Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
QualityUpdateAssistant.dll

Overview

General Information

Sample name:QualityUpdateAssistant.dll
Analysis ID:1432032
MD5:873fca43ec90d167a4244c9867989030
SHA1:ab368df3c3e152c4efcb2ffc09c4870743d360f3
SHA256:a07d18fed2517e314e001a98b0d3342f27951338e78096a61c3a5a3eb32e3397
Infos:

Detection

Score:11
Range:0 - 100
Whitelisted:false
Confidence:0%

Signatures

AV process strings found (often used to terminate AV products)
Binary contains a suspicious time stamp
Checks if the current process is being debugged
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE / OLE file has an invalid certificate
PE file contains an invalid checksum
PE file contains sections with non-standard names
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Uses the system / local time for branch decision (may execute only at specific dates)

Classification

Analysis Advice

Sample may be VM or Sandbox-aware, try analysis on a native machine
Sample tries to load a library which is not present or installed on the analysis machine, adding the library might reveal more behavior
Sample may offer command line options, please run it with the 'Execute binary with arguments' cookbook (it's possible that the command line switches require additional characters like: "-", "/", "--")
Sample crashes during execution, try analyze it on another analysis machine
Sample searches for specific file, try point organization specific fake files to the analysis machine
  • System is w10x64
  • loaddll64.exe (PID: 6456 cmdline: loaddll64.exe "C:\Users\user\Desktop\QualityUpdateAssistant.dll" MD5: 763455F9DCB24DFEECC2B9D9F8D46D52)
    • conhost.exe (PID: 6180 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 1600 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\QualityUpdateAssistant.dll",#1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • rundll32.exe (PID: 7160 cmdline: rundll32.exe "C:\Users\user\Desktop\QualityUpdateAssistant.dll",#1 MD5: EF3179D498793BF4234F708D3BE28633)
        • WerFault.exe (PID: 1560 cmdline: C:\Windows\system32\WerFault.exe -u -p 7160 -s 516 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
    • rundll32.exe (PID: 3876 cmdline: rundll32.exe C:\Users\user\Desktop\QualityUpdateAssistant.dll,Execute MD5: EF3179D498793BF4234F708D3BE28633)
      • WerFault.exe (PID: 3452 cmdline: C:\Windows\system32\WerFault.exe -u -p 3876 -s 516 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
    • rundll32.exe (PID: 6548 cmdline: rundll32.exe "C:\Users\user\Desktop\QualityUpdateAssistant.dll",Execute MD5: EF3179D498793BF4234F708D3BE28633)
      • WerFault.exe (PID: 2436 cmdline: C:\Windows\system32\WerFault.exe -u -p 6548 -s 508 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
    • WerFault.exe (PID: 5512 cmdline: C:\Windows\system32\WerFault.exe -u -p 6456 -s 488 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FF8B90D34B0 CreateFileW,CreateFileMappingW,MapViewOfFile,GetFileSize,CryptAcquireContextW,CryptCreateHash,CryptHashData,UnmapViewOfFile,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,CloseHandle,CloseHandle,3_2_00007FF8B90D34B0
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FF8B90CE310 CryptStringToBinaryW,memcmp,3_2_00007FF8B90CE310
Source: QualityUpdateAssistant.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF
Source: Binary string: QualityUpdateAssistant.pdb source: rundll32.exe, 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.2121631983.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000C.00000002.2122674850.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmp, QualityUpdateAssistant.dll
Source: Binary string: QualityUpdateAssistant.pdbGCTL source: rundll32.exe, 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.2121631983.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000C.00000002.2122674850.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmp, QualityUpdateAssistant.dll
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FF8B90C5128 FindFirstFileW,FindNextFileW,FindClose,3_2_00007FF8B90C5128
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FF8B90B16E8 PathFileExistsW,GetSystemDirectoryW,GetLastError,FindFirstFileW,DeleteFileW,GetLastError,FindNextFileW,FindClose,FindFirstFileW,FindNextFileW,FindClose,3_2_00007FF8B90B16E8
Source: C:\Windows\System32\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\WER\ReportQueue\Jump to behavior
Source: C:\Windows\System32\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\Jump to behavior
Source: C:\Windows\System32\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_Qua_69d6fdc2216b7557c151bb744884d1a78ca7bd0_cb9a354e_ef734fa1-f744-4e89-a5e4-a6e6eee6643c\Jump to behavior
Source: C:\Windows\System32\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\WER\Jump to behavior
Source: C:\Windows\System32\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_loaddll64.exe_f1e2a93da88b32cda8c0398fc0f16d5f7ea571e1_606702e6_15d5ab69-9905-49c3-8179-a8d144bd5245\Jump to behavior
Source: C:\Windows\System32\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\WER\ReportQueueJump to behavior
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FF8B90CE0C0 PathFileExistsW,CreateDirectoryW,GetLastError,PathFindFileNameW,URLDownloadToFileW,3_2_00007FF8B90CE0C0
Source: Amcache.hve.9.drString found in binary or memory: http://upx.sf.net
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FF8B90C16D4 PowerClearRequest,GetLastError,NtPowerInformation,GetLastError,CloseHandle,SetLastError,3_2_00007FF8B90C16D4
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FF8B90C1514 PowerCreateRequest,GetLastError,CloseHandle,SetLastError,GetLastError,PowerSetRequest,GetLastError,CloseHandle,SetLastError,NtPowerInformation,3_2_00007FF8B90C1514
Source: C:\Windows\System32\rundll32.exeFile created: C:\Windows\system32\LogsJump to behavior
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FF8B90A4D2C3_2_00007FF8B90A4D2C
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FF8B90AF7443_2_00007FF8B90AF744
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FF8B90A5A6C3_2_00007FF8B90A5A6C
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FF8B90B9AF03_2_00007FF8B90B9AF0
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FF8B90B7AE43_2_00007FF8B90B7AE4
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FF8B90D398C3_2_00007FF8B90D398C
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FF8B90C99C43_2_00007FF8B90C99C4
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FF8B90ABC043_2_00007FF8B90ABC04
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FF8B90C6C7B3_2_00007FF8B90C6C7B
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FF8B90BEE543_2_00007FF8B90BEE54
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FF8B90ADEB43_2_00007FF8B90ADEB4
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FF8B90ACD103_2_00007FF8B90ACD10
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FF8B90C607B3_2_00007FF8B90C607B
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FF8B90B329F3_2_00007FF8B90B329F
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FF8B90D41103_2_00007FF8B90D4110
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FF8B90AD4503_2_00007FF8B90AD450
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FF8B90D34B03_2_00007FF8B90D34B0
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FF8B90C731B3_2_00007FF8B90C731B
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FF8B90B53A83_2_00007FF8B90B53A8
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FF8B90AA3D93_2_00007FF8B90AA3D9
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FF8B90C96643_2_00007FF8B90C9664
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FF8B90B16E83_2_00007FF8B90B16E8
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FF8B90B38783_2_00007FF8B90B3878
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FF8B90A97493_2_00007FF8B90A9749
Source: C:\Windows\System32\rundll32.exeCode function: String function: 00007FF8B90A3068 appears 74 times
Source: C:\Windows\System32\rundll32.exeCode function: String function: 00007FF8B90AFBB8 appears 36 times
Source: C:\Windows\System32\rundll32.exeCode function: String function: 00007FF8B90A7C3C appears 48 times
Source: C:\Windows\System32\rundll32.exeCode function: String function: 00007FF8B90A594C appears 1074 times
Source: C:\Windows\System32\rundll32.exeCode function: String function: 00007FF8B90A4818 appears 298 times
Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7160 -s 516
Source: QualityUpdateAssistant.dllStatic PE information: invalid certificate
Source: QualityUpdateAssistant.dllBinary or memory string: OriginalFilenamequalityupdateassistantj% vs QualityUpdateAssistant.dll
Source: classification engineClassification label: clean11.evad.winDLL@14/19@0/0
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FF8B90C5370 GetEnvironmentVariableW,GetDiskFreeSpaceExW,GetLastError,3_2_00007FF8B90C5370
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FF8B90C5950 CoCreateInstance,VariantInit,VariantInit,VariantInit,VariantInit,VariantClear,VariantClear,VariantClear,VariantClear,SysAllocString,VariantClear,3_2_00007FF8B90C5950
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7160
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6180:120:WilError_03
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6456
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6548
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess3876
Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\ecb409bf-f25b-4a39-8b08-363364220828Jump to behavior
Source: QualityUpdateAssistant.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\loaddll64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\QualityUpdateAssistant.dll,Execute
Source: rundll32.exeString found in binary or memory: \System32\dism.exe /online /norestart /add-package /packagepath:
Source: rundll32.exeString found in binary or memory: <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable> <IdleSettings> <StopOnIdleEnd>false</StopOnIdleEnd> <RestartOnIdle>true</RestartOnIdle> </IdleSettings> <RestartOnFailure> <Interval>PT5M</Interval> <Cou
Source: rundll32.exeString found in binary or memory: <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable> <IdleSettings> <StopOnIdleEnd>false</StopOnIdleEnd> <RestartOnIdle>true</RestartOnIdle> </IdleSettings> <RestartOnFailure> <Interval>PT5M</Interval> <Cou
Source: rundll32.exeString found in binary or memory: ew</MultipleInstancesPolicy> <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries> <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries> <AllowHardTerminate>true</AllowHardTerminate> <StartWhenAvailable>true</StartWhenAvailable>
Source: rundll32.exeString found in binary or memory: ew</MultipleInstancesPolicy> <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries> <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries> <AllowHardTerminate>true</AllowHardTerminate> <StartWhenAvailable>true</StartWhenAvailable>
Source: unknownProcess created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\QualityUpdateAssistant.dll"
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\QualityUpdateAssistant.dll",#1
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\QualityUpdateAssistant.dll,Execute
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\QualityUpdateAssistant.dll",#1
Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7160 -s 516
Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 3876 -s 516
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\QualityUpdateAssistant.dll",Execute
Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 6548 -s 508
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 6456 -s 488
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\QualityUpdateAssistant.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\QualityUpdateAssistant.dll,ExecuteJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\QualityUpdateAssistant.dll",ExecuteJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\QualityUpdateAssistant.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: pdh.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: dsreg.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: kernel.appcore.dllJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: QualityUpdateAssistant.dllStatic PE information: Image base 0x180000000 > 0x60000000
Source: QualityUpdateAssistant.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: QualityUpdateAssistant.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: QualityUpdateAssistant.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: QualityUpdateAssistant.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: QualityUpdateAssistant.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: QualityUpdateAssistant.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: QualityUpdateAssistant.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF
Source: QualityUpdateAssistant.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: QualityUpdateAssistant.pdb source: rundll32.exe, 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.2121631983.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000C.00000002.2122674850.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmp, QualityUpdateAssistant.dll
Source: Binary string: QualityUpdateAssistant.pdbGCTL source: rundll32.exe, 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.2121631983.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000C.00000002.2122674850.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmp, QualityUpdateAssistant.dll
Source: QualityUpdateAssistant.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: QualityUpdateAssistant.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: QualityUpdateAssistant.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: QualityUpdateAssistant.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: QualityUpdateAssistant.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: QualityUpdateAssistant.dllStatic PE information: 0xC5977AAD [Fri Jan 18 12:08:13 2075 UTC]
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FF8B90B3878 memset,GetModuleFileNameW,PathRemoveFileSpecW,GetLastError,GetLastError,GetLastError,PathFileExistsW,SHGetSpecialFolderPathW,PathFileExistsW,GetLastError,RegCloseKey,SetLastError,RegOpenKeyExW,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,RegCloseKey,3_2_00007FF8B90B3878
Source: QualityUpdateAssistant.dllStatic PE information: real checksum: 0x7eabc should be: 0x7eab4
Source: QualityUpdateAssistant.dllStatic PE information: section name: .didat
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FF8B90C880E pushfq ; retf 3_2_00007FF8B90C881B
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeAPI coverage: 2.5 %
Source: C:\Windows\System32\loaddll64.exe TID: 5656Thread sleep time: -120000s >= -30000sJump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FF8B90B69E8 GetSystemTimeAsFileTime followed by cmp: cmp ecx, 01h and CTI: jne 00007FF8B90B6BE2h3_2_00007FF8B90B69E8
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FF8B90C5128 FindFirstFileW,FindNextFileW,FindClose,3_2_00007FF8B90C5128
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FF8B90B16E8 PathFileExistsW,GetSystemDirectoryW,GetLastError,FindFirstFileW,DeleteFileW,GetLastError,FindNextFileW,FindClose,FindFirstFileW,FindNextFileW,FindClose,3_2_00007FF8B90B16E8
Source: C:\Windows\System32\loaddll64.exeThread delayed: delay time: 120000Jump to behavior
Source: C:\Windows\System32\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\WER\ReportQueue\Jump to behavior
Source: C:\Windows\System32\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\Jump to behavior
Source: C:\Windows\System32\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_Qua_69d6fdc2216b7557c151bb744884d1a78ca7bd0_cb9a354e_ef734fa1-f744-4e89-a5e4-a6e6eee6643c\Jump to behavior
Source: C:\Windows\System32\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\WER\Jump to behavior
Source: C:\Windows\System32\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_loaddll64.exe_f1e2a93da88b32cda8c0398fc0f16d5f7ea571e1_606702e6_15d5ab69-9905-49c3-8179-a8d144bd5245\Jump to behavior
Source: C:\Windows\System32\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\WER\ReportQueueJump to behavior
Source: Amcache.hve.9.drBinary or memory string: VMware
Source: Amcache.hve.9.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.9.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.9.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.9.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.9.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.9.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.9.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.9.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.9.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.9.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.9.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.9.drBinary or memory string: vmci.sys
Source: Amcache.hve.9.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
Source: Amcache.hve.9.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.9.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.9.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.9.drBinary or memory string: VMware20,1
Source: Amcache.hve.9.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.9.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.9.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.9.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.9.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.9.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.9.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.9.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.9.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.9.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.9.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Windows\System32\loaddll64.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FF8B90A657C GetCurrentThreadId,IsDebuggerPresent,OutputDebugStringW,3_2_00007FF8B90A657C
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FF8B90B3878 memset,GetModuleFileNameW,PathRemoveFileSpecW,GetLastError,GetLastError,GetLastError,PathFileExistsW,SHGetSpecialFolderPathW,PathFileExistsW,GetLastError,RegCloseKey,SetLastError,RegOpenKeyExW,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,RegCloseKey,3_2_00007FF8B90B3878
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FF8B90A4D2C _vsnwprintf,GetProcessHeap,HeapFree,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,3_2_00007FF8B90A4D2C
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FF8B90DAFDC IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_00007FF8B90DAFDC
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FF8B90DA6A4 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_00007FF8B90DA6A4
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\QualityUpdateAssistant.dll",#1Jump to behavior
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FF8B90C4AD0 GetSystemTime,SystemTimeToFileTime,GetLastError,3_2_00007FF8B90C4AD0
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FF8B90D6C88 memset,GetVersionExA,GetLastError,3_2_00007FF8B90D6C88
Source: Amcache.hve.9.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.9.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.9.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.9.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
11
Process Injection
1
Masquerading
OS Credential Dumping11
System Time Discovery
Remote Services1
Archive Collected Data
2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts1
Native API
Boot or Logon Initialization Scripts1
DLL Side-Loading
22
Virtualization/Sandbox Evasion
LSASS Memory41
Security Software Discovery
Remote Desktop ProtocolData from Removable Media1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
Process Injection
Security Account Manager22
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Deobfuscate/Decode Files or Information
NTDS2
File and Directory Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
Obfuscated Files or Information
LSA Secrets4
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Rundll32
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
Timestomp
DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
DLL Side-Loading
Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 1432032 Sample: QualityUpdateAssistant.dll Startdate: 26/04/2024 Architecture: WINDOWS Score: 11 7 loaddll64.exe 1 2->7         started        process3 9 cmd.exe 1 7->9         started        11 rundll32.exe 1 7->11         started        13 rundll32.exe 7->13         started        15 2 other processes 7->15 process4 17 rundll32.exe 9->17         started        19 WerFault.exe 18 11->19         started        21 WerFault.exe 16 13->21         started        process5 23 WerFault.exe 20 16 17->23         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
QualityUpdateAssistant.dll0%ReversingLabs
QualityUpdateAssistant.dll0%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://upx.sf.netAmcache.hve.9.drfalse
    high
    No contacted IP infos
    Joe Sandbox version:40.0.0 Tourmaline
    Analysis ID:1432032
    Start date and time:2024-04-26 10:21:56 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 4m 57s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:20
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:QualityUpdateAssistant.dll
    Detection:CLEAN
    Classification:clean11.evad.winDLL@14/19@0/0
    EGA Information:
    • Successful, ratio: 100%
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 7
    • Number of non-executed functions: 174
    Cookbook Comments:
    • Found application associated with file extension: .dll
    • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
    • Excluded IPs from analysis (whitelisted): 104.208.16.94
    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com, onedsblobprdcus16.centralus.cloudapp.azure.com
    • Not all processes where analyzed, report is missing behavior information
    TimeTypeDescription
    10:22:43API Interceptor1x Sleep call for process: loaddll64.exe modified
    10:22:54API Interceptor3x Sleep call for process: WerFault.exe modified
    No context
    No context
    No context
    No context
    No context
    Process:C:\Windows\System32\WerFault.exe
    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Category:dropped
    Size (bytes):65536
    Entropy (8bit):0.83652996845335
    Encrypted:false
    SSDEEP:96:8N8NX8ap6EsthNGTgF6faQXIDcQ2c6hFcECcw3v62v+HbHg/5P9usmdKaRFYAKto:8y866ERN0I3osjGzrzuiFuZ24lO81
    MD5:F6959C5F2692AB43EBF300898C1D61D9
    SHA1:7EA6E6C168EC7D4134D7A39AACCD499A2F6CBC9C
    SHA-256:059D15AA4730BB57917087E2D1EECFAF54A881C976622693DD1790C378E6A156
    SHA-512:A15630CB3AC8F65B48C98FD5615D184E3949BBCEE2886A9D084A7F386BBCA32A4BD34336AC950154DD8D19616BA3F5AEB0EDF75F9FB62EE38766A8A7688849D3
    Malicious:false
    Reputation:low
    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.5.8.5.9.3.3.6.4.1.2.7.3.0.0.0.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.5.d.5.a.b.6.9.-.9.9.0.5.-.4.9.c.3.-.8.1.7.9.-.a.8.d.1.4.4.b.d.5.2.4.5.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.a.f.1.0.c.4.1.3.-.f.e.e.7.-.4.e.8.f.-.8.3.2.b.-.a.c.d.a.e.b.f.e.8.c.5.b.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.l.o.a.d.d.l.l.6.4...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.9.3.8.-.0.0.0.1.-.0.0.1.4.-.9.2.6.4.-.8.d.e.7.b.2.9.7.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.5.f.e.1.f.7.3.2.2.5.e.8.c.2.3.3.1.b.8.d.3.7.3.d.3.f.9.1.a.c.4.2.0.0.0.0.f.f.f.f.!.0.0.0.0.f.2.3.2.e.0.d.e.c.d.5.4.8.8.5.2.f.a.6.0.8.9.e.1.9.5.4.3.1.b.7.3.e.9.4.e.d.0.b.d.!.l.o.a.d.d.l.l.6.4...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.3././.0.9././.1.5.:.0.8.:.2.3.:.4.0.!.0.!.l.o.a.d.d.l.l.6.4...e.x.e.....B.o.o.t.I.d.=.4.2.9.4.9.6.7.2.9.5.....T.a.r.g.e.t.A.s.
    Process:C:\Windows\System32\WerFault.exe
    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Category:dropped
    Size (bytes):65536
    Entropy (8bit):0.8924917592651292
    Encrypted:false
    SSDEEP:192:z6YWzikyICwf0YpYVfhj5/XzuiFuZ24lO8zbM:W9iJIuYpYthjxzuiFuY4lO8v
    MD5:3E206F36A4F3DA5AA620386C02F27621
    SHA1:3ADC7080E26009662592E6660DD362096D486063
    SHA-256:06AFC1DDE1B7AB88576566F24CFC8B77F501E0F1D24D4AF44C6F1B56B4FC602B
    SHA-512:2FA18F699133D063F8E459A86800D5F3C5EB998FA58E326EADDA8A559BFED7244563BBF7C9C21C13CE0CDF42E64D0FEB7262E72A0618AC7191CF01B41C7ECF88
    Malicious:false
    Reputation:low
    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.5.8.5.9.3.3.6.1.2.7.2.3.8.8.2.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.5.8.5.9.3.3.6.1.8.5.0.5.0.0.3.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.a.a.4.7.8.c.d.b.-.a.5.9.2.-.4.d.f.8.-.b.d.4.8.-.f.5.f.1.f.8.8.9.c.a.2.9.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.2.3.5.1.d.7.8.7.-.6.2.9.e.-.4.3.5.4.-.b.4.2.e.-.f.0.4.c.3.7.6.1.6.7.f.8.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e._.Q.u.a.l.i.t.y.U.p.d.a.t.e.A.s.s.i.s.t.a.n.t...d.l.l.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.f.2.4.-.0.0.0.1.-.0.0.1.4.-.d.8.9.8.-.a.3.e.7.b.2.9.7.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.d.d.3.9.9.a.e.4.6.3.0.3.3.4.3.f.9.f.0.d.a.1.8.9.a.e.
    Process:C:\Windows\System32\WerFault.exe
    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Category:dropped
    Size (bytes):65536
    Entropy (8bit):0.8891279788192098
    Encrypted:false
    SSDEEP:192:g0qziRyeCwf0YpYVfhj5fXzuiFuZ24lO8zbM:DMiUeuYpYthjxzuiFuY4lO8v
    MD5:808875342C2A98BE3A3D9D573F0ECC1C
    SHA1:E302D4829ED31B342EA1E3D455482C551C5AC56B
    SHA-256:6BA3814B09804A8F32E565BFEBCFF02100F93783D75EFFD119CB32F6560D783B
    SHA-512:7A832AC8D083E028F1D134938F8613368D16E512AE8B62018D614E1A1C131DDA32EA410458A7F9F17B8E4D1A13958AFFAC0B601EEEB12CCF8391B3D86F2E4E08
    Malicious:false
    Reputation:low
    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.5.8.5.9.3.3.6.4.0.3.9.4.7.5.4.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.5.8.5.9.3.3.6.4.8.2.0.7.2.5.6.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.c.b.a.a.4.6.2.9.-.6.e.7.a.-.4.c.6.6.-.8.0.4.4.-.c.5.a.7.8.e.9.f.2.2.e.9.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.d.c.0.8.5.1.1.-.7.9.a.c.-.4.0.e.a.-.a.d.9.e.-.f.1.c.c.9.e.e.3.e.0.2.c.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e._.Q.u.a.l.i.t.y.U.p.d.a.t.e.A.s.s.i.s.t.a.n.t...d.l.l.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.9.9.4.-.0.0.0.1.-.0.0.1.4.-.b.f.d.0.-.7.6.e.9.b.2.9.7.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.d.d.3.9.9.a.e.4.6.3.0.3.3.4.3.f.9.f.0.d.a.1.8.9.a.e.
    Process:C:\Windows\System32\WerFault.exe
    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Category:dropped
    Size (bytes):65536
    Entropy (8bit):0.8921681460927494
    Encrypted:false
    SSDEEP:192:KLziUyPCwf0YpYVfhj5fXzuiFuZ24lO8zbMB:CiZPuYpYthjRzuiFuY4lO8vi
    MD5:CF2A8363A1CC5B3195C13DC88A79E274
    SHA1:D639B5F856734353CC090F60A49D8CB97C81ED01
    SHA-256:A928546B4AE2AAA9AF95DE7540699720393E355809BD773E84C013BE9489BFB8
    SHA-512:43EA24C775815696DB5D769B41A2F70CB108390FAFEB9615D6AF8CA8957991C3552F6ED0D03F0914F49836B2B3A8B77D6848BA703A3AF19B617396FCF4F63EFC
    Malicious:false
    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.5.8.5.9.3.3.6.1.2.2.4.7.1.2.5.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.5.8.5.9.3.3.6.1.8.3.4.0.8.1.1.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.f.7.3.4.f.a.1.-.f.7.4.4.-.4.e.8.9.-.a.5.e.4.-.a.6.e.6.e.e.e.6.6.4.3.c.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.b.a.2.5.4.c.2.d.-.0.e.8.2.-.4.5.0.0.-.8.9.f.2.-.1.e.a.0.c.7.b.c.a.0.7.1.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e._.Q.u.a.l.i.t.y.U.p.d.a.t.e.A.s.s.i.s.t.a.n.t...d.l.l.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.b.f.8.-.0.0.0.1.-.0.0.1.4.-.7.5.4.2.-.a.7.e.7.b.2.9.7.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.d.d.3.9.9.a.e.4.6.3.0.3.3.4.3.f.9.f.0.d.a.1.8.9.a.e.
    Process:C:\Windows\System32\WerFault.exe
    File Type:Mini DuMP crash report, 14 streams, Fri Apr 26 08:22:41 2024, 0x1205a4 type
    Category:dropped
    Size (bytes):62674
    Entropy (8bit):1.8797619422280836
    Encrypted:false
    SSDEEP:192:iq674OM9ZyXQXNoVOQd+h+3KKXKxxv9wTbp+eQkLnIyz:6LOyXHO1saFxxvQFQkLdz
    MD5:E2E53D52C9E0C9ABAC854F9DBB89ECCF
    SHA1:1FB374107F20C4FD1774328DB106134229C93253
    SHA-256:B1A53D09D84688D3CBA657583F0E5F65B247FC42E85B23846B107AC4E20858B0
    SHA-512:73FDDFB4FBDC3CC70E83D21EAC99EBF9406C9174CA8B7DC45DAA6A7E77E900ACA2477023AF4EBC63F811C6D681AB9576841CC1EE8D5E278A2B8955B6BE6CCF4C
    Malicious:false
    Preview:MDMP..a..... .......Qd+f........................x...............^2..........T.......8...........T...............".......................................................................................................eJ..............Lw......................T...........Pd+f.............................0..................W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .S.u.m.m.e.r. .T.i.m.e...........................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Windows\System32\WerFault.exe
    File Type:Mini DuMP crash report, 14 streams, Fri Apr 26 08:22:41 2024, 0x1205a4 type
    Category:dropped
    Size (bytes):61462
    Entropy (8bit):1.8809869877234071
    Encrypted:false
    SSDEEP:192:icE7hOM9pBz91rxqBjmh+3KKXYReTp+/6Und8BU:qgur1FEjmsa8Y6UneBU
    MD5:A6F45F2A3652368E8E03524AC36A3399
    SHA1:3DCAD23343257801EA549D149F9B05C242D36A51
    SHA-256:98BE69D51B892D76CEED65BE6176DEBB7E2A4510EBE3AF2DF8CEEC971A2D5BD9
    SHA-512:F22022AEF0785166EEA8DB7D4C390D7214D97669B57850C16E0ECADB0F7EF4A817A0E3E74CDBA21602FC2AE0BA73287CF6F637ECED12B08AFB37EA329CF8ED0D
    Malicious:false
    Preview:MDMP..a..... .......Qd+f........................x...............^2..........T.......8...........T...........`...........................................................................................................eJ..............Lw......................T.......$...Pd+f.............................0..................W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .S.u.m.m.e.r. .T.i.m.e...........................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Windows\System32\WerFault.exe
    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Category:dropped
    Size (bytes):8834
    Entropy (8bit):3.698605704212644
    Encrypted:false
    SSDEEP:192:R6l7wVeJFY56YEBRwd13gmfcdm7DmfMprr89bD6zffBm:R6lXJ656YSmd13gmfkADOlDmf0
    MD5:27415E18356B524FE3A4F68035FBCFF9
    SHA1:D04BF0F459D47A460D9EFDEAE473B888289D8C32
    SHA-256:0146BE862CAAD84CB162BCF74888CF9368B1EEB148AD23ED5D4EF60601834E37
    SHA-512:18B5E72FEA94F49079928906D0DD3BE64E47C40D74EDF2508BAFFA4E67E04C54DABA0F94589ABFA5772A8DA631FDA9B61329F816827949DFF60951E58D5BDE36
    Malicious:false
    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.1.6.0.<./.P.i.
    Process:C:\Windows\System32\WerFault.exe
    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Category:dropped
    Size (bytes):9022
    Entropy (8bit):3.7047736490230125
    Encrypted:false
    SSDEEP:192:R6l7wVeJ3xmwe6Y4ZZgmfcdm7DmfMpr189bDvkf0vBm:R6lXJBw6Y2ZgmfkADOLDMfN
    MD5:6D11AC24387229F673531763F8E545E1
    SHA1:32F40F4DFB770AC2C70DD3E9EAE619B0393D46D1
    SHA-256:0768F0E7023ACEBE72817CBDA40703C9A48666CF860124198C52894A38581A4A
    SHA-512:99D19209B37A54407D7C2598AE7ECA43639EA56A307E4A959DFD2D91A7A3635BCF92C8F86BD8177F793ECEDADBB4A672452BD3122D0753C90B7AA5D53187D79C
    Malicious:false
    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.3.8.7.6.<./.P.i.
    Process:C:\Windows\System32\WerFault.exe
    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
    Category:dropped
    Size (bytes):4830
    Entropy (8bit):4.512628709491895
    Encrypted:false
    SSDEEP:48:cvIwWl8zsYJg771I9cnWpW8VYCYm8M4JCkqCkIfaFCHvNyq85mk4o0ptSTS+d:uIjfeI7TW7VWJxkMxH1e45poO+d
    MD5:62710D05C003D6C256FB348F47D78FCD
    SHA1:2CA3D05FBFC1F2085783FE1DC4D3779578A05F16
    SHA-256:4A1F3E6329677C8D40964CDEB08437698F19ACD0A6AC321EAA0F0DB36E87FE09
    SHA-512:9793930C070350BB3FC007DD7D7E618E101FAEC9387548C6EB3D06F908D7932B7E53386BBD66D806DC81DB4012C567293CE669902F4BCF827F0B37D380BC9969
    Malicious:false
    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="296605" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
    Process:C:\Windows\System32\WerFault.exe
    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
    Category:dropped
    Size (bytes):4830
    Entropy (8bit):4.516271388733592
    Encrypted:false
    SSDEEP:48:cvIwWl8zsYJg771I9cnWpW8VYiYm8M4JCkqCkIfaFbuyq85mk4ooptSTShDd:uIjfeI7TW7VmJxkMZe4RpoOhDd
    MD5:EBC8D2AE6040C00F35881E366EDFE0CF
    SHA1:FD58E21F68B7A6E2D68E3265A9E9E9489866F3E2
    SHA-256:564B9D46DCD10DADFE297001F02EEE830F211424E9B98713D98DCED94F9537D4
    SHA-512:89EEB74771AECA4AB43815CE25908480F4ECA7ED99F604A06FAA7BB84027637EB355BED38DAD1ABA0EBD8EFB4662F596766AEBECAB00DEB02EB1F54144F990EF
    Malicious:false
    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="296605" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
    Process:C:\Windows\System32\WerFault.exe
    File Type:Mini DuMP crash report, 14 streams, Fri Apr 26 08:22:44 2024, 0x1205a4 type
    Category:dropped
    Size (bytes):61550
    Entropy (8bit):1.897614889905113
    Encrypted:false
    SSDEEP:192:fsDfmQFfOM9RCg6PeThbMoT+lL6bOImkyh+3KKXLzGHiSrev:UD+mWmCgZB4HZkysaUz6iz
    MD5:07D2642E6FF8F3611705AE811994AAD7
    SHA1:8EAB855EB7F5FCDB45C4C10E542B1403D0EB396D
    SHA-256:7A3603735B993B148409C250C82B6E72993CA36E86592AD55E4926A3A862EE7C
    SHA-512:E0F462901826FB5BD4482CD3E2C026E21816195B53AE9D61F3A07539694CB1D00AD3E46F8DCF06ED6087B3ACA65AA6A3C9950C844F45CC4126606B1DDF17F583
    Malicious:false
    Preview:MDMP..a..... .......Td+f........................x...........t...^2..........T.......8...........T...........`...........................................................................................................eJ..............Lw......................T...........Sd+f.............................0..................W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .S.u.m.m.e.r. .T.i.m.e...........................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Windows\System32\WerFault.exe
    File Type:Mini DuMP crash report, 15 streams, Fri Apr 26 08:22:44 2024, 0x1205a4 type
    Category:dropped
    Size (bytes):62810
    Entropy (8bit):1.8207146279836193
    Encrypted:false
    SSDEEP:384:m3iyBlr7F8my/5bzdg8PpBxPOtTpnliAr:p8zGFtMr
    MD5:05726D53D4298A108ED9125DF69D06FF
    SHA1:2B0742296AF48D56EB891041E6A11A239141EE29
    SHA-256:B078FC16DB2172B2918A1DD65637D7913BB20979A70B77AB7113A0FFE0E05480
    SHA-512:75DBB4874EE5F99702C4B59DED969247F5FC1ED524849A4CA19FBC55F0EDF2AE4EA5586E4914CCD2675CA873C38D688AD95D46CD5B757153EED426F16E7364FC
    Malicious:false
    Preview:MDMP..a..... .......Td+f....................................<...p............0..........`.......8...........T...........h...........................................................................................................eJ......0.......Lw......................T.......8...Pd+f.............................0..................W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .S.u.m.m.e.r. .T.i.m.e...........................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Windows\System32\WerFault.exe
    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Category:dropped
    Size (bytes):8594
    Entropy (8bit):3.6946609876491543
    Encrypted:false
    SSDEEP:192:R6l7wVeJazO6Y41ngmfcdm7DmfMprM89be7mfnKm:R6lXJeO6YyngmfkADOwe6f7
    MD5:189375AA2DDC8C4896C23DF60194D97A
    SHA1:7F2A3F5DF28CC58812D196E18D6F90B3DF0C635D
    SHA-256:E4EF327AC82F7023956E3CBAF3F434EB2B3A39EF6A919C67D3C94006951D7D5E
    SHA-512:44F0D214501813CC306B5E80F57AF8620FBD0B788102ECE9BE2A63AA4641C59C143C9B2C0E1731CBEB2414EBFF31270AB572A1457500962EF0AF9B51A3EA8E51
    Malicious:false
    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.5.4.8.<./.P.i.
    Process:C:\Windows\System32\WerFault.exe
    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Category:dropped
    Size (bytes):8776
    Entropy (8bit):3.7024859152574585
    Encrypted:false
    SSDEEP:192:R6l7wVeJoIv6YEIre2dgmfT752pB789berIcBfJKm:R6lXJPv6YEke2dgmfX5lerIqf1
    MD5:0337BE897B54971DB55FC1A12273364D
    SHA1:FE098F67D6202AF8F5405F0BBD8FAA0E41F7510D
    SHA-256:3897F547AC5C39CB0C45A60EB2EC3C05E719BBF1FF9A93072E2DAEB244BCF533
    SHA-512:AA1C94D2A0C25A6BFD555CA90B3403E8A744916CCEDFE9A248795D2AC8CC10DCC4A5D48659608030BEF96465BBDDCF0328B731BF8C49436344972B8EB90B3620
    Malicious:false
    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.4.5.6.<./.P.i.
    Process:C:\Windows\System32\WerFault.exe
    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
    Category:dropped
    Size (bytes):4829
    Entropy (8bit):4.509959601160068
    Encrypted:false
    SSDEEP:48:cvIwWl8zsYJg771I9cnWpW8VYzYm8M4JCkqCkIfaFIyq85mk4o/ptSTStd:uIjfeI7TW7VzJxkMje4GpoOtd
    MD5:74DF1D13B7E1DBFB0F327F9951BEC3F1
    SHA1:83E44DD32FB6B3A81F4634957BA35543EACC5024
    SHA-256:0F87981B37EAACBB613F1AD71CFEA56E05974C5ED25C901675CBC944DBC7BCDA
    SHA-512:CF679B8C0B074E6D35381806205D0281E51CF1A7D166137EE9F4D6D6A52755086465893E898DDF931E5AAB770F34127F00CBFDFB5024823F9DE52229C87D9C5C
    Malicious:false
    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="296605" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
    Process:C:\Windows\System32\WerFault.exe
    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
    Category:dropped
    Size (bytes):4672
    Entropy (8bit):4.458275850105816
    Encrypted:false
    SSDEEP:48:cvIwWl8zsYJg771I9cnWpW8VYKYm8M4J8fAFUtyq85GoPFV1xYd:uIjfeI7TW7VSJQVtLeF7xYd
    MD5:1073AA976B78389ECB8F9F68802C060D
    SHA1:39935188C206BD9391F4B46534887619DD2CD38F
    SHA-256:25456D2AF292455679EED4EE63EFD61212B53982696F9D5CDF2E7DA88CE86EE7
    SHA-512:E52AD1DABC8B36EBF772749F5191C4BD8E958688B8D2CCAA0192F13E8399DF2E44BD737CD591768F54F1D79F941C36E0601574800A323119FCED919FCEC6A4EA
    Malicious:false
    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="296605" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
    Process:C:\Windows\System32\rundll32.exe
    File Type:data
    Category:dropped
    Size (bytes):65536
    Entropy (8bit):0.10531786303762895
    Encrypted:false
    SSDEEP:12:T42/q2xX/7EzzRipqrGNYDy+f+MMkNYDv:TNNdpuGae+fvaT
    MD5:2E0F077C114CAEED131B4DC872A6343D
    SHA1:4189E756046B0A6F1A9F2F016899760A7615C79A
    SHA-256:6F512F407262462DB4D133491BA2962E7F180208907EEF03819EB7FA10253A40
    SHA-512:DF0D9CE4AB29CAF92FAD524FA147FAEB3F405221C3B7DFD9C8DE30BED1C9EA1D75F71801AFC8CDB6E5F14215DB61950FFABE21255F1E755B3B18D1BB848AB962
    Malicious:false
    Preview:....................................................!...............................$.....@v....................eJ..............Zb.. N...`..........................................@.t.z.r.e.s...d.l.l.,.-.3.2.2.......................................................@.t.z.r.e.s...d.l.l.,.-.3.2.1............................................................W..............GQ............M.i.c.r.o.s.o.f.t...W.i.n.d.o.w.s...Q.u.a.l.i.t.y.U.p.d.a.t.e.A.s.s.i.s.t.a.n.t...C.:.\.W.i.n.d.o.w.s.\.s.y.s.t.e.m.3.2.\.L.o.g.s.\.L.c.u.A.s.s.i.s.t.a.n.t...0.0.1...e.t.l.........P.P.....$.....@v....................................................................................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Windows\System32\WerFault.exe
    File Type:MS Windows registry file, NT/2000 or above
    Category:dropped
    Size (bytes):1835008
    Entropy (8bit):4.42511024578488
    Encrypted:false
    SSDEEP:6144:5Svfpi6ceLP/9skLmb0OTvWSPHaJG8nAgeMZMMhA2fX4WABlEnNK0uhiTw:wvloTvW+EZMM6DFyU03w
    MD5:1211E301203ABCDB55337D0C0248577A
    SHA1:22CDFB0F2A46088EB33317CC68A97812463186A4
    SHA-256:99F80F7BB9CF68393D7CF89048B7F89AD2C3AA62BFD872522D5D7581521B4036
    SHA-512:F549470D42A2EFEF808BF3D1F2E79D54AAC64879F62EA2DB64DC196C664697D92DE585D6F152F3D31AB4AD22E087A3559A1700763DE4ADCF1D93BD955A837122
    Malicious:false
    Preview:regf>...>....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm..............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Windows\System32\rundll32.exe
    File Type:data
    Category:dropped
    Size (bytes):65536
    Entropy (8bit):0.10531786303762895
    Encrypted:false
    SSDEEP:12:T42/q2xX/7EzzRipqrGNYDy+f+MMkNYDv:TNNdpuGae+fvaT
    MD5:2E0F077C114CAEED131B4DC872A6343D
    SHA1:4189E756046B0A6F1A9F2F016899760A7615C79A
    SHA-256:6F512F407262462DB4D133491BA2962E7F180208907EEF03819EB7FA10253A40
    SHA-512:DF0D9CE4AB29CAF92FAD524FA147FAEB3F405221C3B7DFD9C8DE30BED1C9EA1D75F71801AFC8CDB6E5F14215DB61950FFABE21255F1E755B3B18D1BB848AB962
    Malicious:false
    Preview:....................................................!...............................$.....@v....................eJ..............Zb.. N...`..........................................@.t.z.r.e.s...d.l.l.,.-.3.2.2.......................................................@.t.z.r.e.s...d.l.l.,.-.3.2.1............................................................W..............GQ............M.i.c.r.o.s.o.f.t...W.i.n.d.o.w.s...Q.u.a.l.i.t.y.U.p.d.a.t.e.A.s.s.i.s.t.a.n.t...C.:.\.W.i.n.d.o.w.s.\.s.y.s.t.e.m.3.2.\.L.o.g.s.\.L.c.u.A.s.s.i.s.t.a.n.t...0.0.1...e.t.l.........P.P.....$.....@v....................................................................................................................................................................................................................................................................................................................................................................................................................................
    File type:PE32+ executable (DLL) (console) x86-64, for MS Windows
    Entropy (8bit):6.028559145439662
    TrID:
    • Win64 Dynamic Link Library (generic) (102004/3) 86.43%
    • Win64 Executable (generic) (12005/4) 10.17%
    • Generic Win/DOS Executable (2004/3) 1.70%
    • DOS Executable Generic (2002/1) 1.70%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.01%
    File name:QualityUpdateAssistant.dll
    File size:509'408 bytes
    MD5:873fca43ec90d167a4244c9867989030
    SHA1:ab368df3c3e152c4efcb2ffc09c4870743d360f3
    SHA256:a07d18fed2517e314e001a98b0d3342f27951338e78096a61c3a5a3eb32e3397
    SHA512:fdd7d3be06bdc68ef89226bb48414ba33b848902d4be2cef7ffa380bde9c170e399a4b1c51453bcc4c843e2609229eb6269aa3381332a30bdd4cf52b28de2cca
    SSDEEP:6144:dCtMA6BUPpxj79GcJPTbfnStTLkS4zHoRlR65uZOVhDK+vMXtsyZ+pSEABE1j3pw:EvfnS8HUliDK+vMz+1T77m
    TLSH:DBB4292D66E84A68E273D6388AB78541E67378551B3193DF02A0C17D6E33FE09D35F22
    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........Q...Q...Q.......E...X.......Q...........[.......U.......M.......P.............n.S.....l.P.......P...RichQ..................
    Icon Hash:7ae282899bbab082
    Entrypoint:0x18004a620
    Entrypoint Section:.text
    Digitally signed:true
    Imagebase:0x180000000
    Subsystem:windows cui
    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, DLL
    DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF
    Time Stamp:0xC5977AAD [Fri Jan 18 12:08:13 2075 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:10
    OS Version Minor:0
    File Version Major:10
    File Version Minor:0
    Subsystem Version Major:10
    Subsystem Version Minor:0
    Import Hash:14ce1460ad5cd3ff8a67939f92ac19be
    Signature Valid:false
    Signature Issuer:CN=Microsoft Windows Production PCA 2011, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
    Signature Validation Error:The digital signature of the object did not verify
    Error Number:-2146869232
    Not Before, Not After
    • 03/02/2023 01:05:42 01/02/2024 01:05:42
    Subject Chain
    • CN=Microsoft Windows, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
    Version:3
    Thumbprint MD5:2031DA039AA9D5538864F72D52C08AD7
    Thumbprint SHA-1:8870483E0E833965A53F422494F1614F79286851
    Thumbprint SHA-256:2724AEB0C497BF5FD732958120D1AE3341CFD252AB1680DE03D10503ABC666C1
    Serial:33000004158295A1A3D82E2857000000000415
    Instruction
    dec eax
    mov dword ptr [esp+08h], ebx
    dec eax
    mov dword ptr [esp+10h], esi
    push edi
    dec eax
    sub esp, 20h
    dec ecx
    mov edi, eax
    mov ebx, edx
    dec eax
    mov esi, ecx
    cmp edx, 01h
    jne 00007F4AB0F7D207h
    call 00007F4AB0F7DA80h
    dec esp
    mov eax, edi
    mov edx, ebx
    dec eax
    mov ecx, esi
    dec eax
    mov ebx, dword ptr [esp+30h]
    dec eax
    mov esi, dword ptr [esp+38h]
    dec eax
    add esp, 20h
    pop edi
    jmp 00007F4AB0F7D064h
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    jmp 00007F4AB0F7E0F0h
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    nop word ptr [eax+eax+00000000h]
    dec eax
    cmp ecx, dword ptr [000294D9h]
    jne 00007F4AB0F7D212h
    dec eax
    rol ecx, 10h
    test cx, FFFFh
    jne 00007F4AB0F7D203h
    ret
    dec eax
    ror ecx, 10h
    jmp 00007F4AB0F7D247h
    int3
    int3
    int3
    int3
    int3
    int3
    inc eax
    push ebx
    dec eax
    sub esp, 20h
    dec eax
    mov ebx, ecx
    xor ecx, ecx
    call dword ptr [0000601Bh]
    dec eax
    mov ecx, ebx
    call dword ptr [00006022h]
    call dword ptr [00006214h]
    dec eax
    mov ecx, eax
    mov edx, C0000409h
    dec eax
    add esp, 20h
    pop ebx
    dec eax
    jmp dword ptr [000061F8h]
    jno 00007F4AB0F7D1CCh
    ficomp dword ptr [edx]
    mov dh, 17h
    mov eax, 4C894899h
    and al, 08h
    dec eax
    sub esp, 00000000h
    Programming Language:
    • [IMP] VS2008 SP1 build 30729
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x6fd700x58.rdata
    IMAGE_DIRECTORY_ENTRY_IMPORT0x6fdc80x4ec.rdata
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x7a0000xd48.rsrc
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x760000x2d24.pdata
    IMAGE_DIRECTORY_ENTRY_SECURITY0x7a0000x25e0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x7b0000x610.reloc
    IMAGE_DIRECTORY_ENTRY_DEBUG0x63d480x70.rdata
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x503c00x140.rdata
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x505000xab8.rdata
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x6fa780x40.rdata
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .text0x10000x4de880x4e000ad118e42a54190660378cb51ac7588f8False0.4605243389423077data6.357409718288773IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    .rdata0x4f0000x23ad80x240007eb374df03cd0e00bfd47cdc488a7215False0.3054606119791667data4.417190105672742IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .data0x730000x25a00x10002702a0a63c1e0a889e10cd4c9480574cFalse0.196533203125data2.824729777011446IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .pdata0x760000x2d240x3000cae78bf4df57aee5214aca96167c9398False0.5020345052083334PEX Binary Archive5.474575160748802IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .didat0x790000x700x10000db2b8ee0386ba22f1384974e764b39eFalse0.017822265625data0.16740489391507368IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .rsrc0x7a0000xd480x10007a1f05b9f4f557fe4a1ddba08e052f8dFalse0.33837890625data4.496362030694204IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .reloc0x7b0000x6100x10006897cac0234a1219a67234026a9e8f5eFalse0.229248046875data2.882649466970565IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
    NameRVASizeTypeLanguageCountryZLIB Complexity
    XML0x7a4c00x881XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.39641708773541573
    RT_VERSION0x7a0f00x3ccdataEnglishUnited States0.42386831275720166
    DLLImport
    api-ms-win-crt-runtime-l1-1-0.dll_initterm_e, _initterm
    api-ms-win-crt-private-l1-1-0.dll_o__localtime64, _o__lock_file, _o__malloc_base, _o__purecall, _o__register_onexit_function, _o__seh_filter_dll, _o__unlock_file, _o__wcsdup, _o__wcsicmp, _o__wcsupr_s, _o__free_base, _o__wfsopen, memmove, _o__wtol, _o_abort, _o_ceilf, _o_fclose, _o_fflush, _o_fgetc, _o_fgetpos, _o_fgetwc, _o_fputwc, _o_free, _o_fsetpos, _o_fwrite, _o_malloc, _o_pow, _o_realloc, _o_setlocale, _o_setvbuf, _o_terminate, _o_ungetc, _o_ungetwc, _o_wcstol, _o_wcstoul, __C_specific_handler, __current_exception, __current_exception_context, _CxxThrowException, wcschr, _o__execute_onexit_table, _o__errno, _o__invalid_parameter_noinfo_noreturn, _o__invalid_parameter_noinfo, _o__initialize_onexit_table, _o__crt_atexit, _o__configure_narrow_argv, wcsstr, strchr, __uncaught_exception, _o__initialize_narrow_environment, _o__cexit, _o__calloc_base, _o__callnewh, _o___stdio_common_vswscanf, _o___stdio_common_vswprintf, _o___stdio_common_vsprintf_s, _o___stdio_common_vsnprintf_s, _o___std_type_info_destroy_list, _o___std_exception_destroy, _o___std_exception_copy, _o___pctype_func, _o____mb_cur_max_func, _o____lc_locale_name_func, _o____lc_collate_cp_func, _o____lc_codepage_func, __CxxFrameHandler3, memcmp, _o__fseeki64, memcpy
    api-ms-win-crt-string-l1-1-0.dllwcsnlen, wcscmp, wcsncmp, memset
    api-ms-win-core-libraryloader-l1-2-0.dllFreeLibrary, GetModuleFileNameA, LoadLibraryExA, GetModuleFileNameW, GetModuleHandleW, GetModuleHandleExW, LoadLibraryExW, GetProcAddress
    api-ms-win-core-synch-l1-2-0.dllInitOnceComplete, Sleep, InitializeConditionVariable, WakeConditionVariable, WakeAllConditionVariable, InitOnceBeginInitialize, SleepConditionVariableSRW
    api-ms-win-core-synch-l1-1-0.dllAcquireSRWLockShared, CreateMutexExW, TryAcquireSRWLockExclusive, CreateSemaphoreExW, LeaveCriticalSection, ReleaseSemaphore, WaitForSingleObject, DeleteCriticalSection, ReleaseMutex, InitializeCriticalSection, InitializeSRWLock, CreateEventExW, OpenSemaphoreW, WaitForSingleObjectEx, ReleaseSRWLockExclusive, SetEvent, CreateMutexW, AcquireSRWLockExclusive, ReleaseSRWLockShared, InitializeCriticalSectionEx
    api-ms-win-core-heap-l1-1-0.dllHeapSize, HeapFree, HeapDestroy, HeapAlloc, HeapReAlloc, GetProcessHeap
    api-ms-win-core-errorhandling-l1-1-0.dllSetUnhandledExceptionFilter, RaiseException, UnhandledExceptionFilter, GetLastError, SetLastError
    api-ms-win-eventing-provider-l1-1-0.dllEventWriteTransfer, EventRegister, EventUnregister, EventSetInformation
    api-ms-win-core-processthreads-l1-1-0.dllGetCurrentThreadId, GetExitCodeProcess, TerminateProcess, GetCurrentProcess, CreateProcessW, GetCurrentProcessId
    api-ms-win-core-localization-l1-2-0.dllFormatMessageW, GetUserDefaultLocaleName, LCMapStringEx
    api-ms-win-core-debug-l1-1-0.dllIsDebuggerPresent, DebugBreak, OutputDebugStringW
    api-ms-win-core-handle-l1-1-0.dllCloseHandle
    OLEAUT32.dllSysFreeString, VariantClear, VariantInit, SysStringLen, SysAllocString
    api-ms-win-core-rtlsupport-l1-1-0.dllRtlCaptureContext, RtlVirtualUnwind, RtlLookupFunctionEntry
    api-ms-win-core-processthreads-l1-1-1.dllIsProcessorFeaturePresent
    api-ms-win-core-profile-l1-1-0.dllQueryPerformanceCounter
    api-ms-win-core-sysinfo-l1-1-0.dllGetSystemDirectoryW, GlobalMemoryStatusEx, GetSystemTimeAsFileTime, GetLocalTime, GetWindowsDirectoryW, GetVersionExA, GetSystemTime, GetSystemWindowsDirectoryW
    api-ms-win-core-interlocked-l1-1-0.dllInitializeSListHead
    api-ms-win-core-shlwapi-legacy-l1-1-0.dllPathRemoveFileSpecW, PathFileExistsW, PathFindFileNameW
    api-ms-win-core-file-l1-1-0.dllGetDiskFreeSpaceExW, FindNextFileW, GetFileSize, FindFirstFileW, CreateFileW, FindClose, GetFileAttributesW, DeleteFileW, CreateDirectoryW, CompareFileTime
    api-ms-win-eventing-controller-l1-1-0.dllStartTraceW, ControlTraceW, EnableTraceEx2
    api-ms-win-core-registry-l1-1-0.dllRegDeleteTreeW, RegDeleteValueW, RegQueryInfoKeyW, RegGetValueW, RegEnumValueW, RegOpenKeyExW, RegSetValueExW, RegCreateKeyExW, RegCloseKey, RegQueryValueExW
    api-ms-win-security-sddl-l1-1-0.dllConvertStringSecurityDescriptorToSecurityDescriptorW
    api-ms-win-eventing-legacy-l1-1-0.dllQueryTraceW
    api-ms-win-core-com-l1-1-0.dllCoInitializeEx, CoUninitialize, CLSIDFromString, CoCreateInstance, CoSetProxyBlanket, CoTaskMemFree, CoCreateFreeThreadedMarshaler, CoTaskMemRealloc, CoGetApartmentType, CoTaskMemAlloc, CoWaitForMultipleHandles
    api-ms-win-core-heap-l2-1-0.dllLocalAlloc, LocalFree, GlobalFree
    api-ms-win-core-string-obsolete-l1-1-0.dlllstrcmpiW, lstrcmpW
    RPCRT4.dllUuidCreate
    api-ms-win-core-kernel32-legacy-l1-1-0.dllGetSystemPowerStatus, MoveFileW
    api-ms-win-core-libraryloader-l1-2-1.dllLoadLibraryW
    api-ms-win-core-registry-l1-1-1.dllRegDeleteKeyValueW, RegSetKeyValueW
    api-ms-win-core-realtime-l1-1-0.dllQueryUnbiasedInterruptTime
    SHELL32.dllSHGetSpecialFolderPathW
    pdh.dllPdhCloseQuery, PdhGetFormattedCounterValue, PdhAddCounterW, PdhOpenQueryW, PdhCollectQueryData
    api-ms-win-crt-time-l1-1-0.dll_time64
    api-ms-win-crt-locale-l1-1-0.dll_unlock_locales, _lock_locales
    WINHTTP.dllWinHttpReceiveResponse, WinHttpSendRequest, WinHttpCloseHandle, WinHttpSetTimeouts, WinHttpOpenRequest, WinHttpQueryOption, WinHttpReadData, WinHttpQueryHeaders, WinHttpAddRequestHeaders, WinHttpConnect, WinHttpOpen, WinHttpQueryDataAvailable
    api-ms-win-core-version-l1-1-1.dllGetFileVersionInfoSizeW, GetFileVersionInfoW
    CRYPT32.dllCertGetCertificateChain, CertVerifyCertificateChainPolicy, CertFreeCertificateContext, CryptStringToBinaryW, CertFreeCertificateChain
    api-ms-win-core-version-l1-1-0.dllVerQueryValueW
    api-ms-win-core-sysinfo-l1-2-0.dllGetProductInfo
    api-ms-win-core-winrt-string-l1-1-0.dllWindowsDeleteString, WindowsCreateString, WindowsCreateStringReference, WindowsGetStringRawBuffer
    api-ms-win-core-winrt-l1-1-0.dllRoGetActivationFactory, RoActivateInstance
    ntdll.dllNtPowerInformation, RtlConvertDeviceFamilyInfoToString
    api-ms-win-core-processenvironment-l1-1-0.dllGetEnvironmentVariableW
    api-ms-win-core-file-l1-2-0.dllGetTempPathW
    api-ms-win-core-kernel32-legacy-l1-1-1.dllPowerClearRequest, PowerSetRequest, PowerCreateRequest
    api-ms-win-core-timezone-l1-1-0.dllSystemTimeToFileTime
    api-ms-win-core-winrt-error-l1-1-0.dllRoOriginateError, RoTransformError
    api-ms-win-core-string-l1-1-0.dllMultiByteToWideChar, CompareStringEx, WideCharToMultiByte, GetStringTypeW
    api-ms-win-security-cryptoapi-l1-1-0.dllCryptCreateHash, CryptDestroyHash, CryptReleaseContext, CryptHashData, CryptGetHashParam, CryptAcquireContextW
    api-ms-win-core-memory-l1-1-0.dllMapViewOfFile, UnmapViewOfFile, CreateFileMappingW
    wkscli.dllNetGetJoinInformation
    netutils.dllNetApiBufferFree
    api-ms-win-core-delayload-l1-1-1.dllResolveDelayLoadedAPI
    api-ms-win-core-delayload-l1-1-0.dllDelayLoadFailureHook
    api-ms-win-core-util-l1-1-0.dllEncodePointer, DecodePointer
    USER32.dllUnregisterClassA
    NETAPI32.dllNetFreeAadJoinInformation, NetGetAadJoinInformation
    WINTRUST.dllWTHelperProvDataFromStateData, WinVerifyTrust, WTHelperGetProvSignerFromChain
    urlmon.dllURLDownloadToFileW
    NameOrdinalAddress
    Execute10x1800144e0
    Language of compilation systemCountry where language is spokenMap
    EnglishUnited States
    No network behavior found

    Click to jump to process

    Click to jump to process

    Click to dive into process behavior distribution

    Click to jump to process

    Target ID:0
    Start time:10:22:40
    Start date:26/04/2024
    Path:C:\Windows\System32\loaddll64.exe
    Wow64 process (32bit):false
    Commandline:loaddll64.exe "C:\Users\user\Desktop\QualityUpdateAssistant.dll"
    Imagebase:0x7ff601d90000
    File size:165'888 bytes
    MD5 hash:763455F9DCB24DFEECC2B9D9F8D46D52
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:moderate
    Has exited:true

    Target ID:1
    Start time:10:22:40
    Start date:26/04/2024
    Path:C:\Windows\System32\conhost.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Imagebase:0x7ff6d64d0000
    File size:862'208 bytes
    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:2
    Start time:10:22:40
    Start date:26/04/2024
    Path:C:\Windows\System32\cmd.exe
    Wow64 process (32bit):false
    Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\QualityUpdateAssistant.dll",#1
    Imagebase:0x7ff66b790000
    File size:289'792 bytes
    MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:3
    Start time:10:22:40
    Start date:26/04/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe C:\Users\user\Desktop\QualityUpdateAssistant.dll,Execute
    Imagebase:0x7ff683440000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:4
    Start time:10:22:40
    Start date:26/04/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\QualityUpdateAssistant.dll",#1
    Imagebase:0x7ff683440000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:9
    Start time:10:22:41
    Start date:26/04/2024
    Path:C:\Windows\System32\WerFault.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\system32\WerFault.exe -u -p 7160 -s 516
    Imagebase:0x7ff6a3760000
    File size:570'736 bytes
    MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:10
    Start time:10:22:41
    Start date:26/04/2024
    Path:C:\Windows\System32\WerFault.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\system32\WerFault.exe -u -p 3876 -s 516
    Imagebase:0x7ff6a3760000
    File size:570'736 bytes
    MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:12
    Start time:10:22:43
    Start date:26/04/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\QualityUpdateAssistant.dll",Execute
    Imagebase:0x7ff683440000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:14
    Start time:10:22:43
    Start date:26/04/2024
    Path:C:\Windows\System32\WerFault.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\system32\WerFault.exe -u -p 6548 -s 508
    Imagebase:0x7ff6a3760000
    File size:570'736 bytes
    MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:16
    Start time:10:22:43
    Start date:26/04/2024
    Path:C:\Windows\System32\WerFault.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\system32\WerFault.exe -u -p 6456 -s 488
    Imagebase:0x7ff6a3760000
    File size:570'736 bytes
    MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Reset < >

      Execution Graph

      Execution Coverage:2.5%
      Dynamic/Decrypted Code Coverage:0%
      Signature Coverage:20.8%
      Total number of Nodes:399
      Total number of Limit Nodes:7
      execution_graph 21738 7ff8b90a4470 21739 7ff8b90a4491 21738->21739 21747 7ff8b90a44a6 21738->21747 21740 7ff8b90a44ca _o__invalid_parameter_noinfo_noreturn 21739->21740 21739->21747 21741 7ff8b90a44da 21740->21741 21785 7ff8b90da964 21741->21785 21743 7ff8b90a4b66 21745 7ff8b90a5130 collate _o__invalid_parameter_noinfo_noreturn 21745->21747 21746 7ff8b90da964 4 API calls 21748 7ff8b90a4551 21746->21748 21747->21743 21747->21745 21749 7ff8b90da964 4 API calls 21748->21749 21750 7ff8b90a4577 21749->21750 21794 7ff8b90a6988 21750->21794 21754 7ff8b90a45e0 21755 7ff8b90da964 4 API calls 21754->21755 21756 7ff8b90a45f7 21755->21756 21757 7ff8b90da964 4 API calls 21756->21757 21758 7ff8b90a466a 21757->21758 21759 7ff8b90a6988 5 API calls 21758->21759 21760 7ff8b90a46f2 memmove 21759->21760 21761 7ff8b90a6900 _o__invalid_parameter_noinfo_noreturn 21760->21761 21762 7ff8b90a471e 21761->21762 21763 7ff8b90da964 4 API calls 21762->21763 21764 7ff8b90a4728 21763->21764 21810 7ff8b90b4134 21764->21810 21767 7ff8b90da964 4 API calls 21768 7ff8b90a4741 21767->21768 21821 7ff8b90ae7d4 21768->21821 21771 7ff8b90a47bd 21859 7ff8b90adeb4 439 API calls collate 21771->21859 21774 7ff8b90a4797 21854 7ff8b90ab28c 20 API calls 21774->21854 21775 7ff8b90a47c6 21860 7ff8b90a4818 28 API calls 21775->21860 21778 7ff8b90a47b2 21855 7ff8b90a5130 21778->21855 21779 7ff8b90a47d9 21861 7ff8b90ae9f8 14 API calls collate 21779->21861 21786 7ff8b90da97e _o_malloc 21785->21786 21787 7ff8b90da96f 21786->21787 21788 7ff8b90a4528 21786->21788 21787->21786 21789 7ff8b90da98e 21787->21789 21788->21746 21790 7ff8b90da999 21789->21790 21862 7ff8b90a78fc _CxxThrowException std::bad_alloc::bad_alloc 21789->21862 21863 7ff8b90a1660 _CxxThrowException _o___std_exception_copy std::bad_alloc::bad_alloc 21790->21863 21793 7ff8b90da99f 21795 7ff8b90a6a0f 21794->21795 21796 7ff8b90a69a4 21794->21796 21864 7ff8b90a1660 _CxxThrowException _o___std_exception_copy std::bad_alloc::bad_alloc 21795->21864 21796->21795 21797 7ff8b90a69e6 21796->21797 21799 7ff8b90a69be 21796->21799 21800 7ff8b90a45b4 memmove 21797->21800 21803 7ff8b90da964 4 API calls 21797->21803 21802 7ff8b90da964 4 API calls 21799->21802 21806 7ff8b90a6900 21800->21806 21801 7ff8b90a6a14 21804 7ff8b90a69c3 21802->21804 21803->21800 21804->21800 21805 7ff8b90a69d9 _o__invalid_parameter_noinfo_noreturn 21804->21805 21805->21797 21807 7ff8b90a690e 21806->21807 21808 7ff8b90a693f 21806->21808 21807->21808 21809 7ff8b90a695c _o__invalid_parameter_noinfo_noreturn 21807->21809 21808->21754 21811 7ff8b90a594c 20 API calls 21810->21811 21812 7ff8b90b41d9 21811->21812 21813 7ff8b90a594c 20 API calls 21812->21813 21814 7ff8b90b41ff 21813->21814 21815 7ff8b90a594c 20 API calls 21814->21815 21816 7ff8b90b4225 21815->21816 21865 7ff8b90b4298 21816->21865 21818 7ff8b90b4243 21881 7ff8b90da680 21818->21881 21895 7ff8b90c3fac 21821->21895 21824 7ff8b90ae8c2 21944 7ff8b90a4fec 21824->21944 21827 7ff8b90a4fec 8 API calls 21828 7ff8b90ae8e1 21827->21828 21840 7ff8b90ae8ff 21828->21840 21948 7ff8b90af744 memset lstrcmpiW 21828->21948 21829 7ff8b90a4fec 8 API calls 21831 7ff8b90ae90d 21829->21831 21833 7ff8b90ae95c 21831->21833 21834 7ff8b90ae943 memmove 21831->21834 22042 7ff8b90b0e6c _o___std_exception_copy _o__invalid_parameter_noinfo_noreturn 21831->22042 21835 7ff8b90ae9ab 21833->21835 21838 7ff8b90ae992 memmove 21833->21838 22043 7ff8b90b0e6c _o___std_exception_copy _o__invalid_parameter_noinfo_noreturn 21833->22043 21834->21833 21839 7ff8b90a594c 20 API calls 21835->21839 21838->21835 21842 7ff8b90ae9c6 21839->21842 21840->21829 22038 7ff8b90a4994 21842->22038 21844 7ff8b90ae9cf 21845 7ff8b90a4994 _o__invalid_parameter_noinfo_noreturn 21844->21845 21846 7ff8b90a4773 21845->21846 21846->21771 21847 7ff8b90a594c 21846->21847 21848 7ff8b90a596c 21847->21848 21848->21848 21849 7ff8b90a59a5 21848->21849 21850 7ff8b90a597c memmove 21848->21850 22201 7ff8b90a67a8 19 API calls collate 21849->22201 21853 7ff8b90a59aa 21850->21853 21853->21774 21854->21778 21856 7ff8b90a5143 21855->21856 21858 7ff8b90a516c 21855->21858 21857 7ff8b90a518c _o__invalid_parameter_noinfo_noreturn 21856->21857 21856->21858 21858->21771 21859->21775 21860->21779 21863->21793 21864->21801 21866 7ff8b90b42e1 21865->21866 21867 7ff8b90b4385 21865->21867 21868 7ff8b90b4333 21866->21868 21870 7ff8b90b43a0 21866->21870 21871 7ff8b90b430e 21866->21871 21876 7ff8b90b43a5 21866->21876 21867->21818 21875 7ff8b90da964 4 API calls 21868->21875 21878 7ff8b90b4318 21868->21878 21891 7ff8b90a1660 _CxxThrowException _o___std_exception_copy std::bad_alloc::bad_alloc 21870->21891 21874 7ff8b90da964 4 API calls 21871->21874 21877 7ff8b90b4313 21874->21877 21875->21878 21892 7ff8b90a6970 _o___std_exception_copy std::_Xinvalid_argument 21876->21892 21877->21878 21879 7ff8b90b4326 _o__invalid_parameter_noinfo_noreturn 21877->21879 21878->21867 21890 7ff8b90a51a0 _CxxThrowException _o___std_exception_copy _o__invalid_parameter_noinfo_noreturn _CxxThrowException _o_malloc 21878->21890 21879->21868 21882 7ff8b90da689 21881->21882 21883 7ff8b90da6e0 IsProcessorFeaturePresent 21882->21883 21884 7ff8b90a4735 21882->21884 21885 7ff8b90da6f8 21883->21885 21884->21767 21893 7ff8b90da8ec RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 21885->21893 21887 7ff8b90da70b 21894 7ff8b90da6a4 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 21887->21894 21890->21878 21891->21876 21893->21887 21896 7ff8b90a594c 20 API calls 21895->21896 21897 7ff8b90c43c6 21896->21897 21898 7ff8b90a594c 20 API calls 21897->21898 21899 7ff8b90c43f1 21898->21899 21900 7ff8b90a594c 20 API calls 21899->21900 21901 7ff8b90c4415 21900->21901 21902 7ff8b90a594c 20 API calls 21901->21902 21903 7ff8b90c443d 21902->21903 21904 7ff8b90a594c 20 API calls 21903->21904 21905 7ff8b90c445f 21904->21905 21906 7ff8b90a594c 20 API calls 21905->21906 21907 7ff8b90c4489 21906->21907 21908 7ff8b90a594c 20 API calls 21907->21908 21909 7ff8b90c44ac 21908->21909 21910 7ff8b90a594c 20 API calls 21909->21910 21911 7ff8b90c44d6 21910->21911 21912 7ff8b90a594c 20 API calls 21911->21912 21913 7ff8b90c44f9 21912->21913 21914 7ff8b90a594c 20 API calls 21913->21914 21915 7ff8b90c451f 21914->21915 21916 7ff8b90a594c 20 API calls 21915->21916 21917 7ff8b90c4552 21916->21917 21918 7ff8b90a594c 20 API calls 21917->21918 21919 7ff8b90c4581 21918->21919 21920 7ff8b90da964 4 API calls 21919->21920 21921 7ff8b90c4595 21920->21921 22044 7ff8b90a5d9c 21921->22044 21923 7ff8b90c45d1 21925 7ff8b90c45f7 21923->21925 22057 7ff8b90b1114 21923->22057 21926 7ff8b90a594c 20 API calls 21925->21926 21927 7ff8b90c4636 21926->21927 21928 7ff8b90a594c 20 API calls 21927->21928 21929 7ff8b90c4655 21928->21929 21930 7ff8b90a594c 20 API calls 21929->21930 21931 7ff8b90c4674 21930->21931 21932 7ff8b90a594c 20 API calls 21931->21932 21933 7ff8b90c4693 21932->21933 21934 7ff8b90a594c 20 API calls 21933->21934 21935 7ff8b90c4731 21934->21935 21936 7ff8b90a594c 20 API calls 21935->21936 21937 7ff8b90c4750 21936->21937 21938 7ff8b90a594c 20 API calls 21937->21938 21939 7ff8b90c476f 21938->21939 21940 7ff8b90a594c 20 API calls 21939->21940 21941 7ff8b90c478e 21940->21941 21942 7ff8b90da680 8 API calls 21941->21942 21943 7ff8b90ae88d CoInitializeEx 21942->21943 21943->21824 21945 7ff8b90a5027 21944->21945 21946 7ff8b90da680 8 API calls 21945->21946 21947 7ff8b90a50bb 21946->21947 21947->21827 21949 7ff8b90af82a GetModuleFileNameW 21948->21949 21950 7ff8b90af7ef GetWindowsDirectoryW 21948->21950 21952 7ff8b90af861 PathRemoveFileSpecW 21949->21952 21953 7ff8b90af846 GetLastError 21949->21953 21951 7ff8b90af804 21950->21951 21955 7ff8b90af873 21951->21955 21956 7ff8b90af808 GetLastError 21951->21956 21952->21951 21953->21952 21954 7ff8b90af823 21953->21954 21961 7ff8b90a4fec 8 API calls 21954->21961 21957 7ff8b90a594c 20 API calls 21955->21957 21956->21954 21956->21955 21958 7ff8b90af881 21957->21958 22078 7ff8b90a7c3c 21958->22078 21963 7ff8b90afb04 21961->21963 21962 7ff8b90a7c3c 84 API calls 21964 7ff8b90af8a3 GetFileAttributesW 21962->21964 21965 7ff8b90a5130 collate _o__invalid_parameter_noinfo_noreturn 21963->21965 21966 7ff8b90af8c7 21964->21966 21967 7ff8b90afb0f 21965->21967 21970 7ff8b90a4fec 8 API calls 21966->21970 21968 7ff8b90afb45 21967->21968 21969 7ff8b90afb1a GetProcessHeap HeapFree 21967->21969 22126 7ff8b90aff7c 21968->22126 21971 7ff8b90a4fec 8 API calls 21969->21971 21973 7ff8b90af8d9 21970->21973 21971->21968 21977 7ff8b90a4fec 8 API calls 21973->21977 21975 7ff8b90afb7c 21978 7ff8b90da680 8 API calls 21975->21978 21976 7ff8b90afb5c GetProcessHeap HeapFree 21976->21975 21979 7ff8b90af8e0 21977->21979 21980 7ff8b90ae8f6 21978->21980 21985 7ff8b90af8fa 21979->21985 22085 7ff8b90b0114 21979->22085 21980->21840 22006 7ff8b90af408 21980->22006 21982 7ff8b90af911 GetProcessHeap HeapFree 21983 7ff8b90a4fec 8 API calls 21982->21983 21983->21985 21985->21954 21985->21982 21987 7ff8b90af9ab GetFileAttributesW 21985->21987 22102 7ff8b90a8190 21985->22102 22107 7ff8b90afd34 21985->22107 21988 7ff8b90af9ca 21987->21988 21989 7ff8b90a4fec 8 API calls 21988->21989 21990 7ff8b90af9de 21989->21990 21991 7ff8b90a4fec 8 API calls 21990->21991 21992 7ff8b90af9e5 21991->21992 21993 7ff8b90af9e9 DeleteFileW 21992->21993 21996 7ff8b90afa10 21992->21996 21994 7ff8b90afa00 GetLastError 21993->21994 21993->21996 21994->21996 21995 7ff8b90afa36 GetFileAttributesW 21995->21996 21996->21995 21997 7ff8b90a4fec 8 API calls 21996->21997 21998 7ff8b90afa6c MoveFileW 21996->21998 21999 7ff8b90afaa4 GetFileAttributesW 21996->21999 21997->21996 21998->21994 21998->21996 22000 7ff8b90afaba 21999->22000 22001 7ff8b90a4fec 8 API calls 22000->22001 22002 7ff8b90aface 22001->22002 22003 7ff8b90a4fec 8 API calls 22002->22003 22004 7ff8b90afad5 22003->22004 22004->21954 22005 7ff8b90afadc DeleteFileW 22004->22005 22005->21954 22007 7ff8b90af6a4 22006->22007 22008 7ff8b90af44a 22006->22008 22010 7ff8b90af6b0 GetProcessHeap HeapFree 22007->22010 22011 7ff8b90af6d8 22007->22011 22009 7ff8b90a66e0 8 API calls 22008->22009 22012 7ff8b90af45a 22009->22012 22013 7ff8b90a4fec 8 API calls 22010->22013 22014 7ff8b90a4fec 8 API calls 22011->22014 22016 7ff8b90a57cc 13 API calls 22012->22016 22019 7ff8b90af460 22012->22019 22013->22011 22015 7ff8b90af6e6 22014->22015 22017 7ff8b90af713 22015->22017 22018 7ff8b90af6eb GetProcessHeap HeapFree 22015->22018 22016->22019 22021 7ff8b90da680 8 API calls 22017->22021 22020 7ff8b90a4fec 8 API calls 22018->22020 22023 7ff8b90a4fec 8 API calls 22019->22023 22020->22017 22022 7ff8b90af722 22021->22022 22022->21840 22025 7ff8b90af497 22023->22025 22024 7ff8b90af503 22024->22007 22200 7ff8b90aee7c 11 API calls 22024->22200 22025->22024 22026 7ff8b90a4fec 8 API calls 22025->22026 22028 7ff8b90af4ba 22026->22028 22029 7ff8b90a4fec 8 API calls 22028->22029 22030 7ff8b90af4ce LocalAlloc 22029->22030 22030->22024 22031 7ff8b90af50d 22030->22031 22031->22024 22032 7ff8b90af5ba StartTraceW 22031->22032 22033 7ff8b90af5e0 QueryTraceW 22032->22033 22034 7ff8b90af600 22032->22034 22033->22034 22034->22024 22035 7ff8b90af632 EnableTraceEx2 22034->22035 22036 7ff8b90af67f 22034->22036 22035->22036 22037 7ff8b90a4fec 8 API calls 22036->22037 22037->22024 22039 7ff8b90a49a5 22038->22039 22040 7ff8b90a49ce 22038->22040 22039->22040 22041 7ff8b90a49eb _o__invalid_parameter_noinfo_noreturn 22039->22041 22040->21844 22045 7ff8b90a5dd4 22044->22045 22056 7ff8b90a5e62 22044->22056 22046 7ff8b90a5ecf 22045->22046 22047 7ff8b90a5df8 22045->22047 22048 7ff8b90a5e1d 22045->22048 22073 7ff8b90a1660 _CxxThrowException _o___std_exception_copy std::bad_alloc::bad_alloc 22046->22073 22047->22046 22050 7ff8b90a5e05 22047->22050 22053 7ff8b90da964 4 API calls 22048->22053 22054 7ff8b90a5e0a 22048->22054 22052 7ff8b90da964 4 API calls 22050->22052 22051 7ff8b90a5ed4 22052->22054 22053->22054 22055 7ff8b90a5e7b _o__invalid_parameter_noinfo_noreturn 22054->22055 22054->22056 22055->22056 22056->21923 22058 7ff8b90b114a 22057->22058 22059 7ff8b90b1198 22058->22059 22060 7ff8b90b12f6 22058->22060 22061 7ff8b90b11b8 22058->22061 22059->21923 22077 7ff8b90a79d4 _o___std_exception_copy std::_Xinvalid_argument 22060->22077 22063 7ff8b90da964 4 API calls 22061->22063 22065 7ff8b90b11d1 22063->22065 22064 7ff8b90b1302 22064->22059 22068 7ff8b90a5130 collate _o__invalid_parameter_noinfo_noreturn 22064->22068 22074 7ff8b90a51a0 _CxxThrowException _o___std_exception_copy _o__invalid_parameter_noinfo_noreturn _CxxThrowException _o_malloc 22065->22074 22067 7ff8b90b11f0 22075 7ff8b90a51a0 _CxxThrowException _o___std_exception_copy _o__invalid_parameter_noinfo_noreturn _CxxThrowException _o_malloc 22067->22075 22070 7ff8b90b1322 22068->22070 22071 7ff8b90b11fe 22071->22059 22076 7ff8b90b1388 7 API calls std::_Xinvalid_argument 22071->22076 22073->22051 22074->22067 22075->22071 22076->22059 22077->22064 22079 7ff8b90a7c5c 22078->22079 22079->22079 22080 7ff8b90a7ca1 22079->22080 22081 7ff8b90a7c76 memmove 22079->22081 22144 7ff8b90a7cd0 84 API calls collate 22080->22144 22084 7ff8b90a7cae 22081->22084 22084->21962 22086 7ff8b90b01f5 22085->22086 22088 7ff8b90b0156 22085->22088 22087 7ff8b90a4fec 8 API calls 22086->22087 22089 7ff8b90b047b 22087->22089 22088->22086 22092 7ff8b90a4fec 8 API calls 22088->22092 22090 7ff8b90da680 8 API calls 22089->22090 22091 7ff8b90b048c 22090->22091 22091->21985 22094 7ff8b90b0220 22092->22094 22093 7ff8b90b0264 wcschr 22093->22094 22094->22086 22094->22093 22095 7ff8b90b04aa 22094->22095 22098 7ff8b90b03ad GetFileAttributesW 22094->22098 22099 7ff8b90b03c9 CreateDirectoryW 22094->22099 22145 7ff8b90da7b8 8 API calls 22095->22145 22097 7ff8b90b04af 22098->22094 22098->22099 22100 7ff8b90b03e2 GetFileAttributesW 22099->22100 22101 7ff8b90b042f GetLastError 22099->22101 22100->22094 22100->22101 22101->22086 22146 7ff8b90a4d2c 22102->22146 22104 7ff8b90a81ad 22105 7ff8b90a4fec 8 API calls 22104->22105 22106 7ff8b90a81c1 22105->22106 22106->21985 22108 7ff8b90afd67 22107->22108 22123 7ff8b90afd60 22107->22123 22109 7ff8b90a4fec 8 API calls 22108->22109 22111 7ff8b90afd8e 22109->22111 22110 7ff8b90a4fec 8 API calls 22112 7ff8b90aff24 22110->22112 22113 7ff8b90a4fec 8 API calls 22111->22113 22112->21985 22116 7ff8b90afdb0 22113->22116 22114 7ff8b90afdc7 22115 7ff8b90a4fec 8 API calls 22114->22115 22118 7ff8b90afe79 22115->22118 22116->22114 22119 7ff8b90a4fec 8 API calls 22116->22119 22121 7ff8b90afe57 22116->22121 22116->22123 22117 7ff8b90afec0 22122 7ff8b90afee2 GetProcessHeap HeapFree 22117->22122 22117->22123 22118->22117 22120 7ff8b90afea0 memmove 22118->22120 22118->22123 22119->22116 22120->22117 22125 7ff8b90aff7c 17 API calls 22121->22125 22124 7ff8b90a4fec 8 API calls 22122->22124 22123->22110 22124->22123 22125->22114 22127 7ff8b90affa8 22126->22127 22128 7ff8b90b00ab 22126->22128 22129 7ff8b90b0017 22127->22129 22130 7ff8b90affb7 22127->22130 22132 7ff8b90a4fec 8 API calls 22128->22132 22139 7ff8b90b003c GetProcessHeap HeapFree 22129->22139 22140 7ff8b90b0076 22129->22140 22131 7ff8b90a4fec 8 API calls 22130->22131 22133 7ff8b90affc6 GetProcessHeap HeapAlloc 22131->22133 22135 7ff8b90b00c7 22132->22135 22136 7ff8b90affff 22133->22136 22141 7ff8b90affee 22133->22141 22134 7ff8b90b0087 GetProcessHeap HeapFree 22134->22128 22137 7ff8b90afb52 22135->22137 22138 7ff8b90b00cc GetProcessHeap HeapFree 22135->22138 22136->22129 22142 7ff8b90b0004 memmove 22136->22142 22137->21975 22137->21976 22138->22137 22143 7ff8b90a4fec 8 API calls 22139->22143 22140->22128 22140->22134 22141->22128 22142->22129 22143->22129 22144->22084 22145->22097 22147 7ff8b90a4d8e _vsnwprintf 22146->22147 22148 7ff8b90a4d99 22147->22148 22155 7ff8b90a4dea 22147->22155 22176 7ff8b90a66e0 22148->22176 22151 7ff8b90a4fec 8 API calls 22151->22155 22152 7ff8b90a4dc9 22154 7ff8b90a4fec 8 API calls 22152->22154 22156 7ff8b90a4ddd 22154->22156 22155->22151 22155->22156 22159 7ff8b90a4e96 GetProcessHeap HeapAlloc 22155->22159 22160 7ff8b90a4e76 GetProcessHeap HeapFree 22155->22160 22157 7ff8b90a4fec 8 API calls 22156->22157 22158 7ff8b90a4f66 22157->22158 22161 7ff8b90a4f93 22158->22161 22162 7ff8b90a4f6b GetProcessHeap HeapFree 22158->22162 22168 7ff8b90a4ec2 22159->22168 22170 7ff8b90a4ef5 22159->22170 22160->22159 22164 7ff8b90a4fb8 22161->22164 22165 7ff8b90a4f98 GetProcessHeap HeapFree 22161->22165 22163 7ff8b90a4fec 8 API calls 22162->22163 22163->22161 22166 7ff8b90da680 8 API calls 22164->22166 22165->22164 22167 7ff8b90a4fc9 22166->22167 22167->22104 22168->22155 22169 7ff8b90a4ef1 22168->22169 22168->22170 22169->22170 22171 7ff8b90a66e0 8 API calls 22169->22171 22170->22156 22172 7ff8b90a4f06 22171->22172 22173 7ff8b90a4f0c 22172->22173 22174 7ff8b90a57cc 13 API calls 22172->22174 22175 7ff8b90a4fec 8 API calls 22173->22175 22174->22173 22175->22170 22177 7ff8b90a6769 22176->22177 22179 7ff8b90a6702 22176->22179 22178 7ff8b90a4fec 8 API calls 22177->22178 22180 7ff8b90a4db2 22178->22180 22179->22177 22181 7ff8b90a4fec 8 API calls 22179->22181 22182 7ff8b90a6747 22179->22182 22180->22152 22184 7ff8b90a57cc 22180->22184 22181->22182 22183 7ff8b90a4fec 8 API calls 22182->22183 22183->22177 22185 7ff8b90a5829 22184->22185 22188 7ff8b90a5802 22184->22188 22186 7ff8b90a4fec 8 API calls 22185->22186 22189 7ff8b90a58ff 22186->22189 22187 7ff8b90a4fec 8 API calls 22192 7ff8b90a5825 22187->22192 22188->22187 22190 7ff8b90a5924 22189->22190 22191 7ff8b90a5904 GetProcessHeap HeapFree 22189->22191 22190->22152 22191->22190 22192->22185 22193 7ff8b90a4fec 8 API calls 22192->22193 22194 7ff8b90a5862 22193->22194 22194->22185 22195 7ff8b90a4fec 8 API calls 22194->22195 22196 7ff8b90a5886 22195->22196 22196->22185 22197 7ff8b90a588a GetProcessHeap RtlAllocateHeap 22196->22197 22197->22185 22198 7ff8b90a58b7 22197->22198 22198->22185 22199 7ff8b90a58c9 memmove 22198->22199 22199->22185 22200->22007 22201->21853

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 0 7ff8b90af744-7ff8b90af7ed memset lstrcmpiW 1 7ff8b90af82a-7ff8b90af844 GetModuleFileNameW 0->1 2 7ff8b90af7ef-7ff8b90af7ff GetWindowsDirectoryW 0->2 4 7ff8b90af861-7ff8b90af871 PathRemoveFileSpecW 1->4 5 7ff8b90af846-7ff8b90af85f GetLastError 1->5 3 7ff8b90af804-7ff8b90af806 2->3 7 7ff8b90af873-7ff8b90af8c5 call 7ff8b90a594c call 7ff8b90a7c3c * 2 GetFileAttributesW 3->7 8 7ff8b90af808-7ff8b90af821 GetLastError 3->8 4->3 5->4 6 7ff8b90af823-7ff8b90af825 5->6 10 7ff8b90afaf8 call 7ff8b90a50c8 6->10 21 7ff8b90af8c7-7ff8b90af8cd 7->21 22 7ff8b90af8cf 7->22 8->6 8->7 14 7ff8b90afafd-7ff8b90afb18 call 7ff8b90a4fec call 7ff8b90a5130 10->14 25 7ff8b90afb46-7ff8b90afb5a call 7ff8b90aff7c 14->25 26 7ff8b90afb1a-7ff8b90afb45 GetProcessHeap HeapFree call 7ff8b90a4fec 14->26 24 7ff8b90af8d2-7ff8b90af8e2 call 7ff8b90a4fec * 2 21->24 22->24 39 7ff8b90af904 24->39 40 7ff8b90af8e4-7ff8b90af8f5 call 7ff8b90b0114 24->40 33 7ff8b90afb7c-7ff8b90afbad call 7ff8b90da680 25->33 34 7ff8b90afb5c-7ff8b90afb77 GetProcessHeap HeapFree 25->34 26->25 34->33 42 7ff8b90af907-7ff8b90af90f 39->42 43 7ff8b90af8fa-7ff8b90af8fe 40->43 44 7ff8b90af941-7ff8b90af977 call 7ff8b90a8190 42->44 45 7ff8b90af911-7ff8b90af93c GetProcessHeap HeapFree call 7ff8b90a4fec 42->45 43->39 46 7ff8b90afaf6 43->46 44->46 51 7ff8b90af97d-7ff8b90af993 call 7ff8b90afd34 44->51 45->44 46->10 51->46 54 7ff8b90af999-7ff8b90af99f 51->54 55 7ff8b90af9a1-7ff8b90af9a6 54->55 56 7ff8b90af9ab-7ff8b90af9c8 GetFileAttributesW 54->56 55->42 57 7ff8b90af9d4 56->57 58 7ff8b90af9ca-7ff8b90af9d2 56->58 59 7ff8b90af9d7-7ff8b90af9e7 call 7ff8b90a4fec * 2 57->59 58->59 64 7ff8b90afa2a-7ff8b90afa31 59->64 65 7ff8b90af9e9-7ff8b90af9fe DeleteFileW 59->65 67 7ff8b90afa36-7ff8b90afa4b GetFileAttributesW 64->67 65->64 66 7ff8b90afa00-7ff8b90afa0e GetLastError 65->66 68 7ff8b90afa10 66->68 69 7ff8b90afa1a-7ff8b90afa22 66->69 70 7ff8b90afa57 67->70 71 7ff8b90afa4d-7ff8b90afa55 67->71 68->69 69->64 72 7ff8b90afa5a-7ff8b90afa6a call 7ff8b90a4fec * 2 70->72 71->72 77 7ff8b90afa9a-7ff8b90afaa2 72->77 78 7ff8b90afa6c-7ff8b90afa94 MoveFileW 72->78 77->67 79 7ff8b90afaa4-7ff8b90afab8 GetFileAttributesW 77->79 78->66 78->77 80 7ff8b90afac4 79->80 81 7ff8b90afaba-7ff8b90afac2 79->81 82 7ff8b90afac7-7ff8b90afada call 7ff8b90a4fec * 2 80->82 81->82 87 7ff8b90afaeb-7ff8b90afaf4 82->87 88 7ff8b90afadc-7ff8b90afae6 DeleteFileW 82->88 87->14 88->87
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: Heap$File$ErrorFreeLastProcess$Attributesmemmove$DeleteDirectoryModuleNamePathRemoveSpecWindowslstrcmpimemset
      • String ID: %s\%s.%03d.etl$<R8T\>$LcuAssistant$Logs$Logs\waasmediccapsule
      • API String ID: 3396397038-2189214420
      • Opcode ID: 1b4cf68bab5e8a686365f486fdceee47be614b73c9f22b8c1613b6ace817a3c3
      • Instruction ID: 0384f164950958aca573ef1f4befc65333b65b081dc81dd6143f62285ca8dc12
      • Opcode Fuzzy Hash: 1b4cf68bab5e8a686365f486fdceee47be614b73c9f22b8c1613b6ace817a3c3
      • Instruction Fuzzy Hash: C7C16E36A08AC286EF109F69E8505BDAAA0FF897E4F554135DB5E837A4DF3CE406C740
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 155 7ff8b90a4d2c-7ff8b90a4d90 call 7ff8b90db5cc 158 7ff8b90a4d92-7ff8b90a4d97 155->158 159 7ff8b90a4dea-7ff8b90a4df5 155->159 158->159 161 7ff8b90a4d99 158->161 160 7ff8b90a4dfd-7ff8b90a4e03 159->160 162 7ff8b90a4e25 160->162 163 7ff8b90a4e05-7ff8b90a4e10 160->163 164 7ff8b90a4da3-7ff8b90a4db6 call 7ff8b90a66e0 161->164 165 7ff8b90a4d9b 161->165 169 7ff8b90a4e28-7ff8b90a4e31 call 7ff8b90a4fec 162->169 166 7ff8b90a4e20-7ff8b90a4e23 163->166 167 7ff8b90a4e12-7ff8b90a4e1e call 7ff8b90a50c8 163->167 174 7ff8b90a4db8-7ff8b90a4dc4 call 7ff8b90a57cc 164->174 175 7ff8b90a4dcf-7ff8b90a4dd1 call 7ff8b90a50c8 164->175 165->164 166->169 167->169 179 7ff8b90a4e37-7ff8b90a4e3d 169->179 180 7ff8b90a4f58 169->180 185 7ff8b90a4dc9-7ff8b90a4dcd 174->185 181 7ff8b90a4dd6-7ff8b90a4ddf call 7ff8b90a4fec 175->181 182 7ff8b90a4e5f 179->182 183 7ff8b90a4e3f-7ff8b90a4e4a 179->183 184 7ff8b90a4f5a call 7ff8b90a50c8 180->184 194 7ff8b90a4f5f-7ff8b90a4f69 call 7ff8b90a4fec 181->194 195 7ff8b90a4de5 181->195 189 7ff8b90a4e62-7ff8b90a4e6b call 7ff8b90a4fec 182->189 187 7ff8b90a4e5a-7ff8b90a4e5d 183->187 188 7ff8b90a4e4c-7ff8b90a4e58 call 7ff8b90a50c8 183->188 184->194 185->175 185->181 187->189 188->189 189->180 199 7ff8b90a4e71-7ff8b90a4e74 189->199 203 7ff8b90a4f93-7ff8b90a4f96 194->203 204 7ff8b90a4f6b-7ff8b90a4f8e GetProcessHeap HeapFree call 7ff8b90a4fec 194->204 195->180 201 7ff8b90a4e96-7ff8b90a4ebc GetProcessHeap HeapAlloc 199->201 202 7ff8b90a4e76-7ff8b90a4e91 GetProcessHeap HeapFree 199->202 205 7ff8b90a4f50 201->205 206 7ff8b90a4ec2-7ff8b90a4ec5 201->206 202->201 208 7ff8b90a4fb8-7ff8b90a4fe3 call 7ff8b90da680 203->208 209 7ff8b90a4f98-7ff8b90a4fb3 GetProcessHeap HeapFree 203->209 204->203 211 7ff8b90a4f53 205->211 206->211 212 7ff8b90a4ecb-7ff8b90a4ee7 call 7ff8b90a1484 206->212 209->208 211->180 216 7ff8b90a4ef1-7ff8b90a4ef3 212->216 217 7ff8b90a4ee9-7ff8b90a4eec 212->217 218 7ff8b90a4ef5-7ff8b90a4ef7 216->218 219 7ff8b90a4ef9-7ff8b90a4f0a call 7ff8b90a66e0 216->219 217->160 218->184 222 7ff8b90a4f15-7ff8b90a4f2a call 7ff8b90a57cc 219->222 223 7ff8b90a4f0c-7ff8b90a4f13 call 7ff8b90a50c8 219->223 229 7ff8b90a4f33 222->229 230 7ff8b90a4f2c-7ff8b90a4f2e call 7ff8b90a50c8 222->230 228 7ff8b90a4f38-7ff8b90a4f41 call 7ff8b90a4fec 223->228 228->180 234 7ff8b90a4f43-7ff8b90a4f4e 228->234 229->228 230->229 234->194
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: Heap$Process$Free$Alloc_vsnwprintf
      • String ID: <R8T\>
      • API String ID: 869350258-166503183
      • Opcode ID: 8d2f86cf98e19026792c8a8a859b60f9d08f50088f192d4fa15a6da5e6becb9d
      • Instruction ID: e94a34ae6c79b7dd0922fb77e04a336480ebfce4b09ac7899c99c200fd8205bc
      • Opcode Fuzzy Hash: 8d2f86cf98e19026792c8a8a859b60f9d08f50088f192d4fa15a6da5e6becb9d
      • Instruction Fuzzy Hash: 7E71A12AF08AD386EE249F6994001BE6695FF89BE4F055134DF4E57385DE3CE80687C4
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 89 7ff8b90af408-7ff8b90af444 90 7ff8b90af6a4-7ff8b90af6ae 89->90 91 7ff8b90af44a-7ff8b90af45e call 7ff8b90a66e0 89->91 93 7ff8b90af6b0-7ff8b90af6d8 GetProcessHeap HeapFree call 7ff8b90a4fec 90->93 94 7ff8b90af6df-7ff8b90af6e9 call 7ff8b90a4fec 90->94 98 7ff8b90af460-7ff8b90af467 call 7ff8b90a50c8 91->98 99 7ff8b90af469-7ff8b90af482 call 7ff8b90a57cc 91->99 93->94 104 7ff8b90af713-7ff8b90af73c call 7ff8b90da680 94->104 105 7ff8b90af6eb-7ff8b90af70e GetProcessHeap HeapFree call 7ff8b90a4fec 94->105 111 7ff8b90af490-7ff8b90af499 call 7ff8b90a4fec 98->111 112 7ff8b90af484-7ff8b90af486 call 7ff8b90a50c8 99->112 113 7ff8b90af48b 99->113 105->104 117 7ff8b90af698-7ff8b90af69f call 7ff8b90a50c8 call 7ff8b90aee7c 111->117 118 7ff8b90af49f-7ff8b90af4a9 111->118 112->113 113->111 117->90 119 7ff8b90af4b0 118->119 120 7ff8b90af4ab-7ff8b90af4ae 118->120 122 7ff8b90af4b3-7ff8b90af4bd call 7ff8b90a4fec 119->122 120->122 127 7ff8b90af4c4 122->127 128 7ff8b90af4bf-7ff8b90af4c2 122->128 129 7ff8b90af4c7-7ff8b90af501 call 7ff8b90a4fec LocalAlloc 127->129 128->129 132 7ff8b90af503-7ff8b90af508 129->132 133 7ff8b90af50d-7ff8b90af551 129->133 132->117 134 7ff8b90af553-7ff8b90af562 133->134 135 7ff8b90af567-7ff8b90af570 133->135 134->117 136 7ff8b90af573-7ff8b90af57a 135->136 137 7ff8b90af592-7ff8b90af5b4 136->137 138 7ff8b90af57c-7ff8b90af584 136->138 137->117 140 7ff8b90af5ba-7ff8b90af5de StartTraceW 137->140 138->137 139 7ff8b90af586-7ff8b90af590 138->139 139->136 139->137 141 7ff8b90af5e0-7ff8b90af5fe QueryTraceW 140->141 142 7ff8b90af614-7ff8b90af616 140->142 143 7ff8b90af600-7ff8b90af612 141->143 144 7ff8b90af618-7ff8b90af624 141->144 142->144 145 7ff8b90af626 142->145 146 7ff8b90af62d-7ff8b90af630 143->146 144->117 144->145 145->146 147 7ff8b90af632-7ff8b90af67d EnableTraceEx2 146->147 148 7ff8b90af681 146->148 149 7ff8b90af67f 147->149 150 7ff8b90af68d-7ff8b90af696 call 7ff8b90a4fec 147->150 151 7ff8b90af686-7ff8b90af688 call 7ff8b90a50c8 148->151 149->151 150->90 150->117 151->150
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: Heap$Trace$FreeProcess$AllocEnableLocalQueryStart
      • String ID: <R8T\>$Microsoft.Windows.QualityUpdateAssistant
      • API String ID: 1150542188-992746638
      • Opcode ID: ab70730d11103cbe4f040f8fd578eb53784e0a33633058e21294cfe6ed6d497c
      • Instruction ID: cbaf47f63eb6543922fc0247c84a3546a5ce4b295f8404dc635ec6fd6f3c7d9a
      • Opcode Fuzzy Hash: ab70730d11103cbe4f040f8fd578eb53784e0a33633058e21294cfe6ed6d497c
      • Instruction Fuzzy Hash: AA917A32A08B828AEF149F29A44427D77A1FF89BE0F654135DB1D573A1DF7DE8068780
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      APIs
      • _o__invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00007FF8B90A44CA
      • memmove.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00007FF8B90A45C3
      • memmove.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00007FF8B90A4701
        • Part of subcall function 00007FF8B90DA964: _o_malloc.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF8B90A5206), ref: 00007FF8B90DA97E
        • Part of subcall function 00007FF8B90DA964: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF8B90DA994
        • Part of subcall function 00007FF8B90DA964: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF8B90DA99A
        • Part of subcall function 00007FF8B90AE7D4: CoInitializeEx.API-MS-WIN-CORE-COM-L1-1-0 ref: 00007FF8B90AE8B2
        • Part of subcall function 00007FF8B90AE7D4: memmove.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00007FF8B90AE94F
        • Part of subcall function 00007FF8B90A594C: memmove.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00007FF8B90A599A
        • Part of subcall function 00007FF8B90AB28C: memmove.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00007FF8B90AB2D2
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: memmove$Concurrency::cancel_current_task$Initialize_o__invalid_parameter_noinfo_noreturn_o_malloc
      • String ID: <R8T\>$Completed internal execute for QUA hr = 0x%08X$DODownloader$DismInstaller$HttpsDownloader$WusaInstaller
      • API String ID: 871166552-1005802417
      • Opcode ID: 33097f145df81128536792d1b55be23da268f54b034323ecc56d3803de435191
      • Instruction ID: d2b9aa05af8be6dc5a6ffafb9a206d8484ab97417cb621bf03e8235e90882e02
      • Opcode Fuzzy Hash: 33097f145df81128536792d1b55be23da268f54b034323ecc56d3803de435191
      • Instruction Fuzzy Hash: 63C16D36A18B8185DB10DF64F8802AE77B8FB88B94F525239EB8D437A5DF38D855C740
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 292 7ff8b90b0114-7ff8b90b0150 293 7ff8b90b0466-7ff8b90b046b 292->293 294 7ff8b90b0156-7ff8b90b015f 292->294 295 7ff8b90b046d 293->295 296 7ff8b90b0162-7ff8b90b0166 294->296 297 7ff8b90b046f call 7ff8b90a50c8 295->297 298 7ff8b90b0172-7ff8b90b0196 296->298 299 7ff8b90b0168-7ff8b90b0170 296->299 303 7ff8b90b0474-7ff8b90b04a8 call 7ff8b90a4fec call 7ff8b90da680 297->303 298->295 301 7ff8b90b019c-7ff8b90b01aa 298->301 299->296 299->298 302 7ff8b90b01af-7ff8b90b01b9 301->302 304 7ff8b90b01d1-7ff8b90b01f3 302->304 305 7ff8b90b01bb-7ff8b90b01c2 302->305 308 7ff8b90b01f5-7ff8b90b01f7 304->308 309 7ff8b90b01fc-7ff8b90b0203 304->309 305->304 307 7ff8b90b01c4-7ff8b90b01cf 305->307 307->302 307->304 308->297 311 7ff8b90b0205-7ff8b90b020b 309->311 312 7ff8b90b020d-7ff8b90b0214 call 7ff8b90a50c8 309->312 314 7ff8b90b0219-7ff8b90b0222 call 7ff8b90a4fec 311->314 312->314 314->308 319 7ff8b90b0224-7ff8b90b0231 314->319 320 7ff8b90b0233-7ff8b90b023a 319->320 321 7ff8b90b0246-7ff8b90b0261 319->321 323 7ff8b90b0240 320->323 324 7ff8b90b04aa-7ff8b90b04af call 7ff8b90da7b8 320->324 322 7ff8b90b0264-7ff8b90b027b wcschr 321->322 325 7ff8b90b02ec-7ff8b90b02fc 322->325 326 7ff8b90b027d-7ff8b90b0291 322->326 323->321 325->293 329 7ff8b90b0302-7ff8b90b0316 325->329 328 7ff8b90b0296-7ff8b90b02a0 326->328 331 7ff8b90b02a2-7ff8b90b02aa 328->331 332 7ff8b90b02b9-7ff8b90b02db 328->332 333 7ff8b90b031c-7ff8b90b0326 329->333 331->332 334 7ff8b90b02ac-7ff8b90b02b7 331->334 332->308 335 7ff8b90b02e1-7ff8b90b02e7 332->335 336 7ff8b90b0328-7ff8b90b0330 333->336 337 7ff8b90b033f-7ff8b90b0363 333->337 334->328 334->332 338 7ff8b90b038b-7ff8b90b03a7 call 7ff8b90a13b0 335->338 336->337 339 7ff8b90b0332-7ff8b90b033d 336->339 337->295 340 7ff8b90b0369-7ff8b90b036c 337->340 338->295 346 7ff8b90b03ad-7ff8b90b03c3 GetFileAttributesW 338->346 339->333 339->337 342 7ff8b90b0372-7ff8b90b037c 340->342 343 7ff8b90b045c-7ff8b90b0461 340->343 342->324 345 7ff8b90b0382 342->345 343->308 345->338 347 7ff8b90b03c5-7ff8b90b03c7 346->347 348 7ff8b90b03c9-7ff8b90b03e0 CreateDirectoryW 346->348 347->348 349 7ff8b90b03fa-7ff8b90b03fd 347->349 350 7ff8b90b03e2-7ff8b90b03f8 GetFileAttributesW 348->350 351 7ff8b90b042f-7ff8b90b043d GetLastError 348->351 352 7ff8b90b0421-7ff8b90b0424 349->352 353 7ff8b90b03ff-7ff8b90b041f call 7ff8b90a13b0 349->353 350->349 350->351 354 7ff8b90b0449-7ff8b90b0457 351->354 355 7ff8b90b043f-7ff8b90b0444 351->355 352->303 357 7ff8b90b0426-7ff8b90b042a 352->357 353->295 353->352 354->308 355->308 357->322
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: AttributesFile$CreateDirectoryErrorLastwcschr
      • String ID: <R8T\>
      • API String ID: 2805896270-166503183
      • Opcode ID: 2110ceb9d2180e95cd8bd071776b13aee02d36db55f4012ecff57c12e8de617f
      • Instruction ID: 069870c2503a8cf0d3ac0a63bc8e49fac12a417c91e41647e24d53f000f9e344
      • Opcode Fuzzy Hash: 2110ceb9d2180e95cd8bd071776b13aee02d36db55f4012ecff57c12e8de617f
      • Instruction Fuzzy Hash: 1791B262B18BC286EF248F69C8943B922A5EF46BC0F904535DB4D47799EF3DE606C700
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      APIs
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: Heap$Process$AllocateFreememmove
      • String ID:
      • API String ID: 2928868235-0
      • Opcode ID: b7a328b5650cb8190829d7033c2cf8c62bbef6c7fd4720634d438965991db518
      • Instruction ID: 31b95508dde1c60628bff1cfac45010e6717e3b973cf31a5b03c7ae5132c47a6
      • Opcode Fuzzy Hash: b7a328b5650cb8190829d7033c2cf8c62bbef6c7fd4720634d438965991db518
      • Instruction Fuzzy Hash: C341CE27E087C286EE149F09640447DA652BF89BF0F194138DF5E27795DE3CE8478AC0
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      APIs
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: memmove$Initialize
      • String ID:
      • API String ID: 1211986346-0
      • Opcode ID: 65dfe67336bec78fe398c1fa30f9cf3b76812f659f5fc18a7f91c82883983436
      • Instruction ID: b26dfaa3b7abb60cf22e6e418bf3a882a969cf23db8ed30b44f40520ae126199
      • Opcode Fuzzy Hash: 65dfe67336bec78fe398c1fa30f9cf3b76812f659f5fc18a7f91c82883983436
      • Instruction Fuzzy Hash: FF518B36605B8185DA10DF2AE8842AD77A8FB04BD4F688139CF9D477A1DF39E067C340
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • CoInitializeEx.API-MS-WIN-CORE-COM-L1-1-0 ref: 00007FF8B90C60F1
      • CoCreateInstance.API-MS-WIN-CORE-COM-L1-1-0 ref: 00007FF8B90C614B
      • CoUninitialize.API-MS-WIN-CORE-COM-L1-1-0 ref: 00007FF8B90C61CA
      • wcsncmp.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF8B90C62AF
      • GetSystemPowerStatus.API-MS-WIN-CORE-KERNEL32-LEGACY-L1-1-0 ref: 00007FF8B90C6733
      • wcsncmp.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF8B90C62DA
        • Part of subcall function 00007FF8B90A4818: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF8B90A4958
        • Part of subcall function 00007FF8B90A4818: HeapFree.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF8B90A496D
        • Part of subcall function 00007FF8B90D846C: LoadLibraryExW.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0 ref: 00007FF8B90D84B3
        • Part of subcall function 00007FF8B90D846C: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FF8B90D84C3
        • Part of subcall function 00007FF8B90D846C: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FF8B90D84D5
        • Part of subcall function 00007FF8B90D846C: FreeLibrary.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0 ref: 00007FF8B90D85FD
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: ErrorFreeHeapLastLibrarywcsncmp$CreateInitializeInstanceLoadPowerProcessStatusSystemUninitialize
      • String ID: <R8T\>$APPL : Common applicability function reason bitmap: %ld$APPL : Device does not have dual scan disabled$APPL : Device does not have glass break key set$APPL : Device has Feature Update Paused$APPL : Device has Metered Network Set$APPL : Device has New OS Installed$APPL : Device has Quality Updates Paused$APPL : Device has WU Registry Keys Disabled$APPL : Device has dual scan disabled$APPL : Device has glass break key set$APPL : Device has no Metered Network Set$APPL : Device has no New OS Installed$APPL : Device has sufficient Battery$APPL : Device is Low on Battery$APPL : Device is Zero exhaust$APPL : Device is below RS4 (%ld) so no WUFB check will be completed$APPL : Device is commercial$APPL : Device is not Zero exhaust$APPL : Device is not commercial$APPL : Device is on SKU which is allowed$APPL : Device is on SKU which is not allowed$APPL : Feature Update is not Paused$APPL : Quality Updates are not Paused$APPL : Result of common applicability function: %d$APPL : WU Registry Keys are not Disabled$DisableUHSActions$DoNotConnectToWindowsUpdateInternetLocations$HARDWARE\DESCRIPTION\System\BIOS$Hewlett-Packard$PauseQualityUpdates$PauseQualityUpdatesStartTime$Result of checking device for dual scan: HR = 0x%08x$SOFTWARE\Microsoft\Windows\CurrentVersion$SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate$SetPolicyDrivenUpdateSourceForQualityUpdates$Software\Policies\Microsoft\Windows\WindowsUpdate$SystemManufacturer$onecore\enduser\upgradeenablers\applicabilityhelper\applicabilityhelper.cpp$onecore\enduser\upgradeenablers\applicabilityhelper\mdmpolicyhelper.cpp$onecore\enduser\upgradeenablers\shellhelpers\checkapplicabilityhelper.cpp
      • API String ID: 3772147216-4192117822
      • Opcode ID: 26ae14d0e98d218a51e41ab78290595091565fc6a8c542eea00f7c6b0a2dc129
      • Instruction ID: 0ec2f831a78536c0f86f034c448348176c6f134f2a567410e1527f590766245b
      • Opcode Fuzzy Hash: 26ae14d0e98d218a51e41ab78290595091565fc6a8c542eea00f7c6b0a2dc129
      • Instruction Fuzzy Hash: C072B362A1CAC395EF609F2CA49017E6BB4EF853C4F555136E78E436A6DE3CE44AC700
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 800 7ff8b90b329f-7ff8b90b336f GlobalMemoryStatusEx 801 7ff8b90b33a0-7ff8b90b33ba GetLastError call 7ff8b90afbb8 800->801 802 7ff8b90b3371-7ff8b90b339e GetLastError call 7ff8b90a4818 800->802 807 7ff8b90b33c0-7ff8b90b33eb call 7ff8b90a4818 801->807 802->807 810 7ff8b90b341b 807->810 811 7ff8b90b33ed-7ff8b90b3416 call 7ff8b90a4818 call 7ff8b90a7fd0 807->811 813 7ff8b90b341d-7ff8b90b34a6 PdhOpenQueryW PdhAddCounterW PdhCollectQueryData Sleep PdhCollectQueryData PdhGetFormattedCounterValue 810->813 824 7ff8b90b3843-7ff8b90b3870 call 7ff8b90da680 811->824 815 7ff8b90b34e4-7ff8b90b350f GetLastError call 7ff8b90afbb8 PdhCloseQuery 813->815 816 7ff8b90b34a8-7ff8b90b34e2 GetLastError call 7ff8b90a4818 PdhCloseQuery 813->816 823 7ff8b90b3515-7ff8b90b354a call 7ff8b90a4818 Sleep 815->823 816->823 823->813 829 7ff8b90b3550-7ff8b90b3564 823->829 830 7ff8b90b3566-7ff8b90b3582 call 7ff8b90a4818 829->830 831 7ff8b90b3587-7ff8b90b358d 829->831 839 7ff8b90b3836-7ff8b90b3841 call 7ff8b90a7fd0 830->839 833 7ff8b90b3593-7ff8b90b35a1 call 7ff8b90bf630 831->833 834 7ff8b90b368e-7ff8b90b3694 831->834 848 7ff8b90b35a3 833->848 849 7ff8b90b35c5-7ff8b90b35dd call 7ff8b90bff58 833->849 837 7ff8b90b36b6-7ff8b90b36bc 834->837 838 7ff8b90b3696-7ff8b90b36b1 call 7ff8b90b3878 call 7ff8b90a4818 834->838 842 7ff8b90b36c2-7ff8b90b36d5 call 7ff8b90c5370 837->842 843 7ff8b90b374f-7ff8b90b3755 837->843 838->837 839->824 857 7ff8b90b36d7-7ff8b90b36d9 call 7ff8b90a50c8 842->857 858 7ff8b90b36de-7ff8b90b36e7 call 7ff8b90a4fec 842->858 845 7ff8b90b375b-7ff8b90b37b2 call 7ff8b90a7c3c call 7ff8b90a4818 call 7ff8b90d37a0 843->845 846 7ff8b90b382e-7ff8b90b3833 843->846 881 7ff8b90b37d2-7ff8b90b37da 845->881 882 7ff8b90b37b4-7ff8b90b37d0 call 7ff8b90a3068 845->882 846->839 855 7ff8b90b35a8-7ff8b90b35c0 call 7ff8b90a3068 848->855 863 7ff8b90b35f0-7ff8b90b3600 call 7ff8b90a4818 849->863 864 7ff8b90b35df-7ff8b90b35eb call 7ff8b90a4818 849->864 855->839 857->858 873 7ff8b90b36f3-7ff8b90b3737 call 7ff8b90a4818 * 2 858->873 874 7ff8b90b36e9 858->874 878 7ff8b90b3602-7ff8b90b3607 863->878 879 7ff8b90b3609-7ff8b90b3633 call 7ff8b90a4818 863->879 864->834 873->843 894 7ff8b90b3739-7ff8b90b374a call 7ff8b90a4818 873->894 874->873 878->855 879->834 890 7ff8b90b3635-7ff8b90b3637 879->890 888 7ff8b90b37dc-7ff8b90b37e7 call 7ff8b90a5130 881->888 882->888 896 7ff8b90b37f3-7ff8b90b3819 call 7ff8b90a4818 888->896 897 7ff8b90b37e9 888->897 890->834 893 7ff8b90b3639-7ff8b90b366b call 7ff8b90a4818 call 7ff8b90aa900 890->893 907 7ff8b90b3681-7ff8b90b368d call 7ff8b90a4818 893->907 908 7ff8b90b366d-7ff8b90b367c call 7ff8b90a4818 893->908 894->839 896->846 906 7ff8b90b381b-7ff8b90b382c call 7ff8b90a4818 896->906 897->896 906->839 907->834 908->839
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: Query$ErrorLast$CloseCollectCounterDataHeapSleep$FormattedFreeGlobalMemoryOpenProcessStatusValue
      • String ID: <R8T\>$Counter %d : Current cpu usage: %f, %d$DVRD : Average CPU usage: %f is larger than threshold: %d, will do nothing$DVRD : Current memory usage: %f is larger than threshold: %d, will do nothing$DVRD : Current memory usage: %f, %d$DVRD : DISM service is not ready, will do nothing$DVRD : Device has no enough space, will do nothing$DVRD : DevicePreparer::CallSedimentPack(), with actions completed : %d$DVRD : Feature Scan or Feature Update is in progress and has exceeded threshold number of days.$DVRD : Feature Scan or Feature Update is in progress and not exceeded threshold number of days.$DVRD : Feature Scan or Feature Update is in progress, checking if number of days exceeded threshold$DVRD : Feature upgrade is in progress %s$DVRD : Service stack is %s$DVRD : System disk %s enough free space for an LCU$DVRD : System disk free space %lli$DVRD : Uso helper result$DVRD : Uso returned WU_E_DS_NODATA. Feature upgrade is not in progress$DevicePreparer::GetPhysicalMemoryUsage$DevicePreparer::GetPhysicalMemoryUsage : Current memory usage: %f$DevicePreparer::GetSystemCpuCurrentUsage$DevicePreparer::GetSystemCpuCurrentUsage : Current cpu usage: %f$DismCleanupHelper$False$Running the dism command %s$True$\Processor(_Total)\% Processor Time$\System32\dism.exe /online /Get-Packages$does not have$has$healthy$not healthy$onecore\enduser\upgradeenablers\cleanuphelpers\dismhelper.cpp$onecore\enduser\upgradeenablers\qualityupdateassistant\quacommonlibrary\devicepreparer.cpp
      • API String ID: 572387216-516566095
      • Opcode ID: 246da6a3069dc12990edebf383d0b1175feb7944c6f881adc8a5b57e30ea1b0b
      • Instruction ID: 31d7dd8f28bc95f7df106e100acf35a88d068df6e54ec0f77ddca881b1af1dce
      • Opcode Fuzzy Hash: 246da6a3069dc12990edebf383d0b1175feb7944c6f881adc8a5b57e30ea1b0b
      • Instruction Fuzzy Hash: 89F17B22E18AC286EF109F2CE8411ADB761FF897D4F908236DB0E566A5DF3CE546C740
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 968 7ff8b90adeb4-7ff8b90ae02a call 7ff8b90da964 call 7ff8b90a5d9c call 7ff8b90c10d4 call 7ff8b90a4818 call 7ff8b90c047c 979 7ff8b90ae02c-7ff8b90ae031 968->979 980 7ff8b90ae09d-7ff8b90ae0fe call 7ff8b90c1514 call 7ff8b90b4fac * 4 call 7ff8b90b9af0 968->980 979->980 982 7ff8b90ae033-7ff8b90ae04d call 7ff8b90c0b6c 979->982 1003 7ff8b90ae100-7ff8b90ae10a 980->1003 1004 7ff8b90ae138-7ff8b90ae13f 980->1004 982->980 987 7ff8b90ae04f-7ff8b90ae06f call 7ff8b90a4818 982->987 994 7ff8b90ae071-7ff8b90ae087 call 7ff8b90a4818 987->994 995 7ff8b90ae08b-7ff8b90ae098 Sleep 987->995 994->995 995->980 1005 7ff8b90ae110-7ff8b90ae114 1003->1005 1006 7ff8b90ae216-7ff8b90ae218 1003->1006 1007 7ff8b90ae144-7ff8b90ae157 call 7ff8b90a3068 1004->1007 1008 7ff8b90ae133 1005->1008 1009 7ff8b90ae116-7ff8b90ae11a 1005->1009 1006->1004 1010 7ff8b90ae21e-7ff8b90ae276 memset RegGetValueW 1006->1010 1017 7ff8b90ae158-7ff8b90ae19f call 7ff8b90c11b4 call 7ff8b90b689c call 7ff8b90da680 1007->1017 1008->1004 1009->1008 1012 7ff8b90ae11c-7ff8b90ae120 1009->1012 1013 7ff8b90ae278-7ff8b90ae27f 1010->1013 1014 7ff8b90ae299 1010->1014 1012->1008 1019 7ff8b90ae122-7ff8b90ae131 1012->1019 1016 7ff8b90ae283-7ff8b90ae28b 1013->1016 1018 7ff8b90ae2a0-7ff8b90ae2bb call 7ff8b90b4fac call 7ff8b90b69e8 1014->1018 1016->1016 1020 7ff8b90ae28d-7ff8b90ae297 1016->1020 1036 7ff8b90ae2ca-7ff8b90ae309 call 7ff8b90a4818 call 7ff8b90c3124 call 7ff8b90a4818 1018->1036 1037 7ff8b90ae2bd-7ff8b90ae2c5 1018->1037 1019->1008 1023 7ff8b90ae1a1-7ff8b90ae1dd RegCreateKeyExW 1019->1023 1020->1014 1020->1018 1026 7ff8b90ae1df-7ff8b90ae1ea 1023->1026 1027 7ff8b90ae1ed-7ff8b90ae1f4 1023->1027 1026->1027 1030 7ff8b90ae202-7ff8b90ae204 1027->1030 1031 7ff8b90ae1f6-7ff8b90ae1fd RegCloseKey 1027->1031 1030->1004 1034 7ff8b90ae20a-7ff8b90ae214 1030->1034 1031->1030 1034->1010 1045 7ff8b90ae78f-7ff8b90ae79f call 7ff8b90a4818 1036->1045 1046 7ff8b90ae30f-7ff8b90ae37b call 7ff8b90ab28c * 3 1036->1046 1037->1007 1050 7ff8b90ae7a4-7ff8b90ae7c8 call 7ff8b90c16d4 call 7ff8b90a4818 1045->1050 1060 7ff8b90ae381-7ff8b90ae3f9 call 7ff8b90a4818 1046->1060 1061 7ff8b90ae626-7ff8b90ae667 call 7ff8b90a594c 1046->1061 1050->1017 1066 7ff8b90ae3fb 1060->1066 1067 7ff8b90ae3fe-7ff8b90ae44b 1060->1067 1068 7ff8b90ae781 1061->1068 1069 7ff8b90ae66d-7ff8b90ae678 call 7ff8b90a5724 1061->1069 1066->1067 1075 7ff8b90ae48f-7ff8b90ae49e 1067->1075 1076 7ff8b90ae44d-7ff8b90ae48a call 7ff8b90ab28c * 3 call 7ff8b90a4818 1067->1076 1070 7ff8b90ae788-7ff8b90ae78d call 7ff8b90a5130 1068->1070 1069->1068 1078 7ff8b90ae67e-7ff8b90ae68c 1069->1078 1070->1050 1081 7ff8b90ae4a3-7ff8b90ae4c9 1075->1081 1082 7ff8b90ae4a0 1075->1082 1076->1075 1078->1068 1080 7ff8b90ae692-7ff8b90ae69d 1078->1080 1080->1068 1084 7ff8b90ae6a3-7ff8b90ae6a8 1080->1084 1092 7ff8b90ae512-7ff8b90ae51c call 7ff8b90abc04 1081->1092 1093 7ff8b90ae4cb-7ff8b90ae50d call 7ff8b90a3068 call 7ff8b90a5130 * 3 1081->1093 1082->1081 1086 7ff8b90ae6aa 1084->1086 1087 7ff8b90ae6ad-7ff8b90ae6e3 1084->1087 1086->1087 1090 7ff8b90ae6e5 1087->1090 1091 7ff8b90ae6e8-7ff8b90ae780 call 7ff8b90aed00 call 7ff8b90aea7c call 7ff8b9091a94 1087->1091 1090->1091 1091->1068 1104 7ff8b90ae522-7ff8b90ae541 call 7ff8b90a4818 call 7ff8b90ac984 1092->1104 1105 7ff8b90ae600-7ff8b90ae621 call 7ff8b90a5130 * 2 1092->1105 1093->1017 1104->1105 1123 7ff8b90ae547-7ff8b90ae561 call 7ff8b90a4818 1104->1123 1105->1070 1126 7ff8b90ae563 1123->1126 1127 7ff8b90ae566-7ff8b90ae56b 1123->1127 1126->1127 1128 7ff8b90ae570-7ff8b90ae576 1127->1128 1129 7ff8b90ae56d 1127->1129 1130 7ff8b90ae578 1128->1130 1131 7ff8b90ae57c-7ff8b90ae58f call 7ff8b90acd10 1128->1131 1129->1128 1130->1131 1131->1105 1134 7ff8b90ae591-7ff8b90ae5b0 call 7ff8b90a4818 call 7ff8b90ad450 1131->1134 1134->1105 1139 7ff8b90ae5b2-7ff8b90ae5d3 call 7ff8b90a4818 1134->1139 1142 7ff8b90ae5d5 1139->1142 1143 7ff8b90ae5d8-7ff8b90ae5dd 1139->1143 1142->1143 1144 7ff8b90ae5e2-7ff8b90ae5ff call 7ff8b90a4818 1143->1144 1145 7ff8b90ae5df 1143->1145 1144->1105 1145->1144
      APIs
        • Part of subcall function 00007FF8B90DA964: _o_malloc.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF8B90A5206), ref: 00007FF8B90DA97E
        • Part of subcall function 00007FF8B90A4818: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF8B90A4958
        • Part of subcall function 00007FF8B90A4818: HeapFree.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF8B90A496D
        • Part of subcall function 00007FF8B90C047C: RegCloseKey.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF8B90C0512
        • Part of subcall function 00007FF8B90C0B6C: RegOpenKeyExW.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF8B90C0BA7
        • Part of subcall function 00007FF8B90C0B6C: RegQueryValueExW.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF8B90C0BD4
        • Part of subcall function 00007FF8B90C0B6C: RegCloseKey.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF8B90C0C07
      • Sleep.API-MS-WIN-CORE-SYNCH-L1-2-0 ref: 00007FF8B90AE091
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: CloseHeap$FreeOpenProcessQuerySleepValue_o_malloc
      • String ID: %s : A previous LCU update was not completed$%s : Completed LCU install stage$%s : Completed QualityUpdateExecutor::InternalExecute$%s : Completed check applicability stage$%s : Completed device download stage$%s : Completed device readiness stage$%s : Downloading Onsettings$%s : Downloading Onsettings completed$%s : LCU update is currently not enabled$%s : LCU update is enabled$%s : Starting QualityUpdateExecutor::InternalExecute$%s : The installation of LCU %s from endpoint %s has completed successfully$2023.10$<R8T\>$?$APPL$COMP$DVRD$DWLD$DelaySeconds$Endpoint$Found a %d second delay$Found a %d second delay which is greater than maximum so resetting to %d$INTL$PREP$QualityRemediation$QualityRemediationShell$Software\Microsoft\Windows\CurrentVersion\qua\settings$Software\Microsoft\qua\update$Succeeded$WSD$onecore\enduser\upgradeenablers\qualityupdateassistant\quacommonlibrary\quaexecutor.cpp$settings-win.data.microsoft.com
      • API String ID: 1014644660-735229065
      • Opcode ID: fcbc67e86113e1d848262c0aeae08a3db7b5837923d673da9df83b65fd69247d
      • Instruction ID: 035cdf38d5e9f896542637f464fad3d166328a5ac875e2d0bc7a9399cb11b74f
      • Opcode Fuzzy Hash: fcbc67e86113e1d848262c0aeae08a3db7b5837923d673da9df83b65fd69247d
      • Instruction Fuzzy Hash: E9427D36A08BC295EB20DF28E8402ED37A4FB547D8F504136DB4D57AA9DF38D65AC780
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 1148 7ff8b90b3878-7ff8b90b390b memset GetModuleFileNameW 1149 7ff8b90b3921-7ff8b90b3977 GetLastError * 2 call 7ff8b90a4818 GetLastError 1148->1149 1150 7ff8b90b390d-7ff8b90b391f PathRemoveFileSpecW 1148->1150 1155 7ff8b90b3da0-7ff8b90b3da8 1149->1155 1150->1149 1151 7ff8b90b397c-7ff8b90b39ea call 7ff8b90a7c3c * 3 call 7ff8b90a4818 PathFileExistsW 1150->1151 1169 7ff8b90b39f0-7ff8b90b3a47 call 7ff8b90a4818 SHGetSpecialFolderPathW 1151->1169 1170 7ff8b90b3adf-7ff8b90b3af8 call 7ff8b90ab28c 1151->1170 1158 7ff8b90b3db7-7ff8b90b3ded call 7ff8b90a5130 call 7ff8b90da680 1155->1158 1159 7ff8b90b3daa-7ff8b90b3db6 RegCloseKey 1155->1159 1159->1158 1175 7ff8b90b3a49-7ff8b90b3a57 call 7ff8b90a4818 1169->1175 1176 7ff8b90b3a5c-7ff8b90b3abc call 7ff8b90a7c3c * 2 call 7ff8b90a4818 PathFileExistsW 1169->1176 1177 7ff8b90b3afa 1170->1177 1178 7ff8b90b3afd-7ff8b90b3b04 call 7ff8b90c8028 1170->1178 1188 7ff8b90b3b17-7ff8b90b3b1a 1175->1188 1176->1170 1199 7ff8b90b3abe-7ff8b90b3add call 7ff8b90a4818 1176->1199 1177->1178 1185 7ff8b90b3b06-7ff8b90b3b12 call 7ff8b90a4818 1178->1185 1186 7ff8b90b3b1f-7ff8b90b3b27 1178->1186 1185->1188 1191 7ff8b90b3b54-7ff8b90b3b88 RegOpenKeyExW 1186->1191 1192 7ff8b90b3b29-7ff8b90b3b4f GetLastError RegCloseKey SetLastError 1186->1192 1188->1155 1194 7ff8b90b3b8a-7ff8b90b3ba7 call 7ff8b90b3154 1191->1194 1195 7ff8b90b3bac-7ff8b90b3bb8 call 7ff8b90b3e40 1191->1195 1192->1191 1194->1155 1203 7ff8b90b3be6-7ff8b90b3beb 1195->1203 1204 7ff8b90b3bba-7ff8b90b3be1 call 7ff8b90b3184 1195->1204 1199->1188 1205 7ff8b90b3bf0-7ff8b90b3c0a LoadLibraryW 1203->1205 1206 7ff8b90b3bed 1203->1206 1204->1155 1209 7ff8b90b3c10-7ff8b90b3c2e GetProcAddress 1205->1209 1210 7ff8b90b3d51-7ff8b90b3d5d call 7ff8b90b4030 1205->1210 1206->1205 1213 7ff8b90b3c30-7ff8b90b3c35 1209->1213 1214 7ff8b90b3c3a-7ff8b90b3c50 1209->1214 1218 7ff8b90b3d88 1210->1218 1219 7ff8b90b3d5f-7ff8b90b3d86 call 7ff8b90b3184 1210->1219 1216 7ff8b90b3cd0-7ff8b90b3cd5 1213->1216 1224 7ff8b90b3c52-7ff8b90b3c5a 1214->1224 1225 7ff8b90b3c5c-7ff8b90b3c75 GetProcAddress 1214->1225 1217 7ff8b90b3cd8-7ff8b90b3ceb call 7ff8b90a3068 1216->1217 1223 7ff8b90b3d8b-7ff8b90b3d8e 1217->1223 1218->1223 1219->1223 1223->1155 1228 7ff8b90b3d90-7ff8b90b3d9f FreeLibrary 1223->1228 1224->1217 1229 7ff8b90b3c77-7ff8b90b3c7c 1225->1229 1230 7ff8b90b3c7e-7ff8b90b3ca1 1225->1230 1228->1155 1229->1216 1232 7ff8b90b3ca3-7ff8b90b3cab 1230->1232 1233 7ff8b90b3cad-7ff8b90b3cc9 GetProcAddress 1230->1233 1232->1217 1234 7ff8b90b3cf0-7ff8b90b3cf4 1233->1234 1235 7ff8b90b3ccb 1233->1235 1236 7ff8b90b3d4b-7ff8b90b3d4f 1234->1236 1235->1216 1236->1210 1237 7ff8b90b3cf6-7ff8b90b3d03 1236->1237 1238 7ff8b90b3d05 1237->1238 1239 7ff8b90b3d08-7ff8b90b3d22 1237->1239 1238->1239 1241 7ff8b90b3d47 1239->1241 1242 7ff8b90b3d24-7ff8b90b3d2f 1239->1242 1241->1236 1243 7ff8b90b3d31 1242->1243 1244 7ff8b90b3d34-7ff8b90b3d42 call 7ff8b90a4818 1242->1244 1243->1244 1244->1241
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: ErrorLast$FilePath$CloseExistsFreeHeapLibraryValue$AddressFolderLoadModuleNameOpenProcProcessRemoveSpecSpecialmemmovememset
      • String ID: <R8T\>$Could not find: %s$Current path for sediment pack dll: %s$DVRD : DevicePreparer::PrepareRegkeyValueForAQUA() failed$DVRD : DevicePreparer::ResetValueForAQUA() failed$DVRD : Failed to find :%s$DVRD : Failed to find program files folder$DVRD : Failed to run plugin %s. Failure Reason: %lu$EnumeratePluginsWithApplicationSource$Failed to get current directory HRESULT = 0x%08X$Failed to verify Microsoft signature on SedPlugins$Plugin_Process_Aqua$SedimentDriver_Init_Aqua$Software\Microsoft\Windows\CurrentVersion\rempl\settings$\rempl\sedplugins.dll$onecore\enduser\upgradeenablers\qualityupdateassistant\quacommonlibrary\devicepreparer.cpp$sedplugins.dll
      • API String ID: 3868751378-3516276135
      • Opcode ID: a55be2fa2b1e83d4880ee2423f479fc78ded265da570e223ec7c3aa4facf04e2
      • Instruction ID: 521e749fc88284091c7534d41263aef771b9cf7b0e7e4dd296bc6b06d48532ae
      • Opcode Fuzzy Hash: a55be2fa2b1e83d4880ee2423f479fc78ded265da570e223ec7c3aa4facf04e2
      • Instruction Fuzzy Hash: 85E10B22A09FC286EF109F6DE8506B967A1FB89BC4F504136DB5E47694DF3CE506CB40
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 1246 7ff8b90b9af0-7ff8b90b9b73 RegGetValueW 1247 7ff8b90b9b75-7ff8b90b9b84 1246->1247 1248 7ff8b90b9bef-7ff8b90b9c1e call 7ff8b90b518c 1246->1248 1249 7ff8b90b9b96-7ff8b90b9b9f 1247->1249 1250 7ff8b90b9b86-7ff8b90b9b92 CoTaskMemFree 1247->1250 1255 7ff8b90b9cd7-7ff8b90b9d28 memset * 2 RtlConvertDeviceFamilyInfoToString 1248->1255 1256 7ff8b90b9c24-7ff8b90b9c4f GetProductInfo 1248->1256 1253 7ff8b90b9ba1-7ff8b90b9ba6 1249->1253 1254 7ff8b90b9bcc-7ff8b90b9bea call 7ff8b90b57a8 1249->1254 1250->1249 1253->1254 1257 7ff8b90b9ba8-7ff8b90b9bbd CoTaskMemAlloc 1253->1257 1254->1248 1261 7ff8b90b9d3a-7ff8b90b9d41 1255->1261 1262 7ff8b90b9d2a-7ff8b90b9d35 call 7ff8b90b4fac 1255->1262 1256->1255 1259 7ff8b90b9c55-7ff8b90b9c5c 1256->1259 1257->1254 1260 7ff8b90b9bbf-7ff8b90b9bc7 memset 1257->1260 1265 7ff8b90b9c6e-7ff8b90b9c84 CoTaskMemAlloc 1259->1265 1266 7ff8b90b9c5e-7ff8b90b9c6a CoTaskMemFree 1259->1266 1260->1254 1263 7ff8b90b9d53-7ff8b90b9d6d CoTaskMemAlloc 1261->1263 1264 7ff8b90b9d43-7ff8b90b9d4f CoTaskMemFree 1261->1264 1262->1261 1268 7ff8b90b9d6f-7ff8b90b9d77 memset 1263->1268 1269 7ff8b90b9d7c-7ff8b90b9d83 1263->1269 1264->1263 1270 7ff8b90b9c93-7ff8b90b9cb2 call 7ff8b90a1500 1265->1270 1271 7ff8b90b9c86-7ff8b90b9c8e memset 1265->1271 1266->1265 1268->1269 1272 7ff8b90b9d96-7ff8b90b9dec memset RegGetValueW 1269->1272 1273 7ff8b90b9d85-7ff8b90b9d91 GetUserDefaultLocaleName 1269->1273 1270->1255 1279 7ff8b90b9cb4 1270->1279 1271->1270 1275 7ff8b90b9e33-7ff8b90b9e3f call 7ff8b90baa64 1272->1275 1276 7ff8b90b9dee-7ff8b90b9df3 1272->1276 1273->1272 1284 7ff8b90b9ec7-7ff8b90b9ece 1275->1284 1285 7ff8b90b9e45-7ff8b90b9e4c 1275->1285 1278 7ff8b90b9df6-7ff8b90b9dfe 1276->1278 1278->1278 1281 7ff8b90b9e00-7ff8b90b9e04 1278->1281 1282 7ff8b90b9cb7-7ff8b90b9cbf 1279->1282 1281->1275 1286 7ff8b90b9e06-7ff8b90b9e0c 1281->1286 1282->1282 1287 7ff8b90b9cc1-7ff8b90b9cd3 CoTaskMemRealloc 1282->1287 1291 7ff8b90b9ee0-7ff8b90b9ef6 CoTaskMemAlloc 1284->1291 1292 7ff8b90b9ed0-7ff8b90b9edc CoTaskMemFree 1284->1292 1288 7ff8b90b9e5e-7ff8b90b9e74 CoTaskMemAlloc 1285->1288 1289 7ff8b90b9e4e-7ff8b90b9e5a CoTaskMemFree 1285->1289 1286->1275 1290 7ff8b90b9e0e-7ff8b90b9e19 1286->1290 1287->1255 1293 7ff8b90b9e83-7ff8b90b9ea2 call 7ff8b90a1500 1288->1293 1294 7ff8b90b9e76-7ff8b90b9e7e memset 1288->1294 1289->1288 1295 7ff8b90b9fa9-7ff8b90b9fae call 7ff8b90da7b8 1290->1295 1296 7ff8b90b9e1f-7ff8b90b9e2e call 7ff8b90b4fac 1290->1296 1297 7ff8b90b9f05-7ff8b90b9f59 call 7ff8b90b5e10 call 7ff8b90a1500 1291->1297 1298 7ff8b90b9ef8-7ff8b90b9f00 memset 1291->1298 1292->1291 1293->1284 1307 7ff8b90b9ea4 1293->1307 1294->1293 1296->1275 1310 7ff8b90b9f7b-7ff8b90b9fa7 call 7ff8b90da680 1297->1310 1311 7ff8b90b9f5b-7ff8b90b9f63 1297->1311 1298->1297 1309 7ff8b90b9ea7-7ff8b90b9eaf 1307->1309 1309->1309 1312 7ff8b90b9eb1-7ff8b90b9ec3 CoTaskMemRealloc 1309->1312 1311->1311 1313 7ff8b90b9f65-7ff8b90b9f77 CoTaskMemRealloc 1311->1313 1312->1284 1313->1310
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: Task$memset$AllocFree$Realloc$InfoValue$ConvertDefaultDeviceFamilyLocaleNameProductStringUser
      • String ID: %M.%m.%ls$%lu$%u.%u.%u.%u$<R8T\>$BuildLabEx$MachineId$SOFTWARE\Microsoft\SQMClient$SOFTWARE\Microsoft\Windows NT\CurrentVersion${
      • API String ID: 2230448549-3222064145
      • Opcode ID: 3456d6ea380891e7726c763dd9123b1d20319815879398aea5713562a7b049df
      • Instruction ID: d705be832327a698e290f0fbf34521a0a3a84497deb152d987a1d815b26766ab
      • Opcode Fuzzy Hash: 3456d6ea380891e7726c763dd9123b1d20319815879398aea5713562a7b049df
      • Instruction Fuzzy Hash: 67D15832A09F8286EF109F29E4402A9B7A5FB8AB98F544531DB6D03759DF3DD446CB40
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 1316 7ff8b90c731b-7ff8b90c7373 1317 7ff8b90c7375-7ff8b90c738b call 7ff8b90d60cc 1316->1317 1318 7ff8b90c73da-7ff8b90c73de 1316->1318 1330 7ff8b90c73af-7ff8b90c73b6 1317->1330 1331 7ff8b90c738d-7ff8b90c73aa call 7ff8b90a3068 1317->1331 1319 7ff8b90c7484-7ff8b90c7488 1318->1319 1320 7ff8b90c73e4-7ff8b90c73e8 1318->1320 1323 7ff8b90c7544-7ff8b90c7548 1319->1323 1324 7ff8b90c748e-7ff8b90c74b3 call 7ff8b90d6624 1319->1324 1322 7ff8b90c73ed call 7ff8b90d6c88 1320->1322 1328 7ff8b90c73f2-7ff8b90c740c call 7ff8b90a4818 1322->1328 1326 7ff8b90c75f2-7ff8b90c75f6 1323->1326 1327 7ff8b90c754e-7ff8b90c7575 call 7ff8b90bf630 1323->1327 1345 7ff8b90c74b5-7ff8b90c74d7 call 7ff8b90a4818 1324->1345 1346 7ff8b90c74fc-7ff8b90c74fe 1324->1346 1335 7ff8b90c7697-7ff8b90c769b 1326->1335 1336 7ff8b90c75fc-7ff8b90c7623 call 7ff8b90bf630 1326->1336 1351 7ff8b90c7577-7ff8b90c757c 1327->1351 1352 7ff8b90c757e-7ff8b90c7590 call 7ff8b90bfe54 1327->1352 1328->1319 1357 7ff8b90c740e-7ff8b90c7429 call 7ff8b90a4818 1328->1357 1332 7ff8b90c73b8-7ff8b90c73cc call 7ff8b90a4818 1330->1332 1333 7ff8b90c73ce-7ff8b90c73d5 call 7ff8b90a4818 1330->1333 1360 7ff8b90c7b70-7ff8b90c7b99 call 7ff8b90da680 1331->1360 1332->1318 1333->1318 1347 7ff8b90c76a1-7ff8b90c76ed call 7ff8b90a594c call 7ff8b90bf630 1335->1347 1348 7ff8b90c7789-7ff8b90c778d 1335->1348 1368 7ff8b90c7625-7ff8b90c762a 1336->1368 1369 7ff8b90c762c-7ff8b90c763e call 7ff8b90bf6bc 1336->1369 1372 7ff8b90c74d9-7ff8b90c74dd 1345->1372 1373 7ff8b90c74ef-7ff8b90c74fa 1345->1373 1353 7ff8b90c7505-7ff8b90c750e call 7ff8b90a4818 1346->1353 1400 7ff8b90c76f6-7ff8b90c770c call 7ff8b90bf8f0 1347->1400 1401 7ff8b90c76ef-7ff8b90c76f4 1347->1401 1354 7ff8b90c7793-7ff8b90c77aa 1348->1354 1355 7ff8b90c7a69-7ff8b90c7b18 call 7ff8b90da964 call 7ff8b90b2424 * 2 call 7ff8b90b228c call 7ff8b90a5130 call 7ff8b90b2e34 * 2 1348->1355 1363 7ff8b90c7597-7ff8b90c75ad call 7ff8b90a3068 1351->1363 1387 7ff8b90c7592 1352->1387 1388 7ff8b90c75bc-7ff8b90c75c3 1352->1388 1389 7ff8b90c7510 1353->1389 1390 7ff8b90c751a-7ff8b90c751f 1353->1390 1367 7ff8b90c77ae call 7ff8b90d645c 1354->1367 1487 7ff8b90c7b1a-7ff8b90c7b47 1355->1487 1488 7ff8b90c7b6e 1355->1488 1357->1319 1394 7ff8b90c742b-7ff8b90c7430 1357->1394 1406 7ff8b90c75ae-7ff8b90c75b7 call 7ff8b90a7fd0 1363->1406 1380 7ff8b90c77b3-7ff8b90c77c8 call 7ff8b90a4818 1367->1380 1381 7ff8b90c7645-7ff8b90c765c call 7ff8b90a3068 1368->1381 1398 7ff8b90c7661-7ff8b90c7668 1369->1398 1399 7ff8b90c7640 1369->1399 1372->1373 1384 7ff8b90c74df-7ff8b90c74ed 1372->1384 1373->1353 1414 7ff8b90c7a3b-7ff8b90c7a48 1380->1414 1415 7ff8b90c77ce-7ff8b90c77f6 call 7ff8b90a4818 1380->1415 1381->1406 1384->1353 1387->1363 1396 7ff8b90c75c5-7ff8b90c75da call 7ff8b90a4818 1388->1396 1397 7ff8b90c75dc-7ff8b90c75e8 call 7ff8b90a4818 1388->1397 1389->1390 1403 7ff8b90c7521-7ff8b90c7536 call 7ff8b90a4818 1390->1403 1404 7ff8b90c7538-7ff8b90c753f call 7ff8b90a4818 1390->1404 1408 7ff8b90c7434 call 7ff8b90d3118 1394->1408 1441 7ff8b90c75e9-7ff8b90c75ed call 7ff8b90a7fd0 1396->1441 1397->1441 1410 7ff8b90c7681-7ff8b90c768d call 7ff8b90a4818 1398->1410 1411 7ff8b90c766a-7ff8b90c767f call 7ff8b90a4818 1398->1411 1399->1381 1442 7ff8b90c7739-7ff8b90c773e 1400->1442 1443 7ff8b90c770e 1400->1443 1418 7ff8b90c7713-7ff8b90c7733 call 7ff8b90a3068 call 7ff8b90a5130 1401->1418 1403->1323 1404->1323 1406->1388 1409 7ff8b90c7439-7ff8b90c744e call 7ff8b90a4818 1408->1409 1409->1319 1446 7ff8b90c7450-7ff8b90c7457 1409->1446 1447 7ff8b90c768e-7ff8b90c7692 call 7ff8b90a7fd0 1410->1447 1411->1447 1422 7ff8b90c7a4a 1414->1422 1423 7ff8b90c7a4d-7ff8b90c7a5b call 7ff8b90a4818 1414->1423 1449 7ff8b90c77fb-7ff8b90c7824 call 7ff8b90a4818 1415->1449 1450 7ff8b90c77f8 1415->1450 1418->1442 1422->1423 1457 7ff8b90c7a60-7ff8b90c7a64 call 7ff8b90a5130 1423->1457 1441->1326 1453 7ff8b90c7740-7ff8b90c7765 call 7ff8b90a4818 1442->1453 1454 7ff8b90c7767-7ff8b90c7775 call 7ff8b90a4818 1442->1454 1443->1418 1458 7ff8b90c7474-7ff8b90c747f call 7ff8b90a4818 1446->1458 1459 7ff8b90c7459-7ff8b90c7472 call 7ff8b90a4818 1446->1459 1447->1335 1474 7ff8b90c782a-7ff8b90c7845 1449->1474 1475 7ff8b90c7a39 1449->1475 1450->1449 1471 7ff8b90c7776-7ff8b90c7784 call 7ff8b90a5130 call 7ff8b90a7fd0 1453->1471 1454->1471 1457->1355 1458->1319 1459->1319 1471->1348 1478 7ff8b90c7854-7ff8b90c7858 1474->1478 1475->1414 1481 7ff8b90c7847-7ff8b90c784a 1478->1481 1482 7ff8b90c785a-7ff8b90c7863 1478->1482 1481->1475 1485 7ff8b90c7850 1481->1485 1482->1475 1486 7ff8b90c7869-7ff8b90c7878 1482->1486 1485->1478 1489 7ff8b90c78a5 1486->1489 1490 7ff8b90c787a-7ff8b90c788c 1486->1490 1498 7ff8b90c7b53-7ff8b90c7b57 1487->1498 1499 7ff8b90c7b49 1487->1499 1488->1360 1491 7ff8b90c78a8-7ff8b90c7951 call 7ff8b90b1f1c call 7ff8b90a4818 call 7ff8b90a594c _o__errno _o_wcstol 1489->1491 1492 7ff8b90c7897-7ff8b90c789b 1490->1492 1508 7ff8b90c7957-7ff8b90c795f 1491->1508 1509 7ff8b90c7ba8-7ff8b90c7bad call 7ff8b90a7924 1491->1509 1493 7ff8b90c788e-7ff8b90c7891 1492->1493 1494 7ff8b90c789d-7ff8b90c78a3 1492->1494 1493->1489 1500 7ff8b90c7893 1493->1500 1494->1491 1502 7ff8b90c7b60 1498->1502 1503 7ff8b90c7b59-7ff8b90c7b5e 1498->1503 1499->1498 1500->1492 1505 7ff8b90c7b63-7ff8b90c7b6b 1502->1505 1503->1502 1503->1505 1505->1488 1511 7ff8b90c7965-7ff8b90c7973 call 7ff8b90a5130 1508->1511 1512 7ff8b90c7b9b-7ff8b90c7ba7 call 7ff8b90a7a44 1508->1512 1517 7ff8b90c7bae-7ff8b90c7bb3 call 7ff8b90a7924 1509->1517 1520 7ff8b90c7975 1511->1520 1521 7ff8b90c7978-7ff8b90c79e6 call 7ff8b90a594c _o__errno _o_wcstol 1511->1521 1512->1509 1524 7ff8b90c7bb4-7ff8b90c7bc0 call 7ff8b90a7a44 1517->1524 1520->1521 1521->1517 1527 7ff8b90c79ec-7ff8b90c79ef 1521->1527 1527->1524 1529 7ff8b90c79f5-7ff8b90c7a06 call 7ff8b90a5130 1527->1529 1532 7ff8b90c7a19-7ff8b90c7a27 call 7ff8b90a5130 1529->1532 1533 7ff8b90c7a08-7ff8b90c7a16 call 7ff8b90a4818 1529->1533 1532->1414 1538 7ff8b90c7a29-7ff8b90c7a37 call 7ff8b90a4818 1532->1538 1533->1532 1538->1457
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID:
      • String ID: <R8T\>$APPL : Build number: %ld$APPL : Current LCU is out of target range$APPL : Current LCU is within target range$APPL : Device does not have kb installed$APPL : Device has kb installed$APPL : Device is not pending for reboot$APPL : Device is pending for reboot$APPL : No quality update is in progress on the device$APPL : Quality Update is in progress on the device$APPL : Quality Update is in progress on the device. The title of the update is %s$APPL : The ssu is at the expected version$APPL : The ssu is not at the expected version %s$APPL : The targeted kb %s is hidden on this device$APPL : The targeted kb %s is not hidden on this device$Completed ssu version check with result hr = 0x%08x$Current LCU is in target range$Current LCU is not in target range$Current UBR: %d, Target LCU UBR range: %d -% d$Expected ssu version is %s$Failed to get UBR version$Local ssu revision is %s$Local ssu revision is greater than or equal to expected revision$Local ssu version is %s$Result checking for Os Build hr = 0x%08X.$Result checking for hidden update hr = 0x%08X.$onecore\enduser\upgradeenablers\shellhelpers\checkapplicabilityhelper.cpp$stoi argument out of range
      • API String ID: 0-2573905499
      • Opcode ID: a5df8fa04aef69cff6abf78ff7fd07dfd986d88f522c774991b70b34d5d0f201
      • Instruction ID: cbe33a34277b266eec187af2bffd5c06d3a208cb577134329a2c46ffd649bc18
      • Opcode Fuzzy Hash: a5df8fa04aef69cff6abf78ff7fd07dfd986d88f522c774991b70b34d5d0f201
      • Instruction Fuzzy Hash: 6D428F62A18BC295EF20DF2CD8411AD37A0FF443D8F915136E74E86AA5EF78E54AC740
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 1541 7ff8b90a9749-7ff8b90a9822 call 7ff8b90bda90 call 7ff8b90a594c call 7ff8b90a7c3c call 7ff8b90a594c call 7ff8b90a7c3c call 7ff8b90a51a0 call 7ff8b90c05a0 1556 7ff8b90a9f03-7ff8b90a9f18 call 7ff8b90a4818 1541->1556 1557 7ff8b90a9828-7ff8b90a9875 call 7ff8b90a594c call 7ff8b90a51a0 call 7ff8b90c0620 1541->1557 1563 7ff8b90a9f19-7ff8b90a9f6a call 7ff8b90a5130 * 2 call 7ff8b90b43b4 call 7ff8b90a5130 call 7ff8b90da680 1556->1563 1557->1556 1570 7ff8b90a987b-7ff8b90a9893 call 7ff8b90a51a0 call 7ff8b90c05a0 1557->1570 1570->1556 1581 7ff8b90a9899-7ff8b90a9949 call 7ff8b90a4818 call 7ff8b90a594c * 2 call 7ff8b90a51a0 call 7ff8b90c0944 _o__wcsicmp 1570->1581 1593 7ff8b90a9a94-7ff8b90a9ac8 call 7ff8b90a4818 1581->1593 1594 7ff8b90a994f-7ff8b90a9a8f call 7ff8b90a4818 * 2 call 7ff8b90a594c * 2 call 7ff8b90c0aa0 call 7ff8b90a5130 * 2 call 7ff8b90a4818 call 7ff8b90a594c * 2 call 7ff8b90c0aa0 call 7ff8b90a5130 * 2 call 7ff8b90a4818 1581->1594 1602 7ff8b90a9c57-7ff8b90a9cdd call 7ff8b90c0b6c call 7ff8b90a4818 call 7ff8b90c0b6c call 7ff8b90a4818 1593->1602 1603 7ff8b90a9ace-7ff8b90a9c52 call 7ff8b90a4818 call 7ff8b90c0b6c call 7ff8b90a4818 call 7ff8b90a594c * 2 call 7ff8b90c0aa0 call 7ff8b90a5130 * 2 call 7ff8b90a4818 call 7ff8b90a594c * 2 call 7ff8b90c0aa0 call 7ff8b90a5130 * 2 call 7ff8b90a4818 1593->1603 1641 7ff8b90a9ef8-7ff8b90a9f01 call 7ff8b90a5130 1594->1641 1629 7ff8b90a9cdf-7ff8b90a9ce4 1602->1629 1630 7ff8b90a9ced-7ff8b90a9d37 call 7ff8b90a4818 call 7ff8b90a8598 1602->1630 1603->1602 1629->1630 1633 7ff8b90a9ce6-7ff8b90a9ce8 1629->1633 1650 7ff8b90a9d56-7ff8b90a9d6f call 7ff8b90ab0c8 1630->1650 1651 7ff8b90a9d39-7ff8b90a9d54 call 7ff8b90a3068 1630->1651 1637 7ff8b90a9ef6 1633->1637 1637->1641 1641->1563 1664 7ff8b90a9e03-7ff8b90a9e3b call 7ff8b90a7c3c PathFileExistsW 1650->1664 1665 7ff8b90a9d75-7ff8b90a9d90 call 7ff8b90a3068 1650->1665 1662 7ff8b90a9d95-7ff8b90a9d98 1651->1662 1667 7ff8b90a9dc3-7ff8b90a9dc6 1662->1667 1668 7ff8b90a9d9a-7ff8b90a9dc2 GetProcessHeap HeapFree call 7ff8b90a4fec 1662->1668 1685 7ff8b90a9e5a-7ff8b90a9e5d 1664->1685 1686 7ff8b90a9e3d-7ff8b90a9e57 call 7ff8b90bd7b4 1664->1686 1665->1662 1676 7ff8b90a9df1-7ff8b90a9dfe call 7ff8b90a5130 1667->1676 1677 7ff8b90a9dc8-7ff8b90a9df0 GetProcessHeap HeapFree call 7ff8b90a4fec 1667->1677 1668->1667 1676->1641 1677->1676 1689 7ff8b90a9e81-7ff8b90a9e89 1685->1689 1690 7ff8b90a9e5f-7ff8b90a9e7c call 7ff8b90a4818 1685->1690 1686->1685 1698 7ff8b90a9e8b-7ff8b90a9e8e 1689->1698 1699 7ff8b90a9eb9-7ff8b90a9ebc 1689->1699 1690->1689 1702 7ff8b90a9e90-7ff8b90a9eac GetProcessHeap HeapFree 1698->1702 1703 7ff8b90a9eb1-7ff8b90a9eb8 call 7ff8b90a4fec 1698->1703 1704 7ff8b90a9ebe-7ff8b90a9ec1 1699->1704 1705 7ff8b90a9eec-7ff8b90a9ef1 call 7ff8b90a5130 1699->1705 1702->1703 1703->1699 1709 7ff8b90a9ec3-7ff8b90a9edf GetProcessHeap HeapFree 1704->1709 1710 7ff8b90a9ee4-7ff8b90a9eeb call 7ff8b90a4fec 1704->1710 1705->1637 1709->1710 1710->1705
      APIs
        • Part of subcall function 00007FF8B90A594C: memmove.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00007FF8B90A599A
        • Part of subcall function 00007FF8B90A7C3C: memmove.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00007FF8B90A7C96
        • Part of subcall function 00007FF8B90C05A0: RegOpenKeyExW.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF8B90C05DA
        • Part of subcall function 00007FF8B90C05A0: RegCloseKey.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF8B90C05F6
        • Part of subcall function 00007FF8B90C0620: RegOpenKeyExW.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF8B90C0662
        • Part of subcall function 00007FF8B90C0620: RegQueryValueExW.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF8B90C0694
        • Part of subcall function 00007FF8B90C0620: RegCloseKey.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF8B90C06EA
        • Part of subcall function 00007FF8B90A4818: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF8B90A4958
        • Part of subcall function 00007FF8B90A4818: HeapFree.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF8B90A496D
        • Part of subcall function 00007FF8B90C0944: RegOpenKeyExW.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF8B90C09C5
        • Part of subcall function 00007FF8B90C0944: RegGetValueW.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF8B90C0A12
        • Part of subcall function 00007FF8B90C0944: RegCloseKey.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF8B90C0A53
      • _o__wcsicmp.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00007FF8B90A9933
        • Part of subcall function 00007FF8B90C0AA0: RegOpenKeyExW.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF8B90C0ADA
        • Part of subcall function 00007FF8B90C0AA0: RegSetValueExW.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF8B90C0B14
        • Part of subcall function 00007FF8B90C0AA0: RegCloseKey.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF8B90C0B47
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: CloseOpen$Value$Heapmemmove$FreeProcessQuery_o__wcsicmp
      • String ID: %s : Attempt to install previous LCU has exceeded the threshold$%s : Download Failure count for LCU %s is %d$%s : Failed to clean up the directory %s.$%s : Increment AQUA launch retry counter$%s : Increment launch retry counter to %d for %s history.$%s : Increment launch retry counter to %d for %s.$%s : Install Failure count for LCU %s is %d$%s : LCU being installed %s is different from previous attempt.$%s : LCU being installed %s is same as previous attempt.$%s : Launch retry counter for %s was %d$%s : Registry key or value doesn't exist when checking retry attempts$%s : Reset AQUA launch retry counter$%s : Set launch retry counter to default 1 for %s history.$%s : Set launch retry counter to default 1 for %s.$%s : Starting to check if retry attempts are exhasuted$<R8T\>$PREP$SOFTWARE\Microsoft\Windows\CurrentVersion\qua\lastrun\$current$downloadretrycount$installretrycount$kbnumber$launchretrycount$onecore\enduser\upgradeenablers\qualityupdateassistant\quacommonlibrary\custatemanager.cpp
      • API String ID: 22388389-3765290363
      • Opcode ID: 162c28f527f6c419b77dbfeabeece451f55516bab424be4ceeaf226fc34cbc49
      • Instruction ID: c6c657e97c35919b96cc561425838798f064dff313e31997f239175c27756eca
      • Opcode Fuzzy Hash: 162c28f527f6c419b77dbfeabeece451f55516bab424be4ceeaf226fc34cbc49
      • Instruction Fuzzy Hash: FF225122E18AC296EF009F68E8410ADB3B1FB957D4F805136EB4D57A9ADF7CD506CB40
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
        • Part of subcall function 00007FF8B90DA964: _o_malloc.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF8B90A5206), ref: 00007FF8B90DA97E
        • Part of subcall function 00007FF8B90DA964: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF8B90DA994
        • Part of subcall function 00007FF8B90DA964: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF8B90DA99A
      • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FF8B90B7C74
      • SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FF8B90B7C94
        • Part of subcall function 00007FF8B90B73D8: CoTaskMemFree.API-MS-WIN-CORE-COM-L1-1-0 ref: 00007FF8B90B7419
      • RegGetValueW.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF8B90B7F2E
        • Part of subcall function 00007FF8B90AFBB8: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF8B90AFCF8
        • Part of subcall function 00007FF8B90AFBB8: HeapFree.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF8B90AFD0D
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: Concurrency::cancel_current_taskErrorFreeHeapLast$ProcessTaskValue_o_malloc
      • String ID: <R8T\>$Authorization: MsaToken $Client wrapper failed to start session for %s. hr = 0x%08x$ETag$ETag retrieved from registry: %s$Failed to create query string. hr = 0x%08x$Failed to download Onesettings content. hr = 0x%08x$Failed to parse Json blob. hr = 0x%08x$Full query URL: %s$Msa token retrieved$OneSettings download succeeded. Status code: %lu$Refresh interval %ul$Refresh interval retrieved from registry: %s$Response body: %S$Use PPE environment$eTag: %s$onecore\enduser\upgradeenablers\onesettings\onesettings.cpp$onecore\internal\base\inc\OneSettingsClientWrapper.h$refreshInterval$settings-win-ppe.data.microsoft.com$x-ms-onesetinterval:
      • API String ID: 1559281314-2846236493
      • Opcode ID: b67a0a22cde735f26e2aeeb8d03011dea5647153bb7ce58c4da3ba5d580f9e0a
      • Instruction ID: 3514c19016d58eb1ca242b248b3c7d4d0abe65e1029d1af59bac1c6d3feef06a
      • Opcode Fuzzy Hash: b67a0a22cde735f26e2aeeb8d03011dea5647153bb7ce58c4da3ba5d580f9e0a
      • Instruction Fuzzy Hash: E1823932A0CFC281EA219F18E4502EAB7A4FBD9790F505136DB9D43AA9DF7CD546CB40
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: Free$InformationJoin$Local$BufferValuewcschrwcsncmp
      • String ID: <R8T\>$APPL : Device is Azure Active Directory Joined$APPL : Device is Domain Joined$APPL : Device is Intune Managed$APPL : Device is SCCM Managed$APPL : Device is Update Service Managed$APPL : Device is Volume Licensed$APPL : Device is not Azure Active Directory Joined$APPL : Device is not Domain Joined$APPL : Device is not Intune Managed$APPL : Device is not SCCM Managed$APPL : Device is not Update Service Managed$APPL : Device is not Volume Licensed$DeviceClientId$ProductCode$SOFTWARE\Microsoft\Provisioning\OMADM\MDMDeviceID$SOFTWARE\Microsoft\SMS\Mobile Client$Volume$`$onecore\enduser\upgradeenablers\shellhelpers\checkapplicabilityhelper.cpp
      • API String ID: 1596023777-1456160415
      • Opcode ID: f52630cae30b8ef4dee3ae0afc6a2c775fce7f9f55de3bef0e9a0969aa658074
      • Instruction ID: 3fc35aa2c0fd76cb77f0f42ccc727eddcad875c172e604f59e0e17f4693640dd
      • Opcode Fuzzy Hash: f52630cae30b8ef4dee3ae0afc6a2c775fce7f9f55de3bef0e9a0969aa658074
      • Instruction Fuzzy Hash: 18F17B62A08BC386EF649F2CA45027D6AB4FF467D0F544139EB5E466A5DF3DE80AC340
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
        • Part of subcall function 00007FF8B90C4920: _time64.API-MS-WIN-CRT-TIME-L1-1-0(?,?,00000000,00007FF8B90AD4C6), ref: 00007FF8B90C492B
        • Part of subcall function 00007FF8B90C4920: _o__localtime64.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000000,00007FF8B90AD4C6), ref: 00007FF8B90C4941
      • DeleteFileW.API-MS-WIN-CORE-FILE-L1-1-0 ref: 00007FF8B90AD565
      • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FF8B90AD586
        • Part of subcall function 00007FF8B90A4818: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF8B90A4958
        • Part of subcall function 00007FF8B90A4818: HeapFree.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF8B90A496D
      • wcscmp.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF8B90AD754
      • DeleteFileW.API-MS-WIN-CORE-FILE-L1-1-0 ref: 00007FF8B90AD832
      • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FF8B90AD84C
      • wcscmp.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF8B90AD8D9
        • Part of subcall function 00007FF8B90A594C: memmove.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00007FF8B90A599A
        • Part of subcall function 00007FF8B90910A4: EventWriteTransfer.API-MS-WIN-EVENTING-PROVIDER-L1-1-0 ref: 00007FF8B9091127
      • wcscmp.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF8B90AD5FD
        • Part of subcall function 00007FF8B90A5724: InitOnceBeginInitialize.API-MS-WIN-CORE-SYNCH-L1-2-0 ref: 00007FF8B90A5746
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: wcscmp$DeleteErrorFileHeapLast$BeginEventFreeInitInitializeOnceProcessTransferWrite_o__localtime64_time64memmove
      • String ID: %s : Completed installation of %s, kb %s$%s : Error executing install command of %s, kb %s$%s : Executing installer: %s$%s : Failed to delete %s$%s : LCU %s is already installed.$%s : Pending reboot after installation %d of %s, kb %s$%s : QualityUpdateExecutor::Install: End$%s : QualityUpdateExecutor::Install: Starting$2023.10$<R8T\>$DWLD$DismInstaller$Executed: UsoHelper::RebootRequired: %ld$Failed$Failed to check reboot status, stop caffeine pill$INTL$Started$Succeeded$WusaInstaller
      • API String ID: 645134431-71885474
      • Opcode ID: 758683be32f3a729903bb3e99569251d79d03c804bf193f9c64cab1464a0f969
      • Instruction ID: f325ca994ec3c6fd5dda6b57ef57f49594d070059d19a0e7717ef9c21d078b6b
      • Opcode Fuzzy Hash: 758683be32f3a729903bb3e99569251d79d03c804bf193f9c64cab1464a0f969
      • Instruction Fuzzy Hash: 6E525A32A08B8289EB10DF69E8443ED37A4FB48B98F414136DB8D57769EF38D546C790
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: ErrorHeapLast$DirectoryExistsFileFreePathProcessSystemmemset
      • String ID: /quiet /norestart$<R8T\>$Command %s returned a non-zero error code$Command %s returned a zero error code$Error retrieving Windows system directory.$Error retrieving Windows temporary directory.$Failed to execute command %s$Found %s$Generated the wusa command line %s$Starting MSU from %s$The package %s installation failed due to error %d$The package %s was already installed$The package %s was installed, reboot required$The package %s was not applicable$cmd.exe /c$onecore\enduser\upgradeenablers\shellhelpers\windowsupdateinstallhelper.cpp$wusa.exe
      • API String ID: 3582345318-1735011925
      • Opcode ID: 282f6c8af2e44831ddf1b3b49384e4c9c8314bfc135b4c230fa7b99465cb9607
      • Instruction ID: b5db26d5f15817690f373a9787ea9acdd5e2d7e716480d5950ccb9e264b5dad2
      • Opcode Fuzzy Hash: 282f6c8af2e44831ddf1b3b49384e4c9c8314bfc135b4c230fa7b99465cb9607
      • Instruction Fuzzy Hash: 64B15C62E08BC295EF109F6CE8901BDA7A0FB843E4F915036EB8D465A5DF7CD546CB80
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: FileHeap$Find$ErrorFreeLastProcess$CloseDeleteDirectoryExistsFirstNextPathSystem
      • String ID: -F:* $<R8T\>$INTL : Cab file output folder %s$INTL : Command %s returned S_OK, exit status: %d, cab path %s$INTL : Error retrieving Windows system directory.$INTL : Failed to delete cab file %s$INTL : Failed to execute command %s$INTL : Found %s$INTL : Generated the expand command line %s$INTL : Starting DismInstaller::PerformInstall$\*.cab$expand.exe$onecore\enduser\upgradeenablers\qualityupdateassistant\quacommonlibrary\disminstaller.cpp
      • API String ID: 1240874306-3514679066
      • Opcode ID: 04e67ab500c3360eb201385e8ca5032104db04df8346b074e1c6cc22f9be6305
      • Instruction ID: 4aba8420b1b3f8f9e9a0e70c9fa3b2b877acbc08d9b1683b20cb5338ebc8e79e
      • Opcode Fuzzy Hash: 04e67ab500c3360eb201385e8ca5032104db04df8346b074e1c6cc22f9be6305
      • Instruction Fuzzy Hash: 4AF18022A08AC295EF009F6CE8901EDA760FB943E4F908136DB5D576B9DF7CD54ACB40
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
        • Part of subcall function 00007FF8B90A4818: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF8B90A4958
        • Part of subcall function 00007FF8B90A4818: HeapFree.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF8B90A496D
      • PathFileExistsW.API-MS-WIN-CORE-SHLWAPI-LEGACY-L1-1-0 ref: 00007FF8B90ACE04
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: Heap$ExistsFileFreePathProcess
      • String ID: %s : LCU %s is already downloaded.$%s : QualityUpdateExecutor::Download: DO downloader is not enabled$%s : QualityUpdateExecutor::Download: End$%s : QualityUpdateExecutor::Download: Starting$%s : QualityUpdateExecutor::Download: Starting download using %s:$%s : QualityUpdateExecutor::Download: completed running downloader %s:$2023.10$<R8T\>$DODownloader$DWLD$Failed$HttpsDownloader$Started$Succeeded$The device has %llu of uptime minutes less than required %ld minutes$onecore\enduser\upgradeenablers\qualityupdateassistant\quacommonlibrary\quaexecutor.cpp
      • API String ID: 2580559308-19600558
      • Opcode ID: 4e798d729be9bbedda55ba196ea963bd45d58bf859647729a9d496a32223d8a3
      • Instruction ID: 4b04cf7c70aa1f97cee7767d9131658803722384e4a958cc1a2bce8d7ba7a96f
      • Opcode Fuzzy Hash: 4e798d729be9bbedda55ba196ea963bd45d58bf859647729a9d496a32223d8a3
      • Instruction Fuzzy Hash: 01124632A08B8299EB10DF29E8403AD37A4FB48BD8F504136DB5D57B68DF38D556C780
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
        • Part of subcall function 00007FF8B90A594C: memmove.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00007FF8B90A599A
        • Part of subcall function 00007FF8B90A7C3C: memmove.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00007FF8B90A7C96
        • Part of subcall function 00007FF8B90C05A0: RegOpenKeyExW.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF8B90C05DA
        • Part of subcall function 00007FF8B90C05A0: RegCloseKey.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF8B90C05F6
        • Part of subcall function 00007FF8B90C0620: RegOpenKeyExW.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF8B90C0662
        • Part of subcall function 00007FF8B90C0620: RegQueryValueExW.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF8B90C0694
        • Part of subcall function 00007FF8B90C0620: RegCloseKey.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF8B90C06EA
        • Part of subcall function 00007FF8B90C0944: RegOpenKeyExW.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF8B90C09C5
        • Part of subcall function 00007FF8B90C0944: RegGetValueW.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF8B90C0A12
        • Part of subcall function 00007FF8B90C0944: RegCloseKey.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF8B90C0A53
      • _o__wcsicmp.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00007FF8B90AA578
        • Part of subcall function 00007FF8B90C0B6C: RegOpenKeyExW.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF8B90C0BA7
        • Part of subcall function 00007FF8B90C0B6C: RegQueryValueExW.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF8B90C0BD4
        • Part of subcall function 00007FF8B90C0B6C: RegCloseKey.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF8B90C0C07
        • Part of subcall function 00007FF8B90A4818: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF8B90A4958
        • Part of subcall function 00007FF8B90A4818: HeapFree.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF8B90A496D
        • Part of subcall function 00007FF8B90AB200: memmove.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00007FF8B90AB24D
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: CloseOpen$Valuememmove$HeapQuery$FreeProcess_o__wcsicmp
      • String ID: %s : Attempt to install previous LCU has exceeded the threshold$%s : Getting last download url %s$%s : Getting last execution state result for %s$%s : Getting last msu hash %s$%s : Reseting prvious execution state in registry$%s : Saving the execution state. Getting failure count for %s$<R8T\>$PREP$SOFTWARE\Microsoft\Windows\CurrentVersion\qua\lastrun\$current$downloaded$downloadretrycount$downloadurl$installed$installretrycount$kbnumber$lcuhash$onecore\enduser\upgradeenablers\qualityupdateassistant\quacommonlibrary\custatemanager.cpp
      • API String ID: 270712571-1229816024
      • Opcode ID: 3174d054456da8a2bc84ac528451f3eb33876f50d06b12480e17c71c78253693
      • Instruction ID: f264f887ed359866cb4c347f506f25772daa4808dbd0e8f09b63582fce5302a5
      • Opcode Fuzzy Hash: 3174d054456da8a2bc84ac528451f3eb33876f50d06b12480e17c71c78253693
      • Instruction Fuzzy Hash: 4DE14162E08B8299FF00DFA8E8411ED6771FB443E8F805136EB4D56A69DF38D54AC780
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: CreateInstance
      • String ID: Error when connecting to Task Scheduler.$Microsoft\Windows\Servicing$TasksHelperInitializeFailed$TasksHelperInitializeSuccess$Unable to CoCreateInstance for Task Scheduler.$Unable to find the task folder path: [%s]. Attemtping to create it.
      • API String ID: 542301482-1547664477
      • Opcode ID: 8f5d07cdc619efc02b97f0ea973158475f79a34abed5eafc66f506628f8f8840
      • Instruction ID: 65ecbc703596b7629afa114adee68101621b30e0b21df1de002703b1fe1ca57f
      • Opcode Fuzzy Hash: 8f5d07cdc619efc02b97f0ea973158475f79a34abed5eafc66f506628f8f8840
      • Instruction Fuzzy Hash: 00C16F26A18FC58AEB018F6CD8402BD6731FB9A795F409232DB4E57664EF78D58AC340
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • RegGetValueW.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF8B90B6A34
      • GetSystemTimeAsFileTime.API-MS-WIN-CORE-SYSINFO-L1-1-0 ref: 00007FF8B90B6A79
        • Part of subcall function 00007FF8B90A4818: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF8B90A4958
        • Part of subcall function 00007FF8B90A4818: HeapFree.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF8B90A496D
      • LoadLibraryExW.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0 ref: 00007FF8B90B6AC9
      • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FF8B90B6AE3
      • FreeLibrary.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0 ref: 00007FF8B90B6B1A
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: FreeHeapLibraryTime$ErrorFileLastLoadProcessSystemValue
      • String ID: Failed to load OneSettingsClient.dll. hr = 0x%08x$OneSettings GetCloudSettings failed$OneSettings IsTimeToRequery failed$OneSettings OpenWebRequest failed$OneSettings UpdateNextRefreshTime failed$OneSettings requery is TRUE$OneSettings requery is TRUE. Call Onesettings client library.$OneSettingsClient.dll$PREP$RefreshAfter
      • API String ID: 2811100693-2128188728
      • Opcode ID: d157b97e43d16099b836ec53f85d38f29759f8ff2bfc90bfee9ab91c59bd31d8
      • Instruction ID: 34b9d1bb136d9fb9dc3a7c03c69f576c529902922427aca1f2c07ad9b9063ff6
      • Opcode Fuzzy Hash: d157b97e43d16099b836ec53f85d38f29759f8ff2bfc90bfee9ab91c59bd31d8
      • Instruction Fuzzy Hash: 22516822B0CF8286EF109F2C95A07B976A2FB457D0F508135CB5D87281DF2DE8868B40
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
        • Part of subcall function 00007FF8B90A4818: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF8B90A4958
        • Part of subcall function 00007FF8B90A4818: HeapFree.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF8B90A496D
      • CoCreateInstance.API-MS-WIN-CORE-COM-L1-1-0 ref: 00007FF8B90D3A4C
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: Heap$CreateFreeInstanceProcess
      • String ID: <R8T\>$InstalledOn$No security patches were found$Number of days since last security update was installed: %d$Querying WMI for patch history$ROOT\CIMV2$onecore\enduser\upgradeenablers\cleanuphelpers\dismhelper.cpp$select * FROM Win32_QuickFixEngineering WHERE Description = 'Security Update'
      • API String ID: 2021856900-4192024053
      • Opcode ID: bf81987199cee5c30e2578551090bf7f5833d34d214d762afcc2e0099c5eb95b
      • Instruction ID: 0a0ea00e388288befcd2fc2ab3e8c299e4bf2b4ce69b555b433fe9bb28bf3d58
      • Opcode Fuzzy Hash: bf81987199cee5c30e2578551090bf7f5833d34d214d762afcc2e0099c5eb95b
      • Instruction Fuzzy Hash: D8F16E36A08B8686EB109F69E8401AE77B5FB887D8F504136EF4D57BA8DF38D506C740
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • GetEnvironmentVariableW.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0 ref: 00007FF8B90D42F6
      • DeleteFileW.API-MS-WIN-CORE-FILE-L1-1-0 ref: 00007FF8B90D4361
        • Part of subcall function 00007FF8B90A4818: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF8B90A4958
        • Part of subcall function 00007FF8B90A4818: HeapFree.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF8B90A496D
        • Part of subcall function 00007FF8B90D398C: CoCreateInstance.API-MS-WIN-CORE-COM-L1-1-0 ref: 00007FF8B90D3A4C
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: Heap$CreateDeleteEnvironmentFileFreeInstanceProcessVariable
      • String ID: <R8T\>$Detected errors %s in line$Found the log file at %s$Running the dism command %s$The last security update does not meet the minimum install time requirement$This device is not out of service$This device is out of service so proceeding with rebase$WINDIR$\System32\dism.exe /online /cleanup-image /startcomponentcleanup$\logs\DISM\dism.log$onecore\enduser\upgradeenablers\cleanuphelpers\dismhelper.cpp
      • API String ID: 1935686498-87585567
      • Opcode ID: 385057d7085fac620c8832203a03fb267185ad22a280780000aee300845eefe2
      • Instruction ID: 4bd41e27df1ad22ecf7133a35f876a39f5dc6e447b893fbe479b08b7fadf0675
      • Opcode Fuzzy Hash: 385057d7085fac620c8832203a03fb267185ad22a280780000aee300845eefe2
      • Instruction Fuzzy Hash: 70C14132A18AC299EF31DF28D8512ED33A4FF98398F804536DB4E56999DF78D646C340
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • CreateFileW.API-MS-WIN-CORE-FILE-L1-1-0 ref: 00007FF8B90D34ED
      • CreateFileMappingW.API-MS-WIN-CORE-MEMORY-L1-1-0(?,?,?,?,?,?,?,?,00007FF8B90CE3B2), ref: 00007FF8B90D3533
      • CloseHandle.API-MS-WIN-CORE-HANDLE-L1-1-0(?,?,?,?,?,?,?,?,00007FF8B90CE3B2), ref: 00007FF8B90D36C0
      • CloseHandle.API-MS-WIN-CORE-HANDLE-L1-1-0(?,?,?,?,?,?,?,?,00007FF8B90CE3B2), ref: 00007FF8B90D36D5
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: CloseCreateFileHandle$Mapping
      • String ID: onecore\enduser\upgradeenablers\shellhelpers\filehelper.cpp
      • API String ID: 105643748-3027416378
      • Opcode ID: 2286da274325384c5f1302b3d0714fc32fe6145c13608f4002eecbed6bc133f5
      • Instruction ID: 2253a5c35d9aa37dd64f1a7bdc7917808eab05df6cbcde69671a8eda6548e31a
      • Opcode Fuzzy Hash: 2286da274325384c5f1302b3d0714fc32fe6145c13608f4002eecbed6bc133f5
      • Instruction Fuzzy Hash: 08614B32A08A8287EB648F19E4447797BA4FB89FD8F458270DF5E47794DF78E4068B40
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • PowerCreateRequest.API-MS-WIN-CORE-KERNEL32-LEGACY-L1-1-1(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF8B90AE0A9), ref: 00007FF8B90C154D
      • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF8B90AE0A9), ref: 00007FF8B90C156D
      • CloseHandle.API-MS-WIN-CORE-HANDLE-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF8B90AE0A9), ref: 00007FF8B90C157E
      • SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF8B90AE0A9), ref: 00007FF8B90C158C
      • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF8B90AE0A9), ref: 00007FF8B90C15A5
      • PowerSetRequest.API-MS-WIN-CORE-KERNEL32-LEGACY-L1-1-1(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF8B90AE0A9), ref: 00007FF8B90C1607
      • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF8B90AE0A9), ref: 00007FF8B90C1628
      • CloseHandle.API-MS-WIN-CORE-HANDLE-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF8B90AE0A9), ref: 00007FF8B90C1639
      • SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF8B90AE0A9), ref: 00007FF8B90C1647
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: ErrorLast$CloseHandlePowerRequest$Create
      • String ID: CUAssistant$Failed to boost performance$Failed to prevent system from sleeping$onecore\enduser\upgradeenablers\shellhelpers\changepowerprofilehelper.cpp
      • API String ID: 724135050-1347666279
      • Opcode ID: b897ea213a674d62595402314379de21cc95c5c7d6165e119ad2b3d71837b9a9
      • Instruction ID: e70c5139064a176f3319283c1552e6a978afa30a6df6d4feeb3d2ccd11471b5c
      • Opcode Fuzzy Hash: b897ea213a674d62595402314379de21cc95c5c7d6165e119ad2b3d71837b9a9
      • Instruction Fuzzy Hash: D6412C36A08B82C6EB509F29A4046AC76B5FB89BA1F548335DB6E437D4CF39D4068700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • PathFileExistsW.API-MS-WIN-CORE-SHLWAPI-LEGACY-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00007FF8B90B47AA), ref: 00007FF8B90CE151
      • CreateDirectoryW.API-MS-WIN-CORE-FILE-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00007FF8B90B47AA), ref: 00007FF8B90CE16F
      • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00007FF8B90B47AA), ref: 00007FF8B90CE17F
        • Part of subcall function 00007FF8B90A7C3C: memmove.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00007FF8B90A7C96
      • PathFindFileNameW.API-MS-WIN-CORE-SHLWAPI-LEGACY-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00007FF8B90B47AA), ref: 00007FF8B90CE1C3
        • Part of subcall function 00007FF8B90C4920: _time64.API-MS-WIN-CRT-TIME-L1-1-0(?,?,00000000,00007FF8B90AD4C6), ref: 00007FF8B90C492B
        • Part of subcall function 00007FF8B90C4920: _o__localtime64.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000000,00007FF8B90AD4C6), ref: 00007FF8B90C4941
      • URLDownloadToFileW.URLMON ref: 00007FF8B90CE21D
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: File$Path$CreateDirectoryDownloadErrorExistsFindLastName_o__localtime64_time64memmove
      • String ID: <R8T\>$Completed download successfully$Failed to complete download due to reason %d$Result of creating folder %s - 0x%08x$Result of downloading %s - 0x%08x$Result of downloading %s - 0x%08x - performing retry$Starting HttpsDownloader::PerformDownload. Local path:%s, TargetURL:%s
      • API String ID: 1266399170-539232878
      • Opcode ID: 338366ae09012776eda932ae20ca227957f6cf90bb9da6c7c3cc99a2031fa02e
      • Instruction ID: c70e724c84f3190558d5b029d95135df03eddedf0da5ce4b5c9f1524643bd2f0
      • Opcode Fuzzy Hash: 338366ae09012776eda932ae20ca227957f6cf90bb9da6c7c3cc99a2031fa02e
      • Instruction Fuzzy Hash: 43619022E08AC681FF109F2DE4443B96AA1EB95FD4F159135EF0D47395DE3CD5568380
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
        • Part of subcall function 00007FF8B90A1A64: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF8B90A1A73
        • Part of subcall function 00007FF8B90A1A64: HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF8B90A1A87
        • Part of subcall function 00007FF8B90A1A64: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF8B90A1AA2
      • CreateSemaphoreExW.API-MS-WIN-CORE-SYNCH-L1-1-0 ref: 00007FF8B90A5B85
      • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF8B90A5CC7
      • HeapFree.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF8B90A5CDB
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: Heap$Process$AllocCreateFreeSemaphore
      • String ID: <R8T\>$_p0$wil
      • API String ID: 2241733678-715146794
      • Opcode ID: 10dd70a0a3b40bd33e1f040c17c48c4a7e716a45e2eb63e7f9215de22283bccd
      • Instruction ID: e8fa028d299087a686a0ac622ae75ad80a32c8a090867d28bb4fa331a6ad3b6b
      • Opcode Fuzzy Hash: 10dd70a0a3b40bd33e1f040c17c48c4a7e716a45e2eb63e7f9215de22283bccd
      • Instruction Fuzzy Hash: 65818E32A18AC286EF109F29E8406AE77A0FB89B94F548131DB4D47795EF3CD546CB80
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
        • Part of subcall function 00007FF8B90A4818: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF8B90A4958
        • Part of subcall function 00007FF8B90A4818: HeapFree.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF8B90A496D
      • GetEnvironmentVariableW.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0 ref: 00007FF8B90C5424
      • GetDiskFreeSpaceExW.API-MS-WIN-CORE-FILE-L1-1-0 ref: 00007FF8B90C54A0
      • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FF8B90C54B0
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: FreeHeap$DiskEnvironmentErrorLastProcessSpaceVariable
      • String ID: is the system drive$<R8T\>$CheckSystemDiskFreeSpace: $CheckSystemDiskFreeSpace: Start Function CheckSystemDiskFreeSpace$SYSTEMDRIVE
      • API String ID: 2088975640-1760807164
      • Opcode ID: 4acefe93e5039ea7304be521f66d128a2c6a270620c4f5c3dd23636f37315453
      • Instruction ID: 5042496c2284cb9a8fbae2fd99acc5568ef7a5d655c5730f2328d87f0f825153
      • Opcode Fuzzy Hash: 4acefe93e5039ea7304be521f66d128a2c6a270620c4f5c3dd23636f37315453
      • Instruction Fuzzy Hash: 9C516F22F18B82D9EB109FA8D8512FC2371EF593A8F805235DB5E56695DF38D91BC340
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: ErrorLast$Power$ClearCloseHandleInformationRequest
      • String ID: Failed to allow system to sleep$Failed to stop boosting performance
      • API String ID: 2155621860-1563527938
      • Opcode ID: 582cc2fa1ed04a8b8144c466a11276ba71f09de6bd608ee46a2b6f54767d177e
      • Instruction ID: 795317689d821d8c362178bd9ede6936fc77af4a8e64049d78a61ffc0e25099c
      • Opcode Fuzzy Hash: 582cc2fa1ed04a8b8144c466a11276ba71f09de6bd608ee46a2b6f54767d177e
      • Instruction Fuzzy Hash: 2F312A32A08B8286EB409F29E44027DB6B1FB85BA0F548374DB7E436E4DF3CD4468B40
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: ExceptionFilterPresentUnhandledmemset$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
      • String ID:
      • API String ID: 313767242-0
      • Opcode ID: 9d69d389b30af50cee857b827624619968668472f6c8ee24e7dbb2053d1fb449
      • Instruction ID: a562088a8f999c69515e18dbcd28aaa4d73931ecdf737a5195c058f918ad45f3
      • Opcode Fuzzy Hash: 9d69d389b30af50cee857b827624619968668472f6c8ee24e7dbb2053d1fb449
      • Instruction Fuzzy Hash: 94313972A09B818AEB609F68E8803ED6375FB84784F44443ADB4E47A98DF38D649C700
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: Concurrency::cancel_current_taskHeap$FreeProcess_o__invalid_parameter_noinfo_noreturn_o_malloc
      • String ID: %s : QualityUpdateExecutor::CheckApplicability: End$%s : QualityUpdateExecutor::CheckApplicability: Starting$%sQualityUpdateExecutor::CheckApplicability: false, current device is not applicable$%sQualityUpdateExecutor::CheckApplicability: true, current device is applicable$2023.10$<R8T\>$APPL
      • API String ID: 3833427892-2450416914
      • Opcode ID: b2b68b3a7917c3327d478a42d29ec277a8ec3f749e77c00b3d2ec4290e7148d5
      • Instruction ID: 33be3747dcce39760218342d307131d4db08bb943a69b94bf3086eef99c49ea5
      • Opcode Fuzzy Hash: b2b68b3a7917c3327d478a42d29ec277a8ec3f749e77c00b3d2ec4290e7148d5
      • Instruction Fuzzy Hash: D0F15932A04B918AEB50CF69E8843AD77B4FB48798F504126EB4D57B98DF38D546CB80
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FF8B90B5401
      • HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FF8B90B5427
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: Heap$AllocProcess
      • String ID: <R8T\>$Service Pack %d
      • API String ID: 1617791916-3834186993
      • Opcode ID: f29cf8d74064d2414cd598d860ab95d48ed1d64c7c57056c2e7acb9a2cd974fa
      • Instruction ID: 0accd0ec83c30ad560ad2f464785c310338783d043794c5b53e5274251549dc5
      • Opcode Fuzzy Hash: f29cf8d74064d2414cd598d860ab95d48ed1d64c7c57056c2e7acb9a2cd974fa
      • Instruction Fuzzy Hash: 4AB19023F18A8289EF648F7DD4182BD22A1BF09BC9B054175DF4D57798EE3CE5068740
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • GetCurrentThreadId.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0(?,?,00000000,00000000,?,00000800,?), ref: 00007FF8B90A6BB3
      • IsDebuggerPresent.API-MS-WIN-CORE-DEBUG-L1-1-0(?,?,00000000,00000000,?,00000800,?), ref: 00007FF8B90A6CED
      • OutputDebugStringW.API-MS-WIN-CORE-DEBUG-L1-1-0(?,?,00000000,00000000,?,00000800,?), ref: 00007FF8B90A6DA3
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: CurrentDebugDebuggerOutputPresentStringThread
      • String ID: <R8T\>
      • API String ID: 4268342597-166503183
      • Opcode ID: 3fdd9a982a427f359394a38be8c6db8ec40320c87947cf6938479a4a0af3d725
      • Instruction ID: ab87d626e6839312d72cf008a893a0c241e7f0ddaff8653ee2566b84829e3968
      • Opcode Fuzzy Hash: 3fdd9a982a427f359394a38be8c6db8ec40320c87947cf6938479a4a0af3d725
      • Instruction Fuzzy Hash: CE918E22E09BC186EF249F69E8402B967B0FB45BD4F055139EB8D176A4DF3DE542C740
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: Find$File$CloseFirstNext
      • String ID: <R8T\>
      • API String ID: 3541575487-166503183
      • Opcode ID: ad4d4cc08c3e8454df09a542f865a324665a3f17d26112d850f8341690c7241d
      • Instruction ID: f3d9308062329b038d0c8fda559b7a530d89e897e8401c46d0022c4c731d8fd1
      • Opcode Fuzzy Hash: ad4d4cc08c3e8454df09a542f865a324665a3f17d26112d850f8341690c7241d
      • Instruction Fuzzy Hash: E851CF32A18B8186EB108F69E8542AD63B0FB85BE8F504231EF5D17AE5DF7CD586C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: BinaryCryptString
      • String ID: <R8T\>$onecore\enduser\upgradeenablers\shellhelpers\downloadhelper.cpp
      • API String ID: 80407269-1701643399
      • Opcode ID: 1b5d5d8dfd62bdbf98b87d297f196a32c4f995a509d9bcd1276e3528a8a3990b
      • Instruction ID: a7573aa8239a3dbbed64a561fc7cb0517aebd873386452f3c9873cedea9cf646
      • Opcode Fuzzy Hash: 1b5d5d8dfd62bdbf98b87d297f196a32c4f995a509d9bcd1276e3528a8a3990b
      • Instruction Fuzzy Hash: 6D215222F19A86DAEB10CF79D4503ED2761EB9878CF415136EF0C46649EF38E25AC340
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: Time$System$ErrorFileLast
      • String ID: <R8T\>
      • API String ID: 2409880431-166503183
      • Opcode ID: a8dec696e00d383073190fcdee456dfd28f48af793df1c75fe32100ca389ba98
      • Instruction ID: 348b68d5c8f3c818ced405955dad7d645d43bec2fcfda9beb7eeee3d88aef427
      • Opcode Fuzzy Hash: a8dec696e00d383073190fcdee456dfd28f48af793df1c75fe32100ca389ba98
      • Instruction Fuzzy Hash: F5016121B18BC286EF509F6DA894279B2B1FF89BD4F415134EB4E87751DF2CD80A8644
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: ErrorLastVersionmemset
      • String ID: <R8T\>
      • API String ID: 173866510-166503183
      • Opcode ID: 06d4cf32713f735cb5823b6953a460fed96fdaf7b71001f7acb35b64a08e0a8c
      • Instruction ID: 90945ba0bdb88edd82e2c8b900a3aafc00923cc1a65d20f4678e73e6b3bc6a06
      • Opcode Fuzzy Hash: 06d4cf32713f735cb5823b6953a460fed96fdaf7b71001f7acb35b64a08e0a8c
      • Instruction Fuzzy Hash: D4012D356086C186EB749F69E45177AB2A4FF89784F404139EB4E42695CF3CD5068B04
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,?,?,?,00007FF8B90C95D9), ref: 00007FF8B90C9974
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: memset
      • String ID:
      • API String ID: 2221118986-0
      • Opcode ID: 80406254aef2ddcd7893ee9919894fd81e62bf8383ace0611f2ecb5a38c4da84
      • Instruction ID: 4e073744436c3d43c43a38451ace749a1d03347eb4f518211a45cd88f8551618
      • Opcode Fuzzy Hash: 80406254aef2ddcd7893ee9919894fd81e62bf8383ace0611f2ecb5a38c4da84
      • Instruction Fuzzy Hash: 0491DD23B19AC682EF158F6AD4405B873A0FB54BD0B149235DF6E17B86DE3CE19AC300
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 1c8d5e74af7f09b1599724be9794d975d7ff088d71c1aadf7712d5660acc5938
      • Instruction ID: bc6bc41a8cbfe0f83eb510f9d38c7cec410fb5e95389e9c2909aa512fd65018b
      • Opcode Fuzzy Hash: 1c8d5e74af7f09b1599724be9794d975d7ff088d71c1aadf7712d5660acc5938
      • Instruction Fuzzy Hash: A061BFA2A18BC582EF108F2DE5402A9B371F7957D0F509231EBAD47B99DF7CE1858600
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: CloseOpen
      • String ID: Failed to write %s to cache.
      • API String ID: 47109696-1154383526
      • Opcode ID: 257a38233450d47df647521dbe2a50bb616fa5df22d67f7b7cb0607b825a976c
      • Instruction ID: f54f031e511df940528bacfe4b66757bcbea22d652a3b67eb30569ed7419b9cb
      • Opcode Fuzzy Hash: 257a38233450d47df647521dbe2a50bb616fa5df22d67f7b7cb0607b825a976c
      • Instruction Fuzzy Hash: 5312F626A08F958AEF048F6AD8905AC3BB0FB8ABD5B115135DF0E53B64DF39D446A340
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: ErrorHeapLast$CloseCreateDirectoryFreeOpenPathProcessSystemTempmemset
      • String ID: <R8T\>$Awaker.log$Error retrieving Windows system directory.$Error retrieving Windows temporary directory.$HighPerformancePlan.log$PowerPlan.log$PowerPlanList.log$SOFTWARE\Microsoft\rempl\powerprofile$USB_Selective_Suspend.log$\cmd.exe /c $\powercfg.exe
      • API String ID: 4054028666-2606974954
      • Opcode ID: e24ac1dceb4e162aa990f31e71be76ba9f40aa920a737116d3c457de2d147958
      • Instruction ID: 444b3bfd656eece5c697be05b6421a5aa44c331a4a49f2753dd12b249e8a5147
      • Opcode Fuzzy Hash: e24ac1dceb4e162aa990f31e71be76ba9f40aa920a737116d3c457de2d147958
      • Instruction Fuzzy Hash: DD715E22A08BC696EF109F29E8502BE6361FF85790F809135DB5E476A5DF7CD506C780
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: CurrentFormatMessageThread
      • String ID: $%hs!%p: $%hs(%d) tid(%x) %08X %ws$%hs(%u)\%hs!%p: $(caller: %p) $<R8T\>$CallContext:[%hs] $Exception$FailFast$LogHr$LogNt$Msg:[%ws] $ReturnHr$ReturnNt$[%hs(%hs)]$[%hs]
      • API String ID: 2411632146-2940375770
      • Opcode ID: fb5c1d102ec6a4bd2b52422eb70ba322f2416d10e5eff8f1b2eed19beaa43efa
      • Instruction ID: aa6f133a9be1cde611c53c4e9c9caa5b9070bd3a3615cee6c5b4507045b77601
      • Opcode Fuzzy Hash: fb5c1d102ec6a4bd2b52422eb70ba322f2416d10e5eff8f1b2eed19beaa43efa
      • Instruction Fuzzy Hash: 16717025E09AC681EEA4CF59A4406B963A1FF48BE4F448136EF5D077A8DF3CE546C380
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      • regex_error(error_space): There was insufficient memory to convert the expression into a finite state machine., xrefs: 00007FF8B90A7853
      • regex_error(error_paren): The expression contained mismatched ( and )., xrefs: 00007FF8B90A77AD
      • regex_error(error_collate): The expression contained an invalid collating element name., xrefs: 00007FF8B90A77E6
      • regex_error(error_syntax), xrefs: 00007FF8B90A7826
      • regex_error(error_stack): There was insufficient memory to determine whether the regular expression could match the specified character sequence., xrefs: 00007FF8B90A7838
      • regex_error(error_escape): The expression contained an invalid escaped character, or a trailing escape., xrefs: 00007FF8B90A77D1
      • regex_error(error_brace): The expression contained mismatched { and }., xrefs: 00007FF8B90A77A1
      • regex_error(error_parse), xrefs: 00007FF8B90A782F
      • regex_error, xrefs: 00007FF8B90A781D
      • regex_error(error_backref): The expression contained an invalid back reference., xrefs: 00007FF8B90A77C5
      • regex_error(error_complexity): The complexity of an attempted match against a regular expression exceeded a pre-set level., xrefs: 00007FF8B90A7841
      • regex_error(error_range): The expression contained an invalid character range, such as [b-a] in most encodings., xrefs: 00007FF8B90A785C
      • regex_error(error_brack): The expression contained mismatched [ and ]., xrefs: 00007FF8B90A77B9
      • regex_error(error_badbrace): The expression contained an invalid range in a { expression }., xrefs: 00007FF8B90A77EF
      • regex_error(error_ctype): The expression contained an invalid character class name., xrefs: 00007FF8B90A77DD
      • regex_error(error_badrepeat): One of *?+{ was not preceded by a valid regular expression., xrefs: 00007FF8B90A784A
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: _o___std_exception_copy
      • String ID: regex_error$regex_error(error_backref): The expression contained an invalid back reference.$regex_error(error_badbrace): The expression contained an invalid range in a { expression }.$regex_error(error_badrepeat): One of *?+{ was not preceded by a valid regular expression.$regex_error(error_brace): The expression contained mismatched { and }.$regex_error(error_brack): The expression contained mismatched [ and ].$regex_error(error_collate): The expression contained an invalid collating element name.$regex_error(error_complexity): The complexity of an attempted match against a regular expression exceeded a pre-set level.$regex_error(error_ctype): The expression contained an invalid character class name.$regex_error(error_escape): The expression contained an invalid escaped character, or a trailing escape.$regex_error(error_paren): The expression contained mismatched ( and ).$regex_error(error_parse)$regex_error(error_range): The expression contained an invalid character range, such as [b-a] in most encodings.$regex_error(error_space): There was insufficient memory to convert the expression into a finite state machine.$regex_error(error_stack): There was insufficient memory to determine whether the regular expression could match the specified character sequence.$regex_error(error_syntax)
      • API String ID: 1105030492-2293683844
      • Opcode ID: 4a3d7fe54079e9648fedbe0dcb25980f4c535347ba49ad95dfb2eb68c8c4ee93
      • Instruction ID: cd7b90941792e00efabde75cdc69febdba95a333d2dbf3d09e20cc0fbc7a242d
      • Opcode Fuzzy Hash: 4a3d7fe54079e9648fedbe0dcb25980f4c535347ba49ad95dfb2eb68c8c4ee93
      • Instruction Fuzzy Hash: B741D932E9CAC3A4FE688F5D959407816A9AF443F0F948135E35D02AB4DF6DE946C780
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • CoTaskMemFree.API-MS-WIN-CORE-COM-L1-1-0 ref: 00007FF8B90B7419
        • Part of subcall function 00007FF8B90B5070: CoTaskMemAlloc.API-MS-WIN-CORE-COM-L1-1-0(00000000,?,00000000,00007FF8B90B7517), ref: 00007FF8B90B5105
        • Part of subcall function 00007FF8B90B5070: memmove.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,00000000,00007FF8B90B7517), ref: 00007FF8B90B512C
        • Part of subcall function 00007FF8B90B5070: CoTaskMemFree.API-MS-WIN-CORE-COM-L1-1-0(?,00000000,00007FF8B90B7517), ref: 00007FF8B90B5134
        • Part of subcall function 00007FF8B90B5070: memmove.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,00000000,00007FF8B90B7517), ref: 00007FF8B90B514B
        • Part of subcall function 00007FF8B90B5070: SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(00000000,?,00000000,00007FF8B90B7517), ref: 00007FF8B90B50D5
      • SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FF8B90B781E
      • memset.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF8B90B7897
      • RegGetValueW.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF8B90B78CE
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: Task$ErrorFreeLastmemmove$AllocValuememset
      • String ID: &appVer=$&deviceClass=$&deviceId=s:$&locale=$&namespaces=$&osVer=$&sampleId=s:$&sku=$<R8T\>$?os=Windows$NamespaceExtension$settings/v2.0
      • API String ID: 4114178033-535260811
      • Opcode ID: 9bde83e8cbd09788d13919378a66916c7df4271c2e4a5b7277423294bb0b34b8
      • Instruction ID: 28b5b8b3ba8f36bd2f7824da202350d15af5723c0621a163353905e27b3b097b
      • Opcode Fuzzy Hash: 9bde83e8cbd09788d13919378a66916c7df4271c2e4a5b7277423294bb0b34b8
      • Instruction Fuzzy Hash: D8E1A355B1CF9741EE25AF1E91A027922E1AF49BC0F404534DF5E4BBB2EE6DE8438B40
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: StringWindows$TaskValue$DeleteFree$AllocBufferCloseCreateErrorLastOpenReference_o__wcsupr_s
      • String ID: <R8T\>
      • API String ID: 3433584714-166503183
      • Opcode ID: 75294175ecda8d62d2c96404565d02ac08eada3bcf1cbf924672d4ae1d681603
      • Instruction ID: 885fe8f53d39fa952927c8a026ac47a998fbc271c16aa328bb70db2b8d7cdf18
      • Opcode Fuzzy Hash: 75294175ecda8d62d2c96404565d02ac08eada3bcf1cbf924672d4ae1d681603
      • Instruction Fuzzy Hash: A1917F36A08E8286EF109F59E84427AB7A1FB8ABE4F554235DF5E43794DF3DD4028B00
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
        • Part of subcall function 00007FF8B90B9240: RegGetValueW.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF8B90B928C
      • WinHttpAddRequestHeaders.WINHTTP ref: 00007FF8B90B8C80
      • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FF8B90B8C90
      • WinHttpSendRequest.WINHTTP ref: 00007FF8B90B8CF9
      • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FF8B90B8D09
      • WinHttpReceiveResponse.WINHTTP ref: 00007FF8B90B8D55
      • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FF8B90B8D65
      • WinHttpQueryHeaders.WINHTTP ref: 00007FF8B90B8DAC
      • CoTaskMemFree.API-MS-WIN-CORE-COM-L1-1-0 ref: 00007FF8B90B8EAF
      • CoTaskMemFree.API-MS-WIN-CORE-COM-L1-1-0 ref: 00007FF8B90B8EC0
      • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FF8B90B8DBC
        • Part of subcall function 00007FF8B90A4818: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF8B90A4958
        • Part of subcall function 00007FF8B90A4818: HeapFree.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF8B90A496D
        • Part of subcall function 00007FF8B90B795C: WinHttpQueryDataAvailable.WINHTTP(?,00000000), ref: 00007FF8B90B79A4
        • Part of subcall function 00007FF8B90B795C: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,00000000), ref: 00007FF8B90B79B4
        • Part of subcall function 00007FF8B90BA3D0: RegOpenKeyExW.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF8B90BA41D
        • Part of subcall function 00007FF8B90BA3D0: RegCloseKey.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF8B90BA9CF
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: ErrorHttpLast$Free$HeadersHeapQueryRequestTask$AvailableCloseDataOpenProcessReceiveResponseSendValue
      • String ID: <R8T\>$ETag not modified$Failed to add E-Tag header to request$Failed to get E-Tag$Saving settings cache to registry
      • API String ID: 998909767-1667345689
      • Opcode ID: 157c234a5eb588845b01c84262450725a0acbb736b162c103fa9797b7cb08e22
      • Instruction ID: 1af5a614e7ef9874673fab25696e633a704c39ffcf1c94c8e68767cec1ac537a
      • Opcode Fuzzy Hash: 157c234a5eb588845b01c84262450725a0acbb736b162c103fa9797b7cb08e22
      • Instruction Fuzzy Hash: 95813C22B08F8286FB149F2DD4503BAA6A0FB8A7D4F404135DF5E866A5DF7DE5468B00
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • ConvertStringSecurityDescriptorToSecurityDescriptorW.API-MS-WIN-SECURITY-SDDL-L1-1-0(?,?,?,?,?,?,?,00000000,?,00007FF8B90ACB07), ref: 00007FF8B90AEAB4
      • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,?,?,?,?,00000000,?,00007FF8B90ACB07), ref: 00007FF8B90AEAC4
      • CreateMutexW.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,?,?), ref: 00007FF8B90AEB16
      • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,?,?), ref: 00007FF8B90AEB35
      • ReleaseMutex.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,?,?), ref: 00007FF8B90AEC99
      • CloseHandle.API-MS-WIN-CORE-HANDLE-L1-1-0(?,?,?,?,?), ref: 00007FF8B90AECBF
      • LocalFree.API-MS-WIN-CORE-HEAP-L2-1-0(?,?,?,?,?), ref: 00007FF8B90AECD4
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: DescriptorErrorLastMutexSecurity$CloseConvertCreateFreeHandleLocalReleaseString
      • String ID: D:PAI(A;OICI;FA;;;WD)$Failed to get a proper GlobalEventCounter for telemetry, using 0$GlobalEventCounter$Global\Microsoft.Windows.CUAssistant.Telemetry
      • API String ID: 266686208-1045348519
      • Opcode ID: a49784bd6c9fa1408d4c667bebaebf0bc625a703646be6e5eb50d18c77e947e1
      • Instruction ID: fa70442e92f64ad727dfe42076e950fb53a3b6759aff29bfe536b0a38fd266e6
      • Opcode Fuzzy Hash: a49784bd6c9fa1408d4c667bebaebf0bc625a703646be6e5eb50d18c77e947e1
      • Instruction Fuzzy Hash: 27616D22E08EA286FF505F29A8006BD6AA1EF59BE4F455134DF0F57781DF3CE9438684
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
        • Part of subcall function 00007FF8B90A7C3C: memmove.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00007FF8B90A7C96
      • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FF8B90BD540
      • RegCloseKey.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF8B90BD551
      • SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FF8B90BD55F
        • Part of subcall function 00007FF8B90A4818: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF8B90A4958
        • Part of subcall function 00007FF8B90A4818: HeapFree.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF8B90A496D
      • RegCreateKeyExW.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF8B90BD5A9
      • RegSetKeyValueW.API-MS-WIN-CORE-REGISTRY-L1-1-1 ref: 00007FF8B90BD607
      • RegCloseKey.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF8B90BD6AE
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: CloseErrorHeapLast$CreateFreeProcessValuememmove
      • String ID: %s regkey value was created$<R8T\>$?$DateMarker$Dism$Enabled$Software\Microsoft\rempl\Cleanup$onecore\enduser\upgradeenablers\shellhelpers\diskfilecleanup.cpp
      • API String ID: 2446939985-1287801688
      • Opcode ID: eeee401f37ece0320c41b53e844ea6aa16207fa7deb8487f25eb2378038c050d
      • Instruction ID: beed76e8f7944ecfff451314930505d71981fe842ed883d7b84f643f9339c8d2
      • Opcode Fuzzy Hash: eeee401f37ece0320c41b53e844ea6aa16207fa7deb8487f25eb2378038c050d
      • Instruction Fuzzy Hash: 03615E72A08F81D9EB109F28E4402AD77B4FB89B98F414136EB5D57B98DF39D506C740
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: CloseHandleProcess$ErrorHeapLast$CodeCreateExitFreeObjectSingleWaitmemset
      • String ID: <R8T\>$ExecuteCommandLine: Failed to get process information$ExecuteCommandLine: There was a problem executing the command line %s$ExecuteCommandLine: ended$ExecuteCommandLine: started$h
      • API String ID: 2714792474-571986085
      • Opcode ID: abfac067a4c853073b62721ac6175799c269a6a1d1363f99e2c5a1f5a7b8b6a4
      • Instruction ID: 74be750dfd3a756d2d89d8a173ae6bceede99daef7aa91a951c382e5513f9abe
      • Opcode Fuzzy Hash: abfac067a4c853073b62721ac6175799c269a6a1d1363f99e2c5a1f5a7b8b6a4
      • Instruction Fuzzy Hash: 36514D36A18BC286EB109F69E8403B9B7A0FB897E4F404235DB5E46695DF7CD44ACB40
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • WindowsCreateStringReference.API-MS-WIN-CORE-WINRT-STRING-L1-1-0(?,?,?,?,00000000,?,?,00000000,80003F9E,00007FF8B90B97C1), ref: 00007FF8B90CEA14
      • RoGetActivationFactory.API-MS-WIN-CORE-WINRT-L1-1-0(?,?,?,?,00000000,?,?,00000000,80003F9E,00007FF8B90B97C1), ref: 00007FF8B90CEA37
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: ActivationCreateFactoryReferenceStringWindows
      • String ID: <R8T\>$Windows.Internal.Security.WebAuthentication.AuthenticationManager$Windows.Security.Authentication.OnlineId.OnlineIdServiceTicketRequest$onecore\enduser\upgradeenablers\shellhelpers\authorizationprovider.cpp${AE2D81FB-C9EB-44A6-806C-F543D3FABF6C}
      • API String ID: 1966789792-600554100
      • Opcode ID: 582232fba4f3ada70f672295869ae77b8764afa2aa04f6bda070b8b356e0e030
      • Instruction ID: d658bedd05148ddae59bd1dfcf8704782b87c947a451fe68109a8c10bbb6ce6a
      • Opcode Fuzzy Hash: 582232fba4f3ada70f672295869ae77b8764afa2aa04f6bda070b8b356e0e030
      • Instruction Fuzzy Hash: 93122A26B08B8686EF008F6DE8506AD2771FB95BD8F114432DF1D57B68DF38D91A8340
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: FileHeap$DirectoryInfoSystemVersion$AllocAttributesFreeProcessQuerySizeValue
      • String ID: <R8T\>$PREP$\kernel32.dll$\ntdll.dll
      • API String ID: 2190945870-1148894216
      • Opcode ID: 8a31dad88238f07a6f6405d980586004330c370ff486e055ecec67ae46a22e44
      • Instruction ID: 0bc862f17a15b015a237a347305c272caad100113e0114a17525e8138eabd4dd
      • Opcode Fuzzy Hash: 8a31dad88238f07a6f6405d980586004330c370ff486e055ecec67ae46a22e44
      • Instruction Fuzzy Hash: 68516126A18EC286EB508F59E8106B977A1FB8ABD4F548131DF4E83754DF3CD846CB00
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: ErrorLastLibrary$AddressFreeLoadProc
      • String ID: Failed to load DLL hr=0x%08x$Failed to read$PolicyManager_GetPolicyInt$PolicyManager_IsPolicySetByMobileDeviceManager$Update$onecore\enduser\upgradeenablers\applicabilityhelper\mdmpolicyhelper.cpp$policymanager.dll
      • API String ID: 1529210728-2429808122
      • Opcode ID: 55b859775d769916deb5d3bbedd971f8c965d93ec7ffa66ff6f3c2379fadfd0c
      • Instruction ID: f3971dd587d5bd14f6e79386c53caf5d2d96f7ac89ac22043d7337697e521cb2
      • Opcode Fuzzy Hash: 55b859775d769916deb5d3bbedd971f8c965d93ec7ffa66ff6f3c2379fadfd0c
      • Instruction Fuzzy Hash: D9410926A09B828AEB108F6DE8402B86BB4FF497D8F545135DF5D82758EF3CE146C740
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • memset.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF8B90BA005
      • RegOpenKeyExW.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF8B90BA030
      • RegQueryInfoKeyW.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF8B90BA0F6
      • RegEnumValueW.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF8B90BA1C6
      • RegCloseKey.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF8B90BA380
        • Part of subcall function 00007FF8B90A594C: memmove.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00007FF8B90A599A
        • Part of subcall function 00007FF8B90A7C3C: memmove.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00007FF8B90A7C96
        • Part of subcall function 00007FF8B90AFBB8: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF8B90AFCF8
        • Part of subcall function 00007FF8B90AFBB8: HeapFree.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF8B90AFD0D
      • CoTaskMemFree.API-MS-WIN-CORE-COM-L1-1-0 ref: 00007FF8B90BA34C
        • Part of subcall function 00007FF8B90A4818: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF8B90A4958
        • Part of subcall function 00007FF8B90A4818: HeapFree.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF8B90A496D
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: Heap$Free$Processmemmove$CloseEnumInfoOpenQueryTaskValuememset
      • String ID: <R8T\>$Failed to enumerate key $Failed to examine key $Failed to open settings key $OneSettings: %s failed to read value$OneSettings: %s value: %s
      • API String ID: 2615145547-2136238039
      • Opcode ID: 0b0274c50da84117c9718eed6b1918904cd05fe6bba6c25ef61fe1847edfb638
      • Instruction ID: 78a36521c3875c2e30ed8e4b3f6d556cc24f12ec78213425abea09d659a1e2b3
      • Opcode Fuzzy Hash: 0b0274c50da84117c9718eed6b1918904cd05fe6bba6c25ef61fe1847edfb638
      • Instruction Fuzzy Hash: 7EC17D32B08B8686EB108F68D8901ED73F6FB84798F501135DB4D57A99DF38E906D780
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
        • Part of subcall function 00007FF8B90A594C: memmove.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00007FF8B90A599A
        • Part of subcall function 00007FF8B90A7C3C: memmove.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00007FF8B90A7C96
        • Part of subcall function 00007FF8B90C05A0: RegOpenKeyExW.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF8B90C05DA
        • Part of subcall function 00007FF8B90C05A0: RegCloseKey.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF8B90C05F6
        • Part of subcall function 00007FF8B90C0944: RegOpenKeyExW.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF8B90C09C5
        • Part of subcall function 00007FF8B90C0944: RegGetValueW.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF8B90C0A12
        • Part of subcall function 00007FF8B90C0944: RegCloseKey.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF8B90C0A53
      • _o__wcsicmp.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00007FF8B90AAA64
        • Part of subcall function 00007FF8B90A4818: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF8B90A4958
        • Part of subcall function 00007FF8B90A4818: HeapFree.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF8B90A496D
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: CloseHeapOpenmemmove$FreeProcessValue_o__wcsicmp
      • String ID: %s : KB number read in current registry is different from given KB number$%s : Registry key for current or history not found when checking feature upgrade threshold exceeded$%s : Updating days in feature update count read: %d$%s : Updating days in feature update count wrote %d$%s : Updating days in feature update count wrote %d to history record$<R8T\>$PREP$SOFTWARE\Microsoft\Windows\CurrentVersion\qua\lastrun\$current$daysfeatureupgradeinprogress$kbnumber
      • API String ID: 1174623554-1126433545
      • Opcode ID: 67f8b7ecbe54034ec92bd3949116c9dce731ac98c83719da7abef8182e335b69
      • Instruction ID: 441a9cafad03808f4969ba110a16e7e8d077bf1b137392721554860be303a766
      • Opcode Fuzzy Hash: 67f8b7ecbe54034ec92bd3949116c9dce731ac98c83719da7abef8182e335b69
      • Instruction Fuzzy Hash: 99A14122F14B829AFF11DF68D8510FC2372FB44798B805135DB4D67AAAEE38D54AC784
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
        • Part of subcall function 00007FF8B90CE9BC: WindowsCreateStringReference.API-MS-WIN-CORE-WINRT-STRING-L1-1-0(?,?,?,?,00000000,?,?,00000000,80003F9E,00007FF8B90B97C1), ref: 00007FF8B90CEA14
        • Part of subcall function 00007FF8B90CE9BC: RoGetActivationFactory.API-MS-WIN-CORE-WINRT-L1-1-0(?,?,?,?,00000000,?,?,00000000,80003F9E,00007FF8B90B97C1), ref: 00007FF8B90CEA37
      • WindowsGetStringRawBuffer.API-MS-WIN-CORE-WINRT-STRING-L1-1-0 ref: 00007FF8B90B8139
        • Part of subcall function 00007FF8B90A594C: memmove.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00007FF8B90A599A
        • Part of subcall function 00007FF8B90BB304: memmove.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,00007FF8B90A47C6), ref: 00007FF8B90BB39B
        • Part of subcall function 00007FF8B90BBBAC: memmove.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00007FF8B90BBC40
        • Part of subcall function 00007FF8B90BBBAC: memmove.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00007FF8B90BBC52
        • Part of subcall function 00007FF8B90A7C3C: memmove.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00007FF8B90A7C96
        • Part of subcall function 00007FF8B90A4818: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF8B90A4958
        • Part of subcall function 00007FF8B90A4818: HeapFree.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF8B90A496D
      • lstrcmpW.API-MS-WIN-CORE-STRING-OBSOLETE-L1-1-0 ref: 00007FF8B90B8331
      • RegDeleteKeyValueW.API-MS-WIN-CORE-REGISTRY-L1-1-1 ref: 00007FF8B90B83DF
      • WindowsDeleteString.API-MS-WIN-CORE-WINRT-STRING-L1-1-0 ref: 00007FF8B90B841B
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: memmove$StringWindows$DeleteHeap$ActivationBufferCreateFactoryFreeProcessReferenceValuelstrcmp
      • String ID: Authorization: MsaToken $ETag$Failed to download Onesettings content. hr = 0x%08x$Msa token retrieved$Use PPE environment$onecore\enduser\upgradeenablers\onesettings\onesettings.cpp$onecore\internal\base\inc\OneSettingsClientWrapper.h$settings-win-ppe.data.microsoft.com
      • API String ID: 1759230158-1631349149
      • Opcode ID: 92c73834290a2a67da32ce02739fa7d471eb2bd993510446f0181561ba24af9c
      • Instruction ID: 1d333c0fd1434514f5a4aa39fd85e81199a0e1d8d2e1f78d5b17ee159c05de36
      • Opcode Fuzzy Hash: 92c73834290a2a67da32ce02739fa7d471eb2bd993510446f0181561ba24af9c
      • Instruction Fuzzy Hash: 3F912A32A0CEC291DA21DF18E4502EAB3A4FBD9790F805136DB9D43AA9DF3CD546CB40
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: ErrorLast$HeadersHttpQueryTask$AllocFreememsetsscanf_s
      • String ID: %lu:%s
      • API String ID: 1860422969-4001591267
      • Opcode ID: e7a74d0d3f050ced3a2368b0853d8906dc04c250e7c5512c0b84cdb4f035395a
      • Instruction ID: 18fc8247f9b47e5802b06e19f1680e699b30be116432c1f5ebda75261360dd96
      • Opcode Fuzzy Hash: e7a74d0d3f050ced3a2368b0853d8906dc04c250e7c5512c0b84cdb4f035395a
      • Instruction Fuzzy Hash: 1C51A032A18F828AEF149F69E85427976A1FB89BD4F154235DF6E47391EF3CD8428700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: AddressErrorLastProc$Library$FreeLoadStringVersionmemset
      • String ID: GetSkuUpdateManagementGroup$ReadPolicy$ReleaseUpdatePolicyValue$updatepolicy.dll
      • API String ID: 646515133-4213747780
      • Opcode ID: 573f5658727b8ab31caa0acf80d27a82204bc14009eb2744874019037298f291
      • Instruction ID: 7e795682de065ae483e3c2f99711771785b9ce68f88401d5deddf491b5c719d2
      • Opcode Fuzzy Hash: 573f5658727b8ab31caa0acf80d27a82204bc14009eb2744874019037298f291
      • Instruction Fuzzy Hash: 77513B21A08BC68AFF619F6D98543B82AA4EF4AB94F445135DF0E86290DF6CE44BC750
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: FreeTask$CloseHandleHttp
      • String ID:
      • API String ID: 1526097823-0
      • Opcode ID: dece7decd41c0797aaf1d0713e60a259c9792ca6e71b2becf01e16eee056df98
      • Instruction ID: 6297ec4789f33c1d18fc88fd2b6ef7c5bc95c999e09de38df3860072c6e998e9
      • Opcode Fuzzy Hash: dece7decd41c0797aaf1d0713e60a259c9792ca6e71b2becf01e16eee056df98
      • Instruction Fuzzy Hash: 3D319336909E81CADB409F29E85427CBB70FBCAF96B459671CE2E53768CF38D445C600
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: String$Free$AllocCreateInstance
      • String ID: <R8T\>$Checking if kb %s is hidden$SedimentPack::UpdateSearcher$onecore\enduser\upgradeenablers\shellhelpers\updatesearcher.cpp
      • API String ID: 2969457942-38706280
      • Opcode ID: 94fcb93aca818809aacb6536fda5974afc24acde4d5844f90b05b46cf82030e6
      • Instruction ID: 54cf36cc33495f1a0f57e0b3dc4019fb26cf7fc618e3c6a30c4439915838920e
      • Opcode Fuzzy Hash: 94fcb93aca818809aacb6536fda5974afc24acde4d5844f90b05b46cf82030e6
      • Instruction Fuzzy Hash: D2916726B09F9686EF108F6AE8506AD2B64FB49FE8B054132DE1E53B64DF38D446C340
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • memmove.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,-340D631B7BDDDCDB,00007FF8B90A7CAE), ref: 00007FF8B90A7D79
      • memmove.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,-340D631B7BDDDCDB,00007FF8B90A7CAE), ref: 00007FF8B90A7D87
      • _o__invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,-340D631B7BDDDCDB,00007FF8B90A7CAE), ref: 00007FF8B90A7DC6
      • memmove.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,-340D631B7BDDDCDB,00007FF8B90A7CAE), ref: 00007FF8B90A7DD6
      • memmove.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,-340D631B7BDDDCDB,00007FF8B90A7CAE), ref: 00007FF8B90A7DE4
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: memmove$_o__invalid_parameter_noinfo_noreturn
      • String ID: <R8T\>$INTL : Command line HRESULT = 0x%08X of %s, kb %s$INTL : Completed uso scan hr = 0x%08X$INTL : Install Result: %d, Install Error Code: %d of %s, kb %s$INTL : Starting WusaInstaller::PerformInstall$onecore\enduser\upgradeenablers\qualityupdateassistant\quacommonlibrary\wusainstaller.cpp
      • API String ID: 398608620-593635652
      • Opcode ID: be5633b350d24a35e68afd26dd70b3ceecbcae53bb89b53636a995d7bc0a0fbe
      • Instruction ID: 7d34c466098275168ad0f303b188a145cf6549ff4c210dc4bbc6770f7446df72
      • Opcode Fuzzy Hash: be5633b350d24a35e68afd26dd70b3ceecbcae53bb89b53636a995d7bc0a0fbe
      • Instruction Fuzzy Hash: 3C819222B18AC295EF109F29E8452AEB761FB48BE4F444136EF5D477A6DE3CD046C740
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
        • Part of subcall function 00007FF8B90A594C: memmove.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00007FF8B90A599A
        • Part of subcall function 00007FF8B90A7C3C: memmove.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00007FF8B90A7C96
        • Part of subcall function 00007FF8B90C05A0: RegOpenKeyExW.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF8B90C05DA
        • Part of subcall function 00007FF8B90C05A0: RegCloseKey.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF8B90C05F6
        • Part of subcall function 00007FF8B90C0944: RegOpenKeyExW.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF8B90C09C5
        • Part of subcall function 00007FF8B90C0944: RegGetValueW.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF8B90C0A12
        • Part of subcall function 00007FF8B90C0944: RegCloseKey.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF8B90C0A53
      • _o__wcsicmp.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00007FF8B90AADCE
        • Part of subcall function 00007FF8B90A4818: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF8B90A4958
        • Part of subcall function 00007FF8B90A4818: HeapFree.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF8B90A496D
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: CloseHeapOpenmemmove$FreeProcessValue_o__wcsicmp
      • String ID: %s : KB number read in current registry is different from given KB number$%s : Registry key for current or history not found when trying to increment FeatureUpgradePendingRebootDays$%s : Write days pending reboot after feature upgrade to history: %d$%s : Write days pending reboot after feature upgrade: %d$<R8T\>$PREP$SOFTWARE\Microsoft\Windows\CurrentVersion\qua\lastrun\$current$daysfeatureupgradependingreboot$kbnumber
      • API String ID: 1174623554-3542528477
      • Opcode ID: ac83a76372d2f6dd1fcdc593e4567b0b198ec753b8bd91bd15473025edacf65c
      • Instruction ID: ee96bbc073f8c491b5f50f1f6691b6b9da2aa14f57793cd8bc77cd106ccb3617
      • Opcode Fuzzy Hash: ac83a76372d2f6dd1fcdc593e4567b0b198ec753b8bd91bd15473025edacf65c
      • Instruction Fuzzy Hash: 87913122F04B829AFF10DF68D8510EC7376FB55798B805135DB4D67A9AEE38D506C780
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • WindowsCreateStringReference.API-MS-WIN-CORE-WINRT-STRING-L1-1-0 ref: 00007FF8B90BBD16
      • RoGetActivationFactory.API-MS-WIN-CORE-WINRT-L1-1-0 ref: 00007FF8B90BBD61
      • CoTaskMemFree.API-MS-WIN-CORE-COM-L1-1-0 ref: 00007FF8B90BBF16
        • Part of subcall function 00007FF8B90BB4B4: WindowsCreateStringReference.API-MS-WIN-CORE-WINRT-STRING-L1-1-0(?,?,00000000,00007FF8B90BBDAD), ref: 00007FF8B90BB4F0
      • WindowsDeleteString.API-MS-WIN-CORE-WINRT-STRING-L1-1-0 ref: 00007FF8B90BBE16
      • WindowsDeleteString.API-MS-WIN-CORE-WINRT-STRING-L1-1-0 ref: 00007FF8B90BBEB6
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: StringWindows$CreateDeleteReference$ActivationFactoryFreeTask
      • String ID: <R8T\>$SedimentPack$Windows.Internal.Flighting.ClientAttributes$onecore\enduser\upgradeenablers\onesettings\ctachelper.cpp
      • API String ID: 3733629173-1524738173
      • Opcode ID: 2f0a6e0e634f4639225259d48ca40508064727c835cc80cf515dacdf9c92e635
      • Instruction ID: b8c0493037e789590d53f8d4b1d633836b1d390daf5af9a0ae0861ba52f96929
      • Opcode Fuzzy Hash: 2f0a6e0e634f4639225259d48ca40508064727c835cc80cf515dacdf9c92e635
      • Instruction Fuzzy Hash: D981E726B18E968AEB008F69D5503AD3771FB89BD8F414532DF1E67B64DF38D50A8340
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
        • Part of subcall function 00007FF8B90A4818: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF8B90A4958
        • Part of subcall function 00007FF8B90A4818: HeapFree.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF8B90A496D
        • Part of subcall function 00007FF8B90B16E8: PathFileExistsW.API-MS-WIN-CORE-SHLWAPI-LEGACY-L1-1-0 ref: 00007FF8B90B1794
      • DeleteFileW.API-MS-WIN-CORE-FILE-L1-1-0 ref: 00007FF8B90B1E4B
      • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FF8B90B1E69
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: FileHeap$DeleteErrorExistsFreeLastPathProcess
      • String ID: <R8T\>$DismCleanupHelper$INTL : HRESULT = 0x%08X, Install Error Code: %d of %s, kb %s$INTL : Cab expansion command line HRESULT = 0x%08X of %s, kb %s$INTL : Completed or failed due to a reason where no action should be taken$INTL : Expanded %s to .cab$INTL : Failed to delete %s$INTL : Starting DismInstaller::PerformInstall$onecore\enduser\upgradeenablers\qualityupdateassistant\quacommonlibrary\disminstaller.cpp
      • API String ID: 305269600-1575016443
      • Opcode ID: f4159ec77a423a6089cba0c34a9de441f15a41ba515e9ad459c3229ff3e0727e
      • Instruction ID: a33e43e880728e9fd39cc535874fd7b55409a4a65a02feec53305b419a3d2214
      • Opcode Fuzzy Hash: f4159ec77a423a6089cba0c34a9de441f15a41ba515e9ad459c3229ff3e0727e
      • Instruction Fuzzy Hash: CF516D22A08BC289EB519F78A8402AD77A1FB84394F605236DF9D576A5DF3CD543CB40
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID:
      • String ID: <R8T\>$Cumulative Update for Windows 10$onecore\enduser\upgradeenablers\shellhelpers\usohelper.cpp
      • API String ID: 0-3693617678
      • Opcode ID: 9eb64aa5cf4d314cc80e36ba70f5d505b2f2a91ec9bdbce1f7d082e737432693
      • Instruction ID: 3ec32d61b0a5ac9d65ca22d5be3eec786b61846795f14b6135f1e4c6a9a7bcaa
      • Opcode Fuzzy Hash: 9eb64aa5cf4d314cc80e36ba70f5d505b2f2a91ec9bdbce1f7d082e737432693
      • Instruction Fuzzy Hash: 55B13A22B08F82DAEB109FA9D8506AD2771FB49B98F514132CF1D67BA8DF38D556C340
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
        • Part of subcall function 00007FF8B90A4818: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF8B90A4958
        • Part of subcall function 00007FF8B90A4818: HeapFree.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF8B90A496D
      • CoCreateInstance.API-MS-WIN-CORE-COM-L1-1-0 ref: 00007FF8B90D3193
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: Heap$CreateFreeInstanceProcess
      • String ID: <R8T\>$Checking if kb %s is hidden$Failed to retrieve specific update details$Failed to retrieve update information$IsHidden=1$onecore\enduser\upgradeenablers\shellhelpers\updatesearcher.cpp
      • API String ID: 2021856900-3100575423
      • Opcode ID: 27deb3b689ff24ed69d600408ed26a0878265c5dc187f33e043cc435bc62c73e
      • Instruction ID: 27b4a0dfcbfb1fb8cefd5cafc4a8333e61d48d3df128448cc745fe32a10e69f6
      • Opcode Fuzzy Hash: 27deb3b689ff24ed69d600408ed26a0878265c5dc187f33e043cc435bc62c73e
      • Instruction Fuzzy Hash: 50A11826B08A869AEF109FA9D8506BD2764FF49BC8F404476CF1D57BA9DE38E506C340
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID:
      • String ID: %d-%d-%d$<R8T\>$PauseFeatureUpdatesEndTime$PauseQualityUpdatesEndTime$SOFTWARE\Microsoft\WindowsUpdate\UX\Settings
      • API String ID: 0-2061511835
      • Opcode ID: dd1675a822d4b54516e4ab134d399f4ba738fad9dc49d7963cf229fc52016d5c
      • Instruction ID: 128142965e69880560341f9eff58d47fd8ac77d135e0503a6b1d4ef51bdc9f22
      • Opcode Fuzzy Hash: dd1675a822d4b54516e4ab134d399f4ba738fad9dc49d7963cf229fc52016d5c
      • Instruction Fuzzy Hash: 02515A22A08AC2D9EB208F78D8502FC77B5EF49798B418136DF4D57699DF38E64AC344
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: Closememmove
      • String ID: %s regkey value %s was not read, err %ld$%s regkey value was found$%s regkey value was not found$<R8T\>$Dism$Enabled$Software\Microsoft\rempl\Cleanup$onecore\enduser\upgradeenablers\shellhelpers\diskfilecleanup.cpp
      • API String ID: 179257846-1923109591
      • Opcode ID: b27d343b810ac8f5a27833841e9eb8053139817d8510f333c838eeab7e9aab78
      • Instruction ID: 726626876374f5ef30c347adce372a5f8bb044043b2759231f1e5721aed023c9
      • Opcode Fuzzy Hash: b27d343b810ac8f5a27833841e9eb8053139817d8510f333c838eeab7e9aab78
      • Instruction Fuzzy Hash: 27516B72E14B82C9EB108F6CD8401EC77B4FB087A8F845136DB5D52A99DF38D546C790
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: Http$ErrorLast$CloseHandle$Open$ConnectRequestTimeouts
      • String ID: GET$The following query string will be used: %s
      • API String ID: 1849459419-2374538757
      • Opcode ID: 0671c298f1170de1fa326554967f3f02634663851afd6b385c0eb39db93e043e
      • Instruction ID: 8488d70091cfb857bc29ae768cdf281f2713acda35e247f6b0c448ef468eab8d
      • Opcode Fuzzy Hash: 0671c298f1170de1fa326554967f3f02634663851afd6b385c0eb39db93e043e
      • Instruction Fuzzy Hash: 92416032B08F8286EB584F6AA554379BAA0FF99B85F008139DF5E97B50DF7CD1168700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: ByteCharErrorLastMultiWide_o_free$AllocString_o_malloc
      • String ID: <R8T\>$WQL
      • API String ID: 1070808749-3009890757
      • Opcode ID: 9936ad5c622dea3040bdefafea52b93dbb3850b5b9971013ee4b2b76ac1084c7
      • Instruction ID: f98dbb11a7d3a8f716a10ef4bfe95e39cf63f99d043648d92b736897efa999db
      • Opcode Fuzzy Hash: 9936ad5c622dea3040bdefafea52b93dbb3850b5b9971013ee4b2b76ac1084c7
      • Instruction Fuzzy Hash: C2417F32A09BC1CAEB649F2DA8142B976A5FF89BE5F445635DF6E46794CF3CD0428200
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: AddressProc$HandleModule
      • String ID: EtwEventEnabled$EtwEventRegister$EtwEventUnregister$EtwEventWrite$ntdll.dll
      • API String ID: 667068680-1838325978
      • Opcode ID: 8f397e0d1fab72193b5626ee2d897a7fdffde385974b04df2d46491687043dd5
      • Instruction ID: 9b4100a8e19d9285a34651cf15487751de2a24eb3e0aaf8c1b6c9c5fb7ab70c4
      • Opcode Fuzzy Hash: 8f397e0d1fab72193b5626ee2d897a7fdffde385974b04df2d46491687043dd5
      • Instruction Fuzzy Hash: AE31F426D1AF868AEB109F0CE88437477A1FF49786F849175C78E422A4EF7CE04AD700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: ErrorLastOpenSemaphore
      • String ID: <R8T\>$_p0$wil
      • API String ID: 1909229842-715146794
      • Opcode ID: 388e0ce9213d1a8d00e91bbdf2167ae40bfa097938830dd03d755d5b10513520
      • Instruction ID: 952fab9f874a25ba816771320447781b838495eb2ab56a8ba77e037a114eb5dc
      • Opcode Fuzzy Hash: 388e0ce9213d1a8d00e91bbdf2167ae40bfa097938830dd03d755d5b10513520
      • Instruction Fuzzy Hash: F4518A72A08AC386EF609F2998506BA67A5EF88BE0F444136DB1E47795DF3CE506C740
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: HeapVariant$ClearFreeInitProcess
      • String ID: Completed component cleanup$Start Function RunComponentCleanup$StartComponentCleanup$TasksHelperRunTaskFailed %s.$Waited %ld milliseconds for completion of task$onecore\enduser\upgradeenablers\cleanuphelpers\dismhelper.cpp
      • API String ID: 902578121-4115753315
      • Opcode ID: 3a0c165cad320e47671f3a28bd7fba4558b8cfc0b08b2b7bba437869528cd6bc
      • Instruction ID: 630f446f6f4e365457c14dd8c8580b4b2eac9275aff0d1faf59aa46e8d126f3e
      • Opcode Fuzzy Hash: 3a0c165cad320e47671f3a28bd7fba4558b8cfc0b08b2b7bba437869528cd6bc
      • Instruction Fuzzy Hash: EC515922B08A8696EF109F68D8802BD2B60FF457D8F544236DF1D57699DF39E44AC380
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • RegOpenKeyExW.API-MS-WIN-CORE-REGISTRY-L1-1-0(?,00000000,?,00007FF8B90C77B3), ref: 00007FF8B90D64D9
      • RegCloseKey.API-MS-WIN-CORE-REGISTRY-L1-1-0(?,00000000,?,00007FF8B90C77B3), ref: 00007FF8B90D6517
      • RegQueryInfoKeyW.API-MS-WIN-CORE-REGISTRY-L1-1-0(?,00000000,?,00007FF8B90C77B3), ref: 00007FF8B90D6564
      • RegEnumValueW.API-MS-WIN-CORE-REGISTRY-L1-1-0(?,00000000,?,00007FF8B90C77B3), ref: 00007FF8B90D65B4
      • RegCloseKey.API-MS-WIN-CORE-REGISTRY-L1-1-0(?,00000000,?,00007FF8B90C77B3), ref: 00007FF8B90D65E8
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: Close$EnumInfoOpenQueryValue
      • String ID: <R8T\>$Failed to examine key %s$Failed to open registry key %s$SOFTWARE\Microsoft\Windows\CurrentVersion\Component Based Servicing\Version
      • API String ID: 1662924112-903983717
      • Opcode ID: 61336ebdae3182a7ca29ca615e0869bde4cceec3c4dfe52cc0207e014d68b46c
      • Instruction ID: 8fa209929202a47b0bde7b10504545759b69fe2bddff02bef700bf74039538be
      • Opcode Fuzzy Hash: 61336ebdae3182a7ca29ca615e0869bde4cceec3c4dfe52cc0207e014d68b46c
      • Instruction Fuzzy Hash: 74415032A08B8186EB608F29E88016AB7A8FF84794F504235EF9D53B58CF3CD456DB04
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
        • Part of subcall function 00007FF8B90CE9BC: WindowsCreateStringReference.API-MS-WIN-CORE-WINRT-STRING-L1-1-0(?,?,?,?,00000000,?,?,00000000,80003F9E,00007FF8B90B97C1), ref: 00007FF8B90CEA14
        • Part of subcall function 00007FF8B90CE9BC: RoGetActivationFactory.API-MS-WIN-CORE-WINRT-L1-1-0(?,?,?,?,00000000,?,?,00000000,80003F9E,00007FF8B90B97C1), ref: 00007FF8B90CEA37
      • WindowsGetStringRawBuffer.API-MS-WIN-CORE-WINRT-STRING-L1-1-0 ref: 00007FF8B90B97F0
      • WinHttpAddRequestHeaders.WINHTTP ref: 00007FF8B90B9884
      • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FF8B90B9894
      • WindowsDeleteString.API-MS-WIN-CORE-WINRT-STRING-L1-1-0 ref: 00007FF8B90B98D9
        • Part of subcall function 00007FF8B90A4818: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF8B90A4958
        • Part of subcall function 00007FF8B90A4818: HeapFree.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF8B90A496D
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: StringWindows$Heap$ActivationBufferCreateDeleteErrorFactoryFreeHeadersHttpLastProcessReferenceRequest
      • String ID: <R8T\>$Authorization: MsaToken $Failed to add MSA token header to request$Failed to get MSA ticket$Finish get MSA ticket
      • API String ID: 1634034024-1480102706
      • Opcode ID: b10f46fab57872d10e7392de02a4ad71ca9348908413e82fa66df333c383a2f0
      • Instruction ID: 3bb9308d14a1ad3df34011907ed34f9e7081a3bae686312e91ac62793e5653e4
      • Opcode Fuzzy Hash: b10f46fab57872d10e7392de02a4ad71ca9348908413e82fa66df333c383a2f0
      • Instruction Fuzzy Hash: 56415C22B04A829AFF10AF6DE8502FC73B1FF897A8F405135DB1E56696DE28D516C380
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: ObjectSingleWait
      • String ID: wil
      • API String ID: 24740636-1589926490
      • Opcode ID: 7498a34d8b83d7b0c26b7fb94dfe5ebe8a1144af02b0387509bb64514702cb6d
      • Instruction ID: dd9d7b257876eb79419b1d35d15eb9b64cf5b1dc5a1b74a883ad1d72c15450b2
      • Opcode Fuzzy Hash: 7498a34d8b83d7b0c26b7fb94dfe5ebe8a1144af02b0387509bb64514702cb6d
      • Instruction Fuzzy Hash: 3441FB31E0CAC387FB604F59E40477A66A1EF867E1F648131DB5E86A98DF3CE8468741
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • wcsstr.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?,?,?,?,?,00000000), ref: 00007FF8B90B9574
      • WindowsCreateStringReference.API-MS-WIN-CORE-WINRT-STRING-L1-1-0 ref: 00007FF8B90B95AF
      • RoGetActivationFactory.API-MS-WIN-CORE-WINRT-L1-1-0 ref: 00007FF8B90B95FB
      • WindowsCreateStringReference.API-MS-WIN-CORE-WINRT-STRING-L1-1-0 ref: 00007FF8B90B96A1
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: CreateReferenceStringWindows$ActivationFactorywcsstr
      • String ID: "settings":$<R8T\>$Windows.Data.Json.JsonValue$settings
      • API String ID: 1336255922-3706357819
      • Opcode ID: d8476e253518f5729904d222b6b2d5ff52617981199750402d3c60df11e7b8f8
      • Instruction ID: 5199b5476d615d124dd757c3f7269ba7cde9caeabd3e69f8d2c450f17c9ffb24
      • Opcode Fuzzy Hash: d8476e253518f5729904d222b6b2d5ff52617981199750402d3c60df11e7b8f8
      • Instruction Fuzzy Hash: 7E611326B04F5A8AEB008FAAD8943AC37B0FB49B98F554536CF1D677A4DF38D4068340
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • QueryUnbiasedInterruptTime.API-MS-WIN-CORE-REALTIME-L1-1-0(?,?,?,?,00000000,00007FF8B90ACE35), ref: 00007FF8B90B49CF
      • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,?,00000000,00007FF8B90ACE35), ref: 00007FF8B90B49F8
        • Part of subcall function 00007FF8B90A4818: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF8B90A4958
        • Part of subcall function 00007FF8B90A4818: HeapFree.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF8B90A496D
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: Heap$ErrorFreeInterruptLastProcessQueryTimeUnbiased
      • String ID: DelayCount$Device has been up for %llu minutes$Failed to determine minutes of active uptime registry key hr = 0x%08x$Failed to read delay count registry key hr = 0x%08x$Software\Microsoft\Windows\CurrentVersion\qua$There are %llu minutes of uptime and %d minimum required minutes of uptime, download proceed: %d
      • API String ID: 1167806001-881174478
      • Opcode ID: 7dad0a35f6c62ccb988c7a19da4d36b7158f46e2ba49fa61e36823b3267905ab
      • Instruction ID: 161670c7f4553a53e422155a2e48b35aff8c82b672ac08ca4142bf0ff97cbba8
      • Opcode Fuzzy Hash: 7dad0a35f6c62ccb988c7a19da4d36b7158f46e2ba49fa61e36823b3267905ab
      • Instruction Fuzzy Hash: B4317A76A0CAC282EF109F2DE4512BDB3A0EB41BD4B448136DB5A47658DE3CE503CB84
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: Library$AddressFreeLoadProc
      • String ID: Failed to read policy$PolicyManager_IsPolicySetByMobileDeviceManager$Update$onecore\enduser\upgradeenablers\applicabilityhelper\mdmpolicyhelper.cpp$policymanager.dll
      • API String ID: 145871493-946431352
      • Opcode ID: 181e602ca3793f186feda8f8eafe026c79861d2d170c7b37100002de527bfe14
      • Instruction ID: 6522609b6f0ffc28ab1a0e8a2f1d02f9b33639d14f74883c822e84f989adfb03
      • Opcode Fuzzy Hash: 181e602ca3793f186feda8f8eafe026c79861d2d170c7b37100002de527bfe14
      • Instruction Fuzzy Hash: 70212F72608B82C6EB108F59E8443A9B7A4FB89BD4F454235DB9D43364DF7CE546C740
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: CreateInitializeInstanceUninitialize
      • String ID: <R8T\>$CUASSISTANT$Failed to complete download due to reason %d$onecore\enduser\upgradeenablers\shellhelpers\deliveryoptimizationhelper.cpp
      • API String ID: 948891078-190219226
      • Opcode ID: 45f4e73ee7242e403b01b831048f058bc84cab20f71a5a1c094b7f09632dde34
      • Instruction ID: 4f9482a8ae541258abc2ee6cd7bad134f47831627f7a39f11e57460dd63f01ea
      • Opcode Fuzzy Hash: 45f4e73ee7242e403b01b831048f058bc84cab20f71a5a1c094b7f09632dde34
      • Instruction Fuzzy Hash: F2616C25B08EA686FF109F6ED8502AE2664FB49BD8F014532DF1E577A5DE3CE806C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: DirectorySystemWindows
      • String ID: <R8T\>$Completed dism command$Dism command failed$Dism command line: %s$Dism function return code: %d$\System32\cmd.exe /c
      • API String ID: 2308508653-2774877972
      • Opcode ID: abecb7a21fa98522a6fab2676615b3f46ac9866dadab2813b42d5afb73e792f3
      • Instruction ID: c7cd64b59948f460bdcd1b79129eb710982b55a7db8b65f9efd99da66d23aef8
      • Opcode Fuzzy Hash: abecb7a21fa98522a6fab2676615b3f46ac9866dadab2813b42d5afb73e792f3
      • Instruction Fuzzy Hash: AA516F22A08BC392EE109F6CE4901ADA7A4FF843D4F505135EB8D976A5DF7CE546CB40
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
        • Part of subcall function 00007FF8B90A594C: memmove.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00007FF8B90A599A
        • Part of subcall function 00007FF8B90A7C3C: memmove.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00007FF8B90A7C96
        • Part of subcall function 00007FF8B90C05A0: RegOpenKeyExW.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF8B90C05DA
        • Part of subcall function 00007FF8B90C05A0: RegCloseKey.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF8B90C05F6
        • Part of subcall function 00007FF8B90C0944: RegOpenKeyExW.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF8B90C09C5
        • Part of subcall function 00007FF8B90C0944: RegGetValueW.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF8B90C0A12
        • Part of subcall function 00007FF8B90C0944: RegCloseKey.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF8B90C0A53
      • _o__wcsicmp.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00007FF8B90AADCE
        • Part of subcall function 00007FF8B90A4818: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF8B90A4958
        • Part of subcall function 00007FF8B90A4818: HeapFree.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF8B90A496D
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: CloseHeapOpenmemmove$FreeProcessValue_o__wcsicmp
      • String ID: %s : KB number read in current registry is different from given KB number$<R8T\>$PREP$SOFTWARE\Microsoft\Windows\CurrentVersion\qua\lastrun\$current$kbnumber
      • API String ID: 1174623554-1272259374
      • Opcode ID: c58b6095e91a4baa6eef91c351ad40e834a46aaff3f8631f6dd6bf08f46f28d8
      • Instruction ID: abae5d06058a46790b95a1f268aca9bfb74c295a4f2aabf96004fe1948abf4d6
      • Opcode Fuzzy Hash: c58b6095e91a4baa6eef91c351ad40e834a46aaff3f8631f6dd6bf08f46f28d8
      • Instruction Fuzzy Hash: 5D513E22F04A829AEF10DF68D8411FC63B5FB957A8F815136DB4D57A9AEE38D506C380
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
        • Part of subcall function 00007FF8B90A594C: memmove.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00007FF8B90A599A
        • Part of subcall function 00007FF8B90A7C3C: memmove.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00007FF8B90A7C96
        • Part of subcall function 00007FF8B90C05A0: RegOpenKeyExW.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF8B90C05DA
        • Part of subcall function 00007FF8B90C05A0: RegCloseKey.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF8B90C05F6
        • Part of subcall function 00007FF8B90C0944: RegOpenKeyExW.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF8B90C09C5
        • Part of subcall function 00007FF8B90C0944: RegGetValueW.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF8B90C0A12
        • Part of subcall function 00007FF8B90C0944: RegCloseKey.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF8B90C0A53
      • _o__wcsicmp.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00007FF8B90AAA64
        • Part of subcall function 00007FF8B90A4818: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF8B90A4958
        • Part of subcall function 00007FF8B90A4818: HeapFree.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF8B90A496D
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: CloseHeapOpenmemmove$FreeProcessValue_o__wcsicmp
      • String ID: %s : KB number read in current registry is different from given KB number$<R8T\>$PREP$SOFTWARE\Microsoft\Windows\CurrentVersion\qua\lastrun\$current$kbnumber
      • API String ID: 1174623554-1272259374
      • Opcode ID: 58d869fac02467b3343fa3ec18dc2ae6c57df103f73bce5f722126fb750ed722
      • Instruction ID: 210f9e7acef4d26c356e1322652fe42447f5f5498e4b9142c860ad72b7fe99a8
      • Opcode Fuzzy Hash: 58d869fac02467b3343fa3ec18dc2ae6c57df103f73bce5f722126fb750ed722
      • Instruction Fuzzy Hash: 10515D22F14A829AFF10DF68D8401FC2375FB847A8F805135DB4D66AAAEE38D516D384
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
        • Part of subcall function 00007FF8B90B04B8: RegOpenKeyExW.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF8B90B04E1
        • Part of subcall function 00007FF8B90B04B8: RegCloseKey.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF8B90B0529
      • RegQueryValueExW.API-MS-WIN-CORE-REGISTRY-L1-1-0(?,?,00000000,00000000,00000001), ref: 00007FF8B90AF1C9
      • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,00000000,00000001), ref: 00007FF8B90AF1EC
      • HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,00000000,00000001), ref: 00007FF8B90AF200
      • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,00000000,00000001), ref: 00007FF8B90AF281
      • HeapFree.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,00000000,00000001), ref: 00007FF8B90AF295
      • RegCloseKey.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF8B90AF2AE
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: Heap$CloseProcess$AllocFreeOpenQueryValue
      • String ID: GlobalEventCounter
      • API String ID: 3475947390-2753345921
      • Opcode ID: 91979212b07085534615af8228817f8eb47c5f0cdb6b7edfa6e1030c79b329b1
      • Instruction ID: 15a67a2a545cf39e8c49ea7ffb750776ac5859d2526012269d579cdbaf11da18
      • Opcode Fuzzy Hash: 91979212b07085534615af8228817f8eb47c5f0cdb6b7edfa6e1030c79b329b1
      • Instruction Fuzzy Hash: EA414F36A08B8287EF109F59A40027DA6A1FF89BE1F698135DB4D47794DF3CE8468784
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
        • Part of subcall function 00007FF8B90BAEB8: RegOpenKeyExW.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF8B90BAEE4
        • Part of subcall function 00007FF8B90BAEB8: RegCloseKey.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF8B90BAF2C
      • RegQueryValueExW.API-MS-WIN-CORE-REGISTRY-L1-1-0(?,?,00000000,00000208,000000AA), ref: 00007FF8B90BAACD
      • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,00000208,000000AA), ref: 00007FF8B90BAAF0
      • HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,00000208,000000AA), ref: 00007FF8B90BAB04
      • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,00000208,000000AA), ref: 00007FF8B90BAB84
      • HeapFree.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,00000208,000000AA), ref: 00007FF8B90BAB98
      • RegCloseKey.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF8B90BABB1
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: Heap$CloseProcess$AllocFreeOpenQueryValue
      • String ID: RacSampleNumber
      • API String ID: 3475947390-588672749
      • Opcode ID: a0e6890d44fcd3defb304643b386338438fd96956932c32d8e64f129d7ecb4b4
      • Instruction ID: 07c230fc77fbc7313884a06ea6728b55aaf783a4ab46908f0336dbd133767cc1
      • Opcode Fuzzy Hash: a0e6890d44fcd3defb304643b386338438fd96956932c32d8e64f129d7ecb4b4
      • Instruction Fuzzy Hash: C5417132A08A8287EE108F59A41067DB6E2FBC9B90F5A8135DB5D47351DF7CE846DB40
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: Heap$CloseProcess$AllocFreeOpenQueryValue
      • String ID: DigitalProductId4
      • API String ID: 3475947390-1147585858
      • Opcode ID: 8b50bff814f6898a80e538bc59908a40c7052734e3a8db58ccb9d239a695fd58
      • Instruction ID: 6617a12932c3348fc378fb9825f9e214bd4cd0af4e535270485bb5a54599ae67
      • Opcode Fuzzy Hash: 8b50bff814f6898a80e538bc59908a40c7052734e3a8db58ccb9d239a695fd58
      • Instruction Fuzzy Hash: 1F418132A09B8287EB208F699440379B6A5FF89790F198234DF6D47795DF3CE406CB00
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      • You are reading %d bytes, xrefs: 00007FF8B90B79F0
      • You have completed reading as dataSize is 0, xrefs: 00007FF8B90B7A8B
      • An error occurrred during the read of OneSettings data, xrefs: 00007FF8B90B7AC1
      • You exceeded the maximum number of reads of %d. Something is probably wrong creating a read loop or data in OneSettings too large, xrefs: 00007FF8B90B7AAD
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: AvailableDataErrorHttpLastQuery
      • String ID: An error occurrred during the read of OneSettings data$You are reading %d bytes$You exceeded the maximum number of reads of %d. Something is probably wrong creating a read loop or data in OneSettings too large$You have completed reading as dataSize is 0
      • API String ID: 1192986902-3008580539
      • Opcode ID: 62c4a47a401fb43edb343988cae42ec41e9b1607060fa18406591e0ef63e7080
      • Instruction ID: 7d7e080baf440880bf41fe86700667ff614e10ea39bdb2d1b01d341a079de2ed
      • Opcode Fuzzy Hash: 62c4a47a401fb43edb343988cae42ec41e9b1607060fa18406591e0ef63e7080
      • Instruction Fuzzy Hash: E2414662A08BC286EE649F2D94403B976A0FF85BD0F508135CB5D47BA5EF2CE907CB40
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: TrustVerify$memset
      • String ID: <R8T\>$onecore\enduser\upgradeenablers\shellhelpers\servicehelpers.cpp
      • API String ID: 165668748-443010087
      • Opcode ID: 7239d44f2143361b3e56981fa61c7a7cb57e05e2547d54ae026ac93619a47fdc
      • Instruction ID: 8289ceb9b6eba56929c9b7f59d32ac5631373e431d14e13f509b30c96c49f21d
      • Opcode Fuzzy Hash: 7239d44f2143361b3e56981fa61c7a7cb57e05e2547d54ae026ac93619a47fdc
      • Instruction Fuzzy Hash: 5D416032B08B81DAFB508FA8D4543AD37B4EB89758F404635EF2E57A89DF38D10A8744
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: TrustVerify$memset
      • String ID: <R8T\>$onecore\enduser\upgradeenablers\shellhelpers\downloadhelper.cpp
      • API String ID: 165668748-1701643399
      • Opcode ID: a38d56df17783f6ab3795526bcca7ea45d1238bb6e41191c42c995c2b0c1046b
      • Instruction ID: 874f1ecbee5cbcd14719b2678e79ad8adbf6be3f85a6b87ed9b6e0333e33b13b
      • Opcode Fuzzy Hash: a38d56df17783f6ab3795526bcca7ea45d1238bb6e41191c42c995c2b0c1046b
      • Instruction Fuzzy Hash: 8B416E72B09B82CAFB108F68D4543AD37B0EB59798F404236EB1D57A89DF38D41A8744
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: CloseOpenQueryValue
      • String ID: %s registry key %s$does not exist$downloaded$exists
      • API String ID: 3677997916-3623614293
      • Opcode ID: 6ffd0e09757f3ec01c2bbb5b64c0b20ae10be34712219cd67961dadbd1c1c73e
      • Instruction ID: e71d286868aac996f0f79ae11c0aacc7b28145aac01d7984118c02f4173d45ea
      • Opcode Fuzzy Hash: 6ffd0e09757f3ec01c2bbb5b64c0b20ae10be34712219cd67961dadbd1c1c73e
      • Instruction Fuzzy Hash: 53216032A18A8286EF508F1AE44537A67B0FB8ABD8F844135EB5E47754CF3CD506C740
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: Value$CloseDeleteOpen
      • String ID: DISKCLEANUPPLUGIN.DISKSPACEFREETOSTARTCLEANUP$Software\Microsoft\Windows\CurrentVersion\rempl\settings$onecore\enduser\upgradeenablers\qualityupdateassistant\quacommonlibrary\devicepreparer.cpp
      • API String ID: 3183427449-2979285241
      • Opcode ID: 2dd560be0b5fdf72839c2e9fc24302cc36b6fac0f648cbfaf09aee62b859fca0
      • Instruction ID: ad47a5770ee8a1232932d7af24867d2558f6c6d0ad8cba7c63eefc3fab4dc01f
      • Opcode Fuzzy Hash: 2dd560be0b5fdf72839c2e9fc24302cc36b6fac0f648cbfaf09aee62b859fca0
      • Instruction Fuzzy Hash: 5A215C22A18E8286EF108F18E84017977A0FB95BD4F404231DB6D437A8DF3CD646CB00
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: ErrorLast$AddressClearLibraryLoadProcVariant
      • String ID: ReadPolicyWithFallback$updatepolicy.dll
      • API String ID: 3685366355-2098011389
      • Opcode ID: 6448c1e017c5277cf77d17cb2929701fdebeff733e106fbb0a1442fafbd5d790
      • Instruction ID: eaa254e05ac517964fe403eb4aab9cdcaaace6ae6eeaf66370d77e7ecf78697c
      • Opcode Fuzzy Hash: 6448c1e017c5277cf77d17cb2929701fdebeff733e106fbb0a1442fafbd5d790
      • Instruction Fuzzy Hash: EA214A32A19A82C6EB548F69E8143796BA4FB8AB85F489035DF5E43298DF3CD446C740
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(00000000,Download,00000000,00007FF8B90AB34F,?,00000000,PREP,00007FF8B90AB157), ref: 00007FF8B90AB4F3
      • HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF8B90AB507
      • memmove.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00007FF8B90AB53F
      • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF8B90AB55C
      • HeapFree.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF8B90AB570
      • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(00000000,Download,00000000,00007FF8B90AB34F,?,00000000,PREP,00007FF8B90AB157), ref: 00007FF8B90AB58B
      • HeapFree.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF8B90AB59F
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: Heap$Process$Free$Allocmemmove
      • String ID: Download
      • API String ID: 3442027419-2171396134
      • Opcode ID: 63ad0f1fc2e66cea89f1574ad2d20e06cdc827b398f7260be96e3ded4ff30ff7
      • Instruction ID: c67f4df261c671b7fe63926ef96bd8b3b14c770130883aa82aa9ed19648f351d
      • Opcode Fuzzy Hash: 63ad0f1fc2e66cea89f1574ad2d20e06cdc827b398f7260be96e3ded4ff30ff7
      • Instruction Fuzzy Hash: 7D518F22E086D287EE149E2DA40467DA652EF85BF0F5A8534DF0E07392DE3DE8478784
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: ErrorHeapLastMutexRelease$CloseFreeHandleObjectProcessSingleWait
      • String ID:
      • API String ID: 124136160-0
      • Opcode ID: 1fa2d6138c6ba4396d1459c928585a8b636f894d256fb52996a61a64fa8b096b
      • Instruction ID: addf3283d8c0373f9709c04d21e2faef57f53d2835a9fb9cce2aa623dbc3b38e
      • Opcode Fuzzy Hash: 1fa2d6138c6ba4396d1459c928585a8b636f894d256fb52996a61a64fa8b096b
      • Instruction Fuzzy Hash: 06415032A08A828AFF549F69E45017D77A0FF89BE0F488530DB5E83695DF3CE4568B40
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: Heap$Process$AllocFree
      • String ID: CV not initialized$Error, CV not initialized
      • API String ID: 756756679-3195384115
      • Opcode ID: 0bd510142408245d363722f26abe74a80ff824850a74fdb351cb15371b8fa660
      • Instruction ID: 4d0036785366dc65fe800fbe6f8c1b6d703af40f77c6b1501362305b0b531edf
      • Opcode Fuzzy Hash: 0bd510142408245d363722f26abe74a80ff824850a74fdb351cb15371b8fa660
      • Instruction Fuzzy Hash: E9316D21F09FD286EE149F5AA804178AAA5FF8ABD0F488574DB5D077A4CF3CE4028780
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: Heap$Process$Free$Allocmemmove
      • String ID:
      • API String ID: 3442027419-0
      • Opcode ID: 1cddce3877e393d55ee5b6a9de3884f53cc4e62a5d391fb50fa1f632c560ae0e
      • Instruction ID: 5fe6554a5391a099cd446c5aff9852606b8155a7e8d026e2232ee1704ff14a51
      • Opcode Fuzzy Hash: 1cddce3877e393d55ee5b6a9de3884f53cc4e62a5d391fb50fa1f632c560ae0e
      • Instruction Fuzzy Hash: 63415232A08BC686EA149F9AA44417DBAB1FB4ABC1F49C134DF5E13715DF3CE4468740
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: ExclusiveLock_o__errno$AcquireErrorOriginateRelease_o__invalid_parameter_noinfomemmove
      • String ID:
      • API String ID: 487599614-0
      • Opcode ID: 92dd5f03d050900769054c17baa935d0a61226bc1ce331a3d0abfd7ea02a1f97
      • Instruction ID: cc4521656c3c1f3970ec946ad301a962c966a75d6e5b37d0eb957c47d3f6a278
      • Opcode Fuzzy Hash: 92dd5f03d050900769054c17baa935d0a61226bc1ce331a3d0abfd7ea02a1f97
      • Instruction Fuzzy Hash: F2616E22A0C6C687EA749F5AA40067DBAA4FF46BD0F548131DF9E43A94DF7CE446CB40
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: Value$memmove
      • String ID: <R8T\>$DISKCLEANUPPLUGIN.DISKSPACEFREETOSTARTCLEANUP$Software\Microsoft\Windows\CurrentVersion\rempl\settings$onecore\enduser\upgradeenablers\qualityupdateassistant\quacommonlibrary\devicepreparer.cpp
      • API String ID: 688555129-621615392
      • Opcode ID: beb762d81e902e3b0f04f402b94c3783489970cb52a0d66bcb022da1d35d0792
      • Instruction ID: 72d559d3f3ef17452a6c7e4a0e47ad9d4ae91649ee1a8fa2660bd0d1e38a7f55
      • Opcode Fuzzy Hash: beb762d81e902e3b0f04f402b94c3783489970cb52a0d66bcb022da1d35d0792
      • Instruction Fuzzy Hash: B2514E32A08F8299EB10CF68E8442AD77B4FB587A8F900236DB9D57799DF38D546C740
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
        • Part of subcall function 00007FF8B90A4818: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF8B90A4958
        • Part of subcall function 00007FF8B90A4818: HeapFree.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF8B90A496D
      • GetSystemWindowsDirectoryW.API-MS-WIN-CORE-SYSINFO-L1-1-0 ref: 00007FF8B90BD977
        • Part of subcall function 00007FF8B90A594C: memmove.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00007FF8B90A599A
        • Part of subcall function 00007FF8B90A7C3C: memmove.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00007FF8B90A7C96
        • Part of subcall function 00007FF8B90C5128: FindFirstFileW.API-MS-WIN-CORE-FILE-L1-1-0 ref: 00007FF8B90C51CA
        • Part of subcall function 00007FF8B90C5128: FindNextFileW.API-MS-WIN-CORE-FILE-L1-1-0 ref: 00007FF8B90C5310
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: FileFindHeapmemmove$DirectoryFirstFreeNextProcessSystemWindows
      • String ID: <R8T\>$Failure occurred during check windows side by side$Start Function CheckWindowsSideBySideSize$The size of windows sxs is %lli MB$\winsxs
      • API String ID: 3575660605-3871860192
      • Opcode ID: 7d1125e6c58e2c06a0b39d380f67bc2f33558fa9605c45c2b51a01f2b661f953
      • Instruction ID: c469caf2f13d30197e3bb561eee7f0247cc84424a59cb1ef1c4e7e19cf5eab95
      • Opcode Fuzzy Hash: 7d1125e6c58e2c06a0b39d380f67bc2f33558fa9605c45c2b51a01f2b661f953
      • Instruction Fuzzy Hash: 4831B122A18BC282EB109F28E8412BD7364FFD87A4F815235EB5D476A6DF7CE506C740
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
        • Part of subcall function 00007FF8B90A594C: memmove.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00007FF8B90A599A
        • Part of subcall function 00007FF8B90A7C3C: memmove.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00007FF8B90A7C96
        • Part of subcall function 00007FF8B90C05A0: RegOpenKeyExW.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF8B90C05DA
        • Part of subcall function 00007FF8B90C05A0: RegCloseKey.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF8B90C05F6
      • RegOpenKeyExW.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF8B90A829C
      • RegDeleteTreeW.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF8B90A82C0
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: Openmemmove$CloseDeleteTree
      • String ID: : Deleting the previous execution state was successful: %d$<R8T\>$SOFTWARE\Microsoft\Windows\CurrentVersion\qua\lastrun\$current
      • API String ID: 3303941815-3920526523
      • Opcode ID: 369c2a6221003a0e2eccec6ce6efd6095737085c40caf10aaebd71819e55e7f0
      • Instruction ID: ee7bb846a263c8eaa4b300f3125de52d7acf575c5efa0e3a6b75d4585a4fe179
      • Opcode Fuzzy Hash: 369c2a6221003a0e2eccec6ce6efd6095737085c40caf10aaebd71819e55e7f0
      • Instruction Fuzzy Hash: 39318132A18A8295EF109F29E8052B973A4FB89BE8F815235DB1D47795DF38D106C380
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: BlanketCreateInstanceProxy
      • String ID: Initializing USO$UsoHelper already initialized$UsoHelper::Initialize failed to create update session$onecore\enduser\upgradeenablers\shellhelpers\usohelper.cpp
      • API String ID: 1899829610-2373035411
      • Opcode ID: 8068f20190a293d599ab538ff9972630988b04fc7c161bc6a221226368a09257
      • Instruction ID: ba72f6da51c2995fa69f5869432b69567c0e4f2ad0377d6bdcfd66ad8a8d21f7
      • Opcode Fuzzy Hash: 8068f20190a293d599ab538ff9972630988b04fc7c161bc6a221226368a09257
      • Instruction Fuzzy Hash: 31315732B08E8282EB008F6AE4547AA7761FB89BE4F114232DB7D836A4DF3CD545C740
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: Time$CloseCreateFileSystemValue
      • String ID: ?$RefreshAfter
      • API String ID: 1298677607-2212148845
      • Opcode ID: d6a4292c73ebc1988218cd101c543a0a8841a52869b0212ca306aeba464be3df
      • Instruction ID: 31aa547cd49deb8c820ff759f92592884087c8a8bf583b9f7d75d021d077c9cd
      • Opcode Fuzzy Hash: d6a4292c73ebc1988218cd101c543a0a8841a52869b0212ca306aeba464be3df
      • Instruction Fuzzy Hash: CE216F33614E918BEB508F39E8906A97BE5FB89798B055235EB1E87B14DF38C481CB00
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • memmove.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?,00007FF8B90AEDD5), ref: 00007FF8B90AB744
      • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF8B90AEDD5), ref: 00007FF8B90AB78D
      • _o__errno.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?,00007FF8B90AEDD5), ref: 00007FF8B90AB792
      • _o__invalid_parameter_noinfo.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?,00007FF8B90AEDD5), ref: 00007FF8B90AB7A4
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: _o__errno_o__invalid_parameter_noinfomemmovememset
      • String ID: %u!
      • API String ID: 607338041-3756441844
      • Opcode ID: 88a255a51cdf034d8fb1a5e2a4f6f173d330c8bf714e8aaf8eb6004102a5bce4
      • Instruction ID: 1a8dce30199b1149863d4e08e6f7e074a9e4e68eb21c1b28fa218809d4e74ab0
      • Opcode Fuzzy Hash: 88a255a51cdf034d8fb1a5e2a4f6f173d330c8bf714e8aaf8eb6004102a5bce4
      • Instruction Fuzzy Hash: DB21D062A0C7D185EA258F7A65002BDBFA4EF45BD0F588031DF9C43392CE7CE8828740
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • GetCurrentProcessId.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0 ref: 00007FF8B90A5381
      • CreateMutexExW.API-MS-WIN-CORE-SYNCH-L1-1-0 ref: 00007FF8B90A53C9
        • Part of subcall function 00007FF8B90A5588: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FF8B90A52E2
        • Part of subcall function 00007FF8B90A5588: CloseHandle.API-MS-WIN-CORE-HANDLE-L1-1-0 ref: 00007FF8B90A52F3
        • Part of subcall function 00007FF8B90A5588: SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FF8B90A5305
      • CloseHandle.API-MS-WIN-CORE-HANDLE-L1-1-0 ref: 00007FF8B90A53FB
      • WaitForSingleObjectEx.API-MS-WIN-CORE-SYNCH-L1-1-0 ref: 00007FF8B90A5442
      • ReleaseMutex.API-MS-WIN-CORE-SYNCH-L1-1-0 ref: 00007FF8B90A5507
        • Part of subcall function 00007FF8B90A2120: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FF8B90A2134
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: ErrorLast$CloseHandleMutex$CreateCurrentObjectProcessReleaseSingleWait
      • String ID: <R8T\>$Local\SM0:%lu:%lu:%hs$x
      • API String ID: 4087247453-2453128266
      • Opcode ID: 97a8e11da7eee930f7c5704faf456ff81780355b9e92eeb5c96519e4e4e61bf5
      • Instruction ID: 31beb94789fc9d949d0269d337fc41f9b949b5eb285b78855934bb0c88ff791e
      • Opcode Fuzzy Hash: 97a8e11da7eee930f7c5704faf456ff81780355b9e92eeb5c96519e4e4e61bf5
      • Instruction Fuzzy Hash: 34219032618A81C6EB609F29E8047AA67A4FB8DBE4F494231DB5D477A0DF3CD406CB40
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: CloseOpenValue
      • String ID: DelayCount$Failed to write delay count registry key hr = 0x%08x$Software\Microsoft\Windows\CurrentVersion\qua
      • API String ID: 779948276-2487338893
      • Opcode ID: 08069be449d05226be5ea84ff40e18833bb83de17b9aa8e59ba1ad88c0637ab4
      • Instruction ID: 1f4956fd13265ee366d9e7119e4b7e4830efd2e8fed7c01b89e6a261098004d8
      • Opcode Fuzzy Hash: 08069be449d05226be5ea84ff40e18833bb83de17b9aa8e59ba1ad88c0637ab4
      • Instruction Fuzzy Hash: 1A116D22B18B8286EF105F69E480779B6E0FB85B90F449239DB4E03750DF3CD5068B00
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • memset.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,00000208,00007FF8B90B9F1C), ref: 00007FF8B90B5E46
        • Part of subcall function 00007FF8B90B5AFC: _o__wcsicmp.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,00000000,00000008,00007FF8B90B5F32,00000000,?,00000208,00007FF8B90B9F1C), ref: 00007FF8B90B5B6A
      • memmove.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,?,00000208,00007FF8B90B9F1C), ref: 00007FF8B90B60F1
      • memmove.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,?,00000208,00007FF8B90B9F1C), ref: 00007FF8B90B6145
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: memmove$_o__wcsicmpmemset
      • String ID: FileVersion$StringFileInfo$VS_VERSION_INFO
      • API String ID: 1582236872-719432996
      • Opcode ID: 45c159082fa6af17258c357a503c1515f82fe3c2b370f538fdedf6d2682983d1
      • Instruction ID: 0cf48ffdd96149cae60551d4ef1f00b502da4a6fd7fe3ff36cf3dbe1a0822ed6
      • Opcode Fuzzy Hash: 45c159082fa6af17258c357a503c1515f82fe3c2b370f538fdedf6d2682983d1
      • Instruction Fuzzy Hash: 51E1AA56A15A92C5EF149F2A80202B973A0EF04FE8F448036DF49577E9EB3CE953D718
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: ErrorLast
      • String ID: onecore\internal\base\inc\OneSettingsClientWrapper.h$v3.0
      • API String ID: 1452528299-3374197607
      • Opcode ID: d73b3706d724a88fe5a4c065435029e748c23d901e72a98286ed270eaf704239
      • Instruction ID: db768fb3c84550fa2bac56ea09ae38c1ab795ac2b9b77f6ec9382339ebbc2873
      • Opcode Fuzzy Hash: d73b3706d724a88fe5a4c065435029e748c23d901e72a98286ed270eaf704239
      • Instruction Fuzzy Hash: BDC15A26B08FC286EB508F29E440179ABA5E749FE8B584175CF4E47365DF39E856CB00
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: ExclusiveLock$AcquireErrorOriginateRelease_o__errno_o__invalid_parameter_noinfomemmove
      • String ID:
      • API String ID: 2981021939-0
      • Opcode ID: 11ab6589e23f7914d7e8208f745ef5bfc51f706d2a36e06ab1442e1fe3840e81
      • Instruction ID: 628a244517971cbe41c4aef1368f21f29d02037898208b65b45e100488617617
      • Opcode Fuzzy Hash: 11ab6589e23f7914d7e8208f745ef5bfc51f706d2a36e06ab1442e1fe3840e81
      • Instruction Fuzzy Hash: 0B51BE32A08A8686EB788F69D40017D77A9FB46BD4F548235DF6A43790DF3EE846C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: memmove$Concurrency::cancel_current_task_o__invalid_parameter_noinfo_noreturn
      • String ID:
      • API String ID: 3650786708-0
      • Opcode ID: e18d5ba8a9fe0a7a327367d353b04535ea5fdce25306a6690ee1c3bae8488684
      • Instruction ID: 8294df0f157cef6f1a6e8b7106e5abc94a606f85516b801c68917f4ba2b9bafd
      • Opcode Fuzzy Hash: e18d5ba8a9fe0a7a327367d353b04535ea5fdce25306a6690ee1c3bae8488684
      • Instruction Fuzzy Hash: 6D41B422B08BC296EE249F2AA644379A795EF48FE0F584635DF6D07795DE7CE042C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: CertCertificate$Chain$Free$ContextErrorHttpLastOptionPolicyQueryVerify
      • String ID:
      • API String ID: 1429027421-0
      • Opcode ID: c4c6eea1c98730b95e9a65b9c8f08898ad1f3650f950a3d17406bf08e68d07f3
      • Instruction ID: 60d775b0f507f6099c1df47a7120bb1adf2b222cb0c81592dc08e13403770f2b
      • Opcode Fuzzy Hash: c4c6eea1c98730b95e9a65b9c8f08898ad1f3650f950a3d17406bf08e68d07f3
      • Instruction Fuzzy Hash: 23311B32A19B85CEEB108F78D4403F977A0FB8974CF459236EA1E46A59EF38D195C740
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: _o_free
      • String ID:
      • API String ID: 1736097121-0
      • Opcode ID: ef938ed6bfeec653a5bf127fabb41bd55904916dfbe0ec5c8ee976c72564a80f
      • Instruction ID: d94b6c51025b8986345f84e2f2668a30876c16ecd4fa9167a1c30ed29ae5ad11
      • Opcode Fuzzy Hash: ef938ed6bfeec653a5bf127fabb41bd55904916dfbe0ec5c8ee976c72564a80f
      • Instruction Fuzzy Hash: D421FC22A0AE8186FF599F6DD0A5339A770EF4AF95F195234CB1E0A244CF3DD885C790
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: _o_fgetwc
      • String ID: <R8T\>
      • API String ID: 2312039988-166503183
      • Opcode ID: 49cfbbbd4ee1522d65a40b37afb77f7e959489419b2650d0ef358f99aca53f4f
      • Instruction ID: 0ed3dc0c96970b3cb9e1d4861e37b3a537a1772743672c2d10ee1418a3fa4d46
      • Opcode Fuzzy Hash: 49cfbbbd4ee1522d65a40b37afb77f7e959489419b2650d0ef358f99aca53f4f
      • Instruction Fuzzy Hash: F2915B32604A85C9EB50CF69D4903AC33B5FB58B98F858232EB5E87B98DF38D559C740
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID:
      • String ID: Starting MSU from %s$onecore\enduser\upgradeenablers\shellhelpers\windowsupdateinstallhelper.cpp
      • API String ID: 0-3043678105
      • Opcode ID: 603d9e79d12c9ccf0c27b917915114836b5c3e96f7f9f244d3248475a4db16e6
      • Instruction ID: 1f3f5b56082a790511b5e947a9494733d7cddb1755207bf1cf96bc82e05fa657
      • Opcode Fuzzy Hash: 603d9e79d12c9ccf0c27b917915114836b5c3e96f7f9f244d3248475a4db16e6
      • Instruction Fuzzy Hash: 8351C223E08AC186EB10CF29E8401BD6BA4FB95BE0F554535EB8C07BA5DF78D592C740
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID:
      • String ID: ;$;
      • API String ID: 0-2543639521
      • Opcode ID: b71953b5c555bc2649b6ba798b7a452d7df0e937dd6ab6e8a265e527f09ca4d4
      • Instruction ID: fb277c00fb25368af9fc3a67a6d5acae35a6c842b51b94dcee767ec49dc1d38e
      • Opcode Fuzzy Hash: b71953b5c555bc2649b6ba798b7a452d7df0e937dd6ab6e8a265e527f09ca4d4
      • Instruction Fuzzy Hash: 55419226E082F382FF749F1C94505B966A9EF857C4FC58132DF4902A98DE3CE486CE15
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID:
      • String ID: ;$;
      • API String ID: 0-2543639521
      • Opcode ID: 62781cc03c998f59ef4ba6bbac2f46dae15826b0161bcd81ed73abeb7f006fe7
      • Instruction ID: 49258515a7b61c53b215e513f897954c221b2fb7c4f03c4722e2d68046619aa3
      • Opcode Fuzzy Hash: 62781cc03c998f59ef4ba6bbac2f46dae15826b0161bcd81ed73abeb7f006fe7
      • Instruction Fuzzy Hash: 4741A326E0C2C286FF74AF1895103B972B1FB84784F858132EB4E02B95DE7CE49B8715
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: Value$memset
      • String ID: ETag$If-None-Match:
      • API String ID: 3732838118-390843044
      • Opcode ID: 11309b543df6eeb2d5c4b7dde6a778b1abc5a2ad6aa72c5ce699d542a9b5ff8c
      • Instruction ID: 770aa3d98073adef46dac5c2a52155c9c713f67e43d9f833fa3ecef5a1bb6c9d
      • Opcode Fuzzy Hash: 11309b543df6eeb2d5c4b7dde6a778b1abc5a2ad6aa72c5ce699d542a9b5ff8c
      • Instruction Fuzzy Hash: E041AE72B04B9186EB108F29A9886A973A4FB44BE4F658235CFAC43791DF3DD906D740
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: CloseCreateValue
      • String ID: ?$ETag
      • API String ID: 1818849710-417340769
      • Opcode ID: 715671df87b4625fed796052b6c678f96fe58a4a078fa0e83d69211e1e58182e
      • Instruction ID: 909bca938219a03900060412755d1b50586670eb81ea19681c2b07008fd945b6
      • Opcode Fuzzy Hash: 715671df87b4625fed796052b6c678f96fe58a4a078fa0e83d69211e1e58182e
      • Instruction Fuzzy Hash: 84215132B08B9186EB108F29A48466A76E4FB88BE4F504335DBAD83694DF79D4428B40
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: ErrorFileLastModuleNamememset
      • String ID: <R8T\>
      • API String ID: 3697264446-166503183
      • Opcode ID: bd4d323809320ba18ab6a7384020f7b9771deb75ef6e69259d508572bfc0583b
      • Instruction ID: 21e3382f0bcd039773504206834d90163aef8943c468798b45cef21c0b2af76c
      • Opcode Fuzzy Hash: bd4d323809320ba18ab6a7384020f7b9771deb75ef6e69259d508572bfc0583b
      • Instruction Fuzzy Hash: 1B115131B1C6C287FF245F29A8543B96290BF89B94F404135DF4E86291EF2CD5068A40
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: ErrorLockOriginateShared$AcquireReleasememset
      • String ID:
      • API String ID: 3229140019-0
      • Opcode ID: 1132d152c1dcca9f47cd56be07742d6758da44ceedeabd79fee0079bd0513ef6
      • Instruction ID: 06b9627225b4b1aa146032bb1546dbcfa10f489797c4a9f0d1dfb158c3aa302f
      • Opcode Fuzzy Hash: 1132d152c1dcca9f47cd56be07742d6758da44ceedeabd79fee0079bd0513ef6
      • Instruction Fuzzy Hash: 21615A32A08ACA87EA648F19D44077D76B9FF86B94F054231DF9E47794DF38E8429740
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: ExclusiveLock$AcquireErrorOriginateRelease_o__errno_o__invalid_parameter_noinfo
      • String ID:
      • API String ID: 3455421698-0
      • Opcode ID: 5c02ce6525b45f948426af09f794bb83199556499c02aa547bcd43fae8526f0a
      • Instruction ID: d0e279f750526e9ba1f0010ae0a46145c1c99c8aa38ba29b27740ceac389a2c8
      • Opcode Fuzzy Hash: 5c02ce6525b45f948426af09f794bb83199556499c02aa547bcd43fae8526f0a
      • Instruction Fuzzy Hash: 26416A32A08B9A86EA209F59940426C7BB4FB4AFD1F568135DF6D077A4CF38D45B8740
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(00000000,?,00000000,00007FF8B90B7517), ref: 00007FF8B90B50D5
      • CoTaskMemAlloc.API-MS-WIN-CORE-COM-L1-1-0(00000000,?,00000000,00007FF8B90B7517), ref: 00007FF8B90B5105
      • memmove.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,00000000,00007FF8B90B7517), ref: 00007FF8B90B512C
      • CoTaskMemFree.API-MS-WIN-CORE-COM-L1-1-0(?,00000000,00007FF8B90B7517), ref: 00007FF8B90B5134
      • memmove.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,00000000,00007FF8B90B7517), ref: 00007FF8B90B514B
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: Taskmemmove$AllocErrorFreeLast
      • String ID:
      • API String ID: 2836626735-0
      • Opcode ID: 1b5bebad3d4ba08496c302301aec1bf6ea4c801b1931589fd662c90275058006
      • Instruction ID: 3c0ca95ff976275f4daec08029b5124bf94cb6c6da14952f188555d9f6ec7d6f
      • Opcode Fuzzy Hash: 1b5bebad3d4ba08496c302301aec1bf6ea4c801b1931589fd662c90275058006
      • Instruction Fuzzy Hash: 2231B132A0AE82C5EE109F1DE854179A2A5FB89BE4F588A75DF6D07394EE3CD4438740
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: Heap$Process$Free$Alloc
      • String ID:
      • API String ID: 3689955550-0
      • Opcode ID: ed574e27965a85701f1b1e61f133e677567303dece9546a31169f5cad0931c7e
      • Instruction ID: 7e335ab32b967bb90142a85aaa787e70e70a9e78f5d117ecb73c23999468b134
      • Opcode Fuzzy Hash: ed574e27965a85701f1b1e61f133e677567303dece9546a31169f5cad0931c7e
      • Instruction Fuzzy Hash: 1B313632A15B818AEB448F5AE540378BBB1FB8ABE1F59C130CB5D07790DF38D4628780
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: Heap$FreeProcess$memset
      • String ID: onecore\enduser\upgradeenablers\qualityupdateassistant\quacommonlibrary\quadownloader.cpp
      • API String ID: 145835812-2361944823
      • Opcode ID: 47da620865b2f4c3fa893403a6aa3d9610f9f2d5eb3cc2855bdbc1e368fe0e57
      • Instruction ID: 8527b4839f23667aceda8133beb0fce349d76e0dacbb9d6b5fc70deb16b9f6f7
      • Opcode Fuzzy Hash: 47da620865b2f4c3fa893403a6aa3d9610f9f2d5eb3cc2855bdbc1e368fe0e57
      • Instruction Fuzzy Hash: 18216D26A08AC286EB049F69E4011BDBB60EB89BE0F558136DB5D47395CF38D546C780
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: ExceptionThrow
      • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
      • API String ID: 432778473-1866435925
      • Opcode ID: 3a73293686e3f6970d485f1f63d2fa8061ef1888d66fc16435d540a1e426141a
      • Instruction ID: e8c841cf9ea6e8ec4ee4beeb9f003eb9e2b88da2b030dc89f33aac695bba8075
      • Opcode Fuzzy Hash: 3a73293686e3f6970d485f1f63d2fa8061ef1888d66fc16435d540a1e426141a
      • Instruction Fuzzy Hash: F701B172F28A8691FF249F2CE441AB82B21AF607C4FA04435C71D16EA5DE2CE907CB40
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: _o__errno_o__invalid_parameter_noinfo
      • String ID:
      • API String ID: 2671245207-0
      • Opcode ID: 68e267edcffccc960a34fb3c83be8691bb936764247b628ca1ef034797e20065
      • Instruction ID: 84e02adb9214bbe7307c910cbadebf626d31f83fff1045cd4c2c76c9bfa349a8
      • Opcode Fuzzy Hash: 68e267edcffccc960a34fb3c83be8691bb936764247b628ca1ef034797e20065
      • Instruction Fuzzy Hash: AC015252E0D7CAC6FEA05F59A54417E5551AF59BE0F08C430DF5A4BF8ACE2CE4036784
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: _o_ceilf
      • String ID: QUASELFUPDATE.CABHASH$invalid hash bucket count
      • API String ID: 2448925416-3328514497
      • Opcode ID: 3eccce60e546879b7517cb977e47f20f218660510a09e335a7cfa2bd89ea4cc0
      • Instruction ID: f1a3315a757e1d828397cdfd31e2436cfc7cb0beb786e9eb4958aed4363ad8e3
      • Opcode Fuzzy Hash: 3eccce60e546879b7517cb977e47f20f218660510a09e335a7cfa2bd89ea4cc0
      • Instruction Fuzzy Hash: 0891BB73A08FC9C1DE808F1AE044AA877A6FB15BC4B59C532DB5D97380DE39D892C740
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • memmove.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF8B90CC913
      • memmove.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF8B90CC971
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: memmove
      • String ID: <R8T\>
      • API String ID: 2162964266-166503183
      • Opcode ID: a2943acc53c1edd978bf3da357924722689e93c5dfcf36f7fcacb05e688fad1e
      • Instruction ID: 17353f6eb4eeb99217b86ceadd6c28bd38e4ebe1d68509f06f0851732c3c4333
      • Opcode Fuzzy Hash: a2943acc53c1edd978bf3da357924722689e93c5dfcf36f7fcacb05e688fad1e
      • Instruction Fuzzy Hash: 83716F22B18A9599EB10DFA9D4542ED23B1BB44BE8F800636DF5D57BD9DE38D50BC300
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: CurrentDebugDebuggerOutputPresentStringThread
      • String ID: onecore\internal\sdk\inc\wil\opensource\wil\resource.h
      • API String ID: 4268342597-3341287125
      • Opcode ID: f6fc2d17e35c9b8e1aab9e29405cbd4ea8f267baccccb5d18e49ac4221b62b24
      • Instruction ID: 80375efdf8a11d44951301fb28b9309df506db4a040a3f12517675e09e4336a1
      • Opcode Fuzzy Hash: f6fc2d17e35c9b8e1aab9e29405cbd4ea8f267baccccb5d18e49ac4221b62b24
      • Instruction Fuzzy Hash: AA817F22A0CBC186EB248F69E88026977B0FB89BD4F445139EB8D577A8DF3CE545C740
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      • onecore\enduser\upgradeenablers\shellhelpers\usohelper.cpp, xrefs: 00007FF8B90C0243
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID:
      • String ID: onecore\enduser\upgradeenablers\shellhelpers\usohelper.cpp
      • API String ID: 0-2722915061
      • Opcode ID: 458f50e260d21819c67b481d99d66998d3a2fb69e8d1aafa3fe185a20575d9b3
      • Instruction ID: 275d6641253352f14756382af0ea8dd6ae08c323a27c6b17b4310a3c2fb2fe5a
      • Opcode Fuzzy Hash: 458f50e260d21819c67b481d99d66998d3a2fb69e8d1aafa3fe185a20575d9b3
      • Instruction Fuzzy Hash: 4751F722B04A868AEF148F6AD8443AD2774FB4ABD9F104532DB1D577A8DF39D84AD340
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: BlanketCreateInstanceProxy
      • String ID: ExpediteUpdater$onecore\enduser\upgradeenablers\shellhelpers\usohelper.cpp
      • API String ID: 1899829610-2464451687
      • Opcode ID: 67fa69af981cac49933a3b06863ac271f8271ab2e05851fbd15400f09196187d
      • Instruction ID: 5d1e1145928c34c4d1b93c61d0f36c75c6a55fc02ad2f737b3087dcb49edb7bc
      • Opcode Fuzzy Hash: 67fa69af981cac49933a3b06863ac271f8271ab2e05851fbd15400f09196187d
      • Instruction Fuzzy Hash: 08410A36A04E8686EB009F6AE8447A97760FB89FE4F554232DB6D43BA4DF3CD506C740
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: CloseOpenValue
      • String ID: <R8T\>
      • API String ID: 779948276-166503183
      • Opcode ID: 7ea2b0484ec0a68ab84a9e9a967ed9f45ebb83f47863774e0de87417618b2250
      • Instruction ID: 5870f06916fdf77412a97483b7c1e68a85984288be68c054325110ba9d35ccf7
      • Opcode Fuzzy Hash: 7ea2b0484ec0a68ab84a9e9a967ed9f45ebb83f47863774e0de87417618b2250
      • Instruction Fuzzy Hash: 99318432608BC186EE109F69A84427AA6B4FB8A7E0F505238EF9D477A5DF3CD446C704
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      • Software\Microsoft\CUAssistant\LocalState\TelemetryCUAssistant, xrefs: 00007FF8B90AF2EA
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: Close$Create
      • String ID: Software\Microsoft\CUAssistant\LocalState\TelemetryCUAssistant
      • API String ID: 359002179-929217711
      • Opcode ID: ff8d711ed1391d3a5f5b4d4b72bb5473b51a1bdea233203efd961d47a47231d8
      • Instruction ID: fb92023429aa89b3c1575def457aea2afe38b4a73f7a6b8cf75d415b6c9eed77
      • Opcode Fuzzy Hash: ff8d711ed1391d3a5f5b4d4b72bb5473b51a1bdea233203efd961d47a47231d8
      • Instruction Fuzzy Hash: 9631A033A08BC186EB609F28A4447BD72A5FF853A0F258239D76D47780DF7DE4469740
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: CloseCreate
      • String ID: <R8T\>$?
      • API String ID: 2932200918-3457169685
      • Opcode ID: bf4c60a4bdcaf44eefbd5c6a157a4d2457be871690cf62c00122c911d58871be
      • Instruction ID: 91cccf26b5b21f65a47a88f366e841882a0f70eee2798b2395a5289f4f96d8c2
      • Opcode Fuzzy Hash: bf4c60a4bdcaf44eefbd5c6a157a4d2457be871690cf62c00122c911d58871be
      • Instruction Fuzzy Hash: 45317C32618A8182EF109F29E45537EB3A5FB8A7E4F414234EBAD466A5CF3CD456CB40
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: AddressHandleModuleProc
      • String ID: WilFailureNotifyWatchers$kernelbase.dll
      • API String ID: 1646373207-2571501353
      • Opcode ID: dd02d56a03716d7bd4bb2ddc32ebb5d9083958b7f8cde4969446a7115ce2f2df
      • Instruction ID: 5be6a91fcb99e859e5679ebac21fe67e0b7fc6dba71f583da5167015c3b7b915
      • Opcode Fuzzy Hash: dd02d56a03716d7bd4bb2ddc32ebb5d9083958b7f8cde4969446a7115ce2f2df
      • Instruction Fuzzy Hash: B5316E32A15B82CAEB148F6CE8402783BB0FB09BA8F14453ADB5D567A4EF3DD542C750
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
        • Part of subcall function 00007FF8B90DA964: _o_malloc.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF8B90A5206), ref: 00007FF8B90DA97E
        • Part of subcall function 00007FF8B90C7BC8: memmove.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00007FF8B90C7C3C
      • _o____lc_collate_cp_func.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00007FF8B90C8A18
      • _o____lc_locale_name_func.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00007FF8B90C8A21
      • _o__wcsdup.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00007FF8B90C8A34
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: _o____lc_collate_cp_func_o____lc_locale_name_func_o__wcsdup_o_mallocmemmove
      • String ID: <R8T\>
      • API String ID: 2380443564-166503183
      • Opcode ID: 0825b1897f2ee1efbd3272f5784334fa37e7616f552d7f98679e67a8b27b41dd
      • Instruction ID: 5c3f15e3f92f5eef540d78e3b41bcdb8cbd5088fcdf9e35ee1aab9c6819a1810
      • Opcode Fuzzy Hash: 0825b1897f2ee1efbd3272f5784334fa37e7616f552d7f98679e67a8b27b41dd
      • Instruction Fuzzy Hash: 57214932A19BC185EB609F29E4513A973A4FF88BA0F544231EB9D43799DF3CD586CB04
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: Event$CompleteInformationInitOnceRegister
      • String ID: <R8T\>
      • API String ID: 2817137765-166503183
      • Opcode ID: ec4fd4f5c02b28f4c277a8afaf1f71b61d185042a6bf26d6507344e1210b5b53
      • Instruction ID: 64bb1ec0e7f1c895ad5f246db7b6fe6143df843d654baf2faf6a9fa645b698ea
      • Opcode Fuzzy Hash: ec4fd4f5c02b28f4c277a8afaf1f71b61d185042a6bf26d6507344e1210b5b53
      • Instruction Fuzzy Hash: AB312B32618B85C2EB10CF1AE44476AB770F789B88F458125DB8D47764CF7DE596C780
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: AddressHandleModuleProc
      • String ID: RaiseFailFastException$kernelbase.dll
      • API String ID: 1646373207-919018592
      • Opcode ID: 48b0d7a03540f3a81ec09838d5db06fcf5371ee78e718fc7455614cd157cb832
      • Instruction ID: 7805c9c33fcff2121bb3d83e52fe528d756bcf091f4fb338cea510ce910199de
      • Opcode Fuzzy Hash: 48b0d7a03540f3a81ec09838d5db06fcf5371ee78e718fc7455614cd157cb832
      • Instruction Fuzzy Hash: 57018F32A1CB9582EB058F09F844179AA61FB89FD0F449034DB5D07B59CF3CD492C740
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      • An error occurrred during the read of OneSettings data, xrefs: 00007FF8B90B7AC1
      • You exceeded the maximum number of reads of %d. Something is probably wrong creating a read loop or data in OneSettings too large, xrefs: 00007FF8B90B7AAD
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: AvailableDataErrorHttpLastQuery
      • String ID: An error occurrred during the read of OneSettings data$You exceeded the maximum number of reads of %d. Something is probably wrong creating a read loop or data in OneSettings too large
      • API String ID: 1192986902-239644557
      • Opcode ID: 10be93a0c235c0f56e7f860a75abee7ecf55f1634a4939b187651656ea2c1d42
      • Instruction ID: d16f280b27d03b1a2698ca0efac07bd7290ae8924a7d1a3136c71bd1a9bb36ee
      • Opcode Fuzzy Hash: 10be93a0c235c0f56e7f860a75abee7ecf55f1634a4939b187651656ea2c1d42
      • Instruction Fuzzy Hash: 4C113D66A08AC286EE609F2CA4403BDA691FF857D4F404136CF5D87A95EF2CE5479B10
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: FeaturePresentProcessor__raise_securityfailurecapture_previous_context
      • String ID: <R8T\>
      • API String ID: 838830666-166503183
      • Opcode ID: f0434bd9ffb251c13072d50b72474ff598cfa85680f166cd4502be87cde35ac8
      • Instruction ID: 916bf4cc9a8b175fa1a0f91213d9b0e3615475dde2fdd886084185a2e0b218d7
      • Opcode Fuzzy Hash: f0434bd9ffb251c13072d50b72474ff598cfa85680f166cd4502be87cde35ac8
      • Instruction Fuzzy Hash: 5A21F435A18B8682FA50AF1CE85136577A8FF84784F900175DB8D423B1DF7EE446A708
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • GetSystemTime.API-MS-WIN-CORE-SYSINFO-L1-1-0(?,?,?,?,?,?,00000000,00007FF8B90D7AB2), ref: 00007FF8B90D6C0D
      • SystemTimeToFileTime.API-MS-WIN-CORE-TIMEZONE-L1-1-0(?,?,?,?,?,?,00000000,00007FF8B90D7AB2), ref: 00007FF8B90D6C21
      • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,?,?,?,00000000,00007FF8B90D7AB2), ref: 00007FF8B90D6C31
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: Time$System$ErrorFileLast
      • String ID: <R8T\>
      • API String ID: 2409880431-166503183
      • Opcode ID: 4d665eefd79064a02bc95518bb1b64e383cc140c213eed9ce29ccbd709beae7b
      • Instruction ID: 40e462c3d15e614f51c699d1a2bf285f6cbf966a04c191345f448aa4672ad6b2
      • Opcode Fuzzy Hash: 4d665eefd79064a02bc95518bb1b64e383cc140c213eed9ce29ccbd709beae7b
      • Instruction Fuzzy Hash: 13016121B18BC287EF609F69A85417DA6A4FF89BD4F815134EF4F87251DF2CE8068704
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: AddressHandleModuleProc
      • String ID: RtlDisownModuleHeapAllocation$ntdll.dll
      • API String ID: 1646373207-704576883
      • Opcode ID: c4f00ad1a4214be4e5c10069cb0d44da68a764da3fae40c58d91536c59292430
      • Instruction ID: ae04ffa88c25309aba4076407e8a584ce939902bb818cea7082686e66b33eb10
      • Opcode Fuzzy Hash: c4f00ad1a4214be4e5c10069cb0d44da68a764da3fae40c58d91536c59292430
      • Instruction Fuzzy Hash: 34011B21B09F8286EE208F0DB98412567A0FB49BE0B954235DB6D577E8EF3DD8128700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: FeaturePresentProcessor__raise_securityfailurecapture_previous_context
      • String ID: <R8T\>
      • API String ID: 838830666-166503183
      • Opcode ID: 4697effefcdcb4e22e330676bc4115d48434dc9cdce3c9e52dfb504b8aebff78
      • Instruction ID: 784d2cec8f7abb4ad099e4c56ba1d29613526e27e652540b731d8999a8de955a
      • Opcode Fuzzy Hash: 4697effefcdcb4e22e330676bc4115d48434dc9cdce3c9e52dfb504b8aebff78
      • Instruction Fuzzy Hash: F911D475A19B8286EB009F1DE8413647BA4FB88784F900179DB8D423B1DF7EE446E708
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • GetSystemWindowsDirectoryW.API-MS-WIN-CORE-SYSINFO-L1-1-0 ref: 00007FF8B90BD74A
        • Part of subcall function 00007FF8B90A7C3C: memmove.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00007FF8B90A7C96
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: DirectorySystemWindowsmemmove
      • String ID: <R8T\>$\System32\cmd.exe /c$rmdir /q /s
      • API String ID: 3290152174-947111479
      • Opcode ID: eb6b41d1aedb3d03a4b841251221c6e234aeac66a1961535b06f34037a4a7472
      • Instruction ID: 6a4d7f893ac26b285f93914d8068e3a6362e5dd1b5333cf031a434267a6f58f2
      • Opcode Fuzzy Hash: eb6b41d1aedb3d03a4b841251221c6e234aeac66a1961535b06f34037a4a7472
      • Instruction Fuzzy Hash: 10117072A08BC682EE209F1CF8443697360FB897A8F505235DAAD4B3A5DF7DD1069740
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: ErrorLast_o_free$AllocByteCharMultiStringWide
      • String ID: WQL
      • API String ID: 3108131342-1249411209
      • Opcode ID: 9b31e5402518ddb04cb7eeccc5fa48976d058d097c65f9fddba27d9d0b62a52e
      • Instruction ID: e857347a53954e0ac7848147052fb34290a674e641e35626ce586ff5e790e83d
      • Opcode Fuzzy Hash: 9b31e5402518ddb04cb7eeccc5fa48976d058d097c65f9fddba27d9d0b62a52e
      • Instruction Fuzzy Hash: B3012132A09AC1CAEF649F29A8402B96BA5FF89BC8B499035DF1E47754CF3CD142C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: AddressHandleModuleProc
      • String ID: RtlNtStatusToDosErrorNoTeb$ntdll.dll
      • API String ID: 1646373207-1321910969
      • Opcode ID: 23f23e6e061766339e3187992d1e0b82e1d1011bfa51604ac5f6153c4a0712d0
      • Instruction ID: 5167991b956d1c3fe614e7b321f2fa4d978915f3fb84a9890a9737ab7dd7eb7b
      • Opcode Fuzzy Hash: 23f23e6e061766339e3187992d1e0b82e1d1011bfa51604ac5f6153c4a0712d0
      • Instruction Fuzzy Hash: 55015E31B09B82C2EE119F1DB88013963A1FF8ABA0B554238DB6D473E4EF3CD8468340
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • std::_Xinvalid_argument.LIBCPMT ref: 00007FF8B90A43F7
        • Part of subcall function 00007FF8B90A79D4: _o___std_exception_copy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,00007FF8B90A43FC), ref: 00007FF8B90A7A24
      • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,?,?,?,?,?,00007FF8B90A689D,?,?,?,00007FF8B90A59AA), ref: 00007FF8B90A4419
      • HeapFree.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,?,?,?,?,?,00007FF8B90A689D,?,?,?,00007FF8B90A59AA), ref: 00007FF8B90A442E
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: Heap$FreeProcessXinvalid_argument_o___std_exception_copystd::_
      • String ID: string too long
      • API String ID: 74199867-2556327735
      • Opcode ID: 5f1e5eadf70ccd3e1a8bef923a8c4792ca3f93aa1bc609f081bc3bf2c14339be
      • Instruction ID: f46b385589dabab0dc0ab7c14c286e66d9ec839f940259382b292fd246fd1f91
      • Opcode Fuzzy Hash: 5f1e5eadf70ccd3e1a8bef923a8c4792ca3f93aa1bc609f081bc3bf2c14339be
      • Instruction Fuzzy Hash: B9F05822E08AC6C2EF089F6AE4452BCA6A0EF5DB84F998031DB1D06265DF3CC0968740
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: AddressHandleModuleProc
      • String ID: RtlDllShutdownInProgress$ntdll.dll
      • API String ID: 1646373207-582119455
      • Opcode ID: 36738020b99b6b5f081255cec22c9e4381c7f32c736ee306bb3c0c9f4bcb7573
      • Instruction ID: 4512562a3d4bbc04d6293afd9336af1c0c6a65e4680670eb1722ad317bb39443
      • Opcode Fuzzy Hash: 36738020b99b6b5f081255cec22c9e4381c7f32c736ee306bb3c0c9f4bcb7573
      • Instruction Fuzzy Hash: 7901F621E0AF8386EE11AF5CB89427467A0FF4A7A1B454674CAAD063E0EF3CE546C750
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: __current_exception__current_exception_context_o_terminate
      • String ID: csm
      • API String ID: 3699047729-1018135373
      • Opcode ID: 9853036b99687d1b6b1d8ad4448f3dc666cdae54adeef68b430425dfd57da932
      • Instruction ID: 526dabb2d54837f7eee84f86b05341a097f76bc85efddcbfb8f43da0c37a4577
      • Opcode Fuzzy Hash: 9853036b99687d1b6b1d8ad4448f3dc666cdae54adeef68b430425dfd57da932
      • Instruction Fuzzy Hash: 6FF0F437605B84CACB249F25E8815AC3768FB8CB88B496130FF4D87B59CF38D8918710
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • _o_realloc.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,?,00000000,00007FF8B90CAA55,?,?,?,00007FF8B90C9ED3,?,?,?,00007FF8B90C90A2,?,?,?,00007FF8B90C84C2), ref: 00007FF8B90CD297
      • _o_realloc.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,?,00000000,00007FF8B90CAA55,?,?,?,00007FF8B90C9ED3,?,?,?,00007FF8B90C90A2,?,?,?,00007FF8B90C84C2), ref: 00007FF8B90CD2D4
        • Part of subcall function 00007FF8B90DA964: _o_malloc.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF8B90A5206), ref: 00007FF8B90DA97E
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: _o_realloc$_o_malloc
      • String ID:
      • API String ID: 1680012282-0
      • Opcode ID: 239fd83e7e6977e74ba87cf78e765823f3c7092b5bebe0ff0cb0c423d88d358f
      • Instruction ID: 3a55f355cd4fe12728f653bf5322a7ac77870cf55efdac321e8d1ddd3d9e4217
      • Opcode Fuzzy Hash: 239fd83e7e6977e74ba87cf78e765823f3c7092b5bebe0ff0cb0c423d88d358f
      • Instruction Fuzzy Hash: 28515B72A08A82C6DB109F29D44026CB7B1FB99FC8B1A8535DB8D47359DF38D886C760
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • memmove.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?,?,?,?,?,00007FF8B90C3068), ref: 00007FF8B90C2CE3
      • _o__invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?,?,?,?,?,00007FF8B90C3068), ref: 00007FF8B90C2D20
      • memmove.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?,?,?,?,?,00007FF8B90C3068), ref: 00007FF8B90C2D30
      • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF8B90C2D6A
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: memmove$Concurrency::cancel_current_task_o__invalid_parameter_noinfo_noreturn
      • String ID:
      • API String ID: 3650786708-0
      • Opcode ID: 548607bdb5c73f0fb2f3688e02ea53de7f2e1a795068d3928a363adba0cfbc98
      • Instruction ID: b33eae8e5a8ff2f940f13291a5511d157f451c4db2353ef187261347ce3f36c6
      • Opcode Fuzzy Hash: 548607bdb5c73f0fb2f3688e02ea53de7f2e1a795068d3928a363adba0cfbc98
      • Instruction Fuzzy Hash: 70417D22B08BC585EE249F2ED584268A761EB54FE0F544635DF6D07BE9DE7CE056C300
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • memset.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF8B90CBAE9
      • memmove.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00007FF8B90CBB12
        • Part of subcall function 00007FF8B90DA964: _o_malloc.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF8B90A5206), ref: 00007FF8B90DA97E
      • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF8B90CBB8A
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: Concurrency::cancel_current_task_o_mallocmemmovememset
      • String ID:
      • API String ID: 2869879056-0
      • Opcode ID: 44dcbd2bf1bdc2480629207ff455dcc7192daa265701c2e9434801277521417d
      • Instruction ID: 6c5a6f297da906cbb2888482e48d0d4e046a95cd1d375c809f6ea2584d85138d
      • Opcode Fuzzy Hash: 44dcbd2bf1bdc2480629207ff455dcc7192daa265701c2e9434801277521417d
      • Instruction Fuzzy Hash: D2416D72609AC585EE208F6DE544279B3A5AB44BE0F648635DBAD076D8DF7DE086C300
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • memset.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF8B90CB768
      • memmove.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00007FF8B90CB77A
        • Part of subcall function 00007FF8B90DA964: _o_malloc.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF8B90A5206), ref: 00007FF8B90DA97E
      • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF8B90CB7EF
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: Concurrency::cancel_current_task_o_mallocmemmovememset
      • String ID:
      • API String ID: 2869879056-0
      • Opcode ID: 37923e9d0e92fc72309d0d725d9659dc8218e37a062d859badf740fb1d491d05
      • Instruction ID: efb2538da03d3c6479baa5c4129383ed940d0756bcc0f060c5bbf51f7292cc36
      • Opcode Fuzzy Hash: 37923e9d0e92fc72309d0d725d9659dc8218e37a062d859badf740fb1d491d05
      • Instruction Fuzzy Hash: 53418C62A19AC586EE10DF69E4042B9A2A5AF44BE0F568735DF7D07BD5DE3CE0C6C300
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • memset.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF8B90CA6D8
      • memmove.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00007FF8B90CA6EA
        • Part of subcall function 00007FF8B90DA964: _o_malloc.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF8B90A5206), ref: 00007FF8B90DA97E
      • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF8B90CA75F
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: Concurrency::cancel_current_task_o_mallocmemmovememset
      • String ID:
      • API String ID: 2869879056-0
      • Opcode ID: 2cd5299a67683101504d6434dd188bddd3c1914ba7342e413931f08f7ce529b4
      • Instruction ID: bbd7e611608d85d9f8fd0a62e8b01502ef93a35554bbbf4195187925297dbb25
      • Opcode Fuzzy Hash: 2cd5299a67683101504d6434dd188bddd3c1914ba7342e413931f08f7ce529b4
      • Instruction Fuzzy Hash: 21418E62A09AC582EE10DF69A408279A265BB44BF0F168735EB7D477D5DF3CE086D300
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: QueryValuememmove$Open
      • String ID:
      • API String ID: 2438875345-0
      • Opcode ID: 3c82f0443be3401fa53748bbc9a004d59e14544e4450f2d55ae39f7528a7f4f2
      • Instruction ID: 7885a663e8fbeca374d87cbb2ea6f5d1f54e8f15b6eb1796761cf287f9025ba8
      • Opcode Fuzzy Hash: 3c82f0443be3401fa53748bbc9a004d59e14544e4450f2d55ae39f7528a7f4f2
      • Instruction Fuzzy Hash: 6541A132A04B9286EF208F6AA8445BDB3A8FB85BD8F545235EF5D47798DF38D542C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: ExclusiveLock$AcquireRelease_o_free_o_malloc
      • String ID:
      • API String ID: 1261941851-0
      • Opcode ID: f94226fcf96337c218f1af08740fbb69491019fb9e44d0aa4992e435e1f23553
      • Instruction ID: 902c135d16331a253321526843d87d01df291b7c9ac91270b4276fa32d4b27ff
      • Opcode Fuzzy Hash: f94226fcf96337c218f1af08740fbb69491019fb9e44d0aa4992e435e1f23553
      • Instruction Fuzzy Hash: E1411C32A08A8A86EE618F1AE55037AB7B4FF46BD5F184135CF4E06A54DF7CE452C740
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: CloseHandle
      • String ID: <R8T\>$wil
      • API String ID: 2962429428-2816185110
      • Opcode ID: 073c2b3813446037bf0a6ab84c3df600f9d81fb054702775a330951bacb234d2
      • Instruction ID: 4814a8aeab1549c54bc27b38efe1c44e0f552362b747a4c50f4c930cb133df1c
      • Opcode Fuzzy Hash: 073c2b3813446037bf0a6ab84c3df600f9d81fb054702775a330951bacb234d2
      • Instruction Fuzzy Hash: 46218322B099C585EE219F6AE8517BA6754FF98BE8F084031DF1D07795DE3CD486CA40
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: ErrorOriginate
      • String ID:
      • API String ID: 2737598581-0
      • Opcode ID: 4a2df442eb3c9f62fef64f86103e727118eaa01e9489e266b17e5526422a21ca
      • Instruction ID: 0cf42b3a282a9992ec274bf03452d59cabd200dba78ba942ea185c7cbb1c233f
      • Opcode Fuzzy Hash: 4a2df442eb3c9f62fef64f86103e727118eaa01e9489e266b17e5526422a21ca
      • Instruction Fuzzy Hash: FB314032B086818BE7A48F29A58052D7BB5FB59B84F58D138DB8E43755CF38E496C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • _lock_locales.API-MS-WIN-CRT-LOCALE-L1-1-0 ref: 00007FF8B90BC7AF
      • _o_setlocale.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00007FF8B90BC7F7
        • Part of subcall function 00007FF8B90C8590: _o_free.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?,00007FF8B90BC816), ref: 00007FF8B90C85B2
        • Part of subcall function 00007FF8B90C8590: _o_malloc.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?,00007FF8B90BC816), ref: 00007FF8B90C85DE
        • Part of subcall function 00007FF8B90C8590: memmove.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?,00007FF8B90BC816), ref: 00007FF8B90C85FC
      • _o_setlocale.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00007FF8B90BC81B
      • _AnonymousOriginator.LIBCPMT ref: 00007FF8B90BC852
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: _o_setlocale$AnonymousOriginator_lock_locales_o_free_o_mallocmemmove
      • String ID:
      • API String ID: 947754696-0
      • Opcode ID: 209ae9d0b0981fab76e5b5c6b590f61cb778ca71c5f6f60c6a5638a0f4c2d52b
      • Instruction ID: 9a8f291b31d701935f968ec76198653d20aca064101dc94f59f2204786482b38
      • Opcode Fuzzy Hash: 209ae9d0b0981fab76e5b5c6b590f61cb778ca71c5f6f60c6a5638a0f4c2d52b
      • Instruction Fuzzy Hash: FA216D32A08BC0C6DB14DF39A88006E7BA4EF54BA4B584638DF5D573AADF38D452D384
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: _o_free
      • String ID:
      • API String ID: 1736097121-0
      • Opcode ID: b3f499f889ab5302d6aa394115d7a40f7094cf4f3ca20a37b6dea2d75c86546e
      • Instruction ID: 6f611909a38ee46e04eb6e3cbd115ca7cb0a6bb9d1443bf066c9d26d63c17810
      • Opcode Fuzzy Hash: b3f499f889ab5302d6aa394115d7a40f7094cf4f3ca20a37b6dea2d75c86546e
      • Instruction Fuzzy Hash: 9C21F922A19A9286EE549F2AE440169A774FF89FD0B095031DF4E17759DF3CE456C340
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: _o_free$ClassCriticalDeleteSectionUnregister
      • String ID:
      • API String ID: 1622828243-0
      • Opcode ID: afe617481fe16231772215873f42189302662947aeee13b0e922aed6eb10f7ed
      • Instruction ID: 7be9e4c56b75b5656a22044180b502f5abffd3d6769fbebc6258ee2df6c5a7bf
      • Opcode Fuzzy Hash: afe617481fe16231772215873f42189302662947aeee13b0e922aed6eb10f7ed
      • Instruction Fuzzy Hash: 8E213732A19A91CBEF658F2DD05033977A8FF44FAAF040135DF4A06649CF3DE8828640
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • CoTaskMemFree.API-MS-WIN-CORE-COM-L1-1-0(?,?,?,00007FF8B90AE0B9), ref: 00007FF8B90B4FCE
      • CoTaskMemAlloc.API-MS-WIN-CORE-COM-L1-1-0(?,?,?,00007FF8B90AE0B9), ref: 00007FF8B90B5003
      • SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,00007FF8B90AE0B9), ref: 00007FF8B90B501A
      • memmove.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?,00007FF8B90AE0B9), ref: 00007FF8B90B5031
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: Task$AllocErrorFreeLastmemmove
      • String ID:
      • API String ID: 1128961148-0
      • Opcode ID: b1fdb163380ecd7086ff839434e7000497e65d76e2022ca084718f8aa88cb093
      • Instruction ID: 56d2bcf5b6627d953e83b29571249500cb58db662b1e90d5cd03308d414b8cf5
      • Opcode Fuzzy Hash: b1fdb163380ecd7086ff839434e7000497e65d76e2022ca084718f8aa88cb093
      • Instruction Fuzzy Hash: 32114C31A18F81C6EE509F29E504168B7B0EB8AFE0B548631DB6D037A8EF38E4538740
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: Heap$FreeProcess
      • String ID: CV not initialized$Error, CV not initialized
      • API String ID: 3859560861-3195384115
      • Opcode ID: 3ebd92364c447de88cc8f194b956bec61be7b576bc2fcb4237ae139af5b1d56a
      • Instruction ID: 70e06e1c7e5c7a82115ccaa3299d759e6c9bf1ee784c47e4db8d20db96cb938d
      • Opcode Fuzzy Hash: 3ebd92364c447de88cc8f194b956bec61be7b576bc2fcb4237ae139af5b1d56a
      • Instruction Fuzzy Hash: A5F03726E09AC286FA048F5AA400178ABA1FF89BD0F889175DF5D17765CF7CE4428700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: _o_ceilf
      • String ID: invalid hash bucket count
      • API String ID: 2448925416-1101463472
      • Opcode ID: bd11af1fb1bf33bb6aebf3af85a8b4b2a39f472f1900caa50acdc69cf32b1713
      • Instruction ID: 4ce04e212bff11cc6bae036a468a85cad96c3c188dbc9b648a6abf0c52d369d0
      • Opcode Fuzzy Hash: bd11af1fb1bf33bb6aebf3af85a8b4b2a39f472f1900caa50acdc69cf32b1713
      • Instruction Fuzzy Hash: 8791BC33A19FC981EE508F1AE0846A877B5FB06BC4F558532DB8D57398EE39D892C740
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: _o_ceilf
      • String ID: invalid hash bucket count
      • API String ID: 2448925416-1101463472
      • Opcode ID: a2275005a3b6490572ed00946311169964fbbd6863175c1acd58e317129b11d3
      • Instruction ID: e72cfebb5fadf53cda7cd606c90c416d6acd5bfa4a48afee7779a11b6b5fed27
      • Opcode Fuzzy Hash: a2275005a3b6490572ed00946311169964fbbd6863175c1acd58e317129b11d3
      • Instruction Fuzzy Hash: A661C032A15B8882DE50CF1AE04066C73A9FB58BD0F19C632DB9D537A5DF39E4A2C740
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • std::_Xinvalid_argument.LIBCPMT ref: 00007FF8B90B12FD
        • Part of subcall function 00007FF8B90DA964: _o_malloc.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF8B90A5206), ref: 00007FF8B90DA97E
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: Xinvalid_argument_o_mallocstd::_
      • String ID: QUASELFUPDATE.PAYLOADHASH$unordered_map/set too long
      • API String ID: 2431768481-1654667133
      • Opcode ID: 7561b70b8b71672c2b99ae786077bd311eb0dd24252ebc358ebb4935fa9be41e
      • Instruction ID: 4904a322fbb9f26454da2183c2741538cceb8eb260353af3154ae531f1db6643
      • Opcode Fuzzy Hash: 7561b70b8b71672c2b99ae786077bd311eb0dd24252ebc358ebb4935fa9be41e
      • Instruction Fuzzy Hash: 7F51DE22618F8581EE648F5AE4402BDA361FB49BE4F58C631DF9E57781DF38E1A28700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: _o_ceilf
      • String ID: invalid hash bucket count
      • API String ID: 2448925416-1101463472
      • Opcode ID: a88dccf2e7e3e2b400e4f4cc6911b2d9296d144dd28cb9fb98d9f86c65c9a1f7
      • Instruction ID: f91b84f2f45f71e6f1024c83ed5ddc941cc3be3d4b8fd7b8f8a15c941dda2cd6
      • Opcode Fuzzy Hash: a88dccf2e7e3e2b400e4f4cc6911b2d9296d144dd28cb9fb98d9f86c65c9a1f7
      • Instruction Fuzzy Hash: 8451C072A19BC981EA508F1AE45062877A9FB44BC0F15C632DF9D473A4DF7DE4A2C700
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: _o_ceilf
      • String ID: invalid hash bucket count
      • API String ID: 2448925416-1101463472
      • Opcode ID: f0f261741e8e3f633cb53a08d7fd96755a18b27827fe8261f17298cf8c9b8916
      • Instruction ID: b7708e4680ee62217f1764dd3d802aaeefea1dd2fcb6b415ad7b10e4194ac143
      • Opcode Fuzzy Hash: f0f261741e8e3f633cb53a08d7fd96755a18b27827fe8261f17298cf8c9b8916
      • Instruction Fuzzy Hash: 78518E32A19BC9D1DA508F1AE45066873A8FB58BC0F158632DF9E573A4DF7DE4A2C700
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID:
      • String ID: <R8T\>
      • API String ID: 0-166503183
      • Opcode ID: c537b5af4f2b848449880f3763eb8c8dcf5a8f2e4fbdb164741fe235a71e62b6
      • Instruction ID: dbcc199c1df855d59848d685365e911c298cde4f359f8ddfc036c5828476ebd3
      • Opcode Fuzzy Hash: c537b5af4f2b848449880f3763eb8c8dcf5a8f2e4fbdb164741fe235a71e62b6
      • Instruction Fuzzy Hash: 5F515676609A8589DF108F6DD4802A837B4FB58F88F958032EF4D57B98DF39D55AC310
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: Module$FileHandleName
      • String ID: <R8T\>
      • API String ID: 4146042529-166503183
      • Opcode ID: 1d74754be6d7864b256b522b2f6ca4d1b847b00e6bf8a4224db3a85c48786e2e
      • Instruction ID: 0efb7d18abe136a205a463deddafd854f3d85139ebe25947510ce1f8d574a29a
      • Opcode Fuzzy Hash: 1d74754be6d7864b256b522b2f6ca4d1b847b00e6bf8a4224db3a85c48786e2e
      • Instruction Fuzzy Hash: 1131B622B1CAC986FFA14F28D5103B966D0AF59BE4F588634DBAE477C4DE2CD4068780
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: CreateUuidmemset
      • String ID: <R8T\>
      • API String ID: 4176883543-166503183
      • Opcode ID: 55e48c87016a0a2ec42eda2150d22ea8ebfbfabec1ec7fd6b31f85fbc512d713
      • Instruction ID: 5225f24d02048d4231db7ceb930bcd04c92a2506a820141b7c7edea4093bede5
      • Opcode Fuzzy Hash: 55e48c87016a0a2ec42eda2150d22ea8ebfbfabec1ec7fd6b31f85fbc512d713
      • Instruction Fuzzy Hash: 372128236287C486EB12CF39A0213A97BA0FB59788F499135EBDD47347DA2DC246D701
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID:
      • String ID: %hs$<R8T\>
      • API String ID: 0-205916686
      • Opcode ID: 28db819cdef7698956cd308d232d814c31858a6c8a25a858edd09ac01500971b
      • Instruction ID: ffb91b1ebdcfe4f4a5e5b255b12f3c392b37496c114d34f73238d4503d52b8f5
      • Opcode Fuzzy Hash: 28db819cdef7698956cd308d232d814c31858a6c8a25a858edd09ac01500971b
      • Instruction Fuzzy Hash: 2E219822A18BC181EA209F59E8452EAA395FF887E4F404431EF8D4375AEE7CD546CB00
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      • onecore\enduser\upgradeenablers\shellhelpers\servicehelpers.cpp, xrefs: 00007FF8B90C8202
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: CertCertificateChainPolicyVerify
      • String ID: onecore\enduser\upgradeenablers\shellhelpers\servicehelpers.cpp
      • API String ID: 3930008701-3969904018
      • Opcode ID: ccc5b86f20c655b472516b9b91fbd7f042b519264754cd84702be2df5abce69a
      • Instruction ID: 25874430ff43330d8db1d9a17c336b911a3576657b6b1d39d21272d278e3abb1
      • Opcode Fuzzy Hash: ccc5b86f20c655b472516b9b91fbd7f042b519264754cd84702be2df5abce69a
      • Instruction Fuzzy Hash: 0C112732E18A819AFB008FA9D8087FD36B0B748788F448135DE1D66A84CF7CD18ACB54
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      • onecore\enduser\upgradeenablers\shellhelpers\downloadhelper.cpp, xrefs: 00007FF8B90CE46A
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: CertCertificateChainPolicyVerify
      • String ID: onecore\enduser\upgradeenablers\shellhelpers\downloadhelper.cpp
      • API String ID: 3930008701-2476025138
      • Opcode ID: 15584d6c4cc5adcf99acbc999223179607b2f07b92d174775c3c6b39d4da1f52
      • Instruction ID: a77df9c6ca4ef3c8e5d56a7eb63f0bcaf10ec4c70af2cb6d01158ea702600532
      • Opcode Fuzzy Hash: 15584d6c4cc5adcf99acbc999223179607b2f07b92d174775c3c6b39d4da1f52
      • Instruction Fuzzy Hash: 76114D72E14A91DAFB408FA9D8047FD36B0EB58788F448136DB0C56685CF7CD59ACB50
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: CloseOpen
      • String ID: Software\Microsoft\Windows NT\CurrentVersion\
      • API String ID: 47109696-2478582313
      • Opcode ID: ffd1f0453dceb5179975022c6b5f610b026f2c7b3bc3a67bef84d6cd0ab69745
      • Instruction ID: 40f0d2b8d0499805e98f8714458be2af087fc2bacda628b739c9a76f53c30dae
      • Opcode Fuzzy Hash: ffd1f0453dceb5179975022c6b5f610b026f2c7b3bc3a67bef84d6cd0ab69745
      • Instruction Fuzzy Hash: 19018032B18B8186EB105F68E88477A67A4FB457E0F114234DB6D4A2E0DF7DD8468750
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: CloseOpen
      • String ID: SOFTWARE\Microsoft\Reliability Analysis\RAC
      • API String ID: 47109696-2447572515
      • Opcode ID: 2620e167d420050e8de32f7f970895538793343385c0000cc33cd60a482aaf08
      • Instruction ID: 53fd720fc19d212fdf2e1b2c47faa162146fb4ce15e0a3964979bf3f70e57abd
      • Opcode Fuzzy Hash: 2620e167d420050e8de32f7f970895538793343385c0000cc33cd60a482aaf08
      • Instruction Fuzzy Hash: B3017C62B18F4286EB009F6CA4847B976E4FB89BC0F514534DB5D46651DF3DD80AC790
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      • Software\Microsoft\CUAssistant\LocalState\TelemetryCUAssistant, xrefs: 00007FF8B90B04D7
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: CloseOpen
      • String ID: Software\Microsoft\CUAssistant\LocalState\TelemetryCUAssistant
      • API String ID: 47109696-929217711
      • Opcode ID: 2e97eb5a3f060f73cb09c0755400eb0f45ac822caf99bb3d31a8e220ceb98339
      • Instruction ID: 3d5ecdbd79c7d153f67d1adf4c41dceb10d90720941559d6056a4143d57bd40b
      • Opcode Fuzzy Hash: 2e97eb5a3f060f73cb09c0755400eb0f45ac822caf99bb3d31a8e220ceb98339
      • Instruction Fuzzy Hash: C9017C26B18B4186EB005F2CA48477966A8FB4A7C0F904538DB5D46654DF3DD80A8750
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: FormatHandleMessageModule
      • String ID: ntdll.dll
      • API String ID: 2046974992-2227199552
      • Opcode ID: f43bc424b01ba23eec5cb12d0fb746df47a8d15630f98fb18ab3a879ea56b3f7
      • Instruction ID: a6c74bb41d1a6ad62137635374ff8b405b70f3ab3f4a4d825c5535fcdfd9abd7
      • Opcode Fuzzy Hash: f43bc424b01ba23eec5cb12d0fb746df47a8d15630f98fb18ab3a879ea56b3f7
      • Instruction Fuzzy Hash: 0E014B32A19B8182EB108F09F44422ABBA0FB8DBD4F444135EB9D47B68DF3CD441CB40
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • std::_Xinvalid_argument.LIBCPMT ref: 00007FF8B90B4F7B
        • Part of subcall function 00007FF8B90A79D4: _o___std_exception_copy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,00007FF8B90A43FC), ref: 00007FF8B90A7A24
      • WindowsDeleteString.API-MS-WIN-CORE-WINRT-STRING-L1-1-0 ref: 00007FF8B90B4F94
      Strings
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: DeleteStringWindowsXinvalid_argument_o___std_exception_copystd::_
      • String ID: map/set too long
      • API String ID: 3567328154-558153379
      • Opcode ID: effb44d6a16cd165b1ba4d67c7686a2c61ab31529c062e12bf6acbba2d446d24
      • Instruction ID: 646eaea6dd0e62f95275ccae3e24f7c4b3ddac2b166d8abae22423eae81058ad
      • Opcode Fuzzy Hash: effb44d6a16cd165b1ba4d67c7686a2c61ab31529c062e12bf6acbba2d446d24
      • Instruction Fuzzy Hash: FAD0C714E0A881C6ED08AF2DA8950747670EFD5B45FE44471C71E11651CE2CE5574B00
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • memmove.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,00007FF8B90A47C6), ref: 00007FF8B90BB39B
      • memmove.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,00007FF8B90A47C6), ref: 00007FF8B90BB3E6
      • memmove.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,00007FF8B90A47C6), ref: 00007FF8B90BB461
      • memmove.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,00007FF8B90A47C6), ref: 00007FF8B90BB47F
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: memmove
      • String ID:
      • API String ID: 2162964266-0
      • Opcode ID: 622aea0d660d843a422d57e4386fd257a25fab72b5aaddf6747445b7fabb291a
      • Instruction ID: 03bcb120a3f13fc552ab96d8c226ba49fbf348c19897799603db413e3c1a0675
      • Opcode Fuzzy Hash: 622aea0d660d843a422d57e4386fd257a25fab72b5aaddf6747445b7fabb291a
      • Instruction Fuzzy Hash: EC414B32A04F85C2EA14DF29EA442A973A1FB58BC8F148536DF9C47755DF78E196C380
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FF8B90A5F85,?,?,?,?,?,?,?,?,00007FF8B90A5206), ref: 00007FF8B90A37A6
      • HeapFree.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FF8B90A5F85,?,?,?,?,?,?,?,?,00007FF8B90A5206), ref: 00007FF8B90A37BA
      • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FF8B90A5F85,?,?,?,?,?,?,?,?,00007FF8B90A5206), ref: 00007FF8B90A37DE
      • HeapFree.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FF8B90A5F85,?,?,?,?,?,?,?,?,00007FF8B90A5206), ref: 00007FF8B90A37F2
      Memory Dump Source
      • Source File: 00000003.00000002.2121916839.00007FF8B9091000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8B9090000, based on PE: true
      • Associated: 00000003.00000002.2121898573.00007FF8B9090000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2121978864.00007FF8B90DF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122022501.00007FF8B9103000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000003.00000002.2122045427.00007FF8B9106000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_3_2_7ff8b9090000_rundll32.jbxd
      Similarity
      • API ID: Heap$FreeProcess
      • String ID:
      • API String ID: 3859560861-0
      • Opcode ID: 3c0e10131fee875adaa4b7d46031d946e28834f3777f126ab169851cc8cf5155
      • Instruction ID: 730c2df4ab15abf076080096c00ab4d629df6f8e6cb6ff933619cec183bb918c
      • Opcode Fuzzy Hash: 3c0e10131fee875adaa4b7d46031d946e28834f3777f126ab169851cc8cf5155
      • Instruction Fuzzy Hash: 90110A72A04B81C6EB148F56E5400ACBBB1F789FC0B599125DB8D23B14CF38E4A6C744
      Uniqueness

      Uniqueness Score: -1.00%