Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
x64.dll

Overview

General Information

Sample Name:x64.dll
Analysis ID:608207
MD5:66ac9a127ebb19f915987c31cf67d8d3
SHA1:b90e008f65d129cd9ade9aa24a9e046d727ff3f6
SHA256:94c0cedd61450d24b1195538edcd623b734749553680a42b5b64bc6194c2126a
Tags:64exe
Infos:

Detection

Dridex
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected Dridex unpacked file
Multi AV Scanner detection for submitted file
Benign windows process drops PE files
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Changes memory attributes in foreign processes to executable or writable
Machine Learning detection for sample
Modifies the prolog of user mode functions (user mode inline hooks)
Queues an APC in another process (thread injection)
Sigma detected: Suspicious Call by Ordinal
Drops executables to the windows directory (C:\Windows) and starts them
Uses schtasks.exe or at.exe to add and modify task schedules
Uses Atom Bombing / ProGate to inject into other processes
Queries the volume information (name, serial number etc) of a device
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Uses code obfuscation techniques (call, push, ret)
Creates files inside the system directory
PE file contains sections with non-standard names
Queries the installation date of Windows
Detected potential crypto function
Found potential string decryption / allocating functions
Contains functionality to launch a process as a different user
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to call native functions
Found dropped PE file which has not been started or loaded
Uses the system / local time for branch decision (may execute only at specific dates)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Entry point lies outside standard sections
PE file contains an invalid checksum
PE file contains strange resources
Drops PE files
Tries to load missing DLLs
Drops PE files to the windows directory (C:\Windows)
Found evasive API chain checking for process token information
Binary contains a suspicious time stamp
PE file contains more sections than normal
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Dropped file seen in connection with other malware
Found large amount of non-executed APIs
Uses Microsoft's Enhanced Cryptographic Provider
Creates a process in suspended mode (likely to inject code)
Sigma detected: Autorun Keys Modification
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

  • System is w10x64
  • loaddll64.exe (PID: 7108 cmdline: loaddll64.exe "C:\Users\user\Desktop\x64.dll" MD5: 4E8A40CAD6CCC047914E3A7830A2D8AA)
    • cmd.exe (PID: 7144 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\x64.dll",#1 MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
      • rundll32.exe (PID: 7164 cmdline: rundll32.exe "C:\Users\user\Desktop\x64.dll",#1 MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 7152 cmdline: rundll32.exe C:\Users\user\Desktop\x64.dll,IsInteractiveUserSession MD5: 73C519F050C20580F8A62C849D49215A)
      • explorer.exe (PID: 684 cmdline: C:\Windows\Explorer.EXE MD5: AD5296B280E8F522A8A897C96BAB0E1D)
        • wermgr.exe (PID: 4784 cmdline: C:\Windows\system32\wermgr.exe MD5: FF214585BF10206E21EA8EBA202FACFD)
        • cmd.exe (PID: 7136 cmdline: "C:\Windows\system32\cmd.exe" /c C:\Users\user\AppData\Local\Temp\Cjaq.cmd MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
          • conhost.exe (PID: 2928 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
        • wermgr.exe (PID: 4176 cmdline: "C:\Users\user\AppData\Roaming\R3POs\wermgr.exe" MD5: FF214585BF10206E21EA8EBA202FACFD)
        • MDMAppInstaller.exe (PID: 2812 cmdline: C:\Windows\system32\MDMAppInstaller.exe MD5: E2C777B6E3CE4C15C5657429A63787A3)
        • cmd.exe (PID: 5144 cmdline: "C:\Windows\system32\cmd.exe" /c C:\Users\user\AppData\Local\Temp\tkcfGo.cmd MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
          • conhost.exe (PID: 4212 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
        • wermgr.exe (PID: 5388 cmdline: "C:\Users\user\AppData\Roaming\R3POs\wermgr.exe" MD5: FF214585BF10206E21EA8EBA202FACFD)
        • schtasks.exe (PID: 4452 cmdline: "C:\Windows\System32\schtasks.exe" /Create /F /TN "Jvadjthzpd" /TR C:\Windows\system32\CCAL\MDMAppInstaller.exe /SC minute /MO 60 /RL highest MD5: 838D346D1D28F00783B7A6C6BD03A0DA)
          • conhost.exe (PID: 5560 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
        • wermgr.exe (PID: 4164 cmdline: "C:\Users\user\AppData\Roaming\R3POs\wermgr.exe" MD5: FF214585BF10206E21EA8EBA202FACFD)
        • schtasks.exe (PID: 5080 cmdline: schtasks.exe /Query /TN "Jvadjthzpd" MD5: 838D346D1D28F00783B7A6C6BD03A0DA)
          • conhost.exe (PID: 4788 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
        • schtasks.exe (PID: 5500 cmdline: schtasks.exe /Query /TN "Jvadjthzpd" MD5: 838D346D1D28F00783B7A6C6BD03A0DA)
          • conhost.exe (PID: 3464 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
        • schtasks.exe (PID: 5744 cmdline: schtasks.exe /Query /TN "Jvadjthzpd" MD5: 838D346D1D28F00783B7A6C6BD03A0DA)
          • conhost.exe (PID: 3488 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
        • schtasks.exe (PID: 7092 cmdline: schtasks.exe /Query /TN "Jvadjthzpd" MD5: 838D346D1D28F00783B7A6C6BD03A0DA)
          • conhost.exe (PID: 6756 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
        • schtasks.exe (PID: 6344 cmdline: schtasks.exe /Query /TN "Jvadjthzpd" MD5: 838D346D1D28F00783B7A6C6BD03A0DA)
          • conhost.exe (PID: 5188 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
        • schtasks.exe (PID: 384 cmdline: schtasks.exe /Query /TN "Jvadjthzpd" MD5: 838D346D1D28F00783B7A6C6BD03A0DA)
          • conhost.exe (PID: 3012 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
        • schtasks.exe (PID: 5228 cmdline: schtasks.exe /Query /TN "Jvadjthzpd" MD5: 838D346D1D28F00783B7A6C6BD03A0DA)
          • conhost.exe (PID: 5220 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • rundll32.exe (PID: 5980 cmdline: rundll32.exe C:\Users\user\Desktop\x64.dll,QueryActiveSession MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 5888 cmdline: rundll32.exe C:\Users\user\Desktop\x64.dll,QueryUserToken MD5: 73C519F050C20580F8A62C849D49215A)
  • MDMAppInstaller.exe (PID: 5232 cmdline: C:\Windows\system32\CCAL\MDMAppInstaller.exe MD5: E2C777B6E3CE4C15C5657429A63787A3)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000021.00000002.611146050.0000000140001000.00000020.00000001.01000000.0000000C.sdmpJoeSecurity_Dridex_2Yara detected Dridex unpacked fileJoe Security
    00000006.00000002.421971716.0000000140001000.00000020.00000001.01000000.00000003.sdmpJoeSecurity_Dridex_2Yara detected Dridex unpacked fileJoe Security
      0000001F.00000002.604615787.0000000140001000.00000020.00000001.01000000.0000000E.sdmpJoeSecurity_Dridex_2Yara detected Dridex unpacked fileJoe Security
        00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmpJoeSecurity_Dridex_2Yara detected Dridex unpacked fileJoe Security
          00000018.00000002.622884365.0000000140001000.00000020.00000001.01000000.0000000C.sdmpJoeSecurity_Dridex_2Yara detected Dridex unpacked fileJoe Security
            Click to see the 4 entries
            SourceRuleDescriptionAuthorStrings
            3.2.rundll32.exe.140000000.0.unpackJoeSecurity_Dridex_2Yara detected Dridex unpacked fileJoe Security
              31.2.MDMAppInstaller.exe.140000000.0.unpackJoeSecurity_Dridex_2Yara detected Dridex unpacked fileJoe Security
                4.2.rundll32.exe.140000000.0.unpackJoeSecurity_Dridex_2Yara detected Dridex unpacked fileJoe Security
                  33.2.wermgr.exe.140000000.0.unpackJoeSecurity_Dridex_2Yara detected Dridex unpacked fileJoe Security
                    6.2.rundll32.exe.140000000.0.unpackJoeSecurity_Dridex_2Yara detected Dridex unpacked fileJoe Security
                      Click to see the 4 entries

                      System Summary

                      barindex
                      Source: Process startedAuthor: Florian Roth: Data: Command: rundll32.exe "C:\Users\user\Desktop\x64.dll",#1, CommandLine: rundll32.exe "C:\Users\user\Desktop\x64.dll",#1, CommandLine|base64offset|contains: , Image: C:\Windows\System32\rundll32.exe, NewProcessName: C:\Windows\System32\rundll32.exe, OriginalFileName: C:\Windows\System32\rundll32.exe, ParentCommandLine: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\x64.dll",#1, ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 7144, ParentProcessName: cmd.exe, ProcessCommandLine: rundll32.exe "C:\Users\user\Desktop\x64.dll",#1, ProcessId: 7164, ProcessName: rundll32.exe
                      Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton: Data: Details: C:\Users\user\AppData\Roaming\R3POs\wermgr.exe, EventID: 13, EventType: SetValue, Image: C:\Windows\explorer.exe, ProcessId: 684, TargetObject: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\Wraljbotdtpzzk
                      Source: File createdAuthor: frack113: Data: EventID: 11, Image: C:\Windows\System32\cmd.exe, ProcessId: 7136, TargetFilename: C:\Users\user\AppData\Roaming\R3POs\wermgr.exe
                      Source: Process startedAuthor: frack113: Data: Command: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1, CommandLine: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1, CommandLine|base64offset|contains: }}, Image: C:\Windows\System32\conhost.exe, NewProcessName: C:\Windows\System32\conhost.exe, OriginalFileName: C:\Windows\System32\conhost.exe, ParentCommandLine: "C:\Windows\system32\cmd.exe" /c C:\Users\user\AppData\Local\Temp\Cjaq.cmd, ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 7136, ParentProcessName: cmd.exe, ProcessCommandLine: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1, ProcessId: 2928, ProcessName: conhost.exe
                      No Snort rule has matched

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: x64.dllVirustotal: Detection: 47%Perma Link
                      Source: x64.dllMetadefender: Detection: 37%Perma Link
                      Source: x64.dllReversingLabs: Detection: 78%
                      Source: x64.dllAvira: detected
                      Source: C:\Users\user\AppData\Local\Temp\NAmADA4.tmpAvira: detection malicious, Label: HEUR/AGEN.1207422
                      Source: C:\Users\user\AppData\Local\Temp\KHNE9A4.tmpAvira: detection malicious, Label: HEUR/AGEN.1207422
                      Source: x64.dllJoe Sandbox ML: detected
                      Source: C:\Windows\System32\CCAL\MDMAppInstaller.exeCode function: 31_2_00007FF6C524E64C EnterCriticalSection,CryptAcquireContextW,CryptAcquireContextW,GetLastError,LeaveCriticalSection,CryptReleaseContext,memset,31_2_00007FF6C524E64C
                      Source: C:\Windows\System32\CCAL\MDMAppInstaller.exeCode function: 31_2_00007FF6C524E934 CreateFileW,CryptAcquireContextW,GetLastError,CryptCreateHash,GetLastError,CryptHashData,ReadFile,GetLastError,CloseHandle,CryptDestroyHash,??_V@YAXPEAX@Z,CryptReleaseContext,??3@YAXPEAX@Z,GetLastError,CryptGetHashParam,GetLastError,memset,CryptGetHashParam,GetLastError,31_2_00007FF6C524E934
                      Source: x64.dllStatic PE information: TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
                      Source: Binary string: mdmappinstaller.pdbGCTL source: cmd.exe, 0000001A.00000003.586281277.000001E89C487000.00000004.00000020.00020000.00000000.sdmp, MDMAppInstaller.exe, 0000001F.00000002.605506931.00007FF6C5255000.00000002.00000001.01000000.0000000D.sdmp, MDMAppInstaller.exe, 0000001F.00000000.596119323.00007FF6C5255000.00000002.00000001.01000000.0000000D.sdmp, MDMAppInstaller.exe.26.dr
                      Source: Binary string: WerMgr.pdb source: cmd.exe, 00000011.00000003.547294887.0000021599D37000.00000004.00000020.00020000.00000000.sdmp, wermgr.exe, 00000018.00000002.623554275.00007FF7E4395000.00000002.00000001.01000000.0000000B.sdmp, wermgr.exe, 00000018.00000000.571165986.00007FF7E4395000.00000002.00000001.01000000.0000000B.sdmp, wermgr.exe, 0000001C.00000000.590604574.00007FF7E4395000.00000002.00000001.01000000.0000000B.sdmp, wermgr.exe, 0000001C.00000002.596149680.00007FF7E4395000.00000002.00000001.01000000.0000000B.sdmp, wermgr.exe, 00000021.00000000.608169361.00007FF7E4395000.00000002.00000001.01000000.0000000B.sdmp, wermgr.exe, 00000021.00000002.612132180.00007FF7E4395000.00000002.00000001.01000000.0000000B.sdmp, wermgr.exe.17.dr
                      Source: Binary string: sgI.pdb source: x64.dll, NAmADA4.tmp.5.dr, KHNE9A4.tmp.5.dr
                      Source: Binary string: WerMgr.pdbGCTL source: cmd.exe, 00000011.00000003.547294887.0000021599D37000.00000004.00000020.00020000.00000000.sdmp, wermgr.exe, 00000018.00000002.623554275.00007FF7E4395000.00000002.00000001.01000000.0000000B.sdmp, wermgr.exe, 00000018.00000000.571165986.00007FF7E4395000.00000002.00000001.01000000.0000000B.sdmp, wermgr.exe, 0000001C.00000000.590604574.00007FF7E4395000.00000002.00000001.01000000.0000000B.sdmp, wermgr.exe, 0000001C.00000002.596149680.00007FF7E4395000.00000002.00000001.01000000.0000000B.sdmp, wermgr.exe, 00000021.00000000.608169361.00007FF7E4395000.00000002.00000001.01000000.0000000B.sdmp, wermgr.exe, 00000021.00000002.612132180.00007FF7E4395000.00000002.00000001.01000000.0000000B.sdmp, wermgr.exe.17.dr
                      Source: Binary string: mdmappinstaller.pdb source: cmd.exe, 0000001A.00000003.586281277.000001E89C487000.00000004.00000020.00020000.00000000.sdmp, MDMAppInstaller.exe, 0000001F.00000002.605506931.00007FF6C5255000.00000002.00000001.01000000.0000000D.sdmp, MDMAppInstaller.exe, 0000001F.00000000.596119323.00007FF6C5255000.00000002.00000001.01000000.0000000D.sdmp, MDMAppInstaller.exe.26.dr
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140049724 FindFirstFileExW,1_2_0000000140049724
                      Source: C:\Users\user\AppData\Roaming\R3POs\wermgr.exeCode function: 24_2_00007FF7E4391BA0 FindFirstFileExW,_wcsicmp,_wcsicmp,FindNextFileW,GetLastError,GetLastError,FindClose,24_2_00007FF7E4391BA0
                      Source: C:\Users\user\AppData\Roaming\R3POs\wermgr.exeCode function: 24_2_00007FF7E438BE54 GetFileAttributesW,GetLastError,FindFirstFileW,GetLastError,CompareStringW,FindNextFileW,FindClose,FindClose,24_2_00007FF7E438BE54
                      Source: C:\Users\user\AppData\Roaming\R3POs\wermgr.exeCode function: 28_2_00007FF7E4391BA0 FindFirstFileExW,_wcsicmp,_wcsicmp,FindNextFileW,GetLastError,GetLastError,FindClose,28_2_00007FF7E4391BA0
                      Source: C:\Users\user\AppData\Roaming\R3POs\wermgr.exeCode function: 28_2_00007FF7E438BE54 GetFileAttributesW,GetLastError,FindFirstFileW,GetLastError,CompareStringW,FindNextFileW,FindClose,FindClose,28_2_00007FF7E438BE54

                      E-Banking Fraud

                      barindex
                      Source: Yara matchFile source: 3.2.rundll32.exe.140000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 31.2.MDMAppInstaller.exe.140000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.140000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 33.2.wermgr.exe.140000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.140000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 24.2.wermgr.exe.140000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.140000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.loaddll64.exe.140000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 28.2.wermgr.exe.140000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000021.00000002.611146050.0000000140001000.00000020.00000001.01000000.0000000C.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.421971716.0000000140001000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000001F.00000002.604615787.0000000140001000.00000020.00000001.01000000.0000000E.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000018.00000002.622884365.0000000140001000.00000020.00000001.01000000.0000000C.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000001C.00000002.595393684.0000000140001000.00000020.00000001.01000000.0000000C.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.415891174.0000000140001000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.508980143.0000000140001000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.429395051.0000000140001000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: C:\Windows\System32\cmd.exeFile created: C:\Windows\system32\CCALJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014005284C1_2_000000014005284C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140048A4C1_2_0000000140048A4C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400403701_2_0000000140040370
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400343E81_2_00000001400343E8
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140026C741_2_0000000140026C74
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014004F4D01_2_000000014004F4D0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140049CE81_2_0000000140049CE8
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014004357C1_2_000000014004357C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014003DEEC1_2_000000014003DEEC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400367781_2_0000000140036778
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400220041_2_0000000140022004
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400600141_2_0000000140060014
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400240281_2_0000000140024028
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014002782C1_2_000000014002782C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014002E0301_2_000000014002E030
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014005582B1_2_000000014005582B
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400340441_2_0000000140034044
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014000F8481_2_000000014000F848
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014003D8781_2_000000014003D878
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400200941_2_0000000140020094
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014002F8A41_2_000000014002F8A4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400280AC1_2_00000001400280AC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014004F0AC1_2_000000014004F0AC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400410B41_2_00000001400410B4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400150E41_2_00000001400150E4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400661001_2_0000000140066100
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400251001_2_0000000140025100
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014004D9141_2_000000014004D914
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400331241_2_0000000140033124
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400321281_2_0000000140032128
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400259301_2_0000000140025930
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400059501_2_0000000140005950
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014004E9541_2_000000014004E954
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400011581_2_0000000140001158
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014003796C1_2_000000014003796C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400499801_2_0000000140049980
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400399901_2_0000000140039990
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014002F1981_2_000000014002F198
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400389A41_2_00000001400389A4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400099AC1_2_00000001400099AC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400659F01_2_00000001400659F0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014002EA1C1_2_000000014002EA1C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140055A4D1_2_0000000140055A4D
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014005A24C1_2_000000014005A24C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014001B2501_2_000000014001B250
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140001A781_2_0000000140001A78
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400072841_2_0000000140007284
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400612831_2_0000000140061283
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140061A901_2_0000000140061A90
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400642A01_2_00000001400642A0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014002DAA41_2_000000014002DAA4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140043AC01_2_0000000140043AC0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140019AC41_2_0000000140019AC4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400512E01_2_00000001400512E0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400162E01_2_00000001400162E0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014002BAEC1_2_000000014002BAEC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140006AEC1_2_0000000140006AEC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400633241_2_0000000140063324
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140013B641_2_0000000140013B64
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400553641_2_0000000140055364
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400193781_2_0000000140019378
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140060B8C1_2_0000000140060B8C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014001A3941_2_000000014001A394
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140008B941_2_0000000140008B94
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014004BBBC1_2_000000014004BBBC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140021BD81_2_0000000140021BD8
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400243E01_2_00000001400243E0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014002B3F31_2_000000014002B3F3
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140004C0C1_2_0000000140004C0C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014002B4291_2_000000014002B429
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400124741_2_0000000140012474
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014000AC741_2_000000014000AC74
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400384781_2_0000000140038478
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014004FC741_2_000000014004FC74
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014002747C1_2_000000014002747C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014002A4A41_2_000000014002A4A4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014001B4AC1_2_000000014001B4AC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014004A4B01_2_000000014004A4B0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140063CB41_2_0000000140063CB4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014002F4B81_2_000000014002F4B8
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140003CC41_2_0000000140003CC4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014000ECD01_2_000000014000ECD0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140017CD41_2_0000000140017CD4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140044CD81_2_0000000140044CD8
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014004ECF81_2_000000014004ECF8
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400425041_2_0000000140042504
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400265341_2_0000000140026534
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014002AD381_2_000000014002AD38
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140022D501_2_0000000140022D50
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400295501_2_0000000140029550
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140012D8C1_2_0000000140012D8C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140051D901_2_0000000140051D90
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140006D941_2_0000000140006D94
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400515A01_2_00000001400515A0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400285AC1_2_00000001400285AC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140031DCC1_2_0000000140031DCC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400365D01_2_00000001400365D0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400205D81_2_00000001400205D8
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140011DE41_2_0000000140011DE4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014004D5EC1_2_000000014004D5EC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014003A60C1_2_000000014003A60C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140021E1C1_2_0000000140021E1C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140023E1C1_2_0000000140023E1C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014004E6281_2_000000014004E628
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014004CE2C1_2_000000014004CE2C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400186381_2_0000000140018638
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140004E381_2_0000000140004E38
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400146441_2_0000000140014644
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014002EE481_2_000000014002EE48
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014004A6601_2_000000014004A660
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400536701_2_0000000140053670
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014003AE701_2_000000014003AE70
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400316701_2_0000000140031670
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014002D6941_2_000000014002D694
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140036E981_2_0000000140036E98
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014000D69C1_2_000000014000D69C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140050EA81_2_0000000140050EA8
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140053EC01_2_0000000140053EC0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014001BEC81_2_000000014001BEC8
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400466C41_2_00000001400466C4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014004EF0C1_2_000000014004EF0C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140017F401_2_0000000140017F40
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014001CF401_2_000000014001CF40
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140041F3C1_2_0000000140041F3C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400327501_2_0000000140032750
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014000578C1_2_000000014000578C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400137A01_2_00000001400137A0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400557A31_2_00000001400557A3
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014001C7CC1_2_000000014001C7CC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_00000001400027DC1_2_00000001400027DC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140030FE01_2_0000000140030FE0
                      Source: C:\Users\user\AppData\Roaming\R3POs\wermgr.exeCode function: 24_2_00007FF7E438E36824_2_00007FF7E438E368
                      Source: C:\Users\user\AppData\Roaming\R3POs\wermgr.exeCode function: 24_2_00007FF7E4382F5424_2_00007FF7E4382F54
                      Source: C:\Users\user\AppData\Roaming\R3POs\wermgr.exeCode function: 24_2_00007FF7E438CFF024_2_00007FF7E438CFF0
                      Source: C:\Users\user\AppData\Roaming\R3POs\wermgr.exeCode function: 24_2_00007FF7E4390A5824_2_00007FF7E4390A58
                      Source: C:\Users\user\AppData\Roaming\R3POs\wermgr.exeCode function: 24_2_00007FF7E439243824_2_00007FF7E4392438
                      Source: C:\Users\user\AppData\Roaming\R3POs\wermgr.exeCode function: 24_2_00007FF7E438684824_2_00007FF7E4386848
                      Source: C:\Users\user\AppData\Roaming\R3POs\wermgr.exeCode function: 24_2_00007FF7E4387EFC24_2_00007FF7E4387EFC
                      Source: C:\Users\user\AppData\Roaming\R3POs\wermgr.exeCode function: 28_2_00007FF7E438E36828_2_00007FF7E438E368
                      Source: C:\Users\user\AppData\Roaming\R3POs\wermgr.exeCode function: 28_2_00007FF7E4382F5428_2_00007FF7E4382F54
                      Source: C:\Users\user\AppData\Roaming\R3POs\wermgr.exeCode function: 28_2_00007FF7E438CFF028_2_00007FF7E438CFF0
                      Source: C:\Users\user\AppData\Roaming\R3POs\wermgr.exeCode function: 28_2_00007FF7E4390A5828_2_00007FF7E4390A58
                      Source: C:\Users\user\AppData\Roaming\R3POs\wermgr.exeCode function: 28_2_00007FF7E439243828_2_00007FF7E4392438
                      Source: C:\Users\user\AppData\Roaming\R3POs\wermgr.exeCode function: 28_2_00007FF7E438684828_2_00007FF7E4386848
                      Source: C:\Users\user\AppData\Roaming\R3POs\wermgr.exeCode function: 28_2_00007FF7E4387EFC28_2_00007FF7E4387EFC
                      Source: C:\Windows\System32\CCAL\MDMAppInstaller.exeCode function: 31_2_00007FF6C524464831_2_00007FF6C5244648
                      Source: C:\Windows\System32\CCAL\MDMAppInstaller.exeCode function: 31_2_00007FF6C52519D431_2_00007FF6C52519D4
                      Source: C:\Windows\System32\CCAL\MDMAppInstaller.exeCode function: 31_2_00007FF6C524963031_2_00007FF6C5249630
                      Source: C:\Windows\System32\CCAL\MDMAppInstaller.exeCode function: 31_2_00007FF6C52549FF31_2_00007FF6C52549FF
                      Source: C:\Windows\System32\CCAL\MDMAppInstaller.exeCode function: 31_2_00007FF6C524E93431_2_00007FF6C524E934
                      Source: C:\Windows\System32\CCAL\MDMAppInstaller.exeCode function: 31_2_00007FF6C5243FAC31_2_00007FF6C5243FAC
                      Source: C:\Windows\System32\CCAL\MDMAppInstaller.exeCode function: 31_2_00007FF6C5246BDC31_2_00007FF6C5246BDC
                      Source: C:\Users\user\AppData\Roaming\R3POs\wermgr.exeCode function: String function: 00007FF7E4385C24 appears 44 times
                      Source: C:\Users\user\AppData\Roaming\R3POs\wermgr.exeCode function: String function: 00007FF7E43845A8 appears 54 times
                      Source: C:\Windows\System32\CCAL\MDMAppInstaller.exeCode function: String function: 00007FF6C5246124 appears 108 times
                      Source: C:\Windows\System32\CCAL\MDMAppInstaller.exeCode function: String function: 00007FF6C5245F34 appears 75 times
                      Source: C:\Windows\System32\CCAL\MDMAppInstaller.exeCode function: 31_2_00007FF6C5249630 memset,memset,GetSystemDirectoryW,??3@YAXPEAX@Z,??3@YAXPEAX@Z,wcscat_s,GetTempFileNameW,GetLastError,#6,#177,RevertToSelf,CreateEnvironmentBlock,GetLastError,CreateProcessAsUserW,GetLastError,CreateProcessW,GetLastError,WaitForSingleObject,GetExitCodeProcess,GetLastError,DeleteFileW,GetLastError,GetLastError,RevertToSelf,DeleteFileW,GetLastError,DestroyEnvironmentBlock,EnterCriticalSection,LeaveCriticalSection,CloseHandle,CloseHandle,CloseHandle,??3@YAXPEAX@Z,??3@YAXPEAX@Z,??3@YAXPEAX@Z,??3@YAXPEAX@Z,31_2_00007FF6C5249630
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014005284C NtQuerySystemInformation,1_2_000000014005284C
                      Source: C:\Users\user\AppData\Roaming\R3POs\wermgr.exeCode function: 24_2_00007FF7E438E368 ZwQueryWnfStateNameInformation,ZwUpdateWnfStateData,EtwEventWriteNoRegistration,NtQuerySystemInformation,NtOpenEvent,NtWaitForSingleObject,NtClose,RtlAllocateAndInitializeSid,RtlInitUnicodeString,memset,NtAlpcConnectPort,memset,NtAlpcSendWaitReceivePort,RtlFreeSid,NtClose,24_2_00007FF7E438E368
                      Source: C:\Users\user\AppData\Roaming\R3POs\wermgr.exeCode function: 24_2_00007FF7E4391F54 NtQueryLicenseValue,24_2_00007FF7E4391F54
                      Source: C:\Users\user\AppData\Roaming\R3POs\wermgr.exeCode function: 24_2_00007FF7E4388404 DbgPrintEx,NtQueryInformationProcess,DbgPrintEx,DbgPrintEx,ReadProcessMemory,DbgPrintEx,GetLastError,24_2_00007FF7E4388404
                      Source: C:\Users\user\AppData\Roaming\R3POs\wermgr.exeCode function: 24_2_00007FF7E4392438 LoadLibraryExW,GetProcAddress,NtQueryLicenseValue,FreeLibrary,NtQueryLicenseValue,24_2_00007FF7E4392438
                      Source: C:\Users\user\AppData\Roaming\R3POs\wermgr.exeCode function: 24_2_00007FF7E43882EC DbgPrintEx,NtQueryInformationProcess,DbgPrintEx,DbgPrintEx,ReadProcessMemory,DbgPrintEx,GetLastError,24_2_00007FF7E43882EC
                      Source: C:\Users\user\AppData\Roaming\R3POs\wermgr.exeCode function: 28_2_00007FF7E438E368 ZwQueryWnfStateNameInformation,ZwUpdateWnfStateData,EtwEventWriteNoRegistration,NtQuerySystemInformation,NtOpenEvent,NtWaitForSingleObject,NtClose,RtlAllocateAndInitializeSid,RtlInitUnicodeString,memset,NtAlpcConnectPort,memset,NtAlpcSendWaitReceivePort,RtlFreeSid,NtClose,28_2_00007FF7E438E368
                      Source: C:\Users\user\AppData\Roaming\R3POs\wermgr.exeCode function: 28_2_00007FF7E4391F54 NtQueryLicenseValue,28_2_00007FF7E4391F54
                      Source: C:\Users\user\AppData\Roaming\R3POs\wermgr.exeCode function: 28_2_00007FF7E4388404 DbgPrintEx,NtQueryInformationProcess,DbgPrintEx,DbgPrintEx,ReadProcessMemory,DbgPrintEx,GetLastError,28_2_00007FF7E4388404
                      Source: C:\Users\user\AppData\Roaming\R3POs\wermgr.exeCode function: 28_2_00007FF7E4392438 LoadLibraryExW,GetProcAddress,NtQueryLicenseValue,FreeLibrary,NtQueryLicenseValue,28_2_00007FF7E4392438
                      Source: C:\Users\user\AppData\Roaming\R3POs\wermgr.exeCode function: 28_2_00007FF7E43882EC DbgPrintEx,NtQueryInformationProcess,DbgPrintEx,DbgPrintEx,ReadProcessMemory,DbgPrintEx,GetLastError,28_2_00007FF7E43882EC
                      Source: wermgr.exe.17.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: wermgr.exe.17.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: wermgr.exe.17.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: C:\Windows\explorer.exeSection loaded: windows.globalization.dllJump to behavior
                      Source: C:\Windows\explorer.exeSection loaded: capabilityaccessmanagerclient.dllJump to behavior
                      Source: C:\Windows\explorer.exeSection loaded: pcacli.dllJump to behavior
                      Source: C:\Windows\explorer.exeSection loaded: sfc_os.dllJump to behavior
                      Source: x64.dllStatic PE information: Number of sections : 17 > 10
                      Source: KHNE9A4.tmp.5.drStatic PE information: Number of sections : 18 > 10
                      Source: NAmADA4.tmp.5.drStatic PE information: Number of sections : 18 > 10
                      Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Roaming\R3POs\wermgr.exe C48C430EB07ACC2FF8BDDD6057F5C9F72C2E83F67478F1E4A1792AF866711538
                      Source: x64.dllStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: KHNE9A4.tmp.5.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: NAmADA4.tmp.5.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: x64.dllVirustotal: Detection: 47%
                      Source: x64.dllMetadefender: Detection: 37%
                      Source: x64.dllReversingLabs: Detection: 78%
                      Source: C:\Windows\System32\loaddll64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: unknownProcess created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\x64.dll"
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\x64.dll",#1
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\x64.dll,IsInteractiveUserSession
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\x64.dll",#1
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\x64.dll,QueryActiveSession
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\x64.dll,QueryUserToken
                      Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\wermgr.exe C:\Windows\system32\wermgr.exe
                      Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c C:\Users\user\AppData\Local\Temp\Cjaq.cmd
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Roaming\R3POs\wermgr.exe "C:\Users\user\AppData\Roaming\R3POs\wermgr.exe"
                      Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\MDMAppInstaller.exe C:\Windows\system32\MDMAppInstaller.exe
                      Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c C:\Users\user\AppData\Local\Temp\tkcfGo.cmd
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Roaming\R3POs\wermgr.exe "C:\Users\user\AppData\Roaming\R3POs\wermgr.exe"
                      Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /F /TN "Jvadjthzpd" /TR C:\Windows\system32\CCAL\MDMAppInstaller.exe /SC minute /MO 60 /RL highest
                      Source: C:\Windows\System32\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: unknownProcess created: C:\Windows\System32\CCAL\MDMAppInstaller.exe C:\Windows\system32\CCAL\MDMAppInstaller.exe
                      Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Roaming\R3POs\wermgr.exe "C:\Users\user\AppData\Roaming\R3POs\wermgr.exe"
                      Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /Query /TN "Jvadjthzpd"
                      Source: C:\Windows\System32\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /Query /TN "Jvadjthzpd"
                      Source: C:\Windows\System32\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /Query /TN "Jvadjthzpd"
                      Source: C:\Windows\System32\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /Query /TN "Jvadjthzpd"
                      Source: C:\Windows\System32\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /Query /TN "Jvadjthzpd"
                      Source: C:\Windows\System32\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /Query /TN "Jvadjthzpd"
                      Source: C:\Windows\System32\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /Query /TN "Jvadjthzpd"
                      Source: C:\Windows\System32\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\x64.dll",#1Jump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\x64.dll,IsInteractiveUserSessionJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\x64.dll,QueryActiveSessionJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\x64.dll,QueryUserTokenJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\x64.dll",#1Jump to behavior
                      Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\wermgr.exe C:\Windows\system32\wermgr.exeJump to behavior
                      Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c C:\Users\user\AppData\Local\Temp\Cjaq.cmdJump to behavior
                      Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Roaming\R3POs\wermgr.exe "C:\Users\user\AppData\Roaming\R3POs\wermgr.exe" Jump to behavior
                      Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\MDMAppInstaller.exe C:\Windows\system32\MDMAppInstaller.exeJump to behavior
                      Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c C:\Users\user\AppData\Local\Temp\tkcfGo.cmdJump to behavior
                      Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Roaming\R3POs\wermgr.exe "C:\Users\user\AppData\Roaming\R3POs\wermgr.exe" Jump to behavior
                      Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /F /TN "Jvadjthzpd" /TR C:\Windows\system32\CCAL\MDMAppInstaller.exe /SC minute /MO 60 /RL highestJump to behavior
                      Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Roaming\R3POs\wermgr.exe "C:\Users\user\AppData\Roaming\R3POs\wermgr.exe" Jump to behavior
                      Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /Query /TN "Jvadjthzpd"Jump to behavior
                      Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /Query /TN "Jvadjthzpd"Jump to behavior
                      Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /Query /TN "Jvadjthzpd"Jump to behavior
                      Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /Query /TN "Jvadjthzpd"Jump to behavior
                      Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /Query /TN "Jvadjthzpd"Jump to behavior
                      Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /Query /TN "Jvadjthzpd"Jump to behavior
                      Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /Query /TN "Jvadjthzpd"Jump to behavior
                      Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
                      Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\CryptoJump to behavior
                      Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\NAmADA4.tmpJump to behavior
                      Source: classification engineClassification label: mal100.troj.evad.winDLL@52/10@0/0
                      Source: C:\Users\user\AppData\Roaming\R3POs\wermgr.exeCode function: 24_2_00007FF7E4388F2C CoInitializeEx,CoCreateInstance,SysAllocString,SysFreeString,CoUninitialize,24_2_00007FF7E4388F2C
                      Source: C:\Users\user\AppData\Roaming\R3POs\wermgr.exeCode function: RtlInitUnicodeString,RtlCreateBoundaryDescriptor,RtlInitUnicodeString,RtlCreateServiceSid,GetProcessHeap,HeapAlloc,RtlCreateServiceSid,RtlAddSIDToBoundaryDescriptor,OpenPrivateNamespaceW,GetLastError,GetProcessHeap,HeapFree,RtlDeleteBoundaryDescriptor,24_2_00007FF7E438DE98
                      Source: C:\Users\user\AppData\Roaming\R3POs\wermgr.exeCode function: RtlInitUnicodeString,RtlCreateBoundaryDescriptor,RtlInitUnicodeString,RtlCreateServiceSid,GetProcessHeap,HeapAlloc,RtlCreateServiceSid,RtlAddSIDToBoundaryDescriptor,OpenPrivateNamespaceW,GetLastError,GetProcessHeap,HeapFree,RtlDeleteBoundaryDescriptor,28_2_00007FF7E438DE98
                      Source: C:\Windows\explorer.exeFile read: C:\Users\desktop.iniJump to behavior
                      Source: C:\Users\user\AppData\Roaming\R3POs\wermgr.exeCode function: 24_2_00007FF7E4381A70 CreateToolhelp32Snapshot,GetLastError,Process32FirstW,GetLastError,_wcsicmp,Process32NextW,CloseHandle,24_2_00007FF7E4381A70
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\x64.dll,IsInteractiveUserSession
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5560:120:WilError_01
                      Source: C:\Users\user\AppData\Roaming\R3POs\wermgr.exeMutant created: \Sessions\1\BaseNamedObjects\{41059e93-2e1b-cd9f-8d6b-afe9f069cb55}
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2928:120:WilError_01
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4212:120:WilError_01
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3464:120:WilError_01
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3488:120:WilError_01
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5220:120:WilError_01
                      Source: C:\Users\user\AppData\Roaming\R3POs\wermgr.exeMutant created: \Sessions\1\BaseNamedObjects\{b9eeafb6-578e-5d2c-64c5-1ccbb1866e8a}
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3012:120:WilError_01
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6756:120:WilError_01
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5188:120:WilError_01
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4788:120:WilError_01
                      Source: Window RecorderWindow detected: More than 3 window changes detected
                      Source: x64.dllStatic PE information: Image base 0x140000000 > 0x60000000
                      Source: x64.dllStatic file information: File size 1060864 > 1048576
                      Source: x64.dllStatic PE information: TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
                      Source: Binary string: mdmappinstaller.pdbGCTL source: cmd.exe, 0000001A.00000003.586281277.000001E89C487000.00000004.00000020.00020000.00000000.sdmp, MDMAppInstaller.exe, 0000001F.00000002.605506931.00007FF6C5255000.00000002.00000001.01000000.0000000D.sdmp, MDMAppInstaller.exe, 0000001F.00000000.596119323.00007FF6C5255000.00000002.00000001.01000000.0000000D.sdmp, MDMAppInstaller.exe.26.dr
                      Source: Binary string: WerMgr.pdb source: cmd.exe, 00000011.00000003.547294887.0000021599D37000.00000004.00000020.00020000.00000000.sdmp, wermgr.exe, 00000018.00000002.623554275.00007FF7E4395000.00000002.00000001.01000000.0000000B.sdmp, wermgr.exe, 00000018.00000000.571165986.00007FF7E4395000.00000002.00000001.01000000.0000000B.sdmp, wermgr.exe, 0000001C.00000000.590604574.00007FF7E4395000.00000002.00000001.01000000.0000000B.sdmp, wermgr.exe, 0000001C.00000002.596149680.00007FF7E4395000.00000002.00000001.01000000.0000000B.sdmp, wermgr.exe, 00000021.00000000.608169361.00007FF7E4395000.00000002.00000001.01000000.0000000B.sdmp, wermgr.exe, 00000021.00000002.612132180.00007FF7E4395000.00000002.00000001.01000000.0000000B.sdmp, wermgr.exe.17.dr
                      Source: Binary string: sgI.pdb source: x64.dll, NAmADA4.tmp.5.dr, KHNE9A4.tmp.5.dr
                      Source: Binary string: WerMgr.pdbGCTL source: cmd.exe, 00000011.00000003.547294887.0000021599D37000.00000004.00000020.00020000.00000000.sdmp, wermgr.exe, 00000018.00000002.623554275.00007FF7E4395000.00000002.00000001.01000000.0000000B.sdmp, wermgr.exe, 00000018.00000000.571165986.00007FF7E4395000.00000002.00000001.01000000.0000000B.sdmp, wermgr.exe, 0000001C.00000000.590604574.00007FF7E4395000.00000002.00000001.01000000.0000000B.sdmp, wermgr.exe, 0000001C.00000002.596149680.00007FF7E4395000.00000002.00000001.01000000.0000000B.sdmp, wermgr.exe, 00000021.00000000.608169361.00007FF7E4395000.00000002.00000001.01000000.0000000B.sdmp, wermgr.exe, 00000021.00000002.612132180.00007FF7E4395000.00000002.00000001.01000000.0000000B.sdmp, wermgr.exe.17.dr
                      Source: Binary string: mdmappinstaller.pdb source: cmd.exe, 0000001A.00000003.586281277.000001E89C487000.00000004.00000020.00020000.00000000.sdmp, MDMAppInstaller.exe, 0000001F.00000002.605506931.00007FF6C5255000.00000002.00000001.01000000.0000000D.sdmp, MDMAppInstaller.exe, 0000001F.00000000.596119323.00007FF6C5255000.00000002.00000001.01000000.0000000D.sdmp, MDMAppInstaller.exe.26.dr
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000022245A33055 push rbx; retf 1_2_0000022245A3305A
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000001F1DA323055 push rbx; retf 3_2_000001F1DA32305A
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000022341CE3055 push rbx; retf 4_2_0000022341CE305A
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000027E57583055 push rbx; retf 6_2_0000027E5758305A
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000025311A23055 push rbx; retf 8_2_0000025311A2305A
                      Source: C:\Users\user\AppData\Roaming\R3POs\wermgr.exeCode function: 24_2_000001B48FD73055 push rbx; retf 24_2_000001B48FD7305A
                      Source: C:\Users\user\AppData\Roaming\R3POs\wermgr.exeCode function: 28_2_000001A589C43055 push rbx; retf 28_2_000001A589C4305A
                      Source: C:\Windows\System32\CCAL\MDMAppInstaller.exeCode function: 31_2_0000019891253055 push rbx; retf 31_2_000001989125305A
                      Source: C:\Users\user\AppData\Roaming\R3POs\wermgr.exeCode function: 33_2_00000149ED6C3055 push rbx; retf 33_2_00000149ED6C305A
                      Source: x64.dllStatic PE information: section name: .crt1
                      Source: x64.dllStatic PE information: section name: qwTG
                      Source: x64.dllStatic PE information: section name: .lqen
                      Source: x64.dllStatic PE information: section name: .vqb
                      Source: x64.dllStatic PE information: section name: .gjd
                      Source: x64.dllStatic PE information: section name: .wqhqlp
                      Source: x64.dllStatic PE information: section name: .jriz
                      Source: x64.dllStatic PE information: section name: .ebkl
                      Source: x64.dllStatic PE information: section name: .aoj
                      Source: x64.dllStatic PE information: section name: .ncm
                      Source: KHNE9A4.tmp.5.drStatic PE information: section name: .crt1
                      Source: KHNE9A4.tmp.5.drStatic PE information: section name: qwTG
                      Source: KHNE9A4.tmp.5.drStatic PE information: section name: .lqen
                      Source: KHNE9A4.tmp.5.drStatic PE information: section name: .vqb
                      Source: KHNE9A4.tmp.5.drStatic PE information: section name: .gjd
                      Source: KHNE9A4.tmp.5.drStatic PE information: section name: .wqhqlp
                      Source: KHNE9A4.tmp.5.drStatic PE information: section name: .jriz
                      Source: KHNE9A4.tmp.5.drStatic PE information: section name: .ebkl
                      Source: KHNE9A4.tmp.5.drStatic PE information: section name: .aoj
                      Source: KHNE9A4.tmp.5.drStatic PE information: section name: .ncm
                      Source: KHNE9A4.tmp.5.drStatic PE information: section name: .gqytqb
                      Source: NAmADA4.tmp.5.drStatic PE information: section name: .crt1
                      Source: NAmADA4.tmp.5.drStatic PE information: section name: qwTG
                      Source: NAmADA4.tmp.5.drStatic PE information: section name: .lqen
                      Source: NAmADA4.tmp.5.drStatic PE information: section name: .vqb
                      Source: NAmADA4.tmp.5.drStatic PE information: section name: .gjd
                      Source: NAmADA4.tmp.5.drStatic PE information: section name: .wqhqlp
                      Source: NAmADA4.tmp.5.drStatic PE information: section name: .jriz
                      Source: NAmADA4.tmp.5.drStatic PE information: section name: .ebkl
                      Source: NAmADA4.tmp.5.drStatic PE information: section name: .aoj
                      Source: NAmADA4.tmp.5.drStatic PE information: section name: .ncm
                      Source: NAmADA4.tmp.5.drStatic PE information: section name: .ksjw
                      Source: wermgr.exe.17.drStatic PE information: section name: .imrsiv
                      Source: wermgr.exe.17.drStatic PE information: section name: .didat
                      Source: MDMAppInstaller.exe.26.drStatic PE information: section name: .didat
                      Source: initial sampleStatic PE information: section where entry point is pointing to: .crt1
                      Source: x64.dllStatic PE information: real checksum: 0xb3260629 should be: 0x104747
                      Source: KHNE9A4.tmp.5.drStatic PE information: real checksum: 0xb3260629 should be: 0x104cd2
                      Source: NAmADA4.tmp.5.drStatic PE information: real checksum: 0xb3260629 should be: 0x1102ae
                      Source: wermgr.exe.17.drStatic PE information: 0xA7D9A170 [Fri Mar 28 06:15:12 2059 UTC]
                      Source: initial sampleStatic PE information: section name: .text entropy: 7.8179817907
                      Source: initial sampleStatic PE information: section name: .text entropy: 7.8179817907
                      Source: initial sampleStatic PE information: section name: .text entropy: 7.8179817907

                      Persistence and Installation Behavior

                      barindex
                      Source: unknownExecutable created and started: C:\Windows\system32\CCAL\MDMAppInstaller.exe
                      Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\NAmADA4.tmpJump to dropped file
                      Source: C:\Windows\System32\cmd.exeFile created: C:\Windows\system32\CCAL\WTSAPI32.dll (copy)Jump to dropped file
                      Source: C:\Windows\System32\cmd.exeFile created: C:\Users\user\AppData\Roaming\R3POs\wer.dll (copy)Jump to dropped file
                      Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\KHNE9A4.tmpJump to dropped file
                      Source: C:\Windows\System32\cmd.exeFile created: C:\Users\user\AppData\Roaming\R3POs\wermgr.exeJump to dropped file
                      Source: C:\Windows\System32\cmd.exeFile created: C:\Windows\System32\CCAL\MDMAppInstaller.exeJump to dropped file
                      Source: C:\Windows\System32\cmd.exeFile created: C:\Windows\system32\CCAL\WTSAPI32.dll (copy)Jump to dropped file
                      Source: C:\Windows\System32\cmd.exeFile created: C:\Windows\System32\CCAL\MDMAppInstaller.exeJump to dropped file

                      Boot Survival

                      barindex
                      Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /F /TN "Jvadjthzpd" /TR C:\Windows\system32\CCAL\MDMAppInstaller.exe /SC minute /MO 60 /RL highest
                      Source: C:\Windows\explorer.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run WraljbotdtpzzkJump to behavior
                      Source: C:\Windows\explorer.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run WraljbotdtpzzkJump to behavior

                      Hooking and other Techniques for Hiding and Protection

                      barindex
                      Source: explorer.exeUser mode code has changed: module: ntdll.dll function: ZwSetEvent new code: 0xE9 0x9B 0xBB 0xB5 0x5E 0xEF
                      Source: C:\Windows\explorer.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\explorer.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\NAmADA4.tmpJump to dropped file
                      Source: C:\Windows\explorer.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\KHNE9A4.tmpJump to dropped file
                      Source: C:\Users\user\AppData\Roaming\R3POs\wermgr.exeCode function: 24_2_00007FF7E4387BC4 GetSystemTimeAsFileTime followed by cmp: cmp ebx, 01h and CTI: jne 00007FF7E4387CE0h24_2_00007FF7E4387BC4
                      Source: C:\Users\user\AppData\Roaming\R3POs\wermgr.exeCode function: 28_2_00007FF7E4387BC4 GetSystemTimeAsFileTime followed by cmp: cmp ebx, 01h and CTI: jne 00007FF7E4387CE0h28_2_00007FF7E4387BC4
                      Source: C:\Windows\System32\loaddll64.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_1-60861
                      Source: C:\Users\user\AppData\Roaming\R3POs\wermgr.exeAPI coverage: 0.7 %
                      Source: C:\Users\user\AppData\Roaming\R3POs\wermgr.exeAPI coverage: 0.7 %
                      Source: C:\Windows\System32\CCAL\MDMAppInstaller.exeAPI coverage: 0.7 %
                      Source: C:\Windows\System32\loaddll64.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_000000014003EB14 GetSystemInfo,1_2_000000014003EB14
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140049724 FindFirstFileExW,1_2_0000000140049724
                      Source: C:\Users\user\AppData\Roaming\R3POs\wermgr.exeCode function: 24_2_00007FF7E4391BA0 FindFirstFileExW,_wcsicmp,_wcsicmp,FindNextFileW,GetLastError,GetLastError,FindClose,24_2_00007FF7E4391BA0
                      Source: C:\Users\user\AppData\Roaming\R3POs\wermgr.exeCode function: 24_2_00007FF7E438BE54 GetFileAttributesW,GetLastError,FindFirstFileW,GetLastError,CompareStringW,FindNextFileW,FindClose,FindClose,24_2_00007FF7E438BE54
                      Source: C:\Users\user\AppData\Roaming\R3POs\wermgr.exeCode function: 28_2_00007FF7E4391BA0 FindFirstFileExW,_wcsicmp,_wcsicmp,FindNextFileW,GetLastError,GetLastError,FindClose,28_2_00007FF7E4391BA0
                      Source: C:\Users\user\AppData\Roaming\R3POs\wermgr.exeCode function: 28_2_00007FF7E438BE54 GetFileAttributesW,GetLastError,FindFirstFileW,GetLastError,CompareStringW,FindNextFileW,FindClose,FindClose,28_2_00007FF7E438BE54
                      Source: explorer.exe, 00000005.00000000.425051454.0000000007EF6000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000
                      Source: explorer.exe, 00000005.00000000.441628996.000000000807B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}8Ll/
                      Source: explorer.exe, 00000005.00000000.441628996.000000000807B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
                      Source: explorer.exe, 00000005.00000000.425184192.0000000007F91000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SATA CD00
                      Source: explorer.exe, 00000005.00000000.426024313.00000000081C7000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: 0d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATAY
                      Source: explorer.exe, 00000005.00000000.472787622.0000000006915000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                      Source: explorer.exe, 00000005.00000000.443698787.00000000081C6000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: 0d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATAs
                      Source: explorer.exe, 00000005.00000000.441628996.000000000807B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000
                      Source: explorer.exe, 00000005.00000000.425184192.0000000007F91000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000
                      Source: explorer.exe, 00000005.00000000.425184192.0000000007F91000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: _VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Vir
                      Source: explorer.exe, 00000005.00000000.461519524.00000000081C6000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATAs
                      Source: C:\Users\user\AppData\Roaming\R3POs\wermgr.exeCode function: 24_2_00007FF7E4382F54 HeapSetInformation,IsDebuggerPresent,Sleep,DebugBreak,EventRegister,EventSetInformation,EtwRegisterTraceGuidsW,GetModuleFileNameW,GetCommandLineW,CommandLineToArgvW,GetLastError,wcscmp,WerpOpenMachineQueue,WerpSubmitReportFromStore,wcscmp,WerpOpenMachineQueue,WerpSubmitReportFromStore,WerpCloseStore,wcscmp,WerStorePurge,wcscmp,memset,memset,memset,memset,memset,memset,memset,memset,_wtoi,_wtoi64,_wtoi64,_wtoi64,_wtoi64,_wtoi64,_wtoi64,_wtoi64,_wtoi64,_wtoi64,_wtoi64,_wtoi64,_wcsicmp,wcscmp,WerpOpenMachineQueue,WerpCloseStore,wcscmp,wcscmp,_wtoi64,_wtoi,wcscmp,RtlPublishWnfStateData,RtlNtStatusToDosError,RtlQueryWnfStateData,WerpCleanWer,wcscmp,wcscmp,_wtoi,wcscmp,wcscmp,WerpCleanWer,LocalFree,EtwUnregisterTraceGuids,EventUnregister,24_2_00007FF7E4382F54
                      Source: C:\Users\user\AppData\Roaming\R3POs\wermgr.exeCode function: 24_2_00007FF7E438F158 GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,24_2_00007FF7E438F158
                      Source: C:\Windows\System32\loaddll64.exeCode function: 1_2_0000000140040370 LdrLoadDll,1_2_0000000140040370
                      Source: C:\Users\user\AppData\Roaming\R3POs\wermgr.exeCode function: 24_2_00007FF7E4393140 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,24_2_00007FF7E4393140
                      Source: C:\Users\user\AppData\Roaming\R3POs\wermgr.exeCode function: 24_2_00007FF7E4392B00 SetUnhandledExceptionFilter,24_2_00007FF7E4392B00
                      Source: C:\Users\user\AppData\Roaming\R3POs\wermgr.exeCode function: 28_2_00007FF7E4393140 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,28_2_00007FF7E4393140
                      Source: C:\Users\user\AppData\Roaming\R3POs\wermgr.exeCode function: 28_2_00007FF7E4392B00 SetUnhandledExceptionFilter,28_2_00007FF7E4392B00
                      Source: C:\Windows\System32\CCAL\MDMAppInstaller.exeCode function: 31_2_00007FF6C5253DF0 SetUnhandledExceptionFilter,31_2_00007FF6C5253DF0
                      Source: C:\Windows\System32\CCAL\MDMAppInstaller.exeCode function: 31_2_00007FF6C5253BA4 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,31_2_00007FF6C5253BA4

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: C:\Windows\explorer.exeFile created: KHNE9A4.tmp.5.drJump to dropped file
                      Source: C:\Windows\System32\rundll32.exeMemory protected: C:\Windows\explorer.exe base: 7FFA7389EFE0 protect: page execute and read and writeJump to behavior
                      Source: C:\Windows\System32\rundll32.exeMemory protected: C:\Windows\explorer.exe base: 7FFA7389E000 protect: page execute readJump to behavior
                      Source: C:\Windows\System32\rundll32.exeMemory protected: C:\Windows\explorer.exe base: 7FFA71652A20 protect: page execute and read and writeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\R3POs\wermgr.exeMemory protected: unknown base: 7FFA7389EFE0 protect: page execute and read and writeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\R3POs\wermgr.exeMemory protected: unknown base: 7FFA7389E000 protect: page execute readJump to behavior
                      Source: C:\Users\user\AppData\Roaming\R3POs\wermgr.exeMemory protected: unknown base: 7FFA71652A20 protect: page execute and read and writeJump to behavior
                      Source: C:\Windows\System32\rundll32.exeThread APC queued: target process: C:\Windows\explorer.exeJump to behavior
                      Source: C:\Windows\System32\rundll32.exeAtom created: 53565741554156554881ECA8 0x00000000 push ebx 0x00000001 push esi 0x00000002 push edi 0x00000003 inc ecx 0x00000004 push ebp 0x00000005 inc ecx 0x00000006 push esi 0x00000007 push ebp 0x00000008 dec eax 0x00000009 sub esp, 000000A8h Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\R3POs\wermgr.exeAtom created: 53565741554156554881ECA8 0x00000000 push ebx 0x00000001 push esi 0x00000002 push edi 0x00000003 inc ecx 0x00000004 push ebp 0x00000005 inc ecx 0x00000006 push esi 0x00000007 push ebp 0x00000008 dec eax 0x00000009 sub esp, 000000A8h Jump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\x64.dll",#1Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\R3POs\wermgr.exeCode function: 24_2_00007FF7E438AE50 GetFileSecurityW,GetLastError,GetFileSecurityW,GetLastError,GetSecurityDescriptorDacl,GetLastError,GetCurrentThread,OpenThreadToken,GetLastError,GetCurrentProcess,OpenProcessToken,GetLastError,GetTokenInformation,GetLastError,GetTokenInformation,GetLastError,SetEntriesInAclW,InitializeSecurityDescriptor,GetLastError,SetSecurityDescriptorDacl,GetLastError,SetFileSecurityW,GetLastError,GetFileAttributesW,GetLastError,SetFileAttributesW,GetLastError,LocalFree,CloseHandle,24_2_00007FF7E438AE50
                      Source: C:\Users\user\AppData\Roaming\R3POs\wermgr.exeCode function: 24_2_00007FF7E4388B70 AllocateAndInitializeSid,GetLastError,CheckTokenMembership,GetLastError,FreeSid,24_2_00007FF7E4388B70
                      Source: explorer.exe, 00000005.00000000.432823603.0000000001430000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000005.00000000.460936283.0000000007EF6000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.457188070.0000000006100000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd
                      Source: explorer.exe, 00000005.00000000.468464420.0000000000E38000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.432823603.0000000001430000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000005.00000000.453260622.0000000001430000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
                      Source: explorer.exe, 00000005.00000000.432823603.0000000001430000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000005.00000000.453260622.0000000001430000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000005.00000000.417586266.0000000001430000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: YProgram Managerf
                      Source: explorer.exe, 00000005.00000000.432823603.0000000001430000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000005.00000000.453260622.0000000001430000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000005.00000000.417586266.0000000001430000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
                      Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion InstallDateJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                      Source: C:\Users\user\AppData\Roaming\R3POs\wermgr.exeCode function: 24_2_00007FF7E4387BC4 GetSystemTimeAsFileTime,RegSetValueExW,GetLastError,RegCloseKey,24_2_00007FF7E4387BC4
                      Source: C:\Windows\System32\CCAL\MDMAppInstaller.exeCode function: 31_2_00007FF6C524F10C LookupAccountNameW,GetLastError,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,LookupAccountNameW,ConvertSidToStringSidW,GetLastError,LocalFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,??3@YAXPEAX@Z,31_2_00007FF6C524F10C
                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      1
                      Valid Accounts
                      1
                      Native API
                      1
                      DLL Side-Loading
                      1
                      DLL Side-Loading
                      1
                      Deobfuscate/Decode Files or Information
                      1
                      Credential API Hooking
                      11
                      System Time Discovery
                      Remote Services1
                      Archive Collected Data
                      Exfiltration Over Other Network Medium2
                      Encrypted Channel
                      Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default Accounts1
                      Exploitation for Client Execution
                      1
                      Valid Accounts
                      1
                      Valid Accounts
                      3
                      Obfuscated Files or Information
                      LSASS Memory1
                      Account Discovery
                      Remote Desktop Protocol1
                      Credential API Hooking
                      Exfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain Accounts1
                      Scheduled Task/Job
                      1
                      Windows Service
                      1
                      Access Token Manipulation
                      2
                      Software Packing
                      Security Account Manager2
                      File and Directory Discovery
                      SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)1
                      Scheduled Task/Job
                      1
                      Windows Service
                      1
                      Timestomp
                      NTDS24
                      System Information Discovery
                      Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCron1
                      Registry Run Keys / Startup Folder
                      312
                      Process Injection
                      1
                      DLL Side-Loading
                      LSA Secrets1
                      Query Registry
                      SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.common1
                      Scheduled Task/Job
                      1
                      Rootkit
                      Cached Domain Credentials21
                      Security Software Discovery
                      VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup Items1
                      Registry Run Keys / Startup Folder
                      121
                      Masquerading
                      DCSync3
                      Process Discovery
                      Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
                      Valid Accounts
                      Proc Filesystem1
                      System Owner/User Discovery
                      Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                      Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)1
                      Access Token Manipulation
                      /etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                      Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)312
                      Process Injection
                      Network SniffingProcess DiscoveryTaint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact
                      Compromise Software Dependencies and Development ToolsWindows Command ShellCronCron1
                      Rundll32
                      Input CapturePermission Groups DiscoveryReplication Through Removable MediaRemote Data StagingExfiltration Over Physical MediumMail ProtocolsService Stop
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 signatures2 2 Behavior Graph ID: 608207 Sample: x64.dll Startdate: 12/04/2022 Architecture: WINDOWS Score: 100 62 Antivirus detection for dropped file 2->62 64 Antivirus / Scanner detection for submitted sample 2->64 66 Multi AV Scanner detection for submitted file 2->66 68 5 other signatures 2->68 9 loaddll64.exe 1 2->9         started        11 MDMAppInstaller.exe 2->11         started        process3 process4 13 rundll32.exe 9->13         started        16 cmd.exe 1 9->16         started        18 rundll32.exe 9->18         started        20 rundll32.exe 9->20         started        signatures5 78 Changes memory attributes in foreign processes to executable or writable 13->78 80 Uses Atom Bombing / ProGate to inject into other processes 13->80 82 Queues an APC in another process (thread injection) 13->82 22 explorer.exe 10 35 13->22 injected 26 rundll32.exe 16->26         started        process6 file7 50 C:\Users\user\AppData\Local\...50AmADA4.tmp, PE32+ 22->50 dropped 52 C:\Users\user\AppData\Local\...\KHNE9A4.tmp, PE32+ 22->52 dropped 70 Benign windows process drops PE files 22->70 72 Uses schtasks.exe or at.exe to add and modify task schedules 22->72 28 wermgr.exe 22->28         started        31 cmd.exe 3 22->31         started        34 cmd.exe 3 22->34         started        36 12 other processes 22->36 signatures8 process9 file10 74 Changes memory attributes in foreign processes to executable or writable 28->74 76 Uses Atom Bombing / ProGate to inject into other processes 28->76 54 C:\Users\user\AppData\Roaming\...\wermgr.exe, PE32+ 31->54 dropped 56 C:\Users\user\AppData\...\wer.dll (copy), PE32+ 31->56 dropped 38 conhost.exe 31->38         started        58 C:\Windows\system32\...\WTSAPI32.dll (copy), PE32+ 34->58 dropped 60 C:\Windows\System32\...\MDMAppInstaller.exe, PE32+ 34->60 dropped 40 conhost.exe 34->40         started        42 conhost.exe 36->42         started        44 conhost.exe 36->44         started        46 conhost.exe 36->46         started        48 5 other processes 36->48 signatures11 process12

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      x64.dll47%VirustotalBrowse
                      x64.dll37%MetadefenderBrowse
                      x64.dll79%ReversingLabsWin64.Infostealer.Dridex
                      x64.dll100%AviraHEUR/AGEN.1207422
                      x64.dll100%Joe Sandbox ML
                      SourceDetectionScannerLabelLink
                      C:\Users\user\AppData\Local\Temp\NAmADA4.tmp100%AviraHEUR/AGEN.1207422
                      C:\Users\user\AppData\Local\Temp\KHNE9A4.tmp100%AviraHEUR/AGEN.1207422
                      C:\Users\user\AppData\Local\Temp\NAmADA4.tmp100%Joe Sandbox ML
                      C:\Users\user\AppData\Local\Temp\KHNE9A4.tmp100%Joe Sandbox ML
                      C:\Users\user\AppData\Roaming\R3POs\wermgr.exe0%VirustotalBrowse
                      C:\Users\user\AppData\Roaming\R3POs\wermgr.exe0%MetadefenderBrowse
                      C:\Users\user\AppData\Roaming\R3POs\wermgr.exe0%ReversingLabs
                      C:\Windows\System32\CCAL\MDMAppInstaller.exe0%MetadefenderBrowse
                      C:\Windows\System32\CCAL\MDMAppInstaller.exe0%ReversingLabs
                      SourceDetectionScannerLabelLinkDownload
                      33.2.wermgr.exe.140000000.0.unpack100%AviraHEUR/AGEN.1207430Download File
                      3.2.rundll32.exe.140000000.0.unpack100%AviraHEUR/AGEN.1207430Download File
                      31.2.MDMAppInstaller.exe.140000000.0.unpack100%AviraHEUR/AGEN.1207430Download File
                      4.2.rundll32.exe.140000000.0.unpack100%AviraHEUR/AGEN.1207430Download File
                      6.2.rundll32.exe.140000000.0.unpack100%AviraHEUR/AGEN.1207430Download File
                      28.2.wermgr.exe.140000000.0.unpack100%AviraHEUR/AGEN.1207430Download File
                      8.2.rundll32.exe.140000000.0.unpack100%AviraHEUR/AGEN.1207430Download File
                      1.2.loaddll64.exe.140000000.0.unpack100%AviraHEUR/AGEN.1207430Download File
                      24.2.wermgr.exe.140000000.0.unpack100%AviraHEUR/AGEN.1207430Download File
                      No Antivirus matches
                      No Antivirus matches
                      No contacted domains info
                      No contacted IP infos
                      Joe Sandbox Version:34.0.0 Boulder Opal
                      Analysis ID:608207
                      Start date and time: 12/04/202221:44:072022-04-12 21:44:07 +02:00
                      Joe Sandbox Product:CloudBasic
                      Overall analysis duration:0h 13m 9s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Sample file name:x64.dll
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                      Number of analysed new started processes analysed:47
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:1
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • HDC enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Detection:MAL
                      Classification:mal100.troj.evad.winDLL@52/10@0/0
                      EGA Information:
                      • Successful, ratio: 100%
                      HDC Information:
                      • Successful, ratio: 40.1% (good quality ratio 30.1%)
                      • Quality average: 56.9%
                      • Quality standard deviation: 39.7%
                      HCA Information:
                      • Successful, ratio: 100%
                      • Number of executed functions: 43
                      • Number of non-executed functions: 186
                      Cookbook Comments:
                      • Found application associated with file extension: .dll
                      • Adjust boot time
                      • Enable AMSI
                      • Override analysis time to 240s for rundll32
                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe, wuapihost.exe
                      • Excluded domains from analysis (whitelisted): www.bing.com, ris.api.iris.microsoft.com, client.wns.windows.com, fs.microsoft.com, sls.update.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com, kv801.prod.do.dsp.mp.microsoft.com
                      • Not all processes where analyzed, report is missing behavior information
                      • Report size exceeded maximum capacity and may have missing behavior information.
                      • Report size exceeded maximum capacity and may have missing disassembly code.
                      • Report size getting too big, too many NtEnumerateKey calls found.
                      TimeTypeDescription
                      21:46:16AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Wraljbotdtpzzk C:\Users\user\AppData\Roaming\R3POs\wermgr.exe
                      21:46:25AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Wraljbotdtpzzk C:\Users\user\AppData\Roaming\R3POs\wermgr.exe
                      21:46:34AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Wraljbotdtpzzk.lnk
                      21:46:37Task SchedulerRun new task: Jvadjthzpd path: C:\Windows\system32\CCAL\MDMAppInstaller.exe
                      No context
                      No context
                      No context
                      No context
                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                      C:\Users\user\AppData\Roaming\R3POs\wermgr.exeqNKCAaD6MH.dllGet hashmaliciousBrowse
                        CsUUaEi57B.dllGet hashmaliciousBrowse
                          GJSyxyXpqb.dllGet hashmaliciousBrowse
                            YCmvsk3Lmf.dllGet hashmaliciousBrowse
                              x95V65Z00v.dllGet hashmaliciousBrowse
                                GTSszLxygJ.dllGet hashmaliciousBrowse
                                  2k0c2Cohem.dllGet hashmaliciousBrowse
                                    U4zqCpLYS2.dllGet hashmaliciousBrowse
                                      b0kpce0t8F.dllGet hashmaliciousBrowse
                                        QAUAey7NkL.dllGet hashmaliciousBrowse
                                          Y4Gd7K2a8m.dllGet hashmaliciousBrowse
                                            yPeVDkBY3n.dllGet hashmaliciousBrowse
                                              td1i2JJWLZ.dllGet hashmaliciousBrowse
                                                TDhTkVMvVd.dllGet hashmaliciousBrowse
                                                  ShmrlNrhab.dllGet hashmaliciousBrowse
                                                    knYgnOrOXk.dllGet hashmaliciousBrowse
                                                      Dk62bv8zDb.dllGet hashmaliciousBrowse
                                                        UVkobIdWdL.dllGet hashmaliciousBrowse
                                                          EeshGc2wcs.dllGet hashmaliciousBrowse
                                                            3XSR1oCsva.dllGet hashmaliciousBrowse
                                                              Process:C:\Windows\explorer.exe
                                                              File Type:ASCII text, with CRLF line terminators
                                                              Category:dropped
                                                              Size (bytes):229
                                                              Entropy (8bit):4.869685609305143
                                                              Encrypted:false
                                                              SSDEEP:6:8u5P9aZ51Me/N9aZ51d923f9X9aZ5IIpUQ:8u5sH1MueH1qGHnUQ
                                                              MD5:03B3EA10D50CE5BB23379A28EA860902
                                                              SHA1:8DC17B421435CA1D98D53F1586229D175F448F48
                                                              SHA-256:0A3C5484A2F6190CFA103F7C4EB106C7F6C7E404B92780C3C0021E8EE9C5BEB5
                                                              SHA-512:D60A16A86D863F97F2867E29AFA05887631D0E9ADAF2DF77E3B21B88E7EE36DC5B488ECCBC8A2F7D8D812BD8CB4B3188094A2B5E92148D781339152D34561448
                                                              Malicious:false
                                                              Preview:md C:\Users\user\AppData\Roaming\R3POs..copy C:\Windows\system32\wermgr.exe C:\Users\user\AppData\Roaming\R3POs..move C:\Users\user\AppData\Local\Temp\NAmADA4.tmp C:\Users\user\AppData\Roaming\R3POs\wer.dll..del %0 & exit
                                                              Process:C:\Windows\explorer.exe
                                                              File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):1064960
                                                              Entropy (8bit):5.552014205230675
                                                              Encrypted:false
                                                              SSDEEP:12288:BabbKACcbDWwVexYHi4mrh+IyiPU0D88nTtgO9HvjA3RlkuRCYJRB7laUqdezDk5:MaXcfWwgmKrhncQYlez5nGa84djgol
                                                              MD5:0DDBAA45951517107B9702E6CCC87906
                                                              SHA1:370891865959F967B885A1EB9BFB459D73DF6105
                                                              SHA-256:6C7F57824FA935D6BAB9ED7127A484F05433BB12FB6A5B9A6581B1173C5A237A
                                                              SHA-512:421D4DCE4D4A521AA3CEC731D9FE1BE95A2510BB29B4493859EFEF6AF8816A4C274D261A349D23113A448A35F8AEBE1D3786788840DDB0D4DC5D2C7338F4683B
                                                              Malicious:true
                                                              Antivirus:
                                                              • Antivirus: Avira, Detection: 100%
                                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                                              Preview:MZ......................@.......................................x..j<.9<.9<.9?.t9I.9..8k.9S.49..9.ou9w.9..8M.9...82.9.7.9..91.I9u.9".:9..9'l590.9".=9/.9...8G.9R..8..9..8P.9S.39v.9?.u9i.9.7.9}.9..8..9".;9i.9..I9S.9Z.e9x.9?.w9..9A.v9,.9Rich<.9....................................................................................................................PE..d....\.T.........." .....f.....................@.............................@......).&...`..........................................0......h...d................................(...................................................................................text....w.......................... ..`.rdata.............................. ..`.crt1............................... ..`.rdata..............................@..@.data............ ..................@....pdata..F...........................@..@qwTG................................@....rsrc...............................@..@.reloc...(.......0..........
                                                              Process:C:\Windows\explorer.exe
                                                              File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):1069056
                                                              Entropy (8bit):5.550490003883871
                                                              Encrypted:false
                                                              SSDEEP:12288:UabbKACcbDWwVexYHi4mrh+IyiPU0D88nTtgO9HvjA3RlkuRCYJRB7laUqdezDk5:HaXcfWwgmKrhncQYlez5nGa84djgol
                                                              MD5:6CB715AEF46D67EA68C59050D21B4522
                                                              SHA1:F916645912DD962E8154073DF1AC4B707DFCC6D9
                                                              SHA-256:EEE2DC41DA43B9601CB388825FC261C2FB0BBE60C7D3103574DE06CA694F01A1
                                                              SHA-512:971829FD75C1917ED49CCFFD9990D7E6E77850B232BB34461C0BAA65F9B1A97E297BD797379CB46080E76038704994AFA3817874959D0426FD67130E782624E5
                                                              Malicious:true
                                                              Antivirus:
                                                              • Antivirus: Avira, Detection: 100%
                                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                                              Preview:MZ......................@.......................................x..j<.9<.9<.9?.t9I.9..8k.9S.49..9.ou9w.9..8M.9...82.9.7.9..91.I9u.9".:9..9'l590.9".=9/.9...8G.9R..8..9..8P.9S.39v.9?.u9i.9.7.9}.9..8..9".;9i.9..I9S.9Z.e9x.9?.w9..9A.v9,.9Rich<.9....................................................................................................................PE..d....\.T.........." .....f.....................@.............................P......).&...`..........................................0..W...h...d................................(...................................................................................text....w.......................... ..`.rdata.............................. ..`.crt1............................... ..`.rdata..............................@..@.data............ ..................@....pdata..F...........................@..@qwTG................................@....rsrc...............................@..@.reloc...(.......0..........
                                                              Process:C:\Windows\explorer.exe
                                                              File Type:ASCII text, with CRLF line terminators
                                                              Category:modified
                                                              Size (bytes):204
                                                              Entropy (8bit):5.018347992860809
                                                              Encrypted:false
                                                              SSDEEP:6:8u5TAdXceTAJOXL4hAdd923f9bA8yTlJYxUQ:8u5MdXXXsudqFEVSxUQ
                                                              MD5:60D9BF10F5BBC23ED46603A7E96335CD
                                                              SHA1:56C387E5FBCBB2A4B8743C626155708018CC1015
                                                              SHA-256:6CDF96C322D18F07F818C7BA846B1CEF9F907635A17733B59AFBFEB5589960E9
                                                              SHA-512:2732D71724087D00EBB9EEAE5C4A7D3BA9D219E05768478F8676AAE5437B0670BF2272DCF53AF10F27C378C812E8BE34DF61793C477F5CA52B51A0326D5FC2AD
                                                              Malicious:false
                                                              Preview:md C:\Windows\system32\CCAL..copy C:\Windows\system32\MDMAppInstaller.exe C:\Windows\system32\CCAL..move C:\Users\user\AppData\Local\Temp\KHNE9A4.tmp C:\Windows\system32\CCAL\WTSAPI32.dll..del %0 & exit
                                                              Process:C:\Windows\explorer.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):1451
                                                              Entropy (8bit):7.327678216261483
                                                              Encrypted:false
                                                              SSDEEP:24:nqXB8+xVUlTbLZi1ecX4i1509VRLg45UkBg7avUGK55c/bXwlzPrXRXmA:nq++rUlTRi1NB15ub09kBqe7wlzjXRXv
                                                              MD5:FB027688D1AE95BC43EFEBD156406E36
                                                              SHA1:440623C7FB1DA9860CA2A0543D10B4168C87E28E
                                                              SHA-256:9DC137B94E67305A9989FFA97AEEB98831D6931F19ACD0B67207344F756AA01A
                                                              SHA-512:051CBD81738899F933441D62B3D42C679680023B38B1F5D5441DC747F8A44F64F4BC3400F5341D1533D8164D2D703DB9819623D3C479B9F4EC7543DC1AEA4CDB
                                                              Malicious:false
                                                              Preview:........................................user.....................RSA1.................7....{.p..=........qp.wi.......".L.gG.=.t!.s..e.......,...e....}.i._.M<......\....<...EU$.m.....j..1K........ 4ukn....K.....................z..O...........Y.A....W......,...C.r.y.p.t.o.A.P.I. .P.r.i.v.a.t.e. .K.e.y....f...... ... ...*n...*.b&.....Q..B...pcrlcQ*............ ....)1.......,*.x...>.t.....Hf/......>...'..`f......o....t.S....36...as3..'5........L..{..5dE...b....aq...v.5._L..!.x6.?7N.6<H...0..e<mc.|%......s.bl..11.....Z=....A.[.n.UG{.....[._..M..A.J.,I..).b.-%.oJ<.....I.=...x.......k..P.<4..e`L.(.....n.0.......NN...l.C.z..l.Kny.....MnY.]p:%.b.4.....{N..f..{.X....0#..0...3..o.S3q5=M@...!..4........%.8*0|M ..h.l......>..GM .a....,`.....,.J......%.c@.....u..Y..f...%...b....A0pz0.0...\&[.a#3.......)}...F...O..\......Mv....).....O.O,..Y...od].R.....j....$."..].dM...z.Lmd.."d..x...K0.eM.x."....r...Z.....q...o.D+...m.8H.&....?.Q.R+..K..t.x......=.+...<
                                                              Process:C:\Windows\explorer.exe
                                                              File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Apr 13 03:46:15 2022, mtime=Wed Apr 13 03:46:15 2022, atime=Wed Apr 11 22:34:22 2018, length=209312, window=hide
                                                              Category:dropped
                                                              Size (bytes):858
                                                              Entropy (8bit):5.131205962827585
                                                              Encrypted:false
                                                              SSDEEP:12:8y8++Q4CNjyjCoscwY//W4xvuLkcF6j6QKtFS7DYjABmHdRsx2fd1Ucm:8yIOkFsc3u4xQAkxAqJm
                                                              MD5:C69B35724D08B9AA7E320619F47BC2AA
                                                              SHA1:D9D1E55F9B2D691085F36220C28813D8D4D772ED
                                                              SHA-256:863FB90F0016B1B2BCAD15CA9C075B4BFAC36B86283E996C834C1E87C16DF77A
                                                              SHA-512:443F6844FC5BBFE4FB861DD1998BE002448804E6F625A9EC29D6C0AB05F221204D2E3739F22D6759DD6C5D8647D5461631B52C6558DCEF13FB1E328C62ECC377
                                                              Malicious:false
                                                              Preview:L..................F.... ....0Rh.N...0Rh.N.........1........................:..DG..Yr?.D..U..k0.&...&...........-...my..3...=.h.N......t...CFSF..1......NM...AppData...t.Y^...H.g.3..(.....gVA.G..k...@.......NM..T.%.....Y.....................R..A.p.p.D.a.t.a...B.V.1......T.%..Roaming.@.......NM..T.%.....Y....................s...R.o.a.m.i.n.g.....P.1......T.%..R3POs.<......T.%.T.%..........................f.I.R.3.P.O.s.....`.2..1...LL. .wermgr.exe..F......T.%.T.%................t..........X..w.e.r.m.g.r...e.x.e......._...............-.......^............q.......C:\Users\user\AppData\Roaming\R3POs\wermgr.exe........\.....\.....\.....\.....\.R.3.P.O.s.\.w.e.r.m.g.r...e.x.e.`.......X.......computer..!a..%.H.VZAj......s.........W...!a..%.H.VZAj......s.........W..E.......9...1SPS..mD..pH.H@..=x.....h....H......K*..@.A..7sFJ............
                                                              Process:C:\Windows\System32\cmd.exe
                                                              File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):1069056
                                                              Entropy (8bit):5.550490003883871
                                                              Encrypted:false
                                                              SSDEEP:12288:UabbKACcbDWwVexYHi4mrh+IyiPU0D88nTtgO9HvjA3RlkuRCYJRB7laUqdezDk5:HaXcfWwgmKrhncQYlez5nGa84djgol
                                                              MD5:6CB715AEF46D67EA68C59050D21B4522
                                                              SHA1:F916645912DD962E8154073DF1AC4B707DFCC6D9
                                                              SHA-256:EEE2DC41DA43B9601CB388825FC261C2FB0BBE60C7D3103574DE06CA694F01A1
                                                              SHA-512:971829FD75C1917ED49CCFFD9990D7E6E77850B232BB34461C0BAA65F9B1A97E297BD797379CB46080E76038704994AFA3817874959D0426FD67130E782624E5
                                                              Malicious:false
                                                              Preview:MZ......................@.......................................x..j<.9<.9<.9?.t9I.9..8k.9S.49..9.ou9w.9..8M.9...82.9.7.9..91.I9u.9".:9..9'l590.9".=9/.9...8G.9R..8..9..8P.9S.39v.9?.u9i.9.7.9}.9..8..9".;9i.9..I9S.9Z.e9x.9?.w9..9A.v9,.9Rich<.9....................................................................................................................PE..d....\.T.........." .....f.....................@.............................P......).&...`..........................................0..W...h...d................................(...................................................................................text....w.......................... ..`.rdata.............................. ..`.crt1............................... ..`.rdata..............................@..@.data............ ..................@....pdata..F...........................@..@qwTG................................@....rsrc...............................@..@.reloc...(.......0..........
                                                              Process:C:\Windows\System32\cmd.exe
                                                              File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):209312
                                                              Entropy (8bit):6.796289498157116
                                                              Encrypted:false
                                                              SSDEEP:6144:swTMBboFMSuc/9NPXWPJROo/wVJyB60OHyLC7vs:swTMB02SD/mXO64c2Hyw
                                                              MD5:FF214585BF10206E21EA8EBA202FACFD
                                                              SHA1:1ED4AE92D235497F62610078D51105C4634AFADE
                                                              SHA-256:C48C430EB07ACC2FF8BDDD6057F5C9F72C2E83F67478F1E4A1792AF866711538
                                                              SHA-512:24073F60B886C58F227769B2DD7D1439DF841784E43E753265DA761801FDA58FBEEDAC4A642E0A6ABDA40A6263153FAA1A9540DF6D35E38BF0EE5327EA55B4FE
                                                              Malicious:true
                                                              Antivirus:
                                                              • Antivirus: Virustotal, Detection: 0%, Browse
                                                              • Antivirus: Metadefender, Detection: 0%, Browse
                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                              Joe Sandbox View:
                                                              • Filename: qNKCAaD6MH.dll, Detection: malicious, Browse
                                                              • Filename: CsUUaEi57B.dll, Detection: malicious, Browse
                                                              • Filename: GJSyxyXpqb.dll, Detection: malicious, Browse
                                                              • Filename: YCmvsk3Lmf.dll, Detection: malicious, Browse
                                                              • Filename: x95V65Z00v.dll, Detection: malicious, Browse
                                                              • Filename: GTSszLxygJ.dll, Detection: malicious, Browse
                                                              • Filename: 2k0c2Cohem.dll, Detection: malicious, Browse
                                                              • Filename: U4zqCpLYS2.dll, Detection: malicious, Browse
                                                              • Filename: b0kpce0t8F.dll, Detection: malicious, Browse
                                                              • Filename: QAUAey7NkL.dll, Detection: malicious, Browse
                                                              • Filename: Y4Gd7K2a8m.dll, Detection: malicious, Browse
                                                              • Filename: yPeVDkBY3n.dll, Detection: malicious, Browse
                                                              • Filename: td1i2JJWLZ.dll, Detection: malicious, Browse
                                                              • Filename: TDhTkVMvVd.dll, Detection: malicious, Browse
                                                              • Filename: ShmrlNrhab.dll, Detection: malicious, Browse
                                                              • Filename: knYgnOrOXk.dll, Detection: malicious, Browse
                                                              • Filename: Dk62bv8zDb.dll, Detection: malicious, Browse
                                                              • Filename: UVkobIdWdL.dll, Detection: malicious, Browse
                                                              • Filename: EeshGc2wcs.dll, Detection: malicious, Browse
                                                              • Filename: 3XSR1oCsva.dll, Detection: malicious, Browse
                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........(j.jI..jI..jI..c1...I...-..iI...-..qI..jI...H...-..mI...-..`I...-..KI...-..kI...-..kI..RichjI..................PE..d...p............"......,..........`(.........@.............................p.......................`......................................... .... ..0:...............!...`..\...@...T...........................`Q..............`R.. ...t........................text...++.......,.................. ..`.imrsiv......@...........................rdata.......P.......0..............@..@.data...X...........................@....pdata..............................@..@.didat..@...........................@....rsrc...0:... ...<..................@..@.reloc..\....`......................@..B................................................................................................................................................................................
                                                              Process:C:\Windows\System32\cmd.exe
                                                              File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):145920
                                                              Entropy (8bit):5.742854541048038
                                                              Encrypted:false
                                                              SSDEEP:3072:SfzsWjBQoVY9ZxvMlkD6F+UoOxsjlpfzX6:SfzsCBhy9dXUo+epfz
                                                              MD5:E2C777B6E3CE4C15C5657429A63787A3
                                                              SHA1:DFFC902982B618201D0DC46B91F1565DC7D04377
                                                              SHA-256:7E02DBE7D9D4CE4DA15AD56123B0B9809F004F5C64917910BB55C8073DAA92B8
                                                              SHA-512:2600F0CAE24C02DC64415E5A305AF7BB5B0CE97D9466F06D40430CFD03CE609A598BA10799E4D4A7EB7B1D95DD674F4E2522FA3767133786ED78FE5D7A2B3B05
                                                              Malicious:false
                                                              Antivirus:
                                                              • Antivirus: Metadefender, Detection: 0%, Browse
                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......OK7..*Y..*Y..*Y.dNZ..*Y.dN]..*Y.dN\..*Y.dNX.(*Y..*X..*Y.dNP..*Y.dN...*Y.dN[..*Y.Rich.*Y.........PE..d....$.6.........."......@...........:.........@....................................(.....`.......... ..........................................@....`.......@..4............p..........T....................R..(....Q..............8R......H...@....................text...k>.......@.................. ..`.rdata.......P.......D..............@..@.data...H....0......................@....pdata..4....@......................@..@.didat.......P......................@....rsrc........`.......0..............@..@.reloc.......p.......8..............@..B........................................................................................................................................................................................................................................
                                                              Process:C:\Windows\System32\cmd.exe
                                                              File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):1064960
                                                              Entropy (8bit):5.552014205230675
                                                              Encrypted:false
                                                              SSDEEP:12288:BabbKACcbDWwVexYHi4mrh+IyiPU0D88nTtgO9HvjA3RlkuRCYJRB7laUqdezDk5:MaXcfWwgmKrhncQYlez5nGa84djgol
                                                              MD5:0DDBAA45951517107B9702E6CCC87906
                                                              SHA1:370891865959F967B885A1EB9BFB459D73DF6105
                                                              SHA-256:6C7F57824FA935D6BAB9ED7127A484F05433BB12FB6A5B9A6581B1173C5A237A
                                                              SHA-512:421D4DCE4D4A521AA3CEC731D9FE1BE95A2510BB29B4493859EFEF6AF8816A4C274D261A349D23113A448A35F8AEBE1D3786788840DDB0D4DC5D2C7338F4683B
                                                              Malicious:false
                                                              Preview:MZ......................@.......................................x..j<.9<.9<.9?.t9I.9..8k.9S.49..9.ou9w.9..8M.9...82.9.7.9..91.I9u.9".:9..9'l590.9".=9/.9...8G.9R..8..9..8P.9S.39v.9?.u9i.9.7.9}.9..8..9".;9i.9..I9S.9Z.e9x.9?.w9..9A.v9,.9Rich<.9....................................................................................................................PE..d....\.T.........." .....f.....................@.............................@......).&...`..........................................0......h...d................................(...................................................................................text....w.......................... ..`.rdata.............................. ..`.crt1............................... ..`.rdata..............................@..@.data............ ..................@....pdata..F...........................@..@qwTG................................@....rsrc...............................@..@.reloc...(.......0..........
                                                              File type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                              Entropy (8bit):5.568391526693222
                                                              TrID:
                                                              • Win64 Dynamic Link Library (generic) (102004/3) 86.43%
                                                              • Win64 Executable (generic) (12005/4) 10.17%
                                                              • Generic Win/DOS Executable (2004/3) 1.70%
                                                              • DOS Executable Generic (2002/1) 1.70%
                                                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.01%
                                                              File name:x64.dll
                                                              File size:1060864
                                                              MD5:66ac9a127ebb19f915987c31cf67d8d3
                                                              SHA1:b90e008f65d129cd9ade9aa24a9e046d727ff3f6
                                                              SHA256:94c0cedd61450d24b1195538edcd623b734749553680a42b5b64bc6194c2126a
                                                              SHA512:ca0f1e93269456ab78e0ec00acc85310a30c7dfde9548b6898ba4694b1717ea2f3e09092431ffbf71431e8b9c7db04814b21fbef54f2a23f133c6a19f76717b8
                                                              SSDEEP:12288:cabbKACcbDWwVexYHi4mrh+IyiPU0D88nTtgO9HvjA3RlkuRCYJRB7laUqdezDk5:faXcfWwgmKrhncQYlez5nGa84djgol
                                                              TLSH:4D35CF4D492F1AC8D6A550F26B3387F6296EF4940420DEBD32B67025ED8DE7D8CC291B
                                                              File Content Preview:MZ......................@.......................................x..j<..9<..9<..9?.t9I..9...8k..9S.49...9.ou9w..9...8M..9...82..9.7.9...91.I9u..9".:9...9'l590..9".=9/..9...8G..9R..8...9...8P..9S.39v..9?.u9i..9.7.9}..9...8...9".;9i..9..I9S..9Z.e9x..9?.w9...
                                                              Icon Hash:74f0e4ecccdce0e4
                                                              Entrypoint:0x14002a5b0
                                                              Entrypoint Section:.crt1
                                                              Digitally signed:false
                                                              Imagebase:0x140000000
                                                              Subsystem:windows cui
                                                              Image File Characteristics:EXECUTABLE_IMAGE, DLL, LARGE_ADDRESS_AWARE
                                                              DLL Characteristics:TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
                                                              Time Stamp:0x54B45CFA [Mon Jan 12 23:47:06 2015 UTC]
                                                              TLS Callbacks:
                                                              CLR (.Net) Version:
                                                              OS Version Major:5
                                                              OS Version Minor:0
                                                              File Version Major:5
                                                              File Version Minor:0
                                                              Subsystem Version Major:5
                                                              Subsystem Version Minor:0
                                                              Import Hash:25c7ac00c91884fd2923a489ae9dfbca
                                                              Instruction
                                                              dec eax
                                                              mov dword ptr [00037CB9h], ecx
                                                              dec eax
                                                              mov dword ptr [00037CBAh], edx
                                                              dec eax
                                                              or dword ptr [00037CFBh], esi
                                                              dec eax
                                                              mov dword ptr [00037CFCh], edi
                                                              dec eax
                                                              mov dword ptr [00037CFDh], ebx
                                                              dec eax
                                                              mov dword ptr [00037CA6h], ebp
                                                              dec eax
                                                              mov dword ptr [00037CA7h], esp
                                                              dec esp
                                                              mov dword ptr [00037CA8h], eax
                                                              dec esp
                                                              mov dword ptr [00037CA9h], ecx
                                                              dec esp
                                                              mov dword ptr [00037CC2h], esp
                                                              dec esp
                                                              mov dword ptr [00037CB3h], ebp
                                                              dec esp
                                                              or dword ptr [00037CA4h], esi
                                                              dec esp
                                                              mov dword ptr [00037C95h], edi
                                                              dec eax
                                                              lea esi, dword ptr [FFFFD97Eh]
                                                              jmp esi
                                                              ud2
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              NameVirtual AddressVirtual Size Is in Section
                                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x1020100x8ee.ncm
                                                              IMAGE_DIRECTORY_ENTRY_IMPORT0x2ba680x64.rdata
                                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x9e0000xfc98.rsrc
                                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0xae0000x28bc.reloc
                                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x6100x0
                                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_IAT0x2b0000x90.rdata
                                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                              .text0x10000x2779e0x28000False0.761749267578data7.8179817907IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                              .rdata0x290000xea50x1000False0.048095703125data0.477776163924IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                              .crt10x2a0000x6fb0x1000False0.25634765625data2.77764805072IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                              .rdata0x2b0000xcc00x1000False0.44921875data4.04304284558IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                              .data0x2c0000x41e090x42000False0.577795780066data6.66561055311IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                              .pdata0x6e0000xb460x1000False0.0595703125data0.53656064431IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                              qwTG0x6f0000x2e9a20x2f000False0.818348986037data7.87184991211IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                              .rsrc0x9e0000xfc980x10000False0.223709106445data4.08759024615IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                              .reloc0xae0000x28bc0x3000False0.105550130208data5.14379878517IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                              .lqen0xb10000x451740x46000False0.0010498046875data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                              .vqb0xf70000x14550x2000False0.0037841796875data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                              .gjd0xf90000x128f0x2000False0.0037841796875data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                              .wqhqlp0xfb0000x1f2a0x2000False0.0037841796875data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                              .jriz0xfd0000x128f0x2000False0.0037841796875data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                              .ebkl0xff0000x23b0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                              .aoj0x1000000x12780x2000False0.0037841796875data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                              .ncm0x1020000x8fe0x1000False0.253662109375data3.69309347361IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                              NameRVASizeTypeLanguageCountry
                                                              RT_STRING0x9ee400x14adataEnglishUnited States
                                                              RT_STRING0x9ef900x310dataEnglishUnited States
                                                              RT_STRING0x9f2a00x162dataEnglishUnited States
                                                              RT_STRING0x9f4080x286dataEnglishUnited States
                                                              RT_STRING0x9f6900x1ccAmigaOS bitmap fontEnglishUnited States
                                                              RT_STRING0x9f8600x272dataEnglishUnited States
                                                              RT_STRING0x9fad80xeedataEnglishUnited States
                                                              RT_STRING0x9fbc80x144dataEnglishUnited States
                                                              RT_STRING0x9fd100xdadataEnglishUnited States
                                                              RT_STRING0x9fdf00x20edataEnglishUnited States
                                                              RT_STRING0xa00000x326dataEnglishUnited States
                                                              RT_STRING0xa03280x33adataEnglishUnited States
                                                              RT_STRING0xa06680x58cdataEnglishUnited States
                                                              RT_STRING0xa0bf80x2cadataEnglishUnited States
                                                              RT_STRING0xa0ec80x2cedataEnglishUnited States
                                                              RT_STRING0xa11980x3c6dataEnglishUnited States
                                                              RT_STRING0xa15600x41cdataEnglishUnited States
                                                              RT_STRING0xa19800x380dataEnglishUnited States
                                                              RT_STRING0xa1d000x408dataEnglishUnited States
                                                              RT_STRING0xa21080x4ccdataEnglishUnited States
                                                              RT_STRING0xa25d80x206dataEnglishUnited States
                                                              RT_STRING0xa27e00x50adataEnglishUnited States
                                                              RT_STRING0xa2cf00x168dataEnglishUnited States
                                                              RT_STRING0xa2e580x12adataEnglishUnited States
                                                              RT_STRING0xa2f880x36cdataEnglishUnited States
                                                              RT_STRING0xa32f80x2a8dataEnglishUnited States
                                                              RT_STRING0xa35a00x1dedataEnglishUnited States
                                                              RT_STRING0xa37800x3ecdataEnglishUnited States
                                                              RT_STRING0xa3b700x354dataEnglishUnited States
                                                              RT_STRING0xa3ec80x19cdataEnglishUnited States
                                                              RT_STRING0xa40680x27edataEnglishUnited States
                                                              RT_STRING0xa42e80x3d8dataEnglishUnited States
                                                              RT_STRING0xa46c00x396dataEnglishUnited States
                                                              RT_STRING0xa4a580x336dataEnglishUnited States
                                                              RT_STRING0xa4d900x242dataEnglishUnited States
                                                              RT_STRING0xa4fd80x1acdataEnglishUnited States
                                                              RT_STRING0xa51880x2f4dataEnglishUnited States
                                                              RT_STRING0xa54800x3ecdataEnglishUnited States
                                                              RT_STRING0xa58700x570dataEnglishUnited States
                                                              RT_STRING0xa5de00x3b2Hitachi SH big-endian COFF object file, not stripped, 9472 sections, symbol offset=0x4b004200, 83895552 symbols, optional header size 12544EnglishUnited States
                                                              RT_STRING0xa61980x3aadataEnglishUnited States
                                                              RT_STRING0xa65480x2c0dataEnglishUnited States
                                                              RT_STRING0xa68080x226dataEnglishUnited States
                                                              RT_STRING0xa6a300x248dataEnglishUnited States
                                                              RT_STRING0xa6c780x8f0dataEnglishUnited States
                                                              RT_STRING0xa75680x6aadataEnglishUnited States
                                                              RT_STRING0xa7c180x456dataEnglishUnited States
                                                              RT_STRING0xa80700x522dataEnglishUnited States
                                                              RT_STRING0xa85980x51cdataEnglishUnited States
                                                              RT_STRING0xa8ab80x492dataEnglishUnited States
                                                              RT_STRING0xa8f500x432dataEnglishUnited States
                                                              RT_STRING0xa93880x6ecdataEnglishUnited States
                                                              RT_STRING0xa9a780x214dataEnglishUnited States
                                                              RT_STRING0xa9c900x472AmigaOS bitmap fontEnglishUnited States
                                                              RT_STRING0xaa1080x3a2dataEnglishUnited States
                                                              RT_STRING0xaa4b00xb4dataEnglishUnited States
                                                              RT_STRING0xaa5680x466dataEnglishUnited States
                                                              RT_STRING0xaa9d00x4b2dataEnglishUnited States
                                                              RT_STRING0xaae880x312dataEnglishUnited States
                                                              RT_STRING0xab1a00x106dataEnglishUnited States
                                                              RT_STRING0xab2a80x24edataEnglishUnited States
                                                              RT_STRING0xab4f80x2b0dataEnglishUnited States
                                                              RT_STRING0xab7a80x392dataEnglishUnited States
                                                              RT_STRING0xabb400x34adataEnglishUnited States
                                                              RT_STRING0xabe900x404dataEnglishUnited States
                                                              RT_STRING0xac2980x3fcdataEnglishUnited States
                                                              RT_STRING0xac6980x27adataEnglishUnited States
                                                              RT_STRING0xac9180xa8dataEnglishUnited States
                                                              RT_STRING0xac9c00xdadataEnglishUnited States
                                                              RT_STRING0xacaa00x2b2dataEnglishUnited States
                                                              RT_STRING0xacd580x274dataEnglishUnited States
                                                              RT_STRING0xacfd00x37cdataEnglishUnited States
                                                              RT_STRING0xad3500x3fedataEnglishUnited States
                                                              RT_STRING0xad7500x2c0dataEnglishUnited States
                                                              RT_STRING0xada100x284dataEnglishUnited States
                                                              DLLImport
                                                              KERNEL32.dllGetBinaryTypeW, GetModuleFileNameW, GetExitCodeProcess, GetModuleHandleW, GetCurrentProcess, GetCurrentProcessId, GetUserDefaultUILanguage
                                                              USER32.dllSetProcessDefaultLayout, IsProcessDPIAware, ChildWindowFromPointEx, GetThreadDesktop
                                                              GDI32.dllGetCharWidthW, FlattenPath
                                                              ADVAPI32.dllInitiateSystemShutdownExW
                                                              NameOrdinalAddress
                                                              IsInteractiveUserSession10x140017388
                                                              QueryActiveSession20x140026c6c
                                                              QueryUserToken30x140004bc4
                                                              RegisterUsertokenForNoWinlogon40x1400052fc
                                                              WTSCloseServer50x14001e6dc
                                                              WTSConnectSessionA60x140008eb8
                                                              WTSConnectSessionW70x140011548
                                                              WTSCreateListenerA80x140002340
                                                              WTSCreateListenerW90x140017290
                                                              WTSDisconnectSession100x140025978
                                                              WTSEnableChildSessions110x14001e7b8
                                                              WTSEnumerateListenersA120x140027d54
                                                              WTSEnumerateListenersW130x140006740
                                                              WTSEnumerateProcessesA140x140015468
                                                              WTSEnumerateProcessesExA150x140001ccc
                                                              WTSEnumerateProcessesExW160x1400283d0
                                                              WTSEnumerateProcessesW170x140007568
                                                              WTSEnumerateServersA180x14001faec
                                                              WTSEnumerateServersW190x140016480
                                                              WTSEnumerateSessionsA200x14000f194
                                                              WTSEnumerateSessionsExA210x14001add4
                                                              WTSEnumerateSessionsExW220x140010c34
                                                              WTSEnumerateSessionsW230x140010830
                                                              WTSFreeMemory240x1400079e8
                                                              WTSFreeMemoryExA250x140001a10
                                                              WTSFreeMemoryExW260x14000d420
                                                              WTSGetChildSessionId270x140012468
                                                              WTSGetListenerSecurityA280x14002160c
                                                              WTSGetListenerSecurityW290x140022934
                                                              WTSIsChildSessionsEnabled300x14000e2b4
                                                              WTSLogoffSession310x140017848
                                                              WTSOpenServerA320x14000d7b0
                                                              WTSOpenServerExA330x140023da0
                                                              WTSOpenServerExW340x140014938
                                                              WTSOpenServerW350x14000b28c
                                                              WTSQueryListenerConfigA360x14000adf4
                                                              WTSQueryListenerConfigW370x140021de0
                                                              WTSQuerySessionInformationA380x140026480
                                                              WTSQuerySessionInformationW390x14000b01c
                                                              WTSQueryUserConfigA400x14001ef04
                                                              WTSQueryUserConfigW410x140018ee4
                                                              WTSQueryUserToken420x1400161ac
                                                              WTSRegisterSessionNotification430x1400247a8
                                                              WTSRegisterSessionNotificationEx440x1400234c4
                                                              WTSSendMessageA450x140011c24
                                                              WTSSendMessageW460x140020f44
                                                              WTSSetListenerSecurityA470x140019a50
                                                              WTSSetListenerSecurityW480x1400010a8
                                                              WTSSetRenderHint490x140019d14
                                                              WTSSetSessionInformationA500x14000c4d4
                                                              WTSSetSessionInformationW510x140002d30
                                                              WTSSetUserConfigA520x140028434
                                                              WTSSetUserConfigW530x140024668
                                                              WTSShutdownSystem540x140016b6c
                                                              WTSStartRemoteControlSessionA550x140008fc0
                                                              WTSStartRemoteControlSessionW560x140010620
                                                              WTSStopRemoteControlSession570x14001f8fc
                                                              WTSTerminateProcess580x140004a04
                                                              WTSUnRegisterSessionNotification590x1400135e0
                                                              WTSUnRegisterSessionNotificationEx600x140002d0c
                                                              WTSVirtualChannelClose610x140028138
                                                              WTSVirtualChannelOpen620x14001f368
                                                              WTSVirtualChannelOpenEx630x140003fbc
                                                              WTSVirtualChannelPurgeInput640x140009418
                                                              WTSVirtualChannelPurgeOutput650x1400088c4
                                                              WTSVirtualChannelQuery660x1400214e4
                                                              WTSVirtualChannelRead670x140002f3c
                                                              WTSVirtualChannelWrite680x140013f94
                                                              WTSWaitSystemEvent690x140004dac
                                                              Language of compilation systemCountry where language is spokenMap
                                                              EnglishUnited States
                                                              No network behavior found

                                                              Code Manipulations

                                                              Function NameHook TypeActive in Processes
                                                              ZwSetEventINLINEexplorer.exe
                                                              RtlAllocateMemoryBlockLookasideINLINEexplorer.exe
                                                              RtlAllocateMemoryZoneINLINEexplorer.exe
                                                              NtSetEventINLINEexplorer.exe
                                                              Function NameHook TypeNew Data
                                                              ZwSetEventINLINE0xE9 0x9B 0xBB 0xB5 0x5E 0xEF
                                                              RtlAllocateMemoryBlockLookasideINLINE0x48 0x88 0x89 0x9E 0xE0 0x03
                                                              RtlAllocateMemoryZoneINLINE0x8D 0xDA 0xAC 0xC2 0x24 0x49
                                                              NtSetEventINLINE0xE9 0x9B 0xBB 0xB5 0x5E 0xEF

                                                              Click to jump to process

                                                              Click to jump to process

                                                              Click to dive into process behavior distribution

                                                              Click to jump to process

                                                              Target ID:1
                                                              Start time:21:45:11
                                                              Start date:12/04/2022
                                                              Path:C:\Windows\System32\loaddll64.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:loaddll64.exe "C:\Users\user\Desktop\x64.dll"
                                                              Imagebase:0x7ff60a190000
                                                              File size:140288 bytes
                                                              MD5 hash:4E8A40CAD6CCC047914E3A7830A2D8AA
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Yara matches:
                                                              • Rule: JoeSecurity_Dridex_2, Description: Yara detected Dridex unpacked file, Source: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                              Reputation:moderate

                                                              Target ID:2
                                                              Start time:21:45:11
                                                              Start date:12/04/2022
                                                              Path:C:\Windows\System32\cmd.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\x64.dll",#1
                                                              Imagebase:0x7ff602050000
                                                              File size:273920 bytes
                                                              MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high

                                                              Target ID:3
                                                              Start time:21:45:12
                                                              Start date:12/04/2022
                                                              Path:C:\Windows\System32\rundll32.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:rundll32.exe C:\Users\user\Desktop\x64.dll,IsInteractiveUserSession
                                                              Imagebase:0x7ff6d35e0000
                                                              File size:69632 bytes
                                                              MD5 hash:73C519F050C20580F8A62C849D49215A
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Yara matches:
                                                              • Rule: JoeSecurity_Dridex_2, Description: Yara detected Dridex unpacked file, Source: 00000003.00000002.508980143.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                              Reputation:high

                                                              Target ID:4
                                                              Start time:21:45:12
                                                              Start date:12/04/2022
                                                              Path:C:\Windows\System32\rundll32.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:rundll32.exe "C:\Users\user\Desktop\x64.dll",#1
                                                              Imagebase:0x7ff6d35e0000
                                                              File size:69632 bytes
                                                              MD5 hash:73C519F050C20580F8A62C849D49215A
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Yara matches:
                                                              • Rule: JoeSecurity_Dridex_2, Description: Yara detected Dridex unpacked file, Source: 00000004.00000002.415891174.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                              Reputation:high

                                                              Target ID:5
                                                              Start time:21:45:14
                                                              Start date:12/04/2022
                                                              Path:C:\Windows\explorer.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:C:\Windows\Explorer.EXE
                                                              Imagebase:0x7ff74fc70000
                                                              File size:3933184 bytes
                                                              MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high

                                                              Target ID:6
                                                              Start time:21:45:15
                                                              Start date:12/04/2022
                                                              Path:C:\Windows\System32\rundll32.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:rundll32.exe C:\Users\user\Desktop\x64.dll,QueryActiveSession
                                                              Imagebase:0x7ff6d35e0000
                                                              File size:69632 bytes
                                                              MD5 hash:73C519F050C20580F8A62C849D49215A
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Yara matches:
                                                              • Rule: JoeSecurity_Dridex_2, Description: Yara detected Dridex unpacked file, Source: 00000006.00000002.421971716.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                              Reputation:high

                                                              Target ID:8
                                                              Start time:21:45:19
                                                              Start date:12/04/2022
                                                              Path:C:\Windows\System32\rundll32.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:rundll32.exe C:\Users\user\Desktop\x64.dll,QueryUserToken
                                                              Imagebase:0x7ff6d35e0000
                                                              File size:69632 bytes
                                                              MD5 hash:73C519F050C20580F8A62C849D49215A
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Yara matches:
                                                              • Rule: JoeSecurity_Dridex_2, Description: Yara detected Dridex unpacked file, Source: 00000008.00000002.429395051.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                              Reputation:high

                                                              Target ID:16
                                                              Start time:21:46:11
                                                              Start date:12/04/2022
                                                              Path:C:\Windows\System32\wermgr.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:C:\Windows\system32\wermgr.exe
                                                              Imagebase:0x7ff6bd590000
                                                              File size:209312 bytes
                                                              MD5 hash:FF214585BF10206E21EA8EBA202FACFD
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high

                                                              Target ID:17
                                                              Start time:21:46:13
                                                              Start date:12/04/2022
                                                              Path:C:\Windows\System32\cmd.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:"C:\Windows\system32\cmd.exe" /c C:\Users\user\AppData\Local\Temp\Cjaq.cmd
                                                              Imagebase:0x7ff602050000
                                                              File size:273920 bytes
                                                              MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high

                                                              Target ID:20
                                                              Start time:21:46:14
                                                              Start date:12/04/2022
                                                              Path:C:\Windows\System32\conhost.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                              Imagebase:0x7ff77f440000
                                                              File size:625664 bytes
                                                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high

                                                              Target ID:24
                                                              Start time:21:46:25
                                                              Start date:12/04/2022
                                                              Path:C:\Users\user\AppData\Roaming\R3POs\wermgr.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:"C:\Users\user\AppData\Roaming\R3POs\wermgr.exe"
                                                              Imagebase:0x7ff7e4380000
                                                              File size:209312 bytes
                                                              MD5 hash:FF214585BF10206E21EA8EBA202FACFD
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Yara matches:
                                                              • Rule: JoeSecurity_Dridex_2, Description: Yara detected Dridex unpacked file, Source: 00000018.00000002.622884365.0000000140001000.00000020.00000001.01000000.0000000C.sdmp, Author: Joe Security
                                                              Antivirus matches:
                                                              • Detection: 0%, Virustotal, Browse
                                                              • Detection: 0%, Metadefender, Browse
                                                              • Detection: 0%, ReversingLabs

                                                              Target ID:25
                                                              Start time:21:46:26
                                                              Start date:12/04/2022
                                                              Path:C:\Windows\System32\MDMAppInstaller.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:C:\Windows\system32\MDMAppInstaller.exe
                                                              Imagebase:0x7ff7b4780000
                                                              File size:145920 bytes
                                                              MD5 hash:E2C777B6E3CE4C15C5657429A63787A3
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language

                                                              Target ID:26
                                                              Start time:21:46:31
                                                              Start date:12/04/2022
                                                              Path:C:\Windows\System32\cmd.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:"C:\Windows\system32\cmd.exe" /c C:\Users\user\AppData\Local\Temp\tkcfGo.cmd
                                                              Imagebase:0x7ff602050000
                                                              File size:273920 bytes
                                                              MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language

                                                              Target ID:27
                                                              Start time:21:46:32
                                                              Start date:12/04/2022
                                                              Path:C:\Windows\System32\conhost.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                              Imagebase:0x7ff77f440000
                                                              File size:625664 bytes
                                                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language

                                                              Target ID:28
                                                              Start time:21:46:34
                                                              Start date:12/04/2022
                                                              Path:C:\Users\user\AppData\Roaming\R3POs\wermgr.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:"C:\Users\user\AppData\Roaming\R3POs\wermgr.exe"
                                                              Imagebase:0x7ff7e4380000
                                                              File size:209312 bytes
                                                              MD5 hash:FF214585BF10206E21EA8EBA202FACFD
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Yara matches:
                                                              • Rule: JoeSecurity_Dridex_2, Description: Yara detected Dridex unpacked file, Source: 0000001C.00000002.595393684.0000000140001000.00000020.00000001.01000000.0000000C.sdmp, Author: Joe Security

                                                              Target ID:29
                                                              Start time:21:46:34
                                                              Start date:12/04/2022
                                                              Path:C:\Windows\System32\schtasks.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:"C:\Windows\System32\schtasks.exe" /Create /F /TN "Jvadjthzpd" /TR C:\Windows\system32\CCAL\MDMAppInstaller.exe /SC minute /MO 60 /RL highest
                                                              Imagebase:0x7ff701990000
                                                              File size:226816 bytes
                                                              MD5 hash:838D346D1D28F00783B7A6C6BD03A0DA
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language

                                                              Target ID:30
                                                              Start time:21:46:36
                                                              Start date:12/04/2022
                                                              Path:C:\Windows\System32\conhost.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                              Imagebase:0x7ff77f440000
                                                              File size:625664 bytes
                                                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language

                                                              Target ID:31
                                                              Start time:21:46:37
                                                              Start date:12/04/2022
                                                              Path:C:\Windows\System32\CCAL\MDMAppInstaller.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:C:\Windows\system32\CCAL\MDMAppInstaller.exe
                                                              Imagebase:0x7ff6c5240000
                                                              File size:145920 bytes
                                                              MD5 hash:E2C777B6E3CE4C15C5657429A63787A3
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Yara matches:
                                                              • Rule: JoeSecurity_Dridex_2, Description: Yara detected Dridex unpacked file, Source: 0000001F.00000002.604615787.0000000140001000.00000020.00000001.01000000.0000000E.sdmp, Author: Joe Security
                                                              Antivirus matches:
                                                              • Detection: 0%, Metadefender, Browse
                                                              • Detection: 0%, ReversingLabs

                                                              Target ID:33
                                                              Start time:21:46:43
                                                              Start date:12/04/2022
                                                              Path:C:\Users\user\AppData\Roaming\R3POs\wermgr.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:"C:\Users\user\AppData\Roaming\R3POs\wermgr.exe"
                                                              Imagebase:0x7ff7e4380000
                                                              File size:209312 bytes
                                                              MD5 hash:FF214585BF10206E21EA8EBA202FACFD
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Yara matches:
                                                              • Rule: JoeSecurity_Dridex_2, Description: Yara detected Dridex unpacked file, Source: 00000021.00000002.611146050.0000000140001000.00000020.00000001.01000000.0000000C.sdmp, Author: Joe Security

                                                              Target ID:34
                                                              Start time:21:46:56
                                                              Start date:12/04/2022
                                                              Path:C:\Windows\System32\schtasks.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:schtasks.exe /Query /TN "Jvadjthzpd"
                                                              Imagebase:0x7ff701990000
                                                              File size:226816 bytes
                                                              MD5 hash:838D346D1D28F00783B7A6C6BD03A0DA
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language

                                                              Target ID:35
                                                              Start time:21:46:57
                                                              Start date:12/04/2022
                                                              Path:C:\Windows\System32\conhost.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                              Imagebase:0x7ff77f440000
                                                              File size:625664 bytes
                                                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language

                                                              Target ID:36
                                                              Start time:21:47:20
                                                              Start date:12/04/2022
                                                              Path:C:\Windows\System32\schtasks.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:schtasks.exe /Query /TN "Jvadjthzpd"
                                                              Imagebase:0x7ff701990000
                                                              File size:226816 bytes
                                                              MD5 hash:838D346D1D28F00783B7A6C6BD03A0DA
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language

                                                              Target ID:37
                                                              Start time:21:47:21
                                                              Start date:12/04/2022
                                                              Path:C:\Windows\System32\conhost.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                              Imagebase:0x7ff77f440000
                                                              File size:625664 bytes
                                                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language

                                                              Target ID:38
                                                              Start time:21:47:42
                                                              Start date:12/04/2022
                                                              Path:C:\Windows\System32\schtasks.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:schtasks.exe /Query /TN "Jvadjthzpd"
                                                              Imagebase:0x7ff701990000
                                                              File size:226816 bytes
                                                              MD5 hash:838D346D1D28F00783B7A6C6BD03A0DA
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language

                                                              Target ID:39
                                                              Start time:21:47:43
                                                              Start date:12/04/2022
                                                              Path:C:\Windows\System32\conhost.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                              Imagebase:0x7ff77f440000
                                                              File size:625664 bytes
                                                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language

                                                              Target ID:40
                                                              Start time:21:48:04
                                                              Start date:12/04/2022
                                                              Path:C:\Windows\System32\schtasks.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:schtasks.exe /Query /TN "Jvadjthzpd"
                                                              Imagebase:0x7ff701990000
                                                              File size:226816 bytes
                                                              MD5 hash:838D346D1D28F00783B7A6C6BD03A0DA
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language

                                                              Target ID:41
                                                              Start time:21:48:05
                                                              Start date:12/04/2022
                                                              Path:C:\Windows\System32\conhost.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                              Imagebase:0x7ff77f440000
                                                              File size:625664 bytes
                                                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language

                                                              Target ID:42
                                                              Start time:21:48:26
                                                              Start date:12/04/2022
                                                              Path:C:\Windows\System32\schtasks.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:schtasks.exe /Query /TN "Jvadjthzpd"
                                                              Imagebase:0x7ff701990000
                                                              File size:226816 bytes
                                                              MD5 hash:838D346D1D28F00783B7A6C6BD03A0DA
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language

                                                              Target ID:43
                                                              Start time:21:48:26
                                                              Start date:12/04/2022
                                                              Path:C:\Windows\System32\conhost.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                              Imagebase:0x7ff77f440000
                                                              File size:625664 bytes
                                                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language

                                                              Target ID:44
                                                              Start time:21:48:47
                                                              Start date:12/04/2022
                                                              Path:C:\Windows\System32\schtasks.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:schtasks.exe /Query /TN "Jvadjthzpd"
                                                              Imagebase:0x7ff701990000
                                                              File size:226816 bytes
                                                              MD5 hash:838D346D1D28F00783B7A6C6BD03A0DA
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language

                                                              Target ID:45
                                                              Start time:21:48:48
                                                              Start date:12/04/2022
                                                              Path:C:\Windows\System32\conhost.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                              Imagebase:0x7ff77f440000
                                                              File size:625664 bytes
                                                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language

                                                              Target ID:46
                                                              Start time:21:49:09
                                                              Start date:12/04/2022
                                                              Path:C:\Windows\System32\schtasks.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:schtasks.exe /Query /TN "Jvadjthzpd"
                                                              Imagebase:0x7ff701990000
                                                              File size:226816 bytes
                                                              MD5 hash:838D346D1D28F00783B7A6C6BD03A0DA
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language

                                                              Target ID:47
                                                              Start time:21:49:09
                                                              Start date:12/04/2022
                                                              Path:C:\Windows\System32\conhost.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                              Imagebase:0x7ff77f440000
                                                              File size:625664 bytes
                                                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language

                                                              Reset < >

                                                                Execution Graph

                                                                Execution Coverage:2.8%
                                                                Dynamic/Decrypted Code Coverage:100%
                                                                Signature Coverage:22.5%
                                                                Total number of Nodes:565
                                                                Total number of Limit Nodes:61
                                                                execution_graph 61217 1400039fc 17 API calls 61218 140049dfc 17 API calls 61233 140018638 23 API calls 61100 140001048 15 API calls 61250 140028e84 16 API calls 61259 14001beb4 21 API calls 61120 1400150b8 20 API calls 60414 22245a32924 60415 22245a32932 60414->60415 60420 22245a31ff9 VirtualAlloc 60415->60420 60417 22245a3294e 60422 22245a321ff 60417->60422 60419 22245a32966 60421 22245a32060 60420->60421 60421->60417 60423 22245a322a7 60422->60423 60424 22245a32320 VirtualProtect 60422->60424 60423->60424 60425 22245a3238a 60424->60425 60426 22245a323ef VirtualProtect 60425->60426 60427 22245a324a9 VirtualProtect 60426->60427 60428 22245a324e6 60426->60428 60427->60428 60430 22245a32564 60428->60430 60431 22245a3252e RtlAvlRemoveNode 60428->60431 60430->60419 60431->60430 61126 14002c0c4 21 API calls 61265 140019ac4 24 API calls 61271 14000f283 21 API calls 61273 140033ad8 16 API calls 61277 1400162e0 19 API calls 61282 140048aea 17 API calls 61147 140018520 20 API calls 61159 140005950 18 API calls 61161 140001158 22 API calls 60432 140052d80 60433 140052db4 60432->60433 60434 140052da4 60432->60434 60436 14003ef5c 15 API calls 60433->60436 60434->60433 60435 140052dd8 60434->60435 60461 14003ef5c 60435->60461 60445 140052dc3 60436->60445 60439 14003ef5c 15 API calls 60442 140052e90 60439->60442 60440 140052ee3 60441 14003ef5c 15 API calls 60440->60441 60441->60445 60442->60440 60443 140052ed4 60442->60443 60444 140052f20 60442->60444 60446 14003ef5c 15 API calls 60443->60446 60471 1400416a4 60444->60471 60446->60440 60450 140052f66 60476 140053140 60450->60476 60453 140052f86 60492 14005343c 15 API calls 60453->60492 60454 140052f92 60493 140053318 15 API calls 60454->60493 60457 140052f90 60458 14003ef5c 15 API calls 60457->60458 60458->60445 60459 140052f9a 60459->60445 60494 14005343c 15 API calls 60459->60494 60462 14003ef72 60461->60462 60463 14003ef98 60462->60463 60495 14003deec 60462->60495 60463->60439 60466 14003ef8d 60466->60463 60511 14003f06c 60466->60511 60470 14003deec 15 API calls 60470->60466 60472 1400416bb 60471->60472 60474 1400416d4 60471->60474 60473 14003ef5c 15 API calls 60472->60473 60472->60474 60473->60474 60475 140053018 15 API calls 60474->60475 60475->60450 60487 140052f82 60476->60487 60488 140053165 60476->60488 60478 1400532e8 60479 14003ef5c 15 API calls 60478->60479 60479->60487 60481 1400531e3 60482 14003ef5c 15 API calls 60481->60482 60483 1400531f2 60482->60483 60484 14003ef5c 15 API calls 60483->60484 60484->60487 60485 14003ef5c 15 API calls 60485->60488 60486 1400532ac 60489 14003ef5c 15 API calls 60486->60489 60487->60453 60487->60454 60488->60478 60488->60481 60488->60485 60488->60486 60488->60487 61052 14003ffc4 15 API calls 60488->61052 61053 1400419a8 60488->61053 60490 1400532c3 60489->60490 60491 14003ef5c 15 API calls 60490->60491 60491->60487 60492->60457 60493->60459 60494->60457 60498 14003df19 60495->60498 60496 14003e07c 60496->60466 60528 140040370 60496->60528 60498->60496 60499 14003e063 60498->60499 60602 14004f22c 60498->60602 60499->60496 60500 14003e0a1 60499->60500 60502 14003e17c 60499->60502 60501 14003e13e 60500->60501 60507 14003e0d7 60500->60507 60504 140045db4 15 API calls 60501->60504 60503 14003e1bb 60502->60503 60505 140045d10 15 API calls 60502->60505 60506 14003ef5c 15 API calls 60503->60506 60504->60496 60505->60502 60506->60496 60508 14003e110 60507->60508 60606 140045d10 60507->60606 60609 140045db4 60508->60609 60513 14003f08b 60511->60513 60512 14003f099 60512->60463 60513->60512 60514 14004f22c 15 API calls 60513->60514 60515 14003f12d 60513->60515 60514->60513 60516 14003f18e 60515->60516 60517 14003ef5c 15 API calls 60515->60517 60516->60512 60519 14003f20a 60516->60519 60520 14003f2f0 60516->60520 60517->60516 60518 14003f2b3 60634 140044268 15 API calls 60518->60634 60519->60518 60524 14003f23f 60519->60524 60521 14003f32e 60520->60521 60523 1400441c4 15 API calls 60520->60523 60523->60520 60525 14003f278 60524->60525 60630 1400441c4 60524->60630 60633 140044268 15 API calls 60525->60633 60529 140045d10 14 API calls 60528->60529 60530 14004038d 60529->60530 60531 140045d10 14 API calls 60530->60531 60532 14004039c 60531->60532 60639 14003e944 60532->60639 60535 140045db4 14 API calls 60536 1400403be 60535->60536 60654 140045d88 60536->60654 60543 1400472e4 14 API calls 60544 1400403f6 60543->60544 60545 1400472e4 14 API calls 60544->60545 60546 140040401 60545->60546 60547 1400472e4 14 API calls 60546->60547 60548 14004040c 60547->60548 60549 1400472e4 14 API calls 60548->60549 60550 140040417 60549->60550 60665 140045d60 60550->60665 60554 140045d88 14 API calls 60560 140040699 60554->60560 60555 140045d60 14 API calls 60566 140040453 60555->60566 60556 1400406bf 60557 140045d88 14 API calls 60556->60557 60559 1400406d5 60557->60559 60561 140045d88 14 API calls 60559->60561 60560->60556 60711 1400496f0 15 API calls 60560->60711 60601 14003efa9 60561->60601 60564 14004049c 60565 140045d88 14 API calls 60564->60565 60567 1400404a9 60565->60567 60566->60555 60566->60564 60568 140045d88 14 API calls 60566->60568 60593 140040661 60566->60593 60685 140045fe8 60566->60685 60688 140047360 60566->60688 60701 140049840 60566->60701 60695 140045d34 60567->60695 60568->60566 60572 140047f7c 14 API calls 60573 1400404cf 60572->60573 60698 140040dd0 60573->60698 60575 1400404f5 60576 14003ef5c 14 API calls 60575->60576 60577 140040568 60576->60577 60578 14004059f 60577->60578 60580 14004057f LdrLoadDll 60577->60580 60579 1400405b7 60578->60579 60585 1400405a3 60578->60585 60707 140040eec 60579->60707 60580->60578 60580->60585 60582 140040eec 14 API calls 60584 140040647 60582->60584 60587 140045d88 14 API calls 60584->60587 60585->60582 60586 140045d88 14 API calls 60588 1400405d1 60586->60588 60589 140040654 60587->60589 60590 140045d88 14 API calls 60588->60590 60591 140045d88 14 API calls 60589->60591 60592 1400405de 60590->60592 60591->60593 60594 140045d88 14 API calls 60592->60594 60593->60554 60598 1400405e8 60594->60598 60595 14004060e 60596 140045d88 14 API calls 60595->60596 60597 140040624 60596->60597 60599 140045d88 14 API calls 60597->60599 60598->60595 60710 1400496f0 15 API calls 60598->60710 60599->60601 60601->60463 60601->60470 60604 14004f243 60602->60604 60603 14003ef5c 15 API calls 60603->60604 60604->60603 60605 14004f247 60604->60605 60605->60498 60613 140047124 60606->60613 60610 140045dc1 60609->60610 60611 140045dcc 60609->60611 60623 140048370 60610->60623 60611->60496 60614 140047139 60613->60614 60615 140045d2b 60614->60615 60617 140041a14 60614->60617 60615->60507 60618 140041970 60617->60618 60619 14004199f 60618->60619 60620 14003ef5c 14 API calls 60618->60620 60619->60615 60621 14004198c 60620->60621 60621->60619 60622 140041991 RtlDeleteBoundaryDescriptor 60621->60622 60622->60619 60624 140048388 60623->60624 60625 140048390 60623->60625 60624->60625 60629 14004839c 60624->60629 60626 140047124 15 API calls 60625->60626 60628 14004839a 60626->60628 60627 140047124 15 API calls 60627->60628 60628->60611 60629->60627 60635 140045ac0 60630->60635 60633->60512 60634->60512 60637 140045ad1 60635->60637 60636 1400441df 60636->60524 60637->60636 60638 140041a14 15 API calls 60637->60638 60638->60636 60712 140040a68 60639->60712 60641 14003e954 60642 14003e9d9 60641->60642 60643 140045d10 15 API calls 60641->60643 60644 140045d34 15 API calls 60642->60644 60645 14003e97b 60643->60645 60646 14003e9e9 60644->60646 60647 14003ef5c 15 API calls 60645->60647 60646->60535 60648 14003e98a 60647->60648 60649 14003e9bd 60648->60649 60651 1400472e4 15 API calls 60648->60651 60650 140045db4 15 API calls 60649->60650 60652 14003e9cf 60650->60652 60651->60649 60653 140045d88 15 API calls 60652->60653 60653->60642 60655 140041a14 15 API calls 60654->60655 60656 1400403cb 60655->60656 60657 140047f7c 60656->60657 60658 140047f91 60657->60658 60660 1400403e0 60657->60660 60659 140047124 15 API calls 60658->60659 60658->60660 60659->60660 60661 1400472e4 60660->60661 60662 1400403eb 60661->60662 60664 140047302 60661->60664 60662->60543 60663 140047124 15 API calls 60663->60662 60664->60663 60666 140048370 15 API calls 60665->60666 60667 140040445 60666->60667 60668 14004971c 60667->60668 60669 140049724 60668->60669 60726 14003eb14 60669->60726 60672 14003ef5c 14 API calls 60673 14004974c 60672->60673 60674 140049751 FindFirstFileExW 60673->60674 60675 1400497bc 60673->60675 60676 1400497a6 60674->60676 60677 140049789 60674->60677 60675->60676 60749 1400496f0 15 API calls 60675->60749 60678 140049825 60676->60678 60682 1400497f0 60676->60682 60677->60676 60748 1400496f0 15 API calls 60677->60748 60750 140040b40 60678->60750 60683 140049840 14 API calls 60682->60683 60684 140049810 60682->60684 60683->60684 60684->60566 60686 140048370 15 API calls 60685->60686 60687 140046010 60686->60687 60687->60566 61034 140046f70 60688->61034 60691 140045cdc 15 API calls 60692 14004737d 60691->60692 60693 140041a14 15 API calls 60692->60693 60694 14004738f 60693->60694 60694->60566 60696 140048370 15 API calls 60695->60696 60697 1400404ba 60696->60697 60697->60572 60699 140040bc0 15 API calls 60698->60699 60700 140040e00 60699->60700 60700->60575 60705 140049855 60701->60705 60702 14003ef5c 14 API calls 60702->60705 60703 1400498a3 60703->60566 60704 140049869 FindNextFileW 60704->60705 60705->60702 60705->60703 60705->60704 60706 140040b40 14 API calls 60705->60706 60706->60705 60708 140041a14 15 API calls 60707->60708 60709 1400405c4 60708->60709 60709->60586 60710->60595 60711->60556 60713 140040a90 60712->60713 60725 140040a85 60712->60725 60714 140045d10 15 API calls 60713->60714 60713->60725 60715 140040ab6 60714->60715 60716 140045d10 15 API calls 60715->60716 60717 140040ac2 60716->60717 60718 140045d10 15 API calls 60717->60718 60719 140040ace 60718->60719 60720 140045d10 15 API calls 60719->60720 60721 140040ada 60720->60721 60722 140045d10 15 API calls 60721->60722 60724 140040ae6 60722->60724 60723 140045d10 15 API calls 60723->60724 60724->60723 60724->60725 60725->60641 60727 14003eca9 60726->60727 60728 14003eb3d 60726->60728 60729 14003ec69 60728->60729 60753 140041654 60728->60753 60729->60672 60732 14003ef5c 14 API calls 60733 14003eb75 60732->60733 60757 14003ecbc 60733->60757 60740 14003ec3b 60862 14003f62c 60740->60862 60741 14003ec0e 60891 14003f408 15 API calls 60741->60891 60744 14003ec13 60745 14003ef5c 14 API calls 60744->60745 60746 14003ec5a 60745->60746 60746->60729 60747 14003ec5f GetSystemInfo 60746->60747 60747->60729 60748->60676 60749->60676 60751 14003ef5c 15 API calls 60750->60751 60752 140040b53 60751->60752 60752->60684 60754 14004166c 60753->60754 60756 14003eb5e 60753->60756 60755 14003ef5c 15 API calls 60754->60755 60754->60756 60755->60756 60756->60732 60758 14003ef5c 13 API calls 60757->60758 60759 14003ece2 60758->60759 60760 14003ef46 60759->60760 60762 14003ef5c 13 API calls 60759->60762 60763 14003ebd4 60759->60763 60761 140040b40 13 API calls 60760->60761 60761->60763 60764 14003ed31 60762->60764 60795 140040784 60763->60795 60765 14003ed63 60764->60765 60766 14003ed39 GetTokenInformation 60764->60766 60768 14003ef06 60765->60768 60769 140040dd0 13 API calls 60765->60769 60766->60765 60767 14003ef25 60766->60767 60770 140040b40 13 API calls 60767->60770 60768->60763 60772 140042c54 13 API calls 60768->60772 60771 14003ed7c 60769->60771 60770->60765 60773 14003ef5c 13 API calls 60771->60773 60772->60763 60775 14003ed8b 60773->60775 60774 140040eec 13 API calls 60774->60768 60776 14003edb0 GetTokenInformation 60775->60776 60788 14003eebc 60775->60788 60777 14003edd6 60776->60777 60778 14003ef3d 60776->60778 60781 14003ef5c 13 API calls 60777->60781 60779 140040b40 13 API calls 60778->60779 60780 14003ef42 60779->60780 60780->60760 60780->60788 60782 14003ee0e 60781->60782 60784 140040b40 13 API calls 60782->60784 60786 14003ee59 60782->60786 60782->60788 60783 14003ee9f 60783->60788 60896 14003f350 15 API calls 60783->60896 60784->60786 60785 14003ef5c 13 API calls 60785->60786 60786->60783 60786->60785 60786->60788 60789 14003eebe 60786->60789 60788->60774 60790 14003eedb 60789->60790 60897 14003f350 15 API calls 60789->60897 60792 140040eec 13 API calls 60790->60792 60793 14003eee5 60792->60793 60793->60763 60892 140042c54 60793->60892 60796 14003eb14 15 API calls 60795->60796 60797 140040794 60796->60797 60798 140040dd0 15 API calls 60797->60798 60818 14003ebdf 60797->60818 60800 1400407bb 60798->60800 60801 1400407fe 60800->60801 60898 140041330 60800->60898 60901 14004a144 60801->60901 60804 140040eec 15 API calls 60805 140040820 60804->60805 60906 14004a1e8 60805->60906 60807 140040834 60917 14004a448 60807->60917 60812 140040895 60814 14004a1e8 15 API calls 60812->60814 60813 140040853 60815 140045d88 15 API calls 60813->60815 60816 1400408a9 60814->60816 60821 14004085d 60815->60821 60817 14004a448 15 API calls 60816->60817 60819 1400408b8 60817->60819 60855 14003f380 60818->60855 60820 14004423c 15 API calls 60819->60820 60822 1400408c4 60820->60822 60821->60818 60929 14004a118 15 API calls 60821->60929 60824 14004a1e8 15 API calls 60822->60824 60825 1400408d8 60824->60825 60826 14004a448 15 API calls 60825->60826 60827 1400408ea 60826->60827 60828 14004423c 15 API calls 60827->60828 60829 1400408f9 60828->60829 60830 140040946 60829->60830 60831 1400408fd 60829->60831 60833 14004094b 60830->60833 60838 14004099b 60830->60838 60832 140040905 60831->60832 60841 140040999 60831->60841 60836 140045d88 15 API calls 60832->60836 60834 14004094f 60833->60834 60835 140040990 60833->60835 60839 140045d88 15 API calls 60834->60839 60840 140040a28 60835->60840 60835->60841 60845 14004090f 60836->60845 60837 140045d88 15 API calls 60846 1400409ed 60837->60846 60838->60841 60842 1400409a5 60838->60842 60847 140040959 60839->60847 60844 140045d88 15 API calls 60840->60844 60841->60837 60843 140045d88 15 API calls 60842->60843 60849 1400409af 60843->60849 60850 140040a32 60844->60850 60845->60818 60930 14004a118 15 API calls 60845->60930 60846->60818 60933 14004a118 15 API calls 60846->60933 60847->60818 60931 14004a118 15 API calls 60847->60931 60849->60818 60932 14004a118 15 API calls 60849->60932 60850->60818 60934 14004a118 15 API calls 60850->60934 60856 14003ef5c 14 API calls 60855->60856 60858 14003f3a1 60856->60858 60857 14003ebef 60857->60740 60857->60741 60858->60857 60859 14003ef5c 14 API calls 60858->60859 60860 14003f3c6 60859->60860 60860->60857 60861 14003f3ce GetTokenInformation 60860->60861 60861->60857 60863 14003ef5c 13 API calls 60862->60863 60864 14003f64f 60863->60864 60865 14003f692 60864->60865 60866 14003f67b 60864->60866 60868 14003ef5c 13 API calls 60865->60868 60867 140042c54 13 API calls 60866->60867 60889 14003f68d 60867->60889 60869 14003f6b3 60868->60869 60870 14003f6d8 60869->60870 60871 14003f6bb GetTokenInformation 60869->60871 60872 14003f81d 60870->60872 60873 140040dd0 13 API calls 60870->60873 60871->60870 60875 140042c54 13 API calls 60872->60875 60872->60889 60874 14003f6ee 60873->60874 60876 14003ef5c 13 API calls 60874->60876 60875->60889 60877 14003f70c 60876->60877 60878 14003f813 60877->60878 60879 14003f715 GetTokenInformation 60877->60879 60880 140040eec 13 API calls 60878->60880 60879->60878 60881 14003f738 60879->60881 60880->60872 60882 14003ef5c 13 API calls 60881->60882 60883 14003f747 60882->60883 60883->60878 60884 14003ef5c 13 API calls 60883->60884 60885 14003f771 60884->60885 60885->60878 60886 14003f78f 60885->60886 60887 140040eec 13 API calls 60886->60887 60888 14003f7fd 60887->60888 60888->60889 60890 140042c54 13 API calls 60888->60890 60889->60744 60890->60889 60891->60744 60893 140042c64 60892->60893 60894 14003ef5c 15 API calls 60893->60894 60895 140042c83 60893->60895 60894->60895 60895->60763 60896->60788 60897->60790 60935 140040bc0 60898->60935 60902 140045d10 15 API calls 60901->60902 60903 14004a177 60902->60903 60947 140049ce8 60903->60947 60905 140040816 60905->60804 60998 14004a298 60906->60998 60908 14004a255 61011 140044214 15 API calls 60908->61011 60911 14004a262 60911->60807 60913 14004a205 60913->60908 60914 14004423c 15 API calls 60913->60914 60915 14004a264 60913->60915 61004 1400445a0 60913->61004 61007 140045cdc 60913->61007 60914->60913 61012 1400441e8 15 API calls 60915->61012 60918 140040dd0 15 API calls 60917->60918 60919 14004a469 60918->60919 61021 14004a360 60919->61021 60922 14004a47e 60923 140040eec 15 API calls 60922->60923 60925 140040843 60923->60925 60926 14004423c 60925->60926 60927 140041a14 15 API calls 60926->60927 60928 14004084f 60927->60928 60928->60812 60928->60813 60929->60818 60930->60818 60931->60818 60932->60818 60933->60818 60934->60818 60942 140040e68 60935->60942 60937 140040c3e 60937->60800 60938 140040bd3 60938->60937 60939 1400416a4 15 API calls 60938->60939 60940 140040c30 60939->60940 60941 140041a14 15 API calls 60940->60941 60941->60937 60943 140040e77 60942->60943 60944 140040e89 60942->60944 60946 140041920 15 API calls 60943->60946 60944->60938 60946->60944 60948 140045d10 13 API calls 60947->60948 60949 140049d3b 60948->60949 60950 14003ef5c 13 API calls 60949->60950 60951 140049d60 60950->60951 60952 140049d87 60951->60952 60975 140049dba 60951->60975 60953 140040b40 13 API calls 60952->60953 60954 140049d8c 60953->60954 60955 140045d88 13 API calls 60954->60955 60959 140049d99 60955->60959 60956 140049f86 60957 140045d88 13 API calls 60956->60957 60957->60959 60958 140049f61 60958->60956 60990 14004a118 15 API calls 60958->60990 60970 140049fb6 60959->60970 60991 14004a118 15 API calls 60959->60991 60963 14003ef5c 13 API calls 60963->60975 60964 14004a03a 60964->60905 60965 140049e40 RegEnumKeyW 60965->60958 60965->60975 60967 140047360 13 API calls 60967->60975 60968 140045d88 13 API calls 60968->60975 60969 14003eb14 13 API calls 60971 14004a051 60969->60971 60970->60964 60970->60969 60971->60964 60992 140040e9c 60971->60992 60973 140049eaa RegOpenKeyExW 60973->60975 60974 14004a06a 60976 140041330 13 API calls 60974->60976 60975->60958 60975->60963 60975->60965 60975->60967 60975->60968 60975->60973 60977 1400472e4 13 API calls 60975->60977 60978 140047f7c 13 API calls 60975->60978 60983 140049f4b 60975->60983 60986 140046040 60975->60986 60989 14004a118 15 API calls 60975->60989 60980 14004a083 60976->60980 60977->60975 60978->60975 60979 14004a0c5 60981 140049ce8 13 API calls 60979->60981 60980->60979 60997 140041920 15 API calls 60980->60997 60982 14004a0ed 60981->60982 60985 140040eec 13 API calls 60982->60985 60983->60905 60985->60964 60987 140048370 15 API calls 60986->60987 60988 140046064 60987->60988 60988->60975 60989->60975 60990->60956 60991->60970 60993 140040bc0 15 API calls 60992->60993 60994 140040ec6 60993->60994 60995 1400416a4 15 API calls 60994->60995 60996 140040eda 60995->60996 60996->60974 60997->60979 61000 14004a2bc 60998->61000 60999 14003ef5c 14 API calls 60999->61000 61000->60999 61001 14004a2d8 RegEnumValueA 61000->61001 61013 1400452d0 15 API calls 61000->61013 61001->61000 61002 14004a303 61001->61002 61002->60913 61014 1400483ec 61004->61014 61006 1400445c4 61006->60913 61008 140045ce8 61007->61008 61009 14004f22c 15 API calls 61008->61009 61010 140045d0a 61009->61010 61010->60913 61011->60911 61012->60911 61013->61000 61015 140048408 61014->61015 61016 140048402 61014->61016 61018 140045ac0 15 API calls 61015->61018 61016->61015 61017 140048414 61016->61017 61020 140045ac0 15 API calls 61017->61020 61019 140048412 61018->61019 61019->61006 61020->61019 61022 14004a37d 61021->61022 61023 14003ef5c 13 API calls 61022->61023 61031 14004a3e5 61022->61031 61024 14004a3b0 61023->61024 61025 14004a3b8 RegQueryValueExA 61024->61025 61026 14004a3dd 61024->61026 61025->61026 61027 140041330 13 API calls 61026->61027 61026->61031 61028 14004a3f1 61027->61028 61029 14003ef5c 13 API calls 61028->61029 61030 14004a400 61029->61030 61030->61031 61032 14004a416 RegQueryValueExA 61030->61032 61031->60922 61033 140040e10 15 API calls 61031->61033 61032->61031 61033->60922 61037 1400455b8 61034->61037 61038 1400456f6 61037->61038 61039 1400455d9 61037->61039 61040 140045ac0 15 API calls 61038->61040 61039->61038 61042 140045605 61039->61042 61041 1400456e0 61040->61041 61041->60691 61043 14003ef5c 15 API calls 61042->61043 61044 14004561b 61043->61044 61045 140045ac0 15 API calls 61044->61045 61046 14004566a 61045->61046 61047 14003ef5c 15 API calls 61046->61047 61048 140045679 61047->61048 61049 1400483ec 15 API calls 61048->61049 61050 1400456d1 61049->61050 61051 140041a14 15 API calls 61050->61051 61051->61041 61052->60488 61054 1400419b0 61053->61054 61055 1400419c1 61054->61055 61056 1400419ff 61054->61056 61058 1400419c6 61055->61058 61059 1400419ee 61055->61059 61063 1400415d0 61056->61063 61061 14003ef5c 15 API calls 61058->61061 61072 140041970 16 API calls 61059->61072 61062 1400419d5 61061->61062 61062->60488 61064 1400415f1 61063->61064 61065 14004161d 61063->61065 61066 14003ef5c 15 API calls 61064->61066 61067 14003ef5c 15 API calls 61065->61067 61068 140041600 61066->61068 61069 14004162c RtlCreateHeap 61067->61069 61070 140041605 RtlAllocateHeap 61068->61070 61071 140041612 61068->61071 61069->61064 61070->61071 61071->61062 61072->61062 61193 140028598 21 API calls 61320 140015b98 17 API calls 61328 14002ffd8 22 API calls

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 336 140049ce8-140049d4b call 140045d10 339 140049d51-140049d63 call 14003ef5c 336->339 340 140049d4d 336->340 343 140049d65 339->343 344 140049d7e 339->344 340->339 346 140049d6c-140049d72 343->346 345 140049d81 344->345 347 140049d83-140049d85 345->347 346->345 348 140049d74-140049d78 346->348 349 140049d87-140049d9c call 140040b40 call 140045d88 347->349 350 140049dba-140049dd7 call 140040cfc 347->350 348->345 352 140049d7a-140049d7c 348->352 363 140049da4-140049da6 349->363 364 140049d9e-140049da2 349->364 357 140049f61-140049f66 350->357 358 140049ddd-140049df4 350->358 352->347 360 140049f86-140049f9c call 140045d88 357->360 361 140049f68-140049f6f 357->361 362 140049dfc-140049e04 358->362 380 140049fa4-140049fa6 360->380 381 140049f9e-140049fa2 360->381 365 140049f77-140049f79 361->365 366 140049f71-140049f75 361->366 374 140049e06-140049e09 call 14004a118 362->374 375 140049e0e-140049e26 call 140040cec 362->375 370 140049daa-140049dac 363->370 364->363 369 140049da8 364->369 372 140049f7d-140049f7f 365->372 366->365 371 140049f7b 366->371 369->370 377 140049fb6-140049fbd 370->377 378 140049db2-140049db5 370->378 371->372 372->360 379 140049f81 call 14004a118 372->379 374->375 391 140049e2c-140049e3e call 14003ef5c 375->391 384 140049fc5-140049fc7 377->384 385 140049fbf-140049fc3 377->385 386 140049fb1 call 14004a118 378->386 379->360 389 140049faa-140049fac 380->389 381->380 388 140049fa8 381->388 394 140049fcb-140049fcd 384->394 385->384 393 140049fc9 385->393 386->377 388->389 389->377 390 140049fae 389->390 390->386 401 140049e60-140049e7a call 140046040 call 140047360 391->401 402 140049e40-140049e5a RegEnumKeyW 391->402 393->394 396 140049fd3-140049fe5 call 140040cec 394->396 397 14004a0fd-14004a100 394->397 396->397 405 140049feb-140049ff4 396->405 398 14004a103-14004a116 397->398 415 140049f50-140049f5c call 140045d88 401->415 416 140049e80-140049ea8 call 140045d88 call 14003ef5c 401->416 402->357 402->401 407 14004a005-14004a01f call 140040cfc 405->407 408 140049ff6-140049fff 405->408 413 14004a021-14004a033 call 140040cec 407->413 414 14004a04a-14004a055 call 14003eb14 407->414 408->397 408->407 425 14004a035-14004a038 413->425 426 14004a03f-14004a048 413->426 414->397 427 14004a05b-14004a098 call 140040e9c call 140040cfc call 140041330 call 140040cfc 414->427 415->391 432 140049ed8 416->432 433 140049eaa-140049ed6 RegOpenKeyExW 416->433 425->414 429 14004a03a 425->429 426->413 426->414 449 14004a0c5-14004a0fb call 140040cec call 140049ce8 call 140040eec 427->449 450 14004a09a-14004a0c0 call 140040cec * 2 call 140041920 427->450 429->397 435 140049edb-140049eec call 140045f8c 432->435 433->435 442 140049eee-140049ef6 call 1400472e4 435->442 443 140049efb-140049f0d call 140047f7c 435->443 442->443 443->357 451 140049f0f-140049f13 443->451 449->398 450->449 451->357 454 140049f15-140049f21 451->454 454->357 457 140049f23-140049f3b 454->457 457->362 460 140049f41-140049f45 457->460 460->362 463 140049f4b 460->463
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: EnumOpen
                                                                • String ID:
                                                                • API String ID: 3231578192-0
                                                                • Opcode ID: a1ab873cdc7d070d2db212e7d8735d5f7ac222a36dd988fc12cba93b62f0e77d
                                                                • Instruction ID: 9459061a68e210e374ae0ed918f9602d58aef8a0b07302b9e54b2d3972b25dac
                                                                • Opcode Fuzzy Hash: a1ab873cdc7d070d2db212e7d8735d5f7ac222a36dd988fc12cba93b62f0e77d
                                                                • Instruction Fuzzy Hash: 9FC1E33221464085EA62EA27E4903EE6350FB897F4F564331FB6A476F6DF39C849C708
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 771195eff9e319dbeeebb0f74e3092d8b3882e1c843a23e6bd55348f62fa55e2
                                                                • Instruction ID: a577176309169ddf1a63ff995339e23952730b0141b662c7645d5b7518d121df
                                                                • Opcode Fuzzy Hash: 771195eff9e319dbeeebb0f74e3092d8b3882e1c843a23e6bd55348f62fa55e2
                                                                • Instruction Fuzzy Hash: A741D2F131124059FA73D663A451BFE2292A7987D0F069D35FF1A072E6DF74C8868388
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Load
                                                                • String ID:
                                                                • API String ID: 2234796835-0
                                                                • Opcode ID: a91bbd2a742b3126f3470002823fdb69da52317cc9384bfe2dcbb8cfbef7fbb4
                                                                • Instruction ID: 7f21312ae90d1810dd77eec76f44f2fbfe05d6405b99f82dfb95fb1d63ba0b00
                                                                • Opcode Fuzzy Hash: a91bbd2a742b3126f3470002823fdb69da52317cc9384bfe2dcbb8cfbef7fbb4
                                                                • Instruction Fuzzy Hash: DE915D322055C091EA72FA22E4557EE6360EBD97C4F424232BB9E475F7DE78C54ACB08
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: InformationQuerySystem
                                                                • String ID:
                                                                • API String ID: 3562636166-0
                                                                • Opcode ID: e8db948834a558d02856de6e1af61b2ac0ec0d2773d09bb298f661c9a6324217
                                                                • Instruction ID: 9bcb99a924da1026ff23701b538e1cbaaae955df7869b0d4b2fc8a46eaf1d84c
                                                                • Opcode Fuzzy Hash: e8db948834a558d02856de6e1af61b2ac0ec0d2773d09bb298f661c9a6324217
                                                                • Instruction Fuzzy Hash: 67717D3371125087EB66EE27D4917EE63A1FB8D7C4F494021BB4A477A6DE39C842CB44
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ExitProcess
                                                                • String ID:
                                                                • API String ID: 621844428-0
                                                                • Opcode ID: 0e181ae4a4e9578b4a4d0d11da569c59bea76d480b3749089c0254b6a39afddc
                                                                • Instruction ID: fdfe337732891146ede37450fa631b7ea55b8a3d96b80d42a05b04f1223de0f2
                                                                • Opcode Fuzzy Hash: 0e181ae4a4e9578b4a4d0d11da569c59bea76d480b3749089c0254b6a39afddc
                                                                • Instruction Fuzzy Hash: 2571703221468091EE63EB36E4513EF6361AB993D4F919122BB9D476FADE38C549CB00
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CreateMutex
                                                                • String ID:
                                                                • API String ID: 1964310414-0
                                                                • Opcode ID: 1c95649695d41c4e4878b1ae72de97eb6c73db0b5ffd5d6fdc592f5735e3273e
                                                                • Instruction ID: 1c5edf37bca19066f3c98378d8a24ec59c0801f7a7bc5a64b814c18c6f06035f
                                                                • Opcode Fuzzy Hash: 1c95649695d41c4e4878b1ae72de97eb6c73db0b5ffd5d6fdc592f5735e3273e
                                                                • Instruction Fuzzy Hash: 8241D5712146506AFA67EB2395127EB2291BB9EBC8F166038BF4E073E7DE34C445C358
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: InfoSystem
                                                                • String ID:
                                                                • API String ID: 31276548-0
                                                                • Opcode ID: 0079d45c45308a80a30dba971157f9dcfc84661ac7a6f15b4d9dd42a0b12708d
                                                                • Instruction ID: 1cee5645df20bc1f5df4c9e355729cb1fd5a54a740093d120dbc2deab808d065
                                                                • Opcode Fuzzy Hash: 0079d45c45308a80a30dba971157f9dcfc84661ac7a6f15b4d9dd42a0b12708d
                                                                • Instruction Fuzzy Hash: B1419E726156C48AEB27CB26D0903DE7BA0F79CB84F099116EB4D133E6CB38C955CB01
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: FileFindFirstInfoSystem
                                                                • String ID:
                                                                • API String ID: 3644953116-0
                                                                • Opcode ID: aa1bead9b9ca8d19c93caf68a887f6735083b7fcf283b73aee90faeff680d1ff
                                                                • Instruction ID: f87130449827c8f9da1fd35fd49298e443803550ee3e3671c6633da2af7b4645
                                                                • Opcode Fuzzy Hash: aa1bead9b9ca8d19c93caf68a887f6735083b7fcf283b73aee90faeff680d1ff
                                                                • Instruction Fuzzy Hash: BF31A23211828046FE77DE27B0513EA23809B5A3F4F164335FBB6076F2DB7488869319
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID: )8GV
                                                                • API String ID: 0-3946227331
                                                                • Opcode ID: 6d620593730a7e1f2c615e8ee35372ccec9162a440ce1848de1f9f14c2f1c79d
                                                                • Instruction ID: c55a7e65b6dd402f0553ee3ce597408f97ebb1d8f690714e43e53df9163da537
                                                                • Opcode Fuzzy Hash: 6d620593730a7e1f2c615e8ee35372ccec9162a440ce1848de1f9f14c2f1c79d
                                                                • Instruction Fuzzy Hash: 5DD1B07271468490EB62EB26E4517EE6360EBDA3C4F845026BB8E479F7DF38C945CB04
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: fd3b1a098c2481a58ff8d7c7af3468ea4b94e654b854fbcb5594048382f9f67e
                                                                • Instruction ID: b1e38aaad8c9c3cc7d7ce84f72dd94f02ece1b10a952696d5d35c2358f0c7de4
                                                                • Opcode Fuzzy Hash: fd3b1a098c2481a58ff8d7c7af3468ea4b94e654b854fbcb5594048382f9f67e
                                                                • Instruction Fuzzy Hash: 7C818F36611B9489FB679F17E4847EA27A1F75CBC4F544221FB0A4B7E6DBB8C4818340
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 1d71377f9e062c87a454ea4937b2ae02fbf1243cb64064d102ecc1f3fc572001
                                                                • Instruction ID: e04a6a5cf978da3ec85ca286200089d9d7604485679623a8c0a19fc32ff347cb
                                                                • Opcode Fuzzy Hash: 1d71377f9e062c87a454ea4937b2ae02fbf1243cb64064d102ecc1f3fc572001
                                                                • Instruction Fuzzy Hash: 6F71A132200A8065FBA7EB66E4517EF6351FBC9784F454022BB4E4B6E6DF74C849C704
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 90c14e7e00c4d271a4dae026b215dbbc19e5464c0675885caf60ae6d47b6721a
                                                                • Instruction ID: d705a41558d6739ba7e9e2926aff28c1b2b1cf69bcdafb8716d5e9ebff8b30ee
                                                                • Opcode Fuzzy Hash: 90c14e7e00c4d271a4dae026b215dbbc19e5464c0675885caf60ae6d47b6721a
                                                                • Instruction Fuzzy Hash: 4B51043132464001FD67AA63A4117FB1241AB9D7E8F034231BF694B6F6EF75E80AA30D
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435722047.0000022245A30000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000022245A30000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_22245a30000_loaddll64.jbxd
                                                                Similarity
                                                                • API ID: ProtectVirtual$NodeRemove
                                                                • String ID:
                                                                • API String ID: 3879549435-0
                                                                • Opcode ID: 1b6da50fd627264e403de7a9f4910c0b436276e4a5d7975b4b93b6a2f5d25f20
                                                                • Instruction ID: ae40c82b0671fa9e2716c7547735c3ae7edaea58d834845564107323d2f428e2
                                                                • Opcode Fuzzy Hash: 1b6da50fd627264e403de7a9f4910c0b436276e4a5d7975b4b93b6a2f5d25f20
                                                                • Instruction Fuzzy Hash: 85B161B6618BD486D730CB5AE44079EB7A1F799B84F108026EEC953B58CB7EC856CF40
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 21 140033c60-140033c79 call 14003de10 24 140033c7b-140033c7e 21->24 25 140033cb9-140033ce4 call 14003de18 call 140034044 call 1400441c4 call 14003ef5c 21->25 27 140033c9c-140033ca9 call 14003deec 24->27 28 140033c80-140033c83 24->28 48 140033cf4-140033d01 call 1400343e8 25->48 49 140033ce6-140033ced 25->49 27->25 32 140033cab-140033cb4 call 14003de18 27->32 31 140033c85-140033c97 call 1400336fc call 14003de18 28->31 28->32 46 140034030 31->46 40 140034032-14003403b 32->40 46->40 52 140033d07-140033d18 call 14003ffc4 48->52 53 140033fb6-140033fc0 48->53 49->48 62 140033fa8-140033fb2 52->62 63 140033d1e-140033d29 52->63 55 140033fc2-140033fd4 call 14003ef5c 53->55 56 14003403c-140034043 call 140036778 53->56 64 140033fd8-140033fdb 55->64 65 140033fd6 FreeConsole 55->65 62->55 67 140033fb4 62->67 63->62 66 140033d2f-140033d4f call 14003ef5c 63->66 64->56 68 140033fdd-14003402b call 1400430d4 call 140043ac0 call 140043f14 call 140043dcc call 14004423c call 1400365d0 call 14004423c 64->68 65->64 73 140033d51-140033d56 66->73 74 140033d59-140033d63 call 14003eb14 66->74 67->68 68->46 73->74 80 140033d72-140033db0 call 140030084 call 140046b54 call 140045d88 call 14003ef5c 74->80 81 140033d65-140033d6d call 140033c60 74->81 99 140033dc3-140033dd8 call 14003ef5c 80->99 100 140033db2-140033dbe call 140047e34 80->100 81->80 105 140033dda-140033de8 call 140047e34 99->105 106 140033ded-140033e02 call 14003ef5c 99->106 100->99 105->106 111 140033e04-140033e11 call 140047e34 106->111 112 140033e16-140033e56 call 140044bd0 call 140044268 call 14004423c call 140045854 106->112 111->112 123 140033e61-140033ead call 140045b64 call 1400445a0 call 140045cdc call 14004423c 112->123 124 140033e58-140033e5d 112->124 133 140033eb3-140033ec2 123->133 134 140033f6e-140033f80 call 14003ef5c 123->134 124->123 133->134 137 140033f82-140033f87 134->137 138 140033f8a-140033fa3 call 140047c74 call 14004423c 134->138 137->138 138->40
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID: )8GV$m3
                                                                • API String ID: 0-2165648898
                                                                • Opcode ID: 0636800776483906566784eda226b27f143163737742c3d4855c1c5ea9ed7eff
                                                                • Instruction ID: 231b5a89c0014642dcf1dbdc86e4c3a032af2411fde6cb855fa8a3e818ccaee2
                                                                • Opcode Fuzzy Hash: 0636800776483906566784eda226b27f143163737742c3d4855c1c5ea9ed7eff
                                                                • Instruction Fuzzy Hash: 0881D33232468056EA17BB66E4917EF63A0AB99BC0F844132BB5E4B3F7DE74CC458744
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 143 14003ecbc-14003ece5 call 14003ef5c 146 14003ef17 143->146 147 14003eceb-14003ecff 143->147 148 14003ef19-14003ef24 146->148 150 14003ed05-14003ed37 call 14003ef5c 147->150 151 14003ef4b-14003ef52 call 140040b40 147->151 157 14003ed63-14003ed6c 150->157 158 14003ed39-14003ed5d GetTokenInformation 150->158 151->146 156 14003ef54 151->156 156->156 160 14003ed72-14003ed91 call 140040dd0 call 14003ef5c 157->160 161 14003ef06-14003ef0b 157->161 158->157 159 14003ef25-14003ef2a call 140040b40 158->159 159->157 170 14003ed97-14003edd0 call 140040cec call 140040cfc GetTokenInformation 160->170 171 14003eefc-14003ef01 call 140040eec 160->171 161->146 163 14003ef0d-14003ef12 call 140042c54 161->163 163->146 177 14003edd6-14003ee14 call 140040cec call 14003ef5c 170->177 178 14003ef3d-14003ef44 call 140040b40 170->178 171->161 177->171 186 14003ee1a-14003ee53 177->186 178->171 183 14003ef46 178->183 183->151 188 14003ee59-14003ee65 186->188 189 14003ef2f-14003ef36 call 140040b40 186->189 190 14003ee67-14003ee7c call 14003ef5c 188->190 191 14003ee9f-14003eea2 188->191 189->171 199 14003ef38 189->199 202 14003ee98-14003ee9d 190->202 203 14003ee7e-14003ee96 190->203 194 14003eea4-14003eea8 191->194 195 14003eeaa-14003eeac 191->195 194->195 198 14003eeae 194->198 200 14003eeb0-14003eeb2 195->200 198->200 199->188 200->171 201 14003eeb4-14003eebc call 14003f350 200->201 201->171 202->190 202->191 203->202 207 14003eebe-14003eec1 203->207 208 14003eec3-14003eec7 207->208 209 14003eec9-14003eecb 207->209 208->209 210 14003eecd 208->210 211 14003eecf-14003eed1 209->211 210->211 212 14003eed3-14003eed6 call 14003f350 211->212 213 14003eedb-14003eeea call 140040eec 211->213 212->213 217 14003eef6-14003eefa 213->217 218 14003eeec-14003eef1 call 140042c54 213->218 217->148 218->217
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: InformationToken
                                                                • String ID: >?0o
                                                                • API String ID: 4114910276-483178521
                                                                • Opcode ID: 83989d06cb232cd372a882e8754deaacddb58e035546c5858fe874943cc59c49
                                                                • Instruction ID: 5231a596fa9f28d5267ae12a2a58ccc57b764a1cd4b920b112443e2899b92a70
                                                                • Opcode Fuzzy Hash: 83989d06cb232cd372a882e8754deaacddb58e035546c5858fe874943cc59c49
                                                                • Instruction Fuzzy Hash: 9E61B1316146D086FA73A627E4403EBA391AB997D0F114222BB6D47BF6EF74C846C704
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 220 140042cc8-140042d2d call 140040dd0 call 1400441c4 call 14003ef5c 227 140042d3e-140042d6e call 140045854 call 140040d0c 220->227 228 140042d2f-140042d3c GetComputerNameA 220->228 233 140042d8f-140042dc9 call 14003fd1c call 140045854 call 140040d0c call 14004423c 227->233 234 140042d70-140042d8d call 140045854 call 140040d0c 227->234 228->227 243 140042dce-140042df7 call 140040d0c call 140040dd0 233->243 234->243 251 140042df9-140042e38 call 140040cfc call 140041330 call 140040cfc call 140040cec 243->251 260 140042e3a-140042e9b call 14004a144 call 140040eec call 14004a1e8 call 14004a448 call 14004423c 251->260 271 140042ee5-140042f25 call 140040d0c * 2 260->271 272 140042e9d-140042ee3 call 140040d0c * 2 260->272 281 140042f2c-140042fa6 call 140040d0c call 140040cec call 140040cfc call 14004f4d0 call 1400413c4 call 1400445a0 call 14004423c call 140040eec 271->281 272->281 298 1400430bc-1400430cc call 1400441e8 281->298 299 140042fac-140042fdf call 140045d10 call 14003ef5c 281->299 305 14004304f-14004306b call 14004423c call 140045d88 298->305 308 140042fe1-140042fe9 299->308 309 140042ff0-14004304a call 140045724 call 140045c70 call 140047808 call 1400441e8 call 14004423c call 140045d88 299->309 315 140043088-1400430bb call 14004423c call 140040eec 305->315 316 14004306d-140043075 305->316 308->309 309->305 318 140043077-14004307b 316->318 319 1400430ce-1400430d0 316->319 318->319 323 14004307d 318->323 322 14004307f-140043081 319->322 322->315 326 140043083 call 14004a118 322->326 323->322 326->315
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ComputerName
                                                                • String ID: O6T
                                                                • API String ID: 3545744682-1374758418
                                                                • Opcode ID: 56b6375e4ffdebfb11ed484d83e21f632d724e3fa0815eadbf4759ac88d77339
                                                                • Instruction ID: d3d5bcd7064440db76d2649395b26b55f62d6fdfc49fe0bf74ffe04b8fad06aa
                                                                • Opcode Fuzzy Hash: 56b6375e4ffdebfb11ed484d83e21f632d724e3fa0815eadbf4759ac88d77339
                                                                • Instruction Fuzzy Hash: 3CA1813271468091EA22EB26E4513DE6321F7D8BC4F855132BB8D57AFBEE38C54AC704
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 467 14003f62c-14003f652 call 14003ef5c 470 14003f654-14003f65a 467->470 471 14003f661-14003f669 467->471 470->471 472 14003f671-14003f673 471->472 473 14003f66b-14003f66f 471->473 475 14003f677-14003f679 472->475 473->472 474 14003f675 473->474 474->475 476 14003f692-14003f6b9 call 14003ef5c 475->476 477 14003f67b-14003f68d call 140042c54 475->477 483 14003f6d8-14003f6de 476->483 484 14003f6bb-14003f6d5 GetTokenInformation 476->484 482 14003f82e 477->482 487 14003f830-14003f838 482->487 485 14003f6e4-14003f70f call 140040dd0 call 140040cec call 14003ef5c 483->485 486 14003f81d-14003f822 483->486 484->483 496 14003f813-14003f818 call 140040eec 485->496 497 14003f715-14003f732 GetTokenInformation 485->497 486->482 489 14003f824-14003f829 call 140042c54 486->489 489->482 496->486 497->496 499 14003f738-14003f74a call 14003ef5c 497->499 499->496 502 14003f750-14003f75c 499->502 502->496 504 14003f762-14003f774 call 14003ef5c 502->504 504->496 507 14003f77a-14003f789 504->507 507->496 509 14003f78f-14003f793 507->509 510 14003f795-14003f79b 509->510 511 14003f7ed-14003f7f0 509->511 513 14003f7e7-14003f7eb 510->513 514 14003f79d-14003f7a3 510->514 512 14003f7f3-14003f802 call 140040eec 511->512 521 14003f804-14003f809 call 140042c54 512->521 522 14003f80e-14003f811 512->522 513->512 516 14003f7e1-14003f7e5 514->516 517 14003f7a5-14003f7ab 514->517 516->512 519 14003f7db-14003f7df 517->519 520 14003f7ad-14003f7b3 517->520 519->512 523 14003f7d5-14003f7d9 520->523 524 14003f7b5-14003f7bb 520->524 521->522 522->487 523->512 526 14003f7c3-14003f7d3 524->526 527 14003f7bd-14003f7c1 524->527 526->512 527->512
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: InformationToken
                                                                • String ID:
                                                                • API String ID: 4114910276-0
                                                                • Opcode ID: 6c10f00505d5578a50bca62cc9f69da261be1458309348a7227540f56203544b
                                                                • Instruction ID: ecc8551f8e81dc530434d0db0478d541e0a194287fc03010dd05692468a8da27
                                                                • Opcode Fuzzy Hash: 6c10f00505d5578a50bca62cc9f69da261be1458309348a7227540f56203544b
                                                                • Instruction Fuzzy Hash: C651123132868055FAABD712E4917FF1391BB887D8F648122BB5A0B2F6DF78C885D700
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 578 140048af4-140048b46 580 140048b48-140048b4c 578->580 581 140048b59-140048b5c 578->581 582 140048b54-140048b57 580->582 583 140048b4e-140048b52 580->583 584 140048b5f-140048b71 call 14003ef5c 581->584 582->584 583->584 587 140048b73-140048b97 CreateFileW 584->587 588 140048b99 584->588 589 140048b9b-140048bae call 140043458 587->589 588->589 592 140048bb6-140048bb8 589->592 593 140048bb0-140048bb4 589->593 595 140048bbc-140048bbe 592->595 593->592 594 140048bba 593->594 594->595 596 140048c33-140048c3d call 140040b40 595->596 597 140048bc0-140048bc8 595->597 604 140048c22-140048c32 596->604 598 140048bca-140048bdc call 14003ef5c 597->598 599 140048bec-140048c11 call 140041654 call 14003ef5c 597->599 598->599 607 140048bde-140048be7 598->607 599->604 611 140048c13-140048c20 SetFileTime 599->611 607->599 611->604
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: File$CreateTime
                                                                • String ID:
                                                                • API String ID: 1043708186-0
                                                                • Opcode ID: 7f3056886b7d70a1e19d7ec6ef426b623b954717b2893d6b5cc754fd521f5a48
                                                                • Instruction ID: e6ff819a02cbd92f28c2e47266592a60147018ff4e79c59810194e6a6086abb2
                                                                • Opcode Fuzzy Hash: 7f3056886b7d70a1e19d7ec6ef426b623b954717b2893d6b5cc754fd521f5a48
                                                                • Instruction Fuzzy Hash: 032128B23012005AFA73D65BA452BEE2282DBD97E0F069935FF19077D5DF70C8868388
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 612 140048b20-140048b23 613 140048b35-140048b46 612->613 614 140048b25-140048b30 612->614 617 140048b48-140048b4c 613->617 618 140048b59-140048b5c 613->618 615 140048c24-140048c32 614->615 619 140048b54-140048b57 617->619 620 140048b4e-140048b52 617->620 621 140048b5f-140048b71 call 14003ef5c 618->621 619->621 620->621 624 140048b73-140048b97 CreateFileW 621->624 625 140048b99 621->625 626 140048b9b-140048bae call 140043458 624->626 625->626 629 140048bb6-140048bb8 626->629 630 140048bb0-140048bb4 626->630 632 140048bbc-140048bbe 629->632 630->629 631 140048bba 630->631 631->632 633 140048c33-140048c3d call 140040b40 632->633 634 140048bc0-140048bc8 632->634 641 140048c22 633->641 635 140048bca-140048bdc call 14003ef5c 634->635 636 140048bec-140048c11 call 140041654 call 14003ef5c 634->636 635->636 644 140048bde-140048be7 635->644 636->641 647 140048c13-140048c20 SetFileTime 636->647 641->615 644->636 647->641
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: File$CreateTime
                                                                • String ID:
                                                                • API String ID: 1043708186-0
                                                                • Opcode ID: e288c5e2eab2dd9def4f060cdb77588bd243be45b3bedb7e0cab48a9848ab89c
                                                                • Instruction ID: 373265b53401dd82b576cb828aa2014b60d4e7c83e853b06e38b793f05bb1e64
                                                                • Opcode Fuzzy Hash: e288c5e2eab2dd9def4f060cdb77588bd243be45b3bedb7e0cab48a9848ab89c
                                                                • Instruction Fuzzy Hash: 9E2108B23012005AFA73D657A455BEE2282E79C7E0F169D35BF19077D5DF70C8458398
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 648 140049e00 649 140049e02-140049e04 648->649 650 140049e06-140049e09 call 14004a118 649->650 651 140049e0e-140049e26 call 140040cec 649->651 650->651 655 140049e2c-140049e3e call 14003ef5c 651->655 658 140049e60-140049e7a call 140046040 call 140047360 655->658 659 140049e40-140049e5a RegEnumKeyW 655->659 674 140049f50-140049f5c call 140045d88 658->674 675 140049e80-140049ea8 call 140045d88 call 14003ef5c 658->675 659->658 660 140049f61-140049f66 659->660 662 140049f86-140049f9c call 140045d88 660->662 663 140049f68-140049f6f 660->663 676 140049fa4-140049fa6 662->676 677 140049f9e-140049fa2 662->677 665 140049f77-140049f79 663->665 666 140049f71-140049f75 663->666 670 140049f7d-140049f7f 665->670 666->665 669 140049f7b 666->669 669->670 670->662 673 140049f81 call 14004a118 670->673 673->662 674->655 695 140049ed8 675->695 696 140049eaa-140049ed6 RegOpenKeyExW 675->696 682 140049faa-140049fac 676->682 677->676 681 140049fa8 677->681 681->682 684 140049fb6-140049fbd 682->684 685 140049fae-140049fb1 call 14004a118 682->685 688 140049fc5-140049fc7 684->688 689 140049fbf-140049fc3 684->689 685->684 693 140049fcb-140049fcd 688->693 689->688 692 140049fc9 689->692 692->693 697 140049fd3-140049fe5 call 140040cec 693->697 698 14004a0fd-14004a100 693->698 699 140049edb-140049eec call 140045f8c 695->699 696->699 697->698 705 140049feb-140049ff4 697->705 700 14004a103-14004a116 698->700 706 140049eee-140049ef6 call 1400472e4 699->706 707 140049efb-140049f0d call 140047f7c 699->707 708 14004a005-14004a01f call 140040cfc 705->708 709 140049ff6-140049fff 705->709 706->707 707->660 717 140049f0f-140049f13 707->717 715 14004a021-14004a033 call 140040cec 708->715 716 14004a04a-14004a055 call 14003eb14 708->716 709->698 709->708 724 14004a035-14004a038 715->724 725 14004a03f-14004a048 715->725 716->698 726 14004a05b-14004a098 call 140040e9c call 140040cfc call 140041330 call 140040cfc 716->726 717->660 720 140049f15-140049f21 717->720 720->660 723 140049f23-140049f3b 720->723 727 140049f41-140049f45 723->727 728 140049dfc-140049dfe 723->728 724->716 729 14004a03a 724->729 725->715 725->716 739 14004a0c5-14004a0fb call 140040cec call 140049ce8 call 140040eec 726->739 740 14004a09a-14004a0c0 call 140040cec * 2 call 140041920 726->740 727->728 731 140049f4b 727->731 728->649 729->698 739->700 740->739
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: EnumOpen
                                                                • String ID:
                                                                • API String ID: 3231578192-0
                                                                • Opcode ID: 100e3fa8a47cef9b75ec1aa15b7d2d15559e8d8d2aff17cf47f36f7a5d42a886
                                                                • Instruction ID: 9f0578a3eddfe065590b4f59026ddcd44928e5945d6758282d87433fe2c401ce
                                                                • Opcode Fuzzy Hash: 100e3fa8a47cef9b75ec1aa15b7d2d15559e8d8d2aff17cf47f36f7a5d42a886
                                                                • Instruction Fuzzy Hash: A531C132214A0086EA62EA27E4917DA6760F7897E4F560235BF9E477FADF34C846C704
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 752 140048b0b-140048b46 754 140048b48-140048b4c 752->754 755 140048b59-140048b5c 752->755 756 140048b54-140048b57 754->756 757 140048b4e-140048b52 754->757 758 140048b5f-140048b71 call 14003ef5c 755->758 756->758 757->758 761 140048b73-140048b97 CreateFileW 758->761 762 140048b99 758->762 763 140048b9b-140048bae call 140043458 761->763 762->763 766 140048bb6-140048bb8 763->766 767 140048bb0-140048bb4 763->767 769 140048bbc-140048bbe 766->769 767->766 768 140048bba 767->768 768->769 770 140048c33-140048c3d call 140040b40 769->770 771 140048bc0-140048bc8 769->771 778 140048c22-140048c32 770->778 772 140048bca-140048bdc call 14003ef5c 771->772 773 140048bec-140048c11 call 140041654 call 14003ef5c 771->773 772->773 781 140048bde-140048be7 772->781 773->778 785 140048c13-140048c20 SetFileTime 773->785 781->773 785->778
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: File$CreateTime
                                                                • String ID:
                                                                • API String ID: 1043708186-0
                                                                • Opcode ID: 0d66557ec227e28d805c38cdcf4a6935cf932f65ca8a3b24ee9eaac4338115e0
                                                                • Instruction ID: e913f29138faac3008983c644a6d0c3dd188baac9e9e840bc20585f365cd3245
                                                                • Opcode Fuzzy Hash: 0d66557ec227e28d805c38cdcf4a6935cf932f65ca8a3b24ee9eaac4338115e0
                                                                • Instruction Fuzzy Hash: A821F5B27012404AFA73D657A451BEE2282DB997E4F0A9936FF2D073D5DF70C8468398
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 786 140048aea-140048b46 788 140048b48-140048b4c 786->788 789 140048b59-140048b5c 786->789 790 140048b54-140048b57 788->790 791 140048b4e-140048b52 788->791 792 140048b5f-140048b71 call 14003ef5c 789->792 790->792 791->792 795 140048b73-140048b97 CreateFileW 792->795 796 140048b99 792->796 797 140048b9b-140048bae call 140043458 795->797 796->797 800 140048bb6-140048bb8 797->800 801 140048bb0-140048bb4 797->801 803 140048bbc-140048bbe 800->803 801->800 802 140048bba 801->802 802->803 804 140048c33-140048c3d call 140040b40 803->804 805 140048bc0-140048bc8 803->805 812 140048c22-140048c32 804->812 806 140048bca-140048bdc call 14003ef5c 805->806 807 140048bec-140048c11 call 140041654 call 14003ef5c 805->807 806->807 815 140048bde-140048be7 806->815 807->812 819 140048c13-140048c20 SetFileTime 807->819 815->807 819->812
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: File$CreateTime
                                                                • String ID:
                                                                • API String ID: 1043708186-0
                                                                • Opcode ID: c442cac18970aaab303104c3a53e5ec5525a266bb2462019e91357d58fabc793
                                                                • Instruction ID: e9d366b7c14b9786304128db7f7afbe9b589cc212182ee046763322edea81729
                                                                • Opcode Fuzzy Hash: c442cac18970aaab303104c3a53e5ec5525a266bb2462019e91357d58fabc793
                                                                • Instruction Fuzzy Hash: 7C21C5B23012405AFA73D656A451BEE2282979D7E0F165935BF29073D5DF70C8868398
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 820 140048b3f-140048b46 822 140048b48-140048b4c 820->822 823 140048b59-140048b5c 820->823 824 140048b54-140048b57 822->824 825 140048b4e-140048b52 822->825 826 140048b5f-140048b71 call 14003ef5c 823->826 824->826 825->826 829 140048b73-140048b97 CreateFileW 826->829 830 140048b99 826->830 831 140048b9b-140048bae call 140043458 829->831 830->831 834 140048bb6-140048bb8 831->834 835 140048bb0-140048bb4 831->835 837 140048bbc-140048bbe 834->837 835->834 836 140048bba 835->836 836->837 838 140048c33-140048c3d call 140040b40 837->838 839 140048bc0-140048bc8 837->839 846 140048c22-140048c32 838->846 840 140048bca-140048bdc call 14003ef5c 839->840 841 140048bec-140048c11 call 140041654 call 14003ef5c 839->841 840->841 849 140048bde-140048be7 840->849 841->846 853 140048c13-140048c20 SetFileTime 841->853 849->841 853->846
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: File$CreateTime
                                                                • String ID:
                                                                • API String ID: 1043708186-0
                                                                • Opcode ID: c894a91a7e0fd4236c9f22b6b40c2d890c511d83b3d68eb1f86516e7b060ed7d
                                                                • Instruction ID: 4003219f53d8279d8799e03a7e459311feb6a53ee00a64f5c0895e2f358ffdb1
                                                                • Opcode Fuzzy Hash: c894a91a7e0fd4236c9f22b6b40c2d890c511d83b3d68eb1f86516e7b060ed7d
                                                                • Instruction Fuzzy Hash: 8121D7B23012405AFA73D656A451BEE228297D97E0F065935BF1D077D5DF70C8868394
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 854 14004a360-14004a37b 855 14004a383-14004a385 854->855 856 14004a37d-14004a381 854->856 858 14004a389-14004a38b 855->858 856->855 857 14004a387 856->857 857->858 859 14004a3e5-14004a3e7 858->859 860 14004a38d-14004a390 858->860 863 14004a43a-14004a445 859->863 861 14004a397-14004a3b6 call 14003ef5c 860->861 862 14004a392-14004a395 860->862 866 14004a3b8-14004a3da RegQueryValueExA 861->866 867 14004a3dd-14004a3e3 861->867 862->859 862->861 866->867 867->859 868 14004a3e9-14004a406 call 140041330 call 14003ef5c 867->868 873 14004a436 868->873 874 14004a408-14004a433 call 140040cec RegQueryValueExA 868->874 873->863 874->873
                                                                APIs
                                                                • RegQueryValueExA.KERNELBASE ref: 000000014004A3DA
                                                                • RegQueryValueExA.KERNELBASE(?,?,09D71E9C,?,?,00000001,000000014004A479,?,?,?,?,?,?,?,751280D6,00000000), ref: 000000014004A433
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: QueryValue
                                                                • String ID:
                                                                • API String ID: 3660427363-0
                                                                • Opcode ID: f2ec1bc66707f59d391e5711c0540a80a9bfff7bf6d02d8f5723492226febcee
                                                                • Instruction ID: 16db8dbbbb3320cb21f8965b1d479be026fa1beda9f9b72924311b7b149bc8ef
                                                                • Opcode Fuzzy Hash: f2ec1bc66707f59d391e5711c0540a80a9bfff7bf6d02d8f5723492226febcee
                                                                • Instruction Fuzzy Hash: 8621C53232164085EF92DE23A544F9B6395F78A7D4F428225BE2D477E5FB38C442C708
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 877 1400415d0-1400415ef 878 1400415f1-140041603 call 14003ef5c 877->878 879 14004161d-140041650 call 14003ef5c RtlCreateHeap 877->879 884 140041605-140041610 RtlAllocateHeap 878->884 885 140041612 878->885 879->878 886 140041614-14004161c 884->886 885->886
                                                                APIs
                                                                • RtlAllocateHeap.NTDLL(?,?,00000000,?,0000000140041A07,?,?,?,?,?,00000000,-00000008,00000001400531D4), ref: 000000014004160E
                                                                • RtlCreateHeap.NTDLL(?,?,?,00000000,?,0000000140041A07,?,?,?,?,?,00000000,-00000008,00000001400531D4), ref: 000000014004164A
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Heap$AllocateCreate
                                                                • String ID:
                                                                • API String ID: 2875408731-0
                                                                • Opcode ID: 89fac091d753058aa33562bc3357799e58e3e113af7950d859426dbcd67ade8f
                                                                • Instruction ID: 7d7fb4b22871d5c605cabf1c2b9c64ec1d0ec59283f56bc96ef2e98c2820e7f2
                                                                • Opcode Fuzzy Hash: 89fac091d753058aa33562bc3357799e58e3e113af7950d859426dbcd67ade8f
                                                                • Instruction Fuzzy Hash: 39F02232311B6496E652DBE3A809BD92284678C7C0F5788307E1D8B7E1EE34C8839314
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • ConvertStringSecurityDescriptorToSecurityDescriptorW.ADVAPI32 ref: 000000014004386B
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: DescriptorSecurity$ConvertString
                                                                • String ID:
                                                                • API String ID: 3907675253-0
                                                                • Opcode ID: 6082b253ad5a01886561e9f47c547e7fdb61e3ec1cb2fff03c426a0cd6b95adb
                                                                • Instruction ID: 4bb89f180bc127f11fd0a0a39a244c89e486ee09933a0991a81fb842f9fe0104
                                                                • Opcode Fuzzy Hash: 6082b253ad5a01886561e9f47c547e7fdb61e3ec1cb2fff03c426a0cd6b95adb
                                                                • Instruction Fuzzy Hash: 0611BE72610B8151EA62DB12A810FEB6354FB987C8F42612ABF0D076A6DF34C2058344
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • FindNextFileW.KERNELBASE(09D71E9C,751280D6,00000000,000000014004981E,?,?,?,?,?,?,?,?,?,?,751280D6,0000000140040453), ref: 000000014004986F
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: FileFindNext
                                                                • String ID:
                                                                • API String ID: 2029273394-0
                                                                • Opcode ID: 7595ea641c56bc212fe38c3274f31230f5d77d23e7d966c510c19e2954420f2a
                                                                • Instruction ID: a64be64f89a460dfb94212520fccfbdb2f52538de805bdcae2a69a1059f0848b
                                                                • Opcode Fuzzy Hash: 7595ea641c56bc212fe38c3274f31230f5d77d23e7d966c510c19e2954420f2a
                                                                • Instruction Fuzzy Hash: 5E01DF32320211A5FA73C65FA505FE62284AB5E3D4F07043ABE1D8B2A2DE31C8868709
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • SetFilePointer.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,0000000140034267), ref: 0000000140048F01
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: FilePointer
                                                                • String ID:
                                                                • API String ID: 973152223-0
                                                                • Opcode ID: bc33188ac2ba7fc9541185a1a127f3200e696650847a6055dd7d7f5a1ee1013a
                                                                • Instruction ID: 424e72eb4a28d7a193ae2be82f41efd3758bf6f942619ec2a86e6dba50e46591
                                                                • Opcode Fuzzy Hash: bc33188ac2ba7fc9541185a1a127f3200e696650847a6055dd7d7f5a1ee1013a
                                                                • Instruction Fuzzy Hash: 20019E3170164095EAB68A23A8047AE22C2AB8D3A4F024F72EF69477E4DB35C8864748
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: FileRead
                                                                • String ID:
                                                                • API String ID: 2738559852-0
                                                                • Opcode ID: ecf39f5e3f54ce4046fa479c11c34e2a341d7f6a4df604ca5b0b426fd59e23de
                                                                • Instruction ID: 790529ed711763ae43262545828f67070d315e227f23e68dd781eb51aaee780d
                                                                • Opcode Fuzzy Hash: ecf39f5e3f54ce4046fa479c11c34e2a341d7f6a4df604ca5b0b426fd59e23de
                                                                • Instruction Fuzzy Hash: 7611C43132464197EAA28B27A400B9E73A1F7597E0F010A30BF2D4B7E5DB34E459C748
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • GetTokenInformation.KERNELBASE(?,?,?,?,?,00000000,000000014003EBEF), ref: 000000014003F3E9
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: InformationToken
                                                                • String ID:
                                                                • API String ID: 4114910276-0
                                                                • Opcode ID: 1ae3a61d54a04d58034ac02facce3d2223ed4ecbc978db40601391b800d4a2c2
                                                                • Instruction ID: 37990f2c59c1750a9674a147ea10463f62cf48119e786bc5f90c28edd3d792f3
                                                                • Opcode Fuzzy Hash: 1ae3a61d54a04d58034ac02facce3d2223ed4ecbc978db40601391b800d4a2c2
                                                                • Instruction Fuzzy Hash: F501D131721B8196FA938662A406BFB2390AB84BD4F1440257F6A4B3E5DF78CD85C315
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: EnumValue
                                                                • String ID:
                                                                • API String ID: 2814608202-0
                                                                • Opcode ID: 708deef92b8197bbb763cc8df697c5036c250a8e8c5e502451676b62fa51e09a
                                                                • Instruction ID: 0e979b2d2644f262023e2af9f1897516e833166aea4105557ba46f5ebe17533e
                                                                • Opcode Fuzzy Hash: 708deef92b8197bbb763cc8df697c5036c250a8e8c5e502451676b62fa51e09a
                                                                • Instruction Fuzzy Hash: CC01BC32210A4086EB16DF56E8857C933A4F7497C4F65413AAFAC07390DF79CD4AC704
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • RtlDeleteBoundaryDescriptor.NTDLL(?,?,?,?,?,00000001400471B8,751280D6,0000000140045D2B,?,?,?,000000014004038D), ref: 000000014004199D
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: BoundaryDeleteDescriptor
                                                                • String ID:
                                                                • API String ID: 3203483114-0
                                                                • Opcode ID: 34161ce709f803577c5a3d2b9ea19681d9f6f23d63e623818f90d89412af31db
                                                                • Instruction ID: ac0a6d155fc1e2f5d771ba99a509d91f34cfab543c7d640e78254c45b5f97487
                                                                • Opcode Fuzzy Hash: 34161ce709f803577c5a3d2b9ea19681d9f6f23d63e623818f90d89412af31db
                                                                • Instruction Fuzzy Hash: BFD05EA07219A045E95BA697B6243A685530FDD7D0D195535AA2C0BBF99D348A930204
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • VirtualAlloc.KERNELBASE(?,?,?,?,?,?,?,?,?,0000022245A3294E), ref: 0000022245A3204C
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435722047.0000022245A30000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000022245A30000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_22245a30000_loaddll64.jbxd
                                                                Similarity
                                                                • API ID: AllocVirtual
                                                                • String ID:
                                                                • API String ID: 4275171209-0
                                                                • Opcode ID: 799aaca31b646477e88f6dddc5f95537b0a7e835f068912a2fbbb285de816f1e
                                                                • Instruction ID: a07ff278e92d431639d32caff46469ba5294573605c64fb905bd8277314cf067
                                                                • Opcode Fuzzy Hash: 799aaca31b646477e88f6dddc5f95537b0a7e835f068912a2fbbb285de816f1e
                                                                • Instruction Fuzzy Hash: B8315E72615B9086D780DF5AE05979A7BB5F389BC4F105026EF8D97B18DB3AC446CB00
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID: ':_I$':_I$OR$OR$OR$OR$'Y
                                                                • API String ID: 0-1296776181
                                                                • Opcode ID: ba76e0ff35ece21bd8043bd9b8b623e902d16a27de4ef321cc82aa49fb152099
                                                                • Instruction ID: d7e2e455da2a18d9afc81a7490586b8138cc237419d6213e5e5ddff0951e2bda
                                                                • Opcode Fuzzy Hash: ba76e0ff35ece21bd8043bd9b8b623e902d16a27de4ef321cc82aa49fb152099
                                                                • Instruction Fuzzy Hash: 74729E72314A8095EA62EB22E8517EE6361E7C9BC4F854032BB4E476F7DF38C949C744
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID: 0020$0020$3050$3050$4040$GNOP
                                                                • API String ID: 0-829999343
                                                                • Opcode ID: fe04e50e16fa8135c6251a6a8478e4a5821c6ce6e585ee51f40c7287ea8d1e9f
                                                                • Instruction ID: 9f4798a7713e8d23cc0b29edae440c0b38c0ef664c8788e8a6f1c99b4123dedf
                                                                • Opcode Fuzzy Hash: fe04e50e16fa8135c6251a6a8478e4a5821c6ce6e585ee51f40c7287ea8d1e9f
                                                                • Instruction Fuzzy Hash: C5728E322146C490EB62EB16E4957EE6360F7987C4F814032BB8E575F7EE38C98AC744
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID: 0u$O$X$Z$a
                                                                • API String ID: 0-4014663077
                                                                • Opcode ID: 68e8cd71e5f7a38174ba2e710b5745df796416166a0987518da19740b8697eda
                                                                • Instruction ID: 304f1276067260eb75db5223f69b55bdd2d5b798eea6173091bc6d22457b41db
                                                                • Opcode Fuzzy Hash: 68e8cd71e5f7a38174ba2e710b5745df796416166a0987518da19740b8697eda
                                                                • Instruction Fuzzy Hash: 79A227722087C4CAEB72CF2AE4447DABBA0F389784F544115EB8847BA9DB39C594CF15
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID: ERCP$VUUU$VUUU$VUUU
                                                                • API String ID: 0-2165971703
                                                                • Opcode ID: fd7ba0cfff23405ff466d96750f62d0bec9acd6b70098ac42bbaa7ca7aa0a6e2
                                                                • Instruction ID: 23680833a9ffb209b49ad4f112f222642cc18a291d5786f933dd799b75641bf8
                                                                • Opcode Fuzzy Hash: fd7ba0cfff23405ff466d96750f62d0bec9acd6b70098ac42bbaa7ca7aa0a6e2
                                                                • Instruction Fuzzy Hash: 6162B27220A6C486EB73CB06E1447EEB7A1F38A7D4F144115EB9507AE8DB7EC984CB41
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID: i8~W$i8~W$i8~W$i8~W
                                                                • API String ID: 0-2882754347
                                                                • Opcode ID: 005558913cebc8a5561c81cb0f0ac452c91e0e9a9b3f34507cb54308ba0c1905
                                                                • Instruction ID: d38a421a5b45bfae5b7bb16f51960a121c3f694e524511814093a4bf3e1fa7fb
                                                                • Opcode Fuzzy Hash: 005558913cebc8a5561c81cb0f0ac452c91e0e9a9b3f34507cb54308ba0c1905
                                                                • Instruction Fuzzy Hash: 0B02CF3131065052FA63EB279451BEE2691ABC97C8F524132BF4A877F7EF34C8468709
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID: */*$GET$POST
                                                                • API String ID: 0-3233530491
                                                                • Opcode ID: bed58e508a9f37a8718e75b9d8b1ba430ab492b7b57b6bd97b9ed385414d6fd8
                                                                • Instruction ID: 09143b5efe47b61c4a4ab263372756c80d35fff3055a68f292b5baea53e4692e
                                                                • Opcode Fuzzy Hash: bed58e508a9f37a8718e75b9d8b1ba430ab492b7b57b6bd97b9ed385414d6fd8
                                                                • Instruction Fuzzy Hash: A2326372214AC095EB62EB22E4913DE7361F7C97C4F854022BB8D47ABADF78C549CB44
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID: $L$O
                                                                • API String ID: 0-1186474355
                                                                • Opcode ID: 5a00e1f3d66941ef9b070bef6d00f89ebac2f042769e024f778db8e58ac34338
                                                                • Instruction ID: 22a9619e214cea82d6acd6b4a42498096ecd4e9b9a5a4d2b376b52047c11c647
                                                                • Opcode Fuzzy Hash: 5a00e1f3d66941ef9b070bef6d00f89ebac2f042769e024f778db8e58ac34338
                                                                • Instruction Fuzzy Hash: E4126D722087C48AEBB2CF16E4943DE77A1F389794F148116EF8957BA9CB39C484CB01
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID: 0020$0020$4040
                                                                • API String ID: 0-2301653233
                                                                • Opcode ID: 324bb80a0e55ed41462a4d65dba007e3e878632f912c5237ef8351cb864728da
                                                                • Instruction ID: e3d60f6cdc1938b03e0d6e61fb1cc5de29ddaabb9fcebace1b9ba206581529bc
                                                                • Opcode Fuzzy Hash: 324bb80a0e55ed41462a4d65dba007e3e878632f912c5237ef8351cb864728da
                                                                • Instruction Fuzzy Hash: 8A02C232214AC492EA62EB16D4553EE6324FB993C4F818032FB4E875E7DF78C94AC744
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID: X$X
                                                                • API String ID: 0-162963066
                                                                • Opcode ID: c01dfeed01794b27862636ec45d1c229cc9a9c0d720a79368795c16f041ea95e
                                                                • Instruction ID: c94dc1376a0ee008d3706e8deb575d4e43cbeb56242068de77a835adafea2acf
                                                                • Opcode Fuzzy Hash: c01dfeed01794b27862636ec45d1c229cc9a9c0d720a79368795c16f041ea95e
                                                                • Instruction Fuzzy Hash: 27725E721087C48AE7B6CB26E4543DEB7A0F3897C5F548115EBC987AA9DB3AC585CF00
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID: )8GV$)8GV
                                                                • API String ID: 0-993736920
                                                                • Opcode ID: b8625f15df34bdade69a6095916cbb1333b3ce4e898c8dcbc38bc19d3244912f
                                                                • Instruction ID: ae3c3e3e89eda71d69349abec8bbc97cdc0f5aac370825fc6de6adea5e8770fd
                                                                • Opcode Fuzzy Hash: b8625f15df34bdade69a6095916cbb1333b3ce4e898c8dcbc38bc19d3244912f
                                                                • Instruction Fuzzy Hash: BD22A372214A8091EA22EB26E4513EE6361FBC97C1F840125BB4D576F7EF38C945CB48
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID: XAi8$_qz
                                                                • API String ID: 0-3713486946
                                                                • Opcode ID: 34387fcdbc0ed474624b6c50b06e8ae23ccc9a0ad0379ffc1dec0d13a9191a60
                                                                • Instruction ID: 65ac03ba739d66467262dd71e7ac72560afce044a98cf7a436925ac3afe54517
                                                                • Opcode Fuzzy Hash: 34387fcdbc0ed474624b6c50b06e8ae23ccc9a0ad0379ffc1dec0d13a9191a60
                                                                • Instruction Fuzzy Hash: A3F1DF323157C085EA67AB26E4913DA63A5F78D7C0F44412AEB8E577E6DF38C885C700
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID: ;8z$;8z
                                                                • API String ID: 0-42769472
                                                                • Opcode ID: 6bdb26f68fd37f027b40102c0275ae052acefbf82fa5a3e6c79d93d9d862f635
                                                                • Instruction ID: 034bb983c26237dcd0f91ff9d2cb9b6cac705f323ec229efbec981b56dafba72
                                                                • Opcode Fuzzy Hash: 6bdb26f68fd37f027b40102c0275ae052acefbf82fa5a3e6c79d93d9d862f635
                                                                • Instruction Fuzzy Hash: E0C1A03261868056EA63EB26E4513EB6351EBCD3D0F914521BB9D876FBDF38C84AC704
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID: 'Y$'Y
                                                                • API String ID: 0-1958398326
                                                                • Opcode ID: fceea41aadc83191fe31f8d79a3483f29504af6969daaef50ea9d16ccd28dfb9
                                                                • Instruction ID: 1e57781e931561755a8940fa89a3d02b5544f784472651a0e8fd235a53e6d5b6
                                                                • Opcode Fuzzy Hash: fceea41aadc83191fe31f8d79a3483f29504af6969daaef50ea9d16ccd28dfb9
                                                                • Instruction Fuzzy Hash: 80919E3220458091EE62EB22E4513EE6361EBC97D4F864136BB5E476F7EF78C94AC704
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID: VUUU$VUUU
                                                                • API String ID: 0-3149182767
                                                                • Opcode ID: a1d526b479ed2d371a9825faea4e0230e52c4ccc4d22bf8ae79870c2cb38c681
                                                                • Instruction ID: 8569aa102e8c19d8f89970f2ca6a43c36757100a6f53a6002ed731a3ff29efe0
                                                                • Opcode Fuzzy Hash: a1d526b479ed2d371a9825faea4e0230e52c4ccc4d22bf8ae79870c2cb38c681
                                                                • Instruction Fuzzy Hash: E2517C332101E441E3268A2BA9047DA6A92F7DD7C8F0AA121FF8687AB5C934C902C714
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID: ;8z$;8z
                                                                • API String ID: 0-42769472
                                                                • Opcode ID: 59af1670b631fc0a1eaacae59eda8506729c894c1dad58d9025f22e82966046a
                                                                • Instruction ID: 1524e3adcade251e2c83beb4799aed6bae9ea26de440e496740cc07efab64f8e
                                                                • Opcode Fuzzy Hash: 59af1670b631fc0a1eaacae59eda8506729c894c1dad58d9025f22e82966046a
                                                                • Instruction Fuzzy Hash: 4651E4722047808AEB569F63A4953EAA791F78C7D4F04812ABF8C077E6DF79C885C704
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID: ;8z$;8z
                                                                • API String ID: 0-42769472
                                                                • Opcode ID: 660dbefeb04e62e2ed5de919be4501ab129a602df29e15ce3699bf3011c273b9
                                                                • Instruction ID: d3b781a00d2ffcabda9e8c001ca59371f513c0f2653f722da0b249b84949219c
                                                                • Opcode Fuzzy Hash: 660dbefeb04e62e2ed5de919be4501ab129a602df29e15ce3699bf3011c273b9
                                                                • Instruction Fuzzy Hash: E051DFB22003908AE7569F63E8957ABA791F78C7D4F04412ABF4D47BA6DF78C485C700
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: EnvironmentExpandStrings
                                                                • String ID:
                                                                • API String ID: 237503144-0
                                                                • Opcode ID: 8ed00c850d0231561bc1d61a5461ec5ff139e1ac8d98783abd43b8146e8999e9
                                                                • Instruction ID: d82f73877da75e293c71d4e727d7a722d71efd34477eaa20baa92d3f0435798c
                                                                • Opcode Fuzzy Hash: 8ed00c850d0231561bc1d61a5461ec5ff139e1ac8d98783abd43b8146e8999e9
                                                                • Instruction Fuzzy Hash: C6425D7230468094EA72FB26E8957EE6361EBD87C0F854132BB4D4B6E7EE38C549C744
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 0440241c4b47a54b3ee6bbea6929d4b7d0ddd601c30e8e7a688b31ac524415ee
                                                                • Instruction ID: cd9eccdd14df297c27464a2d09e93fdb77e1d314153d82e16cfa66d942684bba
                                                                • Opcode Fuzzy Hash: 0440241c4b47a54b3ee6bbea6929d4b7d0ddd601c30e8e7a688b31ac524415ee
                                                                • Instruction Fuzzy Hash: 0A42A1322046C051EA73EB26E4953EE6365EBC97C4F854122BB8D47AE7DF39C64AC704
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID: p|FI
                                                                • API String ID: 0-3199467267
                                                                • Opcode ID: 0b59ec1f163fab7664ce4c02a3222f713a8fecbaf68334b6be6cbdca70f46d07
                                                                • Instruction ID: c1f24c4f5809c67f37848217860a483fc5a6a1daf88421c6426b2d7b94ae7176
                                                                • Opcode Fuzzy Hash: 0b59ec1f163fab7664ce4c02a3222f713a8fecbaf68334b6be6cbdca70f46d07
                                                                • Instruction Fuzzy Hash: 6362A232725A8091E652EB26E4817DE7361F7D8790F804221FB9D57BEAEF38C54AC704
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 4e512f8d0a4d2ec405a10b3935d8f183c4e85f494ad182e9c5e8a0c46b7c77f9
                                                                • Instruction ID: 15548e4c416841b7ed99dc26f98e96bb5fda4b30800f823a47ecd3b4b3b6f4a6
                                                                • Opcode Fuzzy Hash: 4e512f8d0a4d2ec405a10b3935d8f183c4e85f494ad182e9c5e8a0c46b7c77f9
                                                                • Instruction Fuzzy Hash: 69228F322146C051EA77EB22E4953EE6354EBC97C0F854132BB8D4B6EBDE79C64AC704
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID: h
                                                                • API String ID: 0-2439710439
                                                                • Opcode ID: a674d9c96aeccad12fcc128bdf50705af2d4d7a4eab37689a3ce1fd418173bd2
                                                                • Instruction ID: d67dd1f4ad36aed73f1706978ef7bceb73d3e755a970a7180678d507d5d191fa
                                                                • Opcode Fuzzy Hash: a674d9c96aeccad12fcc128bdf50705af2d4d7a4eab37689a3ce1fd418173bd2
                                                                • Instruction Fuzzy Hash: 5342BE3261468091EA33EB22E4913EE6351EBD87D0F854132BB5D4B6FBEE78C649C704
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID: ;8z
                                                                • API String ID: 0-2754490334
                                                                • Opcode ID: a7d5c36b7f88a39bf9da93e51f0e39ca3a539f8b79ff94e238ce3b434bc248fc
                                                                • Instruction ID: 11d1bd51d3bc7cd00e6e351d13064e2d7517b2f2a6f803ac553f1ed91a52c1f8
                                                                • Opcode Fuzzy Hash: a7d5c36b7f88a39bf9da93e51f0e39ca3a539f8b79ff94e238ce3b434bc248fc
                                                                • Instruction Fuzzy Hash: 3E127E3272454086EA12AB27D8D13EE6351BBC9BD0F554235BB5A97BE7EE38C8068305
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID: ;8z
                                                                • API String ID: 0-2754490334
                                                                • Opcode ID: 1bfc8ca76435cbda158709eb47dd60fac55647b69933773fd53ff70e40b903c9
                                                                • Instruction ID: 3f345e5ae037506c217bb130f23ffbd2d6dc2bae09580e1f3625ef013af475a3
                                                                • Opcode Fuzzy Hash: 1bfc8ca76435cbda158709eb47dd60fac55647b69933773fd53ff70e40b903c9
                                                                • Instruction Fuzzy Hash: E712B33172064482EA27AB2799D53EE6352BB897D0F554235BF1E977F3EE38C4068309
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID: L+in
                                                                • API String ID: 0-3668643113
                                                                • Opcode ID: 48627e340aa3499e1d074b0aba22d2ddfc51f705116fd7c758ce41cf670c7b78
                                                                • Instruction ID: b57493bdc1e417d83995cb253b06230516469a89c47041eb3850c2ff4d551981
                                                                • Opcode Fuzzy Hash: 48627e340aa3499e1d074b0aba22d2ddfc51f705116fd7c758ce41cf670c7b78
                                                                • Instruction Fuzzy Hash: 2A22DF3621568091FA72EB22E4913EE6350ABD93D4F904226BF9E476F7DF38C949C704
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID: ;By
                                                                • API String ID: 0-385536339
                                                                • Opcode ID: 55c4fcd5019f714b962ae3f26a1669193510253ab40cb0ec905385f6723c46f1
                                                                • Instruction ID: b7580f4f62db7e155ba909bafc0252c67333196a93f6892fbad1103b1562aadf
                                                                • Opcode Fuzzy Hash: 55c4fcd5019f714b962ae3f26a1669193510253ab40cb0ec905385f6723c46f1
                                                                • Instruction Fuzzy Hash: 3C029F32314A8591EA63EB22E4517DB6351EB98BD0F404221BB6D5B7E6EE38C94AC704
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID: h
                                                                • API String ID: 0-2439710439
                                                                • Opcode ID: d8afe8ecfaca34b7cc7297004adccea0f6ea2024ec26cceb9fbc529502a31113
                                                                • Instruction ID: 0b943353d14db7a2bc92b4b75bf49bb2ab6428ca8c52f18252acb6ad53ac50e9
                                                                • Opcode Fuzzy Hash: d8afe8ecfaca34b7cc7297004adccea0f6ea2024ec26cceb9fbc529502a31113
                                                                • Instruction Fuzzy Hash: 77029C3221468051EA77EB62E8513EE6354EBC97C0F854132BB4E4B6FBDE79C64AC704
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID: Content-Type
                                                                • API String ID: 0-2058190213
                                                                • Opcode ID: 36490465e57f4cc1ef8e607321a67d88cda50f472a54d255246db544b5d223f6
                                                                • Instruction ID: 4f3edc5931e9a0fa5c9616044f5daa17e36247e61b0bf02c3515e83c0d1cff21
                                                                • Opcode Fuzzy Hash: 36490465e57f4cc1ef8e607321a67d88cda50f472a54d255246db544b5d223f6
                                                                • Instruction Fuzzy Hash: D002F132310680A1EA66EB27D5913EE6361F7887C4F814026FB4E87AF6DF78C959C740
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID: (
                                                                • API String ID: 0-3887548279
                                                                • Opcode ID: e3439b92af2926748c7e14371d503087ec573ba94fda3f0b27fdb60e9586671c
                                                                • Instruction ID: 9ccc9b51c43fd0c2a799b29bfa78b02dc2a3a64046f188d08a67c9852bc70ad5
                                                                • Opcode Fuzzy Hash: e3439b92af2926748c7e14371d503087ec573ba94fda3f0b27fdb60e9586671c
                                                                • Instruction Fuzzy Hash: 0EF18D322106409AEA22EF26D8817EE7761FB88BC0F464135BF4A576F7DE38D945C748
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID: `
                                                                • API String ID: 0-2679148245
                                                                • Opcode ID: 36bee3481554b40c6ec2fcd9605c18024265805e3d0bd0cb73ee570e5e3df0df
                                                                • Instruction ID: d89e24ecf0b463e8e4a733068a63b1460f8eadcde0981b2cf50b245edfc963c4
                                                                • Opcode Fuzzy Hash: 36bee3481554b40c6ec2fcd9605c18024265805e3d0bd0cb73ee570e5e3df0df
                                                                • Instruction Fuzzy Hash: 0DD1F97261879186E7668F1AD8403AE77E6F3CD788F248625FB89437A8D778C445CB01
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID: XAi8
                                                                • API String ID: 0-3264772054
                                                                • Opcode ID: d169ef6452bad55098d4f97ae6e533395988c486b7281f009eae239c0cb1e7a0
                                                                • Instruction ID: b4b267c159f4b4b310c989007faa191fbbf6e485caef9984df9265cd0c540370
                                                                • Opcode Fuzzy Hash: d169ef6452bad55098d4f97ae6e533395988c486b7281f009eae239c0cb1e7a0
                                                                • Instruction Fuzzy Hash: D5E13C322146C0A1EB63EB26E4913EE6360F7D9784F855122B78E475F6DF78C94ACB04
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID: /c!
                                                                • API String ID: 0-452405393
                                                                • Opcode ID: 58a75ee71f09d7278a94d1e180164a57c1b08330437b9d02a4b7dcf6cbc66e80
                                                                • Instruction ID: 9165314b6403980dc73c9195b5e88328d021a8351fb7f7153c08b2e46ee039ce
                                                                • Opcode Fuzzy Hash: 58a75ee71f09d7278a94d1e180164a57c1b08330437b9d02a4b7dcf6cbc66e80
                                                                • Instruction Fuzzy Hash: CDD1903221468491EA22EB16E4513EE6361FBD8BC4F858036BB4D576FBEF78C949C704
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID: 8
                                                                • API String ID: 0-4194326291
                                                                • Opcode ID: 7e61f5e791286e0c81d904c7c3eb5f79f932387feaaf9be3bd5e7eadff7b95ac
                                                                • Instruction ID: d114e9da3dc2577887031dad5e5e23304eeeba5ad47cf3fe286759b00d5dbe98
                                                                • Opcode Fuzzy Hash: 7e61f5e791286e0c81d904c7c3eb5f79f932387feaaf9be3bd5e7eadff7b95ac
                                                                • Instruction Fuzzy Hash: 30C1837231468095EA62EB27E8517EE6361F798BC0F818022BB4D4B6F7DF78C549CB44
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID: 0-3916222277
                                                                • Opcode ID: 1976154912a615cb68bc9f2aa28ca54f4e909fa57c2bf0a9af8b1bf7246b6604
                                                                • Instruction ID: 8ee96346456637837314dcfdfa602d52f5338342ed7ae7fa4c6afbff850b7b45
                                                                • Opcode Fuzzy Hash: 1976154912a615cb68bc9f2aa28ca54f4e909fa57c2bf0a9af8b1bf7246b6604
                                                                • Instruction Fuzzy Hash: 5591D232304BD195EA62EB52E4157EE6351F7897C4F404122BB8D1BBE6EF78C88AC744
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID: gdkr
                                                                • API String ID: 0-4033466662
                                                                • Opcode ID: f40c9b220da6ae3004f68ca7906f44ae640f848c28400d693b6e54b8f5431639
                                                                • Instruction ID: 585fa7f946d792673f827454751ba7b641e597000ad6b2d9cb1974408a936cdb
                                                                • Opcode Fuzzy Hash: f40c9b220da6ae3004f68ca7906f44ae640f848c28400d693b6e54b8f5431639
                                                                • Instruction Fuzzy Hash: DEA180322146C091EBB2EB26E4953EE7351EBD8780F844526BB4D476F6EF38C94AC704
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID: v/
                                                                • API String ID: 0-2473456086
                                                                • Opcode ID: 85965d1f88555edc11b4b17d4fdca74499819513be6e59e92e6d72b237f1e6ba
                                                                • Instruction ID: 1a6cda83e196654658d0530b09180c2676a96edc13d611d93f5177043e4d53ab
                                                                • Opcode Fuzzy Hash: 85965d1f88555edc11b4b17d4fdca74499819513be6e59e92e6d72b237f1e6ba
                                                                • Instruction Fuzzy Hash: 2771DDB261468096F722EB23F8507EA2651B789BC8F545031FF5A2B6F6DF38C945C700
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 2bb12f6a9f47f91b26419d01c9b41ea0b74697b0b11c516b5703bf42ee9dab02
                                                                • Instruction ID: 6de996216d9924dfbce3d3bc70e192392614267691e77499718b1e89e7e18900
                                                                • Opcode Fuzzy Hash: 2bb12f6a9f47f91b26419d01c9b41ea0b74697b0b11c516b5703bf42ee9dab02
                                                                • Instruction Fuzzy Hash: 1682B0B221568051FBA2EA17E4557EE63A0F7CA7C8F414022BB4A475F6DF7CC98AC740
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 36c9b445c3ffe63cab04b7c4be5b2c1ee4e11043864a5b4d9dcfed7c04e50bc9
                                                                • Instruction ID: 566fc70987fa900cf76fefbbee34fc3ac3ab3de4c526add649b890f6e59a7a0a
                                                                • Opcode Fuzzy Hash: 36c9b445c3ffe63cab04b7c4be5b2c1ee4e11043864a5b4d9dcfed7c04e50bc9
                                                                • Instruction Fuzzy Hash: 62821D327246C190EA62EB26E4953DE6321FBD8780F814532B74E575FBEE38C64AC744
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: c50668dc2a10cf281603af803dd4407bf2c37c3453e397f9b837345c9f903429
                                                                • Instruction ID: dad32247bde7f733b78d85508e46181d8a9b43e99f1b1131d0d0faf22c30bcee
                                                                • Opcode Fuzzy Hash: c50668dc2a10cf281603af803dd4407bf2c37c3453e397f9b837345c9f903429
                                                                • Instruction Fuzzy Hash: B362A032214694DBE7A6CF27CA44B9D3BA6F3197D0F614915EB1D43BA1CB35E8A0CB00
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 62ad143509960580b13e52389e9a4f55ce3e691f9b16dc6e21761d22ced99ba8
                                                                • Instruction ID: d1206367fc24a865a7c561d0f7883c57bef8234832861eaa278cccaa5eb4bf88
                                                                • Opcode Fuzzy Hash: 62ad143509960580b13e52389e9a4f55ce3e691f9b16dc6e21761d22ced99ba8
                                                                • Instruction Fuzzy Hash: 4B42407221468191EA32FB22E4913EE6351EBD87D0F814132BB9D4B6F7EE78C549CB44
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 705592e4b698c7859e14a743a101c2e2a08200046c91145693f38b9753b25d75
                                                                • Instruction ID: 10510479d2087df7d70aba3826c9ce79d984a9afec2d530ce1a9867ffabf1598
                                                                • Opcode Fuzzy Hash: 705592e4b698c7859e14a743a101c2e2a08200046c91145693f38b9753b25d75
                                                                • Instruction Fuzzy Hash: 8A42C1322046C0A9EB72EB67D8513ED6361E7997C4F404426BB494BAFBDF38C989C701
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CreateMutex
                                                                • String ID:
                                                                • API String ID: 1964310414-0
                                                                • Opcode ID: b7c8a5ad2f3603b8900e7cd86f83ad46a5a4bbd503c23d4640bad698494d5248
                                                                • Instruction ID: 58ecddafaa66fe80f0d3d4d6ca6818710eca9f6e3cd03e37c5a4da7a27410a4d
                                                                • Opcode Fuzzy Hash: b7c8a5ad2f3603b8900e7cd86f83ad46a5a4bbd503c23d4640bad698494d5248
                                                                • Instruction Fuzzy Hash: 9542BD732106C096EB52EF26D8457DD37A0F788B88F998036BB4D2B2A6DF35C595CB04
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 6bef9b4a4e573a529973b2779d68c3a20ee45165c6ec2652b559144d0fbbed4e
                                                                • Instruction ID: 377783eb05811bae992c82b6059fa54655fcd41b001cb5430781f318f48d7321
                                                                • Opcode Fuzzy Hash: 6bef9b4a4e573a529973b2779d68c3a20ee45165c6ec2652b559144d0fbbed4e
                                                                • Instruction Fuzzy Hash: C0428172204AC0A5EB62EB26E8957EE6320F7997C4F814022BB4D476F7DF78C589C744
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: f4c74760b80be2e7bbe10c06095f8904039e826ec222de1d75497aef9352dc3d
                                                                • Instruction ID: 5456be6d9dcee0b0c52ece1d11179e78bd18aed1203e021e4ce119f74339dca4
                                                                • Opcode Fuzzy Hash: f4c74760b80be2e7bbe10c06095f8904039e826ec222de1d75497aef9352dc3d
                                                                • Instruction Fuzzy Hash: A522DE3271029095EB22EB67E8553DE2750B78DBC8F415025BF4E5BAE7DE38C54AC708
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 1355ec4046858f29dcb102f69d972dbe7d60cfc0b91fc6341b7da5ac3d3e7b8e
                                                                • Instruction ID: 7016aeddc6909b52759e9958b60e2a86be19ed7d02b4c8bd6dfa250affc3ec1e
                                                                • Opcode Fuzzy Hash: 1355ec4046858f29dcb102f69d972dbe7d60cfc0b91fc6341b7da5ac3d3e7b8e
                                                                • Instruction Fuzzy Hash: C21265B761C2E486F777CA1AC404BBA7EA6E3493C4F8A9105FB96036E1C27BC950D711
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 37b3cea8d41dd972079c3c4f52da7c221c1164067e1b01d20c283bb9b49d3c77
                                                                • Instruction ID: 001ba950f7c542555464dc6500d766eaabb3b0993db9f773d6231281f98a2cbd
                                                                • Opcode Fuzzy Hash: 37b3cea8d41dd972079c3c4f52da7c221c1164067e1b01d20c283bb9b49d3c77
                                                                • Instruction Fuzzy Hash: 7C228C322156C090EA73EB26E4953EE6360EB89BD0F855132BB5E476F7DE38C54AC704
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: a293ac349324fdd3a8a96dc772db907601310290d934b3c7fe377970217cd142
                                                                • Instruction ID: 359163219da92053921ac2412edd517bf0b58621529858569970fe62a33f180e
                                                                • Opcode Fuzzy Hash: a293ac349324fdd3a8a96dc772db907601310290d934b3c7fe377970217cd142
                                                                • Instruction Fuzzy Hash: 31226F7231468091EB22EB22E4913DE6361F798BD4F818132BB4E5B5F7EE78C649C744
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 9f461b8a5956cd1b9ba376b477a651d77a80083ee73cc6b39186f39370da21fa
                                                                • Instruction ID: cd080ef485039a43a941478ea346b1fe68d7ea1e34743f7016d3053f522b2b30
                                                                • Opcode Fuzzy Hash: 9f461b8a5956cd1b9ba376b477a651d77a80083ee73cc6b39186f39370da21fa
                                                                • Instruction Fuzzy Hash: AE321E7220558091FAAAEA73F4513EE6360EB9A3A4F814222B7BF430F38F78D545D355
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: da1035d8f80dba83cfb05be80cd6d53d3e6b1d1cb48c981ea4378d17aa6aa3d5
                                                                • Instruction ID: b1ac3941a3d0b1b49f5263507c7f17f45b108f3ef0e2d4c39d244937c61252d3
                                                                • Opcode Fuzzy Hash: da1035d8f80dba83cfb05be80cd6d53d3e6b1d1cb48c981ea4378d17aa6aa3d5
                                                                • Instruction Fuzzy Hash: E922717220468490EB62EB23E8517EE6760EBD97C4F814022BB4D576F7DF78C98AC744
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: f0149fe45ce21c4d463ab4e009274618577ea34e2f1928b97812e4f1e76250b5
                                                                • Instruction ID: 5d5b084651197cfe53055173fa434ba16632d646a8da05bbbbef28ea20cc578c
                                                                • Opcode Fuzzy Hash: f0149fe45ce21c4d463ab4e009274618577ea34e2f1928b97812e4f1e76250b5
                                                                • Instruction Fuzzy Hash: 4612817220458091EB62EB27E4917EE6360EBD97C4F815032BB4E479F7DE78C58ACB04
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CreateMutex
                                                                • String ID:
                                                                • API String ID: 1964310414-0
                                                                • Opcode ID: 7c6370a816f49c305097a51b02b2d0634bf3546323329b47a9810179ff6b63e7
                                                                • Instruction ID: 2c7358ffb8f5af6e17b247a4b7de32ac97ba80375f4a093b0d86c0b83cf4d854
                                                                • Opcode Fuzzy Hash: 7c6370a816f49c305097a51b02b2d0634bf3546323329b47a9810179ff6b63e7
                                                                • Instruction Fuzzy Hash: 57128E722156C090EB32EB26E8917DE6360E7D8784F859126BB4D476FBEF38C549C704
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 5cae7a94e432f1cece11cfd18cb6bce688f1bdbaa9e0127805c05f59a343dd3b
                                                                • Instruction ID: ddfe0b9558d63a6d04825fc3151c3a140260e9bd4f76956e0086652d01fd24f9
                                                                • Opcode Fuzzy Hash: 5cae7a94e432f1cece11cfd18cb6bce688f1bdbaa9e0127805c05f59a343dd3b
                                                                • Instruction Fuzzy Hash: 6802A072311784A5EB22EF69D441BDD3360F788B88F855121FB4D5B6A7DE39C24AC708
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: eb258df674d6cb1b531a51d8767a9bf49bce2bb5935d7aec3706e62a8686d56f
                                                                • Instruction ID: b52ba47ff0a3a46b660c5ccd378e0d7e2bf7e26660a02814cc262da2ac66de6b
                                                                • Opcode Fuzzy Hash: eb258df674d6cb1b531a51d8767a9bf49bce2bb5935d7aec3706e62a8686d56f
                                                                • Instruction Fuzzy Hash: D212FC722145C091EA72EB26E8953EE6360FBD8784F815132BB4D475FBDE78C949CB04
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 61ddc6080dd8c6e6bdd5b959f879f397d7c53c8b52f9cab05ca04e4c7b609588
                                                                • Instruction ID: 614c407bc34069d47fb24fd08129f3f0e0b2253b6441cc03c225adf75ba774be
                                                                • Opcode Fuzzy Hash: 61ddc6080dd8c6e6bdd5b959f879f397d7c53c8b52f9cab05ca04e4c7b609588
                                                                • Instruction Fuzzy Hash: 25021B322145C094EA72FB26E8953EE6321EBD87C4F854532BB4D476BBDE38C54ACB04
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 3aa54c41154a12067a62f8388a7451798a014e6a2333cda42525ad77c46f00df
                                                                • Instruction ID: 4f1ffdf515312e7d8fe48ab1fdd42d961d655b9eaeff1ddc791901739d2b3925
                                                                • Opcode Fuzzy Hash: 3aa54c41154a12067a62f8388a7451798a014e6a2333cda42525ad77c46f00df
                                                                • Instruction Fuzzy Hash: A0F109735146908BE366CF16E804BAE7BF6F389385F664505FB6A877A4E778C840CB00
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: d2a291e0e904466ced7fe19e130c07e5bdcb0526a9dfd4a105def8b6a2be6907
                                                                • Instruction ID: 9715f591274f9026c3663a1145e45a28dcf69c7d0d6fdbbd81a8952332ae74da
                                                                • Opcode Fuzzy Hash: d2a291e0e904466ced7fe19e130c07e5bdcb0526a9dfd4a105def8b6a2be6907
                                                                • Instruction Fuzzy Hash: E002523221468491EA62EB26E4513EE6361E7D87C4F814032BB4E57AFBDF38C94AC744
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: c4f196a48f8a52898e9bae2c3ba619c9b336de31ac1c07a4786beca4e81f3dfd
                                                                • Instruction ID: b95ea965e38f8bf3e09e414f05c9c20f27c6e7dbfde3086f58067b30021c13fb
                                                                • Opcode Fuzzy Hash: c4f196a48f8a52898e9bae2c3ba619c9b336de31ac1c07a4786beca4e81f3dfd
                                                                • Instruction Fuzzy Hash: C2F14D72608BC485EBB2DF16E4507DABBA5F389BD4F544116EF8817BA9DB39C490CB00
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: b772375898a62cbb8b0ccf7d2045a58d988e1064ef7008c438244151340a3fc1
                                                                • Instruction ID: fb5273a640ee76ac379b9615f6113e537755811444702f6536a8be0576110b52
                                                                • Opcode Fuzzy Hash: b772375898a62cbb8b0ccf7d2045a58d988e1064ef7008c438244151340a3fc1
                                                                • Instruction Fuzzy Hash: 45E16E7211828097D33A8F2AE5517AEB771F329B96F145609EFAB43790E73CE940C711
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 1dfda0ffaaa17b19523a07750b70e361fa2c79080b7ea67f4d20a4e7b00ad538
                                                                • Instruction ID: fd8392b78b3e11a930f257c41ec0ab0c1916b361d70351b838ac78043bd3bfbe
                                                                • Opcode Fuzzy Hash: 1dfda0ffaaa17b19523a07750b70e361fa2c79080b7ea67f4d20a4e7b00ad538
                                                                • Instruction Fuzzy Hash: 1AE18E3221469091EB22EF22D4913EE7361F788B84F850132BB8E4B5FBEE79C545CB54
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: c0754b77ef79f555fa9131970c4017f37444823bda3bdce7ff5a9163587289cf
                                                                • Instruction ID: ad3c83f2dc3db4438ecea386e909196af56e771f78abc578d40627e4999035d1
                                                                • Opcode Fuzzy Hash: c0754b77ef79f555fa9131970c4017f37444823bda3bdce7ff5a9163587289cf
                                                                • Instruction Fuzzy Hash: 7DE18032314A8095EA63EB23E4513EF6351AB997C0F854132BB8D576EBEF38C946C704
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 3d71101fb40624dd6548934f48ee05988f8cace7645be9683cc66c70a6cdb642
                                                                • Instruction ID: 49747cfe57e389e97fe9700db2e5c4a2f2abe046aa31f6e989e6832e4faf65e8
                                                                • Opcode Fuzzy Hash: 3d71101fb40624dd6548934f48ee05988f8cace7645be9683cc66c70a6cdb642
                                                                • Instruction Fuzzy Hash: EFD18C32314A8191EA63EB23E8917EF7351AB997C0F444132BB4E576E7EE34C94AC744
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 22071c0c628fc3c4faf0f56ad8fa44a5bb271584699eb3462a35395f7721035b
                                                                • Instruction ID: 0b924e446e045e54b5c5c82538e307785483c2531b62a1f52abf1bdbbb71c30f
                                                                • Opcode Fuzzy Hash: 22071c0c628fc3c4faf0f56ad8fa44a5bb271584699eb3462a35395f7721035b
                                                                • Instruction Fuzzy Hash: ABD1A03231458195EA62EB23A4513EE6361FB887C4F924132BF4E476FADF38C906C748
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: efcdc283d63dd92ba1761f08c6d01eb9099a78749f4a4e4331452b75470a37e8
                                                                • Instruction ID: 8303fa4474b8758f92fad68e732026aa899804629f3a494df8cef63616095ad2
                                                                • Opcode Fuzzy Hash: efcdc283d63dd92ba1761f08c6d01eb9099a78749f4a4e4331452b75470a37e8
                                                                • Instruction Fuzzy Hash: 71E17F322046C091EA72EB26E4957EE6364EB987C4F814132BB9D475F7DF78CA4AC704
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 28215ec30d6cd6c3cc95c4354b41a048d659c57b640923a9558aeccd4d8a4816
                                                                • Instruction ID: 69c97a06de2efae7597a8f79478b25390279f301335fce53126e92492947a0ce
                                                                • Opcode Fuzzy Hash: 28215ec30d6cd6c3cc95c4354b41a048d659c57b640923a9558aeccd4d8a4816
                                                                • Instruction Fuzzy Hash: 9FE15B767106909BE71ECB3ACA44BDD77A2F348B84F608515EB19837A1DB35E872CB40
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 0e8843db156055c17485b0504f56b8d1f5e0d509c378523aeb8b87c723936193
                                                                • Instruction ID: 77f44bc8b87eb2d60f1e217cfabe59618c19f70aa83df1641ae07ff85e8667a8
                                                                • Opcode Fuzzy Hash: 0e8843db156055c17485b0504f56b8d1f5e0d509c378523aeb8b87c723936193
                                                                • Instruction Fuzzy Hash: 8FD15F323145C095EB62EB66E8917EE6361EBD87C0F854032BB8E476EBDE78C549C704
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 5d723126658ed1030d011829551c941041efa712a7dc02eacf0e792325e06b7b
                                                                • Instruction ID: 0263b3f88821eedb50c40231ece8106469063eb0c2b2beaaa6c07dfb107276de
                                                                • Opcode Fuzzy Hash: 5d723126658ed1030d011829551c941041efa712a7dc02eacf0e792325e06b7b
                                                                • Instruction Fuzzy Hash: 4BC126732553808BE766CF1AD848F9A7BE6F399784F268804FB69477A5C734C880CB00
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: a49c6eafb4243bb0d63eb835fc60d23e49293b888bc0e99fc9d191d5ef38aae5
                                                                • Instruction ID: 1d9a497866cdcabe0f098d4c3b0dcff6726f350f205fcff432dc51180adbc7b1
                                                                • Opcode Fuzzy Hash: a49c6eafb4243bb0d63eb835fc60d23e49293b888bc0e99fc9d191d5ef38aae5
                                                                • Instruction Fuzzy Hash: 17B18E3221558091EA23EB67E8913EF6361FBD87D4F444222BB9E176EBDE38C945C704
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 6cddf27a22375be0b7a4096b685de86c2ec7b6a7fb5b93becdc42307a2d7bdf6
                                                                • Instruction ID: e5df0eb59bbd53e7c651651ab91b4b6b03a278971fd822eacc3aaa98047e00e5
                                                                • Opcode Fuzzy Hash: 6cddf27a22375be0b7a4096b685de86c2ec7b6a7fb5b93becdc42307a2d7bdf6
                                                                • Instruction Fuzzy Hash: B1B1D17230568059EA66EB66E4513EE6361ABC87C4F848036BF0E177E7EF74C949C344
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: e64bebd17a241efae4132f9ac56c9caeb45f67c9619e894b7bc4648edd432bf9
                                                                • Instruction ID: c61a0d7da8c556cc7466413a29204a7e0459135c261b6c50195a9f10b4b1a581
                                                                • Opcode Fuzzy Hash: e64bebd17a241efae4132f9ac56c9caeb45f67c9619e894b7bc4648edd432bf9
                                                                • Instruction Fuzzy Hash: 63C1B03230468094EB62EB22E5513EE27A0AB993D4F954232BB6D47AFACF74C495C704
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 2ffb62c4a07d7f83267c6b9065baa51c1e4d945c7ceb4d3bfcb2bed2ad56b779
                                                                • Instruction ID: 134790142b3b97b95847b4a61a514738a1387cdcf1dd70a0afcc4af8b4dd36fc
                                                                • Opcode Fuzzy Hash: 2ffb62c4a07d7f83267c6b9065baa51c1e4d945c7ceb4d3bfcb2bed2ad56b779
                                                                • Instruction Fuzzy Hash: C4C1BEB76046A18BD325CF19E848EAE37B9F348B9DF568619EF5A43350E738C845C720
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: edd0f834b434f2bf531a7c4dacf1152c45a07ab9fd6670f1310d259771d1711a
                                                                • Instruction ID: dd0f375fe54df189ac07c8940ea7e551fecb9715def82de1e9c171cb3b927dc0
                                                                • Opcode Fuzzy Hash: edd0f834b434f2bf531a7c4dacf1152c45a07ab9fd6670f1310d259771d1711a
                                                                • Instruction Fuzzy Hash: CAA1E332314A4195FA22EB23E4907EA7795EB897C4F064132BB5D8B2F2EF74C845C748
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: d656a94cccb53f3aa56ba828446def543483247b94b67ae5396d58e941229561
                                                                • Instruction ID: 0194acf8010ce0f45d9e850b06dd99c8ccac33ddb205e0ad34c03680234daee6
                                                                • Opcode Fuzzy Hash: d656a94cccb53f3aa56ba828446def543483247b94b67ae5396d58e941229561
                                                                • Instruction Fuzzy Hash: ADB1AF3231468095EA22EB22E5557EE6321F7997C8F815031BB4E5B9F7DF38C94AC704
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 5641524199bb26bdb1069eca81f82738789aba220438f87a57706d06e17e6c04
                                                                • Instruction ID: 439a7f8eecc9d9876a534449d8f6631e8aa8b7719a602f165b28cc4c45348d3c
                                                                • Opcode Fuzzy Hash: 5641524199bb26bdb1069eca81f82738789aba220438f87a57706d06e17e6c04
                                                                • Instruction Fuzzy Hash: 67B14F3221498085EA62EB27D4513EE7351EBD87C4F918026BF4E876FADE78CD4AC744
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 6b8f60d3a8b96f349eec675ea816a13dd3894138a1fb9c676e1b652c75ef74f3
                                                                • Instruction ID: 7fc57fc4e8f77010d925273f781d2477c64d323da56957cafc7fd502e92bb19f
                                                                • Opcode Fuzzy Hash: 6b8f60d3a8b96f349eec675ea816a13dd3894138a1fb9c676e1b652c75ef74f3
                                                                • Instruction Fuzzy Hash: 7EA1E53271468141EBB3DE27EC95BEA6290EB987C4F025235BF5D876E5EF34C8468708
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: f38bd2db44aec05ac29437417148040b1f5d5c143f5ed4fb51e967cc132a00bf
                                                                • Instruction ID: c80ac3ecb6d1656b987ba510749a35714bf394448137a2b26375cd8e9c82af86
                                                                • Opcode Fuzzy Hash: f38bd2db44aec05ac29437417148040b1f5d5c143f5ed4fb51e967cc132a00bf
                                                                • Instruction Fuzzy Hash: 4BC12C722149C0A1EA76FB26E8953EE6324EBD8380F814532B75D475FBDE38C64AC704
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 0ee73f729a354e71214d1187840ff11e92ad5c74901910bb7ac2ae0864041b13
                                                                • Instruction ID: a65c3203221a028a91bb17d1706d6e936150e6c1db549baf523539d76c5c4377
                                                                • Opcode Fuzzy Hash: 0ee73f729a354e71214d1187840ff11e92ad5c74901910bb7ac2ae0864041b13
                                                                • Instruction Fuzzy Hash: 5FA1D53261859456FA62EB23D5507FF62A1EBC87C4F54403ABB8A476FADE38CC46D700
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: e8386c3d092bb53bc6b4488f4a78910ba90d84a1222b0ab619032d152980f0ad
                                                                • Instruction ID: 547ac5d54c2eaa5d28f6b655081ef3fed62fc73cf3f9d572ba1381e5e3ba9478
                                                                • Opcode Fuzzy Hash: e8386c3d092bb53bc6b4488f4a78910ba90d84a1222b0ab619032d152980f0ad
                                                                • Instruction Fuzzy Hash: 4EA1723231468091EA62EB63E851BEE6360EBD97C0F455032BB4D4B6F7DE39C989C744
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 3911e2bd6b250263ab92fdc96ce2460fae7ab064b37aff2dac4f4f8ffceefe1c
                                                                • Instruction ID: d30cc11252adde569b7f6da0df4126d5612ef0c6bc65161e82d6f3f0088fb840
                                                                • Opcode Fuzzy Hash: 3911e2bd6b250263ab92fdc96ce2460fae7ab064b37aff2dac4f4f8ffceefe1c
                                                                • Instruction Fuzzy Hash: F1918F3232164482E652EB63F451BEA6355ABD87C0F458132BB4E877F6EF34C846C744
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 7f4f9d16b738463221729002fad6b03493b82d8436a2c7b015a113dfe5ab0cdb
                                                                • Instruction ID: 7e710c9ac2617203f43beba31ce62dcb40599791635c0b7fad9acc34969dcd7f
                                                                • Opcode Fuzzy Hash: 7f4f9d16b738463221729002fad6b03493b82d8436a2c7b015a113dfe5ab0cdb
                                                                • Instruction Fuzzy Hash: 77B19D322146C0A0EA73EA26E8517EE7350EB997D4F814132BB5E4B5F7DE79C54AC700
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 1614f32c50059a554ca7333027dec55d2b59dc2dd749d6bc94f797f6bec2a8a4
                                                                • Instruction ID: 9b7e9e352776c38543960d9655a35f9470bc05314f40e84ba21f27ce39dcb109
                                                                • Opcode Fuzzy Hash: 1614f32c50059a554ca7333027dec55d2b59dc2dd749d6bc94f797f6bec2a8a4
                                                                • Instruction Fuzzy Hash: 04A1A37321458091EB22EB26E4517ED6320F788BC8F955032BB4E5BAF7DE79C949CB04
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: InfoSystem
                                                                • String ID:
                                                                • API String ID: 31276548-0
                                                                • Opcode ID: 04f2e88a41b5c629d2bafcb7aee871a3c6b075bec2ac7e9290475bec4902a21d
                                                                • Instruction ID: a57625ae474dbadee84eb100b4001450c5c6201bf7f235f167b8fddf00ba0a5d
                                                                • Opcode Fuzzy Hash: 04f2e88a41b5c629d2bafcb7aee871a3c6b075bec2ac7e9290475bec4902a21d
                                                                • Instruction Fuzzy Hash: 9391A032315A8094EA23EB22E4913EE6360EB897D0F855132BB4D476F7EE79C549C744
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 5ffe6d14ecc7bc6c905e338c763b95bcaf9cc6308c55806fa86460deb9c3aabe
                                                                • Instruction ID: 5892504f9edf3b4665f332decdddd9d379048aae48a6e6c455826a4f77be5dbe
                                                                • Opcode Fuzzy Hash: 5ffe6d14ecc7bc6c905e338c763b95bcaf9cc6308c55806fa86460deb9c3aabe
                                                                • Instruction Fuzzy Hash: E581F073210B49AAEB65CF36D818BE937A9F7087A8F510212FF1A576D8DB72C585C340
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 7c9d67eef98b3f6d4f39c4b0b819e657750dfe08eb1a71e89bde5cc0083ee1c3
                                                                • Instruction ID: 0edf610805f2ccee91580bb06557360baeb9c3413f19a5a14df1274918599acf
                                                                • Opcode Fuzzy Hash: 7c9d67eef98b3f6d4f39c4b0b819e657750dfe08eb1a71e89bde5cc0083ee1c3
                                                                • Instruction Fuzzy Hash: E391B27261458491EB12EB36E8917EE6761FBC87C0F818032BB4E475B7EE78C94AC744
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: a80c16a4b59aab1636d24040d992f382a1bcb1432e507a967ae7d92bebb6a43e
                                                                • Instruction ID: 522d64a59ac63a0613e99d570c0f333935a1905ca015bebfde365a4795688454
                                                                • Opcode Fuzzy Hash: a80c16a4b59aab1636d24040d992f382a1bcb1432e507a967ae7d92bebb6a43e
                                                                • Instruction Fuzzy Hash: C781BFB2714A8486D7279A6BEA00B9A7B61F359BE4F454703EF6A57BE1CF34C450C301
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: b7f9c2bf4cc64f9b948ef79ea9c29659bddc71840b5302c529e8ceba9fb13e77
                                                                • Instruction ID: 8a33a7df981600cf84977b78e815f1fd4e62f5ce92cca53076b38437f61fff32
                                                                • Opcode Fuzzy Hash: b7f9c2bf4cc64f9b948ef79ea9c29659bddc71840b5302c529e8ceba9fb13e77
                                                                • Instruction Fuzzy Hash: B881BD313116805AEA6AB763A9113FB1252ABDD7C0F544439BF0E577EBEE74CC098714
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 9c4d79e063898ba34dabb0723492a900a251396b32f819351332f8ad297da450
                                                                • Instruction ID: 8475ff83aff306424f595ac616ee7e1a8395f34c156e4b5815d5042505a48f6c
                                                                • Opcode Fuzzy Hash: 9c4d79e063898ba34dabb0723492a900a251396b32f819351332f8ad297da450
                                                                • Instruction Fuzzy Hash: D891CF3231498095FA63EB26D955BEE6361EB983C4F455026FB4E476FAEE74CC49C300
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 84bcafe9d6125485b544df604178b7d9b8c2ec6ca8923c94debc514969aea331
                                                                • Instruction ID: 986bf598998f4920f3b6c6b725d6922dea09dd1098cabac4fc0fc665a215d3a1
                                                                • Opcode Fuzzy Hash: 84bcafe9d6125485b544df604178b7d9b8c2ec6ca8923c94debc514969aea331
                                                                • Instruction Fuzzy Hash: 3D919E72204A8085EB22DF26E4557DE77A0F788BC4F058125FB8907BA9EF78C985CB05
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: b68f47ca9593ab745d5f7e9bd6a3c15c3a17bba41fb304e3338572be73171a84
                                                                • Instruction ID: a459a4f3ddba6648f0e91cde74a21281a7e53ddacec1037c3e379bd3c0eceb36
                                                                • Opcode Fuzzy Hash: b68f47ca9593ab745d5f7e9bd6a3c15c3a17bba41fb304e3338572be73171a84
                                                                • Instruction Fuzzy Hash: 6A91B072204A8485E722EF16E4447DEB7A0F788BC9F459032FB8907BAADF78C445CB04
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 67e120b33e58f42524a25941996c257529edfdfc23938f0eeb7f2e32614aa0a1
                                                                • Instruction ID: 0d6ae45b14b7bae9363db0f53c59df4fe6070fa3f74dbe6c51c53a81056b4784
                                                                • Opcode Fuzzy Hash: 67e120b33e58f42524a25941996c257529edfdfc23938f0eeb7f2e32614aa0a1
                                                                • Instruction Fuzzy Hash: 93914F3271458090EA62F726E4913DE6361EBD87C4F814032BB8E975FBEE39C64AC744
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: b3bb8fc5a84ef4876ba5eed1928198322168fc7678486e977aeb26b01adfeaa6
                                                                • Instruction ID: 2c028dbeed4bd497256e1486c5624920739b45c8b4b1be5d2abe76a73b532f90
                                                                • Opcode Fuzzy Hash: b3bb8fc5a84ef4876ba5eed1928198322168fc7678486e977aeb26b01adfeaa6
                                                                • Instruction Fuzzy Hash: 2C719B3170464045FE6BA623A4517EB1790AB9DBE0F444232BF6D1B7FBEA38C84AC704
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: b441c5f56bb465b7b43926bd647a183abf83915b2333f5860434a9697cbb6980
                                                                • Instruction ID: d8bda3664cd22cc29428fd22f01aa7d5cf8d5136f0d53399e7b1162fc01d0528
                                                                • Opcode Fuzzy Hash: b441c5f56bb465b7b43926bd647a183abf83915b2333f5860434a9697cbb6980
                                                                • Instruction Fuzzy Hash: 7E71C13271064091F622EB23E8507EE7A95AB987D0F164136BB4D977F6EF34C846C348
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: b14cc6158900702db14a573f241a60291547678fa764148644ca3968a248733e
                                                                • Instruction ID: a09aacd92d48cde11e01c995ff7d72526ab445aff92f20b6489d9b771d075f00
                                                                • Opcode Fuzzy Hash: b14cc6158900702db14a573f241a60291547678fa764148644ca3968a248733e
                                                                • Instruction Fuzzy Hash: E771B23132068085FA62EB2399917EB2251EB997D4F064231BF1A5B6F7EF39C406874D
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 469216acbd25e326dc5847aa316387f57789ae94a76dd6285e4008c568da6f26
                                                                • Instruction ID: 3cbb932b743f0b6a9a25305c521e177884dcbd24edd6d463f8ae6a63b4d851b8
                                                                • Opcode Fuzzy Hash: 469216acbd25e326dc5847aa316387f57789ae94a76dd6285e4008c568da6f26
                                                                • Instruction Fuzzy Hash: 1881A33261468191FE72EB26E4913ED6310EBD93E4F800221B7EA4B9F6DF7AC549C701
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 8becda3bbed423cf7168688a9e8166d3d218ea488ad4cbe5ccfc118f538bade9
                                                                • Instruction ID: f3a589fb8d35fe8a445a0f3c0d650d5c3e68fac9e282b7da8b7895d3b3c9ca08
                                                                • Opcode Fuzzy Hash: 8becda3bbed423cf7168688a9e8166d3d218ea488ad4cbe5ccfc118f538bade9
                                                                • Instruction Fuzzy Hash: EE61E73220464046EA23EB23A9523EBA251EB9D7C8F465036BF4A077F7DF38C845C348
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: c3e3df0801e1fd0d099692e3cebd94949b4e1ca0361b0da5013ee03d6e2f0a13
                                                                • Instruction ID: 075e30cda45728437c5daa3c0fb41d75af32e9c2c4fc525ac8467498823827b3
                                                                • Opcode Fuzzy Hash: c3e3df0801e1fd0d099692e3cebd94949b4e1ca0361b0da5013ee03d6e2f0a13
                                                                • Instruction Fuzzy Hash: B761D4B170468095FB26EE37A654BFA2652F789BD4F145021BF8A7B2F2DF38D4818704
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 76c2e91d5e551845830cb211d915f74ccb0e201966b5418599d6114bffec79de
                                                                • Instruction ID: 937547aff2db860ad747a6f8f66e65ec35c5e399a4a635c2e0da9733891184a8
                                                                • Opcode Fuzzy Hash: 76c2e91d5e551845830cb211d915f74ccb0e201966b5418599d6114bffec79de
                                                                • Instruction Fuzzy Hash: 8A51B53132458041FE53E72396957EA6252ABD9BE4F1A4231BF5E4B6F7EE34C8068708
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 350c3cdc8b63af15ec6fb8f6a6c0d1af846d51e07f92b23c595b23e827e0f1a0
                                                                • Instruction ID: 042be0ff1f91bdf149215c098a0f58d8e5dc64e88858983ed719dd83cf69d769
                                                                • Opcode Fuzzy Hash: 350c3cdc8b63af15ec6fb8f6a6c0d1af846d51e07f92b23c595b23e827e0f1a0
                                                                • Instruction Fuzzy Hash: B26194736017909AE706DF2A99413DD3BA4F79CF80F99812AAB4A037A2DF70D4B0C744
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: dea807d9a41d8b7df65dc7c087ddfb6c609c74ee08415cec2e892a40f84f6b56
                                                                • Instruction ID: 25b473a9865cfd601e4525ffffb38c57a00fc0da69e9a259231552b956712a8d
                                                                • Opcode Fuzzy Hash: dea807d9a41d8b7df65dc7c087ddfb6c609c74ee08415cec2e892a40f84f6b56
                                                                • Instruction Fuzzy Hash: DE512532314A5089EE22DA27B4417DA6751FB99BE4F124231BF6A0BBE5DBB4C841C349
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 2f89412baf56e411e39908d81ed96b3728d39644a879d5340729eb673c66850f
                                                                • Instruction ID: 038483da21c71453f2b2a20b69d45328af3bf951f9ffe6e6e230b24f3ae1ac7b
                                                                • Opcode Fuzzy Hash: 2f89412baf56e411e39908d81ed96b3728d39644a879d5340729eb673c66850f
                                                                • Instruction Fuzzy Hash: E0617EB253401047E35F8A69A856BBE33E1F358B8EF912615FE4B872C0C6389DB5E750
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: FileFindNext
                                                                • String ID:
                                                                • API String ID: 2029273394-0
                                                                • Opcode ID: 7c015ad44205c13aa433a849bfcb63a7bf91915729081104b3bd788d381ddfee
                                                                • Instruction ID: 2c4c2307401ded3a72611cdaaf03a14dd640bef9029e859167523efb7faf9384
                                                                • Opcode Fuzzy Hash: 7c015ad44205c13aa433a849bfcb63a7bf91915729081104b3bd788d381ddfee
                                                                • Instruction Fuzzy Hash: 3B51813620458051FA72FA26E4597EE2351EBC97C8F855232BB8E075F7EE39C54ACB04
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: c42a7a0a26e5240d7728d2359fc0ff49da1eb69fad46989a5746e3ed7d8a7f84
                                                                • Instruction ID: 547d2640005544a27bdc9ad86943667bbf0f88cf31367b1315b205c51b591764
                                                                • Opcode Fuzzy Hash: c42a7a0a26e5240d7728d2359fc0ff49da1eb69fad46989a5746e3ed7d8a7f84
                                                                • Instruction Fuzzy Hash: B4513F3232468091EA12E722E4913EE6761FBD87C4F814132BB4E975FBEE38C549CB44
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 7d8b5a8572101abccc95e609ae3fe5f5937fc0940557c920bf417f4b2708682f
                                                                • Instruction ID: 5eba45a1fdb1ae7d272661794a9725373d4f2a23b0ebb0f6da7652274fdad7ee
                                                                • Opcode Fuzzy Hash: 7d8b5a8572101abccc95e609ae3fe5f5937fc0940557c920bf417f4b2708682f
                                                                • Instruction Fuzzy Hash: F961AF322146C4A1EB62EB26E8557DE7761F7D87C0F944022BB8D076E6DF78C549CB04
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: eb95b2d06e2c89406de92648632d6bae4aa6abbc703145524bb928873c2ddb2a
                                                                • Instruction ID: 8b835a0a7823d21bc629ca22f73099ba8b8f655a0d2a739bd1bcfa1930153c1b
                                                                • Opcode Fuzzy Hash: eb95b2d06e2c89406de92648632d6bae4aa6abbc703145524bb928873c2ddb2a
                                                                • Instruction Fuzzy Hash: E6618C3221468091EBB2EB66E4913DE6391EBD83C4F804132BB4E47AE7DF79C549CB04
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: bbbdb3cd848cef1bcf324ece4829d2e75c29c752ce13d5527d5f170f4d56dcc3
                                                                • Instruction ID: 6a336683deb9d45d60eae563fd77f5ba93ff6c2f3b961c29a8cfb03466ce097c
                                                                • Opcode Fuzzy Hash: bbbdb3cd848cef1bcf324ece4829d2e75c29c752ce13d5527d5f170f4d56dcc3
                                                                • Instruction Fuzzy Hash: 9851493762429095EB13AF26D0947DE2761F78D7C8F452125FF8E57AA3CA38C54ACB08
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: cca41562253db3b02a2bea0722d019f9e35aa3de90fdd62a96ed961a0c8e42b1
                                                                • Instruction ID: 6bab4369129c90640170abcad223b0f3318fb145f96b9b6ca7e365bfb2f95cd6
                                                                • Opcode Fuzzy Hash: cca41562253db3b02a2bea0722d019f9e35aa3de90fdd62a96ed961a0c8e42b1
                                                                • Instruction Fuzzy Hash: 2341DD3275128051EA13EB27995A7EE6395BB997C4F864131BF0A573B3EE38C846C304
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 2f6da9df3b09c5afa92d67eb17f1408764769e99adf04271af5a326421a09d64
                                                                • Instruction ID: c52b6bcd0d1d8d142af1345d3b739cde046aa37b2f5079bf4bba20a37d5a50b5
                                                                • Opcode Fuzzy Hash: 2f6da9df3b09c5afa92d67eb17f1408764769e99adf04271af5a326421a09d64
                                                                • Instruction Fuzzy Hash: 4051497362425087F72BCF26E848BEC3692E389395F264915FB2A87BE1D774C981C740
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: b2d5822f8b8718a9c9323a545c86d5e2ce7a9b47eb58a95b4ad9fc3b1856baa0
                                                                • Instruction ID: 78ab46746c5de0a0b131be2df4e17d50b772519b96a7efa5b0abc71eeea6424d
                                                                • Opcode Fuzzy Hash: b2d5822f8b8718a9c9323a545c86d5e2ce7a9b47eb58a95b4ad9fc3b1856baa0
                                                                • Instruction Fuzzy Hash: 18514D336057848AD726DF2AA8403CDBFA1F798B40F598129978E43762CF38E455C744
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CreateMutex
                                                                • String ID:
                                                                • API String ID: 1964310414-0
                                                                • Opcode ID: 45455b43954daad3403a58dd0c1ee1726b1256e76fb8b8ab197ed2532f14ef0a
                                                                • Instruction ID: 5749dbb5cf6beb60d75889d1312cbaf2c02b37b26aa8a071aa8c7ad63a6a8580
                                                                • Opcode Fuzzy Hash: 45455b43954daad3403a58dd0c1ee1726b1256e76fb8b8ab197ed2532f14ef0a
                                                                • Instruction Fuzzy Hash: 2451B17331179095E702DF19E889BDE37A8F798788F9A9035EB59572A2EF34C184C700
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 3c33bfa011d9b24110175bc3c3edf5fe580f722f3b20ddd5559848290a469365
                                                                • Instruction ID: 399a9bbd44fcbcde3ca9481232a088b3022927e0a6cc8466699d02d3e50ed9a3
                                                                • Opcode Fuzzy Hash: 3c33bfa011d9b24110175bc3c3edf5fe580f722f3b20ddd5559848290a469365
                                                                • Instruction Fuzzy Hash: EA4104737146A041FA63EB62E5553EE6360EB983C4F812126BB4E575F6DE38CE86C300
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: d60c4eb3f331277f51e128d360448149fb3ec34100e5ca7b2d705710275f2a38
                                                                • Instruction ID: 48d881a1283dcb77ee13601978ef0829b3fd6a3f47b48fb1367d3b190c93de04
                                                                • Opcode Fuzzy Hash: d60c4eb3f331277f51e128d360448149fb3ec34100e5ca7b2d705710275f2a38
                                                                • Instruction Fuzzy Hash: 8451D37371468051EB62EB62E4553EE6360FB883C4F815426BB4E972F6DF38C986C704
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: c6593237cbb8c0c2fc4de9cd5603ae006cf82f4e274f733b84e91e47d03ba7b1
                                                                • Instruction ID: a127292733e2a66acc7bc97f1e09c2ee02a882ed43ed511ee5345f62802b022a
                                                                • Opcode Fuzzy Hash: c6593237cbb8c0c2fc4de9cd5603ae006cf82f4e274f733b84e91e47d03ba7b1
                                                                • Instruction Fuzzy Hash: D541E13261468095FB67DA27DA017EA2A91F7997D4F868131FF4A077F2DB31C9A1C308
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: f94976e644f3abb6795ecdbce2c9f30dc6a7b87ad2e2da249553ff5aaf5545fb
                                                                • Instruction ID: c779f6877998932b01ae0e06ce2ea1b73ae388da8ae7eddd3499e2c381f2c0d8
                                                                • Opcode Fuzzy Hash: f94976e644f3abb6795ecdbce2c9f30dc6a7b87ad2e2da249553ff5aaf5545fb
                                                                • Instruction Fuzzy Hash: FD5169B3600790AAD709CF2AD9453CD3BA5F358B84F58811AEB4943752DF71E5B4C784
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 414f84b4063aa10ac0672e5205c9c956ebc20fc8438fecc7ceab931f8d5830d7
                                                                • Instruction ID: 645acab32caed0ef0661701442c741fdba85ad2607a51896ee62d630afbe338c
                                                                • Opcode Fuzzy Hash: 414f84b4063aa10ac0672e5205c9c956ebc20fc8438fecc7ceab931f8d5830d7
                                                                • Instruction Fuzzy Hash: DC51403221468096FBA2E726E8513DA6391EBD83C0F944436BB4E475F6DF74C94ECB04
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: a859fb7025f9e627e932e6eeda1f31e72fb535a9a21b3d37d0cd27801fcaa3f9
                                                                • Instruction ID: 6cd98b227ae20813e1b003f381f11a011fe5da42f19e94dba8503c57e6e2fd7a
                                                                • Opcode Fuzzy Hash: a859fb7025f9e627e932e6eeda1f31e72fb535a9a21b3d37d0cd27801fcaa3f9
                                                                • Instruction Fuzzy Hash: 7D41A532315A508AE6579BA2B511BDB7392FB887C4F0090297F0E4B7E6DF78C84AC710
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 34fc17c20155ea7be63529a1f5f2ed538eba471424154b2afa4ca012cc081905
                                                                • Instruction ID: b302963a1947ac908e9adeba206684f6e9f8020cdc8775d5726c4c97186140e8
                                                                • Opcode Fuzzy Hash: 34fc17c20155ea7be63529a1f5f2ed538eba471424154b2afa4ca012cc081905
                                                                • Instruction Fuzzy Hash: C841BE3232444041EA72B62BD9553DA6262FFD97C0F464032BB4E47AFAED38C546C708
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 9221b8376f061b23e28f1996966abf7df0e7d6d654a9fd457b95819bb692abe0
                                                                • Instruction ID: b7e86a323b77a9057e1202da35b7ba8af12d74a860c0fbfc01c8a136ca333e7a
                                                                • Opcode Fuzzy Hash: 9221b8376f061b23e28f1996966abf7df0e7d6d654a9fd457b95819bb692abe0
                                                                • Instruction Fuzzy Hash: D341803232464091E602EB27E9917DEB265FBD8BD0F424032BF4957AE7EE39C446C708
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: QueryValue
                                                                • String ID:
                                                                • API String ID: 3660427363-0
                                                                • Opcode ID: fc5984376eb051d50dec173aefa735c955821396b24f12ff4bad8e0d79a1ad25
                                                                • Instruction ID: 8e08265afe9cfa1c3bea83ee44b27ef5707dd53d316fac6b76988c626cbfd5b3
                                                                • Opcode Fuzzy Hash: fc5984376eb051d50dec173aefa735c955821396b24f12ff4bad8e0d79a1ad25
                                                                • Instruction Fuzzy Hash: 35418E3231444050EB22EA27D9517EF6652BBDA3C4F964132BB4F47AFAED38C546C708
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 8b46dce1223a07099d8818aeec5256f62f65cb662a967074981c414c60e51204
                                                                • Instruction ID: bcad149024cdd53e30ffc1e18bcd8ec81b5414f972ad0b29ddf4d104b0e83a06
                                                                • Opcode Fuzzy Hash: 8b46dce1223a07099d8818aeec5256f62f65cb662a967074981c414c60e51204
                                                                • Instruction Fuzzy Hash: 43318A162091E149F6378A276720BFB6EA1B34D7C8F2E5260FFC613766D678C401E714
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 7f071b76d72c78af3e8b7b6830851e4ff7cbfcb4ddea441033cee3835cb51048
                                                                • Instruction ID: 93f3223b7f3699b1010c310264375bf9224384a6df1baeec3913b449a5218215
                                                                • Opcode Fuzzy Hash: 7f071b76d72c78af3e8b7b6830851e4ff7cbfcb4ddea441033cee3835cb51048
                                                                • Instruction Fuzzy Hash: E7318E3620061051FB13EB27981ABEB2351BB997C8F595031BF1A0B2F6EE39C286C344
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: bfa4ba01a9a63d708f82a69bed9c75ea070693ce07e2f396f9df8868ff39eb87
                                                                • Instruction ID: 2c6b48b5bfc0ddf596a336613fb54521902c00fde9959625db7200604f91dcd5
                                                                • Opcode Fuzzy Hash: bfa4ba01a9a63d708f82a69bed9c75ea070693ce07e2f396f9df8868ff39eb87
                                                                • Instruction Fuzzy Hash: 4931A33221065050F713EB279956BEF2352BBD97C8F4A4022BF4A176F6DE39C186C344
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 838dfd01d20474cb9806c5182b5221336f7dc654ee3c3f97c03829b489621df9
                                                                • Instruction ID: 14aa1654078c53923a2b6e592640b83f7c12c006d1cda848b12233c819d61fbe
                                                                • Opcode Fuzzy Hash: 838dfd01d20474cb9806c5182b5221336f7dc654ee3c3f97c03829b489621df9
                                                                • Instruction Fuzzy Hash: B7412C337006C095D746DF5AEC8EBDE3BA9F7A4788F6680269749032A5DF318595C708
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000001.00000002.435584389.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                • Associated: 00000001.00000002.435575678.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435637674.0000000140067000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435651562.0000000140077000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435658216.0000000140078000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435665191.000000014007C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000001.00000002.435670785.000000014007D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_1_2_140000000_loaddll64.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 92b5dc0448be78ef63a620c3516bc06fd64954d094ce2cd83967515d1e418860
                                                                • Instruction ID: 3f51c5ef925b34b2db42345c9f3a9e8deedd07585fd62551f5277b2a58a138e3
                                                                • Opcode Fuzzy Hash: 92b5dc0448be78ef63a620c3516bc06fd64954d094ce2cd83967515d1e418860
                                                                • Instruction Fuzzy Hash: A6315E33B107D885E741DB1DD88EBDE37A9F7B4788F668025A309032A5CF3185A5C744
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Execution Graph

                                                                Execution Coverage:19.3%
                                                                Dynamic/Decrypted Code Coverage:100%
                                                                Signature Coverage:0%
                                                                Total number of Nodes:15
                                                                Total number of Limit Nodes:1
                                                                execution_graph 228 1f1da322924 229 1f1da322932 228->229 234 1f1da321ff9 VirtualAlloc 229->234 231 1f1da32294e 236 1f1da3221ff 231->236 233 1f1da322966 235 1f1da322060 234->235 235->231 237 1f1da3222a7 236->237 238 1f1da322320 VirtualProtect 236->238 237->238 239 1f1da32238a 238->239 240 1f1da3223ef VirtualProtect 239->240 241 1f1da3224e6 240->241 242 1f1da3224a9 VirtualProtect 240->242 244 1f1da322564 241->244 245 1f1da32252e RtlAvlRemoveNode 241->245 242->241 244->233 245->244

                                                                Callgraph

                                                                Control-flow Graph

                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.509240836.000001F1DA320000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F1DA320000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_1f1da320000_rundll32.jbxd
                                                                Similarity
                                                                • API ID: ProtectVirtual$NodeRemove
                                                                • String ID:
                                                                • API String ID: 3879549435-0
                                                                • Opcode ID: 1b6da50fd627264e403de7a9f4910c0b436276e4a5d7975b4b93b6a2f5d25f20
                                                                • Instruction ID: fec938377b3601a2836b9eb7c4354d903b2c65e0c494bcccdcb21e51f401690f
                                                                • Opcode Fuzzy Hash: 1b6da50fd627264e403de7a9f4910c0b436276e4a5d7975b4b93b6a2f5d25f20
                                                                • Instruction Fuzzy Hash: E1B141B7618BC586D730CB5AE4807EAB7A1F789B80F508026EE8957B59DB79C841CF40
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                APIs
                                                                • VirtualAlloc.KERNELBASE(?,?,?,?,?,?,?,?,?,000001F1DA32294E), ref: 000001F1DA32204C
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.509240836.000001F1DA320000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001F1DA320000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_1f1da320000_rundll32.jbxd
                                                                Similarity
                                                                • API ID: AllocVirtual
                                                                • String ID:
                                                                • API String ID: 4275171209-0
                                                                • Opcode ID: 799aaca31b646477e88f6dddc5f95537b0a7e835f068912a2fbbb285de816f1e
                                                                • Instruction ID: 29adb68564acf3bc979e833c1507c6095493297e6880f1b1070664ee33d0d996
                                                                • Opcode Fuzzy Hash: 799aaca31b646477e88f6dddc5f95537b0a7e835f068912a2fbbb285de816f1e
                                                                • Instruction Fuzzy Hash: 49315A72615B9086D790CF5AE09579A7BB1F389BC4F205026EF8D97B68DB3AC442CB00
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Execution Graph

                                                                Execution Coverage:19.6%
                                                                Dynamic/Decrypted Code Coverage:100%
                                                                Signature Coverage:0%
                                                                Total number of Nodes:15
                                                                Total number of Limit Nodes:1
                                                                execution_graph 227 22341ce2924 228 22341ce2932 227->228 233 22341ce1ff9 VirtualAlloc 228->233 230 22341ce294e 235 22341ce21ff 230->235 232 22341ce2966 234 22341ce2060 233->234 234->230 236 22341ce2320 VirtualProtect 235->236 238 22341ce22a7 235->238 237 22341ce238a 236->237 239 22341ce23ef VirtualProtect 237->239 238->236 240 22341ce24a9 VirtualProtect 239->240 241 22341ce24e6 239->241 240->241 243 22341ce2564 241->243 244 22341ce252e RtlAvlRemoveNode 241->244 243->232 244->243

                                                                Callgraph

                                                                Control-flow Graph

                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.416671041.0000022341CE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000022341CE0000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_22341ce0000_rundll32.jbxd
                                                                Similarity
                                                                • API ID: ProtectVirtual$NodeRemove
                                                                • String ID:
                                                                • API String ID: 3879549435-0
                                                                • Opcode ID: 1b6da50fd627264e403de7a9f4910c0b436276e4a5d7975b4b93b6a2f5d25f20
                                                                • Instruction ID: a64cd7550408a0cfa6332f36bb9abed23376bcf3f25ba8c7e94caedd720abb16
                                                                • Opcode Fuzzy Hash: 1b6da50fd627264e403de7a9f4910c0b436276e4a5d7975b4b93b6a2f5d25f20
                                                                • Instruction Fuzzy Hash: FBB132B6618BC486D770CB5AE44079AB7A1F789B80F108026EEC957B68DB7DC951CF40
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                APIs
                                                                • VirtualAlloc.KERNELBASE(?,?,?,?,?,?,?,?,?,0000022341CE294E), ref: 0000022341CE204C
                                                                Memory Dump Source
                                                                • Source File: 00000004.00000002.416671041.0000022341CE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000022341CE0000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_4_2_22341ce0000_rundll32.jbxd
                                                                Similarity
                                                                • API ID: AllocVirtual
                                                                • String ID:
                                                                • API String ID: 4275171209-0
                                                                • Opcode ID: 799aaca31b646477e88f6dddc5f95537b0a7e835f068912a2fbbb285de816f1e
                                                                • Instruction ID: a5602d8a52fe9f51cec02490418289587c4ea15d6fce643fe8c4addc4b24dbab
                                                                • Opcode Fuzzy Hash: 799aaca31b646477e88f6dddc5f95537b0a7e835f068912a2fbbb285de816f1e
                                                                • Instruction Fuzzy Hash: 02315A72615B8086D790DF5AE45579A7BB1F389BC4F205026EF8D97B28DB3AC452CB00
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Execution Graph

                                                                Execution Coverage:19.6%
                                                                Dynamic/Decrypted Code Coverage:100%
                                                                Signature Coverage:0%
                                                                Total number of Nodes:15
                                                                Total number of Limit Nodes:1
                                                                execution_graph 227 27e57582924 228 27e57582932 227->228 233 27e57581ff9 VirtualAlloc 228->233 230 27e5758294e 235 27e575821ff 230->235 232 27e57582966 234 27e57582060 233->234 234->230 236 27e57582320 VirtualProtect 235->236 237 27e575822a7 235->237 238 27e5758238a 236->238 237->236 239 27e575823ef VirtualProtect 238->239 240 27e575824e6 239->240 241 27e575824a9 VirtualProtect 239->241 243 27e57582564 240->243 244 27e5758252e RtlAvlRemoveNode 240->244 241->240 243->232 244->243

                                                                Callgraph

                                                                Control-flow Graph

                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000006.00000002.422469250.0000027E57580000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000027E57580000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_6_2_27e57580000_rundll32.jbxd
                                                                Similarity
                                                                • API ID: ProtectVirtual$NodeRemove
                                                                • String ID:
                                                                • API String ID: 3879549435-0
                                                                • Opcode ID: 1b6da50fd627264e403de7a9f4910c0b436276e4a5d7975b4b93b6a2f5d25f20
                                                                • Instruction ID: 4819b7f92bf2bf3c0ee280311e8026b0c5bde2d10c8b90f54de0aa4410d031ae
                                                                • Opcode Fuzzy Hash: 1b6da50fd627264e403de7a9f4910c0b436276e4a5d7975b4b93b6a2f5d25f20
                                                                • Instruction Fuzzy Hash: 87B16576618BC986DB30CB1AF440B9EB7A0F7C9B84F508026EE8D57B58DB79C8518F40
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                APIs
                                                                • VirtualAlloc.KERNELBASE(?,?,?,?,?,?,?,?,?,0000027E5758294E), ref: 0000027E5758204C
                                                                Memory Dump Source
                                                                • Source File: 00000006.00000002.422469250.0000027E57580000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000027E57580000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_6_2_27e57580000_rundll32.jbxd
                                                                Similarity
                                                                • API ID: AllocVirtual
                                                                • String ID:
                                                                • API String ID: 4275171209-0
                                                                • Opcode ID: 799aaca31b646477e88f6dddc5f95537b0a7e835f068912a2fbbb285de816f1e
                                                                • Instruction ID: f4a784d3362edf37d51eea13c496cafd7e09671b4bd7e26406350e66d38aa364
                                                                • Opcode Fuzzy Hash: 799aaca31b646477e88f6dddc5f95537b0a7e835f068912a2fbbb285de816f1e
                                                                • Instruction Fuzzy Hash: 1D316B72615B8486D790CF1AF45979A7BB1F389BC4F205026EF8D97B28DF3AC4428B00
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Execution Graph

                                                                Execution Coverage:19.6%
                                                                Dynamic/Decrypted Code Coverage:100%
                                                                Signature Coverage:0%
                                                                Total number of Nodes:15
                                                                Total number of Limit Nodes:1
                                                                execution_graph 227 25311a22924 228 25311a22932 227->228 233 25311a21ff9 VirtualAlloc 228->233 230 25311a2294e 235 25311a221ff 230->235 232 25311a22966 234 25311a22060 233->234 234->230 236 25311a22320 VirtualProtect 235->236 237 25311a222a7 235->237 238 25311a2238a 236->238 237->236 239 25311a223ef VirtualProtect 238->239 240 25311a224e6 239->240 241 25311a224a9 VirtualProtect 239->241 243 25311a22564 240->243 244 25311a2252e RtlAvlRemoveNode 240->244 241->240 243->232 244->243

                                                                Callgraph

                                                                Control-flow Graph

                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.429624700.0000025311A20000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000025311A20000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_25311a20000_rundll32.jbxd
                                                                Similarity
                                                                • API ID: ProtectVirtual$NodeRemove
                                                                • String ID:
                                                                • API String ID: 3879549435-0
                                                                • Opcode ID: 1b6da50fd627264e403de7a9f4910c0b436276e4a5d7975b4b93b6a2f5d25f20
                                                                • Instruction ID: 55829c4ed1f3dca81d8b58a7c527e9b1d83a67852100932f37b7c5d91865dcd9
                                                                • Opcode Fuzzy Hash: 1b6da50fd627264e403de7a9f4910c0b436276e4a5d7975b4b93b6a2f5d25f20
                                                                • Instruction Fuzzy Hash: 1EB142B6618BC486D770CB2AE4407DABBA0F7C9B80F108026EE8D57B59DB7DC9518F40
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                APIs
                                                                • VirtualAlloc.KERNELBASE(?,?,?,?,?,?,?,?,?,0000025311A2294E), ref: 0000025311A2204C
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.429624700.0000025311A20000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000025311A20000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_25311a20000_rundll32.jbxd
                                                                Similarity
                                                                • API ID: AllocVirtual
                                                                • String ID:
                                                                • API String ID: 4275171209-0
                                                                • Opcode ID: 799aaca31b646477e88f6dddc5f95537b0a7e835f068912a2fbbb285de816f1e
                                                                • Instruction ID: 5edfbbff900c805c40dd1be6e800d74148796de03a7e459b0e432bd78ad4e997
                                                                • Opcode Fuzzy Hash: 799aaca31b646477e88f6dddc5f95537b0a7e835f068912a2fbbb285de816f1e
                                                                • Instruction Fuzzy Hash: E7316D76615B8086D790CF1AE45579A7BB1F389BC4F209026EF4D97B18DF3AC4428B00
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Execution Graph

                                                                Execution Coverage:1.4%
                                                                Dynamic/Decrypted Code Coverage:100%
                                                                Signature Coverage:0%
                                                                Total number of Nodes:15
                                                                Total number of Limit Nodes:1
                                                                execution_graph 5749 1b48fd72924 5750 1b48fd72932 5749->5750 5755 1b48fd71ff9 VirtualAlloc 5750->5755 5752 1b48fd7294e 5757 1b48fd721ff 5752->5757 5754 1b48fd72966 5756 1b48fd72060 5755->5756 5756->5752 5758 1b48fd722a7 5757->5758 5759 1b48fd72320 VirtualProtect 5757->5759 5758->5759 5760 1b48fd7238a 5759->5760 5761 1b48fd723ef VirtualProtect 5760->5761 5764 1b48fd724e6 5761->5764 5765 1b48fd724a9 VirtualProtect 5761->5765 5763 1b48fd72564 5763->5754 5764->5763 5766 1b48fd7252e RtlAvlRemoveNode 5764->5766 5765->5764 5766->5763

                                                                Control-flow Graph

                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000018.00000002.623170270.000001B48FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001B48FD70000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_24_2_1b48fd70000_wermgr.jbxd
                                                                Similarity
                                                                • API ID: ProtectVirtual$NodeRemove
                                                                • String ID:
                                                                • API String ID: 3879549435-0
                                                                • Opcode ID: 1b6da50fd627264e403de7a9f4910c0b436276e4a5d7975b4b93b6a2f5d25f20
                                                                • Instruction ID: 4f91fe3f7664c0017427edd31bc0f1eb0140b50e0c7e838bbee7f78243934eda
                                                                • Opcode Fuzzy Hash: 1b6da50fd627264e403de7a9f4910c0b436276e4a5d7975b4b93b6a2f5d25f20
                                                                • Instruction Fuzzy Hash: 4CB131B6618BC486D770CB5AE4407DEB7A1F7C9B80F10812AEF8957B59DB79C8428F40
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                APIs
                                                                • VirtualAlloc.KERNELBASE(?,?,?,?,?,?,?,?,?,000001B48FD7294E), ref: 000001B48FD7204C
                                                                Memory Dump Source
                                                                • Source File: 00000018.00000002.623170270.000001B48FD70000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001B48FD70000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_24_2_1b48fd70000_wermgr.jbxd
                                                                Similarity
                                                                • API ID: AllocVirtual
                                                                • String ID:
                                                                • API String ID: 4275171209-0
                                                                • Opcode ID: 799aaca31b646477e88f6dddc5f95537b0a7e835f068912a2fbbb285de816f1e
                                                                • Instruction ID: 7a232c0ffce4b6040465f908d26afc4f0345349fbea5562073a4396a3078b8f7
                                                                • Opcode Fuzzy Hash: 799aaca31b646477e88f6dddc5f95537b0a7e835f068912a2fbbb285de816f1e
                                                                • Instruction Fuzzy Hash: 6A317F72615B8086D780DF5AE05579A7BB1F389FC4F209526EF4E97B18DF3AC4428B00
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000018.00000002.623541171.00007FF7E4381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF7E4380000, based on PE: true
                                                                • Associated: 00000018.00000002.623534030.00007FF7E4380000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623554275.00007FF7E4395000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623593260.00007FF7E439E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623622611.00007FF7E43A0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623639350.00007FF7E43A2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_24_2_7ff7e4380000_wermgr.jbxd
                                                                Similarity
                                                                • API ID: Event$CommandGuidsInformationLineRegisterTraceUnregister$ArgvBreakDebugDebuggerErrorFileFreeHeapLastLocalModuleNamePresentSleep
                                                                • String ID: -boot$-clean$-datacollectorcreate$-nonelevated$-outproc$-purgestores$-queuereporting$-queuereporting_s_machine$-queuereporting_svc$-upload$-uploadforce$-waitforpendingreports$COutofProcReportManager::Start failed$Could not get command line arguments.$Could not open queue store$DataCollectorCreate failed$DoBootActivities failed$DoCoreUpload failed$DoQueueReporting failed$Failed to load policy settings.$Failed to purge WER stores$Initiating live report flush$Not launching reporting console: pester has not expired$Software\Microsoft\Windows\Windows Error Reporting\Debug$StartNonElevatedProcessInstance failed.$Starting %ws...$Too few arguments, aborting.$Unrecognized argument: %ws$UpdateLastPesterTime failed$WaitForPending reports failed$WaitForPendingReports called with invalid timeout value.$WerpCleanWer failed$WerpSubmitReportFromStore failed$WinMain$WriteWnfWerQueuedReports$WriteWnfWerQueuedReports failed$Writing zero to the WNF state$Wrong number of args WERMGR_CMDLINE_QUEUE_REPORTING_SINGLE_MACHINE$Wrong number of args WERMGR_CMDLINE_QUEUE_REPORTING_SVC$Wrong number of args for WERMGR_CMDLINE_OUT_PROC_REPORTING$Wrong number of args for WERMGR_CMDLINE_WAIT_FOR_PENDING_REPORTS$onecore\windows\feedback\core\wermgr\lib\wermgr.cpp$wermgr
                                                                • API String ID: 29347999-1392613952
                                                                • Opcode ID: a8a452b4fbe8a2828c6884667974043ee65c0d7db686c917314a4ac2d003bcac
                                                                • Instruction ID: c9459ab8b8121478a0140cbe556376d781f07b5989b21517c09b7e90fafd11c6
                                                                • Opcode Fuzzy Hash: a8a452b4fbe8a2828c6884667974043ee65c0d7db686c917314a4ac2d003bcac
                                                                • Instruction Fuzzy Hash: 78924469A0874385E710AF26ECC02A9F3A1FBA8784F90413BDA4D67B99DF3DD145C712
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 762 7ff7e438ae50-7ff7e438ae81 763 7ff7e438ae83-7ff7e438ae88 762->763 764 7ff7e438ae8d-7ff7e438aeb2 GetFileSecurityW 762->764 765 7ff7e438b485-7ff7e438b49a 763->765 766 7ff7e438aeb4-7ff7e438aece GetLastError 764->766 767 7ff7e438af1d 764->767 769 7ff7e438aed0-7ff7e438aed6 766->769 770 7ff7e438aed8-7ff7e438aee9 766->770 768 7ff7e438af20-7ff7e438af2d call 7ff7e4393000 767->768 781 7ff7e438af2f-7ff7e438af45 768->781 782 7ff7e438af65-7ff7e438af85 GetFileSecurityW 768->782 769->768 769->770 772 7ff7e438aeef-7ff7e438aef8 770->772 773 7ff7e438b443-7ff7e438b44a 770->773 772->773 774 7ff7e438aefe 772->774 775 7ff7e438b457-7ff7e438b45a 773->775 776 7ff7e438b44c-7ff7e438b452 LocalFree 773->776 778 7ff7e438af01 774->778 779 7ff7e438b464-7ff7e438b46b 775->779 780 7ff7e438b45c-7ff7e438b45f call 7ff7e4392ff8 775->780 776->775 783 7ff7e438af05-7ff7e438af18 call 7ff7e4388afc 778->783 785 7ff7e438b478-7ff7e438b47b 779->785 786 7ff7e438b46d-7ff7e438b473 CloseHandle 779->786 780->779 781->773 787 7ff7e438af4b-7ff7e438af52 781->787 788 7ff7e438af87-7ff7e438afad GetLastError 782->788 789 7ff7e438afca-7ff7e438afe1 GetSecurityDescriptorDacl 782->789 783->773 785->765 793 7ff7e438b47d-7ff7e438b480 call 7ff7e4392ff8 785->793 786->785 787->773 794 7ff7e438af58-7ff7e438af63 787->794 788->773 795 7ff7e438afb3-7ff7e438afbc 788->795 790 7ff7e438afe3-7ff7e438b009 GetLastError 789->790 791 7ff7e438b026-7ff7e438b05e GetCurrentThread OpenThreadToken 789->791 790->773 796 7ff7e438b00f-7ff7e438b018 790->796 798 7ff7e438b064-7ff7e438b08d GetLastError 791->798 799 7ff7e438b10d-7ff7e438b12e GetTokenInformation 791->799 793->765 794->783 795->773 801 7ff7e438afc2-7ff7e438afc5 795->801 796->773 804 7ff7e438b01e 796->804 805 7ff7e438b08f-7ff7e438b093 798->805 806 7ff7e438b0a4-7ff7e438b0bb GetCurrentProcess OpenProcessToken 798->806 802 7ff7e438b130-7ff7e438b153 GetLastError 799->802 803 7ff7e438b181 799->803 801->778 807 7ff7e438b155-7ff7e438b15b 802->807 808 7ff7e438b15d-7ff7e438b167 802->808 809 7ff7e438b184-7ff7e438b191 call 7ff7e4393000 803->809 804->791 805->806 810 7ff7e438b095-7ff7e438b09f call 7ff7e4381380 805->810 806->799 811 7ff7e438b0bd-7ff7e438b0e1 GetLastError 806->811 807->808 807->809 808->773 812 7ff7e438b16d-7ff7e438b171 808->812 820 7ff7e438b193-7ff7e438b1a2 809->820 821 7ff7e438b1c5-7ff7e438b1e3 GetTokenInformation 809->821 810->806 811->773 815 7ff7e438b0e7-7ff7e438b0f0 811->815 812->773 816 7ff7e438b177-7ff7e438b17c 812->816 815->773 818 7ff7e438b0f6 815->818 819 7ff7e438b0f9-7ff7e438b108 call 7ff7e4381380 816->819 818->819 819->773 820->773 824 7ff7e438b1a8-7ff7e438b1ac 820->824 822 7ff7e438b1e5-7ff7e438b20d GetLastError 821->822 823 7ff7e438b227-7ff7e438b266 SetEntriesInAclW 821->823 822->773 827 7ff7e438b213-7ff7e438b217 822->827 828 7ff7e438b2a4-7ff7e438b2b2 InitializeSecurityDescriptor 823->828 829 7ff7e438b268-7ff7e438b28a 823->829 824->773 830 7ff7e438b1b2-7ff7e438b1bd 824->830 827->773 831 7ff7e438b21d 827->831 833 7ff7e438b2b4-7ff7e438b2dc GetLastError 828->833 834 7ff7e438b2fa-7ff7e438b30f SetSecurityDescriptorDacl 828->834 829->773 832 7ff7e438b290-7ff7e438b294 829->832 830->821 831->823 832->773 837 7ff7e438b29a 832->837 833->773 838 7ff7e438b2e2-7ff7e438b2e6 833->838 835 7ff7e438b350-7ff7e438b364 SetFileSecurityW 834->835 836 7ff7e438b311-7ff7e438b339 GetLastError 834->836 840 7ff7e438b366-7ff7e438b38e GetLastError 835->840 841 7ff7e438b3a8-7ff7e438b3b4 GetFileAttributesW 835->841 836->773 839 7ff7e438b33f-7ff7e438b343 836->839 837->828 838->773 842 7ff7e438b2ec 838->842 839->773 843 7ff7e438b349-7ff7e438b34e 839->843 840->773 844 7ff7e438b394-7ff7e438b398 840->844 845 7ff7e438b3f0-7ff7e438b3f3 841->845 846 7ff7e438b3b6-7ff7e438b3de GetLastError 841->846 847 7ff7e438b2f1 842->847 843->847 844->773 848 7ff7e438b39e-7ff7e438b3a3 844->848 850 7ff7e438b441 845->850 851 7ff7e438b3f5-7ff7e438b405 SetFileAttributesW 845->851 846->773 849 7ff7e438b3e0-7ff7e438b3e4 846->849 847->834 848->847 849->773 852 7ff7e438b3e6-7ff7e438b3eb 849->852 850->773 851->850 853 7ff7e438b407-7ff7e438b42f GetLastError 851->853 852->847 853->773 854 7ff7e438b431-7ff7e438b435 853->854 854->773 855 7ff7e438b437 854->855 855->850
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000018.00000002.623541171.00007FF7E4381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF7E4380000, based on PE: true
                                                                • Associated: 00000018.00000002.623534030.00007FF7E4380000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623554275.00007FF7E4395000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623593260.00007FF7E439E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623622611.00007FF7E43A0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623639350.00007FF7E43A2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_24_2_7ff7e4380000_wermgr.jbxd
                                                                Similarity
                                                                • API ID: CloseErrorFileFreeHandleLastLocalSecurity
                                                                • String ID:
                                                                • API String ID: 755247146-0
                                                                • Opcode ID: 110471199a15cae5a8cf194381fc60408922cbc449dee31469c86178c51475f2
                                                                • Instruction ID: b4d5e4f161e3074252131d85059792bd9d8c7de49df12bbea56d22680f7a85c3
                                                                • Opcode Fuzzy Hash: 110471199a15cae5a8cf194381fc60408922cbc449dee31469c86178c51475f2
                                                                • Instruction Fuzzy Hash: 5502842AB0874386FB50EF6B98C0379A3D1AF54748FD4413AEE0D6A6D4DE7CE5058362
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 856 7ff7e4386848-7ff7e43868cc GetCurrentProcessId call 7ff7e43845e4 CreateMutexExW 859 7ff7e43868ce-7ff7e43868d3 call 7ff7e4385350 856->859 860 7ff7e4386902-7ff7e4386916 WaitForSingleObjectEx 856->860 868 7ff7e43868d5-7ff7e4386901 call 7ff7e4393050 859->868 862 7ff7e4386918-7ff7e438691a 860->862 863 7ff7e4386927-7ff7e438692c 860->863 865 7ff7e438691c-7ff7e4386921 862->865 866 7ff7e4386933 862->866 863->866 867 7ff7e438692e-7ff7e4386931 863->867 865->863 869 7ff7e4386b4e-7ff7e4386b5a call 7ff7e4385c3c 865->869 870 7ff7e4386936-7ff7e4386953 call 7ff7e4385fc8 866->870 867->870 879 7ff7e4386b5b-7ff7e4386b73 call 7ff7e4385c24 869->879 877 7ff7e4386955-7ff7e438696f call 7ff7e4385bd4 870->877 878 7ff7e4386971-7ff7e4386976 870->878 881 7ff7e4386978-7ff7e438697a 877->881 878->881 889 7ff7e4386b74-7ff7e4386b8c call 7ff7e4385c24 879->889 884 7ff7e438697c-7ff7e4386998 call 7ff7e4385bd4 881->884 885 7ff7e438699a-7ff7e43869a1 881->885 888 7ff7e43869a3-7ff7e43869a5 884->888 885->888 891 7ff7e43869a7-7ff7e43869ac 888->891 892 7ff7e43869b1-7ff7e43869b4 888->892 898 7ff7e4386b8d-7ff7e4386ba5 call 7ff7e4385c24 889->898 895 7ff7e4386b17-7ff7e4386b2e call 7ff7e4385bd4 891->895 896 7ff7e43869b6-7ff7e43869c0 892->896 897 7ff7e43869e3-7ff7e4386a05 GetProcessHeap HeapAlloc 892->897 907 7ff7e43869c4-7ff7e43869c7 895->907 902 7ff7e43869c2 896->902 899 7ff7e4386a2d-7ff7e4386a4c call 7ff7e4385d58 897->899 900 7ff7e4386a07-7ff7e4386a28 call 7ff7e4385bd4 897->900 914 7ff7e4386ba6-7ff7e4386bbf call 7ff7e4385c24 898->914 917 7ff7e4386a4e-7ff7e4386a72 call 7ff7e4385bd4 899->917 918 7ff7e4386ab0-7ff7e4386b07 memset * 2 899->918 915 7ff7e4386b12 900->915 902->907 911 7ff7e43869cd-7ff7e43869d8 ReleaseMutex 907->911 912 7ff7e4386b33-7ff7e4386b36 907->912 911->879 913 7ff7e43869de 911->913 912->868 916 7ff7e4386b3c-7ff7e4386b47 CloseHandle 912->916 913->912 915->895 916->914 921 7ff7e4386b49 916->921 925 7ff7e4386a74-7ff7e4386a7c CloseHandle 917->925 926 7ff7e4386a82-7ff7e4386a8a 917->926 919 7ff7e4386b0a-7ff7e4386b0c 918->919 919->902 919->915 921->868 925->889 925->926 927 7ff7e4386a8c-7ff7e4386a94 CloseHandle 926->927 928 7ff7e4386a9a-7ff7e4386aae GetProcessHeap HeapFree 926->928 927->898 927->928 928->919
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000018.00000002.623541171.00007FF7E4381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF7E4380000, based on PE: true
                                                                • Associated: 00000018.00000002.623534030.00007FF7E4380000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623554275.00007FF7E4395000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623593260.00007FF7E439E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623622611.00007FF7E43A0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623639350.00007FF7E43A2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_24_2_7ff7e4380000_wermgr.jbxd
                                                                Similarity
                                                                • API ID: Heap$CloseHandleProcess$Mutexmemset$AllocCreateCurrentErrorFreeLastObjectReleaseSingleWait_vsnwprintf
                                                                • String ID: Local\SM0:%d:%d:%hs$wil::details::CloseHandle$wil::details::ReleaseMutex$wil::details_abi::ProcessLocalStorageData<struct wil::details_abi::ProcessLocalData>::Acquire$wil::details_abi::ProcessLocalStorageData<struct wil::details_abi::ProcessLocalData>::MakeAndInitialize$wil::details_abi::SemaphoreValue::TryGetPointer$wil::details_abi::SemaphoreValue::TryGetValue$x
                                                                • API String ID: 3050765140-1041572668
                                                                • Opcode ID: 9e0e77bc21da6da82669dbb9c1983df02879087f23f6f1d92fe12a75dac1f40b
                                                                • Instruction ID: 0ec0f7405bfd6e3d438ea94f884ddf191b2acb0db23f406f6e5e2a01acd1c726
                                                                • Opcode Fuzzy Hash: 9e0e77bc21da6da82669dbb9c1983df02879087f23f6f1d92fe12a75dac1f40b
                                                                • Instruction Fuzzy Hash: 8BA1A63AA0864382E721AF27E8907A9E360FFA8744F90413BDA4D6B6D8DF3CD405C751
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 929 7ff7e4390a58-7ff7e4390adc GetCurrentProcessId call 7ff7e43845e4 CreateMutexExW 932 7ff7e4390b12-7ff7e4390b26 WaitForSingleObjectEx 929->932 933 7ff7e4390ade-7ff7e4390ae3 call 7ff7e4385350 929->933 934 7ff7e4390b37-7ff7e4390b3c 932->934 935 7ff7e4390b28-7ff7e4390b2a 932->935 941 7ff7e4390ae5-7ff7e4390b11 call 7ff7e4393050 933->941 937 7ff7e4390b43 934->937 939 7ff7e4390b3e-7ff7e4390b41 934->939 935->937 938 7ff7e4390b2c-7ff7e4390b31 935->938 943 7ff7e4390b46-7ff7e4390b63 call 7ff7e4385fc8 937->943 938->934 942 7ff7e4390d6d-7ff7e4390d79 call 7ff7e4385c3c 938->942 939->943 950 7ff7e4390d7a-7ff7e4390d92 call 7ff7e4385c24 942->950 951 7ff7e4390b81-7ff7e4390b86 943->951 952 7ff7e4390b65-7ff7e4390b7f call 7ff7e4385bd4 943->952 962 7ff7e4390d93-7ff7e4390dab call 7ff7e4385c24 950->962 953 7ff7e4390b88-7ff7e4390b8a 951->953 952->953 956 7ff7e4390baa-7ff7e4390bb1 953->956 957 7ff7e4390b8c-7ff7e4390ba8 call 7ff7e4385bd4 953->957 961 7ff7e4390bb3-7ff7e4390bb5 956->961 957->961 964 7ff7e4390bc1-7ff7e4390bc4 961->964 965 7ff7e4390bb7-7ff7e4390bbc 961->965 975 7ff7e4390dac-7ff7e4390dc4 call 7ff7e4385c24 962->975 968 7ff7e4390bf3-7ff7e4390c17 GetProcessHeap HeapAlloc 964->968 969 7ff7e4390bc6-7ff7e4390bd0 964->969 967 7ff7e4390d37-7ff7e4390d4d call 7ff7e4389300 965->967 979 7ff7e4390bd4-7ff7e4390bd7 967->979 973 7ff7e4390c19-7ff7e4390c39 call 7ff7e4389300 968->973 974 7ff7e4390c3e-7ff7e4390c5d call 7ff7e4385d58 968->974 972 7ff7e4390bd2 969->972 972->979 986 7ff7e4390d32 973->986 988 7ff7e4390c5f-7ff7e4390c82 call 7ff7e4389300 974->988 989 7ff7e4390cc0-7ff7e4390d27 memset call 7ff7e438fcf0 InitializeCriticalSectionEx 974->989 987 7ff7e4390dc5-7ff7e4390ddf call 7ff7e4385c24 975->987 984 7ff7e4390d52-7ff7e4390d55 979->984 985 7ff7e4390bdd-7ff7e4390be8 ReleaseMutex 979->985 984->941 990 7ff7e4390d5b-7ff7e4390d66 CloseHandle 984->990 985->950 991 7ff7e4390bee 985->991 986->967 999 7ff7e4390c92-7ff7e4390c9a 988->999 1000 7ff7e4390c84-7ff7e4390c8c CloseHandle 988->1000 1001 7ff7e4390d2a-7ff7e4390d2c 989->1001 990->987 994 7ff7e4390d68 990->994 991->984 994->941 1002 7ff7e4390caa-7ff7e4390cbe GetProcessHeap HeapFree 999->1002 1003 7ff7e4390c9c-7ff7e4390ca4 CloseHandle 999->1003 1000->962 1000->999 1001->972 1001->986 1002->1001 1003->975 1003->1002
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000018.00000002.623541171.00007FF7E4381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF7E4380000, based on PE: true
                                                                • Associated: 00000018.00000002.623534030.00007FF7E4380000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623554275.00007FF7E4395000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623593260.00007FF7E439E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623622611.00007FF7E43A0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623639350.00007FF7E43A2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_24_2_7ff7e4380000_wermgr.jbxd
                                                                Similarity
                                                                • API ID: Heap$CloseHandleProcess$Mutex$AllocCreateCriticalCurrentErrorFreeInitializeLastObjectReleaseSectionSingleWait_vsnwprintfmemset
                                                                • String ID: Local\SM0:%d:%d:%hs$wil$wil::details::CloseHandle$wil::details::ReleaseMutex$wil::details_abi::SemaphoreValue::TryGetPointer$wil::details_abi::SemaphoreValue::TryGetValue
                                                                • API String ID: 355330728-559493418
                                                                • Opcode ID: 4c36fb9394bcdb7e3377982245fc1b7ee009e2bc99cc8dcb32f123a9ee4cb8f1
                                                                • Instruction ID: 297274596b84fa1073f5e233d1d501669a0936f1defb64ce2dff7f3c83ad5bf1
                                                                • Opcode Fuzzy Hash: 4c36fb9394bcdb7e3377982245fc1b7ee009e2bc99cc8dcb32f123a9ee4cb8f1
                                                                • Instruction Fuzzy Hash: 6CA1C53AA0864382E760AF2BD8907B9E360EF64744F94413BDB4D67698DF3CE4458352
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1033 7ff7e438e368-7ff7e438e3da ZwQueryWnfStateNameInformation 1034 7ff7e438e3dc-7ff7e438e3e1 1033->1034 1035 7ff7e438e40d-7ff7e438e430 EtwEventWriteNoRegistration 1033->1035 1034->1035 1036 7ff7e438e3e3-7ff7e438e409 ZwUpdateWnfStateData 1034->1036 1037 7ff7e438e432 1035->1037 1038 7ff7e438e435-7ff7e438e440 1035->1038 1036->1035 1037->1038 1039 7ff7e438e670-7ff7e438e678 1038->1039 1040 7ff7e438e446-7ff7e438e460 NtQuerySystemInformation 1038->1040 1041 7ff7e438e680-7ff7e438e688 1039->1041 1042 7ff7e438e67a RtlFreeSid 1039->1042 1040->1039 1043 7ff7e438e466-7ff7e438e4b7 NtOpenEvent 1040->1043 1046 7ff7e438e690-7ff7e438e6b9 call 7ff7e4393050 1041->1046 1047 7ff7e438e68a NtClose 1041->1047 1042->1041 1044 7ff7e438e4b9-7ff7e438e4bb 1043->1044 1045 7ff7e438e4ec-7ff7e438e4ee 1043->1045 1048 7ff7e438e4c8-7ff7e438e4e6 NtWaitForSingleObject NtClose 1044->1048 1049 7ff7e438e4bd-7ff7e438e4c4 1044->1049 1045->1039 1051 7ff7e438e4f4-7ff7e438e4fa 1045->1051 1047->1046 1048->1045 1049->1048 1052 7ff7e438e506-7ff7e438e546 RtlAllocateAndInitializeSid 1051->1052 1053 7ff7e438e4fc-7ff7e438e501 1051->1053 1052->1039 1055 7ff7e438e54c-7ff7e438e558 1052->1055 1053->1039 1056 7ff7e438e565-7ff7e438e5f9 RtlInitUnicodeString memset NtAlpcConnectPort 1055->1056 1057 7ff7e438e55a-7ff7e438e561 1055->1057 1056->1039 1058 7ff7e438e5fb-7ff7e438e600 1056->1058 1057->1056 1058->1053 1059 7ff7e438e606-7ff7e438e655 memset NtAlpcSendWaitReceivePort 1058->1059 1059->1039 1060 7ff7e438e657-7ff7e438e65c 1059->1060 1060->1039 1061 7ff7e438e65e-7ff7e438e66a 1060->1061 1061->1039
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000018.00000002.623541171.00007FF7E4381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF7E4380000, based on PE: true
                                                                • Associated: 00000018.00000002.623534030.00007FF7E4380000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623554275.00007FF7E4395000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623593260.00007FF7E439E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623622611.00007FF7E43A0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623639350.00007FF7E43A2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_24_2_7ff7e4380000_wermgr.jbxd
                                                                Similarity
                                                                • API ID: AlpcCloseEventInformationPortQueryStateWaitmemset$AllocateConnectDataFreeInitInitializeNameObjectOpenReceiveRegistrationSendSingleStringSystemUnicodeUpdateWrite
                                                                • String ID: \KernelObjects\SystemErrorPortReady$\WindowsErrorReportingServicePort
                                                                • API String ID: 1565259173-2875699088
                                                                • Opcode ID: 059e1d883b6d632646f9b2fe89390aeee271917202cb5a5b3bcb5c8f1b4eeb09
                                                                • Instruction ID: 6fa50a84c9551a73d69999a79ccf26243b9a48442f9ef28326071a2841b6617d
                                                                • Opcode Fuzzy Hash: 059e1d883b6d632646f9b2fe89390aeee271917202cb5a5b3bcb5c8f1b4eeb09
                                                                • Instruction Fuzzy Hash: F9A19276A14B8286F750DF66E8C029EB7A4FB98358F90063ADB4D57A58DF3CD144CB10
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000018.00000002.623541171.00007FF7E4381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF7E4380000, based on PE: true
                                                                • Associated: 00000018.00000002.623534030.00007FF7E4380000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623554275.00007FF7E4395000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623593260.00007FF7E439E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623622611.00007FF7E43A0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623639350.00007FF7E43A2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_24_2_7ff7e4380000_wermgr.jbxd
                                                                Similarity
                                                                • API ID: Value$LibraryLicenseQuery$AddressFreeLoadProc
                                                                • String ID: AllowTelemetry$AllowTelemetry_PolicyManager$CodeIntegrity.Telemetry$NtQuerySecurityPolicy$OptInLevel$Reserved.PlatformSigned$Software\Microsoft\Windows\CurrentVersion\Policies\DataCollection$Software\Policies\Microsoft\Windows\DataCollection$ntdll.dll
                                                                • API String ID: 2720952003-2205401507
                                                                • Opcode ID: dd69e32410b967b0561a2adfb8463fc09e76090039ca5a7603213ff62b4bb538
                                                                • Instruction ID: 4110f20929e4746eab952606288eeb75d87a39e5578c1be6d7e64e02fbb59137
                                                                • Opcode Fuzzy Hash: dd69e32410b967b0561a2adfb8463fc09e76090039ca5a7603213ff62b4bb538
                                                                • Instruction Fuzzy Hash: C991927AA04B038AF724EF6AD8C03A9B7A0BB24354F90053ADB0D63A9CDF79D545C751
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000018.00000002.623541171.00007FF7E4381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF7E4380000, based on PE: true
                                                                • Associated: 00000018.00000002.623534030.00007FF7E4380000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623554275.00007FF7E4395000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623593260.00007FF7E439E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623622611.00007FF7E43A0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623639350.00007FF7E43A2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_24_2_7ff7e4380000_wermgr.jbxd
                                                                Similarity
                                                                • API ID: Find$File$CloseErrorLastMessageTrace$AttributesCompareFirstNextString
                                                                • String ID: %s\%s$%s\*$W
                                                                • API String ID: 2662658808-3071356132
                                                                • Opcode ID: da4ffca86a92ec35ed18d52e02bb0f17d9b934594797d92ec9c72041573e2ae5
                                                                • Instruction ID: 47d0b9f2b1230c5420894b86ea1df70ae2ac3eea6cff262f295a5d650bed3dac
                                                                • Opcode Fuzzy Hash: da4ffca86a92ec35ed18d52e02bb0f17d9b934594797d92ec9c72041573e2ae5
                                                                • Instruction Fuzzy Hash: 8DD10829A0864382EA10BF5BD8D0375E391FF68754FD4023BDA5E6A6D5DF7CE4018722
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000018.00000002.623541171.00007FF7E4381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF7E4380000, based on PE: true
                                                                • Associated: 00000018.00000002.623534030.00007FF7E4380000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623554275.00007FF7E4395000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623593260.00007FF7E439E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623622611.00007FF7E43A0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623639350.00007FF7E43A2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_24_2_7ff7e4380000_wermgr.jbxd
                                                                Similarity
                                                                • API ID: CloseCreateErrorHandleLastSnapshotToolhelp32
                                                                • String ID: CreateToolhelp32Snapshot failed$GetProcessesForName$Process32FirstW failed$onecore\windows\feedback\core\wermgr\lib\wermgr.cpp
                                                                • API String ID: 256649917-2175500257
                                                                • Opcode ID: b6d7b9ab16ebbdab43fc6a29cf140298f27177b400e1b9ea36d545ae5f6c3acd
                                                                • Instruction ID: 935a035fa5b31b936acc425efa1b0bb87dbd66dd512a7d6719b6a54300f5c265
                                                                • Opcode Fuzzy Hash: b6d7b9ab16ebbdab43fc6a29cf140298f27177b400e1b9ea36d545ae5f6c3acd
                                                                • Instruction Fuzzy Hash: FC41E52A60864382EA10AF16E9C0369E390FBE87A0F94423BDA5D573D8EF3CE4418611
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000018.00000002.623541171.00007FF7E4381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF7E4380000, based on PE: true
                                                                • Associated: 00000018.00000002.623534030.00007FF7E4380000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623554275.00007FF7E4395000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623593260.00007FF7E439E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623622611.00007FF7E43A0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623639350.00007FF7E43A2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_24_2_7ff7e4380000_wermgr.jbxd
                                                                Similarity
                                                                • API ID: Print$InformationProcessQuery
                                                                • String ID: WER/CrashAPI:%u: ERROR Invalid arg$WER/CrashAPI:%u: ERROR No PEB for process$WER/CrashAPI:%u: ERROR NtQueryInformationProcess failed$WER/CrashAPI:%u: ERROR ReadProcessMemory failed while trying to read PebBaseAddress
                                                                • API String ID: 213565265-363347543
                                                                • Opcode ID: cc87ffb94302113c0fc6d39860d57220b0b156c19289a9ce809940e09f0b993a
                                                                • Instruction ID: d3b6532235ed9f672d269399a8ea7cddfd5b440c4a81e820e014763dbe50036f
                                                                • Opcode Fuzzy Hash: cc87ffb94302113c0fc6d39860d57220b0b156c19289a9ce809940e09f0b993a
                                                                • Instruction Fuzzy Hash: 3E21A36AB0854382F324AF1BAC80B79D251AF68B94FD0413ECA0DAB6D4DF3CD5458322
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000018.00000002.623541171.00007FF7E4381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF7E4380000, based on PE: true
                                                                • Associated: 00000018.00000002.623534030.00007FF7E4380000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623554275.00007FF7E4395000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623593260.00007FF7E439E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623622611.00007FF7E43A0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623639350.00007FF7E43A2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_24_2_7ff7e4380000_wermgr.jbxd
                                                                Similarity
                                                                • API ID: Find$File_wcsicmp$CloseFirstNext
                                                                • String ID: DeleteCorruptedReportFromStore
                                                                • API String ID: 3999888431-1966130119
                                                                • Opcode ID: 0c62acfc948d4e00e2b147cd201c1f84a0b5941cd8a40a4b5c25c67fb32ac295
                                                                • Instruction ID: d161d3991b23be01852c5494964485995ac1a6ab86ba4f5e16aa841e55fd3779
                                                                • Opcode Fuzzy Hash: 0c62acfc948d4e00e2b147cd201c1f84a0b5941cd8a40a4b5c25c67fb32ac295
                                                                • Instruction Fuzzy Hash: A4A18F2AE0874385FB00AF5BD8803B9A3A1BBA4754F94013BDB4D66AE9DF7CE441C751
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000018.00000002.623541171.00007FF7E4381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF7E4380000, based on PE: true
                                                                • Associated: 00000018.00000002.623534030.00007FF7E4380000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623554275.00007FF7E4395000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623593260.00007FF7E439E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623622611.00007FF7E43A0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623639350.00007FF7E43A2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_24_2_7ff7e4380000_wermgr.jbxd
                                                                Similarity
                                                                • API ID: Time$CloseCreateErrorFileLastSystemValue
                                                                • String ID: LastLiveReportFlushTime$LastQueueNoPesterTime$LastQueuePesterTime$LastResponsePesterTime
                                                                • API String ID: 621416076-4033952892
                                                                • Opcode ID: 6180c751c1142c0360f7243e523f64603b1215c6f5b16d9d90d201e22c255754
                                                                • Instruction ID: 371ecabd1615e25d2a30754ba69f7c0f30c148bb38b0506b498d9270c32b937d
                                                                • Opcode Fuzzy Hash: 6180c751c1142c0360f7243e523f64603b1215c6f5b16d9d90d201e22c255754
                                                                • Instruction Fuzzy Hash: F931532AA1864385EB50AF2BDCD1374E3A1BB78398F94013BD90E576D4DF7CD5858322
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000018.00000002.623541171.00007FF7E4381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF7E4380000, based on PE: true
                                                                • Associated: 00000018.00000002.623534030.00007FF7E4380000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623554275.00007FF7E4395000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623593260.00007FF7E439E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623622611.00007FF7E43A0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623639350.00007FF7E43A2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_24_2_7ff7e4380000_wermgr.jbxd
                                                                Similarity
                                                                • API ID: MessageStringTrace$AllocCreateFreeInitializeInstanceUninitialize
                                                                • String ID:
                                                                • API String ID: 915162858-0
                                                                • Opcode ID: 2972225db9ae11b9fc8471ca2efd071f6aa0784ccfa5f04867350870a7d2921f
                                                                • Instruction ID: 478b55182905ff9b00a7981e4726ca143fda50bee9cc86edcc8a1703ac36b2fd
                                                                • Opcode Fuzzy Hash: 2972225db9ae11b9fc8471ca2efd071f6aa0784ccfa5f04867350870a7d2921f
                                                                • Instruction Fuzzy Hash: E851432AA08647C1EE04AF17D890378E351FF64B48F94443BDA0D6B7E9DE3DE5068352
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • AllocateAndInitializeSid.API-MS-WIN-SECURITY-BASE-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF7E439188F), ref: 00007FF7E4388BC7
                                                                • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF7E439188F), ref: 00007FF7E4388BD1
                                                                • CheckTokenMembership.API-MS-WIN-SECURITY-BASE-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF7E439188F), ref: 00007FF7E4388BFD
                                                                • FreeSid.API-MS-WIN-SECURITY-BASE-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF7E439188F), ref: 00007FF7E4388C33
                                                                Memory Dump Source
                                                                • Source File: 00000018.00000002.623541171.00007FF7E4381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF7E4380000, based on PE: true
                                                                • Associated: 00000018.00000002.623534030.00007FF7E4380000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623554275.00007FF7E4395000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623593260.00007FF7E439E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623622611.00007FF7E43A0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623639350.00007FF7E43A2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_24_2_7ff7e4380000_wermgr.jbxd
                                                                Similarity
                                                                • API ID: AllocateCheckErrorFreeInitializeLastMembershipToken
                                                                • String ID:
                                                                • API String ID: 3835361876-0
                                                                • Opcode ID: 248e989aa7194c76c428a6133599397856c62e10e356beaa60e6d7ca00803fdc
                                                                • Instruction ID: 9bc1ce0e029c8b333977ba2bc94f669e68aff7791c7cbcc711831e6b97057141
                                                                • Opcode Fuzzy Hash: 248e989aa7194c76c428a6133599397856c62e10e356beaa60e6d7ca00803fdc
                                                                • Instruction Fuzzy Hash: 2C217E76B047029AFB549F7A98D03BEB7E0BB58744F80013EDA4E96A98DF3CD0448B14
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                  • Part of subcall function 00007FF7E4392438: LoadLibraryExW.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0 ref: 00007FF7E43924B1
                                                                  • Part of subcall function 00007FF7E4392438: GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0 ref: 00007FF7E43924C9
                                                                  • Part of subcall function 00007FF7E4392438: NtQueryLicenseValue.NTDLL ref: 00007FF7E43924F5
                                                                  • Part of subcall function 00007FF7E4392438: FreeLibrary.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0 ref: 00007FF7E4392565
                                                                • NtQueryLicenseValue.NTDLL ref: 00007FF7E4392011
                                                                  • Part of subcall function 00007FF7E4392060: LoadLibraryExW.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(?,?,00000000,00000004,00000000,00000000,?,00007FF7E4391F98), ref: 00007FF7E4392092
                                                                  • Part of subcall function 00007FF7E4392060: GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(?,?,00000000,00000004,00000000,00000000,?,00007FF7E4391F98), ref: 00007FF7E43920AA
                                                                  • Part of subcall function 00007FF7E4392060: GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(?,?,00000000,00000004,00000000,00000000,?,00007FF7E4391F98), ref: 00007FF7E43920BD
                                                                  • Part of subcall function 00007FF7E4392060: FreeLibrary.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0 ref: 00007FF7E4392202
                                                                  • Part of subcall function 00007FF7E4391F00: RegGetValueW.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF7E4391F39
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000018.00000002.623541171.00007FF7E4381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF7E4380000, based on PE: true
                                                                • Associated: 00000018.00000002.623534030.00007FF7E4380000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623554275.00007FF7E4395000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623593260.00007FF7E439E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623622611.00007FF7E43A0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623639350.00007FF7E43A2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_24_2_7ff7e4380000_wermgr.jbxd
                                                                Similarity
                                                                • API ID: Library$AddressProcValue$FreeLicenseLoadQuery
                                                                • String ID: AllowTelemetry$Software\Microsoft\Windows\CurrentVersion\Policies\DataCollection
                                                                • API String ID: 1629355636-1682735051
                                                                • Opcode ID: 94a637690f267b20e178603f996873f2cb8d4dd294b0e422b29ef7c59ff3acfe
                                                                • Instruction ID: 1470ce00012c6dafd71ae5077e450c276f7aa1e1d9806db5438aca97d3254f76
                                                                • Opcode Fuzzy Hash: 94a637690f267b20e178603f996873f2cb8d4dd294b0e422b29ef7c59ff3acfe
                                                                • Instruction Fuzzy Hash: E5310A3BD046139AF720AE7A8CC06A9A660BF60394F90413BEB1E2265DDF39E945C251
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000018.00000002.623541171.00007FF7E4381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF7E4380000, based on PE: true
                                                                • Associated: 00000018.00000002.623534030.00007FF7E4380000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623554275.00007FF7E4395000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623593260.00007FF7E439E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623622611.00007FF7E43A0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623639350.00007FF7E43A2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_24_2_7ff7e4380000_wermgr.jbxd
                                                                Similarity
                                                                • API ID: Heap$FreeProcess
                                                                • String ID:
                                                                • API String ID: 3859560861-0
                                                                • Opcode ID: 62811552cb927870d663cbbaf8e48ab98302ec33a4298fd9e252db253e915a3c
                                                                • Instruction ID: 64555d19f68ae323bad56caa6567ebfba6d6d809cfdbe014e114a125d245e862
                                                                • Opcode Fuzzy Hash: 62811552cb927870d663cbbaf8e48ab98302ec33a4298fd9e252db253e915a3c
                                                                • Instruction Fuzzy Hash: EC418E2EA08B8285E610EF16E484769F760FBA9BC0F94413AEE8C27B85DF38D451C711
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 552 7ff7e438285c-7ff7e43828dc call 7ff7e43845a8 WerpOpenMachineQueue 555 7ff7e4382b93 552->555 556 7ff7e43828e2-7ff7e43828e5 552->556 557 7ff7e4382b9a 555->557 556->555 558 7ff7e43828eb-7ff7e43828f5 WerpEnumerateStoreStart 556->558 559 7ff7e4382b9d-7ff7e4382ba0 557->559 560 7ff7e4382907-7ff7e4382920 WerpEnumerateStoreNext 558->560 561 7ff7e43828f7-7ff7e4382902 558->561 562 7ff7e4382ba8-7ff7e4382bc1 559->562 563 7ff7e4382ba2 WerpCloseStore 559->563 564 7ff7e4382936-7ff7e4382938 560->564 565 7ff7e4382922-7ff7e4382928 560->565 561->557 563->562 567 7ff7e4382abe-7ff7e4382acf 564->567 568 7ff7e438293e-7ff7e4382945 564->568 565->564 566 7ff7e438292a-7ff7e4382931 565->566 571 7ff7e4382b73-7ff7e4382b7d 566->571 569 7ff7e4382ad1-7ff7e4382ad5 567->569 570 7ff7e4382aef-7ff7e4382afd WerpQueueHasBypassPowerReports 567->570 568->567 572 7ff7e438294b 568->572 569->570 573 7ff7e4382ad7-7ff7e4382aea call 7ff7e4381380 569->573 574 7ff7e4382b29-7ff7e4382b3c WerpSetTimedTask 570->574 575 7ff7e4382aff-7ff7e4382b09 570->575 577 7ff7e4382b8d-7ff7e4382b91 571->577 578 7ff7e4382b7f-7ff7e4382b87 WerpDestroyWerString 571->578 576 7ff7e438294f-7ff7e438295b WerpGetWerStringData 572->576 573->570 581 7ff7e4382b3e-7ff7e4382b65 call 7ff7e43845a8 574->581 582 7ff7e4382b6a-7ff7e4382b71 574->582 575->574 580 7ff7e4382b0b-7ff7e4382b0f 575->580 583 7ff7e4382aad-7ff7e4382ab9 576->583 584 7ff7e4382961-7ff7e43829e4 call 7ff7e43845a8 WerpSubmitReportFromStore 576->584 577->559 578->577 580->574 585 7ff7e4382b11-7ff7e4382b24 call 7ff7e4381380 580->585 581->582 582->571 583->571 590 7ff7e4382a17-7ff7e4382a3c call 7ff7e43845a8 584->590 591 7ff7e43829e6-7ff7e4382a0b call 7ff7e43845a8 584->591 585->574 595 7ff7e4382a41-7ff7e4382a48 590->595 591->595 596 7ff7e4382a0d-7ff7e4382a15 call 7ff7e43823a4 591->596 597 7ff7e4382a4a-7ff7e4382a62 GetLastError WerpDestroyWerString SetLastError 595->597 598 7ff7e4382a68-7ff7e4382a82 WerpEnumerateStoreNext 595->598 596->595 597->598 600 7ff7e4382a89-7ff7e4382a8b 598->600 601 7ff7e4382a84-7ff7e4382a87 598->601 603 7ff7e4382a8d-7ff7e4382a96 600->603 604 7ff7e4382aa1-7ff7e4382aa8 600->604 601->603 603->567 605 7ff7e4382a98-7ff7e4382a9c 603->605 604->571 605->576
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000018.00000002.623541171.00007FF7E4381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF7E4380000, based on PE: true
                                                                • Associated: 00000018.00000002.623534030.00007FF7E4380000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623554275.00007FF7E4395000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623593260.00007FF7E439E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623622611.00007FF7E43A0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623639350.00007FF7E43A2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_24_2_7ff7e4380000_wermgr.jbxd
                                                                Similarity
                                                                • API ID: Werp$Store$Enumerate$CloseDestroyMachineNextOpenQueueStartString
                                                                • String ID: Core uploader begin$Core uploader complete$DoCoreUpload$Failed to open machine store$Failed to set the timed task.$Unexpected report with NULL report path$Upload completed for report %ws. (SubmitResult = %d)$Upload failed for report %ws$Uploading report %ws$WerpEnumerateStoreNext failed$WerpEnumerateStoreNext2 failed$WerpEnumerateStoreStart failed$onecore\windows\feedback\core\wermgr\lib\wermgr.cpp
                                                                • API String ID: 2483905015-1384653503
                                                                • Opcode ID: 22583ac82ff0120f1868226973cd76519ccb19698967e6991d93e5caf975b5f0
                                                                • Instruction ID: ff5f9b2e510d289f712839c8635202385312ba16c122212a4d67cbab887bdebc
                                                                • Opcode Fuzzy Hash: 22583ac82ff0120f1868226973cd76519ccb19698967e6991d93e5caf975b5f0
                                                                • Instruction Fuzzy Hash: 6AA16729A09A4385E721AF56E8C03B9A360FF98764F90013BDE0D67A98DF3CD545C361
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 606 7ff7e4381c38-7ff7e4381c72 607 7ff7e4381c76-7ff7e4381c94 GetTickCount64 call 7ff7e4381a70 606->607 610 7ff7e43821ab-7ff7e43821b2 607->610 611 7ff7e4381c9a-7ff7e4381cae call 7ff7e4381a70 607->611 613 7ff7e43821b7-7ff7e43821d7 call 7ff7e43845a8 610->613 616 7ff7e438219d-7ff7e43821a9 611->616 617 7ff7e4381cb4-7ff7e4381cd8 GetCurrentProcessId 611->617 621 7ff7e43821d8-7ff7e43821df 613->621 616->613 619 7ff7e4381cde-7ff7e4381ce5 617->619 620 7ff7e4381d87-7ff7e4381d99 call 7ff7e4389108 617->620 623 7ff7e438205d-7ff7e438208e call 7ff7e43845a8 619->623 624 7ff7e4381ceb-7ff7e4381cf2 619->624 632 7ff7e438210c-7ff7e4382113 620->632 633 7ff7e4381d9f-7ff7e4381db0 620->633 625 7ff7e43821e9-7ff7e438220b 621->625 626 7ff7e43821e1-7ff7e43821e4 call 7ff7e4392ff8 621->626 642 7ff7e4382050-7ff7e4382058 623->642 628 7ff7e4381d7c-7ff7e4381d81 624->628 629 7ff7e4381cf8-7ff7e4381d18 OpenProcess 624->629 626->625 628->620 628->624 634 7ff7e4381d4e-7ff7e4381d5d call 7ff7e4383e34 629->634 635 7ff7e4381d1a-7ff7e4381d34 GetLastError 629->635 639 7ff7e4382118-7ff7e4382140 call 7ff7e43845a8 632->639 637 7ff7e4381dcb-7ff7e4381dd6 633->637 638 7ff7e4381db2-7ff7e4381dc1 call 7ff7e4383e34 633->638 652 7ff7e4382003-7ff7e4382034 call 7ff7e43845a8 634->652 653 7ff7e4381d63-7ff7e4381d74 634->653 640 7ff7e4381d3a-7ff7e4381d47 635->640 641 7ff7e4381fd5-7ff7e4382001 call 7ff7e43845a8 635->641 648 7ff7e4381ddc-7ff7e4381dec 637->648 649 7ff7e4382108-7ff7e438210a 637->649 667 7ff7e4381dc7 638->667 668 7ff7e4382090-7ff7e43820a1 638->668 655 7ff7e4382144-7ff7e4382151 639->655 640->628 650 7ff7e4381d49-7ff7e4381d4c 640->650 665 7ff7e4382038-7ff7e4382045 641->665 647 7ff7e438215c-7ff7e4382160 642->647 647->621 661 7ff7e4382162-7ff7e4382169 647->661 658 7ff7e4381df2-7ff7e4381dfc 648->658 659 7ff7e4381f01-7ff7e4381f22 WaitForMultipleObjects 648->659 649->655 660 7ff7e4381d76 CloseHandle 650->660 652->665 653->628 653->660 655->647 669 7ff7e4382153-7ff7e4382156 CloseHandle 655->669 670 7ff7e4381ee9-7ff7e4381ef7 658->670 671 7ff7e4381e02-7ff7e4381e3b 658->671 662 7ff7e43820ec 659->662 663 7ff7e4381f28-7ff7e4381f2b 659->663 660->628 664 7ff7e4382187-7ff7e438218a 661->664 674 7ff7e43820f1-7ff7e43820f5 662->674 672 7ff7e43820d6-7ff7e43820ea GetLastError 663->672 673 7ff7e4381f31-7ff7e4381f41 GetTickCount64 663->673 675 7ff7e438218c-7ff7e438219b call 7ff7e43932f4 664->675 676 7ff7e438216b-7ff7e438217f 664->676 665->642 678 7ff7e4382047-7ff7e438204a CloseHandle 665->678 667->637 668->639 669->647 670->658 679 7ff7e4381efd 670->679 680 7ff7e43820a3-7ff7e43820d4 call 7ff7e43845a8 671->680 681 7ff7e4381e41-7ff7e4381e4e 671->681 672->674 673->662 685 7ff7e4381f47-7ff7e4381f59 673->685 674->655 686 7ff7e43820f7-7ff7e4382106 call 7ff7e43932f4 674->686 675->621 676->664 684 7ff7e4382181 CloseHandle 676->684 678->642 679->659 680->674 682 7ff7e4381e6c 681->682 683 7ff7e4381e50-7ff7e4381e6a call 7ff7e43932fc 681->683 692 7ff7e4381e6f-7ff7e4381e72 682->692 683->692 684->664 691 7ff7e4381f77-7ff7e4381f7a 685->691 686->655 697 7ff7e4381f7c-7ff7e4381f83 691->697 698 7ff7e4381f5b-7ff7e4381f6f 691->698 692->680 696 7ff7e4381e78-7ff7e4381e8b 692->696 696->680 701 7ff7e4381e91-7ff7e4381ebd memcpy 696->701 702 7ff7e4381f8d-7ff7e4381f9e 697->702 703 7ff7e4381f85-7ff7e4381f88 call 7ff7e4392ff8 697->703 698->691 700 7ff7e4381f71 CloseHandle 698->700 700->691 704 7ff7e4381ece-7ff7e4381ed9 701->704 705 7ff7e4381ebf-7ff7e4381ec9 call 7ff7e43932f4 701->705 707 7ff7e4381fa0-7ff7e4381faa call 7ff7e43932f4 702->707 708 7ff7e4381faf-7ff7e4381fbc 702->708 703->702 710 7ff7e4381edb-7ff7e4381edf 704->710 711 7ff7e4381ee1 704->711 705->704 707->708 713 7ff7e4381fbe-7ff7e4381fc1 CloseHandle 708->713 714 7ff7e4381fc7-7ff7e4381fd0 call 7ff7e4383ee0 708->714 715 7ff7e4381ee5 710->715 711->715 713->714 714->607 715->670
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000018.00000002.623541171.00007FF7E4381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF7E4380000, based on PE: true
                                                                • Associated: 00000018.00000002.623534030.00007FF7E4380000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623554275.00007FF7E4395000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623593260.00007FF7E439E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623622611.00007FF7E43A0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623639350.00007FF7E43A2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_24_2_7ff7e4380000_wermgr.jbxd
                                                                Similarity
                                                                • API ID: CloseHandle$ErrorLast$Count64ProcessTick$CreateCurrentMultipleObjectsOpenSnapshotToolhelp32Waitmemcpy
                                                                • String ID: Append failed$GetProcessesForName "WerFault.exe" failed$GetProcessesForName "wermgr.exe" failed$GetValue failed$OpenProcess failed$UtilGetWerSvcHandle failed$WaitForPendingReports$WerFault.exe$onecore\windows\feedback\core\wermgr\lib\wermgr.cpp$wermgr.exe
                                                                • API String ID: 213180777-2263226040
                                                                • Opcode ID: cd946481ca21d37673f47eeaf413f64f2c4e63dc4ee3ce807502a9704f29c616
                                                                • Instruction ID: 5f6f2f29351ab78ff6076a9a0cab9ea04dff666f6f0d90d723f21ba98e9bdc2a
                                                                • Opcode Fuzzy Hash: cd946481ca21d37673f47eeaf413f64f2c4e63dc4ee3ce807502a9704f29c616
                                                                • Instruction Fuzzy Hash: DCF1662AB09A4395EA10AF66D8803ACE361BB58774F90073BDA3D277D5DF3CE5058361
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 718 7ff7e4382c14-7ff7e4382c4a call 7ff7e438e13c 721 7ff7e4382c4c-7ff7e4382c7a call 7ff7e43845a8 718->721 722 7ff7e4382c7f-7ff7e4382cb2 MapViewOfFile 718->722 730 7ff7e4382df7-7ff7e4382e04 721->730 724 7ff7e4382cb4-7ff7e4382cde GetLastError 722->724 725 7ff7e4382ce3-7ff7e4382ce9 722->725 727 7ff7e4382f13-7ff7e4382f33 call 7ff7e43845a8 724->727 728 7ff7e4382ceb-7ff7e4382cfc 725->728 729 7ff7e4382d01-7ff7e4382d0f SetEvent 725->729 741 7ff7e4382dbf-7ff7e4382dc2 727->741 728->727 732 7ff7e4382e05-7ff7e4382e0b 729->732 733 7ff7e4382d15-7ff7e4382d78 memset CreateProcessW 729->733 734 7ff7e4382e6d-7ff7e4382e74 call 7ff7e4392e50 732->734 735 7ff7e4382e0d-7ff7e4382e10 732->735 737 7ff7e4382d7a-7ff7e4382da4 GetLastError 733->737 738 7ff7e4382da9-7ff7e4382db7 CloseHandle * 2 733->738 751 7ff7e4382e8c-7ff7e4382ea6 memset 734->751 752 7ff7e4382e76-7ff7e4382e87 734->752 739 7ff7e4382e57-7ff7e4382e68 735->739 740 7ff7e4382e12-7ff7e4382e52 call 7ff7e4388f2c call 7ff7e438448c 735->740 737->727 742 7ff7e4382dbd 738->742 739->727 740->742 745 7ff7e4382dce-7ff7e4382dd6 741->745 746 7ff7e4382dc4-7ff7e4382dcd UnmapViewOfFile 741->746 742->741 749 7ff7e4382dd8-7ff7e4382de1 CloseHandle 745->749 750 7ff7e4382de2-7ff7e4382dea 745->750 746->745 749->750 753 7ff7e4382dec-7ff7e4382def CloseHandle 750->753 754 7ff7e4382df5 750->754 755 7ff7e4382ea8-7ff7e4382eaf 751->755 756 7ff7e4382eb1-7ff7e4382ebc 751->756 752->727 753->754 754->730 758 7ff7e4382ec1-7ff7e4382ee3 755->758 756->758 758->742 761 7ff7e4382ee9-7ff7e4382f0e GetLastError 758->761 761->727
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000018.00000002.623541171.00007FF7E4381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF7E4380000, based on PE: true
                                                                • Associated: 00000018.00000002.623534030.00007FF7E4380000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623554275.00007FF7E4395000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623593260.00007FF7E439E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623622611.00007FF7E43A0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623639350.00007FF7E43A2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_24_2_7ff7e4380000_wermgr.jbxd
                                                                Similarity
                                                                • API ID: Close$ErrorFileHandleLastViewmemset$NamespacePrivateUnmap
                                                                • String ID: CreateProcess failed$Failed to show the help content %ws$Invalid launch type passed$Invalid size passed in section$MapViewOfFile failed$ShellExecuteEx api not present$ShellExecuteEx failed$StartNonElevatedProcessInstance$UtilGetNonElevationInfo failed$explore$onecore\windows\feedback\core\wermgr\lib\wermgr.cpp$open
                                                                • API String ID: 3718369419-189962150
                                                                • Opcode ID: 0d03773e0641e7e482c87ff2b25efe6aa9165e4a6020e670e8aa60f42b7bdb9a
                                                                • Instruction ID: ccb6ff1e356dd001823934027545d4b711676bb5787c0186f06ff37ea6c117a7
                                                                • Opcode Fuzzy Hash: 0d03773e0641e7e482c87ff2b25efe6aa9165e4a6020e670e8aa60f42b7bdb9a
                                                                • Instruction Fuzzy Hash: 6C91643AB09A038AF720AF66D8803A9B3A1FB94354F90013BDA1D676D8DF3CD405C765
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1004 7ff7e4392060-7ff7e439209e LoadLibraryExW 1005 7ff7e43920a0-7ff7e43920c3 GetProcAddress * 2 1004->1005 1006 7ff7e43920c6-7ff7e43920d4 1004->1006 1005->1006 1007 7ff7e4392136-7ff7e4392152 _wcsicmp 1006->1007 1008 7ff7e43920d6-7ff7e43920d9 1006->1008 1010 7ff7e4392154-7ff7e4392166 _wcsicmp 1007->1010 1011 7ff7e4392188-7ff7e43921ce RegGetValueW 1007->1011 1008->1007 1009 7ff7e43920db-7ff7e4392110 1008->1009 1015 7ff7e43921d9-7ff7e43921dc 1009->1015 1021 7ff7e4392116-7ff7e4392119 1009->1021 1012 7ff7e4392171-7ff7e439217f _wcsicmp 1010->1012 1013 7ff7e4392168-7ff7e439216f 1010->1013 1014 7ff7e43921d5 1011->1014 1017 7ff7e43921d0 1012->1017 1018 7ff7e4392181 1012->1018 1013->1011 1014->1015 1019 7ff7e43921fa-7ff7e43921fd 1015->1019 1020 7ff7e43921de-7ff7e43921ec 1015->1020 1017->1014 1018->1011 1024 7ff7e43921ff-7ff7e4392202 FreeLibrary 1019->1024 1025 7ff7e4392208-7ff7e439220a 1019->1025 1020->1019 1030 7ff7e43921ee-7ff7e43921f5 call 7ff7e438e6bc 1020->1030 1022 7ff7e439211b-7ff7e439211f 1021->1022 1023 7ff7e439212c-7ff7e4392131 1021->1023 1022->1023 1027 7ff7e4392121-7ff7e4392127 1022->1027 1023->1015 1024->1025 1028 7ff7e4392224-7ff7e4392239 1025->1028 1029 7ff7e439220c-7ff7e439221f call 7ff7e4389300 1025->1029 1027->1015 1029->1028 1030->1019
                                                                APIs
                                                                • LoadLibraryExW.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(?,?,00000000,00000004,00000000,00000000,?,00007FF7E4391F98), ref: 00007FF7E4392092
                                                                • GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(?,?,00000000,00000004,00000000,00000000,?,00007FF7E4391F98), ref: 00007FF7E43920AA
                                                                • GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(?,?,00000000,00000004,00000000,00000000,?,00007FF7E4391F98), ref: 00007FF7E43920BD
                                                                • FreeLibrary.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0 ref: 00007FF7E4392202
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000018.00000002.623541171.00007FF7E4381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF7E4380000, based on PE: true
                                                                • Associated: 00000018.00000002.623534030.00007FF7E4380000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623554275.00007FF7E4395000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623593260.00007FF7E439E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623622611.00007FF7E43A0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623639350.00007FF7E43A2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_24_2_7ff7e4380000_wermgr.jbxd
                                                                Similarity
                                                                • API ID: AddressLibraryProc$FreeLoad
                                                                • String ID: ConfigureTelemetryOptInChangeNotification$ConfigureTelemetryOptInSettingsUx$DisableTelemetryOptInChangeNotification$DisableTelemetryOptInSettingsUx$LimitEnhancedDiagnosticDataWindowsAnalytics$PolicyManager_FreeGetPolicyData$PolicyManager_GetPolicy$Software\Policies\Microsoft\Windows\DataCollection$System$onecore\base\telemetry\permission\product\telemetrypermission.cpp$policymanager.dll
                                                                • API String ID: 2256533930-1386432056
                                                                • Opcode ID: 6fa3ea10530d22024b37eb955c6c91a0e768ae8642c99d5dfb2b9c0e51a5662d
                                                                • Instruction ID: abbd21a2291d091a18f6d08305eacd423bc61cd848e04b92f798afd596a185dd
                                                                • Opcode Fuzzy Hash: 6fa3ea10530d22024b37eb955c6c91a0e768ae8642c99d5dfb2b9c0e51a5662d
                                                                • Instruction Fuzzy Hash: 59518069A08A0385EB24AF5BACC0365A3A1BF64B94F84453ADF1E6375CDF3CD445C321
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000018.00000002.623541171.00007FF7E4381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF7E4380000, based on PE: true
                                                                • Associated: 00000018.00000002.623534030.00007FF7E4380000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623554275.00007FF7E4395000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623593260.00007FF7E439E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623622611.00007FF7E43A0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623639350.00007FF7E43A2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_24_2_7ff7e4380000_wermgr.jbxd
                                                                Similarity
                                                                • API ID: ErrorLast$Library$AddressFreeLoadProc
                                                                • String ID: CheckAndSubmitOfflineCrash$CheckAndSubmitOfflineCrash failed$CollectOfflineCrash$CollectOfflineCrash failed$DoBootActivities$GetProcAddress for CheckAndSubmitOfflineCrash failed$LoadLibraryExW for offdmpsvc failed$offdmpsvc.dll$onecore\windows\feedback\core\wermgr\lib\wermgr.cpp
                                                                • API String ID: 2084285179-1514942544
                                                                • Opcode ID: 29d8a869eeb6100c06984b39b412da9226d3d5e15bac0267b621030f8219637f
                                                                • Instruction ID: 4c23cf239595689bd6ac908d1823c6ac4476eaf365500b83ee893700b171c0aa
                                                                • Opcode Fuzzy Hash: 29d8a869eeb6100c06984b39b412da9226d3d5e15bac0267b621030f8219637f
                                                                • Instruction Fuzzy Hash: 9841523A909B4381E710AF1BACC4369E3A0BBD8790FD0013BDA5D667A8DE3CD1458722
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000018.00000002.623541171.00007FF7E4381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF7E4380000, based on PE: true
                                                                • Associated: 00000018.00000002.623534030.00007FF7E4380000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623554275.00007FF7E4395000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623593260.00007FF7E439E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623622611.00007FF7E43A0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623639350.00007FF7E43A2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_24_2_7ff7e4380000_wermgr.jbxd
                                                                Similarity
                                                                • API ID: CurrentFormatMessageThread_vsnwprintf
                                                                • String ID: $%hs!%p: $%hs(%d) tid(%x) %08X %ws$%hs(%d)\%hs!%p: $(caller: %p) $CallContext:[%hs] $Exception$FailFast$LogHr$Msg:[%ws] $ReturnHr$[%hs(%hs)]$[%hs]
                                                                • API String ID: 223436642-2849347638
                                                                • Opcode ID: f00e87ce6a9755fae07b3ffc441eef272be726883a02ac5e47251ef9e34848a5
                                                                • Instruction ID: 158dfb386fb73262ebda9597176269f0c0bfe425e3d86e8ac386218d3f7cb87d
                                                                • Opcode Fuzzy Hash: f00e87ce6a9755fae07b3ffc441eef272be726883a02ac5e47251ef9e34848a5
                                                                • Instruction Fuzzy Hash: AB61656990964381EA64EF57A8847B5E3A4FF78784F90013BDA4D2BBD9EF3CD5408312
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000018.00000002.623541171.00007FF7E4381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF7E4380000, based on PE: true
                                                                • Associated: 00000018.00000002.623534030.00007FF7E4380000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623554275.00007FF7E4395000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623593260.00007FF7E439E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623622611.00007FF7E43A0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623639350.00007FF7E43A2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_24_2_7ff7e4380000_wermgr.jbxd
                                                                Similarity
                                                                • API ID: ErrorFileLastmemset$CloseCreateHandleMappingMessageTraceView
                                                                • String ID: -k -lcq
                                                                • API String ID: 332472461-3937627094
                                                                • Opcode ID: 50a7cb5f4c9042915af2814fdda8d6ea2fa102ce6cce58ad3d341d2557fe22f0
                                                                • Instruction ID: fbb04299176c8d52cb1d904cae1ff65681aee7126a527744b446b6bbd3d00606
                                                                • Opcode Fuzzy Hash: 50a7cb5f4c9042915af2814fdda8d6ea2fa102ce6cce58ad3d341d2557fe22f0
                                                                • Instruction Fuzzy Hash: AF817129A0878385EB50AF1B98D43B9A2A0BB68745FD4413BCA0D6B7D4DF7CE545C322
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000018.00000002.623541171.00007FF7E4381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF7E4380000, based on PE: true
                                                                • Associated: 00000018.00000002.623534030.00007FF7E4380000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623554275.00007FF7E4395000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623593260.00007FF7E439E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623622611.00007FF7E43A0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623639350.00007FF7E43A2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_24_2_7ff7e4380000_wermgr.jbxd
                                                                Similarity
                                                                • API ID: CloseErrorHandleLastOpenSemaphore
                                                                • String ID: _p0$wil$wil::details::CloseHandle$wil::details_abi::SemaphoreValue::TryGetValueInternal
                                                                • API String ID: 3419097560-569441599
                                                                • Opcode ID: a3021baa3df7971cf6f5342be2774763d4e5627f40bf338d95741551218cdbbb
                                                                • Instruction ID: 8679a69c8300ddbf9e9ecfc1b5bb2a367607a514c11f0dc9035e03019145a98f
                                                                • Opcode Fuzzy Hash: a3021baa3df7971cf6f5342be2774763d4e5627f40bf338d95741551218cdbbb
                                                                • Instruction Fuzzy Hash: 21517529A0864382F710EF66E8943B9E360EBA8744FD4413BDA4D6B799DF3CD505C721
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000018.00000002.623541171.00007FF7E4381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF7E4380000, based on PE: true
                                                                • Associated: 00000018.00000002.623534030.00007FF7E4380000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623554275.00007FF7E4395000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623593260.00007FF7E439E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623622611.00007FF7E43A0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623639350.00007FF7E43A2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_24_2_7ff7e4380000_wermgr.jbxd
                                                                Similarity
                                                                • API ID: ObjectSingleWait
                                                                • String ID: wil$wil::details_abi::SemaphoreValue::GetValueFromSemaphore
                                                                • API String ID: 24740636-733574568
                                                                • Opcode ID: 368b80cca04cd089bdd68c7e5c093c3c461bc5b7ad31ee2fa270af36ba0d330f
                                                                • Instruction ID: fc5ebfd18e258e44fbc78ae29b8b6949861e1af0410c7f7784800c94385174f8
                                                                • Opcode Fuzzy Hash: 368b80cca04cd089bdd68c7e5c093c3c461bc5b7ad31ee2fa270af36ba0d330f
                                                                • Instruction Fuzzy Hash: D0316229A0C543C2F7506F26D88437AE352DFA4790FD0423BD54AAA9D9DF7CE8458B23
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                Strings
                                                                • Software\Microsoft\Windows\CurrentVersion\Policies\DataCollection\Users, xrefs: 00007FF7E439227A
                                                                Memory Dump Source
                                                                • Source File: 00000018.00000002.623541171.00007FF7E4381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF7E4380000, based on PE: true
                                                                • Associated: 00000018.00000002.623534030.00007FF7E4380000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623554275.00007FF7E4395000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623593260.00007FF7E439E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623622611.00007FF7E43A0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623639350.00007FF7E43A2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_24_2_7ff7e4380000_wermgr.jbxd
                                                                Similarity
                                                                • API ID: Heap$Process$AllocCloseEnumFreeInfoOpenQuery
                                                                • String ID: Software\Microsoft\Windows\CurrentVersion\Policies\DataCollection\Users
                                                                • API String ID: 2872490147-1621995387
                                                                • Opcode ID: 403bf1c93249e74c07c5d263520246da847e970ae7e34880c788d60abe1afb31
                                                                • Instruction ID: 952d54735de46e57ad42809a00133aba0ec1ccc7b15e7d9ebb3e57ecdf1442eb
                                                                • Opcode Fuzzy Hash: 403bf1c93249e74c07c5d263520246da847e970ae7e34880c788d60abe1afb31
                                                                • Instruction Fuzzy Hash: AC51C636A04B8386E7109F6A9CC03ADB7A4FB54758F50463AEF4937A58DF3CD4858711
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000018.00000002.623541171.00007FF7E4381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF7E4380000, based on PE: true
                                                                • Associated: 00000018.00000002.623534030.00007FF7E4380000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623554275.00007FF7E4395000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623593260.00007FF7E439E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623622611.00007FF7E43A0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623639350.00007FF7E43A2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_24_2_7ff7e4380000_wermgr.jbxd
                                                                Similarity
                                                                • API ID: CloseErrorFileLast$CurrentHandleMappingNamespaceOpenPrivateProcessViewmemset
                                                                • String ID: WerSvc\WerSvcNonElevationInfoSectionName%d
                                                                • API String ID: 282122006-3649978101
                                                                • Opcode ID: 848c8edb91fac9d3c457b2bcfb27dd0f428bd6fcca01b300de84ed8bd341a311
                                                                • Instruction ID: a9fb7b9d464c22b5da8769ef1606d7e1d5a193cd8d7afc07e7e0914734d080bb
                                                                • Opcode Fuzzy Hash: 848c8edb91fac9d3c457b2bcfb27dd0f428bd6fcca01b300de84ed8bd341a311
                                                                • Instruction Fuzzy Hash: 9B518F29A0864381EB51AF2BD8C1379E390FBA8744FD5403BCA4DA66D5DF7CE8458362
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                  • Part of subcall function 00007FF7E4391750: AllocateAndInitializeSid.API-MS-WIN-SECURITY-BASE-L1-1-0 ref: 00007FF7E43917B4
                                                                  • Part of subcall function 00007FF7E4391750: RegOpenKeyExW.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF7E439185F
                                                                  • Part of subcall function 00007FF7E4391750: RegCloseKey.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF7E4391870
                                                                  • Part of subcall function 00007FF7E4391750: FreeSid.API-MS-WIN-SECURITY-BASE-L1-1-0 ref: 00007FF7E43918A8
                                                                • WerpIsTransportAvailable.WER ref: 00007FF7E43819D6
                                                                  • Part of subcall function 00007FF7E43814D0: memset.MSVCRT ref: 00007FF7E438151A
                                                                  • Part of subcall function 00007FF7E43814D0: memset.MSVCRT ref: 00007FF7E4381528
                                                                  • Part of subcall function 00007FF7E43814D0: memset.MSVCRT ref: 00007FF7E4381539
                                                                  • Part of subcall function 00007FF7E43814D0: memset.MSVCRT ref: 00007FF7E4381548
                                                                  • Part of subcall function 00007FF7E43814D0: GetCurrentProcess.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0 ref: 00007FF7E4381567
                                                                  • Part of subcall function 00007FF7E43814D0: IsWow64Process.API-MS-WIN-CORE-WOW64-L1-1-0 ref: 00007FF7E4381575
                                                                  • Part of subcall function 00007FF7E43814D0: Wow64DisableWow64FsRedirection.API-MS-WIN-CORE-WOW64-L1-1-0 ref: 00007FF7E438158A
                                                                  • Part of subcall function 00007FF7E43814D0: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FF7E4381594
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000018.00000002.623541171.00007FF7E4381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF7E4380000, based on PE: true
                                                                • Associated: 00000018.00000002.623534030.00007FF7E4380000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623554275.00007FF7E4395000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623593260.00007FF7E439E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623622611.00007FF7E43A0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623639350.00007FF7E43A2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_24_2_7ff7e4380000_wermgr.jbxd
                                                                Similarity
                                                                • API ID: memset$Wow64$Process$AllocateAvailableCloseCurrentDisableErrorFreeInitializeLastOpenRedirectionTransportWerp
                                                                • String ID: DoQueueReporting$FlushLiveReports$FlushLiveReports failed$LaunchEventReportingConsole failed$Not launching reporting console: current process is not interactive or wer is disabled or not opted in$Not launching reporting console: transport is not available$UtilLaunchElevatedProcess for live kernel reporting failed.$onecore\windows\feedback\core\wermgr\lib\wermgr.cpp
                                                                • API String ID: 173890828-3059153498
                                                                • Opcode ID: 5ffedc9cfbd262f040fd2181df29ae06b798dce15102df8a4eceee2363bc4ff7
                                                                • Instruction ID: c65ccde58bab302b4276c650e9d9188f79efc075a53ed340ef3573cb3a908e36
                                                                • Opcode Fuzzy Hash: 5ffedc9cfbd262f040fd2181df29ae06b798dce15102df8a4eceee2363bc4ff7
                                                                • Instruction Fuzzy Hash: 21313429A0D64351EB50AF16E8C03BAE350EFE8354FE0413FD64D666AADE3CE545C722
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000018.00000002.623541171.00007FF7E4381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF7E4380000, based on PE: true
                                                                • Associated: 00000018.00000002.623534030.00007FF7E4380000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623554275.00007FF7E4395000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623593260.00007FF7E439E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623622611.00007FF7E43A0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623639350.00007FF7E43A2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_24_2_7ff7e4380000_wermgr.jbxd
                                                                Similarity
                                                                • API ID: ErrorHeapLastMutexRelease$FreeObjectProcessSingleWait
                                                                • String ID: wil::details::ReleaseMutex
                                                                • API String ID: 3975950450-1086251647
                                                                • Opcode ID: 0cd628fd7ef7d244036970d8e64cfe2d1c4e7ab9f9529be6c870cb5338ced5f1
                                                                • Instruction ID: 3479203c1fbbbe88f5caef7754f97271376b11b7cf5b04f9ee479b6169315b2d
                                                                • Opcode Fuzzy Hash: 0cd628fd7ef7d244036970d8e64cfe2d1c4e7ab9f9529be6c870cb5338ced5f1
                                                                • Instruction Fuzzy Hash: D731652960864342F6547F67B8C0339E3A0EFB8750FD4063AEA5E5A6D5DF3CE4458722
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000018.00000002.623541171.00007FF7E4381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF7E4380000, based on PE: true
                                                                • Associated: 00000018.00000002.623534030.00007FF7E4380000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623554275.00007FF7E4395000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623593260.00007FF7E439E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623622611.00007FF7E43A0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623639350.00007FF7E43A2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_24_2_7ff7e4380000_wermgr.jbxd
                                                                Similarity
                                                                • API ID: CloseHandle$Heap$CriticalDeleteFreeProcessSection
                                                                • String ID: wil::details::CloseHandle
                                                                • API String ID: 2491024739-1019050351
                                                                • Opcode ID: e336081d5d3750385fd31522963b364985904b43dcd4a6329dbe2cc9965191ab
                                                                • Instruction ID: eacfed99855d191674373679142575e095e1a0e6345ee51a9ecfe15e77cc7eb6
                                                                • Opcode Fuzzy Hash: e336081d5d3750385fd31522963b364985904b43dcd4a6329dbe2cc9965191ab
                                                                • Instruction Fuzzy Hash: 61319429A09A0395FA14BF6B98C07799360EF55B90FD4113ADB5D23399CE3CE4458322
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000018.00000002.623541171.00007FF7E4381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF7E4380000, based on PE: true
                                                                • Associated: 00000018.00000002.623534030.00007FF7E4380000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623554275.00007FF7E4395000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623593260.00007FF7E439E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623622611.00007FF7E43A0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623639350.00007FF7E43A2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_24_2_7ff7e4380000_wermgr.jbxd
                                                                Similarity
                                                                • API ID: ErrorLast$CloseCreateHandleSemaphore
                                                                • String ID: internal\sdk\inc\wil\ResultMacros.h$wil::details::CloseHandle$wil::err_returncode_policy::LastErrorIfFalse
                                                                • API String ID: 2276426104-1774109675
                                                                • Opcode ID: 1ce376547927c29d4872147df0fe4a4e0d28c72fed9699719ae66ada6d1d8463
                                                                • Instruction ID: 58132241629a72658e2f68126b27227c254225c2107a56dc2ebb18985ec4e61a
                                                                • Opcode Fuzzy Hash: 1ce376547927c29d4872147df0fe4a4e0d28c72fed9699719ae66ada6d1d8463
                                                                • Instruction Fuzzy Hash: 7A118439A08B4782E714AF56A884229F7A0FB98B80F94443BDB8D57799CF3CE4458751
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000018.00000002.623541171.00007FF7E4381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF7E4380000, based on PE: true
                                                                • Associated: 00000018.00000002.623534030.00007FF7E4380000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623554275.00007FF7E4395000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623593260.00007FF7E439E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623622611.00007FF7E43A0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623639350.00007FF7E43A2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_24_2_7ff7e4380000_wermgr.jbxd
                                                                Similarity
                                                                • API ID: CurrentImageInfoNonwritableSleepStartup_amsg_exit_cexit_initterm_ismbbleadexit
                                                                • String ID:
                                                                • API String ID: 3033372379-0
                                                                • Opcode ID: 6aa70cac93bd6c7e0bff42b2a10b1a99f13c9179ad874ebd91944dacacfc299d
                                                                • Instruction ID: 9c8c6478143fc76d75f6cc7d1a2d0f91e2b1e7588a802459c07e0962efd667c3
                                                                • Opcode Fuzzy Hash: 6aa70cac93bd6c7e0bff42b2a10b1a99f13c9179ad874ebd91944dacacfc299d
                                                                • Instruction Fuzzy Hash: 22513D2A90CA4385E770AF1AEC90375A2A0BF64754FC8053FDB4DA269CDF3CE4558622
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • GetCurrentThreadId.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0(?,onecore\windows\feedback\core\wermgr\lib\wermgr.cpp,00000000,00007FF7E4384D37,?,000007FF,00007FF7E4384E7C), ref: 00007FF7E4384AE7
                                                                • memset.MSVCRT ref: 00007FF7E4384B30
                                                                • IsDebuggerPresent.API-MS-WIN-CORE-DEBUG-L1-1-0(?,onecore\windows\feedback\core\wermgr\lib\wermgr.cpp,00000000,00007FF7E4384D37,?,000007FF,00007FF7E4384E7C), ref: 00007FF7E4384BCF
                                                                • OutputDebugStringW.API-MS-WIN-CORE-DEBUG-L1-1-0(?,onecore\windows\feedback\core\wermgr\lib\wermgr.cpp,00000000,00007FF7E4384D37,?,000007FF,00007FF7E4384E7C), ref: 00007FF7E4384C5C
                                                                Strings
                                                                • onecore\windows\feedback\core\wermgr\lib\wermgr.cpp, xrefs: 00007FF7E43849DE
                                                                • LaunchEventReportingConsole::<lambda_ee853b4330cba43032664d6fd46aca6c>::operator (), xrefs: 00007FF7E43849E5
                                                                Memory Dump Source
                                                                • Source File: 00000018.00000002.623541171.00007FF7E4381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF7E4380000, based on PE: true
                                                                • Associated: 00000018.00000002.623534030.00007FF7E4380000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623554275.00007FF7E4395000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623593260.00007FF7E439E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623622611.00007FF7E43A0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623639350.00007FF7E43A2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_24_2_7ff7e4380000_wermgr.jbxd
                                                                Similarity
                                                                • API ID: CurrentDebugDebuggerOutputPresentStringThreadmemset
                                                                • String ID: LaunchEventReportingConsole::<lambda_ee853b4330cba43032664d6fd46aca6c>::operator ()$onecore\windows\feedback\core\wermgr\lib\wermgr.cpp
                                                                • API String ID: 3402966819-2357862516
                                                                • Opcode ID: 6664e0bc0d304994ad1f8d85215e856f9977658f63c528bf52f73378f9c16779
                                                                • Instruction ID: 6c2cdc40614f307135b1b227b8e220fbadda98ded6fd589ca15674a0bebec879
                                                                • Opcode Fuzzy Hash: 6664e0bc0d304994ad1f8d85215e856f9977658f63c528bf52f73378f9c16779
                                                                • Instruction Fuzzy Hash: 6BB1543A90874385EA61AF17A880379E3A4FBB8750F85413FDA4D1BBD8EE3CD4408721
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000018.00000002.623541171.00007FF7E4381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF7E4380000, based on PE: true
                                                                • Associated: 00000018.00000002.623534030.00007FF7E4380000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623554275.00007FF7E4395000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623593260.00007FF7E439E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623622611.00007FF7E43A0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623639350.00007FF7E43A2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_24_2_7ff7e4380000_wermgr.jbxd
                                                                Similarity
                                                                • API ID: CloseMessageOpenTraceValue
                                                                • String ID: Software\Microsoft\Windows\Windows Error Reporting$StorePath
                                                                • API String ID: 1932785668-806903183
                                                                • Opcode ID: 3d8b48dcc7f051ffcabb498af5335837fbbe738c1e41af2b94b9f1f637873e8e
                                                                • Instruction ID: e55c11009e91aeb6d234513384becb17c32fe91f9ee580d80e080971b79402e2
                                                                • Opcode Fuzzy Hash: 3d8b48dcc7f051ffcabb498af5335837fbbe738c1e41af2b94b9f1f637873e8e
                                                                • Instruction Fuzzy Hash: FA519329B0874395EE54AF1BD8D03B5E290BBA9744F84013BEA4D5B7D4DF3CE5058722
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • AllocateAndInitializeSid.API-MS-WIN-SECURITY-BASE-L1-1-0 ref: 00007FF7E43917B4
                                                                • CheckTokenMembership.API-MS-WIN-SECURITY-BASE-L1-1-0 ref: 00007FF7E43917F6
                                                                • RegOpenKeyExW.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF7E439185F
                                                                • RegCloseKey.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF7E4391870
                                                                • FreeSid.API-MS-WIN-SECURITY-BASE-L1-1-0 ref: 00007FF7E43918A8
                                                                  • Part of subcall function 00007FF7E43912E0: GetCurrentThreadId.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0(?,?,?,?,00000000,00007FF7E4391705), ref: 00007FF7E439132D
                                                                  • Part of subcall function 00007FF7E43912E0: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,?,00000000,00007FF7E4391705), ref: 00007FF7E4391378
                                                                  • Part of subcall function 00007FF7E43912E0: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,?,00000000,00007FF7E4391705), ref: 00007FF7E43913A6
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000018.00000002.623541171.00007FF7E4381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF7E4380000, based on PE: true
                                                                • Associated: 00000018.00000002.623534030.00007FF7E4380000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623554275.00007FF7E4395000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623593260.00007FF7E439E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623622611.00007FF7E43A0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623639350.00007FF7E43A2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_24_2_7ff7e4380000_wermgr.jbxd
                                                                Similarity
                                                                • API ID: ErrorLast$AllocateCheckCloseCurrentFreeInitializeMembershipOpenThreadToken
                                                                • String ID: SYSTEM\CurrentControlSet\Control\MiniNT
                                                                • API String ID: 2458340890-2757998475
                                                                • Opcode ID: a9ca4640fd1a094bb0b91877e7e649fc84f46279dcb71c3182820fa64d975231
                                                                • Instruction ID: 0cbbfdb4445a61d57cc97272d212989d77e577e8dea6cb7805b8576594c916fd
                                                                • Opcode Fuzzy Hash: a9ca4640fd1a094bb0b91877e7e649fc84f46279dcb71c3182820fa64d975231
                                                                • Instruction Fuzzy Hash: AE41577A90860385FB60AF2BD8803A9B394FF64348F91053BDB0D62699DF39E441C722
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • AllocateAndInitializeSid.API-MS-WIN-SECURITY-BASE-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF7E4391837), ref: 00007FF7E4391682
                                                                • CheckTokenMembership.API-MS-WIN-SECURITY-BASE-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF7E4391837), ref: 00007FF7E43916B4
                                                                • FreeSid.API-MS-WIN-SECURITY-BASE-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF7E4391837), ref: 00007FF7E43916F5
                                                                • OpenMutexW.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF7E4391837), ref: 00007FF7E4391717
                                                                • CloseHandle.API-MS-WIN-CORE-HANDLE-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF7E4391837), ref: 00007FF7E439172A
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000018.00000002.623541171.00007FF7E4381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF7E4380000, based on PE: true
                                                                • Associated: 00000018.00000002.623534030.00007FF7E4380000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623554275.00007FF7E4395000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623593260.00007FF7E439E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623622611.00007FF7E43A0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623639350.00007FF7E43A2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_24_2_7ff7e4380000_wermgr.jbxd
                                                                Similarity
                                                                • API ID: AllocateCheckCloseFreeHandleInitializeMembershipMutexOpenToken
                                                                • String ID: Global\Microsoft.Windows.Setup
                                                                • API String ID: 1217297161-978874613
                                                                • Opcode ID: f62efad928b2d7d01e96d9c1f5846e481f246e676ab91df5653f81286e7e4c7e
                                                                • Instruction ID: 64e5183ea65e4fa2f322f358d6340850f076d3b2a4a4837d46c3b8028e028273
                                                                • Opcode Fuzzy Hash: f62efad928b2d7d01e96d9c1f5846e481f246e676ab91df5653f81286e7e4c7e
                                                                • Instruction Fuzzy Hash: 12315E6AE0864385FB14AF6A98C03B9B7B0BB58748F84053FCB0D62699DF3CE4458761
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000018.00000002.623541171.00007FF7E4381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF7E4380000, based on PE: true
                                                                • Associated: 00000018.00000002.623534030.00007FF7E4380000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623554275.00007FF7E4395000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623593260.00007FF7E439E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623622611.00007FF7E43A0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623639350.00007FF7E43A2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_24_2_7ff7e4380000_wermgr.jbxd
                                                                Similarity
                                                                • API ID: Heap$Process$Free$Allocmemcpy_s
                                                                • String ID:
                                                                • API String ID: 3852585984-0
                                                                • Opcode ID: f48e67270c704f3a778cdf779586809e0505a78bef4d58a80b85713198d184eb
                                                                • Instruction ID: 5cc951e52356e8949dc282d712f03a7da4377be779f958fadaa0efbbc880fbc2
                                                                • Opcode Fuzzy Hash: f48e67270c704f3a778cdf779586809e0505a78bef4d58a80b85713198d184eb
                                                                • Instruction Fuzzy Hash: 99218F76905B4386EB049F27E990328B3A0FF68B90F98823ADB1D17684DF3CD4518251
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000018.00000002.623541171.00007FF7E4381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF7E4380000, based on PE: true
                                                                • Associated: 00000018.00000002.623534030.00007FF7E4380000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623554275.00007FF7E4395000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623593260.00007FF7E439E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623622611.00007FF7E43A0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623639350.00007FF7E43A2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_24_2_7ff7e4380000_wermgr.jbxd
                                                                Similarity
                                                                • API ID: ErrorFileLastView$MessageTraceUnmap
                                                                • String ID:
                                                                • API String ID: 4108440488-0
                                                                • Opcode ID: 0721d818d62012f1b63c03cdaefb4862081232a2242d09e4148a0f9b376d6b81
                                                                • Instruction ID: 76864b3f5b51f42f8da10426b4cf313aaa007b177a5d4dbce377dae00a660d7c
                                                                • Opcode Fuzzy Hash: 0721d818d62012f1b63c03cdaefb4862081232a2242d09e4148a0f9b376d6b81
                                                                • Instruction Fuzzy Hash: 2371823A609B4781EB509F1BD8C13A9A3A1FB58B84F94443BCA4D577A4DF7CD402C752
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                  • Part of subcall function 00007FF7E4390414: AcquireSRWLockExclusive.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,00007FF7E43902BB), ref: 00007FF7E4390473
                                                                  • Part of subcall function 00007FF7E4390414: ReleaseSRWLockExclusive.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,00007FF7E43902BB), ref: 00007FF7E4390491
                                                                • AcquireSRWLockExclusive.API-MS-WIN-CORE-SYNCH-L1-1-0 ref: 00007FF7E43902F6
                                                                • ReleaseSRWLockExclusive.API-MS-WIN-CORE-SYNCH-L1-1-0 ref: 00007FF7E4390344
                                                                • AcquireSRWLockExclusive.API-MS-WIN-CORE-SYNCH-L1-1-0 ref: 00007FF7E439038B
                                                                • CreateThreadpoolTimer.API-MS-WIN-CORE-THREADPOOL-L1-2-0 ref: 00007FF7E43903B0
                                                                • SetThreadpoolTimer.API-MS-WIN-CORE-THREADPOOL-L1-2-0 ref: 00007FF7E43903E6
                                                                • ReleaseSRWLockExclusive.API-MS-WIN-CORE-SYNCH-L1-1-0 ref: 00007FF7E43903F8
                                                                Memory Dump Source
                                                                • Source File: 00000018.00000002.623541171.00007FF7E4381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF7E4380000, based on PE: true
                                                                • Associated: 00000018.00000002.623534030.00007FF7E4380000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623554275.00007FF7E4395000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623593260.00007FF7E439E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623622611.00007FF7E43A0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623639350.00007FF7E43A2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_24_2_7ff7e4380000_wermgr.jbxd
                                                                Similarity
                                                                • API ID: ExclusiveLock$AcquireRelease$ThreadpoolTimer$Create
                                                                • String ID:
                                                                • API String ID: 2815330823-0
                                                                • Opcode ID: 28de44f4099095f0e56eb986df0b38aedb06568dc398ae0fd879b7a4f0a4a1e4
                                                                • Instruction ID: bf537f2a2b526c7fbd4a9aa8efb8cfb40ed31049c6cf7fb7b392ba412ca6619b
                                                                • Opcode Fuzzy Hash: 28de44f4099095f0e56eb986df0b38aedb06568dc398ae0fd879b7a4f0a4a1e4
                                                                • Instruction Fuzzy Hash: CC418319A0964352FA60BF1F99D037DA361AF65B80FC4003ACF4E67699DF3CE4858322
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000018.00000002.623541171.00007FF7E4381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF7E4380000, based on PE: true
                                                                • Associated: 00000018.00000002.623534030.00007FF7E4380000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623554275.00007FF7E4395000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623593260.00007FF7E439E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623622611.00007FF7E43A0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623639350.00007FF7E43A2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_24_2_7ff7e4380000_wermgr.jbxd
                                                                Similarity
                                                                • API ID: Lock$AcquireCriticalExclusiveReleaseSectionShared$EnterLeave
                                                                • String ID:
                                                                • API String ID: 3221859647-0
                                                                • Opcode ID: 59b5d0588ca1c240cdda09ab10f7a5d61fc849955bfe83a8e6ad7c0ca40a0145
                                                                • Instruction ID: 95b1005f5505d364380477fe7dfc214c6be19a8c554bdf47aad59e82ddfbbea9
                                                                • Opcode Fuzzy Hash: 59b5d0588ca1c240cdda09ab10f7a5d61fc849955bfe83a8e6ad7c0ca40a0145
                                                                • Instruction Fuzzy Hash: 7B219626B08A5396EA51AF1BAD40239E321FB54FD4F88413ADF4E27B19DF3CE4858711
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000018.00000002.623541171.00007FF7E4381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF7E4380000, based on PE: true
                                                                • Associated: 00000018.00000002.623534030.00007FF7E4380000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623554275.00007FF7E4395000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623593260.00007FF7E439E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623622611.00007FF7E43A0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623639350.00007FF7E43A2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_24_2_7ff7e4380000_wermgr.jbxd
                                                                Similarity
                                                                • API ID: memmove_s
                                                                • String ID:
                                                                • API String ID: 1646303785-0
                                                                • Opcode ID: ff6b471bda2a65e626e08dc2a7746f1376205a6251c6fbcbf498044c525317b3
                                                                • Instruction ID: 70289c0edee39682dd7f2ed486809b4015f4feb4e792870f5ad160044a69595f
                                                                • Opcode Fuzzy Hash: ff6b471bda2a65e626e08dc2a7746f1376205a6251c6fbcbf498044c525317b3
                                                                • Instruction Fuzzy Hash: 58C1526AF046569AF710DF76D0802ECB7B1EB28788B90413BDE4D6BB88DE38D546C351
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000018.00000002.623541171.00007FF7E4381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF7E4380000, based on PE: true
                                                                • Associated: 00000018.00000002.623534030.00007FF7E4380000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623554275.00007FF7E4395000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623593260.00007FF7E439E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623622611.00007FF7E43A0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623639350.00007FF7E43A2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_24_2_7ff7e4380000_wermgr.jbxd
                                                                Similarity
                                                                • API ID: Heap$Process$Alloc$Free
                                                                • String ID:
                                                                • API String ID: 1864747095-0
                                                                • Opcode ID: 01d169fffaa42cadaf09b3df9675c28cf29e147c3feed5579db0a57144fe139e
                                                                • Instruction ID: 8a631ef7422182d64a2d8c34a28b3cf623b30f4b4cf35af14421b2193561311e
                                                                • Opcode Fuzzy Hash: 01d169fffaa42cadaf09b3df9675c28cf29e147c3feed5579db0a57144fe139e
                                                                • Instruction Fuzzy Hash: 5F61B1BAA0574286EB14DF66F58036DB3A0FB98B84BA4413ADF4D57790DF3CE4618350
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000018.00000002.623541171.00007FF7E4381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF7E4380000, based on PE: true
                                                                • Associated: 00000018.00000002.623534030.00007FF7E4380000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623554275.00007FF7E4395000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623593260.00007FF7E439E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623622611.00007FF7E43A0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623639350.00007FF7E43A2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_24_2_7ff7e4380000_wermgr.jbxd
                                                                Similarity
                                                                • API ID: CloseMessageOpenQueryTraceValue
                                                                • String ID:
                                                                • API String ID: 3821667754-0
                                                                • Opcode ID: 99e94018a152353f1cbaafb058d1b3e04500377dd9dee31da4397b36db63fb31
                                                                • Instruction ID: 53d4ac2b8934fd0a0a49ba60091444587b639b7f1ce8565ab33b97c8c939bc4d
                                                                • Opcode Fuzzy Hash: 99e94018a152353f1cbaafb058d1b3e04500377dd9dee31da4397b36db63fb31
                                                                • Instruction Fuzzy Hash: 5871943AE0864382EB689F16D4C0379E2A1FF68750F90413BD64D6AAD4DF3DE4958713
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000018.00000002.623541171.00007FF7E4381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF7E4380000, based on PE: true
                                                                • Associated: 00000018.00000002.623534030.00007FF7E4380000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623554275.00007FF7E4395000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623593260.00007FF7E439E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623622611.00007FF7E43A0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623639350.00007FF7E43A2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_24_2_7ff7e4380000_wermgr.jbxd
                                                                Similarity
                                                                • API ID: Heap$FreeProcess
                                                                • String ID:
                                                                • API String ID: 3859560861-0
                                                                • Opcode ID: 5a5830728f3d48137bccaae89a1767148d2f275b46339931bbd616beea596f2f
                                                                • Instruction ID: 499536a3b6d668ff8df9c644988939998a1f9f1af55204bc609fd1d7244703b2
                                                                • Opcode Fuzzy Hash: 5a5830728f3d48137bccaae89a1767148d2f275b46339931bbd616beea596f2f
                                                                • Instruction Fuzzy Hash: F631C627A09F8286E741DF5695802A8F760FB69B80F999226EF5C27711DF38D4E2C310
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • AcquireSRWLockExclusive.API-MS-WIN-CORE-SYNCH-L1-1-0 ref: 00007FF7E439084E
                                                                • ReleaseSRWLockExclusive.API-MS-WIN-CORE-SYNCH-L1-1-0 ref: 00007FF7E439089F
                                                                • AcquireSRWLockExclusive.API-MS-WIN-CORE-SYNCH-L1-1-0 ref: 00007FF7E4390875
                                                                • AcquireSRWLockExclusive.API-MS-WIN-CORE-SYNCH-L1-1-0 ref: 00007FF7E43908DF
                                                                • ReleaseSRWLockExclusive.API-MS-WIN-CORE-SYNCH-L1-1-0 ref: 00007FF7E4390935
                                                                  • Part of subcall function 00007FF7E4390414: AcquireSRWLockExclusive.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,00007FF7E43902BB), ref: 00007FF7E4390473
                                                                  • Part of subcall function 00007FF7E4390414: ReleaseSRWLockExclusive.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,00007FF7E43902BB), ref: 00007FF7E4390491
                                                                Memory Dump Source
                                                                • Source File: 00000018.00000002.623541171.00007FF7E4381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF7E4380000, based on PE: true
                                                                • Associated: 00000018.00000002.623534030.00007FF7E4380000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623554275.00007FF7E4395000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623593260.00007FF7E439E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623622611.00007FF7E43A0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623639350.00007FF7E43A2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_24_2_7ff7e4380000_wermgr.jbxd
                                                                Similarity
                                                                • API ID: ExclusiveLock$Acquire$Release$memcpy_s
                                                                • String ID:
                                                                • API String ID: 565443268-0
                                                                • Opcode ID: 9791c87c4fb4c809c549f74c3e8a026f4f00da93cf5778e38154aa648c821fbf
                                                                • Instruction ID: 9a5508680c9411d3feb318a89f432e5c1ea75165cc0339e08cb87a86b517eb3a
                                                                • Opcode Fuzzy Hash: 9791c87c4fb4c809c549f74c3e8a026f4f00da93cf5778e38154aa648c821fbf
                                                                • Instruction Fuzzy Hash: 6B311A2990864790FA00BF1AECD13B4A361AB74B94FC5453BD71D322EACE3CA445C762
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000018.00000002.623541171.00007FF7E4381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF7E4380000, based on PE: true
                                                                • Associated: 00000018.00000002.623534030.00007FF7E4380000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623554275.00007FF7E4395000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623593260.00007FF7E439E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623622611.00007FF7E43A0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623639350.00007FF7E43A2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_24_2_7ff7e4380000_wermgr.jbxd
                                                                Similarity
                                                                • API ID: Heap$Process$AllocFreememcpy_s
                                                                • String ID:
                                                                • API String ID: 3519707287-0
                                                                • Opcode ID: 915b1434ca76fd12caacd7aec58fb57ea0b828794eff112e269b7b0309ccc441
                                                                • Instruction ID: eae3fd00acc975382063a25fd5b472aae9730f215985cf50f2f8e0216853d148
                                                                • Opcode Fuzzy Hash: 915b1434ca76fd12caacd7aec58fb57ea0b828794eff112e269b7b0309ccc441
                                                                • Instruction Fuzzy Hash: 1121D13AA09B4295DA00DF57E984269F360FB58BD0784453ADF6D17794EF38E0A2C310
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000018.00000002.623541171.00007FF7E4381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF7E4380000, based on PE: true
                                                                • Associated: 00000018.00000002.623534030.00007FF7E4380000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623554275.00007FF7E4395000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623593260.00007FF7E439E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623622611.00007FF7E43A0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623639350.00007FF7E43A2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_24_2_7ff7e4380000_wermgr.jbxd
                                                                Similarity
                                                                • API ID: CloseHandle$FileReportUnmapView
                                                                • String ID:
                                                                • API String ID: 3666915389-0
                                                                • Opcode ID: 5504fe5ed105d4a8c737a301d62581bb531e911bc74a0ef0aa10469f9905c9f0
                                                                • Instruction ID: 53671204b216900ab3e09fa3d802d48fa5ddb77e655d6db3404244606111c307
                                                                • Opcode Fuzzy Hash: 5504fe5ed105d4a8c737a301d62581bb531e911bc74a0ef0aa10469f9905c9f0
                                                                • Instruction Fuzzy Hash: 0411462AA1564281EB15FF62D4D8378A321FF58F44F94413ACA0D1D096CF7CD058C372
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000018.00000002.623541171.00007FF7E4381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF7E4380000, based on PE: true
                                                                • Associated: 00000018.00000002.623534030.00007FF7E4380000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623554275.00007FF7E4395000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623593260.00007FF7E439E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623622611.00007FF7E43A0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623639350.00007FF7E43A2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_24_2_7ff7e4380000_wermgr.jbxd
                                                                Similarity
                                                                • API ID: Heap$FreeProcess
                                                                • String ID:
                                                                • API String ID: 3859560861-0
                                                                • Opcode ID: f51f91e4178cd19d8025a42ed4719263cf4811b7fb286283f6ea5ab348f7a7ca
                                                                • Instruction ID: d99b7d17615869ed80543deddb37a26b93814edb392bcc0e134ab7f708beefaa
                                                                • Opcode Fuzzy Hash: f51f91e4178cd19d8025a42ed4719263cf4811b7fb286283f6ea5ab348f7a7ca
                                                                • Instruction Fuzzy Hash: 50F0121AA08A4395EB04AF9BA994369A361BF59FD4BC84139DF1D23718DF3C94418211
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000018.00000002.623541171.00007FF7E4381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF7E4380000, based on PE: true
                                                                • Associated: 00000018.00000002.623534030.00007FF7E4380000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623554275.00007FF7E4395000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623593260.00007FF7E439E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623622611.00007FF7E43A0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623639350.00007FF7E43A2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_24_2_7ff7e4380000_wermgr.jbxd
                                                                Similarity
                                                                • API ID: ThreadpoolTimer$ErrorLast$CallbacksCloseWait
                                                                • String ID:
                                                                • API String ID: 3522076515-0
                                                                • Opcode ID: 377ee3d72375b96e891f771b498d70f97d45db11643a920253b8dd6b3030fd26
                                                                • Instruction ID: 73fa5334642bb41103dcc9ed3f4e6e68824060dd99c21da1ce28ace493ddb9b9
                                                                • Opcode Fuzzy Hash: 377ee3d72375b96e891f771b498d70f97d45db11643a920253b8dd6b3030fd26
                                                                • Instruction Fuzzy Hash: CAF0312AB08B5282F704AF66B884229B320EB98FD0F945135DF4A17B19CE3CD4968701
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000018.00000002.623541171.00007FF7E4381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF7E4380000, based on PE: true
                                                                • Associated: 00000018.00000002.623534030.00007FF7E4380000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623554275.00007FF7E4395000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623593260.00007FF7E439E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623622611.00007FF7E43A0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623639350.00007FF7E43A2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_24_2_7ff7e4380000_wermgr.jbxd
                                                                Similarity
                                                                • API ID: _vsnwprintf
                                                                • String ID: %hs$LaunchEventReportingConsole::<lambda_ee853b4330cba43032664d6fd46aca6c>::operator ()$onecore\windows\feedback\core\wermgr\lib\wermgr.cpp
                                                                • API String ID: 1036211903-4217687857
                                                                • Opcode ID: 963f945ad34f2660eafc645d006a208bc9e3df48fe6e721f63c63f31d471503a
                                                                • Instruction ID: d32fe8d18a0ca6365249adcb9374c1ac58a1b5bde5d8509e1a0ebe8f35d9b96c
                                                                • Opcode Fuzzy Hash: 963f945ad34f2660eafc645d006a208bc9e3df48fe6e721f63c63f31d471503a
                                                                • Instruction Fuzzy Hash: F52195266087C292E660AF47E88479AE354FBAC790F804536EE8C57B89EF7CD545CB10
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000018.00000002.623541171.00007FF7E4381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF7E4380000, based on PE: true
                                                                • Associated: 00000018.00000002.623534030.00007FF7E4380000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623554275.00007FF7E4395000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623593260.00007FF7E439E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623622611.00007FF7E43A0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623639350.00007FF7E43A2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_24_2_7ff7e4380000_wermgr.jbxd
                                                                Similarity
                                                                • API ID: AddressHandleModuleProc
                                                                • String ID: NtUpdateWnfStateData$ntdll.dll
                                                                • API String ID: 1646373207-3251081820
                                                                • Opcode ID: abab68d921f85bcfe9b79bae3734d49598e7902985479c467fc4a2fae7652295
                                                                • Instruction ID: f60d12f88ba805cb912b27402986b710717fbc69b4bd1cbfc69490105cd4e71c
                                                                • Opcode Fuzzy Hash: abab68d921f85bcfe9b79bae3734d49598e7902985479c467fc4a2fae7652295
                                                                • Instruction Fuzzy Hash: A9111229A0974786E7509F0ABCC0729E7A0BB58B90F80413BDE4D67B58EF7CE445CB11
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000018.00000002.623541171.00007FF7E4381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF7E4380000, based on PE: true
                                                                • Associated: 00000018.00000002.623534030.00007FF7E4380000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623554275.00007FF7E4395000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623593260.00007FF7E439E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623622611.00007FF7E43A0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623639350.00007FF7E43A2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_24_2_7ff7e4380000_wermgr.jbxd
                                                                Similarity
                                                                • API ID: AddressHandleModuleProc
                                                                • String ID: NtQueryWnfStateData$ntdll.dll
                                                                • API String ID: 1646373207-3115237368
                                                                • Opcode ID: 562700e8f6699a1242436528c5d1933a95408ead9f2703f5a868b8e8da936917
                                                                • Instruction ID: d069bfe9e80ea1a8b33d7c241edf903e04060c393b8130916f100c30dd326c6b
                                                                • Opcode Fuzzy Hash: 562700e8f6699a1242436528c5d1933a95408ead9f2703f5a868b8e8da936917
                                                                • Instruction Fuzzy Hash: A401D62DA09B0785EA50AF1BACC0225E390AF68B94BD5413BDE4D57768EE3CE454C711
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000018.00000002.623541171.00007FF7E4381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF7E4380000, based on PE: true
                                                                • Associated: 00000018.00000002.623534030.00007FF7E4380000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623554275.00007FF7E4395000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623593260.00007FF7E439E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623622611.00007FF7E43A0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623639350.00007FF7E43A2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_24_2_7ff7e4380000_wermgr.jbxd
                                                                Similarity
                                                                • API ID: AddressHandleModuleProc
                                                                • String ID: RtlUnsubscribeWnfNotificationWaitForCompletion$ntdll.dll
                                                                • API String ID: 1646373207-368597124
                                                                • Opcode ID: bf04bd2ccfaaf0eefad5e2c67fd313481d1c33607dfb88c16b4b036e0596564f
                                                                • Instruction ID: 0afe894d2b22fe52e4ac96e4b107643065b7db6e1667acbe84150c9fb4b2d463
                                                                • Opcode Fuzzy Hash: bf04bd2ccfaaf0eefad5e2c67fd313481d1c33607dfb88c16b4b036e0596564f
                                                                • Instruction Fuzzy Hash: 9FF0122DA49B0341FE117F1AACC0334A360AF65761BC8463ECA6D263A8EF3CE0458621
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000018.00000002.623541171.00007FF7E4381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF7E4380000, based on PE: true
                                                                • Associated: 00000018.00000002.623534030.00007FF7E4380000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623554275.00007FF7E4395000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623593260.00007FF7E439E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623622611.00007FF7E43A0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623639350.00007FF7E43A2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_24_2_7ff7e4380000_wermgr.jbxd
                                                                Similarity
                                                                • API ID: AddressHandleModuleProc
                                                                • String ID: RtlNtStatusToDosErrorNoTeb$ntdll.dll
                                                                • API String ID: 1646373207-1321910969
                                                                • Opcode ID: 6130eaed97f9b07d267cf66e187f1d15016dac12144fa01920d24353264cb9b3
                                                                • Instruction ID: 12dcd302f395994c0bd1b9b7cf5bc67b249631418f4422242d3a705d1ffbba25
                                                                • Opcode Fuzzy Hash: 6130eaed97f9b07d267cf66e187f1d15016dac12144fa01920d24353264cb9b3
                                                                • Instruction Fuzzy Hash: D3F0C229A09B0782EA456F5EBCC0234A290AF6C750BD4413EDA0D66358EF7CE454C711
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000018.00000002.623541171.00007FF7E4381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF7E4380000, based on PE: true
                                                                • Associated: 00000018.00000002.623534030.00007FF7E4380000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623554275.00007FF7E4395000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623593260.00007FF7E439E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623622611.00007FF7E43A0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623639350.00007FF7E43A2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_24_2_7ff7e4380000_wermgr.jbxd
                                                                Similarity
                                                                • API ID: MessageTrace
                                                                • String ID: NewUserDefaultConsent$Software\Microsoft\Windows\Windows Error Reporting\Consent$v
                                                                • API String ID: 471583391-3250182199
                                                                • Opcode ID: df39af13bf08587453d4db1477ae9282a8fb70917d431dcba9aed416ba46e113
                                                                • Instruction ID: 3265b8ce53971dd177346786730700263368fd27274cdbc7089f40b87a1096d2
                                                                • Opcode Fuzzy Hash: df39af13bf08587453d4db1477ae9282a8fb70917d431dcba9aed416ba46e113
                                                                • Instruction Fuzzy Hash: 0DF04B35918B81C2E620AB18F88474AB3B4F794360FD0032AD2DD02BA8DF3DC165CB00
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • Wow64RevertWow64FsRedirection.API-MS-WIN-CORE-WOW64-L1-1-0 ref: 00007FF7E4383F71
                                                                Strings
                                                                • Wow64RevertWow64FsRedirection failed., xrefs: 00007FF7E4383F80
                                                                • onecore\windows\feedback\core\wermgr\lib\wermgr.cpp, xrefs: 00007FF7E4383F93
                                                                • LaunchEventReportingConsole::<lambda_ee853b4330cba43032664d6fd46aca6c>::operator (), xrefs: 00007FF7E4383F87
                                                                Memory Dump Source
                                                                • Source File: 00000018.00000002.623541171.00007FF7E4381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF7E4380000, based on PE: true
                                                                • Associated: 00000018.00000002.623534030.00007FF7E4380000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623554275.00007FF7E4395000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623593260.00007FF7E439E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623622611.00007FF7E43A0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623639350.00007FF7E43A2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_24_2_7ff7e4380000_wermgr.jbxd
                                                                Similarity
                                                                • API ID: Wow64$RedirectionRevert
                                                                • String ID: LaunchEventReportingConsole::<lambda_ee853b4330cba43032664d6fd46aca6c>::operator ()$Wow64RevertWow64FsRedirection failed.$onecore\windows\feedback\core\wermgr\lib\wermgr.cpp
                                                                • API String ID: 949088015-771996154
                                                                • Opcode ID: 058abf12418fa0a1783b1bf71b8397be3815cb97aac9d48b0d20e67d55eac4e2
                                                                • Instruction ID: 05c8e90abbcddd5a09038305026573768a5a7ebf58a041c2631f045dd3f684cf
                                                                • Opcode Fuzzy Hash: 058abf12418fa0a1783b1bf71b8397be3815cb97aac9d48b0d20e67d55eac4e2
                                                                • Instruction Fuzzy Hash: ABF03029A0868391EB01AF1AD8803A8E760BBE4B48FE0413BD64D163A5CF3DD545C352
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000018.00000002.623541171.00007FF7E4381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF7E4380000, based on PE: true
                                                                • Associated: 00000018.00000002.623534030.00007FF7E4380000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623554275.00007FF7E4395000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623593260.00007FF7E439E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623622611.00007FF7E43A0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623639350.00007FF7E43A2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_24_2_7ff7e4380000_wermgr.jbxd
                                                                Similarity
                                                                • API ID: Printwcsncmp
                                                                • String ID: PEB_SIGNATURE$WER/CrashAPI:%u: ERROR Invalid args
                                                                • API String ID: 2018116966-1795107524
                                                                • Opcode ID: fa492a97041a0d53e42c1190ada25662436e371190c17e59897f97f4afed9674
                                                                • Instruction ID: faa571f487e77159931079816865738b7885ecd38fdf14611b4bd8485be13fc8
                                                                • Opcode Fuzzy Hash: fa492a97041a0d53e42c1190ada25662436e371190c17e59897f97f4afed9674
                                                                • Instruction Fuzzy Hash: 96E06559F59843C1FA24AF5A9C50774D2506F28344FC0413ECA0E696E4DF3CA1458716
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000018.00000002.623541171.00007FF7E4381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF7E4380000, based on PE: true
                                                                • Associated: 00000018.00000002.623534030.00007FF7E4380000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623554275.00007FF7E4395000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623593260.00007FF7E439E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623622611.00007FF7E43A0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623639350.00007FF7E43A2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_24_2_7ff7e4380000_wermgr.jbxd
                                                                Similarity
                                                                • API ID: MutexRelease
                                                                • String ID: wil::details::CloseHandle$wil::details::ReleaseMutex$wil::details_abi::SemaphoreValue::CreateFromValueInternal
                                                                • API String ID: 1638419-692347174
                                                                • Opcode ID: 7f09c46927f9bc2fe33622f7b5214d01ba20c6716bcec4a39923d7b7d5248d28
                                                                • Instruction ID: 2254add44a8027dfc10e2a3d2091ee27b830a1e74b8462adf24ce14030635411
                                                                • Opcode Fuzzy Hash: 7f09c46927f9bc2fe33622f7b5214d01ba20c6716bcec4a39923d7b7d5248d28
                                                                • Instruction Fuzzy Hash: 42D0121DA0940781F928BFA798D027893A0AFB8B44FD8493AD60D5A9D4DE3CE1458B22
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • GetFinalPathNameByHandleW.API-MS-WIN-CORE-FILE-L1-1-0(?,?,?,?,?,00007FF7E438BBC3), ref: 00007FF7E438B99C
                                                                • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,?,?,00007FF7E438BBC3), ref: 00007FF7E438B9A8
                                                                  • Part of subcall function 00007FF7E438A92C: EtwTraceMessage.NTDLL ref: 00007FF7E438A972
                                                                Memory Dump Source
                                                                • Source File: 00000018.00000002.623541171.00007FF7E4381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF7E4380000, based on PE: true
                                                                • Associated: 00000018.00000002.623534030.00007FF7E4380000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623554275.00007FF7E4395000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623593260.00007FF7E439E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623622611.00007FF7E43A0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623639350.00007FF7E43A2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_24_2_7ff7e4380000_wermgr.jbxd
                                                                Similarity
                                                                • API ID: ErrorFinalHandleLastMessageNamePathTracemalloc
                                                                • String ID:
                                                                • API String ID: 1555956524-0
                                                                • Opcode ID: 3c0059398290d73663bace491a5dae70d7fcd8ab7531fb7a120405c01eff49c2
                                                                • Instruction ID: 9726a09baddc52fb7c4ce0b15955b2262f65b62e33c910d303c161ea9be60182
                                                                • Opcode Fuzzy Hash: 3c0059398290d73663bace491a5dae70d7fcd8ab7531fb7a120405c01eff49c2
                                                                • Instruction Fuzzy Hash: F651C428B0864381EE51BF1B98D0375D281AFA8784FD4043FEA4E6B7D9DE7CE5018362
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • ExpandEnvironmentStringsW.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0 ref: 00007FF7E438AC6D
                                                                • ExpandEnvironmentStringsW.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0 ref: 00007FF7E438AD01
                                                                • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FF7E438AD24
                                                                • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FF7E438AD49
                                                                  • Part of subcall function 00007FF7E4381380: EtwTraceMessage.NTDLL ref: 00007FF7E43813A9
                                                                Memory Dump Source
                                                                • Source File: 00000018.00000002.623541171.00007FF7E4381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF7E4380000, based on PE: true
                                                                • Associated: 00000018.00000002.623534030.00007FF7E4380000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623554275.00007FF7E4395000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623593260.00007FF7E439E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623622611.00007FF7E43A0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623639350.00007FF7E43A2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_24_2_7ff7e4380000_wermgr.jbxd
                                                                Similarity
                                                                • API ID: EnvironmentErrorExpandLastStrings$MessageTracemalloc
                                                                • String ID:
                                                                • API String ID: 1992093174-0
                                                                • Opcode ID: 629ee6a99f90ded05ee2206948fa9eb21dacd83a9f19c916dfb5e9febb78e3b4
                                                                • Instruction ID: df4ac7873f2b3881fee6bc2441192467c63c9784d5fb714823a29e926922d24b
                                                                • Opcode Fuzzy Hash: 629ee6a99f90ded05ee2206948fa9eb21dacd83a9f19c916dfb5e9febb78e3b4
                                                                • Instruction Fuzzy Hash: B2412A2960864391FE14BF1B9890374D391BFA8794FD4453ADD1DABBE4DE7CD4068322
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • RtlCaptureContext.API-MS-WIN-CORE-RTLSUPPORT-L1-1-0 ref: 00007FF7E4393193
                                                                • RtlLookupFunctionEntry.API-MS-WIN-CORE-RTLSUPPORT-L1-1-0 ref: 00007FF7E43931B2
                                                                • RtlVirtualUnwind.API-MS-WIN-CORE-RTLSUPPORT-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF7E43818FF), ref: 00007FF7E43931FF
                                                                • __raise_securityfailure.LIBCMT ref: 00007FF7E43932E4
                                                                Memory Dump Source
                                                                • Source File: 00000018.00000002.623541171.00007FF7E4381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF7E4380000, based on PE: true
                                                                • Associated: 00000018.00000002.623534030.00007FF7E4380000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623554275.00007FF7E4395000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623593260.00007FF7E439E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623622611.00007FF7E43A0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623639350.00007FF7E43A2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_24_2_7ff7e4380000_wermgr.jbxd
                                                                Similarity
                                                                • API ID: CaptureContextEntryFunctionLookupUnwindVirtual__raise_securityfailure
                                                                • String ID:
                                                                • API String ID: 140117192-0
                                                                • Opcode ID: fce1858c1e2e08416e7e6061253f794a4473563d4776c532886590338f5d1491
                                                                • Instruction ID: 9d216dee42d42b4da24a9827ce545ef01a79e95928d2eac464c74d1324314914
                                                                • Opcode Fuzzy Hash: fce1858c1e2e08416e7e6061253f794a4473563d4776c532886590338f5d1491
                                                                • Instruction Fuzzy Hash: CC41A679A09B0291EA50AF0EFC91365E364FBA8754F91813FDA8D527A8DF3CE444C711
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • ReadProcessMemory.API-MS-WIN-CORE-MEMORY-L1-1-0(?,?,?,?,?,?,?,?,?,00007FF7E4387731), ref: 00007FF7E4388E83
                                                                • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,?,?,?,?,?,?,00007FF7E4387731), ref: 00007FF7E4388E8D
                                                                Memory Dump Source
                                                                • Source File: 00000018.00000002.623541171.00007FF7E4381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF7E4380000, based on PE: true
                                                                • Associated: 00000018.00000002.623534030.00007FF7E4380000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623554275.00007FF7E4395000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623593260.00007FF7E439E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623622611.00007FF7E43A0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623639350.00007FF7E43A2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_24_2_7ff7e4380000_wermgr.jbxd
                                                                Similarity
                                                                • API ID: ErrorLastMemoryProcessRead
                                                                • String ID:
                                                                • API String ID: 2417666006-0
                                                                • Opcode ID: 46e8988c741b50934dcce1462d834937adc4339aa789ec2b33f0d3263eea0a8c
                                                                • Instruction ID: b17b7c98ab3dbee2081385bde1c154cd6ef8bcb674b95ff3fff4145ec1061c87
                                                                • Opcode Fuzzy Hash: 46e8988c741b50934dcce1462d834937adc4339aa789ec2b33f0d3263eea0a8c
                                                                • Instruction Fuzzy Hash: 0B219536B1875381EB945F16A48076DE394FB68F80F94013AEE4DA7B84DF3CD4418722
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000018.00000002.623541171.00007FF7E4381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF7E4380000, based on PE: true
                                                                • Associated: 00000018.00000002.623534030.00007FF7E4380000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623554275.00007FF7E4395000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623593260.00007FF7E439E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623622611.00007FF7E43A0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623639350.00007FF7E43A2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_24_2_7ff7e4380000_wermgr.jbxd
                                                                Similarity
                                                                • API ID: CriticalExclusiveLockSection$AcquireEnterLeaveRelease
                                                                • String ID:
                                                                • API String ID: 1115728412-0
                                                                • Opcode ID: f2c0d164e0dcdff1f9e53bf09b1527c683cfbc63f57e9cab4270ecd45f7e3d67
                                                                • Instruction ID: f1872705620209efefb90ac57743c486b59e103f6eb042735c95f6badb139f0f
                                                                • Opcode Fuzzy Hash: f2c0d164e0dcdff1f9e53bf09b1527c683cfbc63f57e9cab4270ecd45f7e3d67
                                                                • Instruction Fuzzy Hash: F501962AB08B8342DE549F1AE980239E360FB59BC4B984235DF8E57759EF3CD4918701
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000018.00000002.623541171.00007FF7E4381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF7E4380000, based on PE: true
                                                                • Associated: 00000018.00000002.623534030.00007FF7E4380000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623554275.00007FF7E4395000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623593260.00007FF7E439E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623622611.00007FF7E43A0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623639350.00007FF7E43A2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_24_2_7ff7e4380000_wermgr.jbxd
                                                                Similarity
                                                                • API ID: ThreadpoolTimer$ErrorLast$CallbacksCloseWait
                                                                • String ID: wil::details::ReleaseMutex
                                                                • API String ID: 3522076515-1086251647
                                                                • Opcode ID: 2a1669ebbe3a559c8cd8011fe23db2485be21c0e51fa7b68f33854c5c647f9ee
                                                                • Instruction ID: 515add497099a0bbedb36ed0cd008685e22da1e40fdc7841262d17916079364e
                                                                • Opcode Fuzzy Hash: 2a1669ebbe3a559c8cd8011fe23db2485be21c0e51fa7b68f33854c5c647f9ee
                                                                • Instruction Fuzzy Hash: EE21312AB05B5241EB45EF269980368A361EB54FC4F884036DF4D2778DCF39E841C351
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000018.00000002.623541171.00007FF7E4381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF7E4380000, based on PE: true
                                                                • Associated: 00000018.00000002.623534030.00007FF7E4380000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623554275.00007FF7E4395000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623593260.00007FF7E439E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623622611.00007FF7E43A0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623639350.00007FF7E43A2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_24_2_7ff7e4380000_wermgr.jbxd
                                                                Similarity
                                                                • API ID: Heap$FreeProcess
                                                                • String ID:
                                                                • API String ID: 3859560861-0
                                                                • Opcode ID: 71a94c9b8ef526181a5c37f53356d63deb500d7b60bc2c68125a821e4c28994d
                                                                • Instruction ID: d8cce7bf33658adeee8cf4922dcf6e80682149f1080d6d886cf51e307fb5a4f0
                                                                • Opcode Fuzzy Hash: 71a94c9b8ef526181a5c37f53356d63deb500d7b60bc2c68125a821e4c28994d
                                                                • Instruction Fuzzy Hash: FD011E66A04B4696DB009F57F88415DB3A0FB58F84BD8413ADB4D13B18DF78E491C751
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FF7E4385874), ref: 00007FF7E43858B1
                                                                • HeapFree.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FF7E4385874), ref: 00007FF7E43858C3
                                                                • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FF7E4385874), ref: 00007FF7E43858F1
                                                                • HeapFree.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FF7E4385874), ref: 00007FF7E4385903
                                                                Memory Dump Source
                                                                • Source File: 00000018.00000002.623541171.00007FF7E4381000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF7E4380000, based on PE: true
                                                                • Associated: 00000018.00000002.623534030.00007FF7E4380000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623554275.00007FF7E4395000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623593260.00007FF7E439E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623622611.00007FF7E43A0000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                • Associated: 00000018.00000002.623639350.00007FF7E43A2000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_24_2_7ff7e4380000_wermgr.jbxd
                                                                Similarity
                                                                • API ID: Heap$FreeProcess
                                                                • String ID:
                                                                • API String ID: 3859560861-0
                                                                • Opcode ID: 43a2ce1ca09ab7cc2ee7ae634834d5d5ccb361b91a0bc1bc05f50a7fcf42f4b2
                                                                • Instruction ID: fc3c7e46a6d036f9f332aac5fabf2bea83fe1d800aa455a29ef374e90911c1b0
                                                                • Opcode Fuzzy Hash: 43a2ce1ca09ab7cc2ee7ae634834d5d5ccb361b91a0bc1bc05f50a7fcf42f4b2
                                                                • Instruction Fuzzy Hash: A801D636A05B4685E7809F368894378B3A1FF59F28F884739CA1D4E194CF3C50458322
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%