32 ref: 000000018000E6C9
              • GetCurrentThread.KERNEL32 ref: 000000018000E6F6
              • Concurrency::details::platform::__GetThreadGroupAffinity.LIBCONCRT ref: 000000018000E70C
              • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,00000000,0000000180010FD9,00000000,00000000,?,000000018000E233), ref: 000000018000E7EA
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: AffinityCurrentProcessThread$Concurrency::details::platform::__ErrorGroupLastMask
              • String ID:
              • API String ID: 435244877-0
              • Opcode ID: 758a77939d4d9f17e5884e04accc38d1f4c934b24c161b6b69307ef48e630c68
              • Instruction ID: 9e01deb63b1cb90e7c442526a1fb3a08f680ed34f8465946a7de3bd24f996929
              • Opcode Fuzzy Hash: 758a77939d4d9f17e5884e04accc38d1f4c934b24c161b6b69307ef48e630c68
              • Instruction Fuzzy Hash: EC417E31219B8881EA92DB11A4503AA73E5FB8DBC4F54C515FA8D67395EF38C689C710
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • std::bad_alloc::bad_alloc.LIBCMT ref: 0000000180018BE3
                • Part of subcall function 0000000180029B1C: RtlPcToFileHeader.KERNEL32(?,?,?,?,?,?,?,?,?,00000001800011EF), ref: 0000000180029B60
                • Part of subcall function 0000000180029B1C: RaiseException.KERNEL32(?,?,?,?,?,?,?,?,?,00000001800011EF), ref: 0000000180029BA6
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: ExceptionFileHeaderRaisestd::bad_alloc::bad_alloc
              • String ID:
              • API String ID: 3034000755-0
              • Opcode ID: 2b8daec909379e47ac685e1d99e17bdea08a86985a012c866724fe1724c92126
              • Instruction ID: 5d888eb26ed73bd4b80a3427c820327582f8b951c81e5bcd5fdc2190f376673c
              • Opcode Fuzzy Hash: 2b8daec909379e47ac685e1d99e17bdea08a86985a012c866724fe1724c92126
              • Instruction Fuzzy Hash: 43318832204A8896EB92DB25E5903DE33A0FB497C4F448522EB9D07B92DF78C769D700
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • Concurrency::details::_NonReentrantBlockingLock::_NonReentrantBlockingLock.LIBCMT ref: 000000018000E1EA
                • Part of subcall function 000000018001E9A4: Concurrency::details::_NonReentrantBlockingLock::_NonReentrantBlockingLock.LIBCMT ref: 000000018001E9BE
                • Part of subcall function 0000000180010D7C: Concurrency::details::ResourceManager::RetrieveSystemVersionInformation.LIBCONCRT ref: 0000000180010DA1
                • Part of subcall function 0000000180010D7C: Concurrency::details::ResourceManager::GetTopologyInformation.LIBCMT ref: 0000000180010DD8
                • Part of subcall function 0000000180010D7C: Concurrency::details::ResourceManager::CleanupTopologyInformation.LIBCMT ref: 0000000180010F7F
              • Concurrency::details::ResourceManager::DetermineTopology.LIBCONCRT ref: 000000018000E236
                • Part of subcall function 000000018000ED84: Concurrency::details::ResourceManager::CleanupTopologyInformation.LIBCMT ref: 000000018000F0D5
              • VirtualAlloc.KERNEL32(?,?,?,?,?,?,?,000000018000EC6B,?,?,?,?,?,?,?,000000018001566F), ref: 000000018000E25E
              • std::bad_alloc::bad_alloc.LIBCMT ref: 000000018000E2B3
                • Part of subcall function 0000000180029B1C: RtlPcToFileHeader.KERNEL32(?,?,?,?,?,?,?,?,?,00000001800011EF), ref: 0000000180029B60
                • Part of subcall function 0000000180029B1C: RaiseException.KERNEL32(?,?,?,?,?,?,?,?,?,00000001800011EF), ref: 0000000180029BA6
              • __std_exception_copy.LIBVCRUNTIME ref: 000000018000E2F0
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: Concurrency::details::Manager::Resource$BlockingInformationReentrantTopology$CleanupConcurrency::details::_LockLock::_$AllocDetermineExceptionFileHeaderRaiseRetrieveSystemVersionVirtual__std_exception_copystd::bad_alloc::bad_alloc
              • String ID:
              • API String ID: 983300680-0
              • Opcode ID: d442c928d624787a3fda853e634209aca35bfdfbd30c7a6ea15904d83369dde4
              • Instruction ID: 9f60b4adb1159fc0c1ac68bb2accaccaa52e3c84a51b8403cc552af4869db711
              • Opcode Fuzzy Hash: d442c928d624787a3fda853e634209aca35bfdfbd30c7a6ea15904d83369dde4
              • Instruction Fuzzy Hash: 1231A232600B8881EB42DF35E4403DC73E8FB59BC8F14C226AA99477A5DF74C299C700
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: Concurrency::details::Work$FindNode::ProcessorSchedulingVirtual$AcquireConcurrency::details::_CriticalItemItem::Lock::_QueueReentrantStealingStructured
              • String ID:
              • API String ID: 3635831698-0
              • Opcode ID: 72799404756dc228b651c9c31dcfe6afc82671eb325ec1f0f2731f0b38ea0c55
              • Instruction ID: 1fe139c59fa50a80f7671a9df5e3cea73a34f15bd2b2b21df87c3f96a6cdcd85
              • Opcode Fuzzy Hash: 72799404756dc228b651c9c31dcfe6afc82671eb325ec1f0f2731f0b38ea0c55
              • Instruction Fuzzy Hash: D121B436701B8886E6E6DF16A9007DA63A2FBDDBC4F19C121FE4907B49DE34C645C700
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: _set_statfp
              • String ID:
              • API String ID: 1156100317-0
              • Opcode ID: aaf87cc118d4fd584d08f8b33a972802e2a81fa7332b720275d0146cfd78ccd9
              • Instruction ID: 3ab50db221792963f9633b82da94d81253e13da311b129489914d4533b9e249d
              • Opcode Fuzzy Hash: aaf87cc118d4fd584d08f8b33a972802e2a81fa7332b720275d0146cfd78ccd9
              • Instruction Fuzzy Hash: 3111CA33A15A0907F7EB11A8D5713EF13456F5D3F0F6BCB24B9A6462EB9E148B888300
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: Scheduler$Base::Concurrency::Concurrency::details::$CreateInitializingPolicyPolicy::Policy::operator=ReferenceSafeSpinWaitWithout
              • String ID:
              • API String ID: 372652889-0
              • Opcode ID: de2e33849618527186dbf9a31a1fa6fa21ae2b6d36e21104db14752d1cdd9b5a
              • Instruction ID: 46f53b1df55569baedbabd135fb0497853460d4eebadc6091e48b2e8a834c7e2
              • Opcode Fuzzy Hash: de2e33849618527186dbf9a31a1fa6fa21ae2b6d36e21104db14752d1cdd9b5a
              • Instruction Fuzzy Hash: C0212636210A4885EB83DB10E8423D973B0BB887C5F448425B95DA77A5EFAAC60CC740
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • Concurrency::details::_CriticalNonReentrantLock::_Acquire.LIBCMT ref: 00000001800140F0
                • Part of subcall function 000000018000DE70: _SpinWait.LIBCONCRT ref: 000000018000DE9F
              • Concurrency::details::SchedulerBase::UpdatePendingVersion.LIBCMT ref: 00000001800140F8
              • Concurrency::details::SchedulerBase::CommitToVersion.LIBCONCRT ref: 0000000180014104
              • Concurrency::details::_CriticalNonReentrantLock::_Acquire.LIBCMT ref: 000000018001410C
              • Concurrency::details::SchedulerBase::UpdateCommitVersion.LIBCMT ref: 0000000180014116
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: Base::Concurrency::details::SchedulerVersion$AcquireCommitConcurrency::details::_CriticalLock::_ReentrantUpdate$PendingSpinWait
              • String ID:
              • API String ID: 16787194-0
              • Opcode ID: fcbca9cc1d79e6081f3bf08e5711ae688cc90ff3b766a1de1ac9a714a492916e
              • Instruction ID: 17134fa615ed473659a5c08b55efe6edf565608c44f8c96c2e2cc1e578939bf0
              • Opcode Fuzzy Hash: fcbca9cc1d79e6081f3bf08e5711ae688cc90ff3b766a1de1ac9a714a492916e
              • Instruction Fuzzy Hash: 66F02E32B58A8881EAD6F71266413FE2211979CFC0F04D032BE070F757CE38C5464340
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: _invalid_parameter_noinfo_noreturn
              • String ID: filename$loggerCallback$sendFeatureVector
              • API String ID: 3668304517-2511990981
              • Opcode ID: c56addfd745ebcc680ccc4e992214513f549b40437aa214da53a842ef4108636
              • Instruction ID: bbdf4f8eb4097e1b8909c887c1080ab2d754c1af64a423cca516bece993587be
              • Opcode Fuzzy Hash: c56addfd745ebcc680ccc4e992214513f549b40437aa214da53a842ef4108636
              • Instruction Fuzzy Hash: FF718C32B00A5886EB51DBA6D8803DD3770F748BE8F458125EE5D57BAADF38C64AC740
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: CallEncodePointerTranslator
              • String ID: MOC$RCC
              • API String ID: 3544855599-2084237596
              • Opcode ID: 4371386e8cddaa3923960ee0d725b12641defddc3d34e1d605b28cf37edeb78a
              • Instruction ID: 824bf8557eaff3f386a8d2d8cabfb0f37d292e72e0fbf9dd9e925c1fa0caf814
              • Opcode Fuzzy Hash: 4371386e8cddaa3923960ee0d725b12641defddc3d34e1d605b28cf37edeb78a
              • Instruction Fuzzy Hash: 1D916D73A147988AE792DB65E8803DD7BA4F348788F14811AFF8957B55DF38C299CB00
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: AcquireConcurrency::details::_CriticalLock::_ReentrantValue
              • String ID: proc
              • API String ID: 2079939915-735085620
              • Opcode ID: c569424e7b736ad7fdda6d7747b2bcaa6978ea57bf8a1f01192bf6269ea483ce
              • Instruction ID: f6cc2352b960b29481a18899bd0b52a1cb72a36667d92e8c30ebce0173d50e13
              • Opcode Fuzzy Hash: c569424e7b736ad7fdda6d7747b2bcaa6978ea57bf8a1f01192bf6269ea483ce
              • Instruction Fuzzy Hash: F5615C72211B8886EBA6DB16E54039977A0F78CBD4F048126EB8D0B7A6DF38D659C700
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: Concurrency::cancel_current_taskXinvalid_argument_invalid_parameter_noinfo_noreturnstd::_
              • String ID: map/set too long
              • API String ID: 3916205989-558153379
              • Opcode ID: dd7b0b8dcb90e893a46a3627126984f2ee5b0c49b152000b012a935b89bbb2e1
              • Instruction ID: bc21823829bded6dee28e161b6c03fc97fab262acdd14ab898fc829799f23a5f
              • Opcode Fuzzy Hash: dd7b0b8dcb90e893a46a3627126984f2ee5b0c49b152000b012a935b89bbb2e1
              • Instruction Fuzzy Hash: A851AD32711A8881EA96DF65D4443EDB360F358BE0F948615AB6D07BD6CF7CD699C300
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: _invalid_parameter_noinfo_noreturn
              • String ID: GetThreatScore failed:
              • API String ID: 3668304517-801546470
              • Opcode ID: 09974367a4160ed531d8c31a469095cafe46d66c7af8c0b1a97bcd9f205a27ed
              • Instruction ID: 5d34bdc584a8912cda06a161c1e2a8addae55bb24a8b560c5b6ed7c53c626bc3
              • Opcode Fuzzy Hash: 09974367a4160ed531d8c31a469095cafe46d66c7af8c0b1a97bcd9f205a27ed
              • Instruction Fuzzy Hash: 68519FB2200BC889EB52DF64D4443DD2362FB49BC8F958455FA4D0BB9ADFB5C688D340
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: CriticalFreeProcessorSectionVirtual$Concurrency::details::EnterLeaveRootRoot::
              • String ID: pExecutionResource
              • API String ID: 2896577378-359481074
              • Opcode ID: f4bacf058b63a9818c229a63544e32cb32ac6545908049c6183f3b5771a381b9
              • Instruction ID: 37e62eee2dac12a2a43ca56b257be1a95e22fd57638579a04be2714c7b6ee7ac
              • Opcode Fuzzy Hash: f4bacf058b63a9818c229a63544e32cb32ac6545908049c6183f3b5771a381b9
              • Instruction Fuzzy Hash: BD417972210B8882EB81DF1AE84179977A1F798BC4F588026FB4D53B69DF38D669C740
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • Concurrency::details::ResourceManager::RetrieveSystemVersionInformation.LIBCONCRT ref: 0000000180010DA1
                • Part of subcall function 00000001800124D8: GetVersionExW.KERNEL32 ref: 00000001800124FE
              • Concurrency::details::ResourceManager::GetTopologyInformation.LIBCMT ref: 0000000180010DD8
              • Concurrency::details::ResourceManager::GetTopologyInformation.LIBCMT ref: 0000000180010ED9
                • Part of subcall function 0000000180010760: Concurrency::details::platform::__GetLogicalProcessorInformationEx.LIBCONCRT ref: 0000000180010774
              • Concurrency::details::ResourceManager::CleanupTopologyInformation.LIBCMT ref: 0000000180010F7F
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: Information$Concurrency::details::Manager::Resource$Topology$Version$CleanupConcurrency::details::platform::__LogicalProcessorRetrieveSystem
              • String ID:
              • API String ID: 1612325534-0
              • Opcode ID: 455f368313a9fcfb751ccc30f4282d0f73b6778842fdc578050adcfd5987d872
              • Instruction ID: f833b08f27b877e07d2523a4324f72119f4780206dbe89324b6633f7751a4e67
              • Opcode Fuzzy Hash: 455f368313a9fcfb751ccc30f4282d0f73b6778842fdc578050adcfd5987d872
              • Instruction Fuzzy Hash: D481333660094C86FBD7DB1198013EA73E1BB6C7C8F24C425BD96A76D1DEB9C69D9300
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: BlockingHillReentrantThread$ClimbingClimbing::Concurrency::details::Concurrency::details::_CurrentLockLock::_Priority
              • String ID:
              • API String ID: 2592465605-0
              • Opcode ID: a446d2abb11e3202d2ac9d8774e307a5762e41f765e5080b36f35db57f06e825
              • Instruction ID: 1719a9d2a06763b8e854093bdf5e4cf0d95e83c1cbee6f7ceb1a767c21303df8
              • Opcode Fuzzy Hash: a446d2abb11e3202d2ac9d8774e307a5762e41f765e5080b36f35db57f06e825
              • Instruction Fuzzy Hash: EC7192726047888BE769DF35E4417EEB7A5F748780F148129E79A83781EF38E648C744
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_copy__std_exception_destroy
              • String ID:
              • API String ID: 2138705365-0
              • Opcode ID: 26cb50d13ea3ceea226d7f4a0455424777dab18e546a0c8ec69b480fa4c1385d
              • Instruction ID: 16076da47b4c6dd793ab6bf6cc4124efc9b44390c245f868820cd4c149ad73f2
              • Opcode Fuzzy Hash: 26cb50d13ea3ceea226d7f4a0455424777dab18e546a0c8ec69b480fa4c1385d
              • Instruction Fuzzy Hash: ED517932710B8899EB42DF69E4403DC7361E749BD8F40D621EA5C57B9AEF78C698C340
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: Concurrency::details::$QuickSet::$Concurrency::location::locationContext::CountedGrowInterlockedReferenceResetSearchSpinWaitWork
              • String ID:
              • API String ID: 2301617228-0
              • Opcode ID: 2313a6843d1494c7203d277b4aa9b3468bc074860d8f886bf820acafd41234fb
              • Instruction ID: 77f273da2356f581a7eed8091f814d2372d910e132375e5452884224014caca2
              • Opcode Fuzzy Hash: 2313a6843d1494c7203d277b4aa9b3468bc074860d8f886bf820acafd41234fb
              • Instruction Fuzzy Hash: 99610476300B8897DB49CF2AD48079DB7A0F748B84F14812AEB9E97761CF35D56ACB00
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • Concurrency::details::ScheduleGroupSegmentBase::AddRunnableContext.LIBCONCRT ref: 0000000180022630
              • Concurrency::details::ScheduleGroupSegmentBase::ReleaseInternalContext.LIBCONCRT ref: 000000018002267D
              • Concurrency::details::VirtualProcessor::MakeAvailable.LIBCONCRT ref: 00000001800226F3
              • Concurrency::details::SchedulerBase::DeferredGetInternalContext.LIBCMT ref: 00000001800226FD
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: Concurrency::details::$Base::Context$GroupInternalScheduleSegment$AvailableDeferredMakeProcessor::ReleaseRunnableSchedulerVirtual
              • String ID:
              • API String ID: 1307474025-0
              • Opcode ID: f97807a0007a5d1daecb3826def7acefbf7cdda7bb48412481acae1da4fc26a2
              • Instruction ID: 09d1ef801deef5327938bbc24563a8fb7c5bf26a5ae6d4d12b7711596fff0908
              • Opcode Fuzzy Hash: f97807a0007a5d1daecb3826def7acefbf7cdda7bb48412481acae1da4fc26a2
              • Instruction Fuzzy Hash: 3B517A37204A4886EB96DF6AE84439A77A1F78CFC8F158121EE5D47B64DF39CA49C700
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_copy__std_exception_destroy
              • String ID:
              • API String ID: 2138705365-0
              • Opcode ID: f8230236fb4ed0a31c5a72375cde4ddb8fcd100ee545c8e52fe1ba2ed2cc4237
              • Instruction ID: 0c3854b8b47959c652a3f4ef8b858ce635c4d450eb406437444e923769256f9b
              • Opcode Fuzzy Hash: f8230236fb4ed0a31c5a72375cde4ddb8fcd100ee545c8e52fe1ba2ed2cc4237
              • Instruction Fuzzy Hash: D3416072211A8895EB56DF25E0943DD3361E748BC8F949022EB4C4779AEF78CAD9C380
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • Concurrency::details::SchedulerBase::FindNodeByLocation.LIBCONCRT ref: 0000000180014A8F
              • Concurrency::details::SchedulingNode::FoundAvailableVirtualProcessor.LIBCONCRT ref: 0000000180014AC5
              • Concurrency::details::SchedulingNode::FoundAvailableVirtualProcessor.LIBCONCRT ref: 0000000180014B2F
              • Concurrency::details::SchedulingNode::FoundAvailableVirtualProcessor.LIBCONCRT ref: 0000000180014B7A
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: Concurrency::details::$AvailableFoundNode::ProcessorSchedulingVirtual$Base::FindLocationNodeScheduler
              • String ID:
              • API String ID: 1198557233-0
              • Opcode ID: 763a8de8c957a89945a2795c0b4c4b328abe45c3a3d7ae068804a46473bc5f36
              • Instruction ID: c4cb781b81da52cd8c617f7567243802ab7da567749ea1cf40f22ca7c8fcde7c
              • Opcode Fuzzy Hash: 763a8de8c957a89945a2795c0b4c4b328abe45c3a3d7ae068804a46473bc5f36
              • Instruction Fuzzy Hash: 2941A673B10B488AEB91CB66D58079D33A0F748BC8F158112EF586B795DB34C556C780
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • Concurrency::details::_TaskCollection::_AbortiveSweep.LIBCONCRT ref: 000000018001AE1B
              • Concurrency::details::_TaskCollection::_NotifyCompletedChoreAndFree.LIBCONCRT ref: 000000018001AE9B
              • Concurrency::details::_TaskCollection::_Cancel.LIBCMT ref: 000000018001AEDD
              • Concurrency::details::_TaskCollection::_Reset.LIBCONCRT ref: 000000018001AF37
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: Collection::_Concurrency::details::_Task$AbortiveCancelChoreCompletedFreeNotifyResetSweep
              • String ID:
              • API String ID: 3964913174-0
              • Opcode ID: a14262f72eca1d5f5655e202a8a3d47b8dabbcc5bfeda6ea71ea4fd603b4c45b
              • Instruction ID: 2a3e1b81b47756c30f567a9a43683ee448c2d3b0e2891f83fac54bf91391b155
              • Opcode Fuzzy Hash: a14262f72eca1d5f5655e202a8a3d47b8dabbcc5bfeda6ea71ea4fd603b4c45b
              • Instruction Fuzzy Hash: 98411C72205B888AFBE68F25D5443E977A1E74AFC4F188035EE494B799CF34D649C710
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • Concurrency::details::WorkItem::WorkItem.LIBCONCRT ref: 00000001800272CC
              • Concurrency::details::_CriticalNonReentrantLock::_Acquire.LIBCMT ref: 000000018002732B
                • Part of subcall function 000000018000DE70: _SpinWait.LIBCONCRT ref: 000000018000DE9F
              • StructuredWorkStealingQueue.LIBCONCRT ref: 0000000180027336
                • Part of subcall function 0000000180020CCC: Concurrency::details::SafePointInvocation::InvokeAtNextSafePoint.LIBCONCRT ref: 0000000180020D9B
              • Concurrency::details::WorkItem::WorkItem.LIBCONCRT ref: 0000000180027354
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: Work$Concurrency::details::$ItemItem::PointSafe$AcquireConcurrency::details::_CriticalInvocation::InvokeLock::_NextQueueReentrantSpinStealingStructuredWait
              • String ID:
              • API String ID: 3311346050-0
              • Opcode ID: 1bb918413cfec44003d50d172b849e67a5f36f0587ab6a6590aa5b4e2711ff11
              • Instruction ID: 7434165486fa951d26cfd5e9d9408af0c2b8152a23d3865de920dd05e719b00a
              • Opcode Fuzzy Hash: 1bb918413cfec44003d50d172b849e67a5f36f0587ab6a6590aa5b4e2711ff11
              • Instruction Fuzzy Hash: C3318972600B8886E796CF29D5013AAB7A2F799BC0F64C211EA4D43756DF34D649C740
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: Base::Concurrency::details::ContextEntryInterlockedList$BlockedInternalSchedulerSpinUntil
              • String ID:
              • API String ID: 1869031259-0
              • Opcode ID: 61fb6ae1296a4008d24acf072f97957544cebbbe42ef8fdeb37611402748e7ef
              • Instruction ID: d020fafc0cee0fca5181341111d8609681b4ce98ca4c3360e48a67d063b6c28d
              • Opcode Fuzzy Hash: 61fb6ae1296a4008d24acf072f97957544cebbbe42ef8fdeb37611402748e7ef
              • Instruction Fuzzy Hash: 4A317E32315E88D6EB869B65E5843ED7360F75DBC5F188125EB9E4B3A1DF29C61C8300
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • GetCurrentThread.KERNEL32 ref: 000000018001C29C
                • Part of subcall function 000000018000E18C: Concurrency::details::platform::__GetThreadGroupAffinity.LIBCONCRT ref: 000000018000E1A4
              • Concurrency::details::SchedulerProxy::IncrementCoreSubscription.LIBCONCRT ref: 000000018001C2FF
                • Part of subcall function 000000018001DC5C: SetEvent.KERNEL32(?,?,?,?,000000018001C304,?,?,?,?,?,?,?,?,00000001,000000018001D28B), ref: 000000018001DCAA
                • Part of subcall function 000000018001CE84: EnterCriticalSection.KERNEL32(?,?,00000000,000000018001C310,?,?,?,?,?,?,?,?,00000001,000000018001D28B), ref: 000000018001CE9D
                • Part of subcall function 000000018001CE84: LeaveCriticalSection.KERNEL32(?,?,00000000,000000018001C310,?,?,?,?,?,?,?,?,00000001,000000018001D28B), ref: 000000018001CF03
              • Concurrency::details::SchedulerProxy::AddThreadSubscription.LIBCMT ref: 000000018001C315
              • Concurrency::details::ExecutionResource::SetAsCurrent.LIBCONCRT ref: 000000018001C31D
                • Part of subcall function 000000018001DCB8: Concurrency::details::SchedulerProxy::ToggleBorrowedState.LIBCONCRT ref: 000000018001DD19
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: Concurrency::details::$Proxy::SchedulerThread$CriticalCurrentSectionSubscription$AffinityBorrowedConcurrency::details::platform::__CoreEnterEventExecutionGroupIncrementLeaveResource::StateToggle
              • String ID:
              • API String ID: 4197267998-0
              • Opcode ID: 8fcf917c14205c03625a25cf852a3a2686d7a86d82e8c132fa597aef5dac83f5
              • Instruction ID: 0712888eb738543d960ba6a6eb4c35a95d386bc884cae94adec2dd2b5960ea92
              • Opcode Fuzzy Hash: 8fcf917c14205c03625a25cf852a3a2686d7a86d82e8c132fa597aef5dac83f5
              • Instruction Fuzzy Hash: 83217C32304A4883DB95DB22E2513AE73A1F78CBC4F048216FB8D87B45EF29D265CB45
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: Concurrency::details::$Base::ContextInternal$AvailableDeferredGroupMakeProcessor::ScheduleSchedulerSegmentSpinVirtualWait
              • String ID:
              • API String ID: 1852521823-0
              • Opcode ID: e7d23a4c0cf018b203062ea5d7f281ae44d744e713e415e88a2a6859c734be00
              • Instruction ID: bde905c406e7abd677e1766129ef0d12308c9fca782121e8d720dd2258b9f592
              • Opcode Fuzzy Hash: e7d23a4c0cf018b203062ea5d7f281ae44d744e713e415e88a2a6859c734be00
              • Instruction Fuzzy Hash: 49212836200B9881EB92DB1AD5943A97361EB88FD4F588122EE4D47B69DF28C6498700
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: CriticalSection$EnterEventLeaveSpinWait
              • String ID:
              • API String ID: 3811445208-0
              • Opcode ID: 1c8c61c239dad82dedd682abc8d5d34ffefe9d1947a5fbd6648e8a08d35ce324
              • Instruction ID: 64d7979d88d4fa9ec178dbb0c97201a91d44f41cfa9ae7ffc9d27deef7ef6dbe
              • Opcode Fuzzy Hash: 1c8c61c239dad82dedd682abc8d5d34ffefe9d1947a5fbd6648e8a08d35ce324
              • Instruction Fuzzy Hash: 5621A432600A4886E782DF25E9853DD33A4FB487D4F50C136FA19636A1DF79CE19C780
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • EnterCriticalSection.KERNEL32 ref: 0000000180012013
              • Concurrency::details::ExecutionResource::DecrementUseCounts.LIBCONCRT ref: 0000000180012020
                • Part of subcall function 000000018001C1A4: Concurrency::details::ExecutionResource::ResetCurrent.LIBCMT ref: 000000018001C1BB
                • Part of subcall function 000000018001C1A4: Concurrency::details::SchedulerProxy::DecrementFixedCoreCount.LIBCONCRT ref: 000000018001C1DB
                • Part of subcall function 000000018001C1A4: GetCurrentThread.KERNEL32 ref: 000000018001C1E5
                • Part of subcall function 000000018001C1A4: Concurrency::details::SchedulerProxy::DecrementCoreSubscription.LIBCONCRT ref: 000000018001C1FE
              • LeaveCriticalSection.KERNEL32 ref: 0000000180012063
              • SetEvent.KERNEL32 ref: 0000000180012072
                • Part of subcall function 000000018000F1E0: Concurrency::details::SchedulerProxy::AdjustAllocationIncrease.LIBCONCRT ref: 000000018000F24F
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: Concurrency::details::$DecrementProxy::Scheduler$CoreCriticalCurrentExecutionResource::Section$AdjustAllocationCountCountsEnterEventFixedIncreaseLeaveResetSubscriptionThread
              • String ID:
              • API String ID: 162086165-0
              • Opcode ID: 037e64564f0fc4dfe1d24744ffc125a9e7bd060ef34725b2c2d88059c4ad7338
              • Instruction ID: 76dbcdd55771bca3cc980fe3799f643ad69109957345c17c942bbe333508a94e
              • Opcode Fuzzy Hash: 037e64564f0fc4dfe1d24744ffc125a9e7bd060ef34725b2c2d88059c4ad7338
              • Instruction Fuzzy Hash: E901AD32604A8887E75AEB26E4507AA7360F789BD0F198025EF8953392EF34C666C700
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: Concurrency::details::QueueScheduler$Base::Concurrency::critical_section::_ContextCreateDefaultFromLockNode::PositionSwitch_to_activeUpdateValue
              • String ID:
              • API String ID: 1678191722-0
              • Opcode ID: af3296ac82e2d3c8f278098c95d03eb9a69aac38551136a6d24074a509aea093
              • Instruction ID: dec8163d101cc94a85ecff489abad6414c1f8417d0d647131b7473dcdd0c6ea7
              • Opcode Fuzzy Hash: af3296ac82e2d3c8f278098c95d03eb9a69aac38551136a6d24074a509aea093
              • Instruction Fuzzy Hash: 31113C32B1061899FB82DF60D8513ED33B0BB4C78CF544619FE1A2A689DF798259C794
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: Concurrency::critical_section::_Scheduler$Acquire_lockBase::Concurrency::details::ContextCreateDefaultFromSwitch_to_activeValue
              • String ID:
              • API String ID: 4093027906-0
              • Opcode ID: ba9e13480b27a333f7121fa82a00976ce5789e9aa06b39ef917404b7fe4f2e56
              • Instruction ID: 1c17a6259f12485a3f4b524b13791baa4c2a802505655e802b3d32dab83c21df
              • Opcode Fuzzy Hash: ba9e13480b27a333f7121fa82a00976ce5789e9aa06b39ef917404b7fe4f2e56
              • Instruction Fuzzy Hash: 3CF06D7621270882FB92DB14D01A3AA32A0A78CB84F145214FA480B382DFBD8749CB51
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: __except_validate_context_record
              • String ID: csm$csm
              • API String ID: 1467352782-3733052814
              • Opcode ID: 812e0cc398ba664f876be7a98dcf327c6e2c86e533f8ed13473d7b5b0a1d1c6d
              • Instruction ID: fe8908af77dad328f686e6bfb2135a430cb140aa63444c0a78cc544b0344de4a
              • Opcode Fuzzy Hash: 812e0cc398ba664f876be7a98dcf327c6e2c86e533f8ed13473d7b5b0a1d1c6d
              • Instruction Fuzzy Hash: A9718E722056C486DBE38F25D5907E97BA0E348BC4F18C116FF8987A85DF38C699CB41
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: _handle_error
              • String ID: "$log2
              • API String ID: 1757819995-536339484
              • Opcode ID: 574219675866c801c13699befd2ef8cf2cbb99eb4fc4d3b3470af94f6930b286
              • Instruction ID: 160f95ae64f405497d46d1c2f3d7d364adf7e2abef3f17b2cb47beabb85018ff
              • Opcode Fuzzy Hash: 574219675866c801c13699befd2ef8cf2cbb99eb4fc4d3b3470af94f6930b286
              • Instruction Fuzzy Hash: 18710772924F4C86D6538B35A8103A2A354AFAE3D4F11D317F91B32B75EF69C1874700
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: _handle_error
              • String ID: !$fmod
              • API String ID: 1757819995-3213614193
              • Opcode ID: 43c9576242c09b851fedde2eb349a14019b3a69ed2b670bb861790426b931595
              • Instruction ID: 1622e057745ed63a34762a9530b96130bad55888eb5b35fe87d3818f05364f0a
              • Opcode Fuzzy Hash: 43c9576242c09b851fedde2eb349a14019b3a69ed2b670bb861790426b931595
              • Instruction Fuzzy Hash: A351C631A25F8C89E2B35731A0117F6AB68AFAA3CCF02D712F94E315B3DB15964B4744
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: CreateFrameInfo__except_validate_context_record
              • String ID: csm
              • API String ID: 2558813199-1018135373
              • Opcode ID: e2899e34cbcc41309953cd756643fc4dac0af721511907693a15bcda8eea96be
              • Instruction ID: 65c08328f34712e18f2ecfcf19c523f99071c0451dae3bea0d85039933236bd4
              • Opcode Fuzzy Hash: e2899e34cbcc41309953cd756643fc4dac0af721511907693a15bcda8eea96be
              • Instruction Fuzzy Hash: 93515A3221974887E6A2EB26E04079E77A4F38DBE0F149525EF8D07B56CF38C569CB41
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: FileFindHeaderInstanceTargetType
              • String ID: Bad dynamic_cast!
              • API String ID: 746355257-2956939130
              • Opcode ID: a28ba8094a567ef1c245d18d209243cfb0f08af3f69ce8c77cffaee78b6e9a96
              • Instruction ID: 7fe227c41565a159740cb04b309891464b6f5e07b61de51d0b142d81b554bff4
              • Opcode Fuzzy Hash: a28ba8094a567ef1c245d18d209243cfb0f08af3f69ce8c77cffaee78b6e9a96
              • Instruction Fuzzy Hash: 45418332319A4887EEA7CB61E9807EA6391BB49BD4F00C525FE4E43B55DF38C649C701
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • std::bad_alloc::bad_alloc.LIBCMT ref: 00000001800374C6
                • Part of subcall function 0000000180029B1C: RtlPcToFileHeader.KERNEL32(?,?,?,?,?,?,?,?,?,00000001800011EF), ref: 0000000180029B60
                • Part of subcall function 0000000180029B1C: RaiseException.KERNEL32(?,?,?,?,?,?,?,?,?,00000001800011EF), ref: 0000000180029BA6
                • Part of subcall function 000000018002DA48: IsProcessorFeaturePresent.KERNEL32(?,?,?,?,0000000180030117,?,?,?,000000018002DA21,?,?,?,?,000000018000A4F9), ref: 000000018002DA6E
              • RaiseException.KERNEL32 ref: 00000001800375EC
              Strings
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: ExceptionRaise$FeatureFileHeaderPresentProcessorstd::bad_alloc::bad_alloc
              • String ID: csm
              • API String ID: 3733147877-1018135373
              • Opcode ID: 7d70959d942fd242ed681644b929b55a12fc151f3ba50bbc7986465b8d480bb1
              • Instruction ID: 8a9e59e220ae53030064d9e21590922e22ba97a8e2338937bf3ebb18093fb9a4
              • Opcode Fuzzy Hash: 7d70959d942fd242ed681644b929b55a12fc151f3ba50bbc7986465b8d480bb1
              • Instruction Fuzzy Hash: 9C415F32A00F8886EB66CF28C4513E923A0F798B9CF56D715EA5D07696EF35D2D9C300
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: ErrorFileLastWrite
              • String ID: U
              • API String ID: 442123175-4171548499
              • Opcode ID: 3de79dc242505b07ae1abc2a73d22a70d7c6ccdec85bc2c3c545d3d519c0d92a
              • Instruction ID: cf6f899fc4f802489063336ec8bf1611653fdc3bbfd9c67faa3a43d4c9d6d63c
              • Opcode Fuzzy Hash: 3de79dc242505b07ae1abc2a73d22a70d7c6ccdec85bc2c3c545d3d519c0d92a
              • Instruction Fuzzy Hash: 2B419132714A8885DBA29F26E8853DAA760F788BD4F858025EE4D87798DF3CC645C740
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • Concurrency::details::SchedulingNode::AddVirtualProcessor.LIBCONCRT ref: 0000000180013A77
              Strings
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: Concurrency::details::Node::ProcessorSchedulingVirtual
              • String ID: count$ppVirtualProcessorRoots
              • API String ID: 1591805538-3650809737
              • Opcode ID: a0e5835a6344f093de159a77c160f33f9ab342a5d73b708960a9a7b9e93e063a
              • Instruction ID: 3821484c48d09f9a9f090e9765ef45165cf1cafd567b4cda70015f77920b9ffa
              • Opcode Fuzzy Hash: a0e5835a6344f093de159a77c160f33f9ab342a5d73b708960a9a7b9e93e063a
              • Instruction Fuzzy Hash: 72415B32310B4881EB92DB16E8913997760FB8CFC4F948026EB8D47B6ADF38C659C700
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: ObjectSignalWait
              • String ID: pContext$switchState
              • API String ID: 975219787-2660820399
              • Opcode ID: 0169afa3fee532ba72c33dfa8b2437c13730190044d0e27db5deec94fe733340
              • Instruction ID: 347e1c7ad5a2a72d2ccb30537953f435b54203a04a0b68ce87e7fb8bd5fbc772
              • Opcode Fuzzy Hash: 0169afa3fee532ba72c33dfa8b2437c13730190044d0e27db5deec94fe733340
              • Instruction Fuzzy Hash: 73316A72B00A5C86EEA3EF16D4403996361F78CBC5F558122EE5D57BA9DF38C649C340
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
                • Part of subcall function 0000000180023038: Concurrency::details::QuickBitSet::CopyFrom.LIBCONCRT ref: 00000001800230B7
              • ListArray.LIBCONCRT ref: 0000000180023245
                • Part of subcall function 0000000180012CFC: InitializeSListHead.KERNEL32(?,?,-00000010,0000000180012ECD,?,?,?,?,?,?,?,?,?,00000000), ref: 0000000180012DF6
                • Part of subcall function 0000000180012CFC: InitializeSListHead.KERNEL32(?,?,-00000010,0000000180012ECD,?,?,?,?,?,?,?,?,?,00000000), ref: 0000000180012E00
              • ListArray.LIBCONCRT ref: 000000018002325F
                • Part of subcall function 0000000180024130: Concurrency::details::QuickBitSet::CopyFrom.LIBCONCRT ref: 0000000180024219
                • Part of subcall function 0000000180024130: Concurrency::details::QuickBitSet::CopyFrom.LIBCONCRT ref: 0000000180024238
              Strings
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: List$Concurrency::details::CopyFromQuickSet::$ArrayHeadInitialize
              • String ID: @
              • API String ID: 776595850-2766056989
              • Opcode ID: 0eb6b5938b7934dd16a0e0e4818bb68304ec8511b08e4cc70c6ece5e428f9817
              • Instruction ID: bc6de1f3fc77aae6fa065cf9e48ba8c0f6a7822532c18aa5da5a00c7a29e6926
              • Opcode Fuzzy Hash: 0eb6b5938b7934dd16a0e0e4818bb68304ec8511b08e4cc70c6ece5e428f9817
              • Instruction Fuzzy Hash: 37217AB3310B448AE741DF16E484BD937A4F358BD8F518126AF08177A6DF79CA4AC780
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: Stringtry_get_function
              • String ID: LCMapStringEx
              • API String ID: 2588686239-3893581201
              • Opcode ID: e8f0f13caa44bee498630a37b98a2733a70e1ebac26eb06c0e71ec03aa281e23
              • Instruction ID: 9faf4352472cc79a1a9b166a7aa91c1115597cd1f1dba8a4829c910c6255de11
              • Opcode Fuzzy Hash: e8f0f13caa44bee498630a37b98a2733a70e1ebac26eb06c0e71ec03aa281e23
              • Instruction Fuzzy Hash: D411F736608B848AD7A1CB56B4803DAB7A5F7CDBD4F548126AE8D83B59CF38C6548B00
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: _handle_error
              • String ID: !$sqrt
              • API String ID: 1757819995-799759792
              • Opcode ID: fc8446555919a20efff24d6c0ef23ee340cdea9fab5e0a66315abe56c0292a22
              • Instruction ID: 28d56ad028463eaf7402602832fe2c7f548b582d070d8c207af4e0d99e9e6b07
              • Opcode Fuzzy Hash: fc8446555919a20efff24d6c0ef23ee340cdea9fab5e0a66315abe56c0292a22
              • Instruction Fuzzy Hash: E411D372A04B8882DE53CF20A44036B6761FB9E7E4F20C325BA6816BCCDF6CC1459B00
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • RtlPcToFileHeader.KERNEL32(?,?,?,?,?,?,?,?,?,00000001800011EF), ref: 0000000180029B60
              • RaiseException.KERNEL32(?,?,?,?,?,?,?,?,?,00000001800011EF), ref: 0000000180029BA6
              Strings
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: ExceptionFileHeaderRaise
              • String ID: csm
              • API String ID: 2573137834-1018135373
              • Opcode ID: 1fd22d28296e473ce5f87115776576afc4d1533ee4c7d318890df9b6a7d41f49
              • Instruction ID: 99bc8f1a6482998f167a3eeac0e6b5b3a364d2bb32104b425a3bc977229fd7c8
              • Opcode Fuzzy Hash: 1fd22d28296e473ce5f87115776576afc4d1533ee4c7d318890df9b6a7d41f49
              • Instruction Fuzzy Hash: 51111F32215B8882EB638F55F54039AB7A5F788BD4F598225EF8D07764DF38C6558B00
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: _handle_error
              • String ID: "$exp
              • API String ID: 1757819995-2878093337
              • Opcode ID: e9482537efc6fcbf96562f3b9f671019e3d06f1206ce7124f34d97b4c397b337
              • Instruction ID: 9d0bee107232a29f29c4ba45bc19057e8c6cc479758bd058127d97b42bf55ac4
              • Opcode Fuzzy Hash: e9482537efc6fcbf96562f3b9f671019e3d06f1206ce7124f34d97b4c397b337
              • Instruction Fuzzy Hash: F201847AA24B88C7E262CF24D4493DB77A0FFEE744F605305F7401A660DB79D5859B00
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: CountCriticalInitializeSectionSpintry_get_function
              • String ID: InitializeCriticalSectionEx
              • API String ID: 539475747-3084827643
              • Opcode ID: 30343cd5a2772411daaa5f3fc0021a60ebed0994992bf8c060d39bf64b92e375
              • Instruction ID: 471d3186d97f6ccab35c77eed7038ca223386080899b2054a8ab17610b728aab
              • Opcode Fuzzy Hash: 30343cd5a2772411daaa5f3fc0021a60ebed0994992bf8c060d39bf64b92e375
              • Instruction Fuzzy Hash: AEF05E35600A9886E7879B82A4407DA2721BB8CBD5F86D025FA1A43B54CF38C759C750
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • try_get_function.LIBVCRUNTIME ref: 0000000180031571
              • TlsSetValue.KERNEL32(?,?,00007C8ED7143187,000000018003020A,?,?,00007C8ED7143187,000000018002F6AD,?,?,?,?,0000000180035E5A,?,?,00000000), ref: 0000000180031588
              Strings
              Memory Dump Source
              • Source File: 00000003.00000002.2360134402.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
              • Associated: 00000003.00000002.2360112134.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360162737.000000018003B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360185752.0000000180053000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360201231.0000000180054000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360217577.0000000180058000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.000000018005B000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000003.00000002.2360232467.0000000180061000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_180000000_rundll32.jbxd
              Similarity
              • API ID: Valuetry_get_function
              • String ID: FlsSetValue
              • API String ID: 738293619-3750699315
              • Opcode ID: a3197183a4e848e6c7b709c60a51426306ee2206858a4b1ad9580352d8d9dde3
              • Instruction ID: 05f94f14d6337356ab5ce865a5df926a6b9d73ec3ec4d1032dfcaa2a8b3e35d2
              • Opcode Fuzzy Hash: a3197183a4e848e6c7b709c60a51426306ee2206858a4b1ad9580352d8d9dde3
              • Instruction Fuzzy Hash: B2E06DB1300A4C96EB874B94E4407E72322BB8C7D6F8AC022BA1A47294CE38CA5CC701
              Uniqueness

              Uniqueness Score: -1.00%

              Execution Graph

              Execution Coverage:32.5%
              Dynamic/Decrypted Code Coverage:100%
              Signature Coverage:90.9%
              Total number of Nodes:11
              Total number of Limit Nodes:1
              execution_graph 251 195b4460000 254 195b44600ce 251->254 255 195b44602a1 LoadLibraryA 254->255 257 195b446059a WSAStartup socket 255->257 259 195b4460011 257->259 260 195b44607cc connect 257->260 262 195b4460814 send 260->262 264 195b4460876 send 262->264 268 195b44608c1 264->268 266 195b44608cd recv 266->268 267 195b44608ed recv 267->267 267->268 268->266 268->267

              Callgraph

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 0 195b44600ce-195b446029b 1 195b4460344-195b4460345 0->1 2 195b44602a1-195b44602a5 0->2 3 195b4460347-195b446034f 1->3 2->1 4 195b44602ab-195b44602b2 2->4 5 195b44603d7-195b44603d8 3->5 6 195b4460355-195b4460362 3->6 7 195b446033b-195b446033e 4->7 8 195b44602b8-195b44602c3 4->8 9 195b44603da-195b44607c6 LoadLibraryA WSAStartup socket 5->9 6->5 10 195b4460364-195b4460372 6->10 7->1 7->2 11 195b44602c5-195b44602c8 8->11 12 195b4460322-195b446032b 8->12 64 195b446098c-195b44609a0 9->64 65 195b44607cc-195b4460812 connect 9->65 10->5 15 195b4460374-195b4460385 10->15 16 195b44602cd-195b44602d9 11->16 13 195b4460338-195b4460339 12->13 14 195b446032d-195b4460332 12->14 13->7 14->13 17 195b4460977-195b446097b 14->17 19 195b446038d-195b446039c 15->19 16->12 20 195b44602db-195b44602f0 16->20 17->3 23 195b446039e-195b44603a4 19->23 21 195b44602fa-195b4460301 20->21 22 195b44602f2-195b44602f8 20->22 26 195b446030b-195b446030e 21->26 27 195b4460303-195b4460309 21->27 22->21 24 195b44603b6-195b44603bb 23->24 25 195b44603a6-195b44603aa 23->25 30 195b44603c7-195b44603d5 24->30 31 195b44603bd-195b44603c1 24->31 25->24 29 195b44603ac-195b44603b4 25->29 26->12 32 195b4460310-195b4460320 26->32 27->26 29->23 29->24 30->5 30->19 31->30 33 195b4460980-195b4460987 31->33 32->12 32->16 33->9 68 195b4460814 65->68 69 195b4460842-195b44608c5 send * 2 65->69 70 195b446081d-195b4460840 68->70 78 195b44608cd-195b44608e5 recv 69->78 70->69 79 195b44608e7 78->79 80 195b446090f-195b4460972 78->80 81 195b44608ed-195b446090d recv 79->81 80->78 81->80 81->81
              APIs
              Strings
              Memory Dump Source
              • Source File: 0000000C.00000002.3247162979.00000195B4460000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000195B4460000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_12_2_195b4460000_rundll32.jbxd
              Similarity
              • API ID: recvsend$LibraryLoadStartupconnectsocket
              • String ID: 185.$19.2$21.1$32.d$Allo$ForM$GetP$Heap$Sele$Slee$WSAE$WSAG$Wait$Ws2_$_add$_nto$astE$clos$conn$ddre$ddri$down$eObj$ect$ects$esoc$et$geta$hton$inet$inet$ket$nfo$ntoh$ompu$p$pl$recv$rocA$roce$rror$s$s$send$shut$sock$ss$teEv$ulti$vent
              • API String ID: 3347994566-4252220298
              • Opcode ID: 611f9f572100981bb3bf32765a2dfb2cfc0c6ead6ea85f214c8a8ad8444d1a34
              • Instruction ID: f12aab9509da2668d7233a1ba6855f3040bba1f616d86a68a6ef51836ac11e96
              • Opcode Fuzzy Hash: 611f9f572100981bb3bf32765a2dfb2cfc0c6ead6ea85f214c8a8ad8444d1a34
              • Instruction Fuzzy Hash: 8D42B130618B488FCB65DF68C8887A97BF6FB58721F10426DD85ACB2E5DB70C551CB81
              Uniqueness

              Uniqueness Score: -1.00%

              Execution Graph

              Execution Coverage:32.5%
              Dynamic/Decrypted Code Coverage:100%
              Signature Coverage:0%
              Total number of Nodes:11
              Total number of Limit Nodes:1
              execution_graph 251 20c5a870000 254 20c5a8700ce 251->254 255 20c5a8702a1 LoadLibraryA 254->255 257 20c5a87059a WSAStartup socket 255->257 259 20c5a870011 257->259 260 20c5a8707cc connect 257->260 262 20c5a870814 send 260->262 264 20c5a870876 send 262->264 268 20c5a8708c1 264->268 266 20c5a8708cd recv 266->268 267 20c5a8708ed recv 267->267 267->268 268->266 268->267

              Callgraph

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 0 20c5a8700ce-20c5a87029b 1 20c5a8702a1-20c5a8702a5 0->1 2 20c5a870344-20c5a870345 0->2 1->2 4 20c5a8702ab-20c5a8702b2 1->4 3 20c5a870347-20c5a87034f 2->3 5 20c5a8703d7-20c5a8703d8 3->5 6 20c5a870355-20c5a870362 3->6 7 20c5a87033b-20c5a87033e 4->7 8 20c5a8702b8-20c5a8702c3 4->8 9 20c5a8703da-20c5a8707c6 LoadLibraryA WSAStartup socket 5->9 6->5 10 20c5a870364-20c5a870372 6->10 7->1 7->2 11 20c5a870322-20c5a87032b 8->11 12 20c5a8702c5-20c5a8702c8 8->12 64 20c5a87098c-20c5a8709a0 9->64 65 20c5a8707cc-20c5a870812 connect 9->65 10->5 15 20c5a870374-20c5a870385 10->15 13 20c5a87032d-20c5a870332 11->13 14 20c5a870338-20c5a870339 11->14 16 20c5a8702cd-20c5a8702d9 12->16 13->14 17 20c5a870977-20c5a87097b 13->17 14->7 19 20c5a87038d-20c5a87039c 15->19 16->11 20 20c5a8702db-20c5a8702f0 16->20 17->3 21 20c5a87039e-20c5a8703a4 19->21 22 20c5a8702f2-20c5a8702f8 20->22 23 20c5a8702fa-20c5a870301 20->23 25 20c5a8703b6-20c5a8703bb 21->25 26 20c5a8703a6-20c5a8703aa 21->26 22->23 27 20c5a870303-20c5a870309 23->27 28 20c5a87030b-20c5a87030e 23->28 30 20c5a8703bd-20c5a8703c1 25->30 31 20c5a8703c7-20c5a8703d5 25->31 26->25 29 20c5a8703ac-20c5a8703b4 26->29 27->28 28->11 32 20c5a870310-20c5a870320 28->32 29->21 29->25 30->31 34 20c5a870980-20c5a870987 30->34 31->5 31->19 32->11 32->16 34->9 68 20c5a870842-20c5a8708c5 send * 2 65->68 69 20c5a870814 65->69 78 20c5a8708cd-20c5a8708e5 recv 68->78 70 20c5a87081d-20c5a870840 69->70 70->68 79 20c5a87090f-20c5a870972 78->79 80 20c5a8708e7 78->80 79->78 81 20c5a8708ed-20c5a87090d recv 80->81 81->79 81->81
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000011.00000002.3247117894.0000020C5A870000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000020C5A870000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_17_2_20c5a870000_rundll32.jbxd
              Similarity
              • API ID: recvsend$LibraryLoadStartupconnectsocket
              • String ID: 185.$19.2$21.1$32.d$Allo$ForM$GetP$Heap$Sele$Slee$WSAE$WSAG$Wait$Ws2_$_add$_nto$astE$clos$conn$ddre$ddri$down$eObj$ect$ects$esoc$et$geta$hton$inet$inet$ket$nfo$ntoh$ompu$p$pl$recv$rocA$roce$rror$s$s$send$shut$sock$ss$teEv$ulti$vent
              • API String ID: 3347994566-4252220298
              • Opcode ID: 611f9f572100981bb3bf32765a2dfb2cfc0c6ead6ea85f214c8a8ad8444d1a34
              • Instruction ID: 4325374fe1571652d771f8be8012fa5769d8f23a1a92c4dbc00d16e52b6c20c8
              • Opcode Fuzzy Hash: 611f9f572100981bb3bf32765a2dfb2cfc0c6ead6ea85f214c8a8ad8444d1a34
              • Instruction Fuzzy Hash: BC42AD706187488FCB64DF68C8887ADBBF5FB58321F50426DE85ACB2E5DB708545CB81
              Uniqueness

              Uniqueness Score: -1.00%